industryterm:telephony

  • CERN wechselt von Microsoft- zu Open-Source-Software | heise online
    https://www.heise.de/newsticker/meldung/CERN-wechselt-von-Microsoft-zu-Open-Source-Software-4447421.html

    Das europäische Kernforschungszentrum CERN möchte Lizenzkosten für proprietäre Programme sparen. Dazu dient das „Microsoft Alternatives project“, kurz MAlt.

    Migrating to open-source technologies | CERN
    https://home.cern/news/news/computing/migrating-open-source-technologies

    The Microsoft Alternatives project (MAlt) started a year ago to mitigate anticipated software license fee increases. MAlt’s objective is to put us back in control using open software. It is now time to present more widely this project and to explain how it will shape our computing environment.

    Background

    Over the years, CERN’s activities and services have increasingly relied on commercial software and solutions to deliver core functionalities, often leveraged by advantageous financial conditions based on the recognition of CERN’s status as an academic, non-profit or research institute. Once installed, well-spread and heavily used, the leverage used to attract CERN service managers to the commercial solutions tends to disappear and be replaced by licensing schemes and business models tuned for the private sector.

    Given the collaborative nature of CERN and its wide community, a high number of licenses are required to deliver services to everyone, and when traditional business models on a per-user basis are applied, the costs per product can be huge and become unaffordable in the long term.

    A prime example is that CERN has enjoyed special conditions for the use of Microsoft products for the last 20 years, by virtue of its status as an “academic institution”. However, recently, the company has decided to revoke CERN’s academic status, a measure that took effect at the end of the previous contract in March 2019, replaced by a new contract based on user numbers, increasing the license costs by more than a factor of ten. Although CERN has negotiated a ramp-up profile over ten years to give the necessary time to adapt, such costs are not sustainable.

    Anticipating this situation, the IT department created the Microsoft Alternatives project, MAlt, a year ago.

    MAlt’s objective

    The initial objective was to investigate the migration from commercial software products (Microsoft and others) to open-source solutions, so as to minimise CERN’s exposure to the risks of unsustainable commercial conditions. By doing so, the laboratory is playing a pioneering role among public research institutions, most of whom have recently been faced with the same dilemma.

    MAlt is a multi-year effort and it will now enter a new phase with the first migrations.

    The project’s principles of engagement are to:

    Deliver the same service to every category of CERN personnel
    Avoid vendor lock-in to decrease risk and dependency
    Keep hands on the data
    Address the common use-cases

    Coming in 2019

    The first major change coming is a pilot mail Service for the IT department and volunteers this summer, followed by the start of CERN-wide migration. In parallel, some Skype for Business clients and analogue phones will migrate to a softphone telephony pilot.

    Many other products and services are being worked on: evaluations of alternative solutions for various software packages used for IT core services, prototypes and pilots will emerge along the course of the next few years.

    How will MAlt impact you and how to contribute?

    You will find all the details and progress on the project site and more particularly the list of products addressed in the project.

    The new computing newsletter blog will communicate on general items, and in addition, a general presentation will be provided in the Main Auditorium on 10 September at 2.30 p.m.

    Needless to say, isolated initiatives will waste effort and resources. Instead, if you or your team are willing to participate, if you have ideas, the best way is to join the coordinated Microsoft Alternatives effort by checking the project site and contributing to the discussion channel.

    Interesting times ahead! While the Microsoft Alternatives project is ambitious, it’s also a unique opportunity for CERN to demonstrate that building core services can be done without vendor and data lock-in, that the next generation of services can be tailored to the community’s needs and finally that CERN can inspire its partners by collaborating around a new range of products.

    #FLOSS #Microsoft

  • The NSA Report:
    Liberty and Security in a Changing World
    The President’s Review Group on Intelligence and Communications Technologies: Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein & Peter Swire
    (December 2013)

    The Review Group on Intelligence and Communications Technology, set up by President Obama in the wake of Edward Snowden’s revelations of NSA spying, published a 300-page report outlining 46 recommendations that could serve as a blueprint for a reconfigured spy agency.

    http://press.princeton.edu/titles/10296.html

    This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.

    https://obamawhitehouse.archives.gov/blog/2013/12/18/liberty-and-security-changing-world

    The comprehensive report, unclassified in its entirety, sets forth forty-six recommendations designed to protect national security and advance our foreign policy while respecting our longstanding commitment to privacy and civil liberties. The Review Group’s product recognizes the need to maintain the public trust – including the trust of our friends and allies abroad – and proposes steps to reduce the risk of unauthorized disclosures.

