Archive for the ‘Free Software’ Category

`Stand Your Ground’ Change Heads To Governor – WLRN

A change to the state's stand your ground self-defense law is heading to Gov. Rick Scott after the Senate agreed lateFridayto go along with a House proposal.

The House and Senate both wanted to change the law but had clashed on a legal issue in the bill (SB 128).

But with time running out in the legislative sessionFriday, the Senate voted 22-14 with Tallahassee Democrat Bill Montford joining Republicans in support to accept the House proposal.

The move came in exchange for getting the House to accept the Senate's more far-reaching language on a separate measure (SB 436) dealing with religious expression in public schools.

I thought that it was a reasonable resolution to both matters, and they're both constitutional issues, said Sen. Rob Bradley, a Fleming Island Republican who sponsored the stand your ground bill. And we wrapped it all up in a bow, and we resolved them both in a satisfactory manner.

The overall issue stems from a Florida Supreme Court ruling in 2015 that said defendants have the burden of proof to show they should be shielded from prosecution under the "stand your ground" law.

In "stand your ground" cases, pretrial evidentiary hearings are held to determine whether defendants should be immune from prosecution.

While the House and Senate broadly supported the idea of shifting the burden of proof from defendants to prosecutors in the pre-trial hearings, they differed on a legal standard.

The House proposal said prosecutors in pre-trial stand your ground hearings would have to overcome the asserted immunity sought by defendants through "clear and convincing evidence." The Senate fought for a higher standard of proof, known as "beyond a reasonable doubt.

The two chambers needed to reach agreement byFriday, the final scheduled day of the annual legislative session. Lawmakers will meet againMondayto vote on budget-related issues but will not take up other matters.

In the end, , the Senate agreed to go along with the clear and convincing evidence standard.

Proponents of the bill, which had support from groups such as the National Rifle Association, said shifting the burden of proof would better protect the rights of defendants. But critics argued, in part, that the change would lead to cases ending before all the facts are revealed.

Sen. Jose Javier Rodriguez, D-Miami, saidFridaythe House version didn't alleviate his concerns about the bill.

If you talk to prosecutors, they're already gearing up just in case we pass this bill to expend significant amount of resources, in literally every single case where there is violent activity, where they (defendants) can raise this at the pre-trial stage and force the prosecutors to basically put on a trial at the pre-trial stage, Rodriguez said.

View post:
`Stand Your Ground' Change Heads To Governor - WLRN

Time for software-based networking to free up network managers – TechTarget

Network managers have groaned for years that their high-priced technical people are chained to mundane tasks required to manually configure and manage switches, routers and other network components.

Enter a new era where software and automation take center stage.

While the industry has promised change through software-based networking for many years, 2017 just may be the year it finally happens on a broader scale.

Gartner networking research vice president Andrew Lerner said software's ascendancy should come as no surprise. Network switches have always been packed with software -- it's just that the industry grew comfortable viewing its products as hardware.

The big sticking point for years was that too much of the work configuring network components was manual and time-consuming, a cumbersome process that called for software-based networking innovation.

"What we're seeing now is a move away from manual and noncentralized networking to a more automated and centralized network management," Lerner said. "And the automation and centralization of policies is just much better done in software."

In the past, networking shops have spent 80% of their time just keeping the lights on. Seth Pricesenior network engineer, Durham County, N.C.

Automating tasks and allowing IT staffers to be more productive were among the prime reasons why Durham County, N.C., moved to exploit the software that underpins Cisco's Application Centric Infrastructure (ACI). The government agency is in the midst of a network infrastructure upgrade that will enable it to rely far more on software and automation and less on manual configuration.

In the past, networking shops have spent 80% of their time just "keeping the lights on," said Seth Price, the county's senior network engineer. By deploying Cisco's Application Policy Infrastructure Controller (APIC) and Cisco's enterprise module, APIC-EM, Price said the county's IT staff can reverse the equation and spend 80% of its time on innovation.

The county plans to use APIC to not only automate data center router and switch configurations, but to use APIC-EM -- in conjunction with Cisco Stealthwatch and Identity Services Engine (ISE) -- to create a proactive security posture where malware can be automatically detected, contained and remediated.

Durham County began rolling out APIC last July and recently got to the point where the controller software is fully up and running. Now, the county is focusing on getting APIC-EM deployed, which Price said should pay huge dividends because the software will be used across 40 county facilities connected to the enterprise network.

Here's what Price envisions after integrating APIC-EM with Stealthwatch and ISE: In the event that malware is detected on an endpoint device, Stealthwatch will automatically connect to Cisco ISE, which stores all of the county's network policies. ISE will notify both APIC and APIC-EM that the device in question can only talk to a remediation server. If the malware can be removed, the device would be allowed back on the network. If it can't, the software automatically reimages the device.

