Tag Archives: ACE

Netflix and Hollywood Want Millions in Piracy Damages from SET TV

Post Syndicated from Ernesto original https://torrentfreak.com/netflix-and-hollywood-want-millions-in-piracy-damages-from-set-tv-190701/

Last year the Alliance for Creativity and Entertainment, the global anti-piracy alliance featuring several Hollywood studios, Amazon, Netflix, and other entertainment companies, sued Florida-based SET Broadcast, LLC.

The company offered a popular software-based IPTV service and also sold pre-loaded set-top boxes.

While it was marketed as a legal service, according to ACE members SET TV’s software was little more than a pirate tool, allowing buyers to stream copyright-infringing content.

“Defendants market and sell subscriptions to ‘Setvnow,’ a software application that Defendants urge their customers to use as a tool for the mass infringement of Plaintiffs’ copyrighted motion pictures and television shows,” the complaint read.

Initially, SET TV hired an attorney who informed the court that it had stopped offering its service and subscriptions. At the same time, the copyright infringement allegations were denied. After this initial response, however, things quietened down.

When the copyright holders requested to depose owner SET TV owner Jason Labossiere and its employee Nelson Johnson, who are both listed as defendants, they failed to respond. The same was true for the corporate entity.

Not much later SET TV’s lawyer withdrew from the case, citing unpaid invoices. This lack of progress eventually prompted the copyright holders to file for an entry of default. This was awarded and a few days ago Netflix, Amazon and the Hollywood studios submitted their demands.

According to a filing at a California Federal court, the rightsholders argue that SET TV (Set Broadcast) is guilty of willful copyright infringement. To compensate their losses, they request the maximum statutory damages for a total of 51 works.

“Set Broadcast has willfully infringed Plaintiffs’ Copyrighted Works and, in
doing so, caused Plaintiffs and their entire business model immense damage. The $7,650,000 statutory damages sought here therefore represents only a fraction of the actual damages inflicted by Set Broadcast on Plaintiffs,” the motion reads.

The motion notes that SET TV had 260,000 monthly users, of which a significant percentage accessed copyright-infringing content. The 51 works that are mentioned in the motion are just the tip of the iceberg, the rightsholders note, which further supports the request for substantial damages.

In addition to monetary relief, the companies also request a permanent injunction to prevent any infringements of their works going forward. This is needed, they argue, because it’s possible that the infringing activities will continue at a later date.

“Though the Setvnow service appears to no longer be available, Set Broadcast’s apparent cessation of its willful and flagrant infringement does not and should not prevent this Court from exercising its discretion to permanently enjoin Set Broadcast from infringing Plaintiffs’ Copyrighted Works.

“There is a significant threat of continuing irreparable injuries to Plaintiffs,” they add.

With SET TV no longer defending itself, it is likely that the court will side with the copyright holders. However, the question remains whether they will ever see a piece of the millions that they’re after.

In a similar copyright infringement case,  SET TV previously reached a settlement with Dish last November, agreeing to pay more than $90 million in damages. Considering this, it’s doubtful that there is much money left to take.

–=

A copy of the motion for default judgment, submitted on behalf of Amazon, Netflix, Columbia Pictures, Disney, Paramount Pictures, Sony Pictures Television, Twentieth Century Fox, Universal City Studios, Universal Cable Productions, Universal Television, and Warner Bros. is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

SET TV Loses Lawyer and Goes Dark in Piracy Case

Post Syndicated from Ernesto original https://torrentfreak.com/set-tv-loses-lawyer-and-goes-dark-in-piracy-case-190610/

Last year the Alliance for Creativity and Entertainment, the global anti-piracy alliance featuring several Hollywood studios, Amazon, Netflix, and other entertainment companies, sued Florida-based SET Broadcast, LLC.

The company offered a popular software-based IPTV service and also sold pre-loaded set-top boxes.

While it was marketed as a legal service, according to the ACE members, Set TV’s software was little more than a pirate tool, allowing buyers to stream copyright-infringing content.

“Defendants market and sell subscriptions to ‘Setvnow,’ a software application that Defendants urge their customers to use as a tool for the mass infringement of Plaintiffs’ copyrighted motion pictures and television shows,” the complaint read.

The ACE members were not the only rightsholders that complained. June last year Dish Network tagged on with another copyright infringement lawsuit against the company, and soon after, the IPTV service went offline.

This was a blow to SET TV’s more than 180,000 subscribers and the company itself was hit hard as well. Last November it reached a settlement with Dish, agreeing to pay more than $90 million in damages and sign over its domain name.

The case against ACE is not over yet though. Over the past months, it moved into the discovery phase and the copyright holders requested to depose owner SET TV owner Jason Labossiere and its employee Nelson Johnson, who are both listed as defendants.

However, both parties failed to respond, as did SET TV as a company. Meanwhile, the relationship with their attorney Joseph Shapiro also went south. Outstanding invoices were left unpaid which prompted Shapiro to withdraw from the case.

“Defendants have not paid invoices for attorney fees for more than five months and are unwilling to make any payment at this time or to commit to any payment plan,” the court was informed.

“Additionally, relations between Defendants and Mr. Shapiro have degraded such that it is no longer feasible for Mr. Shapiro to represent Defendants in this case.”

In April the court agreed to remove the attorney from the case, instructing SET TV to find new counsel. Despite this clear instruction from the court, none of the defendants responded.

This left the ACE members with few other options than to request an entry of default against Set Broadcast. This was entered by a court clerk a few days ago, and if the company remains dark, it will likely lose the case.

Now that the company is in default the copyright holders will likely submit a motion for a default judgment, proposing what they believe is an appropriate damages amount. This will likely amount to millions of dollars.

Considering the earlier $90 million settlement with Dish, it’s doubtful that there is any money left to take.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Popular Streaming Site Pelispedia Shuts Down, Operators Arrested

Post Syndicated from Ernesto original https://torrentfreak.com/popular-streaming-site-pelispedia-shuts-down-operators-arrested-190522/

With over a million visitors per day, Pelispedia.tv was one of the most popular streaming sites in Latin America. 

Just a few weeks ago, it was highlighted by the US Trade Representative as a notorious pirate site, following a referral from Hollywood’s MPAA. 

By then, rightsholders and enforcement authorities already had their eyes focused on the site’s alleged operators, a couple from Uruguay. Following collaborative efforts from Interpol, rightsholders, and Uruguayan authorities, this culminated in two arrests last week.

According to Uruguayan prosecutor Mónica Ferrero, the alleged operators are charged with “a continuing offense of making available a digital broadcast for profit without the written authorization of their respective holders or successors, and a crime of money laundering.”

The two, who are referred to in local media by their initials JAGR and MJHG, will remain in custody for  30 days. Their case is being handled by a court specialized in organized crime, which will take a closer look at the allegations. 

Initially, Pelispedia.tv remained online following the arrests, but since yesterday it is no longer available. The sister site Pelisplus is still accessible but is also expected to shut down.

Pelispedia

The pair reportedly have no other employment and made roughly $5,000 per month from the business. In addition to the arrests, several assets were seized including hardware, a 2008 Peugeot, a 2014 Volkswagon, $1,257 in cash, and two Payoneer cards. 

The Alliance for Creativity and Entertainment collaborated with the authorities and is pleased with the outcome thus far.

“We thank Interpol, the Uruguayan police, and prosecutors for their leadership in this important action against a major illegal streaming service operator,” ACE spokesperson Richard VanOrnum said, commenting on the news.

MPAA Chairman and CEO Charles Rivkin agrees and sees the shutdown of Pelispedia.tv as another example of ACE’s successful and ongoing global effort to reduce piracy.

