• Quelques organismes qui défendent le domaine publique en Allemagne et ailleurs

    Commons und Konvivialismus – Das Commons-Institut

    Das »Konvivialistische Manifest« (2014 auf Deutsch erschienen) hat die globale Debatte um die Frage neu formatiert, wie wir das Zusammenleben angesichts von Klimakatastrophe und Finanzkrisen gestalten wollen und müssen. Die Beiträge des Bandes »Konvivialismus. Eine Debatte« (Hg. Frank Adloff und Volker M. Heins, erschienen im Transcript-Verlag) eröffnen nun die Diskussion um die Möglichkeiten und Grenzen des Manifests im deutschsprachigen Raum: Wo liegen seine Stärken, wo die Schwächen? Was hieße es, eine konviviale Gesellschaft anzustreben – in Politik, Kultur, Zivilgesellschaft und Wirtschaft? Welche neuen Formen des Zusammenlebens sind wünschenswert und welche Chancen bestehen, sie durchzusetzen? Acht Mitglieder des Commons-Instituts haben einen Kommentar-Beitrag zu dem Diskussionsband geschrieben

    Free software is a matter of liberty, not price — Free Software Foundation — working together for free software

    The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom. We defend the rights of all software users.
    As our society grows more dependent on computers, the software we run is of critical importance to securing the future of a free society. Free software is about having control over the technology we use in our homes, schools and businesses, where computers work for our individual and communal benefit, not for proprietary software companies or governments who might seek to restrict and monitor us. The Free Software Foundation exclusively uses free software to perform its work.

    GNU und die Freie-Software-Bewegung

    GNU ist ein Betriebssystem, das Freie Software ist ‑ d. h. es respektiert die Freiheit der Nutzer. Das GNU-Betriebssystem besteht aus GNU-Paketen (Programme, die speziell vom GNU-Projekt freigegeben wurden) sowie von Dritten freigegebene Freie Software. Die Entwicklung von GNU ermöglichte es einen Rechner ohne Software benutzen zu können, die Ihre Freiheit mit Füßen treten würde.

    Commons einfach erklärt - Hauptsache Commons

    Die Haupt-Commons-Formel lautet:
    ∑[aD+nW] = bL

    aD = anderes DENKEN
    nW = neues WIRTSCHAFTEN
    bL = besseres LEBEN

    Das Handeln nach Commons-Prinzipien ermöglicht eine Gesellschaft ohne soziale Widersprüche oder ökonomische Krisen. Commons ersetzen die alten Strukturen. Sie bilden sich selbst organisierende Netzwerke aus, geeignet für Innovationen, da sie die kollektive Intelligenz für das Wohlergehen Aller nutzen.

    Wildnis in Deutschland - Hauptsache Commons

    Die Initiative „Wildnis in Deutschland“ wird von 18 Naturschutzorganisationen getragen. Die Beteiligten finden, dass es ’höchste Zeit für mehr Wildnis in Deutschland’ ist !

    Sie unterstützen die Gründung von Nationalparks und die Schaffung von Wildnisgebieten und stärken die Öffentlichkeitsarbeit rund um das Thema Wildnis. Gemeinsam mit vielen Partnern und Initiativen sind sie aktiv für mehr faszinierende große Wildnisgebiete in Deutschland – für uns, unsere Kinder und Enkel.

    Creativity & Innovation | Electronic Frontier Foundation

    Our digital future depends on our ability to access, use, and build on technology. A few media or political interests shouldn’t have unfair technological or legal advantages over the rest of us. Unfortunately, litigious copyright and patent owners can abuse the law to inhibit fair use and stifle competition. Internet service providers can give established content companies an advantage over startups and veto the choices you make in how to use the Internet. The Electronic Frontier Foundation fights against these unfair practices and defends digital creators, inventors, and ordinary technology users. We work to protect and strengthen fair use, innovation, open access, net neutrality, and your freedom to tinker.