"If I had to do all of that by hand, the damage would be done and the bad guys would be long gone," Price said. "Here in Durham County, we have a small staff. I'm in charge of the network, but I'm also responsible for security. We need technologies that will help us do more with less or with the same amount of people."

APIC-EM also has a feature that lets network managers automatically assign bandwidth policies.

Price said the feature, EasyQoS (Easy Quality of Service), eliminates nearly all the manual configuration tasks required to manage bandwidth. He said when a top manager or the CIO has an important video conference, for example, he uses EasyQoS to give full priority to the video conference for the duration of the presentation.

"Once the call is over, the system automatically removes that QoS policy," Price said. "This serves an important function for network managers because, in the past, a lot of policies would be built, and people would forget to take them down."

Now, our network engineers can spend more of their time doing other projects with new technologies. Brian McEvoysenior global network engineer, Symantec

At Symantec, two Cisco applications -- APIC-EM and EasyQoS -- allowed the company to streamline policy updates throughout its offices worldwide, said Brian McEvoy, senior global network engineer. In the past, before Symantec deployed the software, two engineers would work for six months to hand-configure policy updates for about 100 company offices, a task that resulted in about $200,000 in execution update costs alone.

Symantec is also using software to set policies for its IWAN, or Intelligent WAN, wide area network infrastructure rather than manual coding.

"This technology totally transforms the IT operation," McEvoy said. "Now, our network engineers can spend more of their time doing other projects with new technologies."

Software-based networking can transform organizations in ways management would never have thought possible.

J. Todd Watkins, director of technology and innovation at Eufaula City Schools in Eufaula, Ala., said once officials deployed a new wireless system based on Extreme Networks' wireless access points, management software and analytics engine at the district's middle school, technology usage skyrocketed.

"When teachers have zero confidence in the technology, they won't use it," Watkins said, explaining that the old network had poor connectivity and required manual configuration. "Now, confidence in our new learning management system at the middle school is way up."

Extreme's Management Center software lets the district automate policy updates. Now, every new request for service can be addressed more quickly, and the district can prioritize bandwidth based on its needs.

"When the district runs standardized tests, we can change the class of service to a higher level of priority for that day," Watkins said. "We also have visibility we didn't have in the past. If a wireless client can't get on the network, it will tell us if it's the access point, the switch or an uplink port that's the problem."

Plans are in the works to add Extreme's technology to the high school and the district's two elementary schools this summer.

Change automation is altering face of networking

Exploiting software to automate tasks

Using DevOps for network testing

Go here to see the original:
Time for software-based networking to free up network managers - TechTarget

Nonprofits needing free help with their websites, web-based applications and software solutions are invited to … – Akronist

Application deadline is May 15

Nonprofits needing free help with their websites, web-based applications and software solutions are invited to apply to the Eighth Annual Cleveland GiveCamp.

GiveCamp is a weekend-long event July 21 through 23 that pairs technology talent with area nonprofits. Over the course of a weekend, technology professionals, developers, designers, database administrators, marketing professionals and others donate their time to help area nonprofit organizations with a wide range of projects, including developing websites, mobile apps and more.

A list of requirements and online application may be found at http://www.clevelandgivecamp.org/nonprofits. Deadline is May 15.

Nonprofits must provide proof of their 501(c)(3) status (IRS Determination letter), upload a copy of their most recent IRS Form 990 and have representatives present the weekend of the event. For more info, email info@clevelandgivecamp.org.

GiveCamp is an international initiative started in 2007 to bring together technology talent to help local nonprofits in need. Cleveland GiveCamp is one of the largest events in the country. Since its inception, our local our volunteers have donated nearly $4 million of free development work to more than 250 regional nonprofits.

See the rest here:
Nonprofits needing free help with their websites, web-based applications and software solutions are invited to ... - Akronist

Free downloads: white papers on embedded software and security – Elektor (blog)

May 3, 2017 | 09:00

In close cooperation with PRQA, Elektor is offering a free download of three high-quality papers on how to create secure embedded software. After registration, all three papers become available as a PDF file.

Headquartered in the UK, PRQA has offices in the United States and customers across the globe.PRQA has pioneered software coding governance for critical software applications in industries ranging from the automotive to aerospace, from transport to finance, and from medical devices to energy. PRQA promotes safe coding practices and wants to ensure the highest quality code for safety-critical and mission-critical systems. As such, the company recently published three white papers. All three of them focus on the combination of embedded software and security. Developing Secure Embedded Software - Quality Doesnt Equal Security Most organizations put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that is inherently insecure; and quality assurance does little to ensure security. Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards Many embedded systems and connected IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices. Using Static Analysis to Overcome the Challenges of Reusing Code for Embedded Software This paper explains why software reuseis a growing problem within development organizations, why the way embedded software is developed needs to change and what organizations can do to improve reliability, safety, and security while reducing development time. Anyone interested in these white papers can register here.

