Die Entscheidungsfindung über ein neues Init-System bei Debian hat jetzt eine distributionsübergreifende Diskussion über Contributor License Agreements (CLA) entfacht.
In einer E-Mail an die Mailingliste des GCC-Projektes kritisiert Eric S. Raymond die Strategie der FSF, keine Schnittstellen zulassen zu wollen. Konkret bemängelt der Entwickler den Unwillen der Organisation, GCC für Plugin-Entwickler zu öffnen.
Mit der Veröffentlichung einer neuen Beta-Version des Linux-Spiele-Betriebssystems »SteamOS« hat Valve eine weitere Einschränkung aufgehoben und unterstützt ab sofort nun auch Systeme ohne UEFI.
Nachdem nftables, der Nachfolger für die iptables-Firewall im Linux-Kernel in Linux 3.13 erschienen ist, hat das Netfilter-Team jetzt auch das passende Werkzeug dazu vorgestellt.
Etliche Jahre nach der initialen Ankündigung von SCHED_DEADLINE ist die Entwicklung bereit für den produktiven Einsatz. Ein Pull-Request des Kernel-Entwicklers Ingo Molnar und ein Commit von Linus Torvalds lassen auf eine Aufnahme in den Kernel 3.14 hoffen.
Die Linux Foundation hat die Termine ihrer Konferenzen, darunter LinuxCon, CloudOpen, Japan Linux Symposium, Embedded Linux Conference, ApacheCon und Linux Kernel Summit, für 2014 bekannt gegeben. Einen Schwerpunkt bildet Düsseldorf, wo alle europäischen Konferenzen konzentriert Mitte Oktober stattfinden.
Das OpenBSD-Projekt, das in finanzielle Nöte geraten war, ist vorerst gerettet. Ein Spendenaufruf erbrachte rund 100.000 US-Dollar.
Das freie Browser-Plugin Pipelight unterstützt in der neuen Version 0.2.4 neben Silverlight jetzt auch die digitale Rechteverwaltung Widevine, soll außerdem mit mehr Browsern kompatibel sein und besser auf älteren Systemen laufen.
Die nächste EuroPython-Konferenz wird vom 21. bis 27. Juli 2014 im bcc Berlin Congress Center mitten in Berlin stattfinden. Die Veranstalter rufen nun zur Einreichung von Themen und Vorschlägen auf.
Der sidux e.V. stellt dem PrOOo-Box-Projekt künftig eine technische Infrastruktur zur Verfügung und unterstützt das Projekt bei der Vereinnahmung und Verwaltung der Spendengelder. Die Partner werden darüber hinaus bei Messeauftritten sowie der Öffentlichkeitsarbeit kooperieren.
Das Südtiroler Unternehmen Endian hat die gleichnamige Router-, Firewall- und Gateway-Lösung in der Version 3.0 veröffentlicht. Das Produkt steht nun als freie Software oder als kommerzielle Software zum Bezug bereit.
Linux-Stammtisch für Computerinteressierte vom Einsteiger bis zum Freak. Hier kann man über vieles fachsimpeln, vor allem über Linux. Technische Hilfe vor Ort ist möglich. Wir sind eine lockere Gemeinschaft von Linux-Interessierten, wir sind kein Verein, wir haben keine Satzung, wir sind keine Gesellschaft rechtlicher Natur und haben keine finanziellen Interessen. Dementsprechend geht es auch...
Das FreeBSD-Projekt hat die nächste Generation des freien BSD-Betriebssystems veröffentlicht. FreeBSD 10.0 ist auch auf dem Raspberry Pi lauffähig und bringt Verbesserungen in allen Teilen des Systems.
Tom Callway hat im offiziellen MariaDB-Blog die sofortige Verfügbarkeit der Version 1.0 von MariaDB Enterprise bekannt gegeben, der ein Web-API zugrunde liegt.
Das Team der Linux-Distribution Mageia hat einen Veröffentlichungskandidaten von Mageia 4 freigegeben. Die offizielle Version von Mageia 4 soll im Februar, möglicherweise bereits am 1., erscheinen.
Mit »Thorium Core« plant der freie Windows-Nachbau ReactOS eine kommerzielle Distribution des Betriebssystems, die vor allem professionelle Anwender ansprechen soll. Dazu hat das Projekt eine Kickstarterkampagne gestartet und sucht nun nach Mitteln für die Finanzierung des Vorhabens.
Linux-Initiator Linus Torvalds hat Version 3.13 des Linux-Kernels freigegeben. Eine bedeutende Änderung ist die aktivierte Energieverwaltung für AMD-Grafikchips. Weitere Änderungen wirken sich jetzt noch kaum aus, sondern legen die Grundlagen für spätere Verbesserungen.
Ubuntu Deutschland ruft seine Anwender und Entwickler auf, Vorschläge für Vorträge, Workshops und Diskussionen zur diesjährigen Ubucon einzureichen. Die 8. deutschsprachige Ubuntu Anwender- und Entwickler-Konferenz findet vom 17. bis zum 19. Oktober 2014 in Katlenburg statt.