    In principle, intellectual property laws (or IP law, a catchall term for copyright, patents, and trademarks) should serve the public in a number of ways. Copyrights provide economic incentives for authors and artists to create and distribute new expressive works. Patents reward inventors for sharing new inventions with the public, granting them a temporary and limited monopoly on them in return for contributing to the public body of knowledge. Trademarks help protect customers by encouraging companies to make sure products match the quality standards the public expects.

    #domaine_publique #creative_commons #convivialité #Allemagne

  • Adversarial Interoperability: Reviving an Elegant Weapon From a More Civilized Age to Slay Today’s Monopolies | Electronic Frontier Foundation

    Voici ce que le mouvement pour le logiciel libre peut apprendre des tactiques des concurrents de Microsoft - si vous ne pouvez pas gagner contre les géants, profitez d’eux.

    Today, Apple is one of the largest, most profitable companies on Earth, but in the early 2000s, the company was fighting for its life. Microsoft’s Windows operating system was ascendant, and Microsoft leveraged its dominance to ensure that every Windows user relied on its Microsoft Office suite (Word, Excel, Powerpoint, etc). Apple users—a small minority of computer users—who wanted to exchange documents with the much larger world of Windows users were dependent on Microsoft’s Office for the Macintosh operating system (which worked inconsistently with Windows Office documents, with unexpected behaviors like corrupting documents so they were no longer readable, or partially/incorrectly displaying parts of exchanged documents). Alternatively, Apple users could ask Windows users to export their Office documents to an “interoperable” file format like Rich Text Format (for text), or Comma-Separated Values (for spreadsheets). These, too, were inconsistent and error-prone, interpreted in different ways by different programs on both Mac and Windows systems.

    Apple could have begged Microsoft to improve its Macintosh offerings, or they could have begged the company to standardize its flagship products at a standards body like OASIS or ISO. But Microsoft had little motive to do such a thing: its Office products were a tremendous competitive advantage, and despite the fact that Apple was too small to be a real threat, Microsoft had a well-deserved reputation for going to enormous lengths to snuff out potential competitors, including both Macintosh computers and computers running the GNU/Linux operating system.

    Apple did not rely on Microsoft’s goodwill and generosity: instead, it relied on reverse-engineering. After its 2002 “Switch” ad campaign—which begged potential Apple customers to ignore the “myths” about how hard it was to integrate Macs into Windows workflows—it intensified work on its iWork productivity suite, which launched in 2005, incorporating a word-processor (Pages), a spreadsheet (Numbers) and a presentation program (Keynote). These were feature-rich applications in their own right, with many innovations that leapfrogged the incumbent Microsoft tools, but this superiority would still not have been sufficient to ensure the adoption of iWork, because the world’s greatest spreadsheets are of no use if everyone you need to work with can’t open them.

    What made iWork a success—and helped re-launch Apple—was the fact that Pages could open and save most Word files; Numbers could open and save most Excel files; and Keynote could open and save most PowerPoint presentations. Apple did not attain this compatibility through Microsoft’s cooperation: it attained it despite Microsoft’s noncooperation. Apple didn’t just make an “interoperable” product that worked with an existing product in the market: they made an adversarially interoperable product whose compatibility was wrested from the incumbent, through diligent reverse-engineering and reimplementation. What’s more, Apple committed to maintaining that interoperability, even though Microsoft continued to update its products in ways that temporarily undermined the ability of Apple customers to exchange documents with Microsoft customers, paying engineers to unbreak everything that Microsoft’s maneuvers broke. Apple’s persistence paid off: over time, Microsoft’s customers became dependent on compatibility with Apple customers, and they would complain if Microsoft changed its Office products in ways that broke their cross-platform workflow.

    Since Pages’ launch, document interoperability has stabilized, with multiple parties entering the market, including Google’s cloud-based Docs offerings, and the free/open alternatives from LibreOffice. The convergence on this standard was not undertaken with the blessing of the dominant player: rather, it came about despite Microsoft’s opposition. Docs are not just interoperable, they’re adversarially interoperable: each has its own file format, but each can read Microsoft’s file format.