    In particular, the report highlights the need to develop principles designed to create sturdy foundations for the future, safeguarding liberty and security amidst a changing world. The recommendations emphasize risk management and the need to balance a wide range of potential consequences, including both costs and benefits, in considering potential reforms.

    https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf

    The initial request of that report by Obama in August 2013

    https://obamawhitehouse.archives.gov/the-press-office/2013/08/12/presidential-memorandum-reviewing-our-global-signals-intel

    What’s in the report?

    Highlights of the Report of the President’s Review Group on Intelligence and Communications Technologies
    (Marty Lederman)
    https://www.justsecurity.org/4903/highlights-prgict

    Comment on the report by one of the writers

    http://www.huffingtonpost.com/geoffrey-r-stone/inside-the-presidents-rev_b_4485016.html

    A review of that report

    Inside the White House N.S.A. report: the good and the bad
    (John Cassidy, December 2013)
    http://www.newyorker.com/news/john-cassidy/inside-the-white-house-n-s-a-report-the-good-and-the-bad
    I have some doubts about whether the report is as radical as these reactions might suggest. Ultimately, it is more about preserving the essentials of the current system, and making them more palatable rather than knocking them down. Still, it’s a fair bet to say that when the White House recruited the Review Group, in August, it didn’t expect their conclusions to be hailed by the A.C.L.U. The fact that they were says two things: the critics of the N.S.A., Snowden included, were right; and the members of the Review Group tackled a serious subject in a serious manner.

    A critique of that report:
    (Fred Fleiz, Clare Lopez, January 2014)

    https://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Sessions.pdf

    #NSA
    #privacy
    #Snowden_revelations

    • Our review suggests that the information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks and could readily have been obtained in a timely manner using conventional section 215 orders.

  • EXCLUSIVE - Huffington Post Writer : Editors Deleted My Article on Hillary’s Imminent Indictment, Disabled Me from Writing - Breitbart
    http://www.breitbart.com/big-government/2016/05/30/exclusive-huffington-post-writer-editors-deleted-my-article-on-hillarys-i

    Comme dans la plupart de ce genre d’affaires on n’a aucune idée de la véracité des informations. Après tout je crains que l’article censuré contienne quelques éléments dont l’authenticité sera prouvé dans l’avenir.

    Oups, il y en a qui contredisent les affirmations contre les Clintons et leur fondation.

    Meet Crazy Frank Huguenard, a CLASSIC BernieBro
    http://cannonfire.blogspot.de/2016/05/meet-crazy-frank-huguenard-classic.html

    I think I know why the thing was deleted: Huguenard is a liar. He falsely claimed that Hillary is being indicted because an official investigation revealed the Clinton Foundation to be a criminal enterprise.

    Here is the actual wording:

    James Comey and The FBI will present a recommendation to Loretta Lynch, Attorney General of the Department of Justice, that includes a cogent argument that the Clinton Foundation is an ongoing criminal enterprise engaged in money laundering and soliciting bribes in exchange for political, policy and legislative favors to individuals, corporations and even governments both foreign and domestic.

    The truth: There is NO GODDAMNED INVESTIGATION OF THE CLINTON FOUNDATION and thus NO INDICTMENT.

    L’article censuré du Huffington Post

    Hillary Clinton to be Indicted on Federal Racketeering Charges
    https://archive.is/bERJ6

