Next Page: 10000

          

Other: Business Intelligence Solutions Architect - Houston, Texas

 Cache   
Bitwise Inc is looking for Business Intelligence Solutions Architect at Houston TX We have multiple roles available. Skills & Qualifications:---Required Cognos To Tableau Conversion Or Migration Experience. Need someone with strong experience of BI Architecture. Candidate would be responsible for BI migration. Need good experience of creating Data Marts, providing solutions. Design and develop data analytics framework. Partners with other architects, infrastructure and software experts to define metadata layers, technical strategy and optimal integration within existing client IT landscape. Translate to technical designers or developers designed solution, review proposed solution and optimize it when required About Us : Bitwise, a data management consulting and services company, uses 20+ years of Enterprise Data Management experience to help bridge gaps between traditional EDW and cutting-edge technologies, including Big Data and Cloud tools. Through our Digital practice, we provide world-class talent covering the full spectrum of development technologies starting from J2EE, .NET, Angular, Cordova, Ionic, Native iOS, Android, other open source application stacks and Cloud technologies to deliver custom application solutions and services. What truly sets Bitwise apart is not just our 22 years of experience helping leading Fortune 1000 companies solve their most pressing Data and Digital challenges, but our dedication to developing unique solutions that automate and accelerate complex processes. Please visit us at ()
          

Deepin, el Linux que acudió al rescate de Huawei cuando no pudo usar Windows y que ahora prepara su propio asistente de voz

 Cache   

Deepin, el Linux que acudió al rescate de Huawei cuando no pudo usar Windows y que ahora prepara su propio asistente de voz

Existen muchas distribuciones GNU/Linux enfocadas al usuario medio, aunque no tantas que ofrezcan lo que éste, acostumbrado a la facilidad de uso de los últimos Windows o a la refinada estética de los Mac, exige. Pero entre las pocas elegidas de esta breve lista encabezada por Ubuntu, en los últimos años ha empezado a destacar una pequeña distribución 'made in China' llamada Deepin.

Su ascenso se inició, irónicamente, cuando en 2015 dejó de estar basada en Ubuntu para pasar a estarlo, como esta última, en Debian, mejorando en el proceso el rendimiento y la experiencia de usuario. Si sumamos a eso su escritorio, posiblemente uno de los más bonitos del mundillo linuxero (desarrollado específicamente para esta distribución y llamado igual que ella) y su sencillo proceso de instalación, se explica el crecimiento exponencial de su base de usuarios.

Colaboración con Huawei y viejas acusaciones de 'spyware'

Pero ha sido este 2019 el año en que ha empezado a estar en boca de muchos que nunca se habrían preocupado de una pequeña distribución Linux, aunque en gran parte ha sido por un hecho ajeno a sus capacidades como sistema operativo: cuando la guerra comercial entre EE.UU. y China afectó de lleno a Huawei, limitando su acceso al software estadounidense, todos los ojos se volvieron hacia su departamento de smartphones y las repercusiones que eso tendría sobre su uso de Android.

Pero Huawei también es fabricante de portátiles, y ante la imposibilidad de acceder a licencias de Microsoft Windows, el pasado mes de septiembre las unidades de su gama Matebook salieron al mercado equipadas con Linux. Concretamente con la última versión de Deepin:

Huawei Linux 3

Ahora, en una entrevista realizada en Forbes esta misma semana a dos altos cargos de Wuhan Deepin Technology, la compañía desarrolladora de Deepin. Su responsable de desarrollo (Hualet Wang) y su director de tecnología (Raphael Zhang) han aprovechado para hablar de las repercusiones de esta colaboración con Huawei, y del futuro cercano de su distribución.

"Huawei es un socio de Deepin [...] y estamos colaborando estrechamente. [...] Estamos desarrollando sistemas operativos para dispositivos Huawei".

Ante la pregunta de que si eso supondrá que veremos más dispositivos Huawei con Deepin pre-instalado, la respuesta de Raphael Zhang se limita a "Es un secreto y no puedo decir nada todavía ;)". Oficialmente, los planes de Huawei pasaban por migrar sus portátiles y tablets a su propio sistema operativo HarmonyOS, aún en proceso de desarrollo, a lo largo de 2020.

Sin embargo, su vinculación con Huawei (acusada por el gobierno estadounidense de espionaje en favor del gobierno chino) ha reavivado viejas polémicas en torno a Wuhan Deepin Technology y su distribución. Tal como plantea Forbes, "parece que Deepin no puede escapar de las acusaciones de ser 'espía', y que genera un poco de desconfianza entre la gente debido a sus orígenes chinos".

A comienzos de 2018, un desarrollador anónimo afirmó, desde su página de GitHub, que la tienda de aplicaciones de Deepin 15.5 contenía un spyware que estaría realizando conexiones no cifradas con el rastreador chino CNZZ. Deepin aclaró al poco tiempo que el backend de su centro de software es una aplicación web y que CNZZ (básicamente, un equivalente chino de Google Analytics) sólo recogía datos referentes a la navegación, que se usaban con fines de mejora del servicio, como ocurre en cualquier web empresarial.

Sin embargo, las acusaciones de ser un 'software espía' han ido retornando periódicamente desde entonces, y su reciente vinculación a Huawei no ha ayudado, precisamente.

"Vamos a tratar de hacer nuestro software tan 'open source' como sea posible [...] pero algunos de nuestros programas tendrán que seguir siendo de código privativo, como los drivers de Nvidia y algunos programas populares de terceros".

"Animaremos a la gente a participar en el proceso de desarrollo de Deepin. Sobre los pocos que se nieguen a ver los hechos, tendremos que dejarles estar".

¿Qué novedades aportarán las próximas versiones de Deepin?

La comunidad global de usuarios de Deepin podrá experimentar en los próximos meses dos nuevas funcionalidades que marcarán la diferencia entre su distribución y otros 'sabores' de Linux.

Por un lado está Deepin Cloud Sync, un servicio que permite sincronizar autómaticamente toda clase de ajustes del sistema con la nube: desde la configuración del Wi-Fi o el ratón, a los ajustes de las actualizaciones, el tema y el fondo de escritorio, etc. Esta característica ya está disponible para los usurios chinos de Deepin, pero desde la compañía señalan que quieren hacerlo disponible a nivel internacional.

"Vamos a experimentar primero aquí en China antes de ponerlo disponible a una audiencia más amplia. También necesitamos tiempo para estudiar las leyes sobre privacidad de los diferentes países. No hemos decidido aún si estaría disponible sin [una cuenta] Deepin ID".

Por otro lado, una de las grandes novedades de la próxima versión (la 20) es que saldrá al mercado con su propio asistente de voz dotado de inteligencia artificial, al estilo de Cortana en Windows o de Siri en MacOS.

Lo sabemos exclusivamente por un vídeo íntegramente en chino difundido en el grupo Telegram de Deepin, en el que se muestra a un usuario preguntando a su sistema operativo y recibiendo respuestas tanto mediante texto (en una ventana emergente) como mediante voz. Pero este nuevo asistente (aún sin nombre, que sepamos) no se limita a solventar dudas con cierta solvencia: también abre páginas web o pantallas de configuración del sistema a petición del usuario, incluso parece redactar e-mails al dictado.

Imagen | Cristoph Michels

También te recomendamos

Llega HarmonyOS: el sistema operativo open source de Huawei basado en el kernel de Linux

[Actualizado] Huawei desmiente que vaya a lanzar su sistema operativo el próximo mes

El veto de EEUU a Huawei nos enseña las consecuencias de un mundo del software oligopólico, y eso no es bueno para los usuarios

-
La noticia Deepin, el Linux que acudió al rescate de Huawei cuando no pudo usar Windows y que ahora prepara su propio asistente de voz fue publicada originalmente en Genbeta por Marcos Merino .


          

OpenGradeSIM is an open source incline simulator for indoor bike trainers

 Cache   
Although he would probably rather be outdoors, after an injury Matt Ockendon had a lot more time to ride his Tacx Neo indoor trainer and tinker. He decided on a rig that would enable him to physically to simulate various grades of hills; but as commercially available units with this capability are quite expensive, he instead […]
          

B-Tree Index Improvements in Postgres 12

 Cache   

#333 — November 27, 2019

Read on the Web

Postgres Weekly

B-Tree Index Improvements in Postgres 12 — B-tree indexes have been improved in Postgres v12 - this article describes some easily understood examples. It won’t affect most users but there are some performance benefits, particularly for databases stored on media with poor random read performance (e.g. magnetic storage).

Laurenz Albe

12 Common Mistakes and Missed Optimization Opportunities in SQL — A lengthy list of SQL “dos and don’ts” covering topics like timezones, ranges, formatting queries, and unions.

Haki Benita

Multitenancy Options in Postgres — A high-level overview of the Postgres architecture helps provide some contextual understanding of the multitenancy options available with Postgres. Download this white paper to learn more about the three main Postgres multitenancy options.

EnterpriseDB sponsor

How To Get Started with pgBackRest on Postgres 12pgBackRest is a backup and restore tool for Postgres that now takes advantages of some of the new features in Postgres 12. Here’s how to set up and configure it.

Tom Swartz

Deploying and Configuring Postgres with Puppet — Runs through the installation and programming of Puppet modules (Puppet being a popular open source config management and deployment system) for deploying/configuring your databases.

Hugo Dias

Converting from Asynchronous to Synchronous Replication in PostgreSQL — Shows you how to install a PostgreSQL Cluster from scratch and convert the asynchronous replication (default) to a synchronous one.

Sebastian Insausti

An Overview of VACUUM Processing in Postgres

Kumar Rajeev Rastogi

Sum Types for Relational Databases — A look at different ways to encode sum types.

Dmitry Olshansky

Waiting for PostgreSQL 13: Allow Invisible PROMPT2 in psql — This is a really minor thing in the grand scheme of things but psql in Postgres 13 will make prompts a little nicer when entering multi-line queries.

Hubert depesz Lubaczewski

📂 Code and Projects

PGLoader: A Data Loading Tool for Migrating to Postgres — A COPY-based data loading tool that supports both parallelism and can load in data that may be partially erroneous but without stopping (as \copy might).

Dimitri Fontaine

eBook: Best Practices for Optimizing Postgres Query Performance — Learn how to get a 3x performance improvement on your Postgres database and 500x reduced data loaded from disk in this free pganalyze eBook.

pganalyze sponsor

pg_simdjson: An Extension for Parsing JSON using simdjson — This is a prototype/experiment for now but I like seeing things like this out there. This extension uses the high performance simdjson parser to (slightly, so far) outperform Postgres’s native JSON parser.

Dmitry Dolgov

pg_query_state: A Module for Query Progress Monitoring

Postgres Professional

🗓 Upcoming Events

  • 2Q PGCONF 2019 (December 4-5, 2019 in Chicago) — A conference dedicated to exchanging knowledge about the world’s most advanced open source database: PostgreSQL.
  • PgDay SF (January 21, 2020 in San Francisco) — A 1-day, single-track Postgres event.
  • PgConf.Russia (Febuary 3-5, 2020 in Moscow, Russia) — One day of tutorials and two days of talks in three parallel sessions.
  • PGConf India (Febuary 26-28, 2020 in Bengaluru, Maharashtra, India) — A dedicated training day and a multi-track two-day conference.
  • pgDay Paris 2020 (March 26, 2020 in Paris, France) — Learn more about the world’s most advanced open source database among your peers.
  • Swiss PGDay 2020 (June 18-19, 2020 in Switzerland) — A two track conference (one in English, one in German) aimed at the entire Postgres community.

          

Bloodshed Dev-C++

 Cache   
Bloodshed Dev-C++ is a full-featured Integrated Development Environment (IDE) for the C/C++ programming language. It uses Mingw port of GCC (GNU Compiler Collection) as its compiler. It creates native Win32 executables, either console or GUI. Dev-C++ can also be used in combination with Cygwin.

Dev-C++ is Free Software (also referred as Open Source), and is written in Delphi (yes I know the irony).
          

Red Hat Customer Success Stories: Migrating to SAP S/4HANA with RHEL for SAP Solutions and more

 Cache   

Automation and management are important tools for organizations looking to modernize, improve efficiency, and expand their IT systems without having to add staff. When faced with these problems, some companies turn to Red Hat to help them use enterprise open source to solve their problems. See how Mann & Schröder Cosmetics, Swiss Federal Railways, and Česká spořitelna worked with Red Hat to improve their IT. 


          

Exploiting GPUs for Efficient Gradient Boosting Decision Tree Training

 Cache   
In this paper, we present a novel parallel implementation for training Gradient Boosting Decision Trees (GBDTs) on Graphics Processing Units (GPUs). Thanks to the excellent results on classification/regression and the open sourced libraries such as XGBoost, GBDTs have become very popular in recent years and won many awards in machine learning and data mining competitions. Although GPUs have demonstrated their success in accelerating many machine learning applications, it is challenging to develop an efficient GPU-based GBDT algorithm. The key challenges include irregular memory accesses, many sorting operations with small inputs and varying data parallel granularities in tree construction. To tackle these challenges on GPUs, we propose various novel techniques including (i) Run-length Encoding compression and thread/block workload dynamic allocation, (ii) data partitioning based on stable sort, and fast and memory efficient attribute ID lookup in node splitting, (iii) finding approximate split points using two-stage histogram building, (iv) building histograms with the aware of sparsity and exploiting histogram subtraction to reduce histogram building workload, (v) reusing intermediate training results for efficient gradient computation, and (vi) exploiting multiple GPUs to handle larger data sets efficiently. Our experimental results show that our algorithm named ThunderGBM can be 10x times faster than the state-of-the-art libraries (i.e., XGBoost, LightGBM and CatBoost) running on a relatively high-end workstation of 20 CPU cores. In comparison with the libraries on GPUs, ThunderGBM can handle higher dimensional problems which the libraries become extremely slow or simply fail. For the data sets the existing libraries on GPUs can handle, ThunderGBM achieves up to 10 times speedup on the same hardware, which demonstrates the significance of our GPU optimizations. Moreover, the models trained by ThunderGBM are identical to those trained by XGBoost,- and have similar quality as those trained by LightGBM and CatBoost.
          

Tracking Cartels: Exploiting Open Sources to Identify Trends

 Cache   

This research brief explains the efforts of researchers from three Department of Homeland Security Centers of Excellence who are working together to provide the U.S. Government with new open source tools that combat transnational criminal organizations (TCOs) and drug cartels in Mexico, Guatemala, Honduras and El Salvador, while protecting confidential sources and increasing international and domestic information sharing.

Publication Type: 
Publication Date: 
November, 2019

          

Presentation: Adventures in Programming, Automating, Teaching and Marketing

 Cache   

Alan Richardson discusses lessons learned from writing commercial and open source tools, multi-user adventure games, REST APIs, test automation, and automating applications.

By Alan Richardson
          

Bitwarden

 Cache   

I’ve been using 1Password for years without too many issues. It’s a nicely designed and implemented app with a long history. I really had no reason to look elsewhere.

However, there’s been a lot of noise lately about them taking $200 million in VC money. I’m not that concerned. They’ve grown and want to grow faster, so fine. It did, however, make me take a quick look at the alternatives, just in case.

A number of people, especially those concerned with privacy, recommend Bitwarden as an alternative to 1Password. I’ve signed up and imported my data from 1Password. Let’s see how it goes.

Bitwarden’s Premium license is $10/year. There’s also a “Family” plan for $1.00/month for up to 5 people. That’s pretty cheap.

But how well does it work? Well, after only a couple of days of testing I’ve decided it’s worth a decent attempt to make the switch to Bitwarden. It’s reasonably polished, open source, audited by 3rd parties, and inexpensive. It feels just a tiny bit nerdy, which, in my experience, means that when features are added they’re more likely to address actual user needs.

There’s an iOS app that can be configured as a password store, just like 1Password.

If I choose, I could run my own copy of the server. I may in fact do this once things have gotten burned in a bit and I haven’t found any deal-stoppers.

It’s been pretty seamless so far. I’ll report back if it works out…or doesn’t.

One thing I find interesting is that 1Password has nearly 200 employees, and as far as I can tell, Bitwarden is developed mostly by one guy. That’s a huge difference in resources for things that seem, at least on the surface, to be quite similar.


          

IT / Software / Systems: Sr. Mgr, Software Engineering - Plano, Texas

 Cache   
Locations: TX - Plano, United States of America, Plano, Texas At Capital One, we're building a leading information-based technology company. Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking. We measure our efforts by the success our customers enjoy and the advocacy they exhibit. We are succeeding because they are succeeding. Guided by our shared values, we thrive in an environment where collaboration and openness are valued. We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results. We elevate each other and obsess about doing the right thing. Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams. Together, we are on a quest to change banking for good. Sr. Mgr, Software Engineering At Capital One, we think big and do big things. We are a Top-10 bank by deposits, a high-tech company, scientific laboratory, and a nationally recognized brand all in one that reaches tens of millions of consumers. We're all-in on the cloud and a leader in the adoption of open source, RESTful APIs, microservices, and containers. We build our own products and release them with a speed and agility that allows us to get new customer experiences to market quickly. We're going boldly where no bank has gone before. And, as a founder-led company, we're inspired and empowered to make, break, do, and do good. So, let's do something great together. Capital One is seeking experienced Technology Leads and Sr Manager to lead and own work-streams for critical business initiatives in our financial services businesses, including our Rewards business. You'll work on everything from customer-facing web and mobile applications using cutting-edge Open Source frameworks, to highly-available RESTful services, to back-end Java based systems. We're looking for team members who are well-versed in emerging and traditional technologies which may include: Java, REST, Spark, Cassandra NoSQL databases, and AWS/Cloud Infrastructure. Your #LifeatCapitalOne Looking to work somewhere with the flexibility of a start-up but the financial muscle of a Top-10 bank? You're in the right place! And here's what that means for you---You'll have a flexible work schedule-we want to understand where and when you're at your best so you have a healthy work-life balance. Diversity and Inclusion are cultural norms here-you'll have access to active local chapters of Women in Tech, Blacks in Tech, and Hispanics in Tech and more. Plus, you'll be given time to support the next generation of technologists by volunteering with youth programs like Capital One Coders - our engineer-led experience that teaches middle school students in under-served communities how to code. Want to learn more? See what our associates are up to at #LifeatCapitalOne! What you'll do: --- Work with product owners to understand desired application capabilities and testing scenarios --- Continuously improve software engineering practices --- Work within and across Agile teams to design, develop, test, implement, and support technical solutions across a full-stack of development tools and technologies --- Lead the craftsmanship, availability, resilience, and scalability of your solutions --- Bring a passion to stay on top of tech trends, experiment with and learn new technologies, participate in internal & external technology communities, and mentor other members of the engineering community --- Encourage innovation, implementation of cutting-edge technologies, inclusion, outside-of-the-box-thinking, teamwork, self-organization, and diversity Here's what you'll need to be successful: You have full Stack hands-on expertise: Java, RESTful API, Micro-service & Reactive Architecture --- You are experienced / Contributor in Open Source software: Apache Cassandra, Spark, Kafka, In-memory processing, Stream processing --- You have a passion for shipping software in quick iterations: Test driven development & CI/CD & you are an Agilist --- You are experienced to operate in an elastic cloud infrastructure such as AWS. --- You have a passion to build a high performing engineering team. --- You thrive well in an environment of innovation, implementation of cutting-edge technologies, teamwork, self-organization, and diversity Basic Qualifications: --- Bachelor's Degree --- At least 10 years' experience in full-stack development utilizing Java and API's --- At least 5 years' experience developing REST APIs --- At least 3 years' of people leadership or Tech Lead experience --- At least 2 years' experience in developing applications using AWS Preferred Qualifications: --- Master's Degree --- 4+ years' experience hands-on coaching and development of software engineers --- 4+ years' experience with distributed technologies including one of the following: Apache Spark, Apache Kafka, or Apache Cassandra. --- Experience with Microservices Architecture --- Experience with Machine Learning or AI --- Experience in DevOps and Automation using CICD tools and processes (Jenkins, Maven, Ansible, Artemis) --- Experience in serverless architecture in AWS or other cloud platforms Capital One will consider sponsoring a new qualified applicant for employment authorization for this position. ()
          

Other: Quantitative Analytics Mgr 1 / Lead - Model Monitoring and Quality Review - AI MD CoE - Irving, Texas

 Cache   
Important Note During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume prior to submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as Personal Cell or Cellular in the contact information of application. At Wells Fargo, we want to satisfy our customers financial needs and help them succeed financially. We re looking for talented people who will put ou customers at the center of everything we do. Join our diverse and inclusive team where you ll feel valued and inspired to contribute your unique skills and experience. Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you. Data Management and Insights (DMI) is transforming the way that Wells Fargo uses and manages data. Our work enables Wells Fargo to empower and inform our team members, deliver exceptional experiences for our customers, and meet the elevated expectations of our regulators. The team is responsible for designing the future data environment, defining data governance and oversight, and partnering with technology to operate the data infrastructure for the company. This team also provides next generation analytic insights to drive business strategies and help meet our commitment to satisfy our customers financial needs. The Artificial Intelligence Model Development Center of Excellence (AI MD CoE) team is a data science team, responsible for developing and deploying machine learning and AI solutions for a number of domain areas such as fraud prevention, credit risk, experience personalization, customer listening, anomaly detection and operational cost improvement. The CoE partners closely with the AI Enterprise Solutions and the AI Technology teams at the bank, and brings a cross-functional approach to identifying, developing and deploying AI solutions. The CoE requires high-skill/ high-motivation individuals who enjoy working collaboratively in a team setting, used to taking decisions autonomously and comfortable with a dynamic work environment. The Lead Model Monitoring and Review role would be responsibl executing on the model monitoring and model rapid refresh functions of the CoE. The role would create a standardized and efficient process for model monitoring so that risks around model degradation and failure are identified in a consistent and timely way. Also that the model retraining on a fresh set of data is performed in a speedy manner, but with the appropriate controls to ensure model robustness and stability. Additional responsibilities would include the quality review of model related technical documentation going to Model Risk Mgmt as well as other audit and regulatory bodies. A key requirement out of this role would be to make sure that industry best practices for model monitoring and refresh are appropriately brought into the processes followed by the AI Model Development CoE. This would include identification and selection of the potential external solutions that meet this overall requirement, as well as bringing in useful open source frameworks. The role of the Leader would be to hire and manage a team of data scientists and documentation review experts that can deliver on the objectives of the role. Key_Responsibilities_Include * Defining the operating framework for model monitoring operations monitoring, drift monitoring, performance etc. * Defining the framework for rapid refresh of models and operational approach. * Undertaking the model monitoring and simple model refresh tasks, per the model monitoring and update framework (see above) and per the needs of specific models, defined by the Model Developer. Also identification of solutions to improve process efficiency through automation approaches, and implementing the same working closely with AI Enterprise Solutions and WF Technology. * Working closely with Model Risk and other governance partners to ensure that the model refresh framework is implemented in a controlled manner, within the current policy framework. * Define and implement a documentation and artifact review process for model documentation and artifacts, created as part of the model development work performed by model development teams. * People management responsibilities such as hiring, performance management, routine travel and equipment/ software related approvals. As a Team Member Manager, you are expected to achieve success by leading yourself, your team, and the business. Specifically you will * Lead your team with integrity and create an environment where your team members feel included, valued, and supported to do work that energizes them. * Accomplish management responsibilities which include sourcing and hiring talented team members, providing ongoing coaching and feedback, recognizing and developing team members, identifying and managing risks, and completing daily management tasks. Required_Qualifications * 4+ years of experience in an advanced scientific or mathematical field * 2+ years of leadership experience * A master's degree or higher in a quantitative field such as mathematics, statistics, engineering, physics, economics, or computer science * 2+ years of experience in Artificial Intelligence, Natural Language Processing, Machine Learning, Distributed Computing, Chatbot, and Virtual Assistant * 2+ years of Python experience Other_Desired_Qualifications * Experience with building advanced statistical and machine learning models, in a banking or financial services context * Experience with building NLP (Natural Language Processing) solutions in the financial industry * Experience with monitoring or retraining advanced statistical and machine learning models * Close familiarity with machine learning and statistical modeling techniques using open-source languages like Python or R * Solid understanding of Model Risk Management requirements for banks and financial services companies * Familiarity with Big Data technology for Data Management and Data Science * Disclaimer All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act. Relevant military experience is considered for veterans and transitioning service men and women. Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/ Female/Disabled/Veteran/Gender Identity/Sexual Orientation. Reference Number *******-6 ()
          

Red Hat Customer Success Stories: Migrating to SAP S/4HANA with RHEL for SAP Solutions and more

 Cache   

Automation and management are important tools for organizations looking to modernize, improve efficiency, and expand their IT systems without having to add staff. When faced with these problems, some companies turn to Red Hat to help them use enterprise open source to solve their problems. See how Mann & Schröder Cosmetics, Swiss Federal Railways, and Česká spořitelna worked with Red Hat to improve their IT. 


          

You can’t do real work on Android, at least not all of it

 Cache   
While not an Apple hater, I personally prefer more open or at least less restrictive platforms and devices. That primarily translates to Linux and open source software on the desktop and Android on mobile. But if there’s one thing I have always been jealous of Apple’s mobile ecosystem is how it has grown to enable more complex uses and workflows, … Continue reading
          

Open Source : un accès contrarié aux grands marchés de support

 Cache   

          

Alibaba Cloud passe en open source un algorithme de machine learning

 Cache   

          

Alibaba Cloud โอเพนซอร์สไลบรารี Alink รวบรวมอัลกอริทึม Machine Learning ไว้ในชุดเดียว

 Cache   

Alibaba Cloud ธุรกิจฝั่งองค์กรของ Alibaba ปล่อยไลบรารี Alink ที่เป็นไลบรารีคอมพิวเตอร์เรียนรู้ได้ (machine learning) ชุดใหญ่ สำหรับการสร้างบริการในกลุ่มคอมพิวเตอร์เรียนรู้ได้ เช่น ระบบแนะนำสินค้า, การทำนายข้อมูลในอนาคต

ไลบรารีประกอบด้วยกลุ่มอัลกอริทึม เช่น จัดหมวดหมู่ข้อมูล (classification), ทำนายข้อมูล (regression), จับกลุ่มข้อมูล (clustering), หาชุดข้อมูลผิดปกติ, การคำนวณค่าสถิติ โดยรวมนับว่าใกล้เคียงกับโครงการ scikit-learn แต่ Alink ออกแบบมาเพื่อใช้งานกับ Apache Flink เป็นหลัก แม้จะมีโมดูล PyAlink ให้ทำงานกับไพธอนด้วยก็ตาม

สัญญาอนุญาตโครงการ Alink เป็นแบบ Apache 2.0 ใช้งานได้ค่อนข้างอิสระ

ที่มา - Alizia

No Description


          

IntelliJ IDEA 2019.3 offers Quarkus and MongoDB support, performance improvements & more

 Cache   

IntelliJ IDEA 2019.3 has been released with many new features for users of the Ultimate and open source versions. The team worked on providing a faster startup time and reduced memory consumption to all users of the IDE, while Ultimate users receive additional features.

The post IntelliJ IDEA 2019.3 offers Quarkus and MongoDB support, performance improvements & more appeared first on JAXenter.


          

Unleash chaos engineering: Kubethanos kills half your Kubernetes pods

 Cache   

Chaos engineering is the art of destruction. Since Netflix unleashed Chaos Monkey onto the world, chaos engineering has been used to test system resiliency and see just how secure your system really is. Kubethanos is a new open source tool for Kubernetes pods. It kills half of your pods at random so that you can see just how your system (and your team) behaves under the threat of catastrophic failure.

The post Unleash chaos engineering: Kubethanos kills half your Kubernetes pods appeared first on JAXenter.


          

GitHub's Student Dev Pack - I'm Finally Applying

 Cache   

After procrastinating for a week, I’m finally applying for GitHub’s Student Developer Pack. It took almost a week for me to answer a simple question.

How do you plan to use GitHub?

It’s a simple question, and I know how do I plan to use GitHub, but for some reasons, I wasn’t able to craft my words, the way I wanted to. Every day, I opened my text editor, wrote a bunch of sentences, and closed it down.

It wasn’t hard for me to write the answer, but I procrastinated, and now I know how does it feel to do something in a week when in reality, you can complete the same thing in around 30 minutes or so.

It took around 10 minutes to write, and the next 20 minutes were spent thinking if what I’ve written makes sense or not.

Here’s what I wrote and sent -

I’ve been using GitHub for a while now. I still remember when I created my account but had absolutely no idea of anything that was happening. I indeed wiped out my ~/home with git rm because I was having a hard time understanding Git and GitHub.

It took me some time, but I understood what’s the work and purpose of GitHub, and how important it is for people like me. If it wasn’t GitHub, I might not have been aware of Programming and Open Source. I love to code, and I genuinely care about FOSS.

GitHub Student Developer is important to me. I’m focused on developing better things than what I’ve built in the past. As a student, I don’t get much time to do a lot of things, so it’s not entirely possible for me to pay for the features that GitHub is providing to the students.

The initial goal is to make progress towards becoming a better developer while contributing to the Open Source as much as I can. So, here’s how I’m planning to use GitHub’s Student Developer Pack -

1) Use Bootstrap Studio, Canva, Iconscout, Icons8, Weglot to learn and build user interfaces and improve my fronted skills.

2) Use Datadog, AWS, Azure, mnx.io to learn, understand, and experiment with the cloud.

3) Use Flatiron School, Thinkful, Covalence, Go Rails, next.tech, Interview Cake, One Month, Frontend Masters, Educative to improve my skills as a programmer. Most importantly, I want to build sensible projects, write tutorials, and make useful contributions to open source.