See the original post here:
Free downloads: white papers on embedded software and security - Elektor (blog)

Free software to reveal how Facebook election posts are targeted – The Guardian

The Chrome extension allows voters to track how the main parties insert political messages into their Facebook feeds. Photograph: Alamy Stock Photo

A tool exposing how voters are targeted with tailored propaganda on Facebook has been launched in response to what is likely to be the most extensive social media campaign in general election history.

Experts in digital campaigning, including an adviser to Labour in 2015, have designed a program to allow voters to shine a light into what they describe as a dark, unregulated corner of our political campaigns.

The free software, called Who Targets Me?, can be added to a Google Chrome browser and will allow voters to track how the main parties insert political messages into their Facebook feeds calibrated to appeal on the basis of personal information they have already made public online.

It aims to show who campaigns are targeting, how much the parties are spending and will shed light on whether targeted adverts are crossing the boundary into fake news. The creators hope thousands of people will sign up.

It comes as both Conservatives and Labour plan extensive Facebook campaigns ahead of the 8 June poll. The Conservatives have rehired Craig Elder and Tom Edmonds, the digital consultants who worked on the 2015 election battle, in which the party spent 1.2m spent on digital campaigning, against Labours 160,000. This time, Labour is understood to be ready to spend around 1m.

Elder and Edmonds last year worked for Britain Stronger In Europe, the designated remain campaign in the EU referendum. In one instance, they targeted Facebook users who had expressed strong support for a Premier League team through likes with a post about the impact on their side of foreign players needing visas in the event of Brexit. People who had mentioned they liked surfing would receive a message about the value of EU regulations on beach pollution.

Andrew Gwynne MP, Labours campaign co-ordinator, has said targeted Facebook advertising will have a significant impact on the election. Labour will use a new system called Promote to identify specific people in a constituency at whom candidates will be able to target a message.

For the good of our democracy, its time to throw some light on this dark and unregulated area of campaign spending, said Sam Jeffers, who has helped to devise the software, which is available as a browser extension.

Facebook advertising is highly targeted and tailored to the recipient, battle-tested for effectiveness, yet invisible to anyone but the end user. There are no spending limits on digital ads, despite strict legal controls in other areas of campaign expenditure. It gives big money a strong voice in our elections.

The Electoral Commission, which regulates campaign spending, told the Guardian it would be carefully considering the use of social media over the coming six weeks. Even after 2015 it has expanded so much, a spokesman said. We want to make clear how greater clarity can be provided to voters.

Instead of parties simply declaring an overall amount spent on Facebook, it wants them to provide details on dates and topics covered in adverts.

Political Facebook ads emerged as a key tactic during the 2016 EU referendum. The official Vote Leave campaign pumped out about 1bn targeted digital adverts, mostly via Facebook. Vote Leaves campaign director, Dominic Cummings, has claimed it spent 98% of its 6.8m budget on digital.

It remains unclear how Arron Banks, the millionaire backer of the Leave.EU campaign, may deploy his social media team, which is based in his Bristol insurance company HQ and was schooled in political campaigning with guidance from Cambridge Analytica, a Washington-based firm partly owned by Donald Trump donor Robert Mercer.

Leave.EU is currently under investigation by the Electoral Commission over Elder and Edmondss roles and over whether it received any impermissible donations and whether its spending return was complete. Banks has denied breaching any electoral law.

We can use this information to help people understand why theyre seeing specific messages, said Jeffers. We might also be able to use the data to work out whether campaigns are operating within the law. For example, are they respecting national v constituency spending limits? Are they discriminating against a particular group of the population?

The Electoral Commission said that if a post promotes a candidate it must be accounted as constituency spending, which typically has a 15,000 limit. If it deals with broad party policy, it should be accounted nationally.

This was not as sophisticated as the psychographic techniques claimed by Cambridge Analytica. Its British chief executive, Alexander Nix, has said it gathers voters social media data and ranks them according to openness, conscientiousness, extroversion, agreeableness (including whether you put others needs and society ahead of yourself) and neuroticism.

In a conference presentation, Nix gave the example of a campaign supporting the right to gun ownership: For a highly neurotic and conscientious audience you are going to need a message that is rational and fear-based, he said. That could lead to an image of a burglars hand smashing a window and a slogan about the second amendment being an insurance policy. For a closed and agreeable audience that cares about family and tradition, the slogan might be: From father to son, since the birth of our nation would work better.

Read more here:
Free software to reveal how Facebook election posts are targeted - The Guardian