Language Selection

English French German Italian Portuguese Spanish

Google

Google and Oracle

Filed under
Google
Security
Legal

Oracle Desperate

Filed under
Android
Google
Legal

Chromebook and GNU/Linux

Filed under
GNU
Linux
Google
  • Turn Your Old Laptop into a Chromebook

    Once the drive is ready with bootable CloudReady, plug it into the target PC and boot the system. It may take a while for the system to boot into Chromium OS. Once booted, you will see the screen shown in Figure 3.

  • Running Linux and Chrome OS Together Using Crouton

    Leo Laporte is a longtime technology commentator and also the host of the show “The Screen Savers,” on the TWiT Netcast Network. In this video he explains how to install Linux on a Chromebook using Crouton, an open source tool developed by Google employee David Schneider.

Win for APIs and FOSS (Android Case)

Filed under
Android
Google
Legal
  • Google beats Oracle at trial: Jury finds Android is “fair use”

    Following a two-week trial, a federal jury concluded Thursday that Google's Android operating system does not infringe Oracle-owned copyrights because its re-implementation of 37 Java APIs is protected by "fair use." The verdict was reached after three days of deliberations.

    "Ladies and gentlemen of the jury, listen to your verdict as it will stand recorded," said the court clerk, before polling each of the ten men and women on the jury.

    There was only one question on the special verdict form, asking if Google's use of the Java APIs was a "fair use" under copyright law. The jury unanimously answered "yes," in Google's favor. The verdict ends the trial, which began earlier this month. If Oracle had won, the same jury would have gone into a "damages phase" to determine how much Google should pay. Because Google won, the trial is over.

    "I salute you for your extreme hard work in this case," said US District Judge William Alsup, who has overseen the litigation since 2010. "With the thanks of your United States District Court, you are now discharged. I would like to come in the jury room and shake each of your hands individually."

    Four of the ten jurors declined to comment to reporters gathered in the hallway. The other six went out through a back exit.

    "We're grateful for the jury's verdict," said Google lead lawyer Robert Van Nest before getting into the elevator with Google's in-house lawyers. "That's it." Oracle attorneys had no comment.

  • Google wins Oracle copyright fight over Android code

    Today, a jury in California's Northern District federal court declared that Google's use of copyright-protected code in Android was fair use, freeing it of any liability. Oracle, which controls the copyright on the code, had been seeking $9 billion for the use of the code.

    The case centers around an API developed by Java and owned by Oracle, which allows outside programs to easily interact with Java programs. Android uses the same API, and in 2014 a federal appeals court ruled that Oracle has a valid copyright claim on the API code, potentially putting Google on the hook for billions of dollars in damages. (The Supreme Court declined to hear the appeal.) In the latest round, Google argued that Android's reimplementation of the API constituted fair use, which would allow use of the code without invalidating Oracle's copyright. Ultimately, the jury found that case convincing.

Blisk/Chromium and Chrome 51

Filed under
Google

Google to bring official Android support to the Raspberry Pi 3

Filed under
Android
Linux
Google

The Raspberry Pi 3 is not hurting for operating system choices. The tiny ARM computer is supported by several Linux distributions and even has a version of Windows 10 IoT core available. Now, it looks like the Pi is about to get official support for one of the most popular operating systems out there: Android. In Google's Android Open Source Project (AOSP) repository, a new device tree recently popped up for the Raspberry Pi 3.

Raspberry Pis, if you're not aware, are cheap, credit card-sized, single board ARM computers with a focus on education and open source software. Hardware hackers and DIYers love the Pi due to its open nature, small size, and plethora of ports and software.

Read more

Android/Chromebook

Filed under
Android
Google
  • No more Android Wear watches says Samsung, Tizen all the way !