    The document wars are just one of many key junctures in which adversarial interoperability made a dominant player vulnerable to new entrants:

    Hayes modems
    Usenet’s alt.* hierarchy
    Supercard’s compatibility with Hypercard
    Search engines’ web-crawlers
    Servers of every kind, which routinely impersonate PCs, printers, and other devices

    Scratch the surface of most Big Tech giants and you’ll find an adversarial interoperability story: Facebook grew by making a tool that let its users stay in touch with MySpace users; Google products from search to Docs and beyond depend on adversarial interoperability layers; Amazon’s cloud is full of virtual machines pretending to be discrete CPUs, impersonating real computers so well that the programs running within them have no idea that they’re trapped in the Matrix.

    Adversarial interoperability converts market dominance from an unassailable asset to a liability. Once Facebook could give new users the ability to stay in touch with MySpace friends, then every message those Facebook users sent back to MySpace—with a footer advertising Facebook’s superiority—became a recruiting tool for more Facebook users. MySpace served Facebook as a reservoir of conveniently organized potential users that could be easily reached with a compelling pitch about why they should switch.

    Today, Facebook is posting 30-54% annual year-on-year revenue growth and boasts 2.3 billion users, many of whom are deeply unhappy with the service, but who are stuck within its confines because their friends are there (and vice-versa).

    A company making billions and growing by double-digits with 2.3 billion unhappy customers should be every investor’s white whale, but instead, Facebook and its associated businesses are known as “the kill zone” in investment circles.

    Facebook’s advantage is in “network effects”: the idea that Facebook increases in value with every user who joins it (because more users increase the likelihood that the person you’re looking for is on Facebook). But adversarial interoperability could allow new market entrants to arrogate those network effects to themselves, by allowing their users to remain in contact with Facebook friends even after they’ve left Facebook.

    This kind of adversarial interoperability goes beyond the sort of thing envisioned by “data portability,” which usually refers to tools that allow users to make a one-off export of all their data, which they can take with them to rival services. Data portability is important, but it is no substitute for the ability to have ongoing access to a service that you’re in the process of migrating away from.

    Big Tech platforms leverage both their users’ behavioral data and the ability to lock their users into “walled gardens” to drive incredible growth and profits. The customers for these systems are treated as though they have entered into a negotiated contract with the companies, trading privacy for service, or vendor lock-in for some kind of subsidy or convenience. And when Big Tech lobbies against privacy regulations and anti-walled-garden measures like Right to Repair legislation, they say that their customers negotiated a deal in which they surrendered their personal information to be plundered and sold, or their freedom to buy service and parts on the open market.

    But it’s obvious that no such negotiation has taken place. Your browser invisibly and silently hemorrhages your personal information as you move about the web; you paid for your phone or printer and should have the right to decide whose ink or apps go into them.

    Adversarial interoperability is the consumer’s bargaining chip in these coercive “negotiations.” More than a quarter of Internet users have installed ad-blockers, making it the biggest consumer revolt in human history. These users are making counteroffers: the platforms say, “We want all of your data in exchange for this service,” and their users say, “How about none?” Now we have a negotiation!

    Or think of the iPhone owners who patronize independent service centers instead of using Apple’s service: Apple’s opening bid is “You only ever get your stuff fixed from us, at a price we set,” and the owners of Apple devices say, “Hard pass.” Now it’s up to Apple to make a counteroffer. We’ll know it’s a fair one if iPhone owners decide to patronize Apple’s service centers.

    This is what a competitive market looks like. In the absence of competitive offerings from rival firms, consumers make counteroffers by other means.

    There is good reason to want to see a reinvigorated approach to competition in America, but it’s important to remember that competition is enabled or constrained not just by mergers and acquisitions. Companies can use a whole package of laws to attain and maintain dominance, to the detriment of the public interest.

    Today, consumers and toolsmiths confront a thicket of laws and rules that stand between them and technological self-determination. To change that, we need to reform the Computer Fraud and Abuse Act, Section 1201 of the Digital Millennium Copyright Act, , patent law, and other rules and laws. Adversarial interoperability is in the history of every tech giant that rules today, and if it was good enough for them in the past, it’s good enough for the companies that will topple them in the future.

