Open Source Code – Perseus Project

Background and Purpose

In the earliest stages of the transition from a CD-Rom-based collection to the WWW site, it was clear that the nature and scope of the Perseus resource demanded a flexible, extensible, and powerful data management system. Written mostly in Perl, the production version of the on-line Perseus text management system evolved and grew over eight years, becoming a uniquely powerful platform, capable of ingesting heterogeneous source materials and performing a range of automatic services. With few precedents and examples to follow, however, the code behind this system reflected organic growth and experimentation, and became difficult to sustain, share, and modify. While all versions of the Perseus Digital Library system were designed to be open-source (third parties did make use of the HyperTalk, Tcl/TK and Perl code), each of the previous incarnations of Perseus were complex and difficult to document, which presented obstacles to new avenues of collaborative research and development.

As digital library systems matured in the early 00's, the project sought third party solutions for delivering resources. At the time, most digital libraries concentrated on locating objects and then left it to the users to make sense of what they had found. In contrast, Perseus had increasingly focused on giving users the tools to understand what the digital library gave them: the project depended upon a range of automatic linking, information extraction and visualization services that existing, largely catalog-oriented systems could not support. The project chose to build a new digital library system, designing it from the start to be interoperable, modular, and open-source.

Open-Source Services

The Perseus Hopper is an open-source project providing a suite of services for interacting with textual collections. While as a whole it provides an integrated reading environment, its individual services are designed to be modular and can be grouped into three different classes.

Linguistic support: The Hopper itself is language independent, but the code includes native support for Greek, Latin and Arabic. Given a source text in any one of those three languages (either a text bundled with the code release or a TEI-compliant XML text of the user's own), it provides services for automatic lemmatization (linking inflected word forms to the dictionary entries from which they're derived) and morphological analysis (identifying, for instance, that the Latin word amor is a singular masculine nominative noun). At a broader level, it also enables corpus research by automatically generating word and lemma frequency information for the entire collection of texts supplied to it.

Contextualized reading: Since the Hopper is the underlying code base for the Perseus Digital Library, it reflects that same emphasis on being an integrated reading environment: much of its power derives not simply from isolated textual services, but in the knowledge that emerges from the interaction of texts themselves. Users can take advantage of this contextualization with the Greco-Roman and Arabic texts provided, or specify themselves the higher-level relationship between their own texts (e.g., that document X is a translation of document Y) in order to create a reading environment where passages in a source text are accompanied by secondary resources such as translations and commentaries. Contextualized reading also intersects with linguistic support -- since dictionaries are also supported as "secondary" resources, a reader can find not simply what dictionary entry a word in a source text is derived from, but also a definition of what that word means. The library environment also includes an architecture for soliciting user contributions in the form of "voting" -- this is implemented online in the Perseus Digital Library in the form of user votes for morphological forms, but can be extended as well to accommodate other varieties of annotation.

Searching: Users can not only read passages from texts, but use a suite of search tools to find what they are looking for, in any of the languages the Hopper supports. These search tools include word and phrase searches, in individual texts or collections. These searches include the option to search all possible inflections of a word, making them extremely powerful for morphologically rich languages like Greek, Latin and Arabic (e.g., a lemmatized search for the root form sum would also find documents containing the inflected forms est and sunt). For Classical texts, which have a well-adopted citation scheme, users can navigate a text by typing canonical abbreviations (e.g., Thuc. 1.24). The Hopper also provides functionality to search and browse the tagged named entities (places, people, dates, and date ranges) in a corpus, and includes an architecture for presenting archaeological artifact and image data, which is separate from the reading environment.

Extensibility

The code base itself invites two varieties of extensibility. On the one hand, while the code is bundled with a collection of Greco-Roman and Arabic texts around which it has grown, users are able to include their own TEI-compliant XML texts as part of the reading environment and enable the same services for those texts as those that are available online for Perseus' open-source editions. As an API, the Perseus hopper also includes a number of Java classes for interacting with texts outside of a reading environment -- one can, for instance, use the linguistic services such as automatic lemmatization or morphological analysis as standalone tools for analyzing not simply the bundled Perseus texts, but any text of their own as well.

On the other hand, the Java code itself is also designed with modularity and extensibility in mind. An example of this is the variety of classes (all ultimately inherited from CorpusProcessor) to cycle through an entire collection of texts and perform some operation on each one. The workflow to build the library environment relies on these classes to calculate word and lemma statistics for the corpus at large, to map citations between texts, and to index them all in order to make them searchable later. These classes are easily extensible for any task that requires iterating through an entire collection of texts. The hopper source code also includes a number of services for managing named entities such as people and places, and has served as the foundation for visualization projects, plotting that data both geographically on a map and historically on a timeline. In terms of modularity, the hopper also includes a number of low-level classes for manipulating text -- from finding all possible lemmas for a given Latin form to delimiting an accented Greek word.

The rest is here:

Open Source Code - Perseus Project

Google Expands Bug Bounties to Its Open Source Projects – DARKReading

Google plans topay out cash rewards for information on vulnerabilities discovered in any of its open source projects as part of anongoing effort to improve the security of open source code.