    Samsung has been getting pretty serious about its Smartwatches and has certainly excelled with its latest creation, the Tizen based Gear S2. The company has had a little dabble with Android wear in the past, with the Galaxy Gear Live, and since has been focusing on Tizen. According to a report from Fast Company stating that “no more Samsung Android Wear devices are in development or being planned.” This is according to a Samsung executive. The report goes further to say that Samsung executives are going with Tizen because it’s “far more battery-efficient than Android Wear” and “the standard OS on other Samsung products from TVs to refrigerators.”

  • Are games too easy to pirate on Android?

    It's long been known that game developers make much more money on iOS than they do on Google's Android platform. The most recent example of this is Monument Valley. The developers of the game posted an article on Medium with infographics that show that 73% of their revenue comes from iOS, while only 17% comes from Android.

  • Google Trust API Will Replace Your Passwords With A ‘Trust Score’

    In the wake of increasing security threats and password leaks, Google is working on Project Abacus that will introduce Trust API in Android devices. This API will calculate your Trust Score and use them to give you access to various services. This score will be calculated by using a variety of user patterns.

  • Monument Valley in Numbers: Year 2
  • And the winners of the Google Play Awards are…
  • Why are Chromebooks outselling Macs?
  • Fancy ChromiumOS, Ubuntu, And Android TV All-In-One System

    If you are looking for a mini PC that is capable of running ChromiumOS, Ubuntu LTS, and Android TV operating systems, you may be interested in a new mini desktop computer system that has been created by Dylan Callahan.

    The Fancy mini PC is a “handcrafted personal computer” that is now available to purchase price to $225 plus shipping and is powered by a Quad Core x86 2.0 Ghz processor supported by 4K AMD Radeon graphics that is supported by 4GB of DDR3 RAM.

Android/Chromebook

Filed under
Android
Google

A Look at Android Apps on Chromebook

Filed under
Android
GNU
Linux
Gentoo
Google
  • A Look at Android Apps on Chromebook

    When Google announced this week that future Chromebooks (and some current ones) will be able to run Android apps, a booming thunderclap spread across Silicon Valley — and could be heard in the four corners of the world. This news is indeed a game changer, reported nicely here in video form by The Verge.

  • For the first time, Google beat Apple in PC sales — and that's really bad news for Microsoft

    Today, two very important things happened for the future of the PC as we know it.

    First: For the first time ever, low-cost Google Chromebook laptops outsold Apple's Macs during the most recent quarter, analyst firm IDC tells The Verge.

Google reveals nationalities of students in open source-focused Summer of Code 2016

Filed under
Google
OSS

Every summer, many students get excited for some well-deserved time off from studies; well, if their region practices such a vacation, that is. In some cultures, school is year-round. While this is unfortunate from the standpoint of socializing and having fun, it arguably keeps the students on track for great success.

For students that are particularly motivated and education-focused, Google hosts its legendary Summer of Code. This program pairs future developers with open source projects. Not only do these young folks learn, but they get to contribute to the projects as well. Today, the search giant shares the nationalities of the students participating in Summer of Code 2016. For the first time ever, Albania has a representative -- woo-hoo! This may surprise you, but the USA is not the most-represented nation. The top country, however, may shock you -- or not.