    #adversarial_Interoperability #logiciel_libre #disruption

  • OpenMandriva Is Finding Great Success In Their Switch To Using LLVM’s Clang Compiler - Phoronix

    OpenMandriva remains among the few Linux distributions using the LLVM Clang compiler by default where possible in place of the GCC compiler. While at times it’s difficult in maintaining this combination, they continue to find great success in using Clang as their default compiler.

    OpenMandriva developer Bernhard Rosenkränzer presented at this month’s EuroLLVM conference on their use of LLVM Clang by default where nearly all Linux distributions remain with the GNU Compiler Collection.

    #compilation #linux #clang #llvm #gcc #linux_distribution

  • KEI letter to US DOJ, opposing IBM acquisition of Red Hat | Knowledge Ecology International

    Très intéressant sur les relations Logiciels libres et grandes entreprises. Utiliser le LL comme cheval de Troie pour renforcer des services spécifiques... brisant la confiance et la neutralité du libre. L’inverse de ce que décrit « Des routes et des ponts » sur les partenariats communs-privés.

    The following was sent to US DOJ today, to express KEI’s opposition to the IBM acquisition of Red Hat.

    13 March 2019

    Bindi R. Bhagat
    U.S. Department of Justice
    Antitrust Division
    Technology and Financial Services Section

    Dear Ms. Bhagat,

    Thank you for taking our call today, regarding the International Business Machines Corporation (IBM) effort to buy Red Hat, Inc. As discussed, Knowledge Ecology International (KEI) is opposed to IBM acquiring Red Hat.

    At present, Red Hat controls the most important Linux distribution for Internet and cloud servers.

    The important metrics in this area include, but are not limited to, the share of Internet traffic supported by Red Hat server installations, as well as the revenue that Red Hat realizes for maintaining and customizing Linux server software, compared to other Linux server distribution companies or organizations.

    Red Hat is an important contributor to the Linux kernel and to the code that is used in many elements in the broader GNU/Linux platform of free software programs that are used by server platforms, including the many non-Red Hat Linux distributions.

    IBM is proposing to pay a large premium for Red Hat. Prior to the acquisition offer, Red Hat was valued at approximately $20.5 billion. IBM is proposing to buy Red Hat for $34 billion, a premium of about 67 percent of the previous value.

    IBM could have invested in Red Hat stock at a much lower price, if the objective was simply to share in the expected profits of Red Hat, continuing its current business offerings. What IBM gains from its acquisition of Red Hat is control, and the ability to shape the direction of its software development efforts, to favor IBM’s own cloud services.

    Today Red Hat is considered a neutral partner for many companies offering or developing cloud services. If IBM acquires Red Hat, the trust in Red Hat will be eroded, and IBM will have powerful incentives to influence Red Hat’s software development efforts towards providing special functionality and benefits to IBM and the IBM cloud services, and even to degrade the functionality of services to companies that compete directly with IBM, or fail to buy services from IBM.

    The Department of Justice (DOJ) should consider the impact of the merger on the incentives that Red Hat will have, post merger, to undermine competition and degrade the benefits of a more level playing field, for this critical Internet resource and platform.

    Our concerns are shaped to some degree by the detrimental decision made by the DOJ in approving the Oracle acquisition of Sun Computer’s open source assets, including the MySQL database program. At the time, DOJ viewed the MySQL software as unimportant, because the revenues were small, relative to other database programs. Most users of MySQL did not pay any fees to use the software. Our organization, KEI, used MySQL to support our Joomla, Drupal and WordPress content management systems, and did not pay fees to Sun Computer, along with countless other businesses, non-profit organizations and individuals who also used the free version. We were concerned, at the time, that Oracle would degrade and slow the development of the capacities of MySQL, in order to protect Oracle’s very expensive proprietary database services. We believe that our concerns about Oracle have unfortunately been borne out, by the blunting of the rate of innovation and ambition for MySQL, the fact that Open Office (another program gained in the acquisition of Sun Computers) is no longer an important free software client for office productivity, and Oracle’s aggressive litigation over copyright and patent claims related to Java.