The newOpen Source Software Vulnerability Rewards Program (OSS VRP), which extends Google's existing Vulnerability Rewards Program, was announced in a blog post published today.

Google will payresearchers up to $31,337 for information on vulnerabilities in open source software projects particularly those managed by Google that impact the firm's software and services. Google's goal is to secure its own software supply chain, but because many non-Google developers use the company's open source software such as the Go programming language and Angular Web framework the initiative promises to help secure the wider open source ecosystem as well.

At first, Google will focus on the most widely used and critical projects, says Francis Perron, open source security technical program manager at Google.

"We want to offer a high-quality bug-hunting experience, so we picked projects which had enough maturity in their response and their processes to test this program," he says. "Broadening the scope will happen after we compile enough data internally, and make sure we can scale up without harming the projects, and the researchers."

Securing the software supply chain has become a major effort of technology firms and the policymakers. In January, the Biden administration met with technology companies and open source organizations to find ways to promote secure coding, find more vulnerabilities, and speed patching of open source projects.

Last year, Google pledged to spend $10 billion over five years, supporting efforts by the OpenSSF, adding a cybersecurity advisory group, and bolstering its Invisible Security zero trust initiative.

"Governments and businesses are at a watershed moment in addressing cybersecurity," Kent Walker, president of global affairs for Google and its parent company Alphabet, said in the 2021 announcement of the company's $10 billion pledge. "Cyberattacks are increasingly endangering valuable data and critical infrastructure. While we welcome increased measures to reinforce cybersecurity, governments and companies are both facing key challenges."

Over the past decade, Google has paid out more than $38 million in rewards to researchers who have submitted 13,000 vulnerabilities to the company, as part of its Vulnerability Rewards Program.

Google has already offered bounties for bugs in its Chrome browser and the Android mobile operating system, both of whose base code are managed as open source projects. The company paid out $2.9 million to 119 researchers for their reports of vulnerabilities in Android, with the highest reward hitting $157,000. Similarly, the company paid $3.3 million to 115 researchers for finding bugs in Chrome in 2021.

With its Open Source Software Vulnerability Rewards Program (OSS VRP), Google is creating a standard framework to reward researchers who find issues in the open source software projects maintained by the company.

Google will allow submissions for "[a]ll up-to-date versions of open source software (including repository settings) stored in the public repositories of Google-owned GitHub organizations," the company stated in its blog post. In addition, the company has focused on rewards for several critical projects, including the Go programming language, the Angular Web framework, and its nascent operating system for connected devices, Fuchsia.

The company currently asks for submissions of vulnerabilities that affect the supply chain, design issues that could result in vulnerabilities in Google's products, and security weaknesses such as compromised credentials, weak passwords, or insecure installation configurations. As part of its focus on the supply chain, the company will reward researchers who submit vulnerabilities to third-party open source projects on which Google's software depends.

"This program focuses on Google-produced open source projects, and the proposed short list of flagship projects listed includes projects also driven by Google," says Google's Perron. "The rules also include the 'Standard' tier, which does incorporate a vast amount of projects."

The company plans to pay researchers anywhere from $100 to $31,337 a special number because it spells out "eleet," or elite, in hackerspeak with the higher payouts going to more severe, or more creative, vulnerabilities.

With the additional bounty programs, some vulnerabilities rewards may overlap with other programs. Google pledged to work with researchers to submit their vulnerability reports to the right programs to maximize their payout, the company said.

Go here to see the original:

Google Expands Bug Bounties to Its Open Source Projects - DARKReading

F-22 test demonstrates first use of third-party software on fifth-gen fighter – Flightglobal

For the first time, a fifth-generation combat aircraft has flight-tested onboard software originating from a third-party developer.

The US Air Force (USAF) Air Combat Command (ACC) said on 29 August that test pilots and engineers achieved the milestone on a Lockheed Martin F-22 Raptor.

The USAF describes the moment as ushering in a new era in Department of Defense software capability development.

The flight, from Edwards AFB in California, represents the first ever instance of third-party software running on an advanced, fifth-generation fighter, and the first in-flight use of open-source container orchestration software on any fighter aircraft, the USAF says.

Open-source refers to software in which the original source code is made available for distribution and modification. In practice, it allows third-party developers to create new applications for the original platform.

Due to security concerns and the highly-technical nature of their operations, the USAF notes, fifth-generation fighters have historically been unavailable for third-party software integration.

However, the Pentagon in recent years undertook a broad effort to open its long-life-cycle platforms, such as aircraft, to third-party developers a concept known as a modular open systems approach (MOSA).

The initiative will require thousands of systems acquired by the sprawling Department of Defenseprocurement system to better work together and be more flexible. A major goal behind MOSA is to enable cheap and rapid integration of new systems to existing platforms. Such a capability is viewed as vital in potential future conflicts.

The US Army has also made MOSA a priority in its Future Vertical Lift initiative to develop the services next generation of helicopters.