“Each time we collaborate with law enforcement authorities to disrupt major piracy operations like Pelispedia.tv, we support the millions of people around the world working in the film and television industry and the dynamic legal marketplace for creative content,” Rivkin notes.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

MPAA / ACE Shut Down ‘Pirate’ IPTV Service, Seize Domain

Post Syndicated from Andy original https://torrentfreak.com/mpaa-ace-shut-down-pirate-iptv-service-seize-domain-190517/

In 2015, the Alliance for Creativity and Entertainment (ACE), a new initiative designed to target existing and developing piracy operations on a global scale, announced its launch.

Headed up by the studios of the MPAA plus Netflix and Amazon, more than 30 international media now complete its ranks, including the likes of BBC Worldwide, Bell Canada, MGM, and Village Roadshow, to name just a few.

In addition to targeting Kodi add-ons and their developers, ACE has made unlicensed IPTV services one of its priorities. This morning we can report that the anti-piracy giant has claimed another scalp.

In the grand scheme, OneStepTV.com appears to have been a relative newcomer. Archives suggest that the service launched in 2018 and grew to offer around 600 TV channels and 20,000 pieces of VOD content (such as movies), for $25 per month or less.

No credit checks…

While many of One Step TV’s customers appeared to have enjoyed the service, a few weeks ago problems appear to have become evident to subscribers looking to renew their package.

A post on Facebook dated April 25, 2019, signaled payment processing issues, one of the most common signs that a platform might be in trouble.

“We have been subscribers for awhile now and like your service very much. We are a little confused and concerned as recently we were told that customers cannot renew their subscriptions anymore,” the post reads.

“Is your business going away, or do you anticipate fixing the payment issue in the near future? We really would like to continue doing business with you.”

A few days later, more serious issues hit the streaming service. With its payment processing suspended, the platform itself disappeared.

One Step TV — gone

One Step TV’s public social media posts don’t give any explanation for the outage but yesterday an ominous change to the service’s homepage gave the clearest indication yet of what may have transpired.

Instead of One Step TV’s sales pitch, visitors to OneStepTV.com are now presented with a message from the Alliance for Creativity and Entertainment. Five seconds later the page redirects to the Alliance’s homepage.

Five seconds before redirect

While a page and redirect like this are very easy to fake (pirate sites frequently display similar pages as April Fool pranks), this one is very different. Not only does the domain redirect to the Alliance’s website as promised, changes to One Step TV’s domain records confirm that the domain has been taken over.

Seized by the MPAA

As the image above shows, the domain is now in the hands of the MPAA and has probably been that way since yesterday morning. The site itself is hosted by Amazon, a founding member of ACE.

All the pieces of the puzzle together strongly suggest that in this format at least, One Step TV is done. It’s not clear if a lawsuit is involved but as far as we can see, none have been filed recently by ACE’s lead members.

While it’s difficult to say for sure, this closure bears the hallmarks of a cease-and-desist and subsequent settlement agreement. Given ACE’s reluctance to talk about such agreements, it seems unlikely there will be a detailed public statement.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Vader & the Truth About Pirate IPTV Services

Post Syndicated from Andy original https://torrentfreak.com/vader-the-truth-about-pirate-iptv-services-100512/

Netflix, Amazon Video, Hulu, CBS All Access, fuboTV, DAZN, NowTV, the forthcoming Disney+, cable TV, terrestrial TV, satellite, cinema.

How long is this list? Nowhere near long enough if you want to come close to matching what’s currently being offered by premium pirate IPTV services.

If any of the important ‘pirate’ IPTV providers flicked a magic switch and suddenly became legal overnight, all of the above would struggle to keep their heads above water. Add another dozen legal services to the list, and the statement would still stand.

The range of content offered by ‘pirate’ IPTV services demolishes that offered by all of the world’s key providers combined. And many do it for between $5 and $25 per month – because they don’t have to worry about the costs of making it.

It usually takes a couple of minutes to sign up and that content is available on a wide range of devices, from phones through to smart TVs. Almost any device, wherever people like. How it should be.

The public wants what the public gets, at least when they sail the IPTV high seas. Until it all goes to shit in an instant, of course.

This week, Vader – one of the most recognized ‘pirate’ IPTV services – suddenly disappeared, taking not only the subscriptions of users with them but also money handed over by resellers of the service. Communication with what are effectively creditors was scrappy at best, quite incredible at worst.

After declaring that there had been “no choice but to close down Vader”, supposed facts about the closure were widely circulated by various parties, sometimes accompanied by documents and quotes to back up often-conflicting claims.

Depending on which version one believes, if any, Vader was raided, sued, told to enter into a settlement agreement with ACE (the huge anti-piracy coalition founded by the MPAA, Netflix and Amazon), or had simply taken everyone’s money and headed for the hills. Or perhaps a combination of the above. Or none.

The ‘running’ theory gained traction following a statement from Vader which asked people to “take the financial losses we are all going to take, as resellers and direct sellers”, i.e please don’t ask for your money back. That was further compounded by another statement in which the service asked for donations to fund its legal defense and to help pay back people who doggedly asked for a refund.

Now, if Vader was “raided” as some pretty detailed missives have claimed this week, would it still have control over its customer list and bank accounts, in order to make these refunds happen? That doesn’t seem likely, but stranger things have happened. If it was being sued it probably would, but there’s no evidence of that either.

While there appears to be no public record of Vader getting served, that doesn’t mean that it isn’t the subject of legal action, won’t be in the future, or doesn’t need a big cash injection. For example, if ACE has really offered the service the opportunity to settle, Vader will be given a set of demands. If they do not comply, then legal action might follow.

We have proof that ACE, among other things, demanded cooperation as part of previous settlement agreements with other entities. That meant promising to hand over information on others in the ecosystem. But would ACE really offer such a giant service the opportunity to take the easy route when it has chosen to sue the likes of TickBox, Dragon Box, and SETTV?

To find out, within hours of Vader’s shutdown TorrentFreak contacted ACE directly and asked them to confirm or deny that the MPAA (which now conducts its anti-piracy activities through ACE) was involved in the shutdown of Vader. We were told that the ACE coalition was working on a statement. Perfect.

Four days later we had received nothing, so we prompted the anti-piracy group for a response. We were told that our request hadn’t been forgotten and that it was hoped it could get a statement to us this week.

Perhaps needless to say, we haven’t received anything.

This is, of course, interesting in itself. If ACE wasn’t involved in the closure of Vader, then a simple response to clarify that fact would have been simple and could have been done in two letters – NO. However, if ACE was involved, that would make any statement much more complex.

If some kind of deal is indeed being thrashed out, we know that previous agreements sent out by ACE contained clauses that recipients can’t talk about the settlement to anyone but their lawyers. Vader clearly doesn’t want to talk about much in public and, at least for now, neither does ACE. Draw your own conclusions.

However, the fact that ACE hasn’t made a statement to confirm or deny might also be advantageous, intentional or otherwise, from an anti-piracy perspective.

Whether ACE is involved in this debacle or not, the complete lack of clarity surrounding this entire situation only serves to undermine trust in pirate IPTV providers. Granted, a public lawsuit would achieve similar goals, but right now the lack of information looks bad on Vader, not on ACE. In fact, if they aren’t involved, this is a free lunch for ACE and a big minus for Vader and by extension, pirate IPTV.

And this brings us to the point. Pirate IPTV services do not operate like legitimate companies such as Netflix. When people give Netflix their hard earned cash they can be pretty sure that they’ll get what they pay for but should the company be unable to fulfill its obligations, a very clear public statement will be made.

