Linux (en)

  • Putting Civilization in a Box For Space Means Choosing Our Legacy (Slashdot)
    When SpaceX's record-breaking Falcon Heavy rocket made its first test launch in early February , the craft didn't just hurl Elon Musk's shiny red roadster and spacesuit-clad mannequin to space. It had another, smaller payload, which at first glance seems much less impressive: a 1-inch-wide (2.5 centimeters) quartz disc with Isaac Asimov's "Foundation" trilogy encoded in laser-etched gratings . From a report: The famous science fiction series is only the beginning of the discs' planned contents. At a time when traditional hard drives are just breaking into the terabyte range, the quartz medium can hold up to 360 terabytes per disc. It also boasts a life span of 14 billion years. That's longer than the current age of the universe. This disc was symbolic; future devices will contain much more, and more useful, information. But the technology speaks to grander issues that humanity is now pondering: becoming a multiplanetary civilization, storing information for thousands or millions of years, and contacting and communicating with other intelligences (alien and Earthling). So how should we record our knowledge and experiences for posterity? How should we ensure that this information is understandable to civilizations that may be quite different from our own? And, most importantly, what should we say? Humans have faced challenges like these before. Ancient civilizations built monuments like the pyramids and left artifacts and writing, sometimes deliberately. Later researchers have used this material to try to piece together ancient worldviews. However, in the modern era, we've set our sights much further: from centuries to millennia, from one planet to interstellar space, and from one species to many.

    Read more of this story at Slashdot.

  • Hackers Are Selling Legitimate Code-signing Certificates To Evade Malware Detection (Slashdot)
    Zack Whittaker, writing for ZDNet Security researchers have found that hackers are using code-signing certificates more to make it easier to bypass security appliances and infect their victims. New research by Recorded Future's Insikt Group found that hackers and malicious actors are obtaining legitimate certificates from issuing authorities in order to sign malicious code. That's contrary to the view that in most cases certificates are stolen from companies and developers and repurposed by hackers to make malware look more legitimate. Code-signing certificates are designed to give your desktop or mobile app a level of assurance by making apps look authentic. Whenever you open a code-signed app, it tells you who the developer is and provides a high level of integrity to the app that it hasn't been tampered with in some way. Most modern operating systems, including Macs , only run code-signed apps by default.

    Read more of this story at Slashdot.

  • Researchers From MIT and Harvard University Present a Paper Describing a New System, Dubbed Veil, That Makes Private Browsing More Private (Slashdot)
    From a blog post on MIT News Office: Veil would provide added protections to people using shared computers in offices, hotel business centers, or university computing centers, and it can be used in conjunction with existing private-browsing systems and with anonymity networks such as Tor, which was designed to protect the identity of web users living under repressive regimes. "Veil was motivated by all this research that was done previously in the security community that said, 'Private-browsing modes are leaky -- Here are 10 different ways that they leak,'" says Frank Wang, an MIT graduate student in electrical engineering and computer science and first author on the paper. "We asked, 'What is the fundamental problem?' And the fundamental problem is that [the browser] collects this information, and then the browser does its best effort to fix it. But at the end of the day, no matter what the browser's best effort is, it still collects it. We might as well not collect that information in the first place."

    Read more of this story at Slashdot.

