2019/02/21: The Bash Automated Testing System puts Bash code through the same types of testing processes used by Java, Ruby, and Python developers.
2019/02/14: On the surface, the open source software community has never been better. Companies and governments are adopting open source software at rates that would've been unfathomable 20 years ago, and a whole new generation of programmers are cutting their teeth on developing software in plain sight and making it freely available for anyone to use. Go a little deeper, however, and the cracks start to show. The ascendancy of open source has placed a mounting burden on the maintainers of popular software, who now handle more bug reports, feature requests, code reviews, and code commits than ever before.
At the same time, open source developers must also deal with an influx of corporate users who are unfamiliar with community norms when it comes to producing and consuming open source software. This leads to developer burnout and a growing feeling of resentment toward the companies that rely on free labor to produce software that is folded into products and sold back to consumers for huge profits. From this perspective, Heartbleed wasn't an isolated example of developer burnout and lack of funding, but an outgrowth of a systemic disease that had been festering in the open source software community for years. Identifying the symptoms and causes of this disease was the easy part; finding a cure is more difficult.
2018/01/31: Set out to solve new problems/Design products for longevity and reuse/Aim to influence culture
2019/02/13: The UNIX market is in inexorable decline:Only 1 in 85 servers deployed this year uses Solaris, HP-UX, or AIX. Most applications on Unix that can be easily ported to Linux or Windows have actually already been moved.
Most of what remains on Unix today are customized, mission-critical workloads in fields such as financial services and healthcare. Because those apps are expensive and risky to migrate or rewrite, Bowers expects a long-tail decline in Unix that might last 20 years. “As a viable operating system, it’s got at least 10 years because there’s this long tail. Even 20 years from now, people will still want to run it,” he says.
2019/02/10: Libertà di voto. Ciascun elettore è libero di votare senza condizionamenti e pressioni esterne. Tale principio viene rispettato più facilmente quando la procedura è soggetta a controlli, come avviene nei seggi elettorali. Ciò non può dirsi nel caso del voto online, quando la scelta si effettua con un click, seduti comodamente a casa. L'Estonia, tuttavia, consente ai suoi elettori di votare online più volte, fino al giorno ufficiale delle elezioni. Solo l'ultimo voto viene però considerato e va ad annullare quelli precedenti, eventualmente estorti con violenza. L'elettore ha quindi la possibilità di correggere il suo voto qualora non corrisponda alla propria volontà. Inoltre, il voto nei seggi elettorali viene preferito a quello online.
2019/01/30: The Local Contexts initiative began in 2010 when Kim Christen and I started to think more carefully about how to support Indigenous communities to address the immense and growing problems being experienced with copyright around Indigenous or traditional knowledge. We had both been working with Indigenous peoples, communities and organizations over a long period of time and had increasingly been engaged in a very specific way with the dilemmas of copyright that existed at the intersection of Indigenous collections in archives, libraries and museums. We were able to see more clearly the ways in which copyright has functioned as a key tool for dispossessing Indigenous peoples of their rights as holders, custodians, authorities and owners of their knowledge and culture.
Combining both legal and educational components, Local Contexts has two objectives. Firstly, to support Indigenous decision-making and governance frameworks for determining ownership, access to and culturally appropriate conditions for sharing historical and contemporary collections of Indigenous material and digital culture. Secondly, to trouble existing classificatory, curatorial and display paradigms for museums, libraries and archives that hold extensive Indigenous collections by finding new pathways for Indigenous names, perspectives, rules of circulation and the sharing culture to be included and expressed within public records.
Inspired by Creative Commons, we began trying to address the gap for Indigenous communities and copyright law by thinking about licenses as an option to support Indigenous communities.
Our initial impulse was to craft several new licenses in ways that incorporated local community protocols around the sharing of knowledge. Pretty quickly however we ran into a significant problem: with the majority of photographs, sound recordings, films, manuscripts, language materials that had been amassed and collected about Indigenous peoples, and that were now being digitized, Indigenous peoples were not the copyright holders. Instead, copyright was held by the researchers, missionaries or government officials who had done the documenting or by the institutions where these materials were now held. Or – at the other end of the spectrum, these materials were in the unique space that copyright makes – the public domain. This meant that not only did Indigenous peoples have no control over these materials and their circulatory futures, they also could not apply any licenses – either CC ones or ones that we were developing. This was a problem that we responded to by developing the TK Labels.