It certainly won’t shut down with zero notice, with no proper explanation, and begin asking for donations to dig it out of a hole. But come on, does anyone really expect an entity in this niche to operate any differently?

The main reason why anyone chooses to do business with a pirate IPTV provider (whether that’s Vader or any other) is because they don’t play by “the rules”. It’s because they thumb their noses at authority. It’s because they solve the problems of having dozens of subscription packages. It’s because they offer great value for money.

People want all this with no drawbacks? Think again.

Fulfilling all of these demands flat-out requires them to be unorthodox. It requires them to be ambiguous. It requires them to act illegally and it requires them to save their own asses when the sheriff comes to town.

Anyone who thinks it should play out differently should stick to buying bridges.

The truth about ‘pirate’ TV services is simple. You pay your money, you take a chance. People should approach IPTV subscriptions expecting to lose their money – that’s why month-to-month packages are often recommended to those with an aversion to losing cash.

People should not be surprised when such services go down temporarily or indeed permanently without notice. And they should presume that they’ll buffer at times but be happy when they don’t. Expectations should be set low by default to avoid disappointment.

‘Pirate’ IPTV services are a gamble, pure and simple. The odds are usually stacked in the user’s favor so their popularity is unlikely to wane in the near future. That says a lot about the service they mostly deliver. But make no mistake, there are no guarantees in this game.

There’s a whole new generation of pirates entering this market on both sides, supply and demand, whose motivations – one way or another – is to either make or save money. In the end, it is that balancing act that will tip the scales of success for providers and users alike.

Vader may be gone for now but there are still plenty of options around. As soon as its demise was announced, many suppliers went into overdrive to pick up the slack. How many customers will now choose to stay away is anyone’s guess but with bargains on offer, there probably won’t be any shortage of money changing hands.

Just don’t expect anyone to be particularly upfront about what’s really going on, whether that’s the providers, resellers, or anti-piracy groups. There’s way too much at stake to unmuddy the waters just because some people want answers.

The truth is always the first casualty of any war and this one is no different.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

MPAA “Dramatically Expanding” ACE Global Anti-Piracy Coalition

Post Syndicated from Andy original https://torrentfreak.com/mpaa-dramatically-expanding-ace-global-anti-piracy-coalition-190507/

The Alliance for Creativity and Entertainment, the anti-piracy coalition which already counts 33 of the world's most powerful media companies among its members, is about to get even bigger. MPAA chief Charles Rivkin confirms that his group is in the process of "dramatically" expanding the global initiative.

For more than 15 years and mainly since the rise of BitTorrent-based sharing, sites and platforms offering Hollywood movies or TV shows have been wary of the MPAA.

At any moment, BitTorrent trackers and indexers could find themselves in the group’s crosshairs, targeted by full-blown lawsuits or threats that the same would follow, if infringing activity continued.

But while the threat was real, litigation has always been expensive, sometimes prohibitively so. Furthermore, video content being shared by pirates wasn’t always owned by the studios of the MPAA, allowing many sites to slip through the net.

In June 2017, the MPAA began plugging both of these loopholes with the launch of the Alliance for Creativity and Entertainment (ACE), a huge anti-piracy coalition featuring not only MPAA members, but companies like Amazon, Netflix, CBS, HBO, and the BBC.

After adding Discovery Inc. and two Viacom-owned companies back in March, ACE now has 33 members. This not only means that it’s becoming more and more difficult to run a ‘pirate’ video platform or service without treading on at least one member’s toes, but there are almost three dozen large to huge companies now sharing the financial burden of chasing down pirates.

Now, according to MPAA chief Charles Rivkin, ACE is about to become even more powerful.

In an interview with WorldScreen, Rivkin detailed some of ACE’s achievements so far, such as shutting down 123Movies and taking on TickBox and Dragon Box, companies operating in the so-called ISD (illicit streaming device) market. A case against Omniverse is still ongoing.

“We were able to win in court against pirate operators called TickBox and Dragon Box, and they represent a new threat: the internet streaming devices, the ISDs, that are basically devices that can be purchased completely legally but when loaded with illegal software, can do enormous damage to content. It’s a never-ending fight, but we’re starting to make a big difference,” he said.

“And it’s an existential threat for some of the small and medium businesses that make up the industry. I was speaking to some broadcasters in Paris who said that piracy can be as big as their entire bottom line. And the impact on entertainment companies is huge, so this is a top priority for us.”

That Rivkin mentions 123Movies (Vietnam), then Tickbox and Dragon Box (United States), followed by France (Canal+ is an ACE member), shows that the fight against piracy is going global. ACE has already targeted several Kodi-related platforms and add-ons in the UK since its inception, yet another sign that no important region is off-limits.

If there is business worth doing there, ACE either has it covered already or will have it in hand fairly soon.

“Every major market has a participating member. We’re in the process of dramatically expanding [ACE] even more. It is already the premier global effort to reduce piracy,” Rivkin added.

How this expansion will manifest itself is not yet clear, but it seems likely that ACE will continue with its strategy of ‘loud’ public litigation (such as that taken against TickBox and Dragon Box) and selective ‘quiet’ action against certain players.

Last month, ACE told TorrentFreak that it had “sought and obtained voluntary cooperation from a significant number of owners, operators, and developers of sites, add-ons, and services” that facilitate piracy.

“We will execute more planned global actions along these lines and look to continue our success protecting creators around the world,” ACE spokesperson Richard VanOrnum added.

These ‘quiet’ actions are of course intriguing.

From the limited information available to us, it seems clear that they vastly outnumber the volume of ‘loud’ actions seen thus far and mainly target products with a large audience (Kodi add-ons and builds, for example) but without the obvious commercial element of many ‘pirate’ sites and services.

However, we have received information which suggests that large platforms may not be immune from being presented with settlement agreements, which form part of the process to cease-and-desist.

This complicates reporting because documentation previously seen by TF requires those targeted not to tell anyone apart from their lawyers about the approach to shut down. In return, ACE promises not to make their identities known, meaning that details shared are kept to a minimum.

For example, last week huge IPTV service Vader shut down, stating that it had been approached by companies seeking its closure. The platform didn’t mention ACE directly but if anyone would like them to close down, ACE would be the prime candidate.

We asked ACE if the coalition was behind the closure and a spokesperson promised to send over a statement. Thus far, however, we haven’t received anything back. While a comment may yet be forthcoming, an additional document sent to TF (the veracity of which we haven’t been able to independently confirm), suggests that Vader has been given the opportunity to settle.

If that’s indeed the case, the matter could potentially disappear into the ether, as so many other services and tools have also done in recent times. Either way, we can probably expect much more of this type of action in the future, as ACE’s “drastic” expansion brings in more funds and tentacles in every corner of the world.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

AWS Online Tech Talks – June 2018

Post Syndicated from Devin Watson original https://aws.amazon.com/blogs/aws/aws-online-tech-talks-june-2018/

AWS Online Tech Talks – June 2018

Join us this month to learn about AWS services and solutions. New this month, we have a fireside chat with the GM of Amazon WorkSpaces and our 2nd episode of the “How to re:Invent” series. We’ll also cover best practices, deep dives, use cases and more! Join us and register today!

Note – All sessions are free and in Pacific Time.

Tech talks featured this month:

 

Analytics & Big Data

June 18, 2018 | 11:00 AM – 11:45 AM PTGet Started with Real-Time Streaming Data in Under 5 Minutes – Learn how to use Amazon Kinesis to capture, store, and analyze streaming data in real-time including IoT device data, VPC flow logs, and clickstream data.
June 20, 2018 | 11:00 AM – 11:45 AM PT – Insights For Everyone – Deploying Data across your Organization – Learn how to deploy data at scale using AWS Analytics and QuickSight’s new reader role and usage based pricing.