The goal of the open-source push is to rapidly discover and iterate on combat capabilities and stay relevant with cutting-edge technology, and affordablyaccelerate change in delivering combat air force capabilities as an enterprise, says General Mark Kelly of the ACC.

The USAF team used an open-source architecture known as Open Systems Enclave (OSE), which allowed the combining of government-owned software with existing hardware already aboard F-22s.

This breakthrough fundamentally changes how we can deliver combat capability to the warfighter, says Major Allen Black, F-22 test pilot and project co-lead.

The USAF says the feat demonstrates thatnew technologies can be integrated with existing platforms inless than 60 days.

Weve proven the ability to rapidly evaluate and integrate next-generation technologies developed by experts in government, industry and academia at a lower cost with software portability across defence platforms, Black says.

The USAF has now issued a formal requirement for the establishment of OSE on its F-22s.

Broadly, the service describes the open-source initiative as transforming its software development and acquisition strategy, enabling a future where apps are rapidly developed, matured and delivered to the warfighter at the push of a button.

Read more:

F-22 test demonstrates first use of third-party software on fifth-gen fighter - Flightglobal

How to Find the Best Nmap Scan for Penetration Testing Initiatives – EC-Council

Setting up a pentesting Nmap is easy since this tool works on a wide range of operating systems and is easily customized to meet the specific needs of any environment. Still, if you have never used such a tool before, exploring its functionality is important to get the most out of it.

In older versions of the tool, you would need to be comfortable using the command line interface (CLI) to control scans and other functions. However, you can now use Zenmap, an add-on that offers a graphical user interface (GUI) so anyone can use it easily.

However, you decide to interact with the tool, you first need to define the ports you would like it to scan. This does not require a specific list but a range of ports youd like to check. You can also scan all ports on your network, which would take far too long in most environments. Instead, most developers divide known ports into ranges and schedule each group for scanning incrementally.

Aside from defining a range of ports to scan, you should also tell it what information you want it to collect from each port. The depth of a scan can range from limited to deep, collecting basic information like whether or not a port is open or more detailed information, such as what devices, operating systems, and services are interacting with those ports.

Because this tool allows you to discover very in-depth information about ports, including the version of services active on a given port, its a powerful tool for revealing vulnerabilities in your network. Whats important is that you know what youre scanning for to make sure you manage resources wisely and garner valuable information in the process.

Read this article:

How to Find the Best Nmap Scan for Penetration Testing Initiatives - EC-Council

Legal options running out for WikiLeaks founder Julian Assange

Julian Assange has been detained at London's high-security Belmarsh Prison, one of the UK'stoughest detention centers,since 2019. The WikiLeaks founder has long since completed his original 50-week sentencefor skipping bail in 2012. But he has remained in custody ever since, in extremely harsh conditions, in what is essentially detention pending deportation.

British Home Secretary Priti Patel signed the judicial extradition order in June. Assange has one lastchanceto beallowed to appealthe judicial order, to the High Court in London. A ruling is expected next month.If his request is rejectedAssange will be extradited to the United States within four weeks.

If the judges deny her husband the chance to launch another round of appeals, Assange's wife and lawyer, Stella, fears the worst. "Julian's life depends on him winning this," she said, in an interview with DW. "Julian is clinically depressed. If he is extradited, and placed in the type of isolation that the US government says it reserves the right to place him in, then he will commit suicide."

Assange's Australian family are also very worried. Speaking to Sky Australia last week, his father, John Shipton, described Assange's health as "very worrying and becoming dire now."

"His health is in decline," Assange's brother Gabriel confirmed in the same interview. "He's in a very, very precarious situation It really is heartbreaking to see Julian, this gentle genius, in a maximum-security prison alongside the most violent criminals in the United Kingdom."

The family has appealed to the new Australian prime minister, Anthony Albanese, asking him to intercede on behalf of his compatriot. During his election campaign, Albanese had declared, "Enough is enough," indicating that the persecution of the WikiLeaks founder must come to an end.

However, Assange's father and brother have said no progress has been made since the new prime minister took office, and that so far they have been unable to make an appointment with the prime minister to discuss the issue. In a recent public statement, Albanese pointed out that negotiations like these must be conducted quietly and diplomatically, behind the scenes.

According toStella Assange, the High Court must allow further appeals against an earlier decision made by the same court. The principal bone of contention, however, is the formal interpretation of the extradition treaty between the UK and the US.

In the first instance, a district court judge also took the prisoner's state of health into account, and ruled against extradition. The more senior judges, however, did not accept this argument as decisive.

There are other aspects of Assange's case that have been ignored to date, despite the best efforts of his lawyers. For example: the question of whether Assange's right to freedom of expression and the protection of journalistic work ought not, in fact, to prevent extradition. Or whether the US made the request for political reasons.

"Ultimately, once the domestic remedies have been exhausted, he can then appeal to the European Court of Human Rights," said Stella Assange. However, it remains unclear whether the British judges would be prepared to wait for an ECHR ruling.

