CourtListener’s SCOTUS Data Gets Even Better with Legacy Data from the Supreme Court Database

We’re excited to share that as of today, we have added the latest data from the Supreme Court Database (SCDB) into CourtListener. This update adds SCDB ID’s, parallel citations, vote counts, and decision direction data to about 20,000 Supreme Court cases. Each of these enhancements enables some great functionality.
For example, now that we have vote counts for older cases, you can create visualizations of older topics, like the “Separate but Equal” doctrine or the Commerce Clause. Colin Starger, the creator of SCOTUS Mapper, has been working with this early data and has created a variety of fascinating historical Supreme Court network graphs. If you want to experiment with this, the place to start is at the SCOTUS visualization homepage.
Here’s a taste, showing Katz v. U.S. plotted to Olmstead. In this graph you can see that over time the vote went from a divided conservative vote in 1928 to a divided


Original URL: https://free.law/2016/09/06/courtlisteners-scotus-data-gets-even-better-with-legacy-data-from-the-supreme-court-database/

Original article

Google’s 3-level Android patch may cause confusion

Google has released another large monthly batch of security patches for Android, this time fixing 55 vulnerabilities, eight of which are rated critical.
The novelty of this release is that the fixes are split into three different “security patch levels” — date strings that indicate to users how up-to-date their devices are. While this could make it easier for device manufacturers to integrate patches applicable to their devices, it could lead to confusion among regular users.
Since August 2015 Google has released security updates for Android according to a monthly schedule. This was intended to add some predictability to Android patches and indeed, some device makers committed to monthly security updates as well.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3117124/security/googles-3-level-android-patch-may-cause-confusion.html#tk.rss_all

Original article

Who sponsors Drupal development?

Republished from buytaert.net
There exist millions of Open Source projects today, but many of them aren’t sustainable. Scaling Open Source projects in a sustainable manner is difficult. A prime example is OpenSSL, which plays a critical role in securing the internet. Despite its importance, the entire OpenSSL development team is relatively small, consisting of 11 people, 10 of whom are volunteers. In 2014, security researchers discovered an important security bug that exposed millions of websites. Like OpenSSL, most Open Source projects fail to scale their resources. Notable exceptions are the Linux kernel, Debian, Apache, Drupal, and WordPress, which have foundations, multiple corporate sponsors and many contributors that help these projects scale.
We (Dries Buytaert is the founder and project lead of Drupal and co-founder and Chief Technology Officer of Acquia and Matthew Tift is a Senior Developer at Lullabot and Drupal 8 configuration system co-maintainer) believe that the Drupal community has a shared responsibility to build Drupal and that those who get more from Drupal


Original URL: https://www.drupal.org/blog/who-sponsors-drupal-development

Original article

Krypton Abandons Ethereum-Based Blockchain After 51% Attack

Stephanie Kent, Krypton’s founder, working from a convenience store after having lost power in her home due to the Florida hurricane, Hermine.
The world of cryptocurrencies, including Bitcoin and altcoins, is a strange place, often likened to the Wild West. It is so well-populated by the anonymous, that it becomes easy to forget that there is a real person on the other side of that userid, handle or avatar; that, when things go terribly wrong, for example, real people are being hurt, their very real investments, sometimes including businesses, are being destroyed.
I know this world firsthand. For the past two years, I myself, have lived amongst its denizens as an anonymous actor, hiding behind a pseudonym to protect my own identity, as should be the right of every citizen to do if they wish. It is only now, when I have decided to take my altcoin project, Krypton, into the light


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/JrbT9803mZE/

Original article

Stealthy, sneaky rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that, despite running from user mode, can be hard to detect and remove.
Called Umbreon, after a Pokémon character that hides in the darkness, the rootkit has been in development since early 2015 and is now being sold on the underground markets. It targets Linux-based systems on the x86, x86-64 and ARM architectures, including many embedded devices such as routers.
According to malware researchers from antivirus firm Trend Micro, Umbreon is a so-called ring 3 rootkit, meaning that it runs from user mode and doesn’t need kernel privileges. Despite this apparent limitation, it is quite capable of hiding itself and persisting on the system.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3116491/security/stealthy-sneaky-rootkit-targets-linux-systems-on-arm-and-x86.html#tk.rss_all

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: