US Republicans query Linux Foundation about open-source security

">
US Republicans query Linux Foundation about open-source security

Wednesday, April 4, 2018

On Monday, two US Republican Party legislators, Greg Walden and Frank Pallone Jr., respectively the chairman and the ranking member of the United States House Committee on Energy and Commerce, co-wrote a public letter to Jim Zemlin, executive director of The Linux Foundation, about open-source software (OSS) and improving its security. They requested Zemlin to answer their questions by no later than April 16.

The letter contained the following four questions; each of the first two has a further two follow-up questions.

  1. Has the CII [Core Infrastructure Initiative] performed a comprehensive study of which pieces of OSS are most crucial to the “global information infrastructure”?
    1. If not, does the CII plan to perform such a study?
    2. What would the CII need in order to do so?
  2. Has the CII, or any other organizations, compiled any statistics on OSS usage?
    1. If not, does the CII plan to perform such a study?
    2. What would the CII need in order to do so?
  3. In your estimation, how sustainable and stable is the OSS ecosystem?
  4. Based on your response to the previous question, how can the OSS ecosystem be made more sustainable and stable?

Walden and Pallone exemplified Heartbleed, a “critical cybersecurity vulnerability” that allowed the hacking of websites and passwords, and millions of medical records in 2014. They also wrote that, in response to that vulnerability, The Linux Foundation established a multi-million dollar project, the Core Infrastructure Initiative, intended to improve the global infrastucture of such software.

The politicians noted large tech companies like Microsoft, Apple Inc., and Adobe Systems respond more quickly to such critical vulnerabilities than distributors and developers of open-source software.

Open-source software is “publicly accessible” and usually freely-licensed for a wide range of use, such as modification and commercial uses. Walden and Pallone also expressed praise toward open-source software and cited a 2015 survey conducted by Black Duck Software saying 78% of companies used such software.

Retrieved from “https://en.wikinews.org/w/index.php?title=US_Republicans_query_Linux_Foundation_about_open-source_security&oldid=4596090”

No Comments | Filed under Uncategorized

How Do You Measure A Chainsaw Blade And Chain?}

How Do You Measure a Chainsaw Blade and Chain?

by

Cullen BlakemanIs your chainsaw starting to seem dull and not perform as well? Looks like it’s time to replace the chain. In order to do this, you will need to know the length of both the chainsaw blade as well as the length and size of your chain. If you’ve checked out the manufacturers’ charts, they might seem a little overwhelming. But it really is pretty simple once you understand what’s involved in the length of the blade and chainsaw chain.

When you’re ready to replace your chain, the first thing to do is determine the size of your chainsaw bar. If you happen to have an Oregon chainsaw, this should be easy. Just check the first two numbers of the ten-digit model number that is stamped on the motor end of the blade. That’s your chainsaw bar length.

Don’t have an Oregon chainsaw that easily shows you the length of the blade? Then here are some tips for figuring it out yourself.

How To Measure Your Chainsaw Blade

[youtube]http://www.youtube.com/watch?v=JXiVFYDL0fI[/youtube]

You may wonder how do you measure a chainsaw blade. To determine what size your chainsaw blade is, you need to measure starting from where the bar comes out of the casing all the way to the end of the bar.

To eliminate any confusion, the words “blade” and “bar” are both used interchangeably to refer to the same thing … the long metal blade that extends from the motor casing and holds the chain that does the actual sawing.

For all manufacturers, chain saw blades are made in 2-inch measurements. Although the most often seen are the 16-, 18- and 20-inch sizes, you can actually buy chainsaw blades as small as 10 inches or as long as 42 inches. If your blade measurement doesn’t end in an even number, then round up to the nearest one.

Measuring A Chainsaw Chain

To measure the chain on your chainsaw, there are two things you will need to know … the number of drive links and the pitch of the chain.

The number of drive links actually determines the length of the chain. A drive link is simply a tooth on the chain. The pitch of the chain will also affect the size of the drive links.

The pitch of a chain is the size of the chain. This is the distance between any three rivets, then divided by two. Your chain pitch is important because it must match the pitch of the drive sprocket and sometimes the bar nose sprocket. The pitch should be stamped on the drive link.

To be more specific, a 1/4″ pitch chain might have 52 drive links and be 2.17 feet in length, while a 3/8″ pitch with 52 drive links would be 3.18 feet in length. The number of drive links has a direct correlation to the blade length.

If you have any questions, the manufacturer of your chainsaw or anyone who makes chains should be happy to help you figure out what you need to know.

But if you know what size

chain saw blade

or

chainsaw chain

you need and are eager to buy a replacement, check out the huge selection and good deals at ChainsawDeals.com

Article Source:

eArticlesOnline.com}

No Comments | Filed under Uncategorized

Electric company faces lawsuits from residents of California neighborhood destroyed by explosion

">
Electric company faces lawsuits from residents of California neighborhood destroyed by explosion

Thursday, October 21, 2010

The Pacific Gas and Electric Company (PG&E) is facing several lawsuits, including one filed by residents of San Bruno, California, after a gas line exploded in their neighborhood on September 10, completely destroying over 50 structures, 37 of them homes. In their lawsuit, residents claim that PG&E knew the pipeline was “defective” and was a “ticking time bomb”. They further allege that the company was aware that the pipeline could fail, but did not act.

This wasn’t an accident. This was a foreseeable consequence of ignoring safety measures

The lawsuit was filed by at least five families who resided in the Glenview neighborhood of San Bruno. The Danko firm who is representing the residents say they expect to file at least a dozen more lawsuits against the company alleging they were liable and responsible for the explosion and the damages that occurred as a result of it. “This wasn’t an accident. This was a foreseeable consequence of ignoring safety measures,” one attorney representing the families said. It has also been reported that several other wrongful death lawsuits have been filed against PG&E. Three people were killed in the explosion.

The explosion and subsequent fire was originally thought to have been a downed commercial aircraft. Live scanner communications at the time of the explosion had stated that fire departments from six different companies reported to the scene. Residents say that firefighters were not able to bring the blaze under control because the pipeline was active for at least 5 hours after the explosion.

Residents filing the lawsuits are seeking damages and removal of the pipeline from the neighborhood. Jim Ruane, the mayor of San Bruno, backs residents in their request to PG&E to remove the pipeline from Glenview. “We want our neighborhood rebuilt, and we want our people back,” he said. A PG&E spokesperson denied having officially received the lawsuits, but said: “We remain committed to our customers in San Bruno and will continue to be there to help rebuild the neighborhood.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Electric_company_faces_lawsuits_from_residents_of_California_neighborhood_destroyed_by_explosion&oldid=4567927”

No Comments | Filed under Uncategorized

Athletes prepare for 2012 Summer Paralympics at the Paralympic Fitness Centre

">
Athletes prepare for 2012 Summer Paralympics at the Paralympic Fitness Centre

Monday, August 27, 2012

London, England — As Paralympians ready for the Games which are set to open later this week, they have access to a world class fitness center inside the Paralympic Village which is designed to maximise their pre-Game preparations.

According to volunteers staffing the center, instead of being a single large room, as in Beijing, the building has numerous rooms. It, along with the adjacent Village Services Centre, is designed to be converted into a school after the games conclude. Rooms have been structured as a gym, an auditorium, and science laboratories.

Gym equipment is supplied by Technogym, an Italian firm that has supplied gym equipment for the Olympics since 2000. Equipment has been provided not just for for the Fitness Centre, but for gyms at all the Olympic venues. The newest equipment is oriented toward maximum flexibility, allowing athletes to exercise the particular muscles that they most require for their sport.

In addition to the equipment, the Fitness Centre also provides instructors trained in the use of the equipment, the likes of which athletes from many countries have never seen before. There are also a number of instructors available to provide motivational training.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Retrieved from “https://en.wikinews.org/w/index.php?title=Athletes_prepare_for_2012_Summer_Paralympics_at_the_Paralympic_Fitness_Centre&oldid=1731640”

Posted: June 28th, 2022 by Admin

No Comments | Filed under Uncategorized

Are You Subject To A Pre Employment Background Check

By Morgan Hamilton

You probably went through a pre employment background check before you landed your current job. Anybody who wants to find a job often goes through a pre employment background check before being hired for any position. These checks are being done because the employers need to learn about the ilk of individuals they’re hiring. This means that your past may come back to haunt you when a pre employment background check is done when you apply for a job.

My father always told his children, friends and anyone else who will listen that the past truly matters. You may not agree with this, but my dad was just being realistic. I agree with my father and I also believe that we mold our characters via our actions. You are what you do in a way. Now, remember that I’m not necessarily addressing careers, but rather routine choices and actions. The past can always come back to bite a person in the butt in my experience.

[youtube]http://www.youtube.com/watch?v=kxx55e1ZQCY[/youtube]

The pre employment background check routines are a good example of how your past can affect you in the future. If you have been fired before, or accused of stealing at your past places of employment, then your potential employers will think twice about hiring you. The same goes if you have been convicted of a crime. These are just some of the factors that may influence the task of finding new work.

However, the effects of your past is not only limited to pre employment background check routines. The past can also be a factor in your relationships. All that garbage about the past not being relevant that cheesy musicians rant over and over in their songs is bogus. The past will always matter and have some bearing on the present and future. The important think is that you realize that it s important to think about what you’re doing before you do it.

There s no reason to fret, now that I’ve got you thinking about the choices you make and pre employment background check routines. It s still possible to get a decent job, even if you have a turbulent past because employers know that everyone deserves a second chance.

About the Author: Morgan Hamilton offers expert advice and great tips regarding all aspects concerning Pre Employment Background Check. Get more information by visiting

generalbusinessinfo.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=111177&ca=Jobs

Posted: June 27th, 2022 by Admin

No Comments | Filed under Uncategorized

World Wrestling Entertainment heir Shane McMahon resigns from the company

">
World Wrestling Entertainment heir Shane McMahon resigns from the company

Friday, October 16, 2009

Predicted heir to World Wrestling Entertainment Shane McMahon has announced he will leave the company on January 1, 2010. McMahon is the son of current owner Vincent K. McMahon and the current Executive Vice President of Global Media for the company. With the departure of Shane, it will be the first time that a male heir will not take over the company when Vince retires.

Shane announced his resignation on WWE.com earlier today saying, “It is with great sadness that I announce my resignation from the WWE, effective January 1, 2010.” He mentioned how he “never even considered a future outside the walls of the WWE.” He continued to thank his father and superstars of today and the past. According to Shane, he resigned because it was his “to pursue outside ventures.”

World Wrestling Entertainment released an official statement responding to Shane’s announcement. Current owner and Shane’s father Vince McMahon said, “Even though I am personally saddened by Shane’s decision to leave the company, I am proud of the enormous contributions he has made. He will unquestionably bring passion, commitment and extensive business experience to any endeavour he pursues.”

Shane was the fourth generation to World Wrestling Entertainment. He is the son of Vincent K. McMahon, the grandson of Vincent J. McMahon and the great-grandson of Jess McMahon. He has two sons who are considered the fifth generation.

Retrieved from “https://en.wikinews.org/w/index.php?title=World_Wrestling_Entertainment_heir_Shane_McMahon_resigns_from_the_company&oldid=4598220”

Posted: June 26th, 2022 by Admin

No Comments | Filed under Uncategorized

Quality, innovation and competitiveness centre-stage at Taipei Int’l Hardware & DIY Show

">
Quality, innovation and competitiveness centre-stage at Taipei Int’l Hardware & DIY Show

Friday, October 19, 2007

The 7th Taipei International Hardware & DIY Show, organized by Kaigo Taiwan (The representative of Koelnmesse in Taiwan) and Koelnmesse GmbH, started on October 18-20 at Taipei World Trade Center Exhibition Hall 3. This show has 183 participants using 300 booths to exhibit accessories and tools on esoteric fabricating, home-living applications, and security.

With people in Taiwan valuing on the quality of home-living, the organizer set a pre-show pavilion of “2008 Taipei Home & Lifestyle Fair” and invited B&Q & HomeBox holding DIY workshops for visitors.