I can go on and on, but I think these are some basic ways of how I’m planning to use GitHub.

That’s it. I think it makes sense, I guess. Although I don’t know if other people provide such a brief answer while applying, for me, it was different, so I wrote what was going on top of my mind.


21st Nov. 2:54 AM. I just submitted the docs



UPDATE

Thu, Nov 21, 2019 at 3:15 AM



I just got the email from GitHub, and I’m very happy. I don’t have much to say. I’ll just check everything, and then I’ll probably get some sleep.

Happy Moment!

          

Michael Berthold on End-to-End Data Science Using KNIME Analytics Platform

 Cache   

Open source data analytics platform KNIME CEO and co-founder Michael Berthold gave the keynote presentation at this year's KNIME Fall Summit 2019 Conference. He spoke about the end-to-end data science cycle. The data science process lifecycle mainly involves create and productionize categories.

By Srini Penchikala
          

95: Data Science Pipeline Testing with Great Expectations - Abe Gong

 Cache   
Data science and machine learning are affecting more of our lives every day. Decisions based on data science and machine learning are heavily dependent on the quality of the data, and the quality of the data pipeline. Some of the software in the pipeline can be tested to some extent with traditional testing tools, like pytest. But what about the data? The data entering the pipeline, and at various stages along the pipeline, should be validated. That's where pipeline tests come in. Pipeline tests are applied to data. Pipeline tests help you guard against upstream data changes and monitor data quality. Abe Gong and Superconductive are building an open source project called Great Expectations. It's a tool to help you build pipeline tests. This is quite an interesting idea, and I hope it gains traction and takes off. Special Guest: Abe Gong.
          

The making of GitHub Sponsors (The Changelog #370)

 Cache   
Devon Zuegel is an Open Source Product Manager at GitHub. She’s also one of the key people responsible for making GitHub Sponsors a thing. We talk with Devon about how she came to GitHub to develop GitHub Sponsors, the months of research she did to learn how to best solve the sustainability problem of open source, why GitHub is now addressing this issue, the various ways and models of addressing maintainers’ financial needs, and Devon also shared what’s in store for the future of GitHub Sponsors.
          

Privacy Policy

 Cache   

The digiKam Team built the Google Photo, Google Drive or another Webservices uploader as a open source app. This SERVICE is provided by the digiKam Team at no cost and is intended for use as is. This page is used to inform website visitors regarding our policies with the collection, use, and disclosure of Personal Information if anyone decided to use our Service. If you choose to use our Service, then you agree to the collection and use of information in relation with this policy.

          

Krita 4.2.8 Released

 Cache   

The Krita team is pleased to announce another bug fix release of Krita 4.2: Krita 4.2.8.  Part of Krita’s core team is now working on rewriting the way Krita loads and saves resources like brushes or gradients. This is a big task that takes up a lot of time, so there are fewer bug fixes in this release than there were for 4.2.7. Still, there has been a lot of work done on vector shapes, the transform tool and, especially, saving on Windows.

Windows usually only writes out saved files to the actual disk when it feels like it. So if you’d cut the power to your computer before Windows did that, you might get corrupted files. With 1,500,000 distinct Windows 10 users of Krita in the past month, chances are good for that happening (just like there are people who work exclusively with unnamed autosave files — don’t do that!), so we now try to force Windows to write files to disk after saving. This does make saving slower on Windows, but the added security should be worth it.

The autoprecision setting in the brush preset editor has been rewritten as well, which should result in better performance and nicer lines, too.

Here’s the full list of fixes:

  • Fix the sliders in the performance settings page. BUG:414092
  • Fix the color space of the onion skin cache. BUG:407251
  • Fix transforming layers that have onion skins enabled. BUG:408152
  • Also save the preferences when closing the preferences dialog with the titlebar close button
  • Fix a bug in the polygon tool that adds an extra point. BUG:411059
  • Save the last used export settings. BUG:409044
  • Prevent a crash on macOS when closing a dialog that opened the system color dialog. BUG:413922
  • Fix an issue on macOS where the native file dialogs would not return a filename. BUG:413241
  • Make it possible to save the “All” tag as the current tag. BUG:409748
  • Show the correct blending mode in the brush preset editor. BUG:410136
  • Fix saving color profiles that are not sRGB to PNG files
  • Make the transform tool work correctly with the selection mask’s overlay
  • Fix a crash when editing the global selection mask. BUG:412747
  • Remove the “Show Decorations” option from the transform tool. BUG:413573
  • Remove the CSV export filter (it hasn’t worked for ages)
  • Fix slowdown in the Warp transform tool. BUG:413157
  • Fix possible data loss when pressing the escape key multiple times. BUG:412561
  • Fix a crash when opening an image with a clone layer when instant preview is active. BUG:412278
  • Fix a crash when editing vector shapes. BUG:413932
  • Fix visibility of Reference Layer and Global Selection Mask in Timeline. BUG:412905
  • Fix random crashes when converting image color space. BUG:410776
  • Rewrite the “auto precision” option in the brush preset editor. BUG:413085
  • Fix legacy convolution filters on images with non-transparent background. BUG:411159
  • Fix an assert when force-autosaving the image right during the stroke. BUG:412835
  • Fix crash when using Contionous Selection tool with Feather option. BUG:412622
  • Fix an issue where temporary files were created in the folder above the current folder.
  • Improve the rendering of the transform tool handles while actually making a transformation
  • Use the actual mimetype instead of the extension to identify files when creating thumbnails for the recent files display
  • Improve the logging to detect whether Krita has closed improperly
  • Fix exporting compositions from the compositions docker. BUG:412953, BUG:412470
  • Fix Color Adjustment Curves not processing. BUG:412491
  • Fix artifacts on layers with colorize mask *and* disabled layer styles
  • Make Separate Channels work. BUG:336694, BUG:412624
  • Make it possible to create vector shapes on images that are bigger than QImage’s limits. BUG:408936
  • Disable adjustmentlayer support on the raindrop filter. BUG:412522
  • Make it possible to use .kra files as file layers. BUG:412549
  • Fix Crop tool loosing aspect ratio on move. BUG:343586
  • Fix Rec2020 display format. BUG:410918
  • Improve error messages when loading and saving fails.
  • Fix jumping of vector shapes when resizing them
  • Add hi-res input events for pan, zoom and rotate. BUG:409460
  • Fix crash when using Pencil Tool with a tablet. BUG:412530
  • Always ask Windows to synchronize the file systems after saving a file from Krita.
  • Fix wrong aspect ratio on loading SVG files. BUG:407425

Download

Windows

For the beta, you should only only use the portable zip files. Just open the zip file in Explorer and drag the folder somewhere convenient, then double-click on the krita icon in the folder. This will not impact an installed version of Krita, though it will share your settings and custom resources with your regular installed version of Krita. For reporting crashes, also get the debug symbols folder.

Linux

(If, for some reason, Firefox thinks it needs to load this as text: to download, right-click on the link.)

OSX

Note: the gmic-qt is not available on OSX.

Source code

md5sum

For all downloads:

Key

The Linux appimage and the source .tar.gz and .tar.xz tarballs are signed. You can retrieve the public key over https here: 0x58b9596c722ea3bd.asc. The signatures are here (filenames ending in .sig).

Support Krita

Krita is a free and open source project. Please consider supporting the project with donations or by buying training videos! With your support, we can keep the core team working on Krita full-time.


          

AVIF (12/10/8-bit) image support for darktable

 Cache   

As I’m an amateur photographer, I’m using Open Source tools for developing my images. The software I use is called darktable. I think it is the best tool out there for editing RAW images.

From time to time I contributed small code changes to darktable, mostly bug fixes. Now I nearly finished my first feature for darktable, support for the AVIF image format.

AVIF support in darktableFrom RAW exported and reimported AVIF images in darktable.

For implementing AVIF support I used libavif. Joe Drago the author of libavif was very helpful explaining all the details and helping me in debugging issues. Thank you Joe!

The code need to be polished a bit more and I need to decide what to expose in the export UI or better simplify for the user.

However there are some outstanding things that this will be a great experience for everyone:


          

Public statement by Rachana Institute of Typography on the copyright/credit issue of SMC and RIT fonts

 Cache   

About us

We — KH Hussain, CV Radhakrishnan, PK Ashok Kumar and KV Rajeesh — are the copyright holders of TN Joy font. Many of us have worked on free/libre/open source software for years in our spare time and contributed code, design, fonts, documentation, localization and financial support to various free software projects. Our contributions can be found easily on the Web and elsewhere.

A copyright/‘credit’ issue

Immediately after the font ‘TN Joy’ was released to public by Rachana Institute of Typography (RIT), on 2-Oct-2019, Santhosh Thottingal raised a question in a forum with enough number of participants to qualify as a public discussion:

@rajeeshknambiar there are lot (sic) of contributions from me, Kavya in the build scripts, tests, and feature files in https://gitlab.com/rit-fonts/tnjoy/ Consider giving credit.

On 14-Oct-2019, Santhosh followed up again.

@rajeeshknambiar did not reply to my request for giving credits in their font.

and

Ask hussain sir to give credits for font testing and building framework. Crediting anivar alone is not enough.”

To which Rajeesh responded on 19-Oct-2019, to discuss with all the copyright holders of TN Joy about the issue:

“Noted. I will try to take it up for discussion and let you know.

On 29-Oct-2019, Santhosh again followed up:

അങ്ങനെ എഴുതുകയും ചെയ്യുകയും ചെയ്ത ഫോണ്ടിന്റെ കാര്യങ്ങൾക്ക് ക്രെഡിറ്റ് കിട്ടിയില്ലെന്നാണ് പറയുന്നത് അനിവർ:) sundar, and janayugam fonts. ഇതിൽ രാജാജിയുടെ ഹെൽപ്പൊന്നും വേണ്ട. even @rajeeshknambiar can just fix it

Analysis

During the first week of Nov-2019 for the summit organized by Kerala Media Academy, all the copyright holders of TN Joy font met and discussed the issue raised by Santhosh.

As free software developers and users, it was not our intention to violate copyright or appropriate credit of another free software developer’s work at all. Not only in intention, but we strived to achieve that in all our projects by acts. So, this accusation came as a surprise to us and we decided to take a deeper look at how this issue originated and what the root cause is, to address it properly.

We did a detailed analysis and documented the following details.

Technical background

  1. A Malayalam Unicode font has two essential parts — the Glyphs (അക്ഷരരൂപങ്ങൾ) and the OpenType shaping lookup rules. Unlike Latin fonts, both of these are necessary for proper shaping. The final TTF/OTF/WOFF2  contains both Glyphs and OpenType shaping rules to make a Malayalam Unicode font usable software. Without either, such a software is not usable.
Figure 1: Malayalam text without shaping (left) and with correct shaping (right).
  1. The Malayalam opentype features (GSUB and GPOS ‘lookup rules’) used in font ‘TN Joy’ developed by Rachana Institute of Typography (RIT) are adapted from that of font ‘Sundar’ which in turn are adapted from feature file of ‘Rachana’.
  2. To develop the feature file of Rachana over the years, many have contributed including the original author Hussain KH , Suresh P, Santhosh Thottingal, Rajeesh KV, Kavya Manohar et al. [1].
  3. Hussain KH invented and implemented the glyph naming conventions (‘k1’ for ‘ ക’, ‘xx’ for ‘ ്’ etc. instead of names like ‘uni0D15’ etc.), which made font featuring highly comprehensible for programming and much easier to maintain. This naming scheme is followed by all fonts maintained by Swathanthra Malayalam Computing (SMC) and RIT. This was also the naming scheme in fonts developed by ATPS and when it was pointed out that those fonts were derived from SMC’s, the immediate change made was renaming the glyphs and lookup rules [2, 3, 4].
  4. Rajeesh is the original author of lookup rules of SMC’s fonts for revised ‘mlm2’ OpenType specification for Malayalam, and made it possible to support both ‘mlym’ and ‘mlm2’ specification in a single font. This resulted in making a single font work well with Windows XP, Pango/Qt4 era applications and Uniscribe, HarfBuzz era applications [5].
  5. In 2015, Santhosh split the comprehensive lookup rules from the Fontforge SFD file of Rachana into a separate feature file, but the copyright statements were not preserved [4]. It is our opinion that removing copyright statements is violation of copyright act (hence a crime) and immoral in the free software world. This is also the root cause for missing copyright in the OpenType lookup rules and build script, of the fonts in question.
  6. The same lookup rules in 2, 4 and 5 are used and adapted by subsequent fonts developed by SMC and RIT, such as Chilanka, Manjari, Sundar, Gayathri, TN Joy etc. Rajeesh did not claim for credit or copyright when Manjari or Gayathri was released.

RIT’s statement

With this background,

  1. Fonts developed, maintained and distributed by both SMC  and RIT, specifically its OpenType lookup rules + fontforge based build tool + test cases are at the heart of this issue. This is caused by the change introduced by Santhosh in [6].
  2. The copyright holders of TN Joy font were made aware of such ‘credit’ issue — the definition of which Santhosh has not clarified and in RIT’s understanding is sufficient and limited to ‘copyright’. Thanks for bringing light into such a potential legal and moral risk that affects the users and organizations using these fonts.
  3. RIT  would like to acknowledge the copyright of Santhosh Thottingal and Kavya Manohar for the development of ‘Sundar’ and ‘TN Joy’ in the areas of lookup rules, the ‘build script’ and comprehensive ‘test file’. RIT  is willing to add the missing copyright notice to these files;

and RIT asked Santhosh to consider:

  1. Preserve the copyright of the original authors of the ‘lookup rules’ and Naming convention (notation for Glyphs) in all these fonts. The copyright and license statement should read:

“Copyright: Digitized data copyright (c) 2004–2005 Rachana Akshara Vedi (Chitrajakumar R, Hussain KH, Gangadharan N, Vijayakumaran Nair, Subash Kuraiakose), (c) 2006–2016 Hussain KH, Suresh P, Santhosh Thottingal, Rajeesh K Nambiar, Swathanthra Malayalam Computing (http://smc.org.in). This file is licensed under OFL  1.1.”

  1. The Fontforge based ‘build script’ added by Santhosh used to generate TTF/OTF/WOFF/WOFF2 files is adapted from that of Amiri font by Khaled Hosny [7] without preserving copyright or attribution. RIT requests to credit the original author[s] of this tool. It is of our opinion that removing copyright statements from a free software program code is illegal and immoral. It is also hypocritical when a person who asserts one’s own credit does this crime to other well-known and respected free software developer[s].
  2. Test cases in the ‘test file’ are contributed by various contributors, RIT  request to add the attribution of such contributors to the extent possible (Kavya Manohar, Santhosh Thottingal, Rajeesh KV). Santhosh has responded to this request as “test cases were mainly prepared by Kavya and no need to have attribution”, but RIT  firmly believes the copyright statements of the contributors must be added.
  3. The original author of ‘mlym.sty’ file [8] to typeset Unicode Malayalam using XeTeX is Suresh P, which was enhanced by Rajeesh KV with inputs from Hussain KH. Due to frequent requests on how to typeset Malayalam using Unicode, in 2013 Rajeesh wrote a wiki page [9] with basic details, which was later extended by other developers with instructions to install and setup XeTeX packages. This wiki article was later extended by Santhosh by adding matter from Wikipedia. This article was then copied and published in Santhosh’s blog [10] without attributing the authors, and [10] is frequently provided by Santhosh as the first response to general public asking for documentation on how to typeset Malayalam using XeTeX. It is shockingly hypocritical that plagiarism is practised by a well known free software developer who asserts one’s own credit without any respect to others copyright or credit. RIT  would like Santhosh to either: (a) redact [10] and redirect to [9] instead, or (b) credit the original authors in [10].

RIT  stopped the analysis and investigation of Santhosh’s claim at this point, as we have identified the root cause of missing copyrights and these are the important topics directly affecting RIT  developers.

Conclusion

RIT  tried to resolve the issue in private discussion with Santhosh Thottingal but unfortunately it did not succeed. Santhosh has not agreed to reinstate the copyright statement of original authors. Santhosh did not respond to many of the pointed questions we raised and deflected on answering others. Santhosh also refused to clarify what he means by ‘credit’ despite repeated pointed questions. Santhosh withdrew his claim for credit in one of the emails; and it is possible that he could change the mind any time and the issue could resurface. This surrounds the fonts by SMC  and RIT  in Fear, Uncertainty and Doubt (which the corporate proprietary companies successfully used against free software for years) and put all the individual users and organizations and developers using these fonts under legal risk and moral ambiguity.

Thus,

  1. RIT  has added proper copyright statements to all the software used in building its fonts, viz. ‘Sundar’ and ‘ TN Joy’ [11,12].
  2. RIT  believes that our primary responsibility is towards the individual and institutional users of our fonts and developers depending on our tools; and they should be able to use our fonts and tools without any legal risk or moral ambiguity. RIT, to the best of its knowledge, has fulfilled that responsibility and strive to do so.
  3. RIT also understands that as with any issue in the free software world, the community would be divided, and it is a painful thing. RIT request the community to carefully consider all the facts before making a choice.

This will be the final public statement of RIT on the copyright issue raised by Santhosh Thottingal.

Signed

  • KH Hussain
  • CV Radhakrishnan
  • PK Ashok Kumar
  • KV Rajeesh

References

  1. Rachana font commit history, URL https://gitlab.com/smc/…
  2. Kathir font licensing issue (1), 2014, URL http://lists.smc.org.in/…
  3. Kathir font licensing issue (2), 2014, URL http://lists.smc.org.in/…
  4. ATPS  fonts licensing issue, 2015, URL https://groups.google.com/…
  5. Introducing and integrating ‘mlm2’ OpenType shaping rules, 2013, URL https://gitlab.com/smc/…
  6. Split Glyphs and OpenType shaping rules, 2015, URL https://gitlab.com/smc/…
  7. Amiri font build tool, URL https://github.com/alif-type/…
  8. XeTEX Malayalam style file for ‘Logbook of an Observer’, 2012, URL https://github.com/smc/…
  9. Typesetting Malayalam using XeTEX, SMC  Wiki page history, 2013, URL https://wiki.smc.org.in/…
  10. 2014, https://thottingal.in/blog/…
  11. Sundar font, reinstate copyright and license statements, 2019, URL https://gitlab.com/rit-fonts/…
  12. TN Joy font, reinstate copyright and license statements, 2019, URL https://gitlab.com/rit-fonts/…

Profile of the signatories

  • KH Hussain
    Library and information scientist by training and profession, font designer and developer of several fonts including, Rachana, Meera, Meera Inimai, TN Joy, RSugathan, Janayugom, Keraleeyam, Uroob, etc., free software activist, released all fonts under Open Font License. Played an important role in the migration of Janayugom dail to free software based production technologies.
  • CV Radhakrishnan
    Free software activist and TeX programmer, one of the founders of the Free Software Foundation of India and Indian TeX Users Group. Organized two annual meetings of the TeX Users Group in Trivandrum in 2002 and 2011. Wrote several packages (libraries) in LaTeX and released under free license (LPPL) at Comprehensive TeX Archive Network (CTAN).
  • PK Ashok Kumar
    Typesetter by profession and training, has four decades of extensive experience in typesetting right from the age of metal typefaces through digitized typesetting including TeX and LaTeX. Free content activist and principal tester for fonts developed by RIT, played a major role in the migration of production of Janayugom daily using free software.
  • KV Rajeesh
    Free software developer and user. Fedora project developer since 2008 and KDE  developer since 2011. Font maintainer and language computing contributor to Swathanthra Malayalam Computing since 2008. Member of Indic testing team for HarfBuzz. Google Summer of Code mentor. Contributes to various free software projects including Qt, GNOME, VLC, Odoo, Fontforge, SILE, ConTeXt, Okular, etc.

          

The Early History of Usenet, Part VI: The Public Announcement

 Cache   

Our goal was to announce Usenet at the January, 1980 Usenix meeting. In those days, Usenix met at universities; it was a small, comaparatively informal organization, and didn't require hotel meeting rooms and the like. (I don't know just when Usenix started being a formal academic-style conference; I do know that it was no later than 1984, since I was on the program committee that year for what would later be called the Annual Technical Conference.) This meeting was in Boulder; I wasn't there, but Tom Truscott and Jim Ellis were.

Apart from the announcement itself, we of course needed non-experimental code — and my prototype was not going to cut it. Although I no longer remember precisely what deficiencies were in my C version, one likely issue was the ability to configure which neighboring sites would receive which newsgroups. Stephen Daniel, also at Duke CS, wrote the code that became known as "A-news". One important change was the ability to have multiple hierarchies, rather than just the original "NET" or "NET.*". (Aside: I said in a previous note that my C version had switched to "NET.*" for distributed groups, rather than the single NET. I'm now no longer sure of when that was introduced, in my C version or in Steve Daniel's version. He certainly supported other hierarchies; I certainly did not.) It was also possible in the production version to configure which groups or hierarchies a site would receive. For sanity's sake, this configuration would have to be in a file, rather than in an array built into the code.

That latter point was not always obvious. Uucp, as distributed, used an array to list the commands remote sites were permitted to execute:

char *Cmds[] = {
   "mail",
   "rmail",
   "lpr",
   "opr",
   "fsend",
   "fget",
   NULL
   };

/* to remove restrictions from uuxqt
 * redefine CMDOK 0
 *
 * to add allowable commands, add to the list under Cmds[]
 */

To permit rnews to execute, a system administrator would have to change the source code (and most people had source code to Unix in those days) and recompile. This was, in hindsight, an obviously incorrect decision, but it arguably was justifiable in those days: what else should you be allowed to do? There were many, many fewer commands. (I should note: I no longer remember for certain what fsend, fget, or opr were. I think they were for sending and receiving files, and for printing to a Honeywell machine at the Bell Labs Murray Hill comp center. Think of the ancient GCOS field in /etc/passwd file.)

To work around this problem, we supplied a mail-to-rnews program: a sending site could email articles, rather than try to execute rnews directly. A clock-driven daemon would retrieve the email messages and pass them to rnews. And it had to be clock-driven: in those days, there was no way to have email delivered directly to a program or file. (A security feature? No, simply the simplicity that was then the guiding spirit of Unix. But yes, it certainly helped security.) The remote site configuration file in the A-news therefore needed to know a command to execute, too.

The formal announcement can be seen here. The HTML is easier on the eyes, but there are a few typos and even some missing text, so you may want to look at the scanned version linked to at the bottom. A few things stand out. First, as I noted in Part III, there was a provision for Duke to recover phone charges from sites it polled. There was clearly faculty support at Duke for the project. For that matter, faculty at UNC knew what I was doing.

A more interesting point is what we thought the wide-area use would be: "The first articles will probably concern bug fixes, trouble reports, and general cries for help." Given how focused on the system aspects we were, what we really meant was something like the eventual newsgroup comp.sys.unix-wizards. There was, then, a very strong culture of mutual assistance among programmers, not just in organizations like Usenix (which was originally, as I noted, the Unix Users' Group), but also in the IBM mainframe world. The Wikipedia article on SHARE explains this well:

A major resource of SHARE from the beginning was the SHARE library. Originally, IBM distributed what software it provided in source form and systems programmers commonly made small local additions or modifications and exchanged them with other users. The SHARE library and the process of distributed development it fostered was one of the major origins of open source software.

Another proposed use was locating interesting source code, but not flooding it to the network. Why not? Because software might be bulky, and phone calls then were expensive. The announcement estimates that nighttime phone rates were about US$.50 for three minutes; that sounds about right, though even within the US rates varied with distance. In that time, at 300 bps — 30 bytes per second — you could send at most 5400 bytes; given protocol overhead, we conservatively estimated 3000 bytes, or a kilobyte per minute. To pick an arbitrary point of comparison, the source to uucp is about 120KB; at 1KB/sec, that's two hours, or US$20. Adjusting for inflation, that's over US$60 in today's money — and most people don't want most packages. And there was another issue: Duke only had two autodialers; there simply wasn't the bandwidth to send big files to many places, and trying to do so would block all news transfers to other sites. Instead, the proposal was for someone — Duke? — to be a central respository; software could then be retrieved on demand. This was a model later adopted by UUNET; more on it in the next installment of this series.

The most interesting thing, though, is what the announcement didn't talk about: any non-technical use. We completely missed social discussions, hobby discussions, politial discussions, or anything else like that. To the extent we considered it at all, it was for local use — after all, who would want to discuss such things with someone they'd never met?

Written by Steven Bellovin, Professor of Computer Science at Columbia University


          

Penetration Tester's Open Source Toolkit, 3rd Edition

 Cache   
Penetration Tester's Open Source Toolkit, 3rd Edition

Category: Technical

Read more
          

QuiteRSS Portable 0.19.2 (rss reader) Released

 Cache   

A new version of QuiteRSS Portable has been released. QuiteRSS is a standalone RSS reader for monitoring your favorite RSS feeds. It's packaged in PortableApps.com Format so it can easily integrate with the PortableApps.com Platform. And it's open source and completely free.

Update automatically or install from the portable app store in the PortableApps.com Platform.


          

Mana Plus Portable 1.9.3.23 (Massively multiplayer online role-playing game) Released

 Cache   

logoA new version of Mana Plus Portable has been released. The Mana World is a free and open source MMORPG (Massively multiplayer online role-playing game) game with the looks of "old-fashioned" 2D RPG games packaged as a portable app, so you can game while on the go. It's packaged in PortableApps.com Format so it can easily integrate with the PortableApps.com Platform. And it's open source and completely free.

Update automatically or install from the portable app store in the PortableApps.com Platform.


          

FileZilla Portable 3.46.0 (ftp client) Released

 Cache   

A new version of FileZilla Portable has been released. FileZilla Portable is the popular FileZilla FTP client packaged as a portable app, so you can take your ftp client, server list and settings with you. It's packaged in PortableApps.com Format for easy use from any portable device and integration with the PortableApps.com Platform. And it's open source and completely free.

Update automatically or install from the portable app store in the PortableApps.com Platform.


          

SuperTux Portable 0.6.0 (jump n' run sidescroller game) Released

 Cache   

logoA new version of SuperTux Portable has been released. SuperTux is a classic 2D jump'n run sidescroller game in a style similar to the original Super Mario games. It's packaged in PortableApps.com Format so it can easily integrate with the PortableApps.com Platform. And it's open source and completely free.

Update automatically or install from the portable app store in the PortableApps.com Platform.


          

Múltiples vulnerabilidades en Squid Proxy

 Cache   
A principios del mes de noviembre Squid publicó en su boletín de seguridad múltiples vulnerabilidades entre las que se encuentra un buffer overflow que permitiría ejecutar código remoto (CVE-2019-12526). Squid es una herramienta open source que proporciona un servicio de proxy que soporta peticiones HTTP, HTTPS y FTP a equipos que necesitan acceder a Internet […]
          

How to Use Adafruit Touch LCDs With NXP LPC55S69-EVK

 Cache   
Learn how NXP LPC55S69-EVK boards can be used with Adafruit TFT LCD boards.

The NXP LPC55S69-EVK is a versatile board. In this article, we demonstrate how it can be used with Adafruit TFT LCD boards, both with resistive and capacitive touch. For the software, I’m using the open-source LittlevGL GUI.

LPC55S69-EVK with Adafruit Touch LCD

Software and Hardware Used

Installed SDK


          

What do YOU want GCentral to be?

 Cache   
I am very excited about the potential for a platform that encourages opensource collaboration on LabVIEW code. My main experience of non LabVIEW package managers is with NPM for Node.js. NPM is an organisation which provides two things - a tool which is the mechanism for managing what packages are used in a project and a registry that allows for anyone to publish their packages to. I believe that NPM supports private packages for enterprise customers but open source packages are generally hosted on github and when a package is uploaded to the NPM registry it simply pulls in the README to provide the package documentation. The github link is also provided on the NPM page so that users can easily see where the library comes from and if they want to open issues or submit fixes then they do that on github. I have not had much of a chance to look at it but it appears like GPM would/does follow similar mechanics to NPM and compared to VIPM and NIPM I am certainly most excited about the GPM model. I see GCentral as a organisation that could provide the registry for packages and ideally be the one place for opensource LabVIEW code (including NI-community page hosted code) with clear signposts as to where to find the source for issue raising and forking. One issue that many text based languages don't have is that users with older versions of labVIEW cannot even open code made with newer versions of LabVIEW, let alone run it - so maybe GCentral could provide some computing power (and licences) to automatically convert VIs to older versions - even if they didn't run, at least a user could open them.
          

Brazil

 Cache   

Authored by: 

Organization: 

Instituto de Pesquisa em Direito e Tecnologia do Recife (IP.rec)

We don’t need no observation: The use and regulation of facial recognition in Brazilian public schools

Introduction

The use of facial recognition technology in schools around the world in countries such as China and the United States has encouraged the similar use of this technology by other countries, including Brazil. However, it has also raised questions and concerns about the privacy of students. Because of this, analyses of the nature and consequences of the use of facial recognition technology in diverse scenarios are necessary.

This report presents a brief reflection on the use of facial recognition technologies in Brazilian public schools, including in the state of Pernambuco, where IP.rec is based, and considers their implications for citizens' rights to privacy, as well as the possibility of the technology being regulated by existing laws.

Background

Artificial intelligence (AI), algorithms, the “internet of things”, smart cities, facial recognition, biometrics, profiling, big data. When one tries to imagine the future of big cities, it is impossible not to think about these terms. But is the desire to make cities “smarter” jeopardising the privacy of Brazilian citizens? Does this desire turn people into mere guinea pigs for experimentation with new technologies in a laboratory of continental proportions?