  • As Cape Town Runs Out of Water, Here's a Look at Parts of Mexico City That Have Been Without Water For a Year (Slashdot)
    In some places, taps have been dry for over a year. People bathe their children with bottled water. A group of women has taken over water distribution from the city authorities. The future feared by millions of people across the world has already arrived in Mexico City , BuzzFeed News reports. From the report: In certain areas, people say taps go dry for months. Angry civilians have blocked off highways and squared off with riot police, wresting control of water distribution from the government. "Crime affects us deeply but if you don't have water, you can't do anything," said Marisol Fierro, part of a group of women in charge of delivering water to neighbors. Across the ocean, authorities in South Africa talk about Day Zero, when Cape Town is set to run out of water and the city is forced to shut off its taps. It has made headlines around the world, as people watch on with bated breath. But here in Iztapalapa, a sprawling, drab Mexico City borough where nearly 2 million people live, that day has already arrived, offering a window into what the future may hold for millions of people when the taps run dry. Police officers are sometimes forced to guard water trucks, popular targets for kidnappers who sell their contents for hefty prices. In other cities, politicians might promise expanded broadband, better health care, or higher wages to win votes, but in Mexico City, mayoral hopefuls have made simple access to water central to their campaigns. Reserved and quiet, Emma Pantaleon seems an unlikely protagonist at the front lines of this daily battle. Pantaleon joins Fierro and other women -- housewives who juggle child-rearing, house chores, and part-time jobs -- gathering water requests from their neighbors, coordinating trucks' routes with local authorities, and riding along to ensure the operation runs smoothly. On a recent morning, she sat in the passenger seat of a water tanker as it revved its motor up a hill, dwarfing the dilapidated single-room houses along its path. When the driver swerved left and stepped on the brake, Pantaleon leaped out. It was a scene straight out of Mad Max: Fury Road. Pantaleon, 41, walked over to the nearest cinder block house and called out to its owner. As soon as Catalina Cortez opened the door, the driver and a helper marched in, pulling the truck's hose straight up to a plastic water storage tank taking up a third of the patio.

    Read more of this story at Slashdot.

  • Dropbox Shows How It Manages Costs By Deleting Inactive Accounts (Slashdot)
    Dropbox employs a somewhat unusual technique to lower its costs, the cloud software company revealed on Friday in its filing to go public . From a report: In a process the company calls "infrastructure optimization," Dropbox said it deletes users' accounts if they don't sign in for a year and don't respond to emails. That keeps the company from incurring storage costs for inactive users, a tactic Yahoo has used in the past. Dropbox said that the costs of revenue dropped 6 percent in 2017 to $21.7 million, mostly due to a $35.1 million reduction "in our infrastructure costs." As it prepares to lure public market investors, Dropbox is paying particularly close attention to its expenses. The company operates in an intensively competitive market against vendors including Apple, Amazon, Box, Google and Microsoft. Once reliant on Amazon Web Services , Dropbox has moved away from public cloud in recent years and has been building its own data center infrastructure to store the majority of user data. Another way it's managed costs is by making sure that there weren't too many copies of users' files on third-party infrastructure.

    Read more of this story at Slashdot.

  • KDE Plasma 5.13 Should Be Starting Up Even Faster (Phoronix)
    One of the nice elements of KDE Plasma 5.12 is that it starts up faster, particularly when running on Wayland, but with Plasma 5.13 it's looking like it will be an even faster experience getting to the Plasma desktop...
  • Nearly Half of 2017's Cryptocurrencies Have Already Failed (Slashdot)
    An anonymous reader shares an Engadget report: The surging price of bitcoin (among others) in 2017 led more than a few companies to hop on the cryptocurrency bandwagon with hopes of striking it rich almost overnight. Many of their initial coin offerings seemed dodgy from the outset... and it turns out they were. Bitcoin.com has conducted a study of ICOs tracked by Tokendata, and a whopping 46 percent of the 902 crowdsale-based virtual currencies have already failed. Of these, 142 never got enough funding; another 276 have either slowly faded away or were out scams.

    Read more of this story at Slashdot.

  • Apple Moves To Store iCloud Keys in China, Raising Human Rights Fears (Slashdot)
    Apple will begin hosting Chinese users' iCloud accounts in a new Chinese data center at the end of this month to comply with new laws there. The move would give Chinese authorities far easier access to text messages, email and other data stored in the cloud. From a report: That's because of a change to how the company handles the cryptographic keys needed to unlock an iCloud account. Until now, such keys have always been stored in the United States, meaning that any government or law enforcement authority seeking access to a Chinese iCloud account needed to go through the U.S. legal system. Now, according to Apple , for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.

    Read more of this story at Slashdot.