This exhibition is conjuncted with industry and applications, and pursuing with three main topics of “Quality, Innovation and Competitiveness”. International factories such as Hitachi, Rexon, Ryobi participated this show for the export opportunity in the hardware industry.

After the “Product Certificates and Testing” pavilion in TAITRONICS Autumn, Bureau of Standards, Metrology & Inspection, M.O.E.A., R.O.C. (Taiwan) and DIY in Europe magazine were invited for speeches focused on certifications on hardware & DIY products and environment issues in EU.

Retrieved from “https://en.wikinews.org/w/index.php?title=Quality,_innovation_and_competitiveness_centre-stage_at_Taipei_Int%27l_Hardware_%26_DIY_Show&oldid=545815”

Posted: June 24th, 2022 by Admin

No Comments | Filed under Uncategorized

Listening to you at last: EU plans to tap cell phones

">
Listening to you at last: EU plans to tap cell phones

Monday, October 19, 2009

A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The €14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate.

INDECT produced the accidentally published report as part of their “Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data” project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission’s Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom.

Indicated in the initial trial’s report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users’ and article subjects’ relations with others, organisations, and in-project movements.

Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a “threat”, it would be the INDECT system’s job to predict it.

Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.

Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK’s Daily Telegraph, Liberty’s director, Shami Chakrabarti, described a possible future implementation of INDECT as a “sinister step” with “positively chilling” repercussions Europe-wide.

“It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,” Suresh Manandhar, leader of the University of York researchers involved in the “Work Package 4” INDECT component, responded to Wikinews. “However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.”

HAVE YOUR SAY
Should the EU carry out this research without a wider public debate?
Add or view comments

Although Wikinews attempted to contact Professor Helen Petrie of York University, the local member of Project INDECT’s Ethics board, no response was forthcoming. The professor’s area of expertise is universal access, and she has authored a variety of papers on web-accessibility for blind and disabled users. A full list of the Ethics board members is unavailable, making their suitability unassessable and distancing them from public accountability.

One potential application of Project INDECT would be implementation and enforcement of the U.K.’s “MoD Manual of Security“. The 2,389-page 2001 version passed to Wikileaks this month — commonly known as JSP-440, and marked “RESTRICTED” — goes into considerable detail on how, as a serious threat, investigative journalists should be monitored, and effectively thwarted; just the scenario the Project INDECT video could be portraying.

When approached by Wikinews about the implications of using INDECT, a representative of the U.K.’s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded.

Wikinews’ Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too — having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon — The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute. The report raises serious questions about the heavy involvement of defence and IT companies in “security research”.

On the record, Katz answered a few questions for Wikinews.

((WN)) Is this illegal? Is this an invasion of privacy? Spying on citizens?

Eddan Katz When the European Parliament issued the September 5, 2001 report on the American ECHELON system they knew such an infrastructure is in violation of data protection law, undermines the values of privacy and is the first step towards a totalitarian surveillance information society.

((WN)) Who is making the decisions based on this information, about what?

E.K. What’s concerning to such a large extent is the fact that the projects seem to be agnostic to that question. These are the searching systems and those people that are working on it in these research labs do search technology anyway. […] but its inclusion in a database and its availability to law enforcement and its simultaneity of application that’s so concerning, […] because the people who built it aren’t thinking about those questions, and the social questions, and the political questions, and all this kind of stuff. [… It] seems like it’s intransparent, unaccountable.

The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center. In their analysis of the never-officially-recognised U.S. Echelon spy system it states, “[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.” On privacy and data-protection legislation enacted at E.U. level it comments, “[such does] not apply to ‘the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'”.

Part of the remit in their analysis of Echelon was rumours of ‘commercial abuse’ of intelligence; “[i]f a Member State were to promote the use of an interception system, which was also used for industrial espionage, by allowing its own intelligence service to operate such a system or by giving foreign intelligence services access to its territory for this purpose, it would undoubtedly constitute a breach of EC law […] activities of this kind would be fundamentally at odds with the concept of a common market underpinning the EC Treaty, as it would amount to a distortion of competition”.

