ut

Do my Guardian quiz about the Cure!

Clearly one of the best British bands of the last one hundred years, on Friday the Cure are releasing their first new album for 16 years. Regular readers will know that I do the Guardian’s Thursday quiz, but today as...




ut

The Tegan and Sara internet culture and fandom documentary is worth 100 minutes of your time

I didn’t watch this in the cinema, and I had a bit more to say about it than my usual one-line movie review format, so it didn’t fit into my monthly round-up, but I do want to wholeheartedly recommend you...




ut

Cut taxes to make Michigan more attractive

Even blue states are doing it; what’s the matter with this state?




ut

Corporate subsidies are out of control

Trying to entice businesses is expensive and ineffective




ut

What web creators should know about our March 2024 core update and new spam policies

Today we announced the March 2024 core update. This is designed to improve the quality of Search by showing less content that feels like it was made to attract clicks, and more content that people find useful. We also shared that we have new spam policies to better handle the practices that can negatively impact Google's search results. In this post, we'll go into more detail for creators about both the update and the spam policies.




ut

What to know about our August 2024 core update

This post announces the August 2024 core update to Google Search. This update is designed to continue our work to improve the quality of our search results by showing more content that people find genuinely useful and less content that feels like it was made just to perform well on Search.




ut

Learn all about Google Trends with our new YouTube tutorials

This post is about the new Google Trends Tutorials YouTube series. In these videos you'll learn how to use Google Trends to analyze patterns in Google Search and Youtube searches, and use them to create interesting content online.




ut

New Search experiences in South Africa: Badges and refinement chips

We're sharing more information about our new search experiences in South Africa, and how South African platforms can express interest and participate.




ut

Across ? Translating online project on two computers

I have been working with Across for several years, but I never got rid of impression that this CAT tools is very user-unfriendly and bugged. A great limitation is a lack of means for an easy transfer of projects between … Continue reading




ut

General approach to translating Across projects out of Across

If you read my articles regularly, you are already know that I dislike Across. Across is difficult to use, does not offer feature that are readily available in other CAT tools, and rather slows me down during my work instead of … Continue reading




ut

Trados Studio 2017 – Auto propagation not working in review mode

Have you ever reviewed a large file in SDL Trados Studio with numerous repetitions and struggled with confirmed segments not being propagated to the rest of the file? Here is what to do. Imagine you have a big file to … Continue reading




ut

Un nouvel outil de gestion pour les traducteurs

Une fois n’est pas coutume, je publie un billet très bref pour vous informer du récent lancement d’un outil de gestion, conçu par des traducteurs indépendants pour des traducteurs indépendants.

 

Ce logiciel, baptisé LSP.expert, vous permet de suivre vos projets de près grâce à un tableau de bord présentant votre liste de tâches (dates butoirs, statut, temps consacré à chacune, donneur d’ordre et instructions à respecter), de créer des factures (avec différents tarifs et dans différentes devises), de gérer vos relations clients et d’avoir l’œil sur votre chiffre d’affaires.

 

Très abordable pour l’instant (10,50 € H.T./mois pour un abonnement mensuel, 108 € H.T./an), il peut être testé gratuitement pendant un mois. Si vous l’avez déjà essayé et/ou adopté, dites-nous ce que vous en pensez !

 

En attendant un billet plus complet consacré aux outils de gestion développés spécifiquement pour des entreprises de traduction, vous pouvez mener votre propre analyse concurrentielle en testant :

 


À propos de l'auteur

Professionnelle accréditée en commerce international ayant travaillé plusieurs années comme conseillère pour les PME, Gaëlle Gagné est devenue traductrice indépendante en 2005. À la tête de Trëma Translations, elle traduit de l'anglais vers le français et partage ses connaissances en gestion d'entreprise avec ses collègues traducteurs dans un blog intitulé Mes petites affaires.


Et maintenant ?

Partagez



Abonnez-vous au flux

Consultez d'autres articles :

Trousse à outils pour traducteurs indépendants
Bien facturer pour être payé
Rédiger un devis de traduction efficace
Enfin un outil de facturation personnalisable !
5 règles d'or pour fixer ses tarifs de traduction




ut

Linguistic Alchemy to unlock AutoHotkey

In the echoing halls of the Tower of Babel, myriad languages tangled, creating a confusion of tongues and leaving humans estranged.  Fast forward to the present day, professional translators stand as the modern-day heroes, bridging linguistic divides and fostering global connections.  Yet, these linguists often grapple with the technical juggernaut of AutoHotkey scripting. AutoHotkey, an … Continue reading Linguistic Alchemy to unlock AutoHotkey





ut

Time for me to stop commenting about politics and other sensitive topics

I've been cautioned and advised by several good friends that I should take a chill pill on commenting about various political things. Some of the topics I've been quite vocal about are high profile things involving high power people .. and I might be beginning to get noticed by them, which of course is not a good thing!

I get frustrated by political actions that I find to be stupid and I don't hesitate to tell it straight the way I think about it. Obviously every such statement bothers someone else. Its one thing when its irrelevant noise, but if it gets noisy then I'm a troublemaker.

I'm not keen to get to that state.