Assange's two sons, now 3 and 5 years old, have only ever known their father as a prisoner

That's because the British government is set on a collision course with the European Convention on Human Rights. A draft bill submitted to the British Parliament at the end of June proposes to reduce protection for refugees. Instead of going through the asylum process in Britain, migrants would be sent to Rwanda to apply for asylum there. If the Tory hard-liner Liz Truss moves into Downing Street in September, Assange has little hope of a successful political intervention.

Once a week, Stella Assange is allowed to visit her husband in Belmarsh with their children for an hour. The two boys, now 3 and 5 years old, have only ever known their father as a prisoner.

Every family visit resembles an obstacle course even the children are thoroughly searched. "They check inside their mouth, behind their ears, in their hair, under their feet; they have to go through the dogs that sniff them from head to toe, and they understand this is a place where their father is not allowed to leave," said Stella Assange.

Ultimately, though, she said this fight is not just for her husband's life, but forpress freedom in Europe. "Is it permissible for a foreign power to reach into the European space and limit what the press can publish?" she asked. "Think about if China were to do the same thing and prosecute a journalist in Germany on the same principle, because that journalist exposed Chinese crimes."

But an extradition treaty like the one between the UK and the US exists only between friendly nations, where there is in fact trust in each other's democratic justice system. And where, it appears, geopolitical factors weigh heavier than the fate of a single man.

See the rest here:

Legal options running out for WikiLeaks founder Julian Assange

Help Us Stop the Extradition of Julian Assange! – a Community …

Priti Patel approves Assange's Extradition. This is a dark day for Press freedom and for British democracy.

Stella Assange: 'We are going to fight this, we are going to use every appeal avenue. I am going to spend every waking hour fighting for Julian until he is free."

Defence submissions to UK Home Secretary Priti Patel have just been filed, arguing why the US extradition of #Assange must be blocked. A decision is expected from Priti Patel in the coming days.

Priti Patel must now decide whether or not to extradite Assange.UKs Home Secretary Priti Patel must now decide whether or not to approve the extradition. Julian's defence has until May 17th to submit it's arguments to Priti Patel, who will then have 2 weeks to make her decision.

UK Supreme Court refuses permission to appeal in Assange extradition.The case will soon move to UK Home Secretary Priti Patel to decide on the extradition.

WikiLeaks founder Julian Assange is facing a 175-year sentence for publishing truthful information in the public interest.

Julian Assange is currently being detained in UK prison - his third anniversary in Belmarsh is coming 11 April 2021.

For over 7 years, the US government has been fighting to extradite Julian Assange so he can be prosecuted in US courts for publishing their secrets which include evidence of war crimes.

In January this year, Julian Assange lost his appeal at the UK High Courts and it looks more likely than ever that he will be extradited

We cannot let that happen - if Julian Assange is convicted, his prosecution will carry long reaching and troubling consequences for journalism around the world

Your rights are at risk. Assanges right to publish is our right to know. We must stop Julian Assange being extradited to the USA.

Julian Assange is being sought by the current US administration for publishing US government documents which exposed war crimes and human rights abuses. The politically motivated charges represent an unprecedented attack on press freedom and the publics right to know seeking to criminalise basic journalistic activity.

If convicted Julian Assange faces a sentence of 175 years, likely to be spent in extreme isolation.

We cant fight this without your support. Please donate to help us prevent Julian Assanges Extradition to the USA.

---

US charges against Assange pose a huge threat, one that could criminalise the critical work of investigative journalists & their ability to protect their sources.-- The NUJ

The only thing standing between an Assange prosecution and a major threat to global media freedom is Britain. It is urgent that it defend the principles at risk.-- Human Rights Watch

Were Julian Assange to be extradited or subjected to any other transfer to the USA, Britain would be in breach of its obligations under international law. -- Massimo Moratti, Amnesty International

The right of Mr. Assange to personal liberty should be restored -- The UN working group on abritrary detention

Julian Assange shouldnt be the subject of a grand jury hearing, he should be given a medal. Hes contributing to democracy.-- Noam Chomsky, academic and activist

Assange must NEVER be extradited to the USA. Its a serious threat to him personally and freedoms we usually honor, such as press freedom, freedom of expression and FOI. -- Agnes Callamard, Amnesty International

Julian Assanges potential extradition has human rights implications that reach far beyond his individual case. -- Dunja Mijatovi, Commissioner for Human Rights, Council of Europe

The case is a huge scandal and represents the failure of Western rule of law. If Julian Assange is convicted, it will be a death sentence for freedom of the press. -- Nils Melzer, UN Special Rapporteur on Torture; Human Rights Chair, Geneva Academy

Read more:

Help Us Stop the Extradition of Julian Assange! - a Community ...

Web3 Growth Stymied By Scarcity Of Programmers – Forbes

Developer shortage stands in the way of decentralized, blockchain-centric internet bliss.

Advocates of Web3, a catch-all term widely used to incorporate concepts of decentralized networks, cryptocurrencies and other blockchain-powered applications, have a grand vision for the future of the Internet and global finance.