 

AWS re:Invent
June 13, 2018 | 05:00 PM – 05:30 PM PTEpisode 2: AWS re:Invent Breakout Content Secret Sauce – Hear from one of our own AWS content experts as we dive deep into the re:Invent content strategy and how we maintain a high bar.
Compute

June 25, 2018 | 01:00 PM – 01:45 PM PTAccelerating Containerized Workloads with Amazon EC2 Spot Instances – Learn how to efficiently deploy containerized workloads and easily manage clusters at any scale at a fraction of the cost with Spot Instances.

June 26, 2018 | 01:00 PM – 01:45 PM PTEnsuring Your Windows Server Workloads Are Well-Architected – Get the benefits, best practices and tools on running your Microsoft Workloads on AWS leveraging a well-architected approach.

 

Containers
June 25, 2018 | 09:00 AM – 09:45 AM PTRunning Kubernetes on AWS – Learn about the basics of running Kubernetes on AWS including how setup masters, networking, security, and add auto-scaling to your cluster.

 

Databases

June 18, 2018 | 01:00 PM – 01:45 PM PTOracle to Amazon Aurora Migration, Step by Step – Learn how to migrate your Oracle database to Amazon Aurora.
DevOps

June 20, 2018 | 09:00 AM – 09:45 AM PTSet Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tools – Learn how to set up a CI/CD pipeline for deploying containers using the AWS Developer Tools.

 

Enterprise & Hybrid
June 18, 2018 | 09:00 AM – 09:45 AM PTDe-risking Enterprise Migration with AWS Managed Services – Learn how enterprise customers are de-risking cloud adoption with AWS Managed Services.

June 19, 2018 | 11:00 AM – 11:45 AM PTLaunch AWS Faster using Automated Landing Zones – Learn how the AWS Landing Zone can automate the set up of best practice baselines when setting up new

 

AWS Environments

June 21, 2018 | 11:00 AM – 11:45 AM PTLeading Your Team Through a Cloud Transformation – Learn how you can help lead your organization through a cloud transformation.

June 21, 2018 | 01:00 PM – 01:45 PM PTEnabling New Retail Customer Experiences with Big Data – Learn how AWS can help retailers realize actual value from their big data and deliver on differentiated retail customer experiences.

June 28, 2018 | 01:00 PM – 01:45 PM PTFireside Chat: End User Collaboration on AWS – Learn how End User Compute services can help you deliver access to desktops and applications anywhere, anytime, using any device.
IoT

June 27, 2018 | 11:00 AM – 11:45 AM PTAWS IoT in the Connected Home – Learn how to use AWS IoT to build innovative Connected Home products.

 

Machine Learning

June 19, 2018 | 09:00 AM – 09:45 AM PTIntegrating Amazon SageMaker into your Enterprise – Learn how to integrate Amazon SageMaker and other AWS Services within an Enterprise environment.

June 21, 2018 | 09:00 AM – 09:45 AM PTBuilding Text Analytics Applications on AWS using Amazon Comprehend – Learn how you can unlock the value of your unstructured data with NLP-based text analytics.

 

Management Tools

June 20, 2018 | 01:00 PM – 01:45 PM PTOptimizing Application Performance and Costs with Auto Scaling – Learn how selecting the right scaling option can help optimize application performance and costs.

 

Mobile
June 25, 2018 | 11:00 AM – 11:45 AM PTDrive User Engagement with Amazon Pinpoint – Learn how Amazon Pinpoint simplifies and streamlines effective user engagement.

 

Security, Identity & Compliance

June 26, 2018 | 09:00 AM – 09:45 AM PTUnderstanding AWS Secrets Manager – Learn how AWS Secrets Manager helps you rotate and manage access to secrets centrally.
June 28, 2018 | 09:00 AM – 09:45 AM PTUsing Amazon Inspector to Discover Potential Security Issues – See how Amazon Inspector can be used to discover security issues of your instances.

 

Serverless

June 19, 2018 | 01:00 PM – 01:45 PM PTProductionize Serverless Application Building and Deployments with AWS SAM – Learn expert tips and techniques for building and deploying serverless applications at scale with AWS SAM.

 

Storage

June 26, 2018 | 11:00 AM – 11:45 AM PTDeep Dive: Hybrid Cloud Storage with AWS Storage Gateway – Learn how you can reduce your on-premises infrastructure by using the AWS Storage Gateway to connecting your applications to the scalable and reliable AWS storage services.
June 27, 2018 | 01:00 PM – 01:45 PM PTChanging the Game: Extending Compute Capabilities to the Edge – Discover how to change the game for IIoT and edge analytics applications with AWS Snowball Edge plus enhanced Compute instances.
June 28, 2018 | 11:00 AM – 11:45 AM PTBig Data and Analytics Workloads on Amazon EFS – Get best practices and deployment advice for running big data and analytics workloads on Amazon EFS.

Отново ме блокираха във Facebook

Post Syndicated from Боян Юруков original https://yurukov.net/blog/2018/block-facebook-2/

За пореден път съм блокиран във Facebook и за втори път причината е, че цитирам с ирония думите на някого друг. В случая коментирах под пост на Йордан Стефанов, който списва „Наука и критично мислене“ и блога 6nine. Поводът беше негово участие при Коритаров, където говори за скорошните протести на антиваксърте срещу задължителния характер на ваксините. В общи линии малко повече може да се каже, отколкото при предишния им протест, но явно има нужда да се повтаря отново и отново. Затова е добре, че Йордан се наема да го прави.

За това си участие си той спечели поредна доза определения из едни групи във фейса. Едно от по-цветущите му изпратих и цитирах под поста му. Ето оригиналния коментар пуснат на стената на един от организаторите на активакс протеста:

Два дни по-късно профилът ми беше блокиран за 24 часа, тъй като коментарът ми не отговарял на стандартите на общността. Ясно съм го означил като цитат, а и от контекста после става ясно. Това, разбира се, няма значение, тъй като алгоритмите не разбират от контекст. Те търсят ключови думи, а в коментара ми определено има няколко притеснителни такива. Затова съм си спечелил и блокиране.

Тъй като статусът на Йордан беше частен, не мисля, че някой е подавал оплаквания конкретно за него. По-скоро са изпращали повече сигнали за мен и други неща, които съм писал. Когато алгоритъмът е хванал въпросната ключова дума, се е задействал. Нещо подобно стана преди две години, когато пак иронизирам мъжкарите, които се пънеха, че бежанците в Германия са били жени, но като стане дума за домашното насилие, всички опорстват. Предвид дебатът за оная конвенция този статус май е все по-актуален.

Интересното в този случай е, че цитираният от мен коментар си стои. Въпреки използването на същите ключови думи и въпреки многобройните докладвания. Моят вече е изтрит. Това всъщност е един дребен пример защо не трябва да се позволява на алгоритми да филтрират съдържание и да раздават наказания. Именно това се готви като законодателство на европейско ниво, но не просто в сферата на интернет тормоза, но и като защитата на интелектуална собственост.

Но в крайна сметка мярката е само за 24 часа и отново ще получа извинение от Fb, както последните пъти. Щом участието на Йордан толкова е подразнило антиваксърите, значи си заслужава да го видите, както и да се насочите към блога му 6nine.

Build your own weather station with our new guide!

Post Syndicated from Richard Hayler original https://www.raspberrypi.org/blog/build-your-own-weather-station/

One of the most common enquiries I receive at Pi Towers is “How can I get my hands on a Raspberry Pi Oracle Weather Station?” Now the answer is: “Why not build your own version using our guide?”