2019/01/21: The physical and psychological toll of brutal commutes can be considerable the average American commuter spends 42 hours per year stuck in rush-hour traffic. In the Los Angeles area, the figure is nearly twice that, equivalent to more than three days. A 2015 Los Angeles Times poll found that among residents of that city, traffic concerns exceed those pertaining to personal safety, finances or housing costs.
A recent analysis of Los Angeles traffic, published in the Journal of Public Economics, documented a link between congestion and domestic violence. From 2011 to 2015, the study found, extreme evening traffic on two major highways — I-5 and I-10 — increased the incidence of nighttime domestic violence by about 9 percent.
2018/10/02: BitTorrent usage has bounced back because there's too many streaming services, and too much exclusive content.
2019/01/29: Stingrays (AKA IMSI catchers) are a widespread class of surveillance devices that target cellular phones by impersonating cellular towers to them (they're also called "cell-site simulators").
IMSI catchers are so easy to build and operate that they have leapt from police agencies to criminals, and foreign and corporate spies, exposing us all to potential surveillance from all quarters.
That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques.
But new research from ETH Zurich and Technische Universität Berlin has revealed a critical flaw in AKA, a defect that not only allows attackers to track the number of calls and texts being sent while a user is connected to the fake tower, but also a count of calls and texts from before the device was compromised. More importantly, the attack allows for fine-grained location tracking.
2019/01/29: Una delle peggiori annate di sempre per l'olivicoltura nazionale, con una produzione di olio di oliva più che dimezzata rispetto al 2017 ( -57%). È quanto emerge dalle ultime elaborazioni Ismea sulla base dei dichiarativi di dicembre, che collocano la produzione di olio di oliva del 2018 a 185 mila tonnellate, in ulteriore ribasso rispetto alle stime - già poco ottimistiche - presentate a ottobre, a frantoi ancora chiusi.
In particolare sono state le regioni del Mezzogiorno ad accusare le perdite maggiori, con la Puglia, che da sola rappresenta circa la metà della produzione nazionale, colpita da una flessione stimabile attorno al 65%, a causa delle gelate e dei problemi fitosanitari che hanno colpito gli uliveti.
2019/01/29: If Texas turns back to a Democratic state, which it used to be, then we’ll never elect another Republican [president] in my lifetime.
2019/01/28: it became fashionable to pronounce that Macron, as a political phenomenon, was finished. Yet for all their airs of certainty, the hot takes failed to take into account a few crucial intangibles of French political life.
The first was that despite the outrage being directed against him, Macron faces next to zero chance of being forced out of office before his term ends in 2022. The second was that the Yellow Jacket movement — which has no identifiable leader, organizational structure or unified agenda — could just as easily turn into a liability for Macron's opponents. And the president, paradoxically, could turn out to be the big winner.
The Yellow Jackets were supposed to have killed off Emmanuel Macron, but they could end up making him stronger.
MArket uptake of an innovative irrigation Solution based on LOW WATer-ENergy consumption.: The project received almost €4 million of Horizon 2020 funding to develop an innovative technology for irrigation that greatly cuts operating cost and water consumption. This new solution has been transferred to 27 European SMEs, which are currently commercialising and installing the systems for farmers!