    Here’s what we do know. Tens of millions of dollars donated to the Clinton Foundation was funneled to the organization through a Canadian shell company which has made tracing the donors nearly impossible. Less than 10% of donations to the Foundation has actually been released to charitable organizations and $2M that has been traced back to long time Bill Clinton friend Julie McMahon (aka The Energizer). When the official investigation into Hillary’s email server began, she instructed her IT professional to delete over 30,000 emails and cloud backups of her emails older than 30 days at both Platte River Networks and Datto, Inc. The FBI has subsequently recovered the majority, if not all, of Hillary’s deleted emails and are putting together a strong case against her for attempting to cover up her illegal and illicit activities.
    A conviction under RICO comes when the Department of Justice proves that the defendant has engaged in two or more examples of racketeering and that the defendant maintained an interest in, participated in or invested in a criminal enterprise affecting interstate or foreign commerce. There is ample evidence already in the public record that the Clinton Foundation qualifies as a criminal enterprise and there’s no doubt that the FBI is privy to significantly more evidence than has already been made public.
    Under RICO, the sections most relevant in this case will be section 1503 (obstruction of justice), section 1510 (obstruction of criminal investigations) and section 1511 (obstruction of State or local law enforcement). As in the case with Richard Nixon after the Watergate Break-in, it’s the cover-up of a crime that will be the Clintons’ downfall. Furthermore, under provisions of title 18, United States Code: Section 201, the Clinton Foundation can be held accountable for improprieties relating to bribery. The FBI will be able to prove beyond a reasonable doubt that through the Clinton Foundation, international entities were able to commit bribery in exchange for help in securing business deals, such as the uranium-mining deal in Kazakhstan.

    L’auteur

    Frank Huguenard
    http://www.beyondmefilm.com/index.php/about

    Hi, my name is Frank. Like everyone else, I’ve got a story but my story is not so important. What is important is that however the chapters and verses of my journey have unfolded, I’ve been fortunate enough to be able to take some of the lessons I’ve learned in this classroom we call life and disseminate that knowledge and wisdom in documentary films so that everyone can learn from them.

    In the classical sense of the word, I’m a scientist. By this I mean to say that I’m someone who’s always had a thirst for knowledge and have questioned everything with a skeptical, but open mind. The word science is derived from the Latin words scientia, which means ’knowledge’ and scīre which means ’to know’. Throughout my life, I’ve experienced first-hand several instances of pre-cognition and telepathy that have proven to me that the worldview that we’ve been taught in our schools about the nature of reality is at best, incomplete, and at worst, completely wrong. Modern Science has evolved over the past few hundred years to totally deny us our spirituality and as a result, our planet is undergoing catastrophic changes. As a consequence, we need to take immediate action in the form of a major course correction that alters Modern Science to include consciousness as a fundamental component of our collective reality.

    So over the past 20 years or so, I’ve embarked on something that I like to call spiritualology, which is the research, examination, interpretation, distillation and subsequent re-synthesis of science, religion, spirituality, philosophy, psychology, anthropology into a new model that can use to possibly explain and understand our spiritual existence. My goal is to be part of the evolution of human consciousness that is happening on the planet right now by helping people to become aware of, nurture and ultimately evolve their own consciousness.

    Personally, between the many chapters of my life, I’ve been known to have a wry sense of humor, I’ve created a phenomenal new team sport, I’ve dabbled in heirloom tomatoes, operated a gourmet “Indian” pizza restaurant, wrote a little ditty about devotion and invented some very disruptive technologies in the telephony industry. The technologies I invented included in 2002 developing Visual Voicemail, ’Siri-like’ Mobile Voice Recognition Services & Universal Voicemail (years prior to the release of the iPhone) and in the year 2000, I developed a video communications platform that was basically a combination of the features of both YouTube & Skype (years before the introduction of Skype & YouTube).

    All is well.

    En réponse à https://seenthis.net/messages/538645

    Conclusion : Il ne faut jamais croire ce qu’on lit « sur internet » sans avoir vérifié ses sources. Puisque cette phrase s’applique aussi à chaque journal, radio et émission de télévision, il est conseillé de ne donner son avis qu’àpropos de sujets qu’on a étudié soi même.

    Le reste est silence.

    #USA #élections #crime_organisé

  • Curfew continues; normal life hit for 43rd day in Kashmir - Times of India
    http://timesofindia.indiatimes.com/india/Curfew-continues-normal-life-hit-for-43rd-day-in-Kashmir/articleshow/53782502.cms

    Curfew remained in force in Srinagar district and two south Kashmir towns even as normal life in the valley was paralysed for the 43rd day on Saturday due to unrest in the wake of killing of Hizbul Mujahideen terrorist Burhan Wani on July 8.

    Curfew is in force in entire Srinagar district, Anantnag town and Pampore town as a precautionary measure,” a police official said.
    The official said restrictions on the movement of the people were in force in rest of the valley.

    The separatist camp has called for an “Azadi march” to district headquarters today as part of their protest schedule.