  • Radeon Wattman's "Automan" Being Enabled For Vega On Linux (Phoronix)
    With the upcoming Linux 4.17 kernel cycle there is initial support for Radeon Wattman with the AMDGPU kernel driver and modern Radeon graphics processors. "Automan" is now the latest being worked on for Vega GPUs...
  • Russian Spies Hacked the Olympics and Tried To Make it Look Like North Korea Did it, US Officials Say (Slashdot)
    Ellen Nakashima, reporting for the Washington Post: Russian military spies hacked several hundred computers used by authorities at the 2018 Winter Olympic Games in South Korea [Editor's note: the link may be paywalled; alternative source], according to U.S. intelligence. They did so while trying to make it appear as though the intrusion was conducted by North Korea, what is known as a "false-flag" operation, said two U.S. officials who spoke on the condition of anonymity to discuss a sensitive matter. Officials in PyeongChang acknowledged that the Games were hit by a cyberattack during the Feb. 9 Opening Ceremonies but had refused to confirm whether Russia was responsible. That evening there were disruptions to the Internet, broadcast systems and the Olympics website. Many attendees were unable to print their tickets for the ceremony, resulting in empty seats.

    Read more of this story at Slashdot.

  • Ask Slashdot: How Would You Teach 'Best Practices' For Programmers? (Slashdot)
    An anonymous reader writes: I've been asked to put together a half-day workshop whose title is "Thinking Like a Programmer." The idea behind this is that within my institution (a university), we have a vast number of self-taught programmers who have never been taught "best practices" or anything about software engineering. This workshop's intention is to address this lack of formal training. The question is, what should be covered in this workshop? If you have an idea -- that also has an example of best practice -- please share! It's really two questions -- what "thinking like a programmer" topics should be covered, but also what examples should be used to illustrate best practices for the material. So leave your best thoughts in the comments. How would you teach best practices for programmers?

    Read more of this story at Slashdot.

  • LLVM / Clang 6.0 Should Be Released Soon With Its Many New Features (Phoronix)
    LLVM 6 is running a few days behind scheduled for its release along with Clang 6 for the C/C++ compiler, but this latest big update to this open-source compiler stack should still be on the ways in the days ahead...
  • GNOME Shell vs. KDE Plasma Graphics Tests On Wayland vs. X.Org Server (Phoronix)
    A premium member this week had requested some benchmarks of openSUSE Tumbleweed when looking at the performance of KDE Plasma vs. GNOME Shell in some open-source graphics/gaming tests while also looking at the Wayland vs. X.Org Server performance...
  • Allwinner A83T Will Support HDMI With Linux 4.17 (Phoronix)
    The Sun4i DRM driver work has been progressing a lot since its mainline introduction two years ago with Linux 4.7. With the Linux 4.17 cycle, the A83T SoC will have initial HDMI output support...
  • How Are Sysadmins Handling Spectre/Meltdown Patches? (Slashdot)
    Esther Schindler (Slashdot reader #16,185) writes that the Spectre and Meltdown vulnerabilities have become "a serious distraction" for sysadmins trying to apply patches and keep up with new fixes, sharing an HPE article described as "what other sysadmins have done so far, as well as their current plans and long-term strategy, not to mention how to communicate progress to management." Everyone has applied patches. But that sounds ever so simple. Ron, an IT admin, summarizes the situation succinctly: "More like applied, applied another, removed, I think re-applied, I give up, and have no clue where I am anymore." That is, sysadmins are ready to apply patches -- when a patch exists. "I applied the patches for Meltdown but I am still waiting for Spectre patches from manufacturers," explains an IT pro named Nick... Vendors have released, pulled back, re-released, and re-pulled back patches, explains Chase, a network administrator. "Everyone is so concerned by this that they rushed code out without testing it enough, leading to what I've heard referred to as 'speculative reboots'..." The confusion -- and rumored performance hits -- are causing some sysadmins to adopt a "watch carefully" and "wait and see" approach... "The problem is that the patches don't come at no cost in terms of performance. In fact, some patches have warnings about the potential side effects," says Sandra, who recently retired from 30 years of sysadmin work. "Projections of how badly performance will be affected range from 'You won't notice it' to 'significantly impacted.'" Plus, IT staff have to look into whether the patches themselves could break something. They're looking for vulnerabilities and running tests to evaluate how patched systems might break down or be open to other problems. The article concludes that "everyone knows that Spectre and Meltdown patches are just Band-Aids," with some now looking at buying new servers. One university systems engineer says "I would be curious to see what the new performance figures for Intel vs. AMD (vs. ARM?) turn out to be."