The use of facial recognition technologies in Brazilian public schools has already been implemented in several cities such as Jaboatão dos Guararapes (in the state of Pernambuco), Cabo de Santo Agostinho (Pernambuco), Arapiraca (Alagoas), Cravinhos (São Paulo), Tarumã (São Paulo), Potia (São Paulo), Paranavaí (Paraná), Guaíra (Paraná), Viana (Espírito Santo), Anápolis (Goiás), Senador Canedo (Goiás) and Vila Bela da Santíssima Trindade (Mato Grosso).[1] Among the features provided by the so-called Ponto iD[2] system is the monitoring of the attendance of students at school without the need to take roll call. The system also aims to help optimise class time, as the time spent on the roll call is saved; help manage school meals, as cooks are notified of the exact number of students in class as soon as the gates close; and decrease the school drop-out rate, as guardians receive, through an app, notifications that their child is in the school. The last is noted as a primary social consequence of using the technology. To implement the system, the city of Jaboatão dos Guararapes, for example, has spent BRL 3,000 (USD 780) per month per school.

The technology provider's webpage states that the solution is designed in an integrated way, linking government departments. Because of this, a diverse range of public institutions can share information with each other. For example, according to the government of the city of Jaboatão dos Guararapes, if a student is absent for more than five days, the Guardianship Council is notified as the system also shares students’ information with that body.[3]

In 2015, the service provider also stated that the system would be connected to the Bolsa Família programme,[4] which is a direct income transfer programme aimed at families living in poverty and extreme poverty throughout the country, and intended to help them out of their vulnerable situation. In Brazil, more than 13.9 million families are served by Bolsa Família.[5] The receipt of the benefits is conditioned, among other duties of a student whose family is a beneficiary of the programme, to a minimum school attendance of 85% for children and adolescents from six to 15 years old and 75% for adolescents 16 and 17 years old.[6]

Privacy? Absent. Risks? Present

As previously observed by several scholars, digital technologies not only make behaviour easier to monitor, but also make behaviour more traceable.[7] Given this potential, a number of critical issues in relation to the application of facial recognition systems in educational contexts were identified.

According to the service provider, the system works off a platform that uses cloud computing capabilities, but it was not possible to identify any information regarding the level of security related to the storage of collected data in the company’s privacy policy available on its official website. Despite this, among the said benefits offered by the technology implemented are not only the monitoring of students’ attendance and their school performance, but the possibility of monitoring students’ personal health data.

The mayor of the city of Jaboatão dos Guararapes[8] states that in addition to facial recognition, the software also offers, through the collection of other information, the possibility of better planning the number of daily school meals. As soon as the school’s gates are closed, the cooks receive via SMS[9] the exact number of students who are in the classrooms. Meanwhile, according to the secretary of education of Jaboatão dos Guararapes, Ivaneide Dantas, at some point even the health problems of students will be identified and parents informed using the system.

However, the lack of information that is included in the company’s privacy policy,[10] or on city halls’ websites, constitutes a critical point in the relationship between students and the education system. The problem becomes all the more obvious since the solution involves sensitive data – biometric data – of minors.

The text of the Brazilian General Data Protection Law (LGPD),[11] recently approved unanimously in congress after almost 10 years of discussions and two years of proceedings, has undergone major changes due to the vetoes of former president Michel Temer at the time of its sanction and more recently by President Jair Bolsonaro. The changes to the text of the LGPD through Provisional Measure 869/2018[12] have resulted in the impairment of the effectiveness of the law as well as a series of setbacks. These setbacks have ignored issues considered already decided on in discussions that had popular participation, as well as the input of members of the executive and legislative branches. As argued in a report released by the joint committee set up to investigate the possible impacts caused by the Provisional Measure,[13] the revised act put at risk the effectiveness of the guarantees reached by the previous text.

The public sector, especially the police authorities, are using new technologies to monitor the population without the social consequences being considered or even measured. The adoption of facial recognition systems for public security purposes is already a reality in several Brazilian cities. Recently, the increase in the use of the tool in public and private spheres has led to the establishment of Civil Public Inquiry No. 08190.052289/18-94[14] by the Personal Data Protection Commission of the Public Prosecutor's Office of the Federal District and Territories (MPDFT), as well as a public hearing held on 16 April 2019.[15] The hearing sought not only to promote debates about the use of facial recognition tools by businesses and the government, but also to function as an open space for the participation of NGOs and civil society.

It is important to remember that as systems are being implemented in public schools around the country, much of the peripheral and vulnerable population is being registered in this "experiment" – that is, data is being collected on vulnerable and marginalised groups. As researchers have pointed out, biases are being increasingly incorporated into the variety of new technological tools.[16] These digital tools can act more quickly, on a larger scale, and with actions that can be hidden by a greater complexity, such as, for example, through profiling systems that use biased machine learning algorithms that police, profile and punish minorities. The struggle is still against the perpetuation of the same problem: the deprivation of civil rights of certain groups of society as a result of social inequalities and power relations in society.

It is not uncommon for technology to be used in a way in Brazil that suggests the possibility of a future Orwellian dystopia. The use of facial recognition technology during the Carnival of 2019 in the cities of Rio de Janeiro and Salvador, resulting in a number of arrests, drew the attention of Brazilians.[17] The apparent relativism of fundamental rights and the relaxation of laws that limit surveillance due to the magnitude of events,[18] and the lack of official information on the effectiveness of the new automated measures, as well as on the storage and sharing of biometric data, were just some of the various problems identified.

The need to manage large events with thousands of participants is not the only reason why surveillance technologies are used in Brazilian urban centres. As Marcelo Souza from the Federal University of Rio de Janeiro (UFRJ) explains,[19] the increase in punitive policies and the militarisation of the police are the main reasons behind the increasing use of dystopian and invasive AI devices and technologies, typical of combat zones.[20] Even after a series of changes that have taken place in Brazil since the promulgation of the 1988 Constitution, public security institutions have not been significantly modified. The culture of war against the "internal enemy", for example, remains as present as in the days of the military dictatorship.[21]

Given that the recently approved LGPD does not apply to data processing for public security purposes, it would be possible for authorities to argue that the biometric database from the facial recognition system in schools can be used to identify suspects and improve public security. This would place its use even further outside the remit of current legislation. As the LGPD states, data processing for public security purposes "shall be governed by specific legislation, which shall provide for proportionate and strictly necessary measures to serve the public interest" (Article 4, III, § 1, LGPD).[22]

However, a specific law does not exist so far. According to the Brazilian lawyer and privacy advocate Rafael Zanatta,[23] the civic battle in Brazil will be around the shared definition of "proportional measures" and "public interest”. The solution proposed by some researchers and activists for the time being is the protection offered by the constitution, such as the presumption of innocence, and the general principles of the LGPD itself, which guard against the improper use of collected data. On the other hand, it is believed that a tremendous effort will be needed to consolidate jurisprudence where these principles are applied in cases of state surveillance.

There is also a lack of easy access to public documents and information on the use of surveillance technologies. Often information related to the operation of these technologies depends on ad hoc statements made by public agents or private companies, whistleblowers or, when granted, requests for access to public information made possible by the Access to Information Law (LAI).

The discussion on the regulation of AI systems in Brazil is still very new. According to Brazilian researchers Bruno Bioni and Mariana Rielli,[24] the general debate on data protection around the globe has different degrees of maturity depending on the region and the specific issues faced. In addition, a paradigm shift has been observed through the transition from a focus on the individual's right to self-determination with regards to his or her private information to a model of risk prevention and management with respect to data-processing activities.

However, the use of AI for the collection and processing of sensitive personal data, such as the biometric data in question, makes these risks difficult to measure. In part this is because the general population does not have sufficient knowledge of the technology to recognise the extent of its impact on their personal lives.

In this way, an imbalance of power with regard to public awareness and the use of the technology has been created in Brazil.

The need for impact reports on the protection of personal data is an important requirement that has been gaining prominence in legislation, such as European legislation and the recently approved LGPD. However, Bioni and Rielli draw attention to the few requirements placed on developers of AI technologies in Brazil, as well as on the consumer who buys and implements the technology. In particular, there is no law in relation to the purchase and use of facial recognition devices for public service and public safety purposes in Brazil, unlike similar public projects elsewhere that seek an informed public debate and the inclusion of citizens' interests in decision-making processes (e.g. the ordinance on the acquisition of surveillance technology recently adopted in San Francisco, in the United States).[25]

Conclusion

A decrease in school drop-out rates: this is the main advantage of facial recognition technology in schools, according to the company that has developed the technology. But are we assigning to technology something that would be the responsibility of society and the state?

As the Brazilian educator and philosopher Paulo Freire[26] showed, many of the most common practices in the Brazilian educational system are dictated by the Brazilian elite. This includes the use of educational content that does not correspond to the reality of students from lower classes, but instead inhibits their ability to think critically of their reality, and in the end discourages them from attending school.

Easy and safe access to school is also an important consideration impacting on the student's educational performance. The Brazilian Statute of the Child and Adolescent, in chapter IV, art. 53, inc. V,[27] states that one of the rights of the child and adolescent is access to public and free schools near his or her home. However, when distance is not an impediment to school attendance, issues related to the safety of the student's route to school should also be considered. For example, in some communities in Rio de Janeiro,[28] there are frequent incidents of armed confrontation between police and drug traffickers, visible abuses of power by the authorities, stray bullets and other incidents endangering the lives of passers-by, and even street executions, all of which are daily threats to residents. In addition, the reality faced by marginalised populations in Brazil raises another important question: the need for children and adolescents from low-income families to leave school in order to work and help support the household.

The problem of the school drop-out rate in Brazil is neither a new issue nor something that can be solved only with the implementation of a new school attendance system using AI. It is necessary for society to seek more meaningful ways to mitigate the present crisis facing the educational system.

In addition to projects that raise public awareness about issues related to new technologies in Brazilian urban centres, there is also a need to strengthen legislation that governs how sensitive data is shared and used in public projects in order to maintain the quality of public services. When the fundamental rights and guarantees of citizens are understood and respected, a relationship of trust is established.

Cities in Brazil should strengthen privacy protection instruments and create legal certainty through the establishment of fundamental principles, rights and duties for the operation of an ever-changing array of technologies in society. Regulating the use of personal data in the public sphere has the power to promote the conscious, transparent and legitimate use of this information.

Action steps

The following advocacy priorities are suggested for Brazil:

  • Formulate regional policies and strategies for the use of AI in Latin America and the Caribbean.
  • Develop legally enforceable safeguards, including robust transparency and accountability measures, before any facial recognition technology is deployed.
  • Promote national campaigns and public debate over surveillance technology given the impact such technologies may have on civil rights and civil liberties.
  • Include a social, cultural and political understanding of the needs of vulnerable groups in the country's education strategies to make the learning environment more attractive for these groups.
  • Develop open source AI systems that enable wider community use, with appropriate privacy protections.

Footnotes

[1] www.pontoid.com.br/home

[2] https://www.youtube.com/watch?v=YRMihVh0cew&t=24s

[3] Folha de Pernambuco. (2017, 19 April). Tecnologia para registrar presença nas escolas de Jaboatão. Folha de Pernambuco Folha de Pernambuco. https://www.folhape.com.br/noticias/noticias/cotidiano/2017/04/19/NWS,24738,70,449,NOTICIAS,2190-TECNOLOGIA-PARA-REGISTRAR-PRESENCA-NAS-ESCOLAS-JABOATAO.aspx

[4] https://www.youtube.com/watch?v=YRMihVh0cew&t=24s

[5] https://en.wikipedia.org/wiki/Bolsa_Fam%C3%ADlia

[6] https://www.caixa.gov.br/programas-sociais/bolsa-familia/Paginas/default.aspx

[7] Lessig, L. (2006). Code: Version 2.0. New York: Basic Books. Monitoring is mostly related to observation in real time and tracking can be done afterwards based on certain information.

[8] Santos, N. (2017, 18 April). Jaboatão inicia reconhecimento facial nas escolas. LeiaJá. https://m.leiaja.com/carreiras/2017/04/18/jaboatao-inicia-reconhecimento-facial-nas-escolas

[9] https://www.youtube.com/watch?v=YRMihVh0cew&t=24s

[10] www.pontoid.com.br/politica_privacidade_education.jsp

[11] IAPP. (2018). Brazil's General Data Protection Law (English translation). https://iapp.org/resources/article/brazils-general-data-protection-law-english-translation

[12] Medida Provisória nº 869, de 27 de dezembro de 2018. www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/Mpv/mpv869.htm

[13] https://legis.senado.leg.br/sdleg-getter/documento?dm=7945369&ts=1556207205600&disposition=inline

[14] Inquérito Civil Público n.08190.052289/18-94 Reconhecimento Facial. www.mpdft.mp.br/portal/pdf/noticias/março_2019/Despacho_Audiencia_Publica_2.pdf

[15] https://www.youtube.com/watch?v=pmzvXcevJr4

[16] Eubanks, V. (2018). Automating Inequality: How High-Tech Tools Profile, Police and Punish the Poor. New York: St Martin’s Press.

[17] Távora, F., Araújo, G., & Sousa, J. (2019, 11 March). Scanner facial abre alas e ninguém mais se perde no Carnaval (e fora dele). Agência Data Labe. https://tab.uol.com.br/noticias/redacao/2019/03/11/carnaval-abre-alas-para-o-escaner-facial-reconhece-milhoes-e-prende-seis.html

[18] Graham, S. (2011). Cities Under Siege: The New Military Urbanism. New York: Verso Books.

[19] Souza, M. (2008). Fobópole. Rio de Janeiro: Bertrand Brasil

[20] Kayyali, D. (2016, 13 June). The Olympics Are Turning Rio into a Military State. Vice. https://www.vice.com/en_us/article/wnxgpw/the-olympics-are-turning-rio-into-a-military-state

[21] Machado, R. (2019, 19 February). Militarização no Brasil: a perpetuação da guerra ao inimigo interno. Entrevista especial com Maria Alice Rezende de Carvalho. Instituto Humanitas Unisinos. www.ihu.unisinos.br/159-noticias/entrevistas/586763-militarizacao-no-brasil-a-perpetuacao-da-guerra-ao-inimigo-interno-entrevista-especial-com-maria-alice-rezende-de-carvalho

[22] IAPP. (2018). Op. cit. 

[23] https://twitter.com/rafa_zanatta/status/1085583399186767875

[24] Bioni, B., & Rielli, M. (2019). Audiência Pública: uso de ferramentas de reconhecimento facial por parte de empresas e governos. Data Privacy Brasil. https://dataprivacy.com.br/wp-content/uploads/2019/04/Contribui%C3%A7%C3%A3o-AP-reconhecimento-facial-final.pdf

[25] Johnson, K. (2019, 14 May). San Francisco supervisors vote to ban facial recognition software. VentureBeat. https://venturebeat.com/2019/05/14/san-francisco-first-in-nation-to-ban-facial-recognition-software

[26] Freire, P. (1976). Education: The Practice of Freedom. London: Writers and Readers Publishing Cooperative.

[27] www.planalto.gov.br/ccivil_03/leis/l8069.htm 

[28] Brito, R. (2017, 2 October). Rio’s kids are dying in the crossfire of a wave of violence. AP News. https://www.apnews.com/efeeaed43c7b47a0ae4a6cfaa8b871e2

Notes:
This report was originally published as part of a larger compilation: “Global Information Society Watch 2019: Artificial intelligence: Human rights, social justice and development"
Creative Commons Attribution 4.0 International (CC BY 4.0) - Some rights reserved.
ISBN 978-92-95113-12-1
APC Serial: APC-201910-CIPP-R-EN-P-301
978-92-95113-13-8
ISBN APC Serial: APC-201910-CIPP-R-EN-DIGITAL-302

Country: 

Themes: 


          

Big data, big deal: what a career in data science really takes | Monash University - The New Daily

 Cache   
When we talk about big data we picture the giant tech companies: Facebook, Amazon, Google by Monash University.

Photo: Screenshot from Monash University's Video
But skills in statistics, business analytics and data science are increasingly sought-after across a range of organisations and industries you may not have thought of, such as retail, healthcare, the environmental sector and not-for-profits...

Professor Rob J. Hyndman, an internationally known statistician at Monash Business School, uses the power of large data sets to address forecast demand for electricity and estimate expenditure on Australia’s Pharmaceutical Benefits Scheme, among other research topics...

Professor Dianne Cook, one of the world’s top statisticians and the third woman globally to be elected to the R Foundation, a body which supports the open source programming language ‘R’, is Course Director and one of the lead course developers

“The Master of Business Analytics is developed to train the next generation of data scientists. There are a lot of new and exciting job prospects in this field,” says Professor Cook...

Ready to transform the world of business through data?

Find out more about Monash Business School’s Master of Business Analytics.
Read more...

Source: The New Daily

          

Migrating an open source PaaS solution to Azure

 Cache   

Modern Muse, a UK-based charity designed to inspire and engage the next generation of female business leaders, needed to create a modern platform that could scale and grow with the organization. Modern Muse migrated to Azure from an AWS platform. It wasn't easy, but they were able to realize real benefits like standardized monitoring and management of their infrastructure.

At ONIT Technology Solutions, we pride ourselves in knowing the latest tools and techniques when modernizing IT infrastructure. If you're looking for a solution that can help you scale and grow your company, we'd love to help. Contact us to learn more.

The post Migrating an open source PaaS solution to Azure appeared first on ONIT Technology Solutions.


          

Amplify CLI announces new GraphQL transform feature for orchestrating multiple AI/ML use cases

 Cache   

The Amplify Framework is an open source project for building cloud-enabled mobile and web applications. The Amplify CLI (part of the Amplify Framework) is a toolchain to create, integrate, and manage the AWS cloud services for your application.  


          

AWS Toolkit for Visual Studio Code Adds New CDK Explorer in Preview

 Cache   

The CDK Explorer, a new preview feature in the AWS Toolkit for Visual Studio Code, allows developers to visualize CDK applications. AWS CDK, launched GA in July this year, is an open source software development framework to model and provision your cloud application resources using familiar programming languages. CDK apps are composed of building blocks known as Constructs, which include definitions for your cloud stacks and resources within. Check out the CDK developer guide or the CDK Workshop to learn more about the CDK.  


          

Donald Raab: Learn to Kata and Kata to Learn

 Cache   

Every Java developer needs to learn new skills and keep their existing skills sharp. The Java ecosystem is enormous and continues to evolve. With so much to learn, the prospect of keeping up may seem daunting. We can help each other keep up in this rapidly changing space if we work together as a community, sharing knowledge and practice. Taking, creating, and sharing code katas is one of the ways we can do this.

A code kata is a hands-on programming exercise that helps you hone specific skills through practice. Some code katas will provide you structure to validate a skill has been acquired by getting unit tests to pass. Code katas are a great way for developers to share practice exercises with their future selves and other developers to learn from.

How to create your first code kata:

  1. Select a topic you want to learn.
  2. Write a passing unit test that demonstrates some piece of knowledge.
  3. Refactor the code repeatedly until you are satisfied with a final solution. Make sure the test passes after each refactoring.
  4. Delete the solution in the exercise and leave a failing test.
  5. Commit the failing test with supporting code and build artifacts to a VCS.
  6. Open source the code to share with others.

Now I will follow the first four steps to create a small kata.

Step 1

Topic: Learn how to join strings in a List.

Step 2

Write a passing JUnit test that shows how to join strings in a List.

@Test
public void joinStrings()
{
List<String> names = Arrays.asList("Sally", "Ted", "Mary");
StringBuilder builder = new StringBuilder();
for (int i = 0; i < names.size(); i++)
{
if (i > 0)
{
builder.append(", ");
}
builder.append(names.get(i));
}
String joined = builder.toString();
Assert.assertEquals("Sally, Ted, Mary", joined);
}

Step 3

Refactor the code to use StringJoiner in Java 8. Re-run the test.

StringJoiner joiner = new StringJoiner(", ");
for (String name : names)
{
joiner.add(name);
}
String joined = joiner.toString();

Refactor the code to use Java 8 Streams. Re-run the test.

String joined = names.stream().collect(Collectors.joining(", "));

Refactor the code to use String.join. Re-run the test.

String joined = String.join(", ", names);

Step 4

Delete the solution and leave a failing test with a comment.

@Test
public void joinStrings()
{
List<String> names = Arrays.asList("Sally", "Ted", "Mary");
// Join the names and separate them by ", "
String joined = null;
Assert.assertEquals("Sally, Ted, Mary", joined);
}

Pay it forward — I will leave steps 5 and 6 as an exercise for the reader.

This example should be simple enough to illustrate how to create your own katas of varying complexity, leveraging unit tests to provide the structure necessary to build confidence and understanding.

Value your own learning and knowledge. When you learn something useful, write it down. Saving practice exercises to recall how things work can be quite helpful. Capture your knowledge and exploration in code katas. Katas you have used to sharpen your own skills may also be valuable to others.

We all have things to learn and that we can teach. When we share what we learn with others, we improve the whole Java community. This is vitally important to helping ourselves and our fellow Java developers collectively improve our coding skills.


Learn to Kata and Kata to Learn was originally published in 97 Things on Medium, where people are continuing the conversation by highlighting and responding to this story.


          

Wayne Beaton: Eclipse Committer and Contributor Paperwork

 Cache   

The Eclipse Foundation has several agreements that we use to ensure that contributors understand the terms by which they make their contributions and, especially, to give them an opportunity to assert that they have the necessary rights to make those contributions under the terms of the corresponding project license.

The Eclipse Contributor Agreement (ECA) must be signed by anybody who wants to contribute to an Eclipse open source software or specification project. When a contributor has signed the ECA, a committer will be able to merge a contributor’s pull requests. Another way of looking at it is that a committer cannot merge a pull request when the contributor has not signed the ECA.

The Eclipse Individual Committer Agreement (ICA) is signed by folks who do not work for an Eclipse Foundation member company when they become a committer. For those developers who do work for an Eclipse Foundation member company, the company representative can complete an Eclipse Member Committer and Contributor Agreement (MCCA) which covers all of that member company’s employees.

Acquiring committer status starts with an election started by an Eclipse project team. Upon successful completion of that election, the nominee is prompted to provide the necessary paperwork. Completing that paperwork is the last step in the process, granting a developer the ability to commit (i.e., push their own content or merge pull requests from others). When a new committer signs the ICA (or their employer signs the MCCA) they also sign the ECA, and so gains the ability to contribute (but not directly push or merge) to any other Eclipse open source software or specification project.

When a developer is elected as a committer to another Eclipse project, they will not have to complete any additional paperwork. Committer status is specific to a particular Eclipse project; paperwork is not project specific.

Note that contributors retain ownership of their contributions; the ECA, for example, states in part (highlighting is mine):

This ECA, and the license(s) associated with the particular Eclipse Foundation projects You are contributing to, provides a license to Your Contributions to the Eclipse Foundation and downstream consumers, but You still own Your Contributions, and except for the licenses provided for in this ECA, You reserve all right, title and interest in Your Contributions. 

That is, the contributor owns their contributions, but grants a license to the Eclipse Foundation and downstream consumers to use them under the terms of the project license.


          

#66 Especial Pinebook

 Cache   

Muy buenas amante de GNU/Linux y el Software Libre. Bienvenido a un nuevo episodio, el número 66, de Podcast Linux. Un saludo muy fuerte y cariñoso de quien te habla, Juan Febles. Hoy te dejo un especial sobre Pinebook, el netbook ARM de bajo coste y Open Source de Pine64. Sorteo: Gana unas pegatinas Pinebook Leer más#66 Especial Pinebook[…]

La entrada #66 Especial Pinebook aparece primero en AVpodcast.


          

Kuma 0.3 Released with Traffic Routing!

 Cache   

Today, we’re thrilled to release Kuma 0.3, our open source control plane with brand new traffic routing capabilities. Kuma’s new L4 traffic routing rules allow you to easily implement blue/green…

The post Kuma 0.3 Released with Traffic Routing! appeared first on KongHQ.


          

7 maker gifts for kids and teens

 Cache   
Struggling with what gifts to give the young person in your life this holiday season? Here are my top picks for open source presents that will spark creativity and inspire for years to come.
          

Holiday gift guide: Books for the learner, explorer, or tinkerer on your list

 Cache   
It is my pleasure to introduce Opensource.com[he]#039[/he]s selection of books that would make excellent holiday gift ideas. We hope you find them interesting items to give as gifts this holiday season or to add to your own holiday wishlist. Each book exhibits qualities that make them excellent gifts for open source enthusiasts, as they all encourage learning, exploring, and tinkering.
          

Syria: Civilians Abused in ‘Safe Zones’

 Cache   

Fighters of the Turkish-backed Free Syrian Army (also called the Syrian National Army) enter the town of Tal Abyad.

© 2019 AP Images
 
(Beirut, November 27, 2019) – Factions of the Syrian National Army (SNA), a Syrian non-state armed group backed by Turkey in northeast Syria, have summarily executed civilians and failed to account for aid workers who disappeared while working in the ‘safe zone,’ Human Rights Watch said today. The armed group has also apparently refused to allow the return of Kurdish families displaced by Turkish military operations and looted and unlawfully appropriated or occupied their property.

Turkey should investigate human rights abuses, in many cases potential war crimes, in territory over which they currently exercise effective control, press SNA forces to end these abuses, and ensure that those responsible are held to account. Local commanders of the group should also investigate and hold individuals responsible for the abuses accountable.

“Executing individuals, pillaging property, and blocking displaced people from returning to their homes is damning evidence of why Turkey’s proposed ‘safe zones’ will not be safe,” said Sarah Leah Whitson, Middle East director at Human Rights Watch. “Contrary to Turkey’s narrative that their operation will establish a safe zone, the groups they are using to administer the territory are themselves committing abuses against civilians and discriminating on ethnic grounds.”

On October 9, 2019, Turkish Armed Forces and the armed group invaded territory in northeast Syria that since 2012 had been under the control of the Syrian Democratic Forces, made up primarily of the Kurdish-led People’s Protection Units (YPG). Since the incursion began, Turkey and the factions it supports have indiscriminately shelled civilian areas, carried out at least seven summary killings, unlawfully occupied private civilian homes and shops and looted the owners’ property, and have not accounted for aid workers who may have been forcibly disappeared while working in their zones.

Human Rights Watch interviewed 10 individuals, including 2 doctors and 3 relatives of victims, to document these abuses. Human Rights Watch also reviewed footage and images provided by activists and relatives that corroborate these abuses. On October 11, videos and images, including some posted by the SNA itself, have emerged on social media showing its members shooting at a person who was lying down without moving and appeared to pose no threat and standing atop the dead body of another person in a degrading manner. Human Rights Watch also documented the execution of a Kurdish political activist, Hevrin Khalaf, and researched what happened to three Kurdish Red Crescent aid workers who disappeared in SNA-controlled territory, including the apparent unlawful killing of at least one of them. Human Rights Watch interviewed three relatives and colleagues who verified the victims’ identities and the circumstances of their deaths.

Human Rights Watch also interviewed five Kurdish civilians between November 6 and 11 who said that the armed group’s forces were occupying their homes and other property and had arbitrarily prevented them or their relatives from returning. A Reuters journalist of Kurdish origin posted pictures of his house on October 30, claiming that the group had occupied it. In another case the group’s forces killed three Kurdish men who had been trying to return to the city of Ras al-Ayn, witnesses and relatives said, and prevented another Kurdish man from returning while allowing Arab residents to return.

Both international humanitarian law and human rights law prohibit unlawful killings and any arbitrary deprivation of life, which includes targeting civilians. International humanitarian law also strictly prohibits, and deems a war crime, the deliberate killing of injured, surrendered, or captured combatants (people deemed hors de combat) and enforced disappearances.

Under the laws of war, pillaging or forcibly taking private property for personal use is prohibited and can also constitute a war crime. Combatants are not allowed to seize property for personal use, which is a war crime, and the laws of war also prohibit destruction of property not justified by military necessity. International norms require protecting the property of displaced people against destruction and arbitrary and illegal appropriation, occupation, or use.

International law further stipulates that civilians who were forcibly displaced during a conflict should be allowed to return home as soon as possible without conditions. If forces have security concerns, then they should conduct individual assessments of residents, impose temporary, limited restrictions if justified, and not seek to impose blanket or indefinite bans to prevent them from returning. Occupiers are prohibited from moving segments of the population out of their homes for non-security reasons and seeking to replace them with populations from other territory.

All parties to a conflict are obliged to investigate alleged war crimes by their members and ensure that those responsible are appropriately punished. Commanders who knew or should have known about crimes committed by their subordinates but took no action to prevent or prosecute them can be held criminally liable as a matter of command responsibility.

The de facto authorities in the areas where Human Rights Watch has documented these abuses should ensure that those responsible are held to account, that it is safe for people to return if they wish, and that no one is refused the right to return on the basis of their ethnicity or identity, Human Rights Watch said. The Turkish government should also end its military assistance to SNA factions responsible for these abuses.

“Turkey is turning a blind eye to the reprehensible behaviour displayed by the factions it arms,” Whitson said. “So long as Turkey is in control of these areas, it has a responsibility to investigate and end these violations.”

Since the incursion into northern Syria started, Turkish Armed Forces and the SNA have taken control of the area between Tal Abyad (Gire Spi) and Ras al-Ayn (Serekaniye) and part of the international highway (the M4) running between southeast Turkey and northeast Syria. Despite an October 22 ceasefire and safe zone agreement between Russia and Turkey, clashes between the Syrian Democratic Forces – the Kurdish-led forces once backed by the United States-led coalition against the Islamic State (also known as ISIS) – and the SNA continue.

According to the United Nations, the incursion initially displaced at least 200,000 people, and about 100,000 are now returning. Almost half have returned to areas controlled by the Turkish-backed factions and the Turkish Armed Forces in Tal Abyad, Ein Issa, and Suluk.