    Normal life remained paralysed for the 43rd consecutive day due to curfew, restrictions and separatist-sponsored strike following Wani’s killing in an encounter with security forces.

    Schools, colleges and private offices remained closed while public transport remained off roads. The attendance in government offices was thin.

    Mobile internet and telephony services also remained suspended.

    The separatist camp, headed by Syed Ali Shah Geelani, Mirwaiz Umar Farooq and Mohammad Yasin Malik, has extended the agitation till August 25
    As many as 64 persons including two cops have been killed in the clashes that began on July 9.

  • Replicant
    http://www.replicant.us/freedom-privacy-security-issues.php

    Recommendations

    Given the current situation, there is no ideal device available that would satisfy all the requirements to fully respect users’ freedom: hardware freedom is missing and most firmwares, modem operating systems and bootroms are non-free. However, it is possible to choose a device that runs with free bootloaders and a free mobile operating system: Replicant, as well as free applications.

    Privacy/security cannot be reliably achieved, but it is possible to get close to it by choosing a device that is not proven to have bad modem isolation, provides a reliable way of deactivating the modem or doesn’t feature any modem at all, in addition to running software that is as free as possible and following some general good advice.

    If compromising on privacy/security is not an option, or anything serious is at stake (e.g. political activism or journalism in a sensitive area), it is advised to avoid using a telephony-enabled device at all.

    #replicant #android

  • FreeCalypso Libre Phone Project
    https://www.freecalypso.org

    Prior to our project, all existing cellular phones without exception (dumb, smart, old, new, whatever) ran proprietary firmware which we could not study or modify, and this situation caused us severe distress. Alice could be a devout user of free software, never touching a proprietary operating system on any PC or other general-purpose computer, but the moment she would like to call her boyfriend Bob and tell him how her day went, she is forced to use a phone, dumb or smart, whose core telephony functions are driven by proprietary code she cannot study or modify.

    #Firmware #Libriste #Logiciel_libre #Open_source #Téléphone_mobile

  • The Switchboard: The FISA Court just approved bulk collection of phone records, again
    http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/14/the-switchboard-the-fisa-court-just-approved-bulk-collection-of-phon

    FISC approves phone metadata collection yet again. “The Foreign Intelligence Surveillance Court has once again approved the blanket collection of telephony metadata from American phone companies,” reports Peter Bright at Ars Technica. This is the same program that came to light after documents were leaked by former #NSA contractor #Edward_Snowden.

    • Mais cette fois-ci, on le sait, cf. http://seenthis.net/messages/184455

      Dans le WP :

      Speaking of the phone records program, our Washington Post colleagues Carol Leonnig and Ellen Nakashima, remind us that a key document on the program is still missing from the public disclosures: “the original — and still classified — judicial interpretation that held that the bulk collection of Americans’ data was lawful.” Sources told them that the original document is about 80 pages and was written by Colleen Kollar-Kotelly, then the chief judge of the Foreign Intelligence Surveillance Court.

  • Data leaks and what they could mean for business

    http://www.icc-ccs.org/news/870-data-leaks-and-what-they-could-mean-for-business

    Je poste pour garder la référence

    Data leaks and what they could mean for business

    Monday, 16 September 2013 13:00

    There has been large and on-going coverage of the leaks made by the NSA contractor Edward Snowden and the revelations regarding collection of huge amounts of telephony and internet data by the US and UK’s intelligence services. This has further escalated the debate about the over-reach of the intelligence services’ mandate in the “War on Terror”, its proportionality and its effect on privacy.

    At ICC Commercial Crime Services we have been closely monitoring this story and its ramifications for private business. For a number of years this kind of monitoring has been an open secret of which we regularly warned delegates of our regular Internet Intelligence courses. The recent revelations have confirmed both the size and scope of the data collection that has been going on.

    #surveillance #contrôle #snowden #prism #leaks

    • “One argument in favour of this kind of data collection is that the US and UK governments are only looking to stop terrorists and organised criminals, not spy on innocent people and companies,” says ICC Counterfeiting Intelligence Bureau Assistant Director Max Vetter. “However, one of the clauses used for this data collection includes “ economic well-being ”, an arbitrary catch-all clause could mean anything at all. Could this mean the “ economic well-being ” of a US based company, and therefore the US, over that of a Chinese or British one? This could blur the line between data collection for “ economic well-being ” and simple corporate espionage .”