    Read more of this story at Slashdot.

  • Arctic's Accelero Twin Turbo III Works Well For Polaris GPU Cooling (Phoronix)
    Back in December I wrote about passively cooling a Radeon RX 480 by means of the after-market Accelero S3 passive cooler. That passive GPU cooler worked well but under demanding loads did get a bit hot, but what I came to realize after buying that cooler is the height requirements exceeded that of a 4U rackmount chassis... So recently I decided to switch to using the Arctic Cooling Accelero Twin Turbo III...
  • House Democrats' Counter-Memo Released, Alleging Major Factual Inaccuracies (Slashdot)
    Long-time Slashdot reader Rei writes: Three weeks ago, on a party-line vote, the U.S. House Intelligence Committee voted to release a memo from committee chair and Trump transition team member Devin Nunes. The "Nunes Memo" alleged missteps by the FBI in seeking a FISA warrant against Trump aide Carter Page; a corresponding Democratic rebuttal memo was first blocked from simultaneous release by the committee, and subsequently the White House. Tonight, it has finally been released. Among its many counterclaims: the Steele Dossier, only received in September, did not initiate surveilance of Page which began in July; the Steele dossier was only one, minor component of the FISA application, and only concerning Page's Moscow meetings; Steele's funding source and termination was disclosed in the application; and a number of other "distortions and misrepresentations that are contradicted by the underlying classified documents". Perhaps most seriously, it accuses Nunes of having never read the FISA application which his memo criticized. Vox argues the memo proves that no one was misled when the surveillance was authorized. "The FBI clearly states right there in the FISA application that they believe Steele was hired to find dirt on Trump... After the Schiff memo was released on Saturday, House Republicans released a document rebutting its core claims. Their response to this damning citation is -- and I am not making this up -- that the vital line in which the FBI discloses the information about Steele was 'buried in a footnote.'"

    Read more of this story at Slashdot.

  • Visa Claims Chip Cards Reduced Fraud By 70% (Slashdot)
    An anonymous reader quotes Ars Technica: Although only 59 percent of US storefronts have terminals that accept chip cards, fraud has dropped 70 percent from September 2015 to December 2017 for those retailers that have completed the chip upgrade, according to Visa. There are a few ways to interpret those numbers. First, it seems like two years has resulted in staggeringly little progress in encouraging storefronts to shift from magnetic stripe to chip-embedded cards, given that in early 2016, 37 percent of US storefronts were able to process chip cards. On the other hand, fraud dropping 70 percent for retailers who install chip cards seems great. Chip-embedded cards aren't un-hackable, but they do make it harder to steal card numbers en masse as we saw in the Target's 2013 breach.

    Read more of this story at Slashdot.

  • New Tech Industry Lobbying Group Argues 'Right to Repair' Laws Endanger Consumers (Slashdot)
    chicksdaddy brings this report from Security Ledger: The Security Innovation Center, with backing of powerful tech industry groups, is arguing that letting consumers fix their own devices will empower hackers. The group released a survey last week warning of possible privacy and security risks should consumers have the right to repair their own devices. It counts powerful electronics and software industry organizations like CompTIA, CTIA, TechNet and the Consumer Technology Association as members... In an interview with The Security Ledger, Josh Zecher, the Executive Director of The Security Innovation Center, acknowledged that Security Innovation Center's main purpose is to push back on efforts to pass right to repair laws in the states. He said the group thinks such measures are dangerous, citing the "power of connected products and devices" and the fact that they are often connected to each other and to the Internet via wireless networks. Zecher said that allowing device owners or independent repair professionals to service smart home devices and connected appliances could expose consumer data to hackers or identity thieves... Asked whether Security Innovation Center was opposed to consumers having the right to repair devices they purchased and owned, Zecher said the group did oppose that right on the grounds of security, privacy and safety... "People say 'It's just my washing machine. Why can't I fix it on my own?' But we saw the Mirai botnet attack last year... Those kinds of products in the wrong hands can be used to do bad things."