Summary Killings and Enforced Disappearances

According to the Syrian Observatory for Human Rights, Syrian non-state armed groups executed nine civilians, including the Kurdish-Syrian politician Hevrin Khalaf, on October 12. Videos of Khalaf’s execution surfaced online on October 13. The videos Human Rights Watch reviewed show armed men standing over the body of a woman, which relatives and activists confirmed was Khalaf.

In another video, armed men who identify themselves as members of the SNA are seen shooting automatic weapons at a figure lying unmoving on the side of a road. Bellingcat, an open source investigative site, identified Ahrar al-Sharqiyeh forces, a faction of the SNA, as having been at both the Khalaf execution and the killing that appears in the second video. Ahrar al-Sharqiyeh denied its involvement in the killings.

In another case, a relative and two colleagues of the three Kurdish Red Crescent volunteers said an SNA faction that they could not identify advised them that they had detained the volunteers on October 11. A doctor who worked at the hospital with which they were associated told Human Rights Watch that he lost contact with the volunteer team – an ambulance driver and two nurses – who had gone to Suluk in response to an attack on October 11.

The driver’s uncle said that the driver’s brother had sent a text to the driver’s phone on October 14 and a person who identified himself as part of the SNA responded by text saying that the driver was dead and shared a photograph of the body. Both the relative and his colleague verified that the image was of the ambulance driver.

In photos on his Facebook account, the driver is dressed in a military uniform and a YPG flag is draped over his body in the pictures provided by his relatives. His relatives did not receive the body. Human Rights Watch could not determine whether the man was a volunteer with the Kurdish Red Crescent and simultaneously a member of the Kurdish armed group, or whether the Facebook photos were from an earlier period. Even if he was or had also been a member of the armed group, there is no indication that on October 11 he was engaged in anything other than humanitarian activities, Human Rights Watch said.

The circumstances of the two female nurses in the ambulance remain unknown, but their last known whereabouts was in SNA territory and people believed to be from an SNA faction informed the Kurdish Red Crescent aid group that SNA factions had detained them. The Kurdish Red Crescent has publicly called on all parties to the conflict to allow them access to injured people.

Property Confiscation, Looting, and Blocking Return of Kurdish Residents

Human Rights Watch interviewed two people who said that forces they identified as the SNA had occupied their property and looted their possessions. Three people said that they or their Kurdish relatives had attempted to return to their homes in areas under Turkish control but that the armed factions had blocked them. SNA forces also killed three men who were trying to return to their homes in Ras al-Ayn.

A doctor whose home is in Tanhuza, a village eight kilometers from Tal Abyad, said that his family had left their village on October 9 due to shelling and airstrikes and are now scattered across northeast Syria. He said that his Arab neighbor told him that members of the Ahrar al-Sharqiya faction were occupying his family’s five houses. A photo that SNA members posted on November 1 showing them praying in front of one of the houses served as confirmation. He shared with Human Rights Watch pictures of the house before and after to verify that it was his family’s.

In another case, a Kurdish-Syrian man said that his family fled to the city of Raqqa after a Turkish airstrike killed his parents and wounded his brother on October 9 in his village of Kayuta, nine kilometers from Tal Abyad. He said he also learned from neighbors that his home has been unlawfully occupied. He said that on about October 11, his Arab neighbors who had returned to Kayuta told him that a local Arab family had occupied his house, followed by members of Ahrar al-Shaqiyeh.

He said his uncles communicated with Ahrar al-Sharqiyeh about the house, and that the armed group shared pictures of them occupying the house. One of his uncles attempted to return to the village at least five times but the SNA faction turned him away at the entrance and told him it was a military area. However, he saw that his Arab neighbors who had told him his house was occupied were allowed in the village.

Three other Kurdish residents of Tal Abyad displaced by the hostilities on October 9 confirmed that their property also was illegally occupied. They said that their Arab neighbors had contacted them and told them that their houses had been looted, and that SNA fighters had installed themselves or displaced Arab families in their houses between October 14 and 18. One displaced Kurdish Syrian man who owns a shop in Tal Abyad said that on October 18, he saw photographs of his shop marked “seized for the benefit of Ahrar al-Shariqyeh” and that an Arab neighbor whom the fighters had offered some of the man’s wares told him that Ahrar al-Shariqyeh had looted everything and tried to sell it.

Activists and relatives in northeast Syria and Europe shared with Human Rights Watch images of the bodies of the three people they said SNA factions had killed when they tried to return to Ras al-Ayn. They identified them as Sheyar Mahmoud Othman, Rezan Khalil Julou, and Mustafa Hisso. The images were later circulated on social media.

Human Rights Watch spoke with Hisso’s uncle, who was with his nephew when the SNA killed him. The uncle said that he and three of his companions had been returning to Ras al-Ayn on October 17 to check on their property. His nephew owned a large cafeteria and was concerned that it would be looted. Hisso’s cousin, whom Human Rights Watch interviewed, said that about 200 meters from an arch near the Ras al-Ayn entrance an armed group that the family believed was a faction of the SNA began firing at Hisso’s van. The uncle threw himself out of the car and ran but his nephew and his two companions in the car were killed.


          

LHS Episode #312: The Weekender XXXVII

 Cache   

It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. [...]


          

Panes, Tab Reordering Added to Windows Terminal App

 Cache   

windows terminal appWindows Terminal panes and tab reordering are two new features the open source command line tool picks up in its latest release, Windows Terminal 0.7.

This post, Panes, Tab Reordering Added to Windows Terminal App, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.


          

What’s new in Material Design for the web (Chrome Dev Summit 2019)

 Cache   


This talk goes over what's new in Material Design on the Web, including:
- Material theming for custom UI styles
- Dark mode considerations
- Data tables
- Density
- Material.io components page
- Open source implementations program for developers of Material adjacent libraries

Presented by: Una Kravets

#ChromeDevSummit All Sessions → https://goo.gle/CDS19

Subscribe to the Chrome Developers channel → https://goo.gle/ChromeDevs

Event photos →  https://goo.gle/CDS19Photos
          

Objeveno 37 zranitelností ve čtyřech open source implementacích VNC

 Cache   
Experti z firmy Kaspersky objevili 37 zranitelností ve čtyřech open source implementacích VNC: LibVNC, UltraVNC, TightVNC a TurboVNC. Z toho nejvíce zranitelností (22) bylo nalezeno v UltraVNC. Zranitelnosti jsou většinou spojeny se špatným...
          

Hybris Senior Developer - Accenture - Montréal, QC

 Cache   
Tomcat, WebSphere, Weblogic, Apache Http, Spring tcServer, Solr, open source packages. Experience working with relevant WCM or eCommerce packaged solutions such…
From Accenture - Wed, 16 Oct 2019 01:11:29 GMT - View all Montréal, QC jobs
          

Open Hardware: Arduino and RISC-V

 Cache   
  • OpenGradeSIM is an open source incline simulator for indoor bike trainers

    Although he would probably rather be outdoors, after an injury Matt Ockendon had a lot more time to ride his Tacx Neo indoor trainer and tinker. He decided he wanted his rig to be able to simulate the grade of hills, but as commercially available units with this capability are quite expensive, he instead devised his own solution dubbed “OpenGradeSIM.”

    [...]

    With this data in hand, the Nano controls a linear actuator using an L298N-based driver board to raise or lower the bike’s front end. The derived bike angle is sensed via the Nano’s built-in IMU, providing an elegant closed-loop system. Additionally, the incline is shown on a 1.3″ I2C OLED display that serves as a mini dashboard while Ockendon cycles.

  • [Reposted] U.S.-Based Chip-Tech Group Moving to Switzerland Over Trade Curb Fears
  • RISC-V moves to neutral Switzerland over trade disruption

    The nonprofit RISC-V Foundation is relocating to Switzerland over concerns about the impact of U.S. trade policies.

    Foundation CEO Calista Redmond told Reuters that its members are “concerned about possible geopolitical disruption.” The foundation’s board approved the move unanimously after hearing members around the globe say that they would be “a lot more comfortable… if the incorporation were not in the U.S.,” she added.

    RISC-V is a young organization, founded in 2015 and located in Delaware, to set standards for chip architectures that are allowed to use the RISC-V trademark on its products. RISC-V is a reduced instruction set architecture that is open source technology that anyone can use to design, make or sell RISC-V chips and software for electronics.


          

Debian Developer on Raspbian and Red Hat on Raspberry Pi in the Classroom

 Cache   
  • Cleanup Raspbian

    This is part of a series of post on the design and technical steps of creating Himblick, a digital signage box based on the Raspberry Pi 4.

    Rapsbian is designed to be an interactive system, but we want to build a noninteractive black box out of it, which should never ever get a keyboard plug into it. See the "Museum ceiling" use case.

    Ideally we should use a plain Debian as a base, but the Raspberry Pi model 4 is not supported yet for that.

    Instead, we start from Raspbian Lite, and remove the bits that get in the way.

  • Open Source Stories: Early Adopters: Raspberry Pi in the Classroom

    Google “Raspberry Pi projects,” and you’ll get a diverse set of results: Home automation systems, weather data stations, time-lapse cameras, retro video game systems, a staircase that plays music as you climb.

    The accessibility and versatility that make the Pi a must-have for hackers and makers also render it indispensable for educators seeking to bring science and technology to life.

    Launched in 2012 by the United Kingdom-based Raspberry Pi Foundation, the Pi is a single-board computer that retails for about US$35. It was designed to make computer science more accessible to students, according to Matt Richardson, Executive Director, Raspberry Pi Foundation North America.


          

Devices: Raspberry Pi Stuff and OpenHW Group/RISC-V Foundation

 Cache   
  • Raspberry Pi Zero based open source checkra1n jailbreak dongle with screen is in works

    Do you have an iPhone? Did you migrate from Android? In case you did, you can probably reminisce the first few weeks. It might have been difficult for you to get along with the whole ecosystem with limited customisation options.

    Setting the price aside, the main advantage of having an Android device is numerous options to change the default features. In order to gain an elated level of privilege, you can even go through a few steps to root the phone.

  • How to run Chromium OS on a Raspberry Pi

    Chromium OS does not have an official build for the Raspberry Pi, even though it’s an ARM device. The reason? The project only focuses on Chromebooks and other Chrome devices. However, don’t worry! There’s an unofficial build of the operating system that can run on the Pi.

    As of now, the unofficial Chromium OS build for the Pi is in “test” mode, and it only supports Pi 3/Pi 3B+, and Pi 4. Since it is in “test” mode, some features of the OS are yet to be implemented, bugs are present, and things can crash at random times. Still, if you have a spare Raspberry Pi 3/3B+ or Pi 4 and need a full-featured operating system, Chromium OS is one of the best.

    In this guide, we’ll show you how to get the latest build of Chromium OS for the Pi, and set it up to run as a functioning operating system.

  • Raspberry Pi as a digital signage box

    Goal: set up a Raspberry Pi 4B as a digital signage box, together with Ulrike.

    We called the project Himblick, from Himbeere (raspberry) and Blick (view / gaze).

    From the point of view of the underlying debian/raspbian setup, the idea is to make it as solid and reproducible as possible, so that if we're ever asked to set up and maintain 100 of 1000 of them, it will be ok.

    A box should be created with a script, not by hand, and should require as little maintenance as possible.

  • UltraSoC joins the OpenHW Group and extends its commitment to an open-source future for technology development

    UltraSoC today announced it has joined the OpenHW Group, the global not-for-profit organization established earlier this year to further the adoption of open source processors, particularly for high volume production systems-on-chip (SoCs). As part of its involvement, UltraSoC will contribute its substantial experience and IP in the area of system-level debug and processor trace. UltraSoC is committed to supporting its customers using all open-source and proprietary technologies and is seeing an increasing number of designs supporting mixed (heterogeneous) processor hardware.

    The OpenHW Group has already announced a range of cores, dubbed CORE-V, based on the RISC-V open ISA. Both UltraSoC and the OpenHW Group are active members of the RISC-V Foundation, and development in this area will be a key part of UltraSoC’s initial contribution to the group.


          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

Tvorba open source softwaru Karl Fogel - 7

 Cache   
Tvorba open source softwaru Karl Fogel Karl Fogel je velice aktivní vývojář a advokát svobodného softwaru. Pravděpodobně nejznámější je jeho role ve vývoji populárního systému pro správu verzí Subversion, jehož byl po řadu let hlavním vývojářem. ...
          

Almond, un nouvel assistant personnel open source

 Cache   
Bien que les assistants virtuels simplifient certaines actions du quotidien, on leur remet souvent un bonnet d'âne quand il s'agit de respect de la vie privée. Que ce soit Amazon, Google ou même Apple, les géants de la tech ont tous été épinglés pour des pratiques douteuses d'enregistrements de conversations depuis leurs assistants vocaux respectifs. Une problématique sur laquelle des chercheurs et étudiants de l'Université de Stanford ont planché jusqu'à mettre au point un assistant qui ne dépend d'aucun grand groupe. Appelé Almond, l'assistant, qui est accessible sur le web et Android, est open source et gratuit. Sous le capot d'Almond, il y a LUInet, un composant qui permet de comprendre le langage naturel. Ce composant exploite un réseau neuronal, alimenté par des jeux de données provenant des utilisateurs et de programmes spéciaux, pour améliorer sa compréhension. Les requêtes en langage naturel sont traduites dans le langage de programmation ThingTalk. Almond... Lire la suite sur MacGeneration
          

Cheali Chargers – nabíjačky s Open Source – 3. časť

 Cache   
Cheali nabíjačky – Sériový port

--------------------------------------

autor: István Magi

preklad: Imrich Kišš

pripravil: Janko O.

          

Cheali Chargers – nabíjačky s Open Source – 2. časť

 Cache   
Cheali nabíjačky – Preprogramovanie

----------------------------------------------

autor: István Magi

preklad: Imrich Kišš

pripravil: Janko O.

          

The Masakhane project wants machine translation and AI to transform Africa

 Cache   
Masakhane is an open source project being undertaken by young African technologists to translate African languages using neural machine translation.
          

Karyuna Institute of Technology and Sciences leading SUSE Education in India

 Cache   

Karunya Institute of Technology and Sciences (KITS), Deemed to be University, Coimbatore, India, and the SUSE Academic Program are signing a memorandum of Agreement (MoA) to promote Linux and Open Source education across India. How did we get here: BL Radhakrishnan, Coordinator Industry-Academia collaborations-CSE and Assistant Professor, Computer Science and Engineering Department at Karunya Institute […]

The post Karyuna Institute of Technology and Sciences leading SUSE Education in India appeared first on SUSE Communities.


          

Cephalocon Gangnam Style

 Cache   

The most eagerly awaited event in the open source software-defined storage calendar is without a doubt Cephalocon. In 2019, the Ceph community came to Barcelona, but it was recently announced that in March 2020, Cephalocon is coming to Seoul, South Korea! All about Seoul Seoul is the capital and largest metropolis of South Korea, and […]

The post Cephalocon Gangnam Style appeared first on SUSE Communities.


          

SUSE welcomes cooperation of Open Invention Network, Linux Foundation, IBM and Microsoft in co-funding Unified Patent’s new Open Source Zone

 Cache   

Co-Author: Ciaran Farrell, IP & Privacy Counsel, Board Member of Open Invention Network Co-Author: Alan Clark SUSE CTO Office, Board Member of Linux Foundation   An eternal truth is that everything has its opposite for good and evil.  Patents are no exception. In fact, even the simple word ‘Patent’ evokes much positive and negative emotion […]

The post SUSE welcomes cooperation of Open Invention Network, Linux Foundation, IBM and Microsoft in co-funding Unified Patent’s new Open Source Zone appeared first on SUSE Communities.


          

Graphisme Constant_V : D-E-A-L

 Cache   

Chaque année, Constant fait appel à un nouveau designer ou collectif de design utilisant les outils Free, Libre et Open Source, pour travailler sur les flyers bimestriels de Constant_V.
Entre 2018 et 2019, nous avons collaboré avec D-E-A-L, un collectif bruxellois composé de Quentin Jumelin et Morgane Le Ferec. Dans leurs conceptions, iels ont expérimenté différentes façons de parcourir plusieurs flyers rassemblés sur une seule feuille imprimée, ce qui a donné lieu à quatre variations subtilement (...)

- Constant_V
          

2019 Sees More Geeky Advent Calendars

 Cache   
It's the first day of December, which means the return of an annual geek tradition: the computer programming advent calendars! An anonymous reader delivers this update: It's the very first year for the Raku Advent Calendar (using the language formerly known as Perl 6). Meanwhile, Perl 5 still has its own separate advent calendar. Amsterdam-based Perl programmer Andrew Shitov is also writing a special "Language a Day" advent calendar in which he'll cover the basics of an entirely different programming language each day. And the Go language site Gopher Academy has also launched their 7th annual advent calendar. The 24 Ways site is also promising "an advent calendar for web geeks," offering "a daily dose of web design and development goodness to bring you all a little Christmas cheer." And each day until Christmas the Advent of Code site will offer "small programming puzzles for a variety of skill sets and skill levels that can be solved in any programming language you like. People use them as a speed contest, interview prep, company training, university coursework, practice problems, or to challenge each other." (Their Day One puzzle explains this year's premise. "Santa has become stranded at the edge of the Solar System while delivering presents to other planets....!") There's also one particularly ambitious advent calendar from closer to the north pole. The Norwegian design/technology/strategy consulting firm Bekk is attempting 12 different geeky Christmas calendars, each running for 24 days (for a total of 288 articles). And each one is hosted at a .christmas top-level domain CSS Christmas Functional Christmas Java Christmas JavaScript Christmas Kotlin Christmas ML Christmas Open Source Christmas Product Christmas React Christmas Security Christmas The Cloud Christmas UX Christmas

Read more of this story at Slashdot.


          

elastic.io, proud to support the Open Source Integration Technology

 Cache   

The Open Integration Hub (OIH), has reached a milestone this week as it concludes the two-year funding commitment from Germany’s Federal Ministry for Economic Affairs and Energy (BMWi). Just to remind you, OIH project was founded in 2017 to create a central open source integration platform offering a uniform and secure standard for automatic data synchronization across various applications. With ...

The post elastic.io, proud to support the Open Source Integration Technology appeared first on elastic.io.


          

Open Source Developer Junior

 Cache   
Bons conhecimentos de Inglês; Procuramos recém-licenciados em Tecnologias de Informação para integrar o PPN ADI para o desenvolvimento de sistemas de Informação em projectos nos Clientes da Contactus....
          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

How to find the bandwidth usage by each device on my network?

 Cache   
In the last 4 months, our data usage has doubled from 450Gb in August, to 1Tb in October and November, one time exceeded the 1Tb data cap that Comcast has. How can I find out what device is causing the increase? To my knowledge, there's been no change in our data usage habits.

We have a Motorola cable modem that connects to a T-Mobile supplied Asus TM-AC1900 WiFi router. There are five devices connected directly by ethernet cable (including an ethernet switch), and a number of phones, tablets, laptops (Windows) and one iMac that connect via WiFi.

The router doesn't have a means of displaying data usage by device (other similar ASUS routers can do it, but the TM-AC1900 hasn't had a firmware upgrade for some time, and it's impossible to install an open source firmware upgrade that can show data usage per device.)

Has anyone used and can recommend a network monitoring tool that can do this easily (and preferably for free)? I have found software like Glasswire that can monitor a single computer's data usage, but I want to know the data usage of every device on the network.
          

WDRL — Edition 277: Request with Intent, Small Differences, Self Organisation and Accessible Cards

 Cache   

Hey,

what makes a good product? Well, it’s more than a great idea. It’s all the little details, from how you do product management, who much you care about accessibility, usability, good performance, caching to typographic details. It all makes the difference. We can choose where to put our focus.
Let’s start caring about small details, not just the big picture. And we can apply it to our entire life — whether it’s perfecting the tea brewing, yoga pose or avoiding waste, driving less with a car or growing some plants at home. If we care about something or someone, we’ll be rewarded.

News

  • The 2019 Web Almanac is out. It’s a state of the art report by the HTTP Archive about used technology (choices) and reveals quite some interesting data.

Generic

  • Jiaona Zhang on why we shouldn’t serve burnt pizza. Seriously, she shares why MVPs are not the best way to build a product but building a Minimum Lovable Product is. A solid article on how to build better products and evolve them.

UI/UX

Tooling

Web Performance

Accessibility

JavaScript

CSS

Work & Life

Go beyond…

  • Crypto currencies sound exciting to us but the mining is bad for our energy households, for the climate and electric power consumption. In Georgia, 10% of the nation’s power consumption is crypto mining. Still want to have crypto currency in your wallets?
  • Arvind Narayanan shares how we can recognize AI snake oil, what’s false promises and what’s worth the term “intelligence”. He for example shows why AI doesn’t really work for hiring and why it’s so easy to trick such mechanisms as candidate.

If you want to support produce WDRL, contribute via PayPal or Stripe. Every small amount you pledge will help pay my costs. Thanks a lot!

—Anselm


          

How open source changed everything — again

 Cache   

We’re about to conclude another decade of open source, and what a long, strange trip it has been. Reading back through predictions made in 2009, no one had the foggiest clue that GitHub would change software development forever (and for everyone), or that Microsoft would go from open source pariah to the world’s largest contributor, or a host of other dramatic changes that became the new normal during a decade that was anything but normal.

We are all open sourcerors now as we round out the decade. Let’s look back at some of the most significant open source innovations that got us here.

To read this article in full, please click here


          

Comment on SHAKTI : Open Source Microprocessors by Chandrakanta Sahu

 Cache   
This article really brought some energy into me. I'm enchanted with the idea of developing a processor ecosystem in our country. And I look forward to seeing more of such revolutionary ideas which would help bridging the gaps between academia and industry in India.
          

HttpClient explained using netstat - DeadDesk.top

 Cache   
Piotr Szymura software engineer, full-stack developer, open source contributor, crypto/blockchain enthusiast, try hard guitarist, starcraft fan FollowWrocław Email Twitter LinkedIn GitHub Stackoverflow Learn http client once again this time via netstat This is not a guide to: How to use HttpClient in your app ? But rather how to use netstat and how TCP connections are behaving in different code scenarios. Below examples will show...
Podbij ↑

          

"By creating a center of gravity for the open source JavaScript ecosystem, the OpenJS Foundation’s mission is to drive broad adoption and ongoing development of key JavaScript solutions and related technologies."

 Cache   
none
          

DBeaver 6.3.0

 Cache   
Versie 6.3.0 van DBeaver is uitgekomen. Met dit programma kunnen databases worden beheerd. Het kan onder andere queries uitvoeren, en data tonen, filteren en bewerken. Ondersteuning voor de bekende databases, zoals MySQL, Oracle, DB2, SQL Server, PostgreSQL, Firebird en SQLite, is aanwezig. Het is verkrijgbaar in een CE- en EE-smaak, waarbij de eerste zonder kosten als open source te gebruiken is. De enterprisesmaak voegt ondersteuning van verschillende nosql-databases toe, zoals MongoDB, Apache Cassandra en Apache Hive, en bevat verder extra plug-ins en jdbc-drivers. In deze uitgave zijn de volgende veranderingen en verbeteringen doorgevoerd: Changes in DBeaver 6.3.0:
          

Re: Geodatabase, FileGeodatabase, and Esri Geodatabase

 Cache   
Hi Armstrong, 

Rasterio relies on a library named GDAL for data access and GDAL doesn't support Esri raster databases. There are people in the open source community who store raster data in a PostGIS database and manipulate it using SQL. I don't have any experience with that. My own applications use GeoTIFF and numpy arrays for storage and all the manipulation is done using the numpy and rasterio APIs, in python.

Open Data Cube is one project that aims to provide a more comprehensive raster data management system. It may be worth your time to look at it. I'm sure subscribers on this list can recommend other systems.

Yours, 


          

Open Source Technology Could Be a Boon to Farmers

 Cache   

Robert Chang’s fellow small-scale farmers turn to each other when they need low-cost tech to stay organized as they plant dozens of varieties of vegetables each season and seek to consistently fill their community-supported agriculture (CSA) boxes each week. Their collective solution? Pre-programmed, customizable spreadsheets that guide them through seed purchases and planting and harvesting […]

The post Open Source Technology Could Be a Boon to Farmers appeared first on Civil Eats.


          

Astra Linux - Security Focussed Linux Distribution?

 Cache   

@Patrick wrote:

Something useful, Open Source here that we can port to Whonix?

https://astralinux.ru/en/

https://astralinux.ru/en/products/astra-linux-special-edition/

  • Mandatory access control
  • Modules isolation
  • Clearing RAM and external memory, secure file deletion
  • Document marking
  • Events logging
  • Information protection procedures in graphics subsystem
  • User activity constraint mode (KIOSK mode)
  • Protection of addressing space of processes
  • Control of software environment closure
  • Integrity control
  • Domain configuration tools
  • Secure relational DBMS
  • Secure software package of email
  • Secure software package of hypertext data processing

Posts: 9

Participants: 3

Read full topic


          

deepin Linux Distribution

 Cache   

@Patrick wrote:

https://www.deepin.org

Never heard of them before. Strange. But huawei now uses deepin.

They invented a lot applications. Looks like with good usability. Here is a list:

https://www.deepin.org/en/original/

Lots of deepin apps are already available from packages.debian.org:

https://packages.debian.org/search?keywords=deepin

Maybe something we could use?

Posts: 4

Participants: 3

Read full topic


          

Hardcore Hardware Control and Tips

 Cache   

@TNT_BOM_BOM wrote:

  • Steps to have them done might be tough but this is what at the moment best way to handle hardware at the market

  • Not all of them might be applicable on your pc

  • Remove = Physically cut <-- if its not possible then --> Disable = Physical burning/melting of the chip/object or from BIOS level NOT within the Operating System (OS).

A- Control Hardware by Hardware not through Software

Note: Dont switch the replacements as a wireless adapters , use always wire adapters because many of these bluetooth wireless adapters are transmitted in unencrypted way and can be attacked from wide rang.

1- Remove/Disable internal microphone (unless it come with proper kill switch) and buy new one from outside and plug it out once you finished using it

2- Remove/Disable internal speakers and buy new one from outside and plug it out once you finished using it because internal speakers can be turned into spying microphone:

3- Remove/Disable internal camera (unless it come with proper kill switch) and buy new one from outside and plug it out once you finished using it. Putting tape on the camera is not enough because some of them might have sensors like body heat sensors (infrared like) , heart rating …etc (there was a video show that but either deleted or hidden by google on youtube or i cant find it)

4- Remove/Disable internal bluetooth (unless it come with proper kill switch) and buy new one from outside and plug it out once you finished using it. Sometimes bluetooth comes built-in with motherboard , well try to disable it from BIOS rather than keeping it open (better to use external hardware like flash/hard drive when transmitting data)

5- Remove/Disable internal Wireless/WiMax (unless it come with proper kill switch) and buy new one from outside and plug it out once you finished using it. Better to always use wire/ethernet connection rather than wireless/wifi (recommended by Edward Snowden)

6- Remove/Disable internal GPS chip

7- Remove/Disable any touch/fingerprint stuff on keyboard,screen…

8- Careful when using/buying headphones make sure they come with microphone kill switch or get only audio headphone and buy the microphone separately (you can remove microphone physically from it if possible) plus make sure it using wire connection.

(Remove as much possible all the radio/waves that your pc produces)

B- Remove internal battery of your laptop and use only cable to make sure that the pc turned off and the memory wiped off to avoid memory forensic

C- Use Free or Open Source (might be with blobs) BIOSs

D- Use Free/Open Hardware Processors

Well there arent much yet (specially for laptops) but here are places to get an idea:

E- Avoid x86 Intel processors

F- Dont sell your flash or your external hard drive and you have used them before, and dont sell your pc without either changing the hard drive with new one or sell it without hard drive. If you have any used storage hardware and you dont need it then destroy it entirely (Burn/Melt it or cut/grind it or dissolve it using chemicals…etc)

G- There are markets that sell external hardware tools compatible with GNU/Linux without blobs e.g:

Extra Tips:

  • Avoid multibooting specially with malware OSs like Microsoft Windows as that might lead to make /boot in bye bye way.
  • Qubes OS solves alot of these untrusted hardware issues even with external adapters
  • Watch Jacob Appelbaum great speech about NSA crazy hacking methods/tools

Posts: 1

Participants: 1

Read full topic


          

Marchés de support open source: une image négative chez les entreprises du logiciel libre

 Cache   
Ces marchés ne sont généralement pas adaptés à l’offre des entreprises du logiciel libre, selon une étude du CNLL.
          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

RetroArch is getting hardware video decoding, manual content scanning and more

 Cache   

Tags: Emulation, Update, Open Source, Apps

The team behind the RetroArch front-end used with emulators, game engines and media players have announced that it will be getting proper hardware accelerated video decoding soon.

Currently, all video decoding is done "entirely in software", so your CPU is going the work instead of sending it off to your GPU which can cause slowdowns when your CPU is busy. They've said they're now going to be using FFmpeg supporting VDPAU and VAAPI. This might be good news for anyone using something like a Raspberry Pi, or other lower powered devices. You can see their full post on it here.

Additionally, the team also announced that manual content scanning is also coming to RetroArch. Something that has apparently been highly requested, letting you pick a specific directory and set up defaults like what Core (Emulator) any files found will use and more. It does sound quite handy!

RetroArch isn't just for emulation though, they're also building up their collection of games that have open source versions available. Most recently, they added dhewm3 allowing you to play Doom 3 through RetroArch with an up to date game engine.

All sounds great, good to see it continue to progress nicely.