Während alle Mitglieder des technischen Ausschusses, der über das zukünftige Init-System entscheiden soll, ihre Kandidaten benannt und begründet haben, zweifelt ein Entwickler an der Legitimation des Ausschusses, diese Frage zu entscheiden, und fordert eine Abstimmung unter allen Entwicklern.
China hat ein staatlich gefördertes Betriebssystem für Smartphones, Tablets, PCs und Set-Top-Boxen vorgestellt, das die Abhängigkeit von ausländischen Software-Monopolen verringern soll.
Das freie ERP-System Nuclos bietet in Version 4.0 erstmals einen REST-Server, mit dem es einfacher in bestehende Systemlandschaften integriert werden kann.
Mozilla hat einige Spezifikationen und Details zum ersten Tablet mit Firefox OS bekannt gegeben. Das Gerät soll von Foxconn produziert werden, ist aber vorerst nur für Entwickler gedacht.
SystemRescueCD, eine auf Systemrettung spezialisierte Distribution für Administratoren, ist in Version 4.0.0 erschienen. Die neue Version bringt vor allem umfangreiche Aktualisierungen.
Eine Woche nach dem Einbruch in die Opensuse-Foren, der zur kurzzeitigen Abschaltung der Foren führte, hat sich wohl auch bei Opensuse die Erkenntnis durchgesetzt, dass proprietäre Software keine gute Idee ist.
Ubuntu-Community-Manager Jono Bacon hat in einer Fragerunde auf Reddit zu allen aktuellen Entwicklungen bei Ubuntu umfassend Auskunft gegeben.
Ford is enlisting top U.S. universities to make self-driving cars (such as the one shown above) a reality, and announced Wednesday that it hopes researchers at the Massachusetts Institute of Technology can come up with advanced algorithms to help vehicles learn where pedestrians and other automobiles will be located. ”We’re using data from the sensors both on board and off board,” said Jonathan How, director of the MIT-Ford Alliance and a professor of aeronautics at MIT. He said that the system isn’t just using the car’s Lidar system, which captures a 3D view of its surroundings using spinning cameras, but crosswalk signs and traffic lights. If the car knows whether a traffic light is red or green or whether a crosswalk sign is illuminated, it will have even more information than what is collected by the car’s sensors. It might also be able to avoid an accident with a car that runs a red light. “Having the sensors work in all conditions are issues that are fundamental to the problem,” he said. How the sensors need to work in daylight, darkness, snow, rain and other weather conditions with the same reliability.
Wearables and 'smart' appliances are driving the trend.
Intel unveiled two reference designs on Wednesday aimed at the education market: a clamshell notebook and a tablet, each outfitted with intriguing peripherals and software for educators. Both the “Clamshell EF10MI2”—part of Intel’s “Classmate PC” family—and the 10-inch, ECS TR10CD1 Education Android tablet won’t be sold by Intel directly. Instead, it will be up to a network of unnamed partners to deliver both to classrooms. Intel’s new Classroom PC. “Education leaders everywhere are passionate about driving student achievement and encouraging lifelong learning,” said John Galvin, vice president of the sales and marketing group at Intel and general manager of the World Ahead Program, in a statement. “At Intel, we believe the right technology can be transformative. That’s why we are focused on designing tools that bring learning to life, helping to make students more engaged. The result is a future where people have the skills they need for opportunity and growth.”
Google has been pushing hard to into Web apps. But a Chrome exploit that can secretly transcribe your conversations unless you’re paying attention probably wasn’t what the company had in mind. Whenever a website wants to access your microphone, Chrome requires permission. A dialog appears at the top of the browser window, and after you give your OK, an icon appears in the tab area, letting you know the microphone is in use. Close the tab or visit another site, and microphone access is supposed to get cut off. But as , malicious sites can use pop-under windows to keep listening even after the user has gone to another site or closed the main browser window. Unlike a regular browser tab, pop-under windows don’t show the recording status icon, and can continue to listen in for as long as the pop-under window stays open. The exploit can also stay dormant until the user utters certain key phrases.
Imagine a giant, roughly 200 ft. tall robot shoots a barrage of missiles at you. Do you: Try to run away, but fail and die in a blazing inferno? Wet your pants and cry? Run towards the robot, using the missiles as platforms as you parkour your way through the air and chop the menacing machine in half with your sword?