    Read more of this story at Slashdot.

  • Is Cryptocurrency Threatening Earnings at Bank of America? (Slashdot)
    An anonymous reader quotes The Next Web: One of the world's largest financial institutions admitted in its annual report that cryptocurrency is a looming threat to its business model. According to a report filed with the SEC by Bank of America, "Clients may choose to conduct business with other market participants who engage in business or offer products in areas we deem speculative or risky, such as cryptocurrencies. Increased competition may negatively affect our earnings by creating pressure to lower prices or credit standards on our products and services requiring additional investment to improve the quality and delivery of our technology and/or reducing our market share, or affecting the willingness of clients to do business with us."

    Read more of this story at Slashdot.

  • Dart 2: Google's Language Rebooted For Web and Mobile Developers (Slashdot)
    An anonymous reader quotes InfoWorld: Google's Dart language, once positioned a potential replacement for JavaScript in the browser, is being rebooted for client-side web and mobile development in Version 2 of the language. A beta version is now available. Dart 2 features a strengthened type system, a cleaned-up syntax, and a rebuilt developer tool chain. Dart has a succinct syntax and can run on a VM with a just-in-time compiler, with the compiler enabling stateful, hot reload during mobile development. Developers also gain from fast development cycles where code can be edited, compiled, and replaced in apps running on a device. Compiling code ahead of time provides fast startup, Google said. Dart can be compiled to native code for ARM and x86 platforms. Google has used the language to build applications for iOS, Android, and the web.

    Read more of this story at Slashdot.

  • Google's 'Bro Culture' Led To Harassment, Argues New Lawsuit By Software Engineer (Slashdot)
    An anonymous reader quotes the Mercury News: As a young, female software engineer at male-dominated Google, Loretta Lee was slapped, groped and even had a co-worker pop up from beneath her desk one night and tell her she'd never know what he'd been doing under there, according to a lawsuit filed against the Mountain View tech giant... Lee's lawsuit -- filed in Santa Clara County Superior Court -- alleges the company failed to to protect her, saying, "Google's bro-culture contributed to (Lee's) suffering frequent sexual harassment and gender discrimination, for which Google failed to take corrective action." She was fired in February 2016 for poor performance, according to the suit... Lee started at the company in 2008 in Los Angeles and later switched to the firm's Mountain View campus, according to the suit, which asserts that she "was considered a talented and rising star" who received consistently "excellent" performance reviews. Lee claims that the "severe and pervasive" sexual harassment she experienced included daily abuse and egregious incidents. In addition to making lewd comments to her and ogling her "constantly," Lee's male co-workers spiked her drinks with whiskey and laughed about it; and shot Nerf balls and darts at her "almost every day," the suit alleges. One male colleague sent her a text message asking if she wanted a "horizontal hug," while another showed up at her apartment with a bottle of liquor, offering to help her fix a problem with one of her devices, refusing to leave when she asked him to, she alleges. At a holiday party, Lee "was slapped in the face by an intoxicated male co-worker for no apparent reason," according to the suit. Lee resisted reporting an employee who had grabbed her lanyard and grazed her breasts -- and was then written up for being uncooperative. But after filing a report, "HR found her claims 'unsubstantiated,' according to the suit. 'This emboldened her colleagues to continue their inappropriate behavior,' the suit says. "Her fear of being ostracized was realized, she claims, with co-workers refusing to approve her code in spite of her diligent work on it. Not getting her code approved led to her being 'labeled as a poor performer,' the suit says."

    Read more of this story at Slashdot.