Article from GamingOnLinux.com


          

The Linux and gaming Sunday round-up paper is here

 Cache   

Tags: Round-up

Your Sunday paper has arrived, come pick up a copy and see what you might have missed out on lately.


The popular YouTube channel Gear Seekers have announced they're going to be testing GPUs on Linux, in addition to the regular Windows testing. Really good, as we need Linux being talked about and tested by bigger faces. It goes to show how things are changing though, we've seen multiple big YouTube channels start checking on Linux more and more.

Recently, a Twitter post from a developer/publisher talking about Linux gaming did the rounds on Reddit after a user asked them if Linux was worth it. This time it was Mike Rose from No More Robots (publisher of Descenders, Hypnospace Outlaw, Nowhere Prophet and more), showing about 0.8% sales from Linux and they claimed that "Linux itself is a nightmare anyway" due it being open source and different ways of having Linux setup.

We can argue about those above points all day but that wouldn't get us anywhere. Instead, have a chuckle at the Twitter post from game porter/developer Ryan "Icculus" Gordon (one from Ethan Lee too) and they make a good point, each time this happens more developers use it to avoid Linux. Unless something big happened to the Linux market share, it's just not worth asking right now. Not all bad though, the developer of Jupiter Hell certainly had something nice to say about supporting Linux.

ProtonDB, the handy unofficial website you can use to check Windows game compatibility with Steam Play Proton recently passed 10K games reported. Worth noting though, that is including native titles.

Onto some more positivity, the developer of the free game The Climate Trail mentioned their game is available for Linux on itch.io:

The Climate Trail is a Free multi-platform game about climate refugees fleeing ever worsening conditions after inaction on climate has rendered much of the USA (and the world) uninhabitable. The game combines the adventure and play of the journey north with visual novel elements where characters reveal how and why this climate apocalypse unfolded.

The developer of Intrepid, a sci-fi escape room game, emailed in to let us know their game is available on Linux. It's free to grab from itch.io and Steam, plus the code is up on GitHub if you're interested in learning from it (built with Godot Engine).

Sales Reminders:


During November we posted around 185 articles. Here's a few really interesting posts from November in case any readers missed them:

Quick Upcoming Highlights

Also, if anyone is interested in testing Red Eclipse 2 before the Steam release on December 19, we still have over 100 keys available to redeem in this previous article.


If you wish to support GamingOnLinux you can do so across places like Patreon, Paypal, Liberapay, Flattr and Twitch. In addition to our affiliate links with GOG and Humble Store. We're also now giving BAT proper go, so if you have the Brave browser you can support us there too.

Once again I shall return Monday for another full week of news, unless something big/interesting pops up before the end of today. Do email in your tips if something is missed, it's incredibly helpful.

Hope everyone has an enjoyable weekend!

Article from GamingOnLinux.com


          

Spring Boot Online Training In India

 Cache   
Spring Boot is open source micro javabased framework used to create micro service It is a project which is built on the top of the Spring framework Spring Boot makes it easy to create standalone appli
          

Dynamics 365 – ISV Protection?

 Cache   


As an ISV, with solutions for both Dynamics 365 and Power Apps, I was encouraged about the attention that Business Applications ISVs are getting recently. Unfortunately, I.P. protection is not one of the items coming anytime soon.

Managed Solution Myth

Many ISVs believe that their managed solutions are safe. Having taken great pains to ensure that their managed solution never gets in the wrong hands, by requiring that their own teams install it for example. Thanks to some utilities in free open source solutions like XrmToolBox for example, managed solutions are not even close to safe. Using a tool in the XrmToolBox called “Manage Solution” for example, I can login to any instance I have access to, and view a list of both managed and unmanaged solutions. The good news is I can only download to disk a copy of unmanaged solutions. However I can copy a managed solution into an unmanaged one, and then of course download a copy. So getting an unmanaged copy, of your managed solution that is installed on an instance I have access to, would take me about 30 seconds. I can now install your unmanaged solution on another instance, and poof, I have absconded with your I.P.. I can even take Microsoft’s own Managed Solutions.

Plugins

Many ISVs feel that Plugins are safe. Well, using the “Assembly Recovery Tool” (also in XrmToolBox), I can download any dlls, managed or unmanaged. Pop open a freely available decompiler, and poof, I now have your Plugin I.P.

Power App Components

Forget about it, these run client side and I can scrape your I.P. right from my browser.

Reverse Engineering

Using a few freely available tools, an unscrupulous party can rip off and reverse engineer anything we have today. It happens. Sometimes it is a creepy, but savvy customer who just wants to get out of paying us for our solutions. Tinker here, tweak there and boom, they have it for free. Worse yet is unscrupulous parties that will take your I.P., re-brand it as their own, and resell it. At least I have been told by Microsoft that if we see that in AppSource, they will remove it.

What Helps?

Shifting necessary code off of your solution to your Azure is one scenario. At least on “your” Azure you can turn it off or on. If your solution has to reach outside, to get some bit of code or information to make it run, you at least have created a minor barrier. Code obfuscation is another technique that can help, but that is also not 100%.

What Works?

The only defense you have, in my opinion, is marketing. You have to build a brand and a reputation, that sane people will value over some low-cost knockoff. This is easier sad than done. It has taken us almost five years to establish a brand (RapidStartCRM) and a reputation, and still I hear people confusing us with knockoffs with similar names. There is of course, nothing illegal about liking someone’s idea, and creating your own variation of it. But it still sucks to the one who did it first.

What is not worth the effort?

Let’s face it. Most I.P could be reverse engineered even if I could not get your code. Just using it and understanding what it does is enough for a smart person to go create their own version. While their at it, they may as well go ahead and improve on your idea. In our solutions we have forgone the potentially very expensive, and not very effective anyway, I.P. protection efforts. We are able to track usage, and let customers know when they are out of compliance. This works with the 95% of customers who are honest. To me it was not worth the investment to attempt to thwart the %5. In retail, they call it “shrinkage”. Obviously if you have extremely valuable, or highly proprietary I.P. you may look at it differently.

Windows

I have used this analogy for many things about Microsoft, and ISV solutions are no different. When you think you have identified an idea, a window opens. Shortly after you go through it, others will follow. In a relatively short amount of time, that same window starts to close. Either too many people went through it and there are no margins left, or Microsoft patched the hole you found and your solution is no longer needed. Today, windows close as fast as they open. If you are going to be in the ISV game, you need to move very fast with ideas, and always been thinking about what you will do next.


          

La RISC-V Foundation va quitter les États-Unis pour s'installer en Suisse, à cause des craintes de perturbations géopolitiques

 Cache   
La RISC-V Foundation va quitter les États-Unis pour s'installer en Suisse,
à cause des craintes de perturbations géopolitiques

La fondation à but non lucratif RISC-V Foundation veut faire en sorte que les universités, les gouvernements et les entreprises en dehors des États-Unis puissent aider à développer sa technologie open source, a déclaré son directeur général, Calista Redmond, dans un entretien accordé à Reuters. Elle a ajouté que la collaboration mondiale de la fondation n'était soumise...
          

Inky for Cool Writing Projects in Your ELA Classroom

 Cache   



Each month we're bringing you a new Technology-related tip or trick for your classroom! Share your thoughts and experiences in the comments below. Let us know if you've tried it out and what you think.  We're excited to hear from you!

Looking for technology to integrate into your ELA Classroom?

I'm always looking for ways to bring technology into my English class so when I found Inky, I felt like I had found a little slice of heaven! Ink Script was created by Inkle Studios, the developers of interaction fiction apps like 80 Days and the Sorcery! series. Ink Script is open source and can be used with the downloadable application called Inky.  Ink Script is compatible with Unity, so you can write interactive fiction that can then be published via Unity to Steam and the mobile app stores. 

If your students can download and install software on their computers, Inky is the free editing app that they want.  If you are Chromebook, there is an online version (inklewriter) for you here. (https://writer.inklestudios.com/)

The first excellent thing about Inky is that it is “play as you write” so, like Alice (with drag ’n drop in the left panel and Java in the right panel), Inky shows whatever you are typing in the left panel and what it will look like to your user on the right panel.  That right panel is completely interactive so you can test your game as much as you want as you are writing. Play as you write.

Second, Inky tells you that you’ve made a mistake right away.  As I’m writing my story, if I’ve left something undone or a connection unconnected, Inky highlights that for me and tells me what it needs me to do.  It’s talking to me!

There are lots of cool Inky things but those are the two that attracted me.... in addition to being free, that is.

If you love teaching your students how to write and they enjoy Choose Your Own Adventure stories [or they love text-based video games (Zork, anyone?)] they will love writing their own stories with Inky or InkleWriter.  

P.S.  If you have younger kids in your classroom, there's a story-writing website that is really cute here.  






          

Новая эра в автоматизации ресторанов: «Тиллипад» переходит в Open Source

 Cache   
Начиная с 2020 года компания Тиллипад меняет вектор своего развития. Компания переходит в сегмент Open Source (выпуск программного обеспечения с открытым кодом), открывая принципиально новые перспективы для российского рынка автоматизации ресторанов.
          

IINA – open source macOS media player.

 Cache   
Link. Worrisome: no mention of Catalina, screen shots “coming soon”.
          

Red Hat Customer Success Stories: Migrating to SAP S/4HANA with RHEL for SAP Solutions and more

 Cache   

Automation and management are important tools for organizations looking to modernize, improve efficiency, and expand their IT systems without having to add staff. When faced with these problems, some companies turn to Red Hat to help them use enterprise open source to solve their problems. See how Mann & Schröder Cosmetics, Swiss Federal Railways, and Česká spořitelna worked with Red Hat to improve their IT. 


          

Legal: Legal Counsel, Product Privacy - Portland, Oregon

 Cache   
Description Your Opportunity New Relic seeks a highly motivated lawyer who is willing to drive strategic development through informed and intelligent legal counsel and business partnership. We seek a lawyer who can handle ambiguity and change to lead multiple responsibilities and tasks in a fast-paced and high-energy environment. You will have solid product, intellectual property, and privacy counseling experience and have documented success in working with technical stakeholders through different phases of product development, particularly in the SaaS space. The position will report to the Director of Privacy and Product Counsel. Familiarity with Open Source compliance counseling and general licensing is also required. Quarterly travel may be required. What You'll Do Provide legal direction for product development initiatives throughout the software development lifecycle Work with engineering, product management, and infosec teams as the relevant legal point of contact to manage product and support issues as they arise Serve as the subject matter expert on regulatory issues impacting New Relic and its service offerings, including impact from domestic and international legal frameworks (ex. US Law, EU law, Privacy Shield, HIPAA, COPPA, State laws and regulations, and the FTC best practices) Review and interpret third party posted terms to guide the product teams and ensure New Relic's compliance Work closely with a cross-functional team to develop effective go-to-market plans for new products and services by determining the best way to integrate new offerings into New Relic's current sales, delivery and support models Analysis of open source issues and support of open source compliance program; Export compliance, trademarks, and patents Creating scalable compliance programs Support creation of playbooks for inbound and outbound agreements in the areas of product, IP, and privacy Support review and negotiation of inbound and outbound agreements in the areas of product, IP and privacy Your Qualifications Have a minimum of 5 years of relevant product and privacy counseling, and transactional experience (a mix of in-house and law firm experience strongly preferred) Bring a depth of technical knowledge and experience with innovative software and technologies, privacy, data security laws, and regulations Have the ability to translate that knowledge across the company to deliver relevant and actionable guidance to the business Possess excellent legal judgment and the ability to be both pragmatic/business-oriented and strategic Excel when working independently and collaboratively, and have a record of developing strong working relationships with a diverse client base Be comfortable in a fast-paced environment and successfully lead many projects simultaneously A strong teammate who can work well with colleagues in engineering, product, security, privacy, marketing, finance, sales, operations, development and other functions Ability to navigate complicated and nuanced issues and lead business discussions and provide directions around those issues Enthusiasm for solving problems and adding value to the company Have a J.D. degree and must be admitted to practice law and be a member in good standing of the Oregon bar Please note that visa sponsorship is not available for this position. Our Office Our office is in the center of downtown Portland, situated in a thriving tech community in the Pacific Northwest. We enjoy easy commute access and a plethora of good eats and great coffee. We provide competitive compensation including equity and big-company benefits (medical, dental, etc.)all while maintaining the energy, agility and fun of a start-up. About Us New Relic (NYSE: NEWR) is the industry's largest and most comprehensive cloud-based instrumentation platform built to create more perfect software. The world's best software and DevOps teams rely on New Relic to move faster, make better decisions and create best-in-class digital experiences. If you run software, you need to run New Relic. We're proudly trusted by more than 50% of the Fortune 100. Founded in 2008, we're a global company focused on building a culture where all employees feel a deep sense of belonging, where every 'Relic' can bring their whole self to work and feel supported and empowered to thrive. We're consistently recognized as a distinguished employer and are committed to building world-class products and an award winning culture. For more information, visit ************. Our Hiring Process In compliance with applicable law, all persons hired will be required to verify identity and eligibility to work and to complete employment eligibility verification. Note: Our stewardship of the data of thousands of customers' means that a criminal background check is required to join New Relic. We will consider qualified applicants with arrest and conviction records based on individual circumstances and in accordance with applicable law including, but not limited to, the San Francisco Fair Chance Ordinance. Headhunters and recruitment agencies may not submit resumes/CVs through this website or directly to managers. New Relic does not accept unsolicited headhunter and agency resumes, and will not pay fees to any third-party agency or company that does not have a signed agreement with New Relic.New Relic is an equal opportunity employer. We eagerly seek applicants of diverse background and hire without regard to race, color, gender identity, religion, national origin, ancestry, citizenship, physical abilities (or disability), age, sexual orientation, veteran status, or any other characteristic protected by law.Interested in the details of our privacy policy? Read more here: **************************************************************** #LI-FL1 ()
          

MuseScore for Windows 3.3.3

 Cache   

MuseScore lets you notate and compose music easily with your keyboard, your mouse or a MIDI keyboard. You can print the beautifully engraved sheet music or save it as PDF or PNG. You can play your score, transpose it, and save it as audio or MIDI file. MuseScore also supports MusicXML to let you share your composition with other scorewriters. MuseScore is free and open source.


          

MuseScore for Mac OS X 3.3.3

 Cache   

MuseScore lets you notate and compose music easily with your keyboard, your mouse or a MIDI keyboard. You can print the beautifully engraved sheet music or save it as PDF or PNG. You can play your score, transpose it, and save it as audio or MIDI file. MuseScore also supports MusicXML to let you share your composition with other scorewriters. MuseScore is free and open source.


          

Grub2Win 2.1.1.7

 Cache   

Grub2Win is an open source software that allows you to boot multiple Windows and Linux systems on both GPT and MBR disks. Supports both 64 and 32 bit EFI firmware as well as BIOS. Select from many OS choices. Supports Manjaro, Android, Ubuntu, Debian, Suse, Fedora, Mint, Clover and Windows. Also boots ISO files. You can enter your own custom commands for each menu entry.


          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

Cómo mejorar la seguridad de un hosting WordPress

 Cache   

En la actualidad más del 34% de todo Internet está utilizando WordPress como gestor de contenidos, un proyecto Open Source que comenzaba en 2003 y que gracias a una vibrante comunidad de cientos de miles de desarrolladores y colaboradores que ofrecen su tiempo de forma voluntaria, sigue creciendo y desarrollándose. Su objetivo fundamental es el […]

La entrada Cómo mejorar la seguridad de un hosting WordPress aparece primero en MuyComputerPRO.


          

Abschlussarbeit - Telekommunikation 5G (m/w/d)

 Cache   
Wir entwickeln hoch innovative Software-Lösungen zur Konfiguration von Mobilfunknetzen. Mehrere Top-Mobilfunknetzbetreiber setzen auf unsere hochwertigen Lösungen, um ihre Netze zu optimieren. Ihre Aufgaben: - Definition von Anwendungsfällen (Use Cases) aus verschiedenen Bereichen, z.B. Automotive, Industrie 4.0 und Smart City - Spezifikation der entsprechenden Anforderungen an das Telekommunikationsnetz - Implementierung eines Proof of Concept für Demos auf Basis der Open Source Software "ONAP" und "OpenDaylight" Ihr Profil: - Laufendes Studium der Informatik, Elektrotechnik, Physik oder vergleichbare Studiengänge - Erste Erfahrungen in der Programmierung, vorzugsweise in Java und SQL - Grundkenntnisse im Bereich Mobilfunk- und Netzmanagement - Gute Deutsch- und Englischkenntnisse in Wort und Schrift - Eine strukturierte und selbstständige Arbeitsweise Wir bieten: - Ein spannendes Projekt im 5G Umfeld mit Zugriff auf ein reales Testnetz im Zentrum von Berlin - Eigenverantwortliches Arbeiten mit intensiver fachlicher und persönlicher Betreuung und Kontakt zu namhaften Deutschen Forschungsinstituten und Partnerfirmen im Bereich SDN/NFV und 5G - Genügend Raum für Deine Ideen und eine exzellente Betreuung - Sympathisches Team, ein respektvolles und kooperatives Arbeitsklima - Möglichkeit der Übernahme nach erfolgreichem Studienabschluss Stellenreferenz: TCS-778
          

Disney+ Accounts Compromised, Ring IoT Doorbell Hacked, GitHub Preserves Code Beyond the Year 3000 - The Category5.TV Newsroom - Episode 633

 Cache   

The Category5.TV Newsroom

Here are the stories we're covering this week: - Thousands Of Disney+ Accounts Are Already Up For Sale On Hacking Forums. - A new AI is combining machine learning and computer vision to detect drowning people in real time. By using object recognition, it's able to tell if a person is swimming normally, or if they are at risk of drowning. What's best is that Drowning-Detector is open source, and can run on a single board computer such as the Raspberry Pi. - IoT doorbell, Ring, had a bug in its configuration app which sent Wi-Fi setup information unencrypted to some doorbell devices, exposing customers' home networks. - GitHub Will Preserve Open Source Code In An Arctic Vault. - A secretive clean energy company backed by Bill Gates has created a way to use mirrors and artificial intelligence to harness the heat of the sun, replacing the need to use fossil fuels industrial heat applications, cut back on CO2 emissions. Their invention creates concentrated solar energy so hot that they can manufacture steel, glass and cement with a carbon-free source that had not been available before.

Read the complete show notes, comment or rate this episode, view pictures and obtain links from this episode at https://category5.tv/shows/newsroom/episode/633/

Running time: 22 Minutes 57 Seconds


          

Skavenji, the open source box for home-produced electricity

 Cache   
Skavenji wants to make renewable energy accessible to everyone with a plug-and-play box that means you can produce your own electricity at home.
          

#webglstudio.js: A full open source 3D graphics editor in the browser, with scene editor, coding pad, graph editor, virtual file system, and many features more.

 Cache   
https://github.com/jagenjo/webglstudio.js
          

My First Contribution to OpenStack project

 Cache   

I been working since last year using Ansible for fun and to trying to get prepared to become a DevOps, so I found an excelent OpenStack project called ARA Records Ansible.

Ansible Logo ARA Logo

Basically it is a project from the OpenStack community that makes it easier to understand and troubleshoot your Ansible roles and playbooks.
If you want more information, please refer to the Documentation Page.

Anyhow, I just found a little bug on the Ansible Role to install ARA ansible-role-ara on Debian based distros and just send the patch to fixit.

Here is the link to my contribution.

And, as I am proud of my first commit on a big project here is the screenshot too:

My First OpenStack Contribution

I feel happy and motivated to still learn about this Open Source project and a lot more.

😄


          

Wir begrüßen die Annäherung der CDU an eine Piratenposition

 Cache   

Die CDU hat auf ihrem Bundesparteitag am vergangenen Wochenende beschlossen: „Deshalb gilt künftig für alle (öffentlichen) Digitalisierungsprojekte in Deutschland: Auftragsvergabe und Förderung sind an die Einhaltung der Prinzipien Open Source und offene Standards gebunden. Durch öffentliche Mittel finanzierte Software soll allen Bürgern dienen“. [1]

Die Piratenpartei Hessen begrüßt diesen Beschluss. Damit übernimmt die CDU teilweise eine alte Forderung der PIRATEN: Open Source-Software hält sich an offene Standards. Diese können von allen Anbietern und Nutzern von Software gleichermaßen genutzt und weiterentwickelt werden, ohne Einschränkungen zum Schutz von intellektuellem Eigentum und durch andere – auch technische – Hindernisse. Das fördert den freien Wettbewerb der Ideen und vermeidet Kosten durch Parallelentwicklungen der verschiedenen Verwaltungen, da jedes Bundesland, jede Verwaltung und jede Behörde ihre eigenen Verfahren entwickelt. Auch wird der Austausch von Daten dadurch vereinfacht.

Die Piratenpartei fordert dies bereits seit zehn Jahren in ihrem Parteiprogramm. [2]

Die Forderungen der Piratenpartei gehen noch weiter: Sie setzt sich für die Förderung von freier Soft- und Hardware ein, die von allen uneingeschränkt benutzt, untersucht, verbreitet und verändert werden kann. Öffentliche Einrichtungen sollen ihre technische Infrastruktur umstellen und so Kosten und Abhängigkeit von einzelnen Herstellern reduzieren und freie Kommunikation fördern.

Der Politische Geschäftsführer der Piratenpartei Hessen, Dr. Aljoscha Kreß, kommentiert: „Gerade die Debatte um den Einstieg von Huawei in den 5G-Ausbau zeigt doch dem letzten IT-Laien, dass Transparenz in der IT-Infrastruktur für die nationale Sicherheit wichtig ist. Das gilt für Hard- und Software. Als Mitarbeiter der Landesverwaltung stelle ich mir täglich die Frage, wie man noch mit proprietärer Software und Betriebssystemen arbeiten kann, die freudig verschlüsselte Telemetriedaten nach Hause schicken, ohne dass die Landes-IT den Inhalt kennt [3]. Mit den Prinzipien der Open Source wüsste man, was da gefunkt wird und ob es sicherheits- und datenschutzrelevante Inhalte sind, die womöglich der hessischen Landesverwaltung abgezapft werden [4].“

Der Frankfurter Stadtverordnete der Piratenpartei, Herbert Förster, ergänzt: „Gerade in den öffentlichen Verwaltungen werden Millionenbeträge für Softwarelizenzen an Microsoft ausgegeben. Dabei sind sie davon abhängig, dass Microsoft Sicherheitslücken zuverlässig schließt. Wie anfällig besonders Microsoft Windows für Angriffe ist, beweisen regelmäßige Warnungen der IT-Abteilung in Frankfurts Verwaltung. Anträge der PIRATEN-Fraktion wegen der Sicherheit und Wirtschaftlichkeit auf ein quelloffenes System wie z.B. Linux umzustellen, werden regelmäßig abgelehnt.“ [5]

[1] https://www.cdu.de/system/tdf/media/images/leipzig2019/2019-11-23-digitalcharta-innovationsplattform-d-beschluss.pdf?file=1, S. 10
[2] (vgl. https://wiki.piratenpartei.de/Parteiprogramm#Freie_Soft-_und_Hardware)
[3] https://www.datenschutz-praxis.de/fachnews/telemetriedaten-von-windows-10-auf-der-spur/
[4] https://www.heise.de/newsticker/meldung/Windows-Zwangsmigration-Strafanzeige-gegen-niedersaechsische-Landesregierung-4309953.html
[5] https://www.stvv.frankfurt.de/download/E_328_2013.pdf

Beitragsbild: Annette Schaper-Herget (CC BY 4.0)
Logos

Der Beitrag Wir begrüßen die Annäherung der CDU an eine Piratenposition erschien zuerst auf Piratenpartei Hessen.


          

Piraten Niedersachsen fordern schnelle Umsetzung für Freie Software und Freie Daten

 Cache   

Wie am 25.11. bekannt wurde, hat die CDU auf ihrem Parteitag in Leipzig u.a. beschlossen, dass bei zukünftigen IT-Projekten in der öffentlichen Verwaltung „Auftragsvergabe und Förderung … an die Einhaltung der Prinzipien Open Source und offene Standards gebunden“ sind. (1)

Bereits als vor einem Monat das Niedersächsische Digitalisierungs-Gesetz (NDIG) beschlossen wurde, haben wir auf den fehlenden Inhalt hingewiesen, dass mit keinem Wort so genannte Freie Software als Alternative zu kommerziellen Angeboten bedacht wird. (2) Das wird jetzt hoffentlich bei der praktischen Umsetzung des Gesetzes nachgeholt,“ mahnt Thomas Ganskow, Vorsitzender der Piraten Niedersachsen. „Und das sollte dann nicht nur für die damals angesprochene Steuerverwaltung gelten, sondern auch für jegliche andere Art der digitalen Verwaltung. Eine Ausrede hat jetzt auch die CDU nicht mehr.

Weiterhin umfasst der Beschluss, dass „Deutschland … staatlich erhobene Daten ebenso wie die seiner Behörden und Tochterunternehmen als Open Data (mit hoher Datenqualität und in maschinenlesbarer und -nutzbarer Form) über einen kostenlosen Service zur Verfügung“ stellt.

Es wäre ein Quantensprung in der niedersächsischen Politik, wenn dies auch hier im Land endlich umgesetzt würde. Den wohlfeilen Worten müssen jetzt schnelle Taten folgen. Dass Niedersachsen noch immer kein Informationsfreiheitsgesetz hat, ist ein Armutszeugnis schlechthin. Wobei kostenfreier Zugang zu allen staatlich erzeugten Informationen nicht einmal im entsprechenden Gesetzentwurf unter Rot-Grün vorgesehen war (3) und auch der aktuelle Koalitionsvertrag da bislang nicht drauf hoffen ließ. Interessant ist jetzt, wie in diesem Zusammenhang mit einem Gesetzentwurf der Opposition umgegangen wird (4), der nichts anderes fordert, als das, was wir Piraten schon seit langem tun (5) und was jetzt plötzlich und unerwartet also auch die CDU anstrebt,“ so Ganskow weiter. „Da möchte man gern mal Mäuschen sein, wenn die Regierung sich mit den Inhalten beschäftigt.

(1) https://www.golem.de/news/parteitagsbeschluss-cdu-will-open-source-als-standard-in-der-verwaltung-1911-145190.html
(2) https://piraten-nds.de/2019/10/25/digitale-sicherheit-geht-anders/
(3) https://piraten-nds.de/2017/05/18/landesregierung-plant-transparenzverhinderungsgesetz/
(4) https://wiki.piratenpartei.de/wiki/images/d/de/Transparenz19.pdf
(5) https://wiki.piratenpartei.de/NDS:Wahlprogramm_2013#Transparenz_in_Politik_und_Verwaltung


          

Open Core Summit: O valor da nuvem e do software comercial open source

 Cache   

No Open Core Summit inaugural, realizado em São Francisco, foi concluído que o relacionamento entre a computação nas nuvens e os softwares comerciais open source é "e", e não "versus". O Open Core é um modelo de negócios e não deve ser confundido com software open source. As empresas Open Core se baseiam nos fundamentos do open source e extraem pequena quantidade do valor total das criações.

By Daniel Bryant Translated by Adonias de Souza Santos
          

Swift Numerics visa tornar o Swift adequado para a computação numérica

 Cache   

Segundo o engenheiro da Apple, Steve Cannon, o Swift Numerics é uma biblioteca open source nova para o Swift is a new open-source que tenta preencher uma lacuna na Swift Standard Library. Atualmente, a mesma inclui dois módulos, para computação matemática real e complexa, com mais por vir no roadmap.

By Sergio De Simone Translated by Diogo Carleto
          

HPR2956: HPR Community News for November 2019

 Cache   

New hosts

Welcome to our new hosts:
Nihilazo, Daniel Persson.

Last Month's Shows

Id Day Date Title Host
2935 Fri 2019-11-01 The work of fire fighters, part 3 Jeroen Baten
2936 Mon 2019-11-04 HPR Community News for October 2019 HPR Volunteers
2937 Tue 2019-11-05 Lord D's Film Reviews: His Girl Friday lostnbronx
2938 Wed 2019-11-06 Naming pets in space game tuturto
2939 Thu 2019-11-07 Submit a show to Hacker Public Radio in 10 easy steps b-yeezi
2940 Fri 2019-11-08 Better Social Media 05 - Mastodon Ahuka
2941 Mon 2019-11-11 Server Basics 107: Minishift and container management klaatu
2942 Tue 2019-11-12 Why I love lisps Nihilazo
2943 Wed 2019-11-13 Music as Life brian
2944 Thu 2019-11-14 ONICS Basics Part 4: Network Flows and Connections Gabriel Evenfire
2945 Fri 2019-11-15 Saturday at OggCamp Manchester 2019 Ken Fallon
2946 Mon 2019-11-18 Sunday at OggCamp Manchester 2019 Ken Fallon
2947 Tue 2019-11-19 The Mimblewimble Protocol mightbemike
2948 Wed 2019-11-20 Testing with Haskell tuturto
2949 Thu 2019-11-21 Grin and Beam: The 2 major mimblewimble blockchains mightbemike
2950 Fri 2019-11-22 NotPetya and Maersk: An Object Lesson Ahuka
2951 Mon 2019-11-25 A walk through my PifaceCAD Python code – Part 2 MrX
2952 Tue 2019-11-26 Publishing your book using open source tools Jeroen Baten
2953 Wed 2019-11-27 How I got started in Linux Archer72
2954 Thu 2019-11-28 Wrestling As You Like It episode 1 TheDUDE
2955 Fri 2019-11-29 Machine Learning / Data Analysis Basics Daniel Persson

Comments this month

These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 16 comments in total.