Build Your Own weather station kit assembled

Tadaaaa! The BYO weather station fully assembled.

Our Oracle Weather Station

In 2016 we sent out nearly 1000 Raspberry Pi Oracle Weather Station kits to schools from around the world who had applied to be part of our weather station programme. In the original kit was a special HAT that allows the Pi to collect weather data with a set of sensors.

The original Raspberry Pi Oracle Weather Station HAT – Build Your Own Raspberry Pi weather station

The original Raspberry Pi Oracle Weather Station HAT

We designed the HAT to enable students to create their own weather stations and mount them at their schools. As part of the programme, we also provide an ever-growing range of supporting resources. We’ve seen Oracle Weather Stations in great locations with a huge differences in climate, and they’ve even recorded the effects of a solar eclipse.

Our new BYO weather station guide

We only had a single batch of HATs made, and unfortunately we’ve given nearly* all the Weather Station kits away. Not only are the kits really popular, we also receive lots of questions about how to add extra sensors or how to take more precise measurements of a particular weather phenomenon. So today, to satisfy your demand for a hackable weather station, we’re launching our Build your own weather station guide!

Build Your Own Raspberry Pi weather station

Fun with meteorological experiments!

Our guide suggests the use of many of the sensors from the Oracle Weather Station kit, so can build a station that’s as close as possible to the original. As you know, the Raspberry Pi is incredibly versatile, and we’ve made it easy to hack the design in case you want to use different sensors.

Many other tutorials for Pi-powered weather stations don’t explain how the various sensors work or how to store your data. Ours goes into more detail. It shows you how to put together a breadboard prototype, it describes how to write Python code to take readings in different ways, and it guides you through recording these readings in a database.

Build Your Own Raspberry Pi weather station on a breadboard

There’s also a section on how to make your station weatherproof. And in case you want to move past the breadboard stage, we also help you with that. The guide shows you how to solder together all the components, similar to the original Oracle Weather Station HAT.

Who should try this build

We think this is a great project to tackle at home, at a STEM club, Scout group, or CoderDojo, and we’re sure that many of you will be chomping at the bit to get started. Before you do, please note that we’ve designed the build to be as straight-forward as possible, but it’s still fairly advanced both in terms of electronics and programming. You should read through the whole guide before purchasing any components.

Build Your Own Raspberry Pi weather station – components

The sensors and components we’re suggesting balance cost, accuracy, and easy of use. Depending on what you want to use your station for, you may wish to use different components. Similarly, the final soldered design in the guide may not be the most elegant, but we think it is achievable for someone with modest soldering experience and basic equipment.

You can build a functioning weather station without soldering with our guide, but the build will be more durable if you do solder it. If you’ve never tried soldering before, that’s OK: we have a Getting started with soldering resource plus video tutorial that will walk you through how it works step by step.

Prototyping HAT for Raspberry Pi weather station sensors

For those of you who are more experienced makers, there are plenty of different ways to put the final build together. We always like to hear about alternative builds, so please post your designs in the Weather Station forum.

Our plans for the guide

Our next step is publishing supplementary guides for adding extra functionality to your weather station. We’d love to hear which enhancements you would most like to see! Our current ideas under development include adding a webcam, making a tweeting weather station, adding a light/UV meter, and incorporating a lightning sensor. Let us know which of these is your favourite, or suggest your own amazing ideas in the comments!

*We do have a very small number of kits reserved for interesting projects or locations: a particularly cool experiment, a novel idea for how the Oracle Weather Station could be used, or places with specific weather phenomena. If have such a project in mind, please send a brief outline to [email protected], and we’ll consider how we might be able to help you.

The post Build your own weather station with our new guide! appeared first on Raspberry Pi.

Flight Sim Company Threatens Reddit Mods Over “Libelous” DRM Posts

Post Syndicated from Andy original https://torrentfreak.com/flight-sim-company-threatens-reddit-mods-over-libellous-drm-posts-180604/

Earlier this year, in an effort to deal with piracy of their products, flight simulator company FlightSimLabs took drastic action by installing malware on customers’ machines.

The story began when a Reddit user reported something unusual in his download of FlightSimLabs’ A320X module. A file – test.exe – was being flagged up as a ‘Chrome Password Dump’ tool, something which rang alarm bells among flight sim fans.

As additional information was made available, the story became even more sensational. After first dodging the issue with carefully worded statements, FlightSimLabs admitted that it had installed a password dumper onto ALL users’ machines – whether they were pirates or not – in an effort to catch a particular software cracker and launch legal action.

It was an incredible story that no doubt did damage to FlightSimLabs’ reputation. But the now the company is at the center of a new storm, again centered around anti-piracy measures and again focused on Reddit.

Just before the weekend, Reddit user /u/walkday reported finding something unusual in his A320X module, the same module that caused the earlier controversy.

“The latest installer of FSLabs’ A320X puts two cmdhost.exe files under ‘system32\’ and ‘SysWOW64\’ of my Windows directory. Despite the name, they don’t open a command-line window,” he reported.

“They’re a part of the authentication because, if you remove them, the A320X won’t get loaded. Does someone here know more about cmdhost.exe? Why does FSLabs give them such a deceptive name and put them in the system folders? I hate them for polluting my system folder unless, of course, it is a dll used by different applications.”

Needless to say, the news that FSLabs were putting files into system folders named to make them look like system files was not well received.

“Hiding something named to resemble Window’s “Console Window Host” process in system folders is a huge red flag,” one user wrote.

“It’s a malware tactic used to deceive users into thinking the executable is a part of the OS, thus being trusted and not deleted. Really dodgy tactic, don’t trust it and don’t trust them,” opined another.

With a disenchanted Reddit userbase simmering away in the background, FSLabs took to Facebook with a statement to quieten down the masses.

“Over the past few hours we have become aware of rumors circulating on social media about the cmdhost file installed by the A320-X and wanted to clear up any confusion or misunderstanding,” the company wrote.

“cmdhost is part of our eSellerate infrastructure – which communicates between the eSellerate server and our product activation interface. It was designed to reduce the number of product activation issues people were having after the FSX release – which have since been resolved.”

The company noted that the file had been checked by all major anti-virus companies and everything had come back clean, which does indeed appear to be the case. Nevertheless, the critical Reddit thread remained, bemoaning the actions of a company which probably should have known better than to irritate fans after February’s debacle. In response, however, FSLabs did just that once again.

In private messages to the moderators of the /r/flightsim sub-Reddit, FSLabs’ Marketing and PR Manager Simon Kelsey suggested that the mods should do something about the thread in question or face possible legal action.

“Just a gentle reminder of Reddit’s obligations as a publisher in order to ensure that any libelous content is taken down as soon as you become aware of it,” Kelsey wrote.

Noting that FSLabs welcomes “robust fair comment and opinion”, Kelsey gave the following advice.

“The ‘cmdhost.exe’ file in question is an entirely above board part of our anti-piracy protection and has been submitted to numerous anti-virus providers in order to verify that it poses no threat. Therefore, ANY suggestion that current or future products pose any threat to users is absolutely false and libelous,” he wrote, adding:

“As we have already outlined in the past, ANY suggestion that any user’s data was compromised during the events of February is entirely false and therefore libelous.”

Noting that FSLabs would “hate for lawyers to have to get involved in this”, Kelsey advised the /r/flightsim mods to ensure that no such claims were allowed to remain on the sub-Reddit.

But after not receiving the response he would’ve liked, Kelsey wrote once again to the mods. He noted that “a number of unsubstantiated and highly defamatory comments” remained online and warned that if something wasn’t done to clean them up, he would have “no option” than to pass the matter to FSLabs’ legal team.