  • UVD-Based HEVC Video Encoding Main Now Supported In Mesa 18.1 (Phoronix)
    Earlier this month AMD developers landed VCN-powered video encode support for the HEVC main format while now this has come to the UVD engine so it will work with pre-Raven GPUs...
  • Bitcoin Exchange Accidentally Allowed Customers To Buy Coins For $0 (Slashdot)
    AmiMoJo writes: "A system glitch at cryptocurrency exchange site Zaif enabled users to obtain digital money for free, with one apparently "purchasing" Bitcoin valued at $20,000,000,000,000 and then attempting to cash in on it..." according to the Japanese newspaper Asahi Shimbun. "The glitch, which lasted for 18 minutes from 5:40 p.m. to 5:58 p.m. on Feb. 16, affected Zaif's price calculation system, enabling customers to buy cryptocurrencies for nothing." CoinDesk adds that "At least one customer attempted to resell their bitcoin, but the large amount of the cryptocurrency offered soon drew attention even outside the exchange. The firm later cancelled the transactions and corrected the users' balances. However, a source suggests that the correction is still being agreed with one of the seven users who attempted to transfer the free bitcoin away from the Zaif platform."

    Read more of this story at Slashdot.

  • GitHub Drops Support for Weak Cryptographies, Adds Emojis for Labels (Slashdot)
    An anonymous reader writes: GitHub has quietly made a few changes this month. Labels for issues and pull requests will now also support emojis and on-hover descriptions. And they're also deprecating the anonymous creation of "gist" code snippets on March 19th, since "as the only way to create anonymous content on GitHub, they also see a large volume of spam." Current anonymous gists will remain accessible. But the biggest change involves permanently removing support for three weak cryptographic standards, both on github.com and api.github.com. The three weak cryptography standards that are no longer supported are: TLSv1/TLSv1.1. "This applies to all HTTPS connections, including web, API, and Git connections to https://github.com and https://api.github.com." diffie-hellman-group1-sha1. "This applies to all SSH connections to github.com." diffie-hellman-group14-sha1. "This applies to all SSH connections to github.com."

    Read more of this story at Slashdot.

  • Signal, WhatsApp Co-Founder Launch 'Open Source Privacy Technology' Nonprofit (Slashdot)
    An anonymous reader quotes The Next Web:One of the first messaging services to offer end-to-end encryption for truly private conversations, Signal has largely been developed by a team that's never grown larger than three full-time developers over the years it's been around. Now, it's getting a shot in the arm from the co-founder of a rival app. Brian Acton, who built WhatsApp with Jan Koum into a $19 billion business and sold it to Facebook, is pouring $50 million into an initiative to support the ongoing development of Signal. Having left WhatsApp last fall, he's now free to explore projects whose ideals he agrees with, and that includes creating truly private online services. "Starting with an initial $50,000,000 in funding, we can now increase the size of our team, our capacity, and our ambitions," wrote Signal founder Moxie Marlinspike (a former Twitter executive). Acton will now also serve as the executive chairman of the newly-formed Signal Foundation, which according to its web site will "develop open source privacy technology that protects free expression and enables secure global communication."

    Read more of this story at Slashdot.

  • RADV Vulkan Driver Improvements Coming For Wolfenstein 2 On Wine (Phoronix)
    Wolfenstein II: The New Colossus makes use of the Vulkan graphics API on the id Tech 6 engine but sadly remains Windows-only aside from the consoles. While it runs with Wine, there are some bugs when using the RADV Radeon Vulkan driver but fortunately one of Valve's Linux developers is working on some improvements...
  • Two More 'SWAT' Calls in California -- One Involving a 12-Year-Old Gamer (Slashdot)
    In January an online gamer in California was arrested after at leat 20 fake emergency calls to police, one leading to a fatal shooting in Kansas. But this week in California there's been at least two more fake calls: A 12-year-old gamer heard a knock at his door Sunday -- which turned out to be "teams of Los Angeles police officers and other rescue personnel who believed two people had just hung themselves." The Los Angeles Police Department "said there's no way to initially discern swatting calls from actually emergencies, so they handle every scenario as if someone's life is in danger," according to the Los Angeles Times. The seventh-grader described it as "the most terrifying thing in my life." 36-year-old David Pearce has been arrested for falsely reporting an emergency at a Beverly Hills hotel involving "men with guns" holding him hostage. A local police captain later said that the people in the room had not made the call and in fact might have been asleep through much of the emergency. The Los Angeles Times reports that there's roughly 400 'SWATting' cases each year, according to FBI estimates, adding that "Some experts have said police agencies need to take the phenomenon more seriously and provide formal training to dispatchers and others to better recognize hoax callers." Meanwhile, in the wake of a fatal shooting in Wichita, Kansas lawmakers have passed a new bipartisan bill increasing the penalties for SWAT calls. If a fake call results in a fatality -- and the caller intentionally masks their identity -- it's the equivalent of second-degree murder. "The caller must be held accountable," one lawmaker told the Topeka Capital-Journal.