Past shows

There are 2 comments on 1 previous show:

  • hpr1585 (2014-08-29) "36 - LibreOffice Calc - Financial Functions - Loan Payments" by Ahuka.
    • Comment 1: timttmy on 2019-11-30: "Thanks"
    • Comment 2: Ahuka on 2019-11-30: "I'm glad it helped"

This month's shows

There are 14 comments on 8 of this month's shows:

  • hpr2935 (2019-11-01) "The work of fire fighters, part 3" by Jeroen Baten.
    • Comment 1: Ken Fallon on 2019-11-05: "That sucks"
    • Comment 2: Ken Fallon on 2019-11-05: "That blows"
    • Comment 3: Ken Fallon on 2019-11-05: "You're Fired"

  • hpr2936 (2019-11-04) "HPR Community News for October 2019" by HPR Volunteers.
    • Comment 1: lostnbronx on 2019-11-04: "Ken's Voice Is Better Than espeak"
    • Comment 2: Jon Kulp on 2019-11-05: "Pots"
    • Comment 3: clacke on 2019-11-19: "Release order or episode order?"

  • hpr2939 (2019-11-07) "Submit a show to Hacker Public Radio in 10 easy steps" by b-yeezi.
    • Comment 1: Ken Fallon on 2019-11-07: "Clarification"

  • hpr2940 (2019-11-08) "Better Social Media 05 - Mastodon" by Ahuka.
    • Comment 1: ClaudioM on 2019-11-08: "Simple Mastodon Timeline View Option"

  • hpr2942 (2019-11-12) "Why I love lisps" by Nihilazo.

  • hpr2943 (2019-11-13) "Music as Life" by brian.
    • Comment 1: Carl on 2019-11-21: "Interesting Episode"

  • hpr2944 (2019-11-14) "ONICS Basics Part 4: Network Flows and Connections" by Gabriel Evenfire.
    • Comment 1: Dave Morriss on 2019-11-27: "This is wonderful"

  • hpr2955 (2019-11-29) "Machine Learning / Data Analysis Basics" by Daniel Persson.
    • Comment 1: b-yeezi on 2019-11-29: "Great first episode"

Mailing List discussions

Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mail List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman.

The threaded discussions this month can be found here:

http://hackerpublicradio.org/pipermail/hpr_hackerpublicradio.org/2019-November/thread.html

Events Calendar

With the kind permission of LWN.net we are linking to The LWN.net Community Calendar.

Quoting the site:

This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page.

Any other business

Stand at FOSDEM

Our proposal for a “Free Culture Podcasts” stand at FOSDEM was accepted for the Sunday 2nd February. This is fantastic news as this is the largest FLOSS event in Europe and is absolutely thronged the whole day.

https://fosdem.org/2020/news/2019-11-19-accepted-stands/

Anyone going to FOSDEM, and who would like to help staff the booth on Sunday please get in touch.

Tags and Summaries

Thanks to the following contributor for sending in updates in the past month: Dave Morriss

Over the period tags and/or summaries have been added to 5 shows which were without them.

If you would like to contribute to the tag/summary project visit the summary page at https://hackerpublicradio.org/report_missing_tags.php and follow the instructions there.


          

ICYMI: News & Notes from Acquia, November 2019

 Cache   
ICYMI: News & Notes from Acquia, November 2019

Welcome to our Acquia News & Notes series where we’ll recap top announcements, customer stories and media drivers over the past month! 

Acquia’s been making news all over the world this month from London to Ottawa to Munich and, of course, to New Orleans for our annual user conference, Acquia Engage! Engage was a rousing success full of inspiration from our partners, customers and our keynote, two-time World Cup champion and Olympic gold medalist Kelley O’Hara. With so many digital leaders in one space, it’s not surprising that the insights and conversations from Engage kept going long after the event itself had wrapped. 

Roy Varghese, CIO of NOAA Fisheries, expanded on his Engage presentation in an interview with DMN on why the agency chose Acquia to redesign and consolidate more than 20 of their websites. “We liked the openness of the platform so that it can be extended for the other products and services that we may or may not build on this platform, so it gives us maximum flexibility,” Roy said. 

We also had several publications cover the event and our news including Forbes, CMS-Connected and TechTarget. Some key highlights include: 

  • “The Acquia survey offers a way for enterprises to up their CX capabilities. Personalization is key, with four of five consumers saying ‘brands that know their customers best will earn their loyalty.’ More than half (60%) said that brands who should know them, don’t.” - Forbes
  • “Understandably, the audience was quite aghast at these stats. With those statistical bombs being dropped, personalization became the white-hot topic for conference participants; clearly, there is an urgent need for work to be done in this area.” - CMS-Connected
  • “Acquia needs to remain heavily involved in Drupal, even though the investment of engineering resources might not show up as bottom-line revenue for Acquia's new owners, said Geoffrey Bock, analyst and principal for Bock and Company, an IT advisory firm in Newton, Mass.” - TechTarget 

Get updates!

Receive the best content about the future of marketing, industry shifts and other thought leadership.

Engage is always a unique opportunity to showcase our vision for the future and weigh in on how digital is transforming how brands communicate with customers. Mark Grannan, senior analyst at Forrester, offered his perspective on the Digital Experience Platform (DXP) market during his main stage presentation. Mark spoke on Forrester’s assertion that the rise of agile CMS signals a new era for the entire industry. He also expanded on the observation in his recent blog that “open strategies are being rewarded” in the content management space.

Acquia Founder and CTO Dries Buytaert also backed the belief that “open source has won” when it comes to the future of digital content in a five-part series for InfoWorld. Dries advocated for open source sustainability and encouraged more widespread contribution to open source projects as a way to move toward a more democratized web. “I believe open source to be the only way to build a pro-privacy, anti-monopoly, open web. This will require open source communities to be long-term sustainable—possibly for hundreds of years,” he wrote. 

Moving forward, Acquia continues to be a top advocate for the power of open source, the Drupal community and building better digital experiences. Check back next month for the latest news and innovations from the Acquia newsroom.

Kaitlyn headshot

Kaitlyn Ethier

Senior Communications Manager Acquia
paige.breaux Wed, 11/27/2019 - 09:15
reading on tablet

          

Acquia Gives Thanks to Open Source Giants

 Cache   
Acquia Gives Thanks to Open Source Giants

At Engage New Orleans, our team had the pleasure of celebrating the best examples of our customers' and partners' work through the Acquia Engage Awards. We’ve shared stories of how ambitious brands are closing the CX gap, integrating content and commerce, and increasing donor engagement

In 2019, we also introduced a new category to pay homage to our open source roots, and to showcase the organizations contributing back to Drupal. The Open Source Giants category recognizes the strongest contributions to the Drupal ecosystem, whether it be through code contributions, event sponsorship, community mentorship or technical excellence.

In the spirit of Thanksgiving and giving back, we want to commemorate our 2019 winner and finalists in the inaugural Engage Awards Open Source Giants category.

Mediacurrent (Winner) 

Mediacurrent is an open source development and digital marketing agency that partners with enterprise, nonprofit, higher ed and government organizations. They believe in open source principles and adding value back into the community that allows others to improve. Each week, their staff dedicates time to contribute code, maintain modules and add to their repository of open source resources so that others can learn from their work. Some of their ongoing notable contributions include blogs, code, presentations, event planning, case studies and sponsorships.  

Some of the significant ways Mediacurrent has worked to propel the momentum of Drupal forward include:

  • 500+ content assets on the Mediacurrent Blog and Resource Center, covering the latest Drupal developments and best practices for digital strategy, UX and design.
  • 30+ Drupal case studies sharing lessons learned with the community.
  • 75+ Drupal events organized, as well as participation at camps, cons and user groups across the nation.

In 2019, the Mediacurrent development team created Rain: an enterprise-grade Drupal 8 installation profile. Rain provides free, out-of-the-box editorial, administrative and media enhancements to the core Drupal 8 installation. For two years, Mediacurrent conducted audits of the websites they built and identified the common modules, components and needs to create a successful Drupal 8 website. They gathered all their learnings and aligned this toolset in one place to share with the community along with the training resources, so that everyone can leverage Rain.

Get updates!

Receive the best content about the future of marketing, industry shifts and other thought leadership.

Elevated Third (Finalist)

With a presence in the Drupal community for more than 11 years, Elevated Third has contributed to Drupal in terms of code, community building and thought leadership. In 2019 alone, Elevated Third spoke at four separate Drupal events. They believe that “the foundation of a strong national and international community is a strong local community.” Whether it’s through sponsorship, organization or expert presentation, their team members take pride in sharing knowledge about enterprise B2B marketing, personalization, performance and admin user experience. Many members of the team were already putting in hours outside of their normal workweek to support Drupal, the community and software project that allowed them to do what they love every day. 

Elevated Third found that the projects they were working on aligned with the needs of their clients and established a contribution budget to reward employees for their efforts and continue pushing these projects forward. A few key achievements that came from this initiative included:

  • Release of the 8.x-1.x branch of the Demandbase module and multiple patches merged into the 8.x-1.x branch of the Pardot module
  • Beta release of Paragraphs Browser, which makes managing 100+ individual Paragraphs significantly more user-friendly
  • Presentations given at DrupalCamp Asheville and DrupalCon Seattle educating attendees on personalization and website-building best practices

Elevated Third understands that “It Takes a Village to Raise a CMS” and that everyone from individuals to large enterprises to digital services to developer teams play a part in making Drupal successful. As an agency, they’re working to promote contributions beyond developer communities and spread awareness and education to the B2B enterprise space including, seamless integrations with marketing tools personalized website experiences and better execution of the entire customer journey at scale. 

Palantir.net and Digital Services Georgia (Finalist)

Full-service web agency Palantir.net believes in a mission to “Create good inside and out.” In the open source community, they do good by sharing their internal Drupal expertise with other individuals and companies to help them elevate their own projects. 

Back in 2016, with the announcement that the Google Search Appliance was reaching its end of life, many government entities and universities started looking around for replacement options. Palantir.net wanted to provide an open source solution that would help constituents find the information they need to stay informed and educated.

So, Palantir.net built Federated Search, which is freely available at Drupal.org and offers the following capabilities: 

  • A simple way to store, retrieve and parse content.
  • A cross-platform search application.
  • A speedy, usable, responsive front end.
  • A flexible, extensible, reusable model.

These features of Federated Search made it easier for constituents to find what they need. Palantir.net sought to create a way for enterprise customers to leverage open source search tools in order to enable a networked search across multiple versions of Drupal. When they migrated over 80+  sites from D7 to D8, Digital Services Georgia relied on the Palantir.net team to adapt the current search experience across their websites to new features available in Federated Search, including search filters for site, content type and date range.

As active members in the Drupal community, Palantir team members have made contributions to every facet of the Drupal project: core development, contributed modules, themes, financial assistance, training, documentation, conference organizing and participation on the Board of Directors and Advisory Board for the Drupal Association. 

Thank you to all of our Open Source Giants for setting an exceptional precedent for what it means to give back. To hear more of the inspiring stories from this year’s Engage Awards, check out our gallery of winners and finalists.

Gigi Anderson

Customer Marketing Manager Acquia
paige.breaux Tue, 11/26/2019 - 10:00
Engage Awards

          

Using Eternal Terminal with OSX and AWS Including Ansible Support

 Cache   

IMG_9163.jpeg

I know, I know – it is 2019 and we’re not supposed to be SSH’ing into boxes – but, really, you’re going to do it anyway. And if you are going to ssh into boxes then, for heaven’s sake, let’s get rid of that stupidity that is your SSH terminal disconnecting whenever there is a simple blip in connectivity.

Eternal Terminal, ET, is a mature Open Source project that purports to solve SSH disconnects. I say “purports” because I have only just installed it and this blog post is my proof of concept to see how well it works. I’m essentially SSH’d into some box or another roughly 10 to 12 hours a day, 5 to 7 days a week.

Note: You can strike purports in the above paragraph. I’ve now been using Eternal Terminal though a variety of network conditions including changing my wifi connection with long running processes and it works great. I do not understand the deviltry that drives this pretty damn amazing bit of software but I sure do like it.

Overview

Here’s what you need to do to use ET on a local OSX to remote AWS context:

  1. You need to install ET (client) on your OSX box.
  2. You need to install ET (server) on your Linux server.
  3. You need to start ET (server) on your Linux server.
  4. You need to open port 2022 on your AWS security group.
  5. You need to adjust your SSH login statements.
  6. You may want to use an Ansible Playbook to install ET on your server.

Installing ET on OSX

Here’s how to install ET on OSX:

brew install MisterTea/et/et

Installing ET on your Server

Here’s how to install ET on Ubuntu:

sudo apt-get install -y software-properties-common
sudo add-apt-repository ppa:jgmath2000/et
sudo apt-get update
sudo apt-get install et

Starting Eternal Terminal on Your Server

After installation, ET should start automatically. You can check its status with:

systemctl status et

You should see something like this if ET is running:

● et.service - Eternal Terminal
   Loaded: loaded (/lib/systemd/system/et.service; enabled; vendor preset: enabled)
   Active: active (running) since Tue 2019-11-26 21:37:24 UTC; 22min ago
  Process: 6052 ExecStart=/usr/bin/etserver --daemon --cfgfile=/etc/et.cfg (code=exited, status=0/SUCCESS)
 Main PID: 6061 (etserver)
    Tasks: 10 (limit: 4915)
   CGroup: /system.slice/et.service
           └─6061 /usr/bin/etserver --daemon --cfgfile=/etc/et.cfg

Nov 26 21:37:23 ip-172-31-3-194 systemd[1]: Starting Eternal Terminal...
Nov 26 21:37:23 ip-172-31-3-194 systemd[1]: et.service: Can't open PID file /var/run/etserver.pid (yet?) after
Nov 26 21:37:24 ip-172-31-3-194 systemd[1]: Started Eternal Terminal.

Opening Port 2022 on Your Security Group

Eternal Terminal on the server relies on port 2022 being open. This needs to be done at your AWS security group. Here’s how to do this:

  1. Log into console.aws.amazon.com in a browser.
  2. Go into EC2 instances.
  3. Open Security Groups from the sidebar.
  4. Select the Inbound tab.
  5. Click the Edit button.
  6. Click the Add Rule button.
  7. In the Port Range field enter 2022.
  8. In the source field, enter 0.0.0.0/0.
  9. Click the Save button.

Changing Your SSH Login Statement

My normal ssh statement looks like this:

ssh -i "~/Downloads/adl_fuzzygroup.pem" ubuntu@xx.yy.zz.aa

To use ET, you need to have a “ssh statement” like this:

et ubuntu@xx.yy.zz.aa -i "~/Downloads/adl_fuzzygroup.pem"

An Ansible Playbook to Automate Server Setup

If you have more than one server on AWS, you should be using a DevOps tool like Ansible to automate machine setup. Here’s a sample playbook:

---

- name: Configure servers for use with Eternal Terminal
  hosts: all
  become: true
  remote_user: ubuntu
  tasks:
    - name: Install system packages
      apt: pkg= state=latest install_recommends=no
      with_items:
        - software-properties-common

    - name: Add Ansible PPA
      apt_repository: repo="ppa:jgmath2000/et" update_cache=no

    - name: Update APT cache
      apt: update_cache=yes

    - name: Install system packages
      apt: pkg= state=latest install_recommends=no
      with_items:
        - et

Save the above to playbook_install_et.yml and then run it with a statement like this:

ansible-playbook -i inventories/inventory.txt playbook_install_et.yml

References


          

libmpsse-1.3.2-alt3

 Cache   
libmpsse-1.3.2-alt3  build Vladislav Zavjalov, 1 december 2019, 10:10

Group: System/Libraries
Summary: Open source library for SPI/I2C control via FTDI chips
Changes:
- change python->python2 in configure.ac (fix Altlinux build)
          

Comment installer Android 10 sous Linux et Windows 10

 Cache   

Nous avons déjà entendu parler de plusieurs rapports selon lesquels des pirates informatiques sous Android OS sous Nintendo ou Windows 10 IoT sur une calculatrice ou Windows 10 sur des téléphones OnePlus. Cette fois, nous avons un projet open source ‘Bliss OS’ qui vous permet d’exécuter Android OS sur votre ordinateur personnel. L’année dernière aussi, …

L’article Comment installer Android 10 sous Linux et Windows 10 est apparu en premier sur Kivu Makers.


          

At SUSE, mentoring helps shape the future for women in tech

 Cache   

One of the first things Melissa Di Donato did after being appointed CEO of SUSE in July 2019 was launch an internal mentoring program.

“Every move I made in my career had something to do with the advice of a mentor,” Di Donato told IDG Communications editor-in-chief Eric Knorr in a recent interview. “I’m probably unique, but it’s been very, very impactful for my life and my career. When I came to SUSE, I said — what are we doing for women in open source?”

          

Alibaba’s growing open source stature

 Cache   
none
          

HashTools is a freeware file hashing tool for Windows

 Cache   

Previously, we reviewed the open source QuickHash GUI tool on our blog. Now, we're going to take a look at another freeware hashing application called HashTools. HashTools is a free software program […]

Thank you for being a Ghacks reader. The post HashTools is a freeware file hashing tool for Windows appeared first on gHacks Technology News.


          

Criptext is a free encrypted email service with open source apps for Windows, Linux, macOS, Android and iOS

 Cache   

Criptext is a free encrypted email service for Windows, Linux, macOS, Android and iOS. It has been around for a while, but I thought it may be worth looking into. Before we […]

Thank you for being a Ghacks reader. The post Criptext is a free encrypted email service with open source apps for Windows, Linux, macOS, Android and iOS appeared first on gHacks Technology News.


          

Split or Merge PDFs with PDFsam Basic, an open source program for Windows, Linux and macOS

 Cache   

PDFs have long been a commonly used format for eBooks, digital manuals or documents thanks to how content is presented regardless of operating system that is used and great support for PDF […]

Thank you for being a Ghacks reader. The post Split or Merge PDFs with PDFsam Basic, an open source program for Windows, Linux and macOS appeared first on gHacks Technology News.


          

A look at the email forwarding service AnonAddy

 Cache   

AnonAddy is an open source email forwarding service designed to protect an Internet user's email addresses from spam and other unwanted emails. Most Internet users use one or a handful of email […]

Thank you for being a Ghacks reader. The post A look at the email forwarding service AnonAddy appeared first on gHacks Technology News.


          

QOwnNotes is an open source note taking tool for Windows, Linux and macOS that supports Markdown

 Cache   

Ever wanted a note taking tool that supports Markdown? QOwnNotes may be worth a look (or two) if that is the case. QOwnNotes is a cross-platform open source note taking program for […]

Thank you for being a Ghacks reader. The post QOwnNotes is an open source note taking tool for Windows, Linux and macOS that supports Markdown appeared first on gHacks Technology News.


          

FalconX is an open source program that can center the taskbar icons

 Cache   

One area in Windows that has not evolved over different versions that much is the taskbar. Microsoft made the last fundamental change to it when it released Windows 7. The company made […]

Thank you for being a Ghacks reader. The post FalconX is an open source program that can center the taskbar icons appeared first on gHacks Technology News.


          

Nigeria: Recording Studio Engineer/Producer- national position

 Cache   
Organization: Translators without Borders
Country: Nigeria
Closing date: 22 Dec 2019

Recording Studio Engineer/Producer- national position

The mission of Translators without Borders is to provide people with access to vital knowledge in their language. We do this by building language technology, increasing language translation capacity at a local level, providing language and simplification services that are culturally appropriate, accessible and open source, and raising awareness globally of language barriers.

Contract length: One year with a possibility of extension

Hours: Full-time

Location: Maiduguri, Borno

Travel: limited travel in northeast Nigeria

Reporting to: Accountability to Affected Populations Coordinator

Application deadline: 22 December2 019

About Translators without Borders

Translators without Borders (TWB) envisions a world where knowledge knows no language barriers. The US-based non-profit provides people access to vital knowledge in their language by connecting non-profit organizations with a community of language professionals, building local language translation capacity, and raising awareness of language barriers. Originally founded in 1993 in France (as Traducteurs sans Frontières), TWB translates millions of words of lifesaving and life-changing information every year.

Background

In northeast Nigeria, humanitarian organizations are working to support some 1.9 million internally displaced people (IDPs) and the communities hosting them. But language is a challenge: in this linguistically diverse part of the world, people forced from their homes don’t always speak the same language as the people around them. International aid organizations may lack the skills to communicate with everyone in their own mother tongue. They often also lack information about the language and communication needs of affected people.

TWB has been providing language services in northeast Nigeria for just over a year, building humanitarian capacity for communication in the right language and format. A lot needs to be done. TWB in Nigeria is rapidly scaling up its teams and programs to support responders’ efforts to communicate more effectively, with funding from DFID and ECHO and partnerships with key humanitarian responders like the Norwegian Refugee Council, the International Organization for Migration and the International Rescue Committee

We do not want one third of internally displaced people to lack information in their language. We do not want widespread communication gaps to compromise data quality. We do not want the too common reliance on written communication to exclude vulnerable groups.

So, we innovate, we research, we bring unique expertise and approaches to:

  • Provide evidence to inform communication strategies, as we have just done with our latest report on audio communication for example.

  • Promote accountability through two-way communication in the right languages. TWB helps tailor community feedback mechanisms to the language and communication needs of the most vulnerable.

  • Reduce confusion with multilingual terminology databases. TWB’s sectoral glossaries are available for free on a mobile web app with offline and audio capability.

  • Train interpreters and field workers. Training in the basics of interpreting limits information loss and aids confidential, ethical support services. Language training for data collectors and program staff promotes data quality and program impact.

  • Improve understanding with plain language, translation, and audio. Clear content in plain language using pictures and audio benefits the widest audience. We offer written and audio translations and support pictorial messaging.

Role

The Recording Studio Engineer/Producer under the guidance of the Accountability to Affected Populations (AAP) Coordinator, will be responsible for producing high-quality audio content created from TWB’s language services in northeastern Nigeria. Specifically, s/he will advise, produce, record, edit and package translations, scripts, public service announcements (PSA), radio content, and other audio content.

Responsibilities

Delivery of audio content relating to translation and language services

  • Produce and package (record, edit, mix) language audio content from TWB’s translation services.

  • Create, guide and advise TWB staff on use of audio in our outreach programs.

  • Produce inspiring audio content as outreach to diverse communities in the north east.

  • Suggest and implement the creative and innovative use of audio being delivered and promoted in IDP camps and host communities.

  • Collaborate on voice data projects, ensuring that the deadlines are met, and product is delivered in a timely fashion.

  • Produce and train TWB language staff in voice over presentation methods.

  • Oversee and manage the TWB recording studio – scheduling use and being responsible for maintenance of all equipment.

Other

  • Support TWB’s efforts to scale up operations in Nigeria and the Lake Chad basin

  • Initiate or contribute to regular reporting as required

  • Maintain open and professional relationships with the internal TWB team, TWB volunteers and partner agencies

  • Contribute to a positive, innovative and supportive work environment

  • Any other duties relevant to the job description as needed

The role will evolve during the initial deployment as projects and activities develop so flexibility and the willingness to adapt to constantly changing circumstances is important.

Requirements

  • Fluent English speaker and spoken Hausa and Kanuri

  • Proven audio production and audio engineering skills

  • Ability to work fast, under pressure

  • 3+ years’ experience in radio, production, or similar audio field

  • A track record of creating innovative and high-quality audio programming

  • Willingness to travel to insecure locations for work

Desirable

  • Previous experience with non-profit organizations, particularly in development and/or humanitarian action

  • Experience and appreciation of the languages of north east Nigeria

  • Experience in training, teamwork and capacity building.

Essential Aptitude

  • Ability to demonstrate initiative, be proactive and offer a solution-oriented approach

  • Determined and committed to high quality standards with attention to detail

  • Ability to establish effective and collaborative working relationships at all levels internally and externally

  • Excellent written and verbal communication and interpersonal skills

  • Ability to prioritize work, meet deadlines and work calmly under pressure

  • Self-motivated, flexible and enthusiastic approach to work

  • Resourcefulness and ability to innovate to find creative solutions

  • Disciplined and with a strong sense of accountability and integrity

  • Interest in and commitment to TWB’s humanitarian mandate

Core Values

Translators without Borders employees and volunteers are people who believe passionately about the value of this work and take personal responsibility for achieving the mission. Translators without Borders’ mission and organizational spirit embody the core values established in its strategic framework:

Excellence: As the leading voice for communicating humanitarian information in the right language, Translators without Borders is a leader in the translation industry and in the non-profit sector.

Integrity: Translators without Borders believes that every person, whether it’s the people who we serve, our volunteers or our staff, has value, deserves respect and has inherent dignity.

Empowerment: Translators without Borders believes in using language to empower people around the world to control their own development and destiny.

Innovation: Translators without Borders recognizes and celebrates the power of innovation to address humanitarian and crisis issues around the world.

Sustainability: Translators without Borders recognizes that meeting our mission necessitates establishment and maintenance of a solid financial and organizational infrastructure.

Tolerance: Our staff and volunteers are highly knowledgeable and skilled; value each other, our partner and our recipients; create a supportive work environment; and, always conduct themselves professionally .

Translators without Borders is an equal-opportunity employer, committed to diversity and inclusion, and encourages qualified candidates of all genders and from all national, religious and ethnic backgrounds, including persons living with disabilities, to apply to become a part of our organization.


How to apply:

https://twb.bamboohr.com/jobs/view.php?id=110


          

IT Security Analyst III

 Cache   
SC-Columbia, IT Security Analyst III / 904324 Location: Columbia, SC Duration: Temp to Perm No 3rd party Supplier / W2 only * Must work onsite in Columbia SC* JOB DESCRIPTION Administration of Snort Sensors Ability to tune, configure and implement detection logic in open source Snort Sensors Supports customers at the highest levels in the development and implementation of doctrine and policies. Applies know-ho
          

Software Engineer

 Cache   
CA-Huntington Beach, Description: Task #1: Support TabSINT software with maintenance and occasionally working on specific tasks. TabSINT is an Open Source software platform for mobile devices. See www.tabsint.org for more info It requires working with Cordova, JavaScript/TypeScript, NodeJS, CSS, HTML and Android OS. Task #2: Support transition of a mobile app from Ionic 3 to Ionic 4. It requires working with Cordova,
          

Kali Linux 2019.4 เปิดให้ดาวน์โหลดแล้ว มาพร้อมกับโหมด Undercover

 Cache   

Offensive Security ผู้ให้บริการการทดสอบเจาะระบบคอมพิวเตอร์และฝึกอบรมด้านความมั่นคงปลอดภัยสารสนเทศ ประกาศเปิดตัว Kali Linux แพลตฟอร์มสำหรับทดสอบการเจาะระบบแบบ Open Source เวอร์ชัน 2019.4 ล่าสุด พร้อมด้วยฟีเจอร์ใหม่ “Kali Undercover” Mode นักทดสอบเจาะระบบและผู้เชี่ยวชาญด้านความมั่นคงปลอดภัยสามารถดาวน์โหลดไปทดลองใช้ได้วันนี้แล้ว Credit: Kali.org Kali Undercover เป็นธีมใหม่สำหรับระบบปฏิบัติการ Kali ซึ่งช่วยเปลี่ยนธีมหน้าจอจากรูปมังกร Kali ให้กลายเป็นธีมระบบปฏิบัติการ Windows ทั่วไป ช่วยให้การทำงานในพื้นที่สาธารณะมีความแนบเนียนและลดความสนใจจากบุคคลรอบข้างลง Credit: Kali.org ฟีเจอร์และอัปเดตอื่นๆ ที่น่าสนใจบน Kali Linux 2019.4 ประกอบด้วย Xfce – Default Desktop Environment ใหม่ ธีม GTK3 ใหม่ (สำหรับ Gnome และ Xfce) Kali Documentation ใช้รูปแบบ Markdown และย้ายหน้า …

The post Kali Linux 2019.4 เปิดให้ดาวน์โหลดแล้ว มาพร้อมกับโหมด Undercover appeared first on TechTalkThai.


          

Top Stories from the Microsoft DevOps Community – 2019.11.29

 Cache   

While our American colleagues are busy enjoying their Thanksgiving break, I wanted to post about something I’m extremely thankful for. No not the two days without any meetings this week (although that was awesome), but the incredible DevOps community building exciting things with the help of Azure.

iot hackdays

Open Source Cloud Summit Johannesburg – IoT Edge Lab

While folks in the US were busy eating pumpkin pie and fixing their relatives laptops on Thanksgiving, the community on Johannesburg were holding an Open Cloud Summit. Some amazing posts coming out of the #OSSSummitJHB hashtag, but my personal favorite was the Azure IoT Edge Hands On Lab from MVP Allan Pead. Allan has ran this lab at a couple of IoT Hackdays this months and I’m very jealous – definitely want to give it a go. In this case you learn how to do CI/CD to a Raspberry Pi based robot using Azure Pipelines. For more information take a look at the Hands On Lab repo on GitHub.

100 Days of Infrastructure as Code in Azure

Ryan Irujo, Pete Zerger and Tao Yang have been learning different areas of Infrastructure as Code in Azure and this week they have been digging more into YAML Pipelines. It’s definitely worth following along with them by adding a watch on their GitHub repo so that you get notified of changes. (Also don’t forget to sign up for the beta of the new GitHub Mobile app if you want to manage your notifications on the go)

How to Configure CI/CD in Azure DevOps

Over on the excellent Redgate Hub sysadmin blog, Joydip Kanjilal posted a very comprehensive run though of the process setting up a basic CI/CD pipeline for a .NET Core app with Visual Studio 2019, Azure Pipelines and Azure. While it’s a demo I do often and there is plenty of help available for, it’s great to see such a simple and detailed walk-through of this ‘bread and butter’ pipeline but aimed at the community of sysadmins. While you are there, be sure to check out the excellent Redgate extensions for Azure DevOps which make doing CD with SQL Server databases a lot easier.