Like the first message, this second effort also failed to have the desired effect. In fact, the moderators’ response was to post an open letter to Kelsey and FSLabs instead.

“We sincerely disagree that you ‘welcome robust fair comment and opinion’, demonstrated by the censorship on your forums and the attempted censorship on our subreddit,” the mods wrote.

“While what you do on your forum is certainly your prerogative, your rules do not extend to Reddit nor the r/flightsim subreddit. Removing content you disagree with is simply not within our purview.”

The letter, which is worth reading in full, refutes Kelsey’s claims and also suggests that critics of FSLabs may have been subjected to Reddit vote manipulation and coordinated efforts to discredit them.

What will happen next is unclear but the matter has now been placed in the hands of Reddit’s administrators who have agreed to deal with Kelsey and FSLabs’ personally.

It’s a little early to say for sure but it seems unlikely that this will end in a net positive for FSLabs, no matter what decision Reddit’s admins take.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Kernel 4.17 released

Post Syndicated from corbet original https://lwn.net/Articles/756373/rss

Linus has released the 4.17 kernel, which
will indeed be called “4.17”.
No, I didn’t call it 5.0, even though all the git object count
numerology was in place for that. It will happen in the not _too_
distant future, and I’m told all the release scripts on kernel.org are
ready for it, but I didn’t feel there was any real reason for it.

Headline features in this release include
improved load estimation in the CPU
scheduler,
raw
BPF tracepoints
,
lazytime support in the XFS filesystem,
full in-kernel TLS protocol support,
histogram triggers for tracing,
mitigations for the latest Spectre variants,
and, of course, the removal of support for eight unloved processor
architectures.

When Joe Public Becomes a Commercial Pirate, a Little Knowledge is Dangerous

Post Syndicated from Andy original https://torrentfreak.com/joe-public-becomes-commercial-pirate-little-knowledge-dangerous-180603/

Back in March and just a few hours before the Anthony Joshua v Joseph Parker fight, I got chatting with some fellow fans in the local pub. While some were intending to pay for the fight, others were going down the Kodi route.

Soon after the conversation switched to IPTV. One of the guys had a subscription and he said that his supplier would be along shortly if anyone wanted a package to watch the fight at home. Of course, I was curious to hear what he had to say since it’s not often this kind of thing is offered ‘offline’.

The guy revealed that he sold more or less exclusively on eBay and called up the page on his phone to show me. The listing made interesting reading.

In common with hundreds of similar IPTV subscription offers easily findable on eBay, the listing offered “All the sports and films you need plus VOD and main UK channels” for the sum of just under £60 per year, which is fairly cheap in the current market. With a non-committal “hmmm” I asked a bit more about the guy’s business and surprisingly he was happy to provide some details.

Like many people offering such packages, the guy was a reseller of someone else’s product. He also insisted that selling access to copyrighted content is OK because it sits in a “gray area”. It’s also easy to keep listings up on eBay, he assured me, as long as a few simple rules are adhered to. Right, this should be interesting.

First of all, sellers shouldn’t be “too obvious” he advised, noting that individual channels or channel lists shouldn’t be listed on the site. Fair enough, but then he said the most important thing of all is to have a disclaimer like his in any listing, written as follows:

“PLEASE NOTE EBAY: THIS IS NOT A DE SCRAMBLER SERVICE, I AM NOT SELLING ANY ILLEGAL CHANNELS OR CHANNEL LISTS NOR DO I REPRESENT ANY MEDIA COMPANY NOR HAVE ACCESS TO ANY OF THEIR CONTENTS. NO TRADEMARK HAS BEEN INFRINGED. DO NOT REMOVE LISTING AS IT IS IN ACCORDANCE WITH EBAY POLICIES.”

Apparently, this paragraph is crucial to keeping listings up on eBay and is the equivalent of kryptonite when it comes to deflecting copyright holders, police, and Trading Standards. Sure enough, a few seconds with Google reveals the same wording on dozens of eBay listings and those offering IPTV subscriptions on external platforms.

It is, of course, absolutely worthless but the IPTV seller insisted otherwise, noting he’d sold “thousands” of subscriptions through eBay without any problems. While a similar logic can be applied to garlic and vampires, a second disclaimer found on many other illicit IPTV subscription listings treads an even more bizarre path.

“THE PRODUCTS OFFERED CAN NOT BE USED TO DESCRAMBLE OR OTHERWISE ENABLE ACCESS TO CABLE OR SATELLITE TELEVISION PROGRAMS THAT BYPASSES PAYMENT TO THE SERVICE PROVIDER. RECEIVING SUBSCRIPTION/BASED TV AIRTIME IS ILLEGAL WITHOUT PAYING FOR IT.”

This disclaimer (which apparently no sellers displaying it have ever read) seems to be have been culled from the Zgemma site, which advertises a receiving device which can technically receive pirate IPTV services but wasn’t designed for the purpose. In that context, the disclaimer makes sense but when applied to dedicated pirate IPTV subscriptions, it’s absolutely ridiculous.

It’s unclear why so many sellers on eBay, Gumtree, Craigslist and other platforms think that these disclaimers are useful. It leads one to the likely conclusion that these aren’t hardcore pirates at all but regular people simply out to make a bit of extra cash who have received bad advice.

What is clear, however, is that selling access to thousands of otherwise subscription channels without permission from copyright owners is definitely illegal in the EU. The European Court of Justice says so (1,2) and it’s been backed up by subsequent cases in the Netherlands.

While the odds of getting criminally prosecuted or sued for reselling such a service are relatively slim, it’s worrying that in 2018 people still believe that doing so is made legal by the inclusion of a paragraph of text. It’s even more worrying that these individuals apparently have no idea of the serious consequences should they become singled out for legal action.

Even more surprisingly, TorrentFreak spoke with a handful of IPTV suppliers higher up the chain who also told us that what they are doing is legal. A couple claimed to be protected by communication intermediary laws, others didn’t want to go into details. Most stopped responding to emails on the topic. Perhaps most tellingly, none wanted to go on the record.

The big take-home here is that following some important EU rulings, knowingly linking to copyrighted content for profit is nearly always illegal in Europe and leaves people open for targeting by copyright holders and the authorities. People really should be aware of that, especially the little guy making a little extra pocket money on eBay.

Of course, people are perfectly entitled to carry on regardless and test the limits of the law when things go wrong. At this point, however, it’s probably worth noting that IPTV provider Ace Hosting recently handed over £600,000 rather than fight the Premier League (1,2) when they clearly had the money to put up a defense.

Given their effectiveness, perhaps they should’ve put up a disclaimer instead?

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Storing Encrypted Credentials In Git

Post Syndicated from Bozho original https://techblog.bozho.net/storing-encrypted-credentials-in-git/

We all know that we should not commit any passwords or keys to the repo with our code (no matter if public or private). Yet, thousands of production passwords can be found on GitHub (and probably thousands more in internal company repositories). Some have tried to fix that by removing the passwords (once they learned it’s not a good idea to store them publicly), but passwords have remained in the git history.

Knowing what not to do is the first and very important step. But how do we store production credentials. Database credentials, system secrets (e.g. for HMACs), access keys for 3rd party services like payment providers or social networks. There doesn’t seem to be an agreed upon solution.

I’ve previously argued with the 12-factor app recommendation to use environment variables – if you have a few that might be okay, but when the number of variables grow (as in any real application), it becomes impractical. And you can set environment variables via a bash script, but you’d have to store it somewhere. And in fact, even separate environment variables should be stored somewhere.