Ben Hayes’ NeoConoptiocon report, in a concluding section, “Following the money“, states, “[w]hat is happening in practice is that multinational corporations are using the ESRP [European Seventh Research Programme] to promote their own profit-driven agendas, while the EU is using the programme to further its own security and defence policy objectives. As suggested from the outset of this report, the kind of security described above represents a marriage of unchecked police powers and unbridled capitalism, at the expense of the democratic system.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Listening_to_you_at_last:_EU_plans_to_tap_cell_phones&oldid=2611950”

Posted: June 23rd, 2022 by Admin

No Comments | Filed under Uncategorized

Computer Hardware And Networking Training Career Preparation

Teaching can be obtain from colleges and universities throughout the country that offer programs to this field. At its most basic meaning computer hardware networking is when two or more computers share information. The most used network worldwide is the Internet, which consists of thousands of connections. Students can step into career preparation at any level of tutoring. The major areas of preparation include:

Students learn to uphold function and support in all program, which prepares them to become specialist. Each specific field provides students with a central education. Students will learn how to work with local and wide area computer hardware and networking trainingaccording to the job tasks that go directly with their exacting area of expertise. By gaining a strong computer background student are able to fasten problems connected with networks by creating plans to reduce their effects and get better systems.

Students that work through network engineering program learn to design and protect relations between computers. Theories and technical procedures are highly covered giving students the ability to generate, manage, and troubleshoot connections. A variety of computer related courses discover how to link certain computers to establish virtual private hardware network training courses and develop direction-finding systems. Internetwork training, firewall technology, development, and multilayer switching prepare students to obtain entry-level to higher careers. Becoming network architectures and services administrator are some possible career opportunity.

The work connected with computer administration, design, and safety can be learned when students complete programs in network management. Training encompasses various technical methods to develop, put into practice, and maintain computer relations. Areas involved in the different processes it takes to manage best institute for Computer Hardwareand networking courseoften include peripherals and integrated software. Students learn to properly increase productivity and effectiveness. Remote access, wireless communication, desktop support, and information technology courses other subjects studied. They provide students with the skills to test and assess computer hardware, software, and data. Most student step into careers as specialist.

Network support training program focus a lot on configuring, creating, installing, organization, and fixing computer systems. The support known to networks, which is often on a daily basis, provides businesses and organizations with self-assurance that their technologies will purpose correctly. Courses often include topics on software addition and data security. Students often become support analysts and consultant.

Students that follow training will learn to build, manage, and influence networks to foster message to other organization. Education focuses a lot on construct hardware networking. Students can become administrator and computer system engineers.

Each career field prepare students to turn out to be vital members of the computer networking industry. choose an accredited program and carrying out training are the two main steps that student can follow to productively obtain careers.

Posted: June 23rd, 2022 by Admin

No Comments | Filed under School

Wikinews interviews World Wide Web co-inventor Robert Cailliau

">
Wikinews interviews World Wide Web co-inventor Robert Cailliau

Thursday, August 16, 2007

The name Robert Cailliau may not ring a bell to the general public, but his invention is the reason why you are reading this: Dr. Cailliau together with his colleague Sir Tim Berners-Lee invented the World Wide Web, making the internet accessible so it could grow from an academic tool to a mass communication medium. Last January Dr. Cailliau retired from CERN, the European particle physics lab where the WWW emerged.

Wikinews offered the engineer a virtual beer from his native country Belgium, and conducted an e-mail interview with him (which started about three weeks ago) about the history and the future of the web and his life and work.

Wikinews: At the start of this interview, we would like to offer you a fresh pint on a terrace, but since this is an e-mail interview, we will limit ourselves to a virtual beer, which you can enjoy here.

Robert Cailliau: Yes, I myself once (at the 2nd international WWW Conference, Chicago) said that there is no such thing as a virtual beer: people will still want to sit together. Anyway, here we go.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_World_Wide_Web_co-inventor_Robert_Cailliau&oldid=4608361”

Posted: June 21st, 2022 by Admin

No Comments | Filed under Uncategorized