One thing that stands in the way: a lack of people to make it happen.

At the end of last year, when bitcoin and a handful of other cryptocurrencies reached their highest values, about 18,500 developers each month were contributing to open-source Web3 projects, according to a report published by crypto-focused investment firm Electric Capital.

Electric Capital

That number is at an all-time high and growing faster than everwith roughly 60% of Web3 developers entering the industry in 2021writes Electric Capital partner Maria Shen, but it is a speck of the global total of software engineers, which stood at 31.1 million in the first quarter of 2022, according to developer analytics company SlashData.

Facebook, Amazon.com and Googlethe largest companies of todays internet, dubbed Web2 by cryptophiles, have over 20,000 software developers each, according to various estimates. But theyre outnumbered by the staff at companies like JPMorgan and Citigroup, both of which say they employ over 30,000 on projects for their financial-services businesses.

Crypto insiders might shrug at this juxtaposition, replying we are still earlyone of the industrys favorite refrainsbut some see this chasm as a major impediment to the realization of Web3s promises.

When Citigroup reportedly employs 30,000 developers, but there are only several thousand active monthly blockchain developers, this developer gap feels insurmountable, says Jay McCarthy, cofounder and chief technology officer at blockchain development firm Reach.

"Blockchain has extreme potential, but if we dont get more developers building out their dreams, that potential will never be realized," echoes Chris Swenor, CEO of Reach and McCarthys cofounder.

They identified a high barrier to entry as a primary reason for the shortage. Not only does blockchain development often require knowledge of specialized programming languages like Solidity or Rust, used for implementing smart contracts on Ethereum and Solana, but fundamentally it's a brand new technology that requires behavioral change, says Swenor.

He and McCarthy founded Reach in 2019, out of their Boston homes, for that very reason. The company, backed by creators of the Algorand blockchain, provides developers with a toolkit that helps them cut up to 85% of costs and time spent on the development of applications including decentralized autonomous organizations (DAOs) and nonfungible tokens (NFTs), two key building blocks for most visions of Web3. We are trying to lower that barrier and simultaneously increase the ceiling of what is possible because people are willing to have more ambition and try to take on more if they have the support, McCarthy explains.

At a first glance, the gap between the demand and supply of programmers needed for an internet overhaul is apparent. Its hardly possible to name a Web3 or blockchain company that is not actively seeking developers. Just last month, popular employment website Indeed listed over 600 software engineer, software architect, full-stack and back-end developer jobs that had the words cryptocurrency, blockchain, bitcoin and ethereum in their descriptions. TrueUp, the tech jobs analytics platform, estimated 9,715 open crypto jobs at the beginning of summera third of them for software-engineering positions.

However, blockchain heavy hitters say they are faced with a different set of challenges.

Protocol Labs, an open-source research and development laboratory known for decentralized data storage projects such as InterPlanetary File System and Filecoin, is looking to hire about 50 software engineers but is not short on applicants, according to Dietrich Ayala, its ecosystem lead of browsers and platforms.

I think a better question would be, is there actually a shortage of developers or is there a shortage of developers who are able to think about what the next generation of internet will look like? And that's a more challenging task from a recruiting standpoint, says Ayala, who had previously spent over a decade at web pioneer Mozilla.

The mindset is especially important for companies working on the core technology of Web3blockchains that underpin applications like NFTs and decentralized marketplaces. Theres definitely a shortage of developers in general, according to John Wu, president of Ava Labs, the New York-based creator of the Avalanche blockchain, but we have to consider quality. The space is growing so fast, things are changing so quickly. What developers are doing today may not be what we need them to do six months from now.

Competitors agree. If you throw 100 engineers at a project versus 10, it doesn't mean that the project is going to grow 10 times faster, says Austin Federa, head of communications at Solana Labs, the company behind the Solana blockchain. Some Web3 organizations have the financial backing to scale to a thousand people if they wanted to, but we don't hire a ton of developers just because we can, he states. In Web3, people hire more developers when they have new problems for them to solve.

Backed by the likes of billionaire Sam Bankman-Fried, venture capitalists Andreessen Horowitz and algorithmic investor Jump Trading, the 70-person company lacks neither resources nor developer interest. Solanas flagship Hacker Housessix-day gatherings for developers building blockchain-based applicationshave attracted more than 11,000 attendees in 18 cities this year. According to Federa, one of the goals of these events is to help the so-called Web2 developers who are interested in transitioning understand whether they are ready for the challenge. It's seen as riskier to go into Web3, I think, by a lot of developers. It's definitely a less cushy type of job to have.

Declining cryptocurrency prices, multi-billion dollar bankruptcies of some of the most trusted playersincluding Singapore-based hedge fund Three Arrows Capital and crypto brokerage Voyager Digitaland a wave of layoffs at established crypto firms, among them exchanges Coinbase and Gemini, have only added to the industrys woes.