Vendors don’t normally brag about slower products but Advanced Micro Devices is making an exception for its latest Opteron 6300 processors, which have a slower clock speed than their predecessors to reduce power consumption. Some AMD customers use its chips in highly virtualized systems, and those types of servers tend to max out their memory and I/O bandwidth before they can make use of all the CPU performance, said Suresh Gopalakrishnan, general manager of AMDs server division. That means they’re using a higher-performance chip than they need, and burning more electricity. So AMD is introducing new versions that dial down the clock-speed and reduce the power draw by 15 to 30 percent. “They’re looking at the actual core utilization and seeing that only 60 to 70 percent of the core is being used because of memory and I/O limits, based on their workloads,” Gopalakrishnan said. “That’s prompted them to come to us and say, ‘We’re not really using all this performance so can you lower the power, so that the overall data center power consumption is lower.’”
Uncarrier, indeed.
For about two years, Microsoft and its partners have quietly developed sites that transcend the Web, crossing over into what appear to be dedicated apps. Now, Microsoft is making a concerted effort to show off what it’s accomplished, with code and other resources to allow others to follow suit. If you’ve been following Microsoft’s efforts on the Web, the new . The Web version of Contre Jour, for example, went live in October 2012, co-developed with Maksym (Max) Hryniv as part of Microsoft’s “Beauty of the Web” campaign. Played on a tablet, the puzzle game strips out the address bars and other navigational elements, as does another app, Hover, which is a Web port of the old Windows 95 game. The point of the original campaign, according to Roger Capriotti, senior director of marketing for Microsoft’s Internet Explorer browser and SkyDrive service, was “trying to convince developers and consumers alike to expect more from the Web.” Microsoft always had the intention of collecting the sites it helped develop into a shared resource for developers, and has been working on doing so for some time, he said. Microsoft’s Rethink page explains the design behind each site, with developer resources to tap into.
Microsoft is expected to deliver an update to Windows 8.1 in 2014 dubbed Update 1, and newly leaked screenshots suggest U1 will include a stepping stone on the road to the widely rumored Windows 9, a.k.a. . Screenshots of a purported early build of U1 show a Windows Store icon sitting on the desktop’s taskbar. What’s more, the taskbar properties window has an option to pin Windows Store apps to the taskbar alongside regular desktop apps. The leaked shots from Russian blogger , who has reliably leaked early Windows builds for many years and versions, only shows the desktop. Presumably, however, Windows apps launched from the desktop would still send users into the fullscreen modern UI experience. But that may only be a temporary solution on the way to Threshold. Early reports about Windows 9 from reputable Microsoft watcher report that the Start Menu may also return to either Update 1 or Threshold. If the Threshold rumors are accurate, the leak from WZor suggests Microsoft plans on a gradual transition from Windows 8's jarring, dueling interfaces to a more integrated experience on Windows 9.
SimpleAir is seeking $125M in damages from Google after a jury found that push notification services in Android infringe on a SimpleAir patent, the company said Tuesday. Google infringed SimpleAir’s patent with its Google Cloud Messaging (GCM) and Android Cloud to Device Messaging (C2DM) services, SimpleAir said in . These services are used by Google to process and send instant notifications for Android applications, such as Facebook, Twitter, and Gmail, it added. The jury found all five claims of SimpleAir’s 7,035,914 patent on a “system and method for transmission of data” valid and infringed by Google, according to that was filed with the U.S. District Court for the Eastern District of Texas, Marshall Division, on Saturday. The jury however was unable to reach a unanimous decision on the amount of damages to award for Google’s infringement, SimpleAir said, adding that a separate jury will decide on the amount in a limited second trial. SimpleAir seeks damages in excess of $125 million.
An application crash has sparked hundreds of complaints as Sony works on a fix
Google Glass has raised privacy concerns in many countries. It now appears that it is being monitored as a potential aid to copyright infringement. A man who wore Google Glass to a movie theater in Ohio was detained and interrogated by officials of the Department of Homeland Security, highlighting concerns that the device may be used by people to illegally record movies at a theater. A spokesman for the Motion Picture Association of America, which works closely with theaters all over the U.S. to curb camcording and “theater-originated piracy,” said Tuesday that no such activity was discovered in the particular case. The DHS’ Immigration and Customs Enforcement confirmed that agents of its Homeland Security Investigations interviewed the man, but did not take action after it was found that the recording device, suspected of being used to record a film at the theater, was also a pair of prescription eye glasses in which the recording function had been inactive.
You use a social network—at least one, maybe a few. Everyone does. You probably know all about your preferred network’s privacy settings, enough to make sure that the whole world doesn’t know your business. But if you’re paranoid—aren’t we all?—you can find ways to lock down your privacy that go above and beyond even . You have to start with your social networks’ settings, of course. If you don’t bother to limit the visibility of your posts or to make sure you’re not being tagged all over the place (thanks, facial-recognition technology), then there’s no point in proceeding. Facebook has the most convoluted settings of all the social networks, so follow our for complete instructions. After you confirm that your photos, contact information, and political musings aren’t on display for the world to see, you can take a few extra steps to safeguard your privacy. Every time you download a smartphone app, you allow its developers to see some of your information. Sometimes it’s as basic as your name. Other times it’s your address book, your Facebook or Twitter account information, your location, or your photos.