    The DOJ might consider conditions on the merger that would provide greater assurances that Red Hat will not be used to create an unlevel playing field that favors IBM’s own cloud services. We are willing to suggest such conditions, relating to governance, licensing and other issues. For example, the DOJ could require IBM to show how it will ensure the continued policy of ensuring that Red Hat’s patents are only used for defensive purposes. Conditions on this issue should be durable, and avoid predictable loopholes.

    IBM’s competitors and existing customers of Red Hat will have more informed suggestions as to specific conditions that would protect IBM’s competitors. But overall, the best decision would be to reject the merger, on the grounds that is is fundamentally designed to create an unlevel playing field.

    Red Hat is not just another technology company. It is one of the main reasons the Internet functions as well as it does.


    James Love
    Knowledge Ecology International (KEI)
    1621 Connecticut Avenue, Suite 500
    Washington, DC 20009

    #Communs #Logiciels_libres #Red_Hat #IBM

  • GNU Midnight Commander

    An error in the condition V560 A part of conditional expression is always true: (‘\n’ != c). params.c 136. static int EatWhitespace (FILE InFile) / ----------------------------------------------------------------------- Scan past whitespace (see ctype(3C)) and return the first non-whitespace character, or newline, or EOF. Input: InFile - Input source. Output: … Continue reading GNU Midnight Commander


  • Is the Linux philosophy still relevant in 2019? | Opensource.com

    The philosophy outlined in these books was critical to the original design of Unix and its modern descendant, Linux. That groundbreaking design and its creative implementation made it possible for us to have the amazing open source operating system we have today. Without the concept of data streams, the use of pipes to modify and transform those data streams, the idea that “everything is a file,” and so much more, we would be reduced to struggling with a command line even less powerful than the old IBM or MS-DOS. Even DOS used pipes but never provided powerful utilities like the GNU Core Utilities that we take for granted today and give us access to the most basic of system functions.

  • Configure Razer Mice In Linux With Razercfg (Ubuntu PPA) ~ Web Upd8: Ubuntu / Linux blog

    Razer Synapse, the official Razer configuration utility, doesn’t work on Linux however, there’s a tool called Razercfg that allows configuring some of the Razer mice settings under Linux.


    OpenRazer | Open Source Drivers for #GNU #Linux

    An entirely open source driver and user-space daemon that allows you to manage your Razer peripherals on GNU/Linux.

    #jeux #hardware #souris

  • Announcing the GNU Kind Communication Guidelines

    A code of conduct states rules, with punishments for anyone that violates them. It is the heavy-handed way of teaching people to behave differently, and since it only comes into action when people do something against the rules, it doesn’t try to teach people to do better than what the rules require. To be sure, the appointed maintainer(s) of a GNU package can, if necessary, tell a contributor to go away; but we do not want to need to have recourse to that.

    #gnu #rules

  • 27 Interesting Facts about Linux

    A list of 27 interesting facts about Linux, its creator Linus Torvalds, and the impact that his open source operating system has had on the world. This post, 27 Interesting Facts about Linux, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Librem 5 – A Security and Privacy Focused Phone – Purism

    Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers.

    A fully standards-based freedom-oriented system, based on Debian and many other upstream projects, has never been done before–we will be the first to seriously attempt this.

    The Librem 5 phone will be the world’s first ever IP-native mobile handset, using end-to-end encrypted decentralized communication.

    #Librem5 #Phone #OS

  • The ’New Open Source Licensing’ : Why the GPL’s Heyday Is Over

    J’ai malheureusement peur que cet auteur ait raison sur la distinction entre l’ouverture du code et la participation à un mouvement des communs. Toutefois, il convient de peser également le changement du logiciel vers le service. Peut être faut-il inventer une licence pour la confiance dans les services. Une licence que Facebook et compagnie ne pourraient pas signer ;-)

    The GNU GPL is the software license that helped bring free and open source software to the mainstream. In recent years, however, the GPL’s prominence has waned as more permissive licenses, like Apache, have taken its place. That begs the question: Does the GPL have a future, or is it a relic of free software’s past? And how did the open source community come to this pass, anyway?