In Ayalas experience of interviewing candidates, their biggest concern often boils down to industry risk: Will crypto as a whole succeed or fail? How bad are the recent levels of currency volatility?

It is no secret that Web3 firms are willing to pay handsome rewards for risk-taking. Crypto startups flush with cash from the latest bull marketa record $25 billion in venture capital funding in 2021, data from CB Insights shows, are offering average annual salaries of $150,000 for junior Solidity developers. The more experienced ones can rake in $400,000 or more, CoinDesk reported, whereas the national salary average for software engineers is roughly $97,000, according to Glassdoor. You will see salaries that make Web2 salaries look low, quite frankly, agrees Federa.

More than 60% of those working in Web3 take at least part of their salary in cryptocurrencies, according to a report by crypto tracking platform CoinMarketCap. Those already-hefty sums could quickly turn into fortunes with the next big price rally but can just as easily dissipate in a market downturn.

The good news is that the industry has historically managed to retain workers even through bear markets. Electric Capital estimates the number of monthly active blockchain developers has stayed flat at around 11,000 even as crypto prices fell more than 80% from their peak in 2018-2019.

But corporations like Google, Microsoft and Amazon are increasingly competing for the same talent pool: 81 of the top 100 public companies were using blockchain technology in the fall of 2021, according to Blockcdata. Among Forbes Blockchain 50 lists latest members, billion-dollar enterprises seriously implementing the technology, are Depository Trust & Clearing Corporation, the largest post-trade services organization in the world, auction house Sothebys, Boeing and Walmart, to name a few.

Ava Labs Wu is optimistic: not every Web2 company has figured out how Web3 can help them, he says. Recent news may have slightly decreased the inflow of new developers to Web3, but whoever has made the decision to come over, I dont really see them going back.

Link:
Web3 Growth Stymied By Scarcity Of Programmers - Forbes

Older adults are the target audience as museums add art programming – NOLA.com

It took nine decades, but Raymond Lewis finally got to step out on Mardi Gras Day with Black Masking Indians.

"Never in my lifetime," he said, "I didn't think I would be dressing with an Indian group."

But not only did Lewis get an invitation from Big Chief Darryl Montana to mask with the Yellow Pocahontas Hunters, Montana also taught him to sew his own suit thanks to a program at the Louisiana State Museum, which offers area seniors the chance to take weekslong classes taught by a local artist.

"I enjoyed it, really. It was very exciting," Lewis said. "It was beautiful. I enjoyed the whole business."

The program, which was made possible by a grant from the E.A. Michelson Foundation, empowers local museums to create classes specifically for seniors. When Montana, the beading program instructor, invited the now 93-year-old New Orleanian to step out on Mardi Gras day with his tribe, Lewis accepted but not without a little help. His fellow beading students stepped in, even after the program officially ended, to help Lewis complete his suit.

"It was good socializing with a lot of folks," said Lewis, who's still keeping up with his beading.

Big Chief Darryl Montana, center, and Big Queen Dianne Honor, right, both with the Yellow Pocahontas Indians, get Theodore Brown inspired to dance and sing in front of his classmates during a beading workshop at the Louisiana State Museum Cabildo in the French Quarter of New Orleans on Wednesday, August 17, 2022. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate)

The LSM, which was recently awarded a third year of funding for the program through the Michelson Foundation, has so far seen more than 100 local adults cycle through its classes, many of whom have taken more than one class, said Louisiana State Museum Manager of Education Sara Lowenburg.

"We were really excited about the opportunity to dig deeper into offering programming for older adults," Lowenburg said. "It's an audience that has a lot of connections to museums and also often has a lot of barriers, in terms of access and engagement, and we're excited to explore that."

Now, arts programming for seniors in the New Orleans area will expand, thanks to the New Orleans Museum of Art's own acceptance into the E.A. Michelson Foundation's grant program. It means dozens more adults will have the chance, like Lewis, to learn something new while connecting with their community.

Working on one bead at a time at the Mardi Gras Indian-inspired bead workshop at the Louisiana State Museum Cabildo in the French Quarter of New Orleans on Wednesday, August 17, 2022. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate)

"There's a huge opportunity for museums to really do so much more to open themselves up to older adults and open up those lives of older adults using the amazing collections they have but doing it in a way that lets individuals find creativity," said Theresa Bonner, the executive director of E.A. Michelson Philanthropy, a Minneapolis organization.

And that opportunity is only growing. In Louisiana in 2020, more than 16% of the population was over 65 in 2020. Nationwide, that number is expected to grow to more than 20% by 2030.

Big Chief Darryl Montana of the Yellow Pocahontas Indians helps Anna Compass make bead art at the Louisiana State Museum Cabildo in the French Quarter of New Orleans on Wednesday, August 17, 2022. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate)

"This time of life, when you're older, can last for 50 years. ... It's a long period of time, and that's a big part of why we're hoping these (kinds of programs) can spread," Bonner said. "In public libraries many years ago, there weren't programs for children, and now you can't imagine a public library without children's programs."