Read more

Syndicate content

More in Tux Machines

today's howtos

Leftovers: OSS

  • Report: If DOD Doesn't Embrace Open Source, It'll 'Be Left Behind'
    Unless the Defense Department and its military components levy increased importance on software development, they risk losing military technical superiority, according to a new report from the Center for a New American Security. In the report, the Washington, D.C.-based bipartisan think tank argues the Pentagon, which for years has relied heavily on proprietary software systems, “must actively embrace open source software” and buck the status quo. Currently, DOD uses open source software “infrequently and on an ad hoc basis,” unlike tech companies like Google, Amazon and Facebook that wouldn’t exist without open source software.
  • The Honey Trap of Copy/Pasting Open Source Code
    I couldn’t agree more with Bill Sourour’s article ‘Copy.Paste.Code?’ which says that copying and pasting code snippets from sources like Google and StackOverflow is fine as long as you understand how they work. However, the same logic can’t be applied to open source code. When I started open source coding at the tender age of fourteen, I was none the wiser to the pitfalls of copy/pasting open source code. I took it for granted that if a particular snippet performed my desired function, I could just insert it into my code, revelling in the fact that I'd just gotten one step closer to getting my software up and running. Yet, since then, through much trial and error, I’ve learned a thing or two about how to use open source code effectively.
  • Affordable, Open Source, 3D Printable CNC Machine is Now on Kickstarter
    The appeals of Kickstarter campaigns are many. There are the rewards for backers, frequently taking the form of either deep discounts on the final product or unusual items that can’t be found anywhere else. Pledging to support any crowdfunding campaign is a gamble, but it’s an exciting gamble; just browsing Kickstarter is pretty exciting, in fact, especially in the technological categories. Inventive individuals and startups offer new twists on machines like 3D printers and CNC machines – often for much less cost than others on the market.
  • Open Standards and Open Source
    Much has changed in the telecommunications industry in the years since Standards Development Organization (SDOs) such as 3GPP, ITU and OMA were formed. In the early days of telecom and the Internet, as fundamental technology was being invented, it was imperative for the growth of the new markets that standards were established prior to large-scale deployment of technology and related services. The process for development of these standards followed a traditional "waterfall" approach, which helped to harmonize (sometimes competing) pre-standard technical solutions to market needs.

Leftovers: BSD

  • The Voicemail Scammers Never Got Past Our OpenBSD Greylisting
    We usually don't see much of the scammy spam and malware. But that one time we went looking for them, we found a campaign where our OpenBSD greylisting setup was 100% effective in stopping the miscreants' messages. During August 23rd to August 24th 2016, a spam campaign was executed with what appears to have been a ransomware payload. I had not noticed anything particularly unusual about the bsdly.net and friends setup that morning, but then Xavier Mertens' post at isc.sans.edu Voice Message Notifications Deliver Ransomware caught my attention in the tweetstream, and I decided to have a look.
  • Why FreeBSD Doesn't Aim For OpenMP Support Out-Of-The-Box

Security Leftovers

  • FBI detects breaches against two state voter systems
    The Federal Bureau of Investigation has found breaches in Illinois and Arizona's voter registration databases and is urging states to increase computer security ahead of the Nov. 8 presidential election, according to a U.S. official familiar with the probe. The official, speaking on condition of anonymity, said on Monday that investigators were also seeking evidence of whether other states may have been targeted. The FBI warning in an Aug. 18 flash alert from the agency's Cyber Division did not identify the intruders or the two states targeted. Reuters obtained a copy of the document after Yahoo News first reported the story Monday.
  • Russians Hacked Two U.S. Voter Databases, Say Officials [Ed: blaming without evidence again]
    Two other officials said that U.S. intelligence agencies have not yet concluded that the Russian government is trying to do that, but they are worried about it.
  • FBI Says Foreign Hackers Got Into Election Computers
    We've written probably hundreds of stories on just what a dumb idea electronic voting systems are, highlighting how poorly implemented they are, and how easily hacked. And, yet, despite lots of security experts sounding the alarm over and over again, you still get election officials ridiculously declaring that their own systems are somehow hack proof. And now, along comes the FBI to alert people that it's discovered at least two state election computer systems have been hacked already, and both by foreign entities.
  • Researchers Reveal SDN Security Vulnerability, Propose Solution
    Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.
  • NV Gains Momentum for a Secure DMZ
    When it comes to making the shift to network virtualization (NV) and software-defined networking (SDN), one of the approaches gaining momentum is using virtualization technology to build a secure demilitarized zone (DMZ) in the data center. Historically, there have been two major drawbacks to deploying firewalls as a secure mechanism inside a data center. The first is the impact a physical hardware appliance has on application performance once another network hop gets introduced. The second is the complexity associated with managing the firewall rules. NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.