    What accounts for this state of affairs? Why is the GPL no longer the go-to software license for open source projects, despite its storied history?

    That’s a complex question and the answer surely involves several factors. One might be that today’s developers don’t remember how important the GPL was in making open source possible, and so it does not feature as prominently on their radar. Another might be a perception, fair or not, that the GPL actually stifles the creativity it was designed to protect because it places strict limits on the conditions under which software can be redistributed. Specifically, it requires that developers share the source code of any GPL-licensed application or a derivative of that application; being held to this standard may feel like the opposite of freedom for some developers.

    Yet the most important reason for the decline of the GPL, I think, is simply that we’re living in a new age of open source. Today, open source has become the “default” approach to software development, according to one study. For a developer or company, choosing to make your source code open source no longer signals a brave commitment to an innovative, ideologically driven mode of software distribution. Instead, open-sourcing your code (or some of it, at least), is just the thing you do. After all, even Microsoft is now riding the open source bandwagon.

    For these companies, permissive open source licenses like Apache provide an easy out. They’re a way to brand yourself as an open source company without having to take as strong a stance about open source software as GPL adoption implies.

    Sure, choosing the Apache license or most other permissive licenses requires that companies make the source code of their products publicly available, and that counts for something. But it doesn’t signal ideological commitment to the ethos of the free and open source software movement. Nor does it place many restrictions on what partners or third-party developers can do with your code.

    #Logiciel_libre #Open_source

  • #timsort — the fastest sorting algorithm you’ve never heard of

    Photo by Marc Sendra martorell on UnsplashTimsort: A very fast , O(n log n), stable sorting algorithm built for the real world — not constructed in academia.Image of Tim Peter from hereTimsort is a sorting algorithm that is efficient for real-world data and not created in an academic laboratory. Tim Peters created Timsort for the Python #programming language in 2001. Timsort first analyses the list it is trying to sort and then chooses an approach based on the analysis of the list.Since the algorithm has been invented it has been used as the default sorting algorithm in Python, Java, the Android Platform, and in versions of GNU.Timsort’s big O notation is O(n log n). To learn about Big O notation, read this.From hereTimsort’s sorting time is the same as Mergesort, which is faster than most of the (...)

    #computer-science #fastest-sorting-algorithm #sorting-algorithms

    • There are many similar instant messaging systems, and each person can only handle so many of them. And they don’t talk to each other. So if you’re in touch with two people who use Signal and another three use Wire and you want to chat with all five of them, how do you do it? Email has the advantage of universal interoperability.

      Email are interoperable because there is well-documented standard behind it. And it is federated.
      XMPP is well-documented and federated too.

      The collapse of domain fronting means that some network operators can, and do, block Signal, Telegram, and other centralized messaging services like them. People stuck behind those networks simply can’t use these tools at all.

      Domain fronting is required because Signal is centralized. In a federated network, one has to block all possible communication channels between two arbitrary people. It is much harder to block a federated network unless you are willing to maintain a whitelist.

      Some people can only be contacted by email and have no public Signal number. For example, the EFF’s contact page lists email addresses (with PGP fingerprints) and office phone numbers, but no Signal numbers. If I’ve switched off end-to-end email security in favor of Signal, how am I supposed to communicate with the EFF securely?

      That’s bad practice from EFF. Not a first. But it cannot be attributed to Signal.

      Signal requires registration to a phone number. Not everyone has a phone number, knows the phone number of the person they want to contact, or is willing to share their phone number with other people.

      XMPP uses arbitrary identifiers. Phone numbers are possibly sensitive and allow som eattackers to track people geolocation. Phone numbers are bad. Arbitrary identifiers are good. This has been discussed at the last CCC conference as well.

      Some versions of the Signal app have similar problems to those outlined in EFail.

      No, they don’t have similar problems, except if the “similar problems” are “having a vulnerability”. This is bad phrasing. Signal has many problems but none that are as bad as emails.