The demand for adult arts education in New Orleans is one that Tracy Kennan was familiar with before NOMA was awarded the grant. Kennan, the museum's curator of education, said she's long gotten calls asking for exactly that kind of programming, but has never before been able to really point anyone toward the museum.

Students in a beading class look at their art on a table inside the Louisiana State Museum Cabildo in the French Quarter of New Orleans on Wednesday, August 17, 2022. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate)

"I have often had to say, 'We have this family workshop, or you can look to local universities," but that's often more than what someone is looking for. They don't want a whole semester," Kennan said.

While the LSM programs, which are typically geared toward local cultural practices, like beading, drumming, poetry and printmaking, are ongoing, the classes at NOMA will start later this fall, and Kennan expects them to incorporate lessons from the museum's permanent collection and exhibitions. Though the Michelson grant will support the program for two years, like Lowenburg, she hopes to see them become a local museum staple.

"There are a lot of people out there looking for lifelong learning opportunities, and we want to be a place for lifelong learning," Kennan said. "We want people to look to the museum as a place for that."

See the article here:
Older adults are the target audience as museums add art programming - NOLA.com

Ransomware attackers expand the attack surface. This Week in Ransomware Friday, Sept 2 – IT World Canada

Ransomware continues to grow and expand, both in the number of attackers and the number of potential victims. This week we feature some of the attackers strategies described in recent news items.

Whats next Ransomware in a box? New Agenda Ransomware can be customized for each victim

A new ransomware strain called Agenda, written in Googles open source programming language Go (aka Golang) was detected and reported by researchers at Trend Micro earlier this week. There has been trend towards using newer languages like Go and Rust to create malware, particularly ransomware.

The fact that many of these languages can operate cross platform makes them a much greater threat. Go programs are cross platform and stand alone. They can execute without a Go interpreter on the host system.

In addition, the creators have added a new wrinkle making this new variant easily customizable. This new strain is being sold on the dark web as Ransomware as a Service (RaaS). Qilin, the threat actor that is selling it to its affiliates, claims it will allow them to easily customize, for each victim, the:

Finally, Agenda has a clever detection evasion technique also used in the other ransomware variant REvil. It changes the user password and enables automatic login with the new credentials. This allows the attacker to use safe mode to reboot and control the victims system.

Trend Micro reported that this allowed one attacker to move from reconnaissance to full-fledged attack in only two days. On the first day, the attacker scanned a Citrix server, and on the second day mounted a customized attack.

For more information you can review the original Trend Micro posting.

New Linux ransomware families

Another way that threat actors are expanding the attack surface is by targeting Linux, one of the predominant operating systems used on internet and cloud servers. RaaS offerings are increasing targeting Linux systems.

Although regarded as a very secure operating system, and despite a consistent move to patch vulnerabilities, the large number of Linux offerings used world-wide ensures there are a significant number of vulnerabilities at any given time. Failure to update and patch systems creates a large potential target base.

But software vulnerabilities are not the only area of weakness. Configuration mistakes are often the more likely factor in the breach of a Linux system, according to researchers at Trend Micro.

Remarkably, these include easily remedied issues such as:

To quote Trends report, given the prevalence of Linux, ransomware actors find the operating system to be a very lucrative target.

Ransomware going to the dogs is no joke

As RaaS and customizability become more and more prevalent, theres an increasing ability to target smaller and more specific groups. We are familiar with ransomware attacking health care organizations, but recently the United Veterinary Services Association has written to its members with recommendations to increase ransomware prevention after an attack that hit more than 700 animal health networks around the world.

It is a reminder that no group, regardless of size or type of business, is immune to ransomware.Every organization must communicate the need to have, at a minimum, the basics of ransomware protection in place:

Read more:
Ransomware attackers expand the attack surface. This Week in Ransomware Friday, Sept 2 - IT World Canada

The CW Widens Programming Scope To Include Sitcoms & Procedurals, Begins Testing Outside Studio Deals With The Hatpin Society From EP Rachel Bloom…

EXCLUSIVE: By the time the Nexstar Media Groups long-in-the-works 75% acquisition of the CW finally closed earlier this month, it was the height of pitch season, when broadcast networks buy scripted projects to develop as new series for next season.

Primetime-Panic

Your Complete Guide to Pilots and Straight-to-Series orders

On the morning of the August 15 deal announcement, Nexstar toppers said that, under the new ownership, the CW would be going for broader and cheaper programming, including syndicated fare acquisitions, with the goal to make the network profitable by 2025.

Since then, sources tell Deadline that CW brass have reached out to the creative community, including taking agency meetings, to lay out their buying strategy going forward and tell everyone that the network is open for business.

On the original scripted programming side, in addition to the CWs signature genre shows and teen soaps, which the network intends to keep doing just not as many it plans to broaden its slate by adding procedurals and other older-skewing dramas as well as half-hour comedies including multi-camera sitcoms.

The overall message was: bring us what you wouldve brought to the CW before but also bring us what you wouldnt have brought to us in the past.