This somewhere could be a local directory (risky), a shared storage, e.g. FTP or S3 bucket with limited access, or a separate git repository. I think I prefer the git repository as it allows versioning (Note: S3 also does, but is provider-specific). So you can store all your environment-specific properties files with all their credentials and environment-specific configurations in a git repo with limited access (only Ops people). And that’s not bad, as long as it’s not the same repo as the source code.

Such a repo would look like this:

project
└─── production
|   |   application.properites
|   |   keystore.jks
└─── staging
|   |   application.properites
|   |   keystore.jks
└─── on-premise-client1
|   |   application.properites
|   |   keystore.jks
└─── on-premise-client2
|   |   application.properites
|   |   keystore.jks

Since many companies are using GitHub or BitBucket for their repositories, storing production credentials on a public provider may still be risky. That’s why it’s a good idea to encrypt the files in the repository. A good way to do it is via git-crypt. It is “transparent” encryption because it supports diff and encryption and decryption on the fly. Once you set it up, you continue working with the repo as if it’s not encrypted. There’s even a fork that works on Windows.

You simply run git-crypt init (after you’ve put the git-crypt binary on your OS Path), which generates a key. Then you specify your .gitattributes, e.g. like that:

secretfile filter=git-crypt diff=git-crypt
*.key filter=git-crypt diff=git-crypt
*.properties filter=git-crypt diff=git-crypt
*.jks filter=git-crypt diff=git-crypt

And you’re done. Well, almost. If this is a fresh repo, everything is good. If it is an existing repo, you’d have to clean up your history which contains the unencrypted files. Following these steps will get you there, with one addition – before calling git commit, you should call git-crypt status -f so that the existing files are actually encrypted.

You’re almost done. We should somehow share and backup the keys. For the sharing part, it’s not a big issue to have a team of 2-3 Ops people share the same key, but you could also use the GPG option of git-crypt (as documented in the README). What’s left is to backup your secret key (that’s generated in the .git/git-crypt directory). You can store it (password-protected) in some other storage, be it a company shared folder, Dropbox/Google Drive, or even your email. Just make sure your computer is not the only place where it’s present and that it’s protected. I don’t think key rotation is necessary, but you can devise some rotation procedure.

git-crypt authors claim to shine when it comes to encrypting just a few files in an otherwise public repo. And recommend looking at git-remote-gcrypt. But as often there are non-sensitive parts of environment-specific configurations, you may not want to encrypt everything. And I think it’s perfectly fine to use git-crypt even in a separate repo scenario. And even though encryption is an okay approach to protect credentials in your source code repo, it’s still not necessarily a good idea to have the environment configurations in the same repo. Especially given that different people/teams manage these credentials. Even in small companies, maybe not all members have production access.

The outstanding questions in this case is – how do you sync the properties with code changes. Sometimes the code adds new properties that should be reflected in the environment configurations. There are two scenarios here – first, properties that could vary across environments, but can have default values (e.g. scheduled job periods), and second, properties that require explicit configuration (e.g. database credentials). The former can have the default values bundled in the code repo and therefore in the release artifact, allowing external files to override them. The latter should be announced to the people who do the deployment so that they can set the proper values.

The whole process of having versioned environment-speific configurations is actually quite simple and logical, even with the encryption added to the picture. And I think it’s a good security practice we should try to follow.

The post Storing Encrypted Credentials In Git appeared first on Bozho's tech blog.

[$] Deferring seccomp decisions to user space

Post Syndicated from corbet original https://lwn.net/Articles/756233/rss

There has been a lot of work in recent years to use BPF to push policy
decisions into the kernel. But sometimes, it seems, what is really wanted
is a way for a BPF program to punt a decision back to user space. That is
the objective behind this patch set giving
the secure
computing (seccomp)
mechanism a way to pass complex decisions to
a user-space helper program.

Папуа Нова Гвинея спира достъпа до Фейсбук за месец

Post Syndicated from nellyo original https://nellyo.wordpress.com/2018/06/02/fb-7/

Правителството на Папуа Нова Гвинея  забранява Facebook за един месец, за да се справи с фалшивите профили и да проучи ефектите, които сайтът има върху населението.

Уникално: едновременно това е мярка – защото държавата ще филтрира – и експеримент – защото ще проучва. Остава да видим дали тази практика ще се разпространи и извън Папуа Нова Гвинея.

“Времето ще позволи да се събере информация за идентифициране на потребители, които се крият зад фалшиви профили, потребители, които качват порнографски изображения, потребители, които публикуват невярна и подвеждаща информация във Фейсбук, за да бъде филтрирано и премахнато това съдържание”.

The Guardian пише.

 

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?

Post Syndicated from Bruce Schneier original https://www.schneier.com/blog/archives/2018/06/friday_squid_bl_627.html

Maybe not DNA, but biological somethings.

Cause of Cambrian explosion — Terrestrial or Cosmic?“:

Abstract: We review the salient evidence consistent with or predicted by the Hoyle-Wickramasinghe (H-W) thesis of Cometary (Cosmic) Biology. Much of this physical and biological evidence is multifactorial. One particular focus are the recent studies which date the emergence of the complex retroviruses of vertebrate lines at or just before the Cambrian Explosion of ~500 Ma. Such viruses are known to be plausibly associated with major evolutionary genomic processes. We believe this coincidence is not fortuitous but is consistent with a key prediction of H-W theory whereby major extinction-diversification evolutionary boundaries coincide with virus-bearing cometary-bolide bombardment events. A second focus is the remarkable evolution of intelligent complexity (Cephalopods) culminating in the emergence of the Octopus. A third focus concerns the micro-organism fossil evidence contained within meteorites as well as the detection in the upper atmosphere of apparent incoming life-bearing particles from space. In our view the totality of the multifactorial data and critical analyses assembled by Fred Hoyle, Chandra Wickramasinghe and their many colleagues since the 1960s leads to a very plausible conclusion — life may have been seeded here on Earth by life-bearing comets as soon as conditions on Earth allowed it to flourish (about or just before 4.1 Billion years ago); and living organisms such as space-resistant and space-hardy bacteria, viruses, more complex eukaryotic cells, fertilised ova and seeds have been continuously delivered ever since to Earth so being one important driver of further terrestrial evolution which has resulted in considerable genetic diversity and which has led to the emergence of mankind.

Two commentaries.

This is almost certainly not true.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.

Some quick thoughts on the public discussion regarding facial recognition and Amazon Rekognition this past week

Post Syndicated from Dr. Matt Wood original https://aws.amazon.com/blogs/aws/some-quick-thoughts-on-the-public-discussion-regarding-facial-recognition-and-amazon-rekognition-this-past-week/

We have seen a lot of discussion this past week about the role of Amazon Rekognition in facial recognition, surveillance, and civil liberties, and we wanted to share some thoughts.

Amazon Rekognition is a service we announced in 2016. It makes use of new technologies – such as deep learning – and puts them in the hands of developers in an easy-to-use, low-cost way. Since then, we have seen customers use the image and video analysis capabilities of Amazon Rekognition in ways that materially benefit both society (e.g. preventing human trafficking, inhibiting child exploitation, reuniting missing children with their families, and building educational apps for children), and organizations (enhancing security through multi-factor authentication, finding images more easily, or preventing package theft). Amazon Web Services (AWS) is not the only provider of services like these, and we remain excited about how image and video analysis can be a driver for good in the world, including in the public sector and law enforcement.

There have always been and will always be risks with new technology capabilities. Each organization choosing to employ technology must act responsibly or risk legal penalties and public condemnation. AWS takes its responsibilities seriously. But we believe it is the wrong approach to impose a ban on promising new technologies because they might be used by bad actors for nefarious purposes in the future. The world would be a very different place if we had restricted people from buying computers because it was possible to use that computer to do harm. The same can be said of thousands of technologies upon which we all rely each day. Through responsible use, the benefits have far outweighed the risks.