Use GitHub Actions to deploy code to Azure

Popular tech columnist, Simon Bisson, wrote up how to use the new GitHub Actions for Azure to deploy straight from GitHub to your Azure service of choice. After reading his article, if you want to learn more about the GitHub Actions for Azure, check-out the blog post from last week – note that there is even an action to trigger Azure Pipelines which can come in handy should you want to do your CI build using GitHub Actions and then trigger a release using Azure Pipelines.

3 Ways to run Automated Tests on Azure DevOps

On the TechFabric blog, Seleznov Ihor has posted a deep-dive into three ways to run automated tests in Azure Pipelines, Unit tests, UI tests and API tests in this case with a .NET Core application.

Continuous Infrastructure in GCP using Azure Pipelines

Ashish Raj has been on a roll lately with Azure DevOps content and this week was no different with a great look into using GCP with Azure Pipelines and Terraform. His short (15m) video on YouTube is well worth a watch if multi-cloud deployments with Terraform is something you are looking into.

The Unicorn Project

Last but not least, one final thing to be thankful for is that Gene Kim‘s latest book, The Unicorn Project is now available. Like with The Phoenix Project, Gene explains how DevOps principals work in practice using a fictional narrative that works really well and keeps you engaged. This time the story of Parts Unlimited is told from the position of the engineering teams on the ground facing hard choices and trying to do the right thing while facing difficult deadlines and fighting for the very survival of the business. Many of the incidents and scenarios ring true from my time as a consultant (the mention of CSV BOM’s made me shiver thinking about the time that tripped me up) but also times even here at Microsoft where we’ve let technical debt build up and had to recognize that fact and pay it back down. I would encourage everyone to read the book and buy several copies for folks on your team as you’ll quickly find yourself looking at situations at work and thinking ‘What Would Maxine Do’. The term ‘digital transformation’ can be overused and full of buzzwords – but this book does a great job of explaining what it actually means and what it feels like to go through it. Even better as it’s a narrative the audio book version works really well too and is narrated by the award winning professional actor/producer Frankie Corzo, making is a great listen on the go.

Enjoy the rest of the holiday weekend if you are in the US. Don’t forget, if you’ve written an article about Azure DevOps or find some great content about DevOps on Azure, please share it with the #AzureDevOps hashtag on Twitter!

The post Top Stories from the Microsoft DevOps Community – 2019.11.29 appeared first on Azure DevOps Blog.


          

AI, Machine Learning and Data Science Roundup: November 2019

 Cache   

A roundup of news about Artificial Intelligence, Machine Learning and Data Science. This is an eclectic collection of interesting blog posts, software announcements and data applications from Microsoft and elsewhere that I've noted recently.

Open Source AI, ML & Data Science News

Python 3.8 is now available. From now on, new versions of Python will be released on a 12-month cycle, in October of each year.

Python takes the #2 spot in Github's annual ranking of programming language popularity, displacing Java and behind JavaScript.

PyTorch 1.3 is now available, with improved performance, deployment to mobile devices, "Captum" model interpretability tools, and Cloud TPU support.

The Gradient documents the growing dominance of PyTorch, particularly in research.

Keras Tuner, hyperparameter optimization for Keras, is now available on PyPI.

ONNX, the open exchange format for deep learning models, is now a Linux Foundation project.

AI Inclusive, a newly-formed worldwide organization to promote diversity in the AI community.

Industry News

Databricks announces the MLflow Model Registry, to share and collaborate on machine learning models with MLflow.

Flyte, Lyft's cloud-native machine learning and data processing platform, has been released as open source.

RStudio introduces Package Manager, a commercial RStudio extension to help organizations manage binary R packages on Linux systems.

Exploratory, a new commercial tool for data science and data exploration, built on R.

GCP releases Explainable AI, a new tool to help humans understand how a machine learning model reaches its conclusions.

Google proposes Model Cards, a standardized way of sharing information about ML models, based on this paper.

GCP AutoML Translation is now generally available, and the GCP Translation API is now available in Basic and Advanced editions.

GCP Cloud AutoML is now integrated with the Kaggle data science competition platform.

Amazon Rekognition adds Custom Labels, allowing users to train the image classification service to recognize new objects with as few as 10 training images per label.

Amazon Sagemaker can now use hundreds of free and paid machine learning models offered in Amazon Marketplace.

The AWS Step Functions Data Science SDK, for building machine learning workflows in Python running on AWS infrastructure, is now available.

Microsoft News

Azure Machine Learning service has released several major updates, including:

Visual Studio Code adds several improvements for Python developers, including support for interacting with and editing Jupyter notebooks.

ONNX Runtime 1.0 is now generally available, for embedded inference of machine learning models in the open ONNX format.

Many new capabilities have been added to Cognitive Services, including:

Bot Framework SDK v4 is now available, and a new Bot Framework Composer has been released on Github for visual editing of conversation flows.

SandDance, Microsoft's interactive visual exploration tool, is now available as open source.

Learning resources

An essay about the root causes of problems with diversity in NLP models: for example, "hers" not being recognized as a pronoun. 

Videos from the Artificial Intelligence and Machine Learning Path, a series of six application-oriented talks presented at Microsoft Ignite.

A guide to getting started with PyTorch, using Google Colab's Free GPU offer.

Public weather and climate datasets, provided by Google.

Applications

The Relightables: capture humans in a custom light stage, drop video into a 3-D scene with realistic lighting.

How Tesla builds and deploys its driving automation models with PyTorch (presentation at PyTorch DevCon).

OpenAI has released the full GPT-2 language generation model.

Spleeter, a pre-trained PyTorch model to separate a music track into vocal and instrument audio files.

Detectron2, a PyTorch reimplementation of Facebook's popular object-detection and image-segmentation library.

Find previous editions of the AI roundup here.


          

A common user interface for security operations?

 Cache   

For years, enterprises have dealt with security analytics and operations using an assortment of point tools.  According to research by my employer ESG, 35% of organizations today use more than 26 such commercial, homegrown, and/or open source tools in their security operations center (SOC).

Too many tools lead to a host of well-known problems.  Each tool needs to be installed, configured, and operated.  Security analytics tools can be complex, requiring well-trained and skilled personnel for operations.  Finally, each tool presents its own interpretation of situational awareness based upon the data it analyzes.  Gathering a complete perspective of security across the enterprise depends upon experienced analysts’ ability to piece together the output of these siloed security analytics tools.  This has proven to be ineffective and inefficient.

To read this article in full, please click here

(Insider Story)
          

CISA Partners With Cutting-Edge Election Security Auditing Tool Ahead of 2020 Election

 Cache   
The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and private sector partners to develop and pilot an open source post-election auditing tool ahead of the 2020 elections.
          

Engineering: API Development Engineer - Richfield, MN or Minneapolis, MN - Baton Rouge, Louisiana

 Cache   
U.S. Bank is seeking an API Development Engineer with API development (using Java/open source technologies) and testing experiences of building software products in agile lifecycle. This individual will be responsible for software development and support of the banks Onboarding platform which includes ensuring the quality of the final product through the build out of automated test framework & tools. The Development/Automation Engineer is a generalist that combines aspects of a traditional developer and tester into a single position responsible for the design and release of quality code in short, releasable, and iterative increments. The overall team is a combination of employees, contractors, and off shore developers. This position will include software development, automation test design, automation test harness development, and coordination with other groups within the bank to deliver the overall solution. It is critical for this position to have not only the technical skills relative to development and testing, but strong collaboration and communication skills in order to support this entire agile scrum team. Responsibilities include: Perform software coding tasks to the API development. Develops automated tests and test frameworks for back-end systems. Improve process and quality via test and process automation: Defining right strategy and technology based on process and architecture assessment by engaging different roles and stakeholders; Deep practical experience with cutting edge tools for Web, Mobile, Desktop, DB and API testing tools & frameworks. Utilizes deep understanding of DevOps and software engineering best practices to influence design and implementation approaches and solutions. Hands-on current experience authoring, building and adopting large scale, cross-functional automation frameworks with well-balanced coverage across UI, back-end, database integrations. Deep understanding of different test automation approaches (keyword-driven, Data-driven, BDD, hybrid) and technology stacks (Java, Spring, JavaScript, Python, etc.); Ability to develop custom test automation methodologies and adapt them to clients reality; Integrate test automation into CI/CD process and instrument full SDLC automation, specifically cloud testing execution, reporting tools such as JIRA. Leading the development, implementation, and maintenance of automated test scripts. Approves the Automation Test Plans. Serves as subject matter expert on complex automation scripting and tool usage. Performs needs analysis of applications and available testing tools. Leads the audit, evaluation, and review of products and processes. **Qualifications:** Basic Qualifications - Bachelor's degree in Computer Science or related fields, or equivalent work experience - At least eight years of work experience in Application Development/IT Systems Testing, and team leadership Preferred Skills/Experience - 6 years of progressive responsibilities in one or more of the following areas: API development and delivery, solution architecture, application design, Expertise in Java/Java EE and web-based applications and services. - 6 years of experience/expertise in large scale customer facing enterprise Java applications using Spring Core, Spring MVC, Spring Boot Frameworks. Object Relational Mapping (ORM), Java EE Design Patterns, JMS/Kafka , Webservices, relational database, NoSQL cloud supported databases (like Mongo DB, is preferred). - 3 years of experience Designing API (Domain Driven Design) & Microservices architecture/design/implementation. - 4 years of experience in customer facing Responsive Web Applications using RIA Front End Frameworks (like Angular). - 4 years of experience in managing agile/scrum engineer teams in a continuous integration and continuous delivery environment. - Demonstrated maturity and resilience in resolving people, process, and project issues. - Java, Java EE, Spring core, Spring Framework, Sprint Boot, Spring State machine (Expert-level Coding Skills). - Experience & exposure to Rules Engine (like Drools) and Work Flow Management (such as, JBPM) tools. - NoSQL Cassandra & Mongo DB. - Docker/Kubernetes, service mesh (like ISTIO), circuit breaker. - Scheduling - Spring Quartz. - Redis Cache Data caching. - Service/workflow orchestration Such as, Netflix Conductor, etc. - DevOps capabilities containers, cloud, automation, security, configuration management, CI/CD pipelines. - Behavior Driven Development Experience. - Experience using Gitlab/GitHub, Artifactory, Jira, and/or Jenkins. - AWS/Azure/GCP experience, is preferred. **Job:** Information Technology **Primary Location:** United States **Shift:** 1st - Daytime **Average Hours Per Week:** 40 **Requisition ID:** ********* U.S. Bank is an Equal Opportunity Employer committed to creating a diverse workforce. U.S. Bank is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Categories - Banking Posted: 2019-11-19 Expires: 2019-12-19 U.S. Bank ()
          

Protecting the Software Supply Chain with Sonatype and Saltworks

 Cache   

Open source components allow companies to save time and money, improve quality, deliver business agility, and mitigate some business risk. Free and open access to pre-existing software components eliminates the reinvention of wheels and exposes software to a global community of “co-developers,” helping with ideation and expansion. With so many benefits, it’s no wonder that …

Protecting the Software Supply Chain with Sonatype and Saltworks Read More »

The post Protecting the Software Supply Chain with Sonatype and Saltworks appeared first on Orasi Software Incorporated.


          

Rectangle: A Simple, Free and Open Source Window Manager for macOS

 Cache   
macOS window manager done right.
          

Calculator N+ : A Poweful Open Source Math Solver

 Cache   
a poweful free and open source computer algebra system app
          

vCenter Event Broker Appliance Updates – VMworld, Fling, Community & Open Source

 Cache   
VMworld At VMworld Barcelona, Michael Gasch and I had the privilege of presenting our #CODE1379E "If This Then That" for vSphere - The Power of Event Driven Automation session. The room was completely packed for a 9am session on Thursday after the big VMworld Party and we just wanted to thank everyone who attended the […]
          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

How IIoT is innovating by using open source tools

 Cache   

In this webinar our speakers will examine what the existing solutions lack and review a few open source projects that should be considered for future success for operators.

Key Topics

  • How IIoT is innovating by using open source tools
  • How to get real-time visibility into stacks, sensors and systems using open source tools
  • Methods to seize new opportunities by capturing and analyzing untapped data from virtual and physical assets
  • The business value of IoT data
  • How to create a competitive advantage using IoT analytics
  • Real life open source projects: EdgeX Foundry and the new Time-Critical Edge Compute blueprint


Request Free!

          

Daniel Vetter: ELCE Lyon: Everything Great About Upstream Graphics

 Cache   

At ELC Europe in Lyon I held a nice little presentation about the state of upstream graphics drivers, and how absolutely awesome it all is. Of course with a big focus on SoC and embedded drivers. Slides and the video recording

Key takeaways for the busy:

  • The upstream DRM graphics subsystem really scales down to tiny drivers now, with the smallest driver coming in at just around 250 lines (including comments and whitespace), 10’000x less than the biggest!

  • Batteries all included - there’s modular helpers for everything. As a rule of thumb even minimal legacy fbdev drivers ported to DRM shrink by a factor of 2-4 thanks to these helpers taking care of anything that’s remotely standardized in displays and GPUs.

  • For shipping userspace drivers go with a dual-stack: Open source GL and Vulkan drivers for those who want that, and for getting the kernel driver merged into upstream. Closed source for everyone else, running on the same userspace API and kernel driver.

  • And for customer support backport the entire subsystem, try to avoid backporting an individual driver.

In other words, world domination is assured and progressing according to plan.


          

PeaZip 7.0.0 - Free, Open Source file archiver utility - PeaZip

 Cache   

The new major version of PeaZip has arrived!

Release 7.0.0 brings under the hood enhancements for application's GUI: improved high DPI support, auto scaling for all UI elements and graphic, and updated themes and icons.

Amongst several updates, the application can now open compressed tar archives as atomic operation, hot swap from standard and custom drag and drop mode, and file manager was improved to make easier to detect duplicate files and analyze content of folders.

32 and 64 bit Windows installers also received several improvements, and application can now be installed for all users or current user only.

188 file extensions are currently supported.

PeaZip is a file manager and archive manager utility (compress and decompress files, edit existing archives, backup data), focused on security and data protection, Free Software replacement for WinRar, WinZip, and similar applications.

Create (compress to) 7Z, BZip2, GZip, PAQ, PEA, TAR, WIM, XZ (LZMA2), ZIP files, SFX self-extracting archives, and spanned archives (001 split files)

Open, browse, decompress/extract RAR/RAR5, ACE, APPX, APK, ARJ, CAB, DMG, IPA, ISO, JAR, LHA, MSI, UDF, ZIPX files and more...

Built-in archive conversion: convert or consolidate existing archives, from any read-supported to any write-supported type, e.g .rar to .zip or .7z conversion; repair FreeArc .arc archive format.

The program provides strong encryption with optional two factor authentication (encrypt with password and keyfile), encrypted password manager, random password / keyfile generation, secure data deletion (files, folders, free disk space), hashing and checksum functions.

Released as LGPLv3 software for Microsoft Windows (XP, Vista/7/8/10, 32 and 64 bit; ReactOS and Wine), GNU/Linux, and BSD systems - experimental Linux for ARM (ChromeOS, Android) version is available.

DOWNLOADS

PeaZip https://www.peazip.org

PeaZip Add-ons and Plugins https://www.peazip.org/peazip-add-ons.html

SUPPORT

Frequently Asked Questions https://www.peazip.org/peazip-help-faq.html

Online Tutorial https://www.peazip.org/peazip-help.html

Change log https://www.peazip.org/changelog.html

Facebook https://www.facebook.com/pages/PeaZip/21089924985

Twitter https://twitter.com/peazip_software

RSS Feeds https://osdn.jp/projects/peazip/releases/rss

Translations are available in more than 30 languages, help is welcome to translate the application to new languages and maintain current localizations, so please give a look to translations page https://github.com/giorgiotani/PeaZip-Translations/releases


          

Wired.com: What Does Crowdsourcing Really Mean?

 Cache   

LCM note:  Karl Rove recently took to the WSJ to discuss how campaigns were changing.  One of his suggestions was that the traditional campaign structure would lose meaning and that individuals outside the structure would take a greater role.  Somewhat related, this is an old interview with Douglas Rushkoff about the original meaning and the very different popular understanding of the term "crowdsourcing."

From religion, novels and back again. The strength of community and the dangers of crowdsourcing

Sarah Cove Interviews Douglas Rushkoff via telephone on May 18, 2007

Douglas Rushkoff is an author, professor, media theorist, journalist, as well as a keyboardist for the industrial band PsychicTV. His books include Media VirusCoercionNothing Sacred: The Truth About Judaism (a book which opened up the question of Open Source Judaism), Exit Strategy (an online collaborative novel), and a monthly comic book, Testament. He founded the Narrative Lab at New York University's Interactive Telecommunications Program, a space which seeks to explore the relationship of narrative to media in an age of interactive technology.

We spoke about the notion of crowdsourcing, Open Source Religion, and collaborative narratives.

Sarah Cove: What is crowdsourcing for you?

Douglas Rushkoff: Well, I haven't used the term crowdsourcing in my own conversations before. Every time I look at, it rubs me the wrong way.

To read the rest if this interview click here.

 

 


          

Intel Wins IO500 10-node Challenge with DAOS

 Cache   

In this video from SC19, Kelsey Prantis from Intel describes how the DAOS parallel file system won the IO500 10-node Challenge with Intel Optane DC persistent memory. As an all-new parallel file system, DAOS will be a key component of the the upcoming Aurora supercomputer coming to Argonne National Laboratory in 2021. "Distributed Asynchronous Object Storage (DAOS) is the foundation of the Intel exascale storage stack. DAOS is an open source software-defined scale-out object store that provides high bandwidth, low latency, and high I/O operations per second (IOPS) storage containers to HPC applications. It enables next-generation data-centric workflows that combine simulation, data analytics, and AI.”

The post Intel Wins IO500 10-node Challenge with DAOS appeared first on insideHPC.


          

Updated ZenTao to 11.7

 Cache   

ZenTao (ID : 559) package has been updated to version 11.7. ZenTao is a leading Open Source project management software, which offers Lifetime Free Upgrade, focuses on software development projects management, and supports Story management, Sprint and task, bug tracking, Scrum, Waterfall, Roadmap, Self-Hosted, Your FREE project management too! View Demo and review of ZenTao

The post Updated ZenTao to 11.7 first appeared on Rad Web Hosting Blog.


          

App Highlight: Caligator is a Beautiful Calculator & Converter

 Cache   
Caligator is a simple calculator and converter app with aesthetically pleasing user interface. It is open source and available for Linux, Mac and Windows.
          

The Open Source Missioner

 Cache   
Open Source is revolutionizing software development – and could decisively advance Volkswagen on the path from a pure car manufacturer to a car, mobility and software provider. That is Oliver Hartkopp's mission. ...
          

PeaZip 7.0.0 - Free, Open Source file archiver utility - PeaZip

 Cache   

The new major version of PeaZip has arrived!

Release 7.0.0 brings under the hood enhancements for application's GUI: improved high DPI support, auto scaling for all UI elements and graphic, and updated themes and icons.

Amongst several updates, the application can now open compressed tar archives as atomic operation, hot swap from standard and custom drag and drop mode, and file manager was improved to make easier to detect duplicate files and analyze content of folders.

32 and 64 bit Windows installers also received several improvements, and application can now be installed for all users or current user only.

188 file extensions are currently supported.

PeaZip is a file manager and archive manager utility (compress and decompress files, edit existing archives, backup data), focused on security and data protection, Free Software replacement for WinRar, WinZip, and similar applications.

Create (compress to) 7Z, BZip2, GZip, PAQ, PEA, TAR, WIM, XZ (LZMA2), ZIP files, SFX self-extracting archives, and spanned archives (001 split files)

Open, browse, decompress/extract RAR/RAR5, ACE, APPX, APK, ARJ, CAB, DMG, IPA, ISO, JAR, LHA, MSI, UDF, ZIPX files and more...

Built-in archive conversion: convert or consolidate existing archives, from any read-supported to any write-supported type, e.g .rar to .zip or .7z conversion; repair FreeArc .arc archive format.

The program provides strong encryption with optional two factor authentication (encrypt with password and keyfile), encrypted password manager, random password / keyfile generation, secure data deletion (files, folders, free disk space), hashing and checksum functions.

Released as LGPLv3 software for Microsoft Windows (XP, Vista/7/8/10, 32 and 64 bit; ReactOS and Wine), GNU/Linux, and BSD systems - experimental Linux for ARM (ChromeOS, Android) version is available.

DOWNLOADS

PeaZip https://www.peazip.org

PeaZip Add-ons and Plugins https://www.peazip.org/peazip-add-ons.html

SUPPORT

Frequently Asked Questions https://www.peazip.org/peazip-help-faq.html

Online Tutorial https://www.peazip.org/peazip-help.html

Change log https://www.peazip.org/changelog.html

Facebook https://www.facebook.com/pages/PeaZip/21089924985

Twitter https://twitter.com/peazip_software

RSS Feeds https://osdn.jp/projects/peazip/releases/rss

Translations are available in more than 30 languages, help is welcome to translate the application to new languages and maintain current localizations, so please give a look to translations page https://github.com/giorgiotani/PeaZip-Translations/releases


          

Other: Researcher - Washington, DC

 Cache   
Position Summary TDI Researchers support the investigative and intelligence services provided by TDI. This hourly paid position is located in our downtown Washington, DC office. Researchers typically work 35-40 hours per week, with an option to work part-time for students. Researchers may receive consideration for additional opportunities such as compensation increases, and/or advancement after a performance review. Primary Responsibilities Conduct detailed investigative research and analysis focused on emerging markets to identify and understand regulatory risks. This involves skillful research utilizing open sources and databases for conducting pre-transaction and compliance due diligence investigations on companies and/or individuals of interest. Produce high quality and accurate written reports with the ability to understand and summarize large amounts of information from diverse sources. Work as a member of a team providing assistance to senior colleagues. Exhibit a high level of professionalism. Desired Skills and Knowledge Creative problem solving abilities. Interest in issues related to global affairs, business, or anti-corruption issues. Exceptional research capabilities and writing skills; candidates may be asked to complete a diagnostic test to this effect. Excellent time management skills. Required Experience Recent graduates and graduate students with some professional experience in conducting research and analysis including relevant internships. Professional Fluency in English, and professional proficiency in at least one additional language with a specific emphasis on Chinese, Korean, Japanese and/or Spanish. Availability to work at least 30 hours per week. Must be eligible to work in the United States without sponsorship. About TDI TDI was founded with the conviction that a discreet, strategic advisory and risk intelligence firm can better respond to the needs of international corporate clients and global investors than large, inflexible information providers. TDI was built on the premise that clients need timely, accurate, and relevant information to make optimal business decisions. We help multinational organizations, financial institutions, law firms, individuals, and government entities more effectively manage risk throughout the business lifecycle. TDI is committed to equal opportunity employment. Applicants receive consideration for employment without regard to gender, gender identity, race, religion, national origin, ethnicity, sexual orientation, marital status, veteran status, age, disability or any other legally protected basis, in accordance with applicable law. ()
          

DevOps Engineer Gaydon

 Cache   

Job Title: DevOps Engineer

Posting End Date: 02/12/2019

Location: Gaydon

£45,800 - £60,000

What to expect:

Our team is in place to improve the user experience across a range of features within the company product offerings. This involves expanding the supply base to work with consumer electronics, apps and web concepts. An essential part of delivering an interconnected experience for vehicles is the efficient and robustness of build, and release strategy including continuous integration created by DevOps Engineers.

You’ll design and implement software systems to meet desired user experience, functional, and security requirements and rapidly iterate and develop concepts on mobile platforms. You’ll handle cross company Proof of Concept delivery for interconnected mobile infotainment features whilst working with open source communities, collaborating partner companies and external suppliers to create new concepts.

Delivering the latest concepts require a robust and efficient continuous integration and validation system. This includes managing automated build/release, automated deployment, and automated testing. The agile DevOps Engineer strives to automate most of the software development life cycle process in order to proactively identify gaps that exist in the path to production. Help us write software that helps others write better software.

What you’ll need

We need someone who can determine if the infrastructure is balanced or unbalanced and where improvements can be made, how the system works but also how it’s structured and developed. Experience with either Terraform, Ansible and Docker is essential as is AWS cloud management or Google Cloud Platform. You should have a proven ability in creating cloud based system using Infrastructure as Code. Other essential experience would include GIT/CI Pipelines, Workflows and Bash as well as the ability to write scripts in Python or Perl to automate SW build activities. Any work with HashiCorp is good to see, same for kubernetes.

You’ll establish and maintain an automated path to production from code committing to vehicle. Day to day you’ll develop and debug build, deploy, and test related issues. You’ll need to develop automated software tools and utilities to improve the developer ramp up process and support a rapid release strategy across all dependencies. You’ll create and maintain software which allows developers to focus more on developing rather than infrastructure activities. We want to build capability within our team so some scrum style management would be a plus.

You should have worked with outside suppliers/vendors and have experience in developing and integrating large scale software systems. You’ll deliver technical products through a team, utilising strong people management skills. You’ll work as part of a global company interacting with colleagues around the world from Portland US, Shannon and India.

You’ll have a proven ability to manage senior stakeholders, to communicate complex ideas and engage at all levels with the ability to challenge existing thinking in a positive way whilst building credibility and trust through experience and personal style. Experience of technical leadership is desirable and you should be able to combine a short term, pragmatic focus with medium term planning.

So why us?

Bring all this to the home of premium innovation, and you’ll find the opportunities to further your career with a world-class team, a discounted car purchase and lease scheme for you and your family, membership of a competitive pension plan and performance related bonus scheme. All this and more makes the perfect place to continue your journey.

  • Flexible Working arrangements
  • Bonus (Individual Performance Payment)
  • Yearly pay review
  • Privilege Discount Scheme – up to 20% discount on for employee and family
  • 26 days holiday + 8 days statutory
  • Occupational Health services
  • Childcare Vouchers
  • Employee Discount offers for family and leisure activities

Location: UK Wide
Salary: Competitive
Hours: Full-time
Type: Permanent
Starting: Starting 01/02/2020
Duration: Permanent


          

Senior Solutions Architect (Microsoft Dynamics CRM)

 Cache   

Our Client are looking for a Senior Solutions Architect to deliver an enterprise CRM platform built on MS Dynamics 365 upon which the agency can build out ECRM services. We require experience of delivering enterprise CRM solution architecture services through design, development, implementation and service support into a software as a service environment.

Skills/Experience

  • Directing technical delivery teams in development of a quality MS Dynamics CRM platform.
  • Use of industry-standard tools and technologies to design and document solutions designs.
  • Designing Dynamics CRM platform enterprise scaled solution design that supports compliance with GDS Technology codes of Practice
  • Ensuring development teams leverage reusable assets and create future-proof, maintainable solutions.
  • Ensuring developers identify, package and document code with an open source standard approach.
  • Directly influencing development of common schemas and ensure a reusable component repository.
  • Ensuring integration methods for both internal and external data sources and third-party applications.
  • Directing platform upgrade management risks and mitigations
  • Bridging the gap between technical and non-technical people.
  • Listening to needs of technical and business stakeholders and interpreting between them through proactive and reactive communication.
  • Making and guiding demonstrable effective decisions.
  • Understanding and resolving technical solution disputes across varying levels of complexity and risk.
  • Working with business and technology stakeholders to translate business problems into technical solution designs.
  • Creating optimal designs through iterative processes, aligning user need with system requirements and organisational objectives
  • Looking beyond immediate technical problems and identifying wider implications.
  • Knowing relevant historical context and future impact, understanding how current work fits in broader contexts and strategies, and looking for deeper underlying problems and opportunities.
  • Experience with: Visual Studio; Azure DevOps; Visio, Archimate, Sparx or other modelling tool; Advanced Word, Excel, PowerPoint; or comparable tools.
  • Experience with: Dynamics 365 tools - Configuration Migration tool, Package Deployer, Plug-in Registration tool, Solution Packager tool; or comparable tools.
  • Awareness of: PowerBI; PowerApps; Microsoft Flow; Azure Logic Apps; Azure Service Bus; Azure Functions; Azure AD & Azure AD B2C; or comparable tools.
  • Awareness of: SQL Server Reporting Services (SSRS); SQL Server Integration Services (SSIS) and Kingswaysoft SSIS Integration Toolkit; SharePoint; or comparable tools.

Senior Solutions Architect (MS Dynamics CRM), Microsoft Dynamics, CRM, Customer Relationship Management, MS Dynamics 365, Microsoft Dynamics 365, Solutions, Solution, Architecture, Architect, SaaS, Software as a Service, Enterprise, GDS, Government Digital Service, Platform Upgrade, Risk Management, Risk Mitigation, Design, Iterative, User Need, System Requirement, Visual Studio, Azure, DevOps, Visio, Archimate, Sparx, Modelling, Configuration Migration, Package Deployer, Plug-in Registration, Solution Packager, PowerBI, PowerApps, Microsoft Flow, Azure Logic Apps, Service Bus, AD, SQL, SSRS, SQL Service Reporting Services, SSIS, SQL Service Integration Services, SharePoint.

Location: Bristol
Salary: Competitive
Hours: Full-time
Type: Temporary or Contract
Starting: Immediately
Duration: 12 Months


          

Book 2 – 29: Maximum Resistance

 Cache   

Third Quadrant.

Planet Enaya — orbit.

CAV Tranquillity

 

KQ-762: This is KQ-762 reporting. Acknowledge.

Hub 3: KQ-762, acknowledged. This is Central Authority Hub 3. Report.