This jives with Nexstar brass comments that the demographic focus of the CW will change over time. Indicating that the new owners would be emphasizing the older-skewing linear network vs. digital wherethe vast majority of younger viewers watch CW shows, Nexstar president and COO Tom Carter noted that while the CWs current slate of shows like Riverdale, All American and The Flash target viewers in the 18-34 demographic, the average CW linear viewer is 58 years old.

The networks new programming strategy is looking to embrace these older linear viewers and trying to expand that pool. The network has done that occasionally with specials such as The Waltons holiday movies as well as the the Critics Choice Awards.

On the acquisition side, the CW also is expected to go for broader shows including procedural dramas. (For years, the network has been supplementing its originals with mostly Canadian and UK scripted series.)

The CWs unscripted strategy is not changing; the network had been betting on broad shows such as Penn & Teller: Fool Us and Worlds Funniest Animals, and there will be more of that going forward.

The Hatpin Society & Branching Out Beyond WBTV and CBS Studios

Following Nexstars acquisition, previous 50-50 owners Paramount GlobalandWarner Bros Discovery each retained 12.5%. Their broadcast-focused studios, CBS Studios and Warner Bros TV, respectively, have been the CWs exclusive scripted series suppliers to date.

That will remain in place for the 2022-23 season as the vast majority of programming for it has been spoken for. Beyond that, Nexstar will have the option to extend the partnership with the studios, Cartersaid post-deal close, but noted that the situation is very much in flux. The companys executives have indicated that the CW would be open to outside suppliers going forward.

One of the first projects that will test that new studio strategy is The Hatpin Society, a period drama written and executive produced by Elissa Aron (Humane Treatment) and executive produced by Crazy Ex-Girlfriend co-creator/exec producer and star Rachel Bloom and Dan Gregor. Set in 1909 New York City, it centers on a motley legion of suffragists who fight for equality by day and vigilante justice by night, seeking revolution through any means necessary.

The projectwas sold directly to the network, which plans to develop it in-house before finding a studio partner. That could end up being CBS Studios, which produced Blooms Crazy Ex-Girlfriend, or WBTV, but doesnt have to be a major departure from the business principles on which the CW was founded as it ushers in a new era as an independent.

Inviting third-party studios into the tent will also likely alter the CWs streaming profile; previous seasons of the networks scripted series are currently available primarily on Netflix or HBO Max.

The Hatpin Society joins just a handful of pre-existing sales at the CW in the current development cycle as the network and talent had taken a wait-and-see approach while the Nexstar acquisition was still in progress. Probably the highest-profile one among them, as Deadline reported in June, is Archie Comics drama Jake Chang, from Oanh Ly, Viet Nguyen & Daniel Dae Kims 3AD, which is produced by WBTV. It is part of the CWs core genre efforts and reflects the networks push for on-screen representation over the last several years.

With the CW brass quickly getting out to present their post-acquisition programming strategy just days after the deal officially closed, the buying is expected to accelerate in the coming weeks.

The CWs longtime chairman and CEO Mark Pedowitz, who is remaining at the helm of the network under new owners, has extensive experience overseeing content for broad broadcast audiences, including in his stint as president of main ABC supplier ABC Studios (now ABC Signature).

I think you will always see a decent amount of scripted programming on the network, I think youll see and we already began the transition to more alternative, and we will be bringing more acquired programming, he said in Mayas the Nextstar acquisition was still being finalized. I do hope that we will enter the world of half-hour sitcoms being produced for the network, and I do hope should there be a sale and if there is a sale, that it will open the avenues of other producers and studios to come to us besides Warners and CBS, which means more opportunities.

Comedy had a strong presence on the CW at the time of its 2006 launch, including broad multi-cam sitcom Reba, which went on to have a long afterlife in syndication. Within a couple of years, the network got out of the comedy business.

Reining In Spending

At the time the CW acquisition closed, Nexstar said that to achieve profit, they are planning a significant reduction of spending.

Citing Kagan research, Carter said the CW spends almost twice what the other broadcast networks do on programming, a disparity Nexstar plans to eliminate.

Over time, we will be taking a different approach to our CW programming strategy and will leverage our experience in spending approximately $2 billion a year on programming, attracting and monetizing viewers, and transitioning NewsNation, our national cable news network, from WGN, while maintaining a strict focus on cash flow, he said.

The CW had previously operated at a loss as a network, commissioning a lot of scripted originals that generate value for WBTV and CBS Studios and their parents, Warner Bros Discovery and Paramount Global, respectively as they exploit them downstream, on streaming and/or internationally.

Our approach will be unlike other broadcast network owners, Carter said on August 15. The company would develop its programming without a dual agenda of greenlighting programming with potential to cross over to SVOD.

He projected lower unscripted costs, without elaborating, and said more syndicated shows would likely be added. The CW has recently been programming 13 hours across six nights in primetime.

Read the rest here:
The CW Widens Programming Scope To Include Sitcoms & Procedurals, Begins Testing Outside Studio Deals With The Hatpin Society From EP Rachel Bloom...