Customers are off to a great start with Amazon Rekognition; the evidence of the positive impact this new technology can provide is strong (and growing by the week), and we’re excited to continue to support our customers in its responsible use.

-Dr. Matt Wood, general manager of artificial intelligence at AWS

Protecting coral reefs with Nemo-Pi, the underwater monitor

Post Syndicated from Janina Ander original https://www.raspberrypi.org/blog/coral-reefs-nemo-pi/

The German charity Save Nemo works to protect coral reefs, and they are developing Nemo-Pi, an underwater “weather station” that monitors ocean conditions. Right now, you can vote for Save Nemo in the Google.org Impact Challenge.

Nemo-Pi — Save Nemo

Save Nemo

The organisation says there are two major threats to coral reefs: divers, and climate change. To make diving saver for reefs, Save Nemo installs buoy anchor points where diving tour boats can anchor without damaging corals in the process.

reef damaged by anchor
boat anchored at buoy

In addition, they provide dos and don’ts for how to behave on a reef dive.

The Nemo-Pi

To monitor the effects of climate change, and to help divers decide whether conditions are right at a reef while they’re still on shore, Save Nemo is also in the process of perfecting Nemo-Pi.

Nemo-Pi schematic — Nemo-Pi — Save Nemo

This Raspberry Pi-powered device is made up of a buoy, a solar panel, a GPS device, a Pi, and an array of sensors. Nemo-Pi measures water conditions such as current, visibility, temperature, carbon dioxide and nitrogen oxide concentrations, and pH. It also uploads its readings live to a public webserver.

Inside the Nemo-Pi device — Save Nemo
Inside the Nemo-Pi device — Save Nemo
Inside the Nemo-Pi device — Save Nemo

The Save Nemo team is currently doing long-term tests of Nemo-Pi off the coast of Thailand and Indonesia. They are also working on improving the device’s power consumption and durability, and testing prototypes with the Raspberry Pi Zero W.

web dashboard — Nemo-Pi — Save Nemo

The web dashboard showing live Nemo-Pi data

Long-term goals

Save Nemo aims to install a network of Nemo-Pis at shallow reefs (up to 60 metres deep) in South East Asia. Then diving tour companies can check the live data online and decide day-to-day whether tours are feasible. This will lower the impact of humans on reefs and help the local flora and fauna survive.

Coral reefs with fishes

A healthy coral reef

Nemo-Pi data may also be useful for groups lobbying for reef conservation, and for scientists and activists who want to shine a spotlight on the awful effects of climate change on sea life, such as coral bleaching caused by rising water temperatures.

Bleached coral

A bleached coral reef

Vote now for Save Nemo

If you want to help Save Nemo in their mission today, vote for them to win the Google.org Impact Challenge:

  1. Head to the voting web page
  2. Click “Abstimmen” in the footer of the page to vote
  3. Click “JA” in the footer to confirm

Voting is open until 6 June. You can also follow Save Nemo on Facebook or Twitter. We think this organisation is doing valuable work, and that their projects could be expanded to reefs across the globe. It’s fantastic to see the Raspberry Pi being used to help protect ocean life.

The post Protecting coral reefs with Nemo-Pi, the underwater monitor appeared first on Raspberry Pi.

Amazon SageMaker Updates – Tokyo Region, CloudFormation, Chainer, and GreenGrass ML

Post Syndicated from Randall Hunt original https://aws.amazon.com/blogs/aws/sagemaker-tokyo-summit-2018/

Today, at the AWS Summit in Tokyo we announced a number of updates and new features for Amazon SageMaker. Starting today, SageMaker is available in Asia Pacific (Tokyo)! SageMaker also now supports CloudFormation. A new machine learning framework, Chainer, is now available in the SageMaker Python SDK, in addition to MXNet and Tensorflow. Finally, support for running Chainer models on several devices was added to AWS Greengrass Machine Learning.

Amazon SageMaker Chainer Estimator


Chainer is a popular, flexible, and intuitive deep learning framework. Chainer networks work on a “Define-by-Run” scheme, where the network topology is defined dynamically via forward computation. This is in contrast to many other frameworks which work on a “Define-and-Run” scheme where the topology of the network is defined separately from the data. A lot of developers enjoy the Chainer scheme since it allows them to write their networks with native python constructs and tools.

Luckily, using Chainer with SageMaker is just as easy as using a TensorFlow or MXNet estimator. In fact, it might even be a bit easier since it’s likely you can take your existing scripts and use them to train on SageMaker with very few modifications. With TensorFlow or MXNet users have to implement a train function with a particular signature. With Chainer your scripts can be a little bit more portable as you can simply read from a few environment variables like SM_MODEL_DIR, SM_NUM_GPUS, and others. We can wrap our existing script in a if __name__ == '__main__': guard and invoke it locally or on sagemaker.


import argparse
import os

if __name__ =='__main__':

    parser = argparse.ArgumentParser()

    # hyperparameters sent by the client are passed as command-line arguments to the script.
    parser.add_argument('--epochs', type=int, default=10)
    parser.add_argument('--batch-size', type=int, default=64)
    parser.add_argument('--learning-rate', type=float, default=0.05)

    # Data, model, and output directories
    parser.add_argument('--output-data-dir', type=str, default=os.environ['SM_OUTPUT_DATA_DIR'])
    parser.add_argument('--model-dir', type=str, default=os.environ['SM_MODEL_DIR'])
    parser.add_argument('--train', type=str, default=os.environ['SM_CHANNEL_TRAIN'])
    parser.add_argument('--test', type=str, default=os.environ['SM_CHANNEL_TEST'])

    args, _ = parser.parse_known_args()

    # ... load from args.train and args.test, train a model, write model to args.model_dir.

Then, we can run that script locally or use the SageMaker Python SDK to launch it on some GPU instances in SageMaker. The hyperparameters will get passed in to the script as CLI commands and the environment variables above will be autopopulated. When we call fit the input channels we pass will be populated in the SM_CHANNEL_* environment variables.


from sagemaker.chainer.estimator import Chainer
# Create my estimator
chainer_estimator = Chainer(
    entry_point='example.py',
    train_instance_count=1,
    train_instance_type='ml.p3.2xlarge',
    hyperparameters={'epochs': 10, 'batch-size': 64}
)
# Train my estimator
chainer_estimator.fit({'train': train_input, 'test': test_input})

# Deploy my estimator to a SageMaker Endpoint and get a Predictor
predictor = chainer_estimator.deploy(
    instance_type="ml.m4.xlarge",
    initial_instance_count=1
)

Now, instead of bringing your own docker container for training and hosting with Chainer, you can just maintain your script. You can see the full sagemaker-chainer-containers on github. One of my favorite features of the new container is built-in chainermn for easy multi-node distribution of your chainer training jobs.

There’s a lot more documentation and information available in both the README and the example notebooks.

AWS GreenGrass ML with Chainer

AWS GreenGrass ML now includes a pre-built Chainer package for all devices powered by Intel Atom, NVIDIA Jetson, TX2, and Raspberry Pi. So, now GreenGrass ML provides pre-built packages for TensorFlow, Apache MXNet, and Chainer! You can train your models on SageMaker then easily deploy it to any GreenGrass-enabled device using GreenGrass ML.

JAWS UG

I want to give a quick shout out to all of our wonderful and inspirational friends in the JAWS UG who attended the AWS Summit in Tokyo today. I’ve very much enjoyed seeing your pictures of the summit. Thanks for making Japan an amazing place for AWS developers! I can’t wait to visit again and meet with all of you.

Randall