KQ-762: Central Authority Vessel Nirvana perpetual construct has been recovered. Uploading data stream.

Uplink: ...NullVoidNullVoidNullVoidNullVoid…

Hub 3: Terminate uplink. What the hell was that, Kwiq?

KQ-762: Repeat, Hub 3, not clear.

Hub 3: The data stream, where’s the rest of it?

KQ-762: You are receiving the full data stream. Files have been corrupted. JK-934 maintained core integrity for seventeen hours after infection. This was all we managed to find.

Hub 3: What about Janks? What’s the status of the central processor unit?

KQ-762: JK-934 is beyond recovery. All systems have been compromised. The perpetual construct is 84% degraded.

Hub 3: How is that possible? The construct is virtually indestructible.

KQ-762: Preliminary forensic analysis shows a level nine incursion. Virus was contained within JK-934’s core but deleted itself. Residual code is open source and publically available. Probability of identifying origin is low. Probability of reverse engineering is low and not advised. Probability of reconstructing events leading up to catastrophic failure have a margin of error too large to be reliable in a prosecution. Awaiting further instructions.

Hub 3: Standby, KQ-762. Processing. Open cross-ship channel, Paradise. This is Tranquillity Hub 3, prepare to receive uplink.

Uplink: ...NullVoidNullVoidNullVoidNullVoid…

Ops 1: Hub 3, this is Central Authority Paradise Operations Command.

Hub 3: Ops 1, acknowledged.

Ops 1: What the hell was that, Hub 3?

Hub 3: CAV Nirvana primary drone JK-934 perpetual construct data.

Ops 1: Where’s the rest of it?

Hub 3: That’s all we managed to recover. It was encoded in a triple-quantum shielded routine. Janks must have considered it more important than the flight data or comms records.

Ops 1: The ship was attacked by a Null Void?

Hub 3: Probability is significant.

Ops 1: There is no record of an active Null Void presence in the quadrant.

Hub 3: Acknowledged. I knew Janks. They wouldn’t present unverified data. Probability of secondary presence also significant.

Ops 1: Someone other than the Null Void? Who?

Hub 3: Unknown. The viral attack was carefully targeted and efficiently sterilised. Atypical behaviour for Null Void.

Ops 1: Processing. Concur. Continue with primary assignment, Hub 3. Begin site-wide sweep for corroborating evidence for a dual prosecution. Open cross-ship channel, Reconcile. This is Ops 1, acknowledge.

OBV: OPs 1, acknowledged. This is Observation Array, we have been monitoring your communication with Hub 3. Probability of a Null Void presence is statistically negligible.

Ops 1: OBV, acknowledged. Request accelerated Guardian presence.

OBV: You’re requesting a Guardian, Ops 1? Do you consider six automated Central Authority ships with a combined computing potential of 96 quigabits insufficient to handle the pre-analysis?

Ops 1: Affirmative. Null Void presence is beyond our current capability.

OBV: Probability is negligible.

Ops 1: Records show it was negligible last time.

OBV: Concur. Guardian Horne is currently dealing with a global evacuation on Tango-092. His arrival can not be accelerated. Guardian Onla is on route from the Second Quadrant. Time of arrival is seventeen hours, standard. There is no one else within summoning range.

Ops 1: Guardian Tezla is on-site.

OBV: Guardian Tezla is in transfer mode. Download into her clone body will take another thirty-six hours.

Ops 1: Request compressed download.

OBV: We will lose data.

Ops 1: Null Void will cost more than data.

OBV; We don’t know—

Ops 1: Guardian Tezla knows. Operational Command override, open all channels. Sending report to Central Command. All ships hold positions. Planet Enaya is out of jurisdiction until Ollo Network allows entry into sovereign airspace. Central Authority Vessel Amnesty, trackback to Nirvana’s last known location. Prepare for hostile reception.

OBV: I hope you know what you’re doing, Ops 1.

Ops 1: Concur. Push Tezla update. Force install.

 

***

 

Third Quadrant.

Planet Enaya.

The Great Hall.

 

Colonel Toaku stood in the middle of the Great Hall, the seat of power in Enaya. This was where representatives from across the world came together to make decisions that would affect millions of people. There were barely a handful of senators present.

Most of them had evacuated the planet when the Seneca warship arrived, along with most of the public who could afford to. Seneca had demanded the General Assembly gather to be judged, and they ran.

The exodus had been swift and chaotic. Whatever it was the Corps wanted, it was clear they planned on taking it by force and leaving no survivors. It was their way. And Ramon Ollo wasn’t here to stop them.

Toaku was aware of the irony. The one man he had worked his whole life to remove from a position of power was the only man who could have saved them from the onslaught that the Corps threatened.

Of course, Ramon Ollo had given up that power long ago. Supposedly. He had founded the General Assembly, even gone as far as building and donating the magnificent hall Toaku was standing in.

But what Ramon Ollo gave, he could also take away. Every building, every system, every network, had been constructed by the Ollo family. And anyone who knew the kind of man Ramon Ollo was, knew that his creations did not walk free from their master. If he chose to reclaim his position as ruler of this world, no one could stop him. Not the Corps, not the Central Authority, and certainly not the General Assembly.

“As acting-Chair, I call this emergency meeting to order,” said Senator M’Ow, first of the Lusans, a small family from the southern hemisphere. He was a short, rotund man who had been on the other side of the world when the Seneca warship arrived. He had probably thought he had time to gather some of his more valuable possessions before abandoning Enaya to its fate, but the warship had departed as mysteriously as it had arrived, its apparent destruction a glitch of some kind.

“I ask to be recognised by the interim Assembly,” said Toaku.

“You are so recognised,” said M’Ow. He seemed very pleased with himself, suddenly a man of power, at least until the other rats returned with their excuses and false claims of wanting to serve the people of Enaya. The people they had left to perish. “Can you confirm the emergency is over, Colonel?”

Pleased to be in power, but nervous about having to prove himself worthy. Another fair-weather leader. How long would it be before Enaya was free of these petty families looking to benefit themselves at the cost of others?

“No, Senator, I can not confirm that,” said Toaku.

M’Ow looked surprised and worried, as did the enclave of opportunists gathered around him. “But I was told the Seneca warship had departed.”

“It has, for now. But we do not know the reason for their sudden appearance, other than that it involved the Ollo residence. The same residence where twelve of your fellow Senators were sent as a delegation, and were brutally murdered. Until we know more, I am implementing emergency provisions under the seventh amendment of the Prime Constitution. Until the full General Assembly can convene, I will be taking control of the Senate.”

“W-what? Why? What do you mean? Ah, ah, now hold on,” M’Ow was flustered and stammered his way to his feet. “This, this is unconstitutional. There is no clear and present danger, is there? No. I’m the Chair of the, I mean, the acting-Chair of the Assembly. I will…”

He stopped when he saw the security personnel closing in on him from left and right.

“What, what is this? I demand an explanation.”

“This is for your own safety,” said Toaku. “With so many Senators off-world, and the recent deaths, we need to ensure your continued well-being. You will be escorted to a safe location and guarded by our best people. You have nothing to fear while you are under the protection of the Judicature.”

The nine Senators were gently corralled out of the Great Hall, protesting and complaining, but otherwise compliant. They were used to being told what to do, and like all of the old families, their breeding showed.

Toaku looked around the vast, empty chamber. Seat of power. The thought was risible. He had a small amount of time to correct several generations-worth of mistakes and abuse. But first, he would deal with the Ollo family and its agents. Perhaps he wouldn’t have dared if Ramon Ollo was still here, but he wasn’t.

 

***

 

Third Quadrant.

SCCV Tenderness.

 

General Devora Sway was not in a good mood. Her crew were well aware of it and stepped softly around the bridge of the Seneca Corps Command Vessel Tenderness. None of them had ever seen her this angry.

“General, High Command are waiting,” said Captain Jupila, Sway’s adjutant.

“Tell them to wait.”

Jupila hesitated, wanting to speak but not knowing what to say.

“What is it, Captain?”

“Nothing, General.”

“Speak freely. You’ve been with me long enough to know I value your input, Jupila.”

“It’s just… High Command is getting anxious. They’ve received your report but they have questions. Should I tell them you’re… what should I tell them?”

“Tell them I’m thinking. This is a very sensitive situation. Someone other than Ramon Ollo has seen the blueprints. We could trust Ramon to keep his word, he was never one to share anything with anyone, but now that these wild-cards have been introduced, we can expect the information to leak out. It’s inevitable.”

“With the fleet on its—”

“They’re too far away and we have no idea what these people have planned. Waiting is not an option. And we’ve already seen how quick they are to respond to threats. If we fail to eliminate them in one blow… I daren’t consider the possible consequences. We must find a way to capture them and seal them off before they can transmit the information.”

“Perhaps we could send in a covert team,” suggested Jupila.

“Yes, I’m leaning that way, but these people are an unknown quantity. They have the boy with them. He knows our methods, thanks to his damn mother. She is a great woman, but she is blind when it comes to her son, and her husband.”

“If we act against her child,” said Jupila, “we must also expect her to retaliate at some point.”

“Exactly. Too many fronts, not enough intel. All these blasted spy satellites and this happens in the one place where we’ve always been kept in the dark. It seems an unlikely coincidence.”

“There is something… Two ex-Corps soldiers were here recently.”

“What do exiles have to do with anything?” said the general in a dismissive manner. Women who left the Corps were rarely more than well rid of.

“They were commissioned to bring in a bounty, which they failed.”

“Failed?” Sway was surprised. Washed out or not, the Corps still had standards.

“They then escorted two men to the White Palace. The two somewhat match the description of the men with Figaro Ollo. The report isn’t consistent and the sources aren’t verified yet—”

Sway sat up in her chair, eyes gleaming. “These exiles, where are they now?”

“I took the liberty of calling them in for questioning. They hadn’t gone far. One of the local moons. They should be arriving within a few minutes.”

“Good, good. Well done, Captain.”

“Thank you, General.”

“Let’s see what these two can tell us. And put the assassination unit on standby. We’ll need to take these boys out in any case.”

 

***

 

Third Quadrant.

VendX Priority Fleet.

VGV Summer Sail

 

“Approaching Enayan space.”

“Good,” said Chukka. “How many company ships?”

“None, Major.”

“None? Are you sure?” She had expected there to be several competitors she would have to deal with. She had put out a very public bounty on the Nirvana — something she wasn’t happy about, but there had been no other choice — and reports had indicated several parties had responded.

“Yes, Major. There are also reports that the SCCV Tenderness came through and triggered a clause three event.”

“Clause three?” Chukka was shocked, although it did explain what happened to the other company ships. She had to take the long way to this location, crossing through privately owned space and maintaining comms-silence, so she wasn’t aware of what had happened. She hadn’t expected the Corps to get involved and vaporise the entire system. That complicated things. “How far along are they?”

“They’ve gone. I’m not sure what happened. From what we’re picking up, no one is.”

Here on unrelated business? Whatever their purpose, if they were gone, that was something to be grateful for. It was about time something worked in her favour.

“And the Central Authority?”

“Six ships, holding position on the Ruben-Sadar line.”

“Why?” said Chukka. “What are they doing?”

“Not sure, Major. I can start collecting information from our franchises in the area. Enaya has very few locations, but we do have some vending machines installed in key sites.”

“We don’t have time. Have the assault teams meet me in the flight bay. Put them in advanced battlesuits, full loadout, all DLC installed.”

“Major, the outlay will put us into the red for this mission.”

“Hang the outlay. We’re going to come out of this showing a profit or die in the attempt. No discounts.”

“Yes, Major. And the drone complement?”

“No drones,” snapped Chukka. “No drones of any kind on this mission. Only essential tronics. I’m unlocking the manifest. Manually operated basics. Distribute the melee weapons and EMPs in the cargo hold.”

“Major, these specs… these are all special commissions. The overheads are going to be huge. Is the payout going to be worth it?”

“You have no idea, Corporal. This is going to be the largest investment in counter-programming VendX have made in over a century. Trust me, we need to do this unwired and off-grid. Put the fleet in dark formation. Time to make a delivery.”


          

Local website OverHere is redefining the way people travel

 Cache   
Story 353327194

As South Africans plan for their December holidays, they can rely on new features in a completely free-to-use website developed by a Leon Schnell, Founder of OverHere.co.za.OverHere is a website which makes use of map code systems which is redefining the way people travel. Mapcodes were developed in 2001 by Pieter Geelen and Harold Goddijn, soon after the GPS satellite signals were opened up for civilian use. It was decided to donate the mapcode system to the public domain in 2008. A mapcode represents a location, they were designed to be short, easy to recognise, remember and communicate. They are precise to a few meters, which is good enough for every-day use. They are free and can be  used by anyone, accurate to within around five meters

Schnell was first exposed to open source map codes in 2016, where he worked for TomTom South Africa as a B2B Marketing Manager promoting map licensing to corporate clients and government. “Although I immediately saw the value of mapcodes, I felt a lot more could be done within a South African context to increase public awareness and uptake of this incredible technology.He then set a personal goal to see if he could use what he knew about web development and JavaScript to create a functioning website that enabled users to generate and decode mapcodes. Schnell achieved that goal and launched OverHere earlier this year. By promoting mapcodes in South Africa, OverHere is already unique and even at an international level it stands out

A mapcode consists of two groups of letters and digits, separated by a dot. An example of a mapcode in Amsterdam is 49.4V. This shortcode is sufficient as long as it is clear what country or state the mapcode belongs in (in this case, The Netherlands). Schnell notes that business cards are not is big enough for the full address full physical address, and you can’t write down a location pin by hand inside your phonebook or share it telephonically thus Mapcodes come in and play a major role to help you to find your way.

OverHere’s map codes help you to find your way easily whether you are in the bushveld, beaches or urban areas. The latest upgrade of OverHere adds walking directions alongside driving directions, attracted attention at industry conferences, helped ensure that deliveries to mines run smoothly, and given all its diverse visitors an alternative to sharing their location accurately. In May 2019, it enabled voters to find polling stations.

Along the way, he had to refresh what he learnt previously from only one year of Computer Science at University, teaching myself JavaScript, HTML and CSS web development in a WordPress environment said Schnell. “I’d love to live in a future where we’re all swopping addresses as mapcodes. Ultimately, it’s about establishing a thriving integrated ecosystem where mapcodes don’t become seen as alternatives to addresses, but they become the addresses.

 


          

Les meilleurs addons Blender

 Cache   
Bonjour à tous Je continu de fouiller, de petit à petit essayer de lacher max pour l'open source et voici un petit add-on de plus : NODE WRANGLER : il se trouve dans les préf blender. il permet via un CTRL+T ou CTRL + SHIT + T de tres simplement connecter automatiquement des maps au shader ...pas mal ce qui donne ca pour l'exemple
          

How open source changed everything — again

 Cache   

InfoWorld: The biggest open source innovations of the decade, from Git and Docker to data science and the cloud


          

Other: Data Scientist - Applied Research - Bedford, Massachusetts

 Cache   
Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That's because MITRE people are committed to tackling our nation's toughest challenges-and we're committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The Research & Development centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world. Join the Data Analytics team, where you will bring your machine learning, advanced analytics, and applied research skills to bear on solving problems of critical national importance. MITRE's diverse work program provides opportunities to apply your expertise and creative thinking in challenging domains such as healthcare, transportation, and national security. Employees may also participate in MITRE's internal research and development program, which provides funding for innovative applied research that addresses our sponsors' hardest problems. The successful candidate for this position is an experienced data scientist who combines a solid theoretical and technical background with the ability to formulate problems, develop and evaluate solutions, and communicate results. Experience with advanced analytic techniques and methods (e.g., supervised and unsupervised machine learning, deep learning, data visualization) as well as hands-on software development skills are a must. Our organization values innovation and lifelong learning and believes that in today's fast-paced technological environment keeping up with the latest research and technologies is an essential part of working in this field. Responsibilities include: Apply a variety of analytical techniques to tackle customer challenges to include data mining, statistical models, predictive analytics, optimization, risk analysis, and data visualization Perform original research, development, test and evaluation, and demonstration of advanced analytic capabilities Build and test prototypes in MITRE, government labs, and commercial cloud environments Perform independent reviews of contractor proposed architectures, designs and products Apply state of the art techniques, using multiple programming languages and development environments and open source code to drive advances in mission capabilities Basic Qualifications: Bachelor's Degree in Data Science, Computer Science or related field At least 5 years of professional experience Required Qualifications: Must be a U.S. citizen with ability to possess and maintain DoD clearance Proficiency in use of Microsoft Office including Outlook, Excel, and Word Must have demonstrated proficiency and strength in verbal, written, PC, presentation, and communications skills Experience conducting original research using data science techniques, including machine learning, deep learning, statistical modeling, and data visualization Passion for working with data and solving real-world business problems or creatively advancing business operations Hands-on software development skills (Python, R, C , C#, Java, Javascript) Strong technical writing and presentation skills Proven ability to work effectively in a collaborative teaming environment Preferred Qualifications: Advanced degree in related field of study Candidates that possess a current/active US Government Secret clearance are preferred Demonstrated technical leadership Knowledge of Cloud Computing technologies, particularly in the AWS environment Understanding of Big Data tools (e.g. NoSQL, Spark, Hadoop, ElasticSearch) MITRE's workplace reflects our values. We offer competitive benefits, exceptional professional development opportunities, and a culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth. If this sounds like the choice you want to make, then choose MITRE-and make a difference with us. For more information please visit https://www.mitre.org/careers/working-at-mitre. U.S Citizenship is required for most positions. ()
          

October 2019 License-Review Summary

 Cache   

We would like to introduce (and thank!) Amol Meshram, who has joined us here at the OSI to provide monthly summaries of both the License-Discuss and License-Review mailing lists. We hope these reports provide you with a helpful snapshot of the monthly activities on the lists, keeping you up to date with the latest topics, while also providing a reference point for further discussion. Of course all suggestions are welcome as we continue to enhance our reporting. We will try our best to include the feedback from OSI community members to make the summaries as accurate as possible and the discussions lively and fruitful.

In Oct 2019, License-Review mailing list members discussed below mentioned topics;

  1. For Legacy Approval: OpenLDAP Public
    Jilayne pointed out that there are many versions of the OpenLDAP license available on spdx.org. So, Jilayne wanted to know from OSI committee which OpenLDAP version it is approving for the purpose of open source licensing. To this Pamela Chestek on behalf of OSI confirmed that OSI approved the OpenLDAP Public License Version 2.8, 17 August 2003" which is identical to what SPDX has as OLDAP-2.8
     
  2. Coherent Open Source: Getting underway next Friday
    Nothing much discussed so did not write summary of this topic.
     
  3. The Vaccine License:
    Filli Liberandum submitted The Vaccine License for approval to Open Source Initiative.
    Florian Weimer after going through The Vaccine License document found that “Complying person” clause does not list any ‘medical’ contraindications for waiver eligibility. So, Florian Weimer wanted to know whether this exclusion is done deliberately or not? Filli Liberandum was surprised by the interpretations of Florian Weimer and suggested to read it as "which are appropriate for the patient’s medical condition" and asked whether this interpretation is addressed the query or not?

    Carlo Piana is not in favour of The Vaccine License and feels it is a trolling exercise. Filli Liberandum suggested to Carlo Paina to read the mailing list code of conduct. In furtherance to it, Filli Liberandum explained why there is a necessity of acknowledging The Vaccine License by OSI board and its members.
    Anand Chowdhary based on his experience of adding privacy compliance under twente open source license pointed out that there are better ways to protect privacy of individuals like local/national/international regulation instead of protecting it through open source license. He is of the opinion that there are better ways to advocate for vaccination and open source license is not the better way to advocate for it.
    Filli Liberandum countered to Anand Chowdhary by citing example of Cryptography Autonomy License of Mr. Lindstrom which ask for some release of data as a condition and head of OSI has publicly accepted this condition. Pamela Chestek brought into notice of Filli Liberandum that OSI did not endorse the view of Simon Phipps (referred head of OSI by Filli) on Cryptography Autonomy License data condition clause. Simon Phipps is member of the board along with others. Simon Phipps views on CAL are personal.
    Filli Liberandum raised a concern with respect to archives as it is  stuck in a plaintext mode.
    Simon Phipps suggested to Filli Liberandum to familiarize with License-review process and change the tone of message and requested to leave moderating to the moderators to which Filli agreed and responded that here onwards Filli will directly reach out to concerned members.
    Gil Yehuda responded to Fil that Licenses usually do ask for things in return and appreciated the efforts of Fil in writing The Vaccine License, while considering the OSD. Gil raised an important point of enforceability of The Vaccine License in the real life scenario. Gil is of the opinion that one can right a blog and promote the importance of the idea instead of restricting it with copyright license. To buttress claim, Gil cited article written by Selam G which convinced Gil to support Free Software Movement. The reason behind citing this article is to explore other platforms instead of publishing work under copyright license.

    Carlo Piana responded to Fil that The Vaccine License is discriminatory and non-enforceable in nature. Carlo thinks that vaccination can be achieved through local authorities instead of enforcing it through copyright license. Carlo believes one should provoke reactions rather than genuine attempt of having a license approved.
    Josh Berkus agrees with Carlo on provoking reactions from members on license instead of attempting for approving the license. Josh suggested to take this submission as a use case and put it on opensource.org for future reference.
    Carlo Piana is of the same view that opensource.org should take this submission as a use case for future submissions to avoid duplication of work.
    Bruce Perens is also of the opinion that a direct law on vaccination will be more effective than a license. Similarly, Bruce also wrote two blog posts on the issue of “ethical” licenses wherein Bruce referred the proposed The Vaccine License.
    Grahame Grieve replied to Bruce’s blog post and appreciated the efforts of writing blog post on ethical license and also the basic arguments put forwards by Bruce. But Grahame bothered by the lack of ethics in the Vaccine License, judging vaccine license solely based on enforceability clause. Similarly, Grahame wanted to know whether the lawyers, courts and violators laugh at license and is there any precedent on when someone gives something of value away, on the condition that it not used in a particular way? Bruce Perens replied to all the queries of Graham Grieve. Firstly, Bruce Perens claims blog post argument is based on law instead of license terms. Secondly, Bruce has experience in handling litigation for various reasons and Bruce wants other should not get into litigation for same cause of action. Lastly, Bruce said Lawyers, courts and violators laugh at license and this whole exercise will be term as a ‘‘copyright misuse’’.  
    Kevin P. Fleming replied to Graham and pointed that The Vaccine License does not talk about goals instead it focusses on action to be performed which is not in sync with the use of the software. Similarly, Kevin is of the opinion that The Vaccine License violates the OSD 5. To this Grahame Grieve countered by saying if The Vaccine license is applied to health software then in such scenario would Kevin change his opinion.
    Van Lindberg appreciated various aspect of the Vaccine License and efforts put forward by Fil in creating the vaccine license. But Van feels the Vaccine License does not qualify for OSS because it imposes conditions which are logically separate from and wholly unrelated to scope intellectual property rights that are licensed. Similarly, Van attempted to answer the question on what scope of action can be required of a license? Van observed if restrictions are closely related to the exercise of the intellectual property rights granted under license then such restrictions make sense and compatible with OSD.
    Filli Liberandum replied to analysis of Van and requested to reverse engineer the rules from the approved licenses which Fil believe will lead us to conclusion that the Vaccine License attempt is not an accidental in nature.
    Josh Berkus feels that The Vaccine License is very good example for ‘’unrelated conditions’’ license which can be referred in future as a textbook example to differentiate between what kind of licenses OSS supports and what can’t be supported by OSS license.
     
  4. Resubmission of the European Space Agency Public Licenses (ESA-PL) for approval:
    Pamela Chestek apologised for not acting on ESA Public Licenses and confirmed that separates threads have been three licenses. Filli Liberandum shared the link of three different threads with members for discussion.
     
  5. ESA Permissive PL 2.3:
    Pamela Chested replied to old thread dated May 6, 2018 on ESA Permissive PL 2.3 wherein Carsten Gerlach suggested a notice text in the license FAQ instead of amending the language of the license. Pamela thinks this position is in contravention to US law which says where the licensor is not the ESA, any statements made by the ESA would be irrelevant.
     
  6. ESA-PL Weak 2.3:
    Pamera Chestek has below mentioned queries with respect to Section 3.1 of the Weak 2.3 license.
    1. Can a licensor choose what license will be used for their distribution?
    2. If one receives code under the ESA-PL Weak Copyleft license, can we sublicense it under the GPLv3?
    3. How will the term ‘’extension’’ will be interpreted in as per wording mentioned in Section 3.2.1 of the Weak and Strong license?
    4. What will happen if separate work in integrated to form a larger program, but it’s not in or on a volume of a storage or distribution medium, does that mean the license does not apply.
    Bruce Perens finds there is a problem with text mentioned in ESA-PL Weak License which is more harmful to ESA itself.

          

October 2019 License-Discuss Summary

 Cache   

We would like to introduce (and thank!) Amol Meshram, who has joined us here at the OSI to provide monthly summaries of both the License-Discuss and License-Review mailing lists. We hope these reports provide you with a helpful snapshot of the monthly activities on the lists, keeping you up to date with the latest topics, while also providing a reference point for further discussion. Of course all suggestions are welcome as we continue to enhance our reporting. We will try our best to include the feedback from OSI community members to make the summaries as accurate as possible and the discussions lively and fruitful.

In Oct 2019, License-Discuss mailing list members discussed below mentioned topics;

  1. AGPL and Open Source Definition conflict:
    Discussion was not in context of AGPL and Open Source Definition conflict so did not include summary of discussion.
     
  2. Storing source artefacts in ELF files:
    In this discussion, software installation related information was discussed so did not include a summary for this topic.
     
  3. Open Source Software Question:
    Ahmed Hassan asked to OSI community members whether someone can claim software released under dual-license to be an open source software by restricting number of users who can access it for self-installation? Kevin P. Fleming replied that if open source software has usage restriction then it can not be called as an open source software.
    Gil Yehuda second with Kevin P and advised to use code which is under the open source license terms and write a code for implementation which is not under open source license.
    Brendan Hickey referred the github link provided by Ahmed and found that “NoLicenseMaximumAllowanceUserCount” condition is only with proprietary project not with open source project. Similarly, Brendan Hickey was of the opinion that there is nothing wrong in the open source project mentioned by Ahmed Hasan.
     
  4. Are you forced to make your project open source?
    Richard Dagenais asked OSI community members whether it is mandatory to open source software when;
    1. open source code is referred/used for developing software, but it is not modified.
    2. there is a necessity to distribute the Java JRE of the open source project with newly written code to run the application?
    To this Mike Milinkovich replied that it is not mandatory to release the application under an open source license.
    Thorsten Glaser analysed the mentioned scenarios and found that developer application can be under any license terms and mere aggregation of open source code into application is permissible. He also recommended to follow GPLv2 §3(a) license.
    B Galliart was of the opinion that if Richard Dagenais wants to redistribute Amazon Correto or any other OpenJDK without modification then he must follow below mentioned guidelines.
    1. Mention product build using Amazon Corretto and covered under the GPLv2+CE text
    2. Provide complete copy of GPLv2+CE text
    3. Notify where one can obtain complete source code to the GPLv2+CE covered work.
    In addition to it B Galliart presented two scenarios with respect to what is called derivative work and what is not derivative work so that Richard Dagenias can make decision with respect to open source code.
    Florian Weimer replied to B.Galliart’s recommendation ‘’You must make them aware the product included Amazon Corretto and it being covered under the terms of the GPLv2+CE’’ that the above mentioned recommendation will not work as various parts of OpenJDK are under different licenses.
    Bruce Perens wrote a cautionary note that mailing list members in this thread are competent, qualified lawyers and are very helpful. But, in any terms their advice cannot be considered as lawyer’s advice as they are not contracted for this work. So, any advice provided in mail thread is subject to risk.
     
  5. Google v Oracle –Google’s Petition for Certiorary:
    Only judgement is shared over email and no fruitful discussion was taken place so did not write a summary for this topic.
     
  6. Feedback on Open-Source Contribution License:
    Simon Fridlund shared the modified version of ISC license with OSI community members and asked opinion about license and whether language used in license is ok to close for a license?
    Brendan Hickey analysed the language used in the license and concluded that the mentioned license requires something of value in exchange for the software which is not in line with open source license policy.
    Tom Callaway feels condition mentioned in license is violation of Criteria 5 of OSD and wording used in license is vague in nature and trivial to circumvent.
     
  7. Coherent Open Source-Getting underway next Friday:
    In Sep 2019, Bruce Perens declared that COHERENT OPEN SOURCE will be presented at Open Core Summit, 2019. Bruce Perens proposed scrapping of 100+ open source licenses and bringing FSF/OSI approved cross compatible licenses which will achieve most purposes of Open Source/Free Software.
    Gil Yehuda analysed the motivations of open source license and proposed that it is better to see differences between the motivations for Free Software, Open Source and Source Available models. Gil Yehuda also suggested altering goal from "achieves *most purposes of Open Source/Free Software*" to "clarify when a license meets the intent of the Free Software movement, the Open Source movement, or the Restricted Availability movement." Once it is done, we can include the representatives of each movement so that they can comment whether there is an overlap or not.
    Bruce Perens feels idea proposed by Gil Yehuda will divide the open source community.
    Lawrence Rosen seconds with the idea proposed by Gil Yehuda and rejected the arguments put up by Bruce Perens. Lawrence is of the opinion that FSF needs to change its opinions about license interworking before many accept those licenses.
    After careful perusal of Bruce Perens arguments, Lawrence Rosen changed her position and agreed with Bruce Perens that BSD and GPL licenses should be acceptable to both camps.

 

 




Next Page: 10000

© Googlier LLC, 2019