The world of irrigation requires innovative solutions, less water and energy dependant. UPM developed in 2013 solutions for large power photovoltaic (PV) pumping systems at TRL5 that was successfully tested in a real Irrigators Community (IC) of Alto Vinalopó (Spain). The results showed great technical reliability (solving the problem of the variability of solar energy), matching the IC irrigation needs just with the solar electricity (thanks to sun-tracking systems) and reducing dramatically the cost of energy (60% regarding the conventional grid consumption) In parallel, ELAIA has integrated systems with, in one hand, automatisms and ICT solutions that reduce the water consumption (30%) detecting in real-time the actual needs of the specific crop in a certain moment, and in the other hand, low pressure systems that reduce the energy needs This project proposes activities to integrate both developments at a TRL9 for the first application and market replication of a new green product at TRL9 consisting of PV pumping systems for productive agriculture irrigation consuming zero conventional electricity and 30% less water
In addition we're concerned with WhatsApp's web app. WhatsApp provides an HTTPS-secured web interface for users to send and receive messages. However, as with all websites, the resources needed to load the application are delivered each and every time you visit that site. So, even if there is support for crypto in the browser, the web application can easily be modified to serve a malicious version of the application upon any given pageload, which is capable of delivering all your messages to a third party.
Use a CardDAV server, create a second address book and temporarily unlink your default address book, then synchronize it again
2019/01/19: What do I feel when I watch it?
Nothing really. Neutral. Slight positive because it lifts some issues such as bullying and sexual harassment. Slight disgust at capitalist opportunism disguised as idealism. Thinking I’ve seen all of the situations in the ad and do recognize that most men in most situations do indeed not stand up and call folks out. Still it all comes out a bit silly, as commercials generally do.
To the offended party: I think you’re all wrong, folks. And I think that your reaction says more about yourselves than about the commercial. I think you are exact equivalents of the non-constructive, bitter, bitchy kinds of feminists and anti-racists whose toes are always perpetually stepped upon by one wrong word, some naked skin, one commercial or another.
I’m calling you out, guys: you’re being over-sensitive. You’re taking part in a silly hysteria.
I am only comfortable with a postfeminist position *if* it successfully transcends and includes feminism – in particular the undeniable and empirical aspects of inequality and relations between the genders. Otherwise it isn’t real postfeminism. The proof that the folks offended by the ad weren’t true postfeminists? None of them bothered to check if the world actually *does* work according to the assumptions of this ad. Which it does. More proof? Their message is indistinguishable from that of the classical conservatives. How much is this post-anything? And how much is it simply social conservatism? Nothing wrong with it, but that’s what it is.
I want us to move towards a “neomasculist” position, one that *is* tough and manly but is still friends with feminism. One that doesn’t get “offended” at every corner, isn’t over-sensitive. One that lifts itself, by virtue of character and understanding, above the trench wars of the gender issues and identity politics at large. One that lands in a paradigm of emotional and sexual development.
Feminism and masculism need one another. They are two sides of the same equation.
2017/09/19: A well meaning math teacher finds herself trumped by a post-fact America.
2017/02/06: all this encryption breaks Deep Packet Inspection. All the IDS's, IPS's and NGFW's that we bought are becoming obsolete. They can't inspect the encrypted packets. Of course they try to hold onto this technology by introducing technologies like SSL inspection (aka SSLbump). This technology basically breaks the trust model of Internet encryption by acting as a man-in-the-middle. The place where you work spoofs itself as the encrypted site you are going to. Because they control your computer, you don't even know it is happening. Then they decrypt your Internet traffic to use DPI on it and then re-encrypt it back to the Internet.
Instead of holding onto deep packet inspection, I think we need to transition to new methodologies for detecting bad things on the network. Telemetry data is one of these ways through passive monitoring of netflows or DNS queries By looking at traffic on your network and determining what looks anomalous, you may be able to determine where the nefarious activity is happening. By looking at your DNS queries and investigating Passive DNS with Bind RPZor using OpenDNS you can cut down on a huge amount of bad sites on the Internet and interrupt phishing campaigns and malware.
many users find a sense of pride in their unique configuration settings and want an easy way to share them with friends. That’s where rcm steps in.
rcm is a “rc” file management suite (“rc” is another convention for naming configuration files that has been adopted by some GNU/Linux programs like screen or bash). rcm provides a suite of commands to manage and list files it tracks. Install rcm using dnf.
2019/01/11: "Born-in the Cloud" workloads might be designed to be platform-agnostic now, but that doesn't mean it will always be the case, as hyperscalers like Amazon Web Services and Microsoft Azure continue to add specific and unique functionality to their hosted services.