    Read more of this story at Slashdot.

  • 'Computer History Museum' Honorees Include Python Creator Guido van Rossum (Slashdot)
    On Wednesday the Computer History Museum, "the world's leading institution exploring the history of computing and its transformational impact on society," proudly announced the three Fellow Award honorees for 2018: Dov Frohman-Bentchkowsky -- "For the invention of the first commercial erasable programmable read-only memory (EPROM), which enabled rapid development of microprocessor-based systems." Dame Stephanie Shirley CH -- "For a lifetime of entrepreneurship promoting the growth of the UK software industry and the advancement of women in computing." Guido van Rossum -- "For the creation and evolution of the Python programming language, and for leadership of its community." "We are delighted to induct these outstanding new Fellows with diverse contributions in hardware, in services, and in software," said Len Shustek, the Museum's board chairman. "They are true heroes of the Digital Age."

    Read more of this story at Slashdot.

  • BuzzFeed Unmasks Mastermind Who Urged Peter Thiel To Destroy Gawker (Slashdot)
    One day in 2011 a 26-year-old approached Peter Thiel and said "Look, I think if we datamined Gawker's history, we could find weak points that we could exploit in the court of law," according to the author of a new book. An anonymous reader quotes BuzzFeed News: Peter Thiel's campaign to ruin Gawker Media was conceived and orchestrated by a previously unknown associate who served as a middleman, allowing the billionaire to conceal his involvement in the bankrolling of lawsuits that eventually drove the New York media outlet into bankruptcy. BuzzFeed News has confirmed the identity of that mystery conspirator, known in Thiel's inner circle as "Mr. A," with multiple sources who said that he provided the venture capitalist and Facebook board member with a blueprint to covertly attack Gawker in court. That man, an Oxford-educated Australian citizen named Aron D'Souza, has few known connections to Thiel, but approached him in 2011 with an elaborate proposal to use a legal strategy to wipe out the media organization. That plot ultimately succeeded... D'Souza was aware of Thiel's public comments likening Valleywag to al-Qaeda, and presented a brazen idea: Pay someone or create a company to hire lawyers to go after Gawker. TechCrunch reported earlier this month that Gawker's old posts "will be captured and saved by the non-profit Freedom of the Press Foundation," which was co-founded in 2012 by the late John Perry Barlow. But in addition, the Gawker estate "continues to threaten possible legal action against Thiel, and hopes to begin discovery to examine the billionaire's motivations for secretly funding his legal war," the article concludes. If a New York bankruptcy court approves, and if the process "unearths anything of meaning, the estate may have grounds to sue Thiel on the grounds of tortious interference, the use of legal means to purposely disrupt a business. "To head that off, Thiel bid for the remaining Gawker assets -- including the flapship domain Gawker.com, its archive, and outstanding legal claims, like those against himself -- though Holden has made it known that he may block any sale to Thiel, no matter how much the venture capitalist is willing to bid."

    Read more of this story at Slashdot.

Un homme qui n'a pour moteur que son ambition
va très loin mais n'y apporte rien.
-+- Gilbert Cesbron (1913-1979), de petites choses. -+-