      My advice, as always, is: use XMPP with OMEMO. There are Windows, GNU/Linux, Mac, Android and iOS clients. You can have a free account at https://jabber.lqdn.fr or a paying one at conversations.im. Conversations for Android has excellent ideas regarding seamless secure communication. More on that here: https://www.ssi.gouv.fr/publication/chiffrement-de-messagerie-quasi-instantanee-a-quel-protocole-se-vouer

  • Migrating ownCloud to NextCloud – The Mergy Notes

    Le printemps arrive et il est temps de faire le ménage. Ceci remet à l’ordre du jour la question si on peut continuer avec OC ou s’il faut changer vers NC. On ne peut pas repousser la décision pour toujours car OC risque d’introduire des éléments qui rendent compliquée la migration vers l’outil 100% open source.

    I’ve been a happy user of ownCloud for a few years now to dish shared calendar and contacts personally in addition to some image backup stuff with Android. I have no idea beyond the published reports of the split with the founder that started the Nextcloud variant, but it did seem like that is the future. So, getting over to it now made some sense to me. Here is what I did.

    Conclusion : La migration est possible.

    Question : Ext-ce qu’on y gagne ou est-ce qu’on perd des choses par la mirgration vers NextCoud ?

    ownCloud vs. Nextcloud : Zwei Cloud-Speicher im Vergleich 2018 - 1&1

    Nextcloud vs ownCloud – The Whole Story - CiviHosting

    We will examine four areas:

    History – when and how did these two projects get started
    Who – what people are funding and supporting the software
    License – what is the license for each
    Product – what differences exist in the actual product

    ownCloud oder Nextcloud : Wo liegen die Unterschiede ? › NETWAYS Blog

    Es ist allerdings so, dass viele der Features, die bei ownCloud nur in der Enterprise Edition verfügbar sind, bei Nextcloud bereits kostenlos dabei sind oder sich durch wenige Klicks über den Nextcloud App Store aktivieren lassen. Eine Gegenüberstellung der Features der Community Edition und der Enterprise Edition von ownCloud kann man übrigens hier finden. Ich habe ein paar der Features, die laut dieser Seite nur in der ownClouds Enterprise Version verfügbar sind herausgepickt und geprüft, ob diese in Nextcloud enthalten sind.

    Pour terminer voici comment les producteurs des logiciels voient les choses :

    ownCloud vs nextcloud - ownCloud

    Comparison – The most popular self-hosted file share and collaboration platform

    See how Nextcloud compares to these popular closed-source services, and switch to a more open and transparent solution to protect your data!

    Bref : Nextcloud est 100% open source (GNU AGPLv3-Lizenz) alors qu’Owncloud remplace au fur et à mesure des modules #FLOSS par des éléments payants et propriétaires. C’est une raison suffisante pour abandonner l’utilisation d’Owncloud au profit de Nextcloud, à moins d’avoir un modèle d’affaire profitable étroitement lié aux services du prestataire Owncloud GmbH.

    Nextcloud gagne en matière de sécurité et interfaces et son développement est nettement plus dynamique.

    #logiciels #cloud #self-hosting #auto_hébergement #open-source

    • @klaus , merci pour la recension de liens et en particulier celui sur la migration (pas très clair et pas très bien écrit du reste). Je me pose la question de cette migration depuis quelques mois. Le truc qui me rebute est que j’ai quelques gigas de données sur mon cloud perso, et pas la possibilité de les dupliquer sur le même espace... Mais je crois bien que je vais faire le saut dès que j’ai un moment.

  • [l] (https://blog.fefe.de/?ts=a43d57ec) Richard “GNU/” Stallman im ...

    [l] Richard “GNU/” Stallman im Guardian über Datenschutz.

    The surveillance imposed on us today far exceeds that of the Soviet Union. For freedom and democracy’s sake, we need to eliminate most of it. There are so many ways to use data to hurt people that the only safe database is the one that was never collected.

    Er schlägt daher vor, unnötige Datenerhebung auch mit User-Zustimmung zu verbieten.

    The GDPR makes much of requiring users (in some cases) to give consent for the collection of their data, but that doesn’t do much good. System designers have become expert at manufacturing consent (to repurpose Noam Chomsky’s phrase).

    Er hat völlig Recht. (...)

  • Clang 6.0.0 released

    LLVM 6.0.0 and Clang 6.0.0 are now available.

    Clang 6.0.0 Release Notes

    From the announcement:

    Clang’s default C++ dialect is now gnu++14 instead of gnu++98. This means Clang will by default accept code using features from C++14 and conforming GNU extensions. Projects incompatible with C++14 can add -std=gnu++98 to their build settings to restore the previous behaviour. Added support for some features from the C++ standard after C++17 (provisionally known as C++2a but expected to be C++20). This support can be enabled with the -std=c++2a flag. This enables:

    Support for _VA_OPT_, to allow variadic macros to easily provide different expansions when they are invoked without variadic arguments. Recognition of the <=> token (the C++2a three-way comparison (...)


  • Projection analysis - detectproj

    Automated estimation of the map projection and its parameters based on the non-linear optimization...
    Designed for cartographers as well as for enthusiasts.

    GNU/GPL projection analysis software for Windows ® 7/8/8.1/10, GNU/Linux and MacOS.

    #outils #projection #numérisation #cartes #java

  • GameShell, Open Source Retro Gaming & STEM Console | Indiegogo

    GameShell is the world’s first modular, portable game console with a GNU/LINUX embedded operating system. It allows you to play thousands of classic games from Atari, GB, GBA, NES, SNES and many of history’s greatest consoles.

    GameShell supports programming languages like preset C, Python, Lua, and LISP. You will be able to modify games and even create new ones as you wish.

  • Speeding up the Build of C and C++ Projects

    Many programmers know firsthand that C and C++ program builds very long. Someone solves this problem by sword-fighting at build time, someone is going to the kitchen to “grab some coffee”. This article is for those who are tired of this, and who decided it is time to do something about it.

    Speeding up the Build of C and C++ Projects by Phillip Khandeliants

    From the article:

    If your operating system uses ELF format object files (Unix-like systems), you can replace the GNU ld linker with GNU gold. GNU gold comes with binutils starting from the version 2.19, and is activated by the flag -fuse-ld=gold. In CMake it can be activated, for example, by the following code.


  • C++ Tour, Compilers and FASTBuild with Arvid Gerstmann

    Rob and Jason are joined by Arvid Gerstmann from Appico to talk about bringing his new C++ Tour project, building your own C Compiler, using FASTBuild and more. Arvid Gerstmann is a passionate programmer and computer enthusiast, with a focus on writing high-performance C++. His area of expertise include, but is not limited to, writing compilers, implementing the included standard libraries, and creating game engines and games. He is currently the CTO of Appico. If he is not programming, he enjoys reading books while drinking a nice cup of self-brewed coffee. He currently lives in the sunny Hamburg, Germany. News Intel offers Parallel STL implementation to GNU libstdc++ Exceptions vs expected: Let’s find a compromise Interactive workflows for C++ with Jupyter C++17 published (...)


  • GNU Terry Pratchett

    In Terry Pratchett’s Discworld series, the clacks are a series of semaphore towers loosely based on the concept of the telegraph. Invented by an artificer named Robert Dearheart, the towers could send messages “at the speed of light” using standardized codes. Three of these codes are of particular import:

    G: send the message on
    N: do not log the message
    U: turn the message around at the end of the line and send it back again

    When Dearheart’s son John died due to an accident while working on a clacks tower, Dearheart inserted John’s name into the overhead of the clacks with a “GNU” in front of it as a way to memorialize his son forever (or for at least as long as the clacks are standing.)

    #terry_pratchett #discworld #sémaphores

  • 2 awesome open source apps to share your terminal over the web – nixCraft

    ant to share your terminal over the web for demo, learning or collaboration purpose? Try these two applications to share your terminal as a web application.

    Please note that accepting input from remote clients is dangerous for most commands. When you need interaction with the TTY for some reasons, consider starting following tools with tmux or GNU Screen and run your command on it. Use following tools with trusted parties or inside VM. Let us see how to install and use gotty and ttyd on a Unix-like system.