Its not because I have anything to hide or protect - not in the least. Further I'm not scared off by the PM telling private sector people like me to "go home" or "be exposed" but publicly naming private individuals in parliament is rather over the top IMO. Last thing I want is to get there.

I have an immediate family and an extended family of 500+ in WSO2 that I'm responsible for. I'm taping up my big mouth for their sake.

Instead I will try to blog constructively & informatively whenever time permits.

Similarly I will try to keep my big mouth controlled about US politics too. Its really not my problem to worry about issues there!

I should really kill off my FB account. However I do enjoy getting info about friends and family life events and FB is great for that. So instead I'll stop following everyone except for close friends and family.

Its been fun and I like intense intellectual debate. However, maybe another day - just not now.

(P.S.: No, no one threatened me or forced me to do this. I just don't want to come close to that possibility!)




ut

OAuth2 Introspection with WSO2 ESB and WSO2 Identity Server

The OAuth2 specification defines several parties: the Client, the Resource Owner, the Authorization Server and the Resource Server. Here is the (textual) diagram from the spec:



     +--------+                               +---------------+
     |        |--(A)- Authorization Request ->|   Resource    |
     |        |                               |     Owner     |
     |        |<-(B)-- Authorization Grant ---|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(C)-- Authorization Grant -->| Authorization |
     | Client |                               |     Server    |
     |        |<-(D)----- Access Token -------|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(E)----- Access Token ------>|    Resource   |
     |        |                               |     Server    |
     |        |<-(F)--- Protected Resource ---|               |
     +--------+                               +---------------+

                     Figure 1: Abstract Protocol Flow

One flow that is not defined by the OAuth specification is any flow from the Resource Server to the Authorization server to validate an existing Bearer Token (or other token). 
The spec says:
The interaction between the authorization server and resource server is beyond the scope of this specification.  The authorization server may be the same server as the resource server or a separate entity. A single authorization server may issue access tokens accepted by multiple resource servers.
In many cases the Authorization server offers an API to access this. For example, Google allows you to call a TokenInfo APIto validate tokens. Similarly Facebook offers an API to "debug" a token. The WSO2 Identity Server also offers an API, but (shock and horror) we don't document it yet. The ESB and API manager both utilize this API to validate OAuth2 bearer tokens. The ESB code is of course available, and with a quick look at the code and also the use of TCPMON it didn't take me long to reverse engineer the API. This Gist has a sample HTTP SOAP request against the WSO2 IS to validate a token:
It turns out that the OAuth Working Group at the IETF is working on this and has a draft specification available, using a RESTful service. They call this OAuth Token Introspection. I figured this would be easier (and more pleasant) to call from my Python code, so I knocked up a quick WSO2 ESB API mediation flow to convert from the RESTful API to the existing WSO2 SOAP-based API.
I know that Prabath and the security and identity team at WSO2 will soon add this useful REST API, but in the meantime, here is a quick hack to help you out. Please note you need to hardcode the URL of the IS and the userid/password into the ESB flow. Also I assume if you don't provide a token_type_hint then this is a bearer token. And here is the Gist showing a sample interaction: 




ut

Using OAuth 2.0 with MQTT

I've been thinking about security and privacy for IoT. I would argue that as the IoT grows we are going to need to think about federated and user-directed authorization. In other words, if my device is publishing data, I ought to be able to decide who can use that data. And my identity ought to be something based on my own identity provider.

The latest working draft of the MQTT spec explicitly calls out that one might use OAuth tokens as identifiers in the CONNECT, so I have tried this out using OAuth 2.0 bearer tokens.

In order to do it, I used Mosquitto and mosquitto_pyauth, which is a handy plugin that let's you write your authentication/authorization login in python. As the OAuth provider I used the WSO2 Identity Server.

The plan I had on starting was:
  • Use a web app to go through the bootstrap process to get the bearer token. Encode an OAuth scope that indicates what permissions the token will have:
    • e.g. rw{/topic/#} would allow the client to publish and subscribe to anything in /topic/#
  • Encode the bearer token as the password, with a standard username such as "OAuth Bearer"
  • During the connect validate the token is ok
  • During any pub/sub validate the requested resource against the scope. 
Here is a sequence diagram:


The good news - it works. In order to help, I created a shim in the ESB that offers a nice RESTful OAuth Token Introspection service, and I call that from my Python authentication and authorization logic.

I had to do a few hacks to get it to work.
1) I wanted to use a JSON array to capture the scopes that are allowed. It turns out that there was a problem, so I had to encode the JSON as a Base 64 string. This is just a bug in the OAuth provider I think.
2) I couldn't encode the token as the password, because of the way Mosquitto and mosquitto_pyauth call my code. I ended up passing the token as the username instead. I need to look at the mosquitto auth plugin interface more deeply to see if this is something I can fix or I need help from Mosquitto for.
3) mosquitto_pyauth assumes that if you have a username you must have a password, so I had to pass bogus passwords as well as the token. This is a minor issue.

Overall it works pretty nicely, but there are some wider issues I've come up with that I'll capture in another write-up. I'm pretty pleased as I think this could be used effectively to help control access to MQTT topics in a very cool kind of way. Thanks to Roger Light for Mosquitto and Martin Bachry for mosquitto_pyauth. And of course to the WSO2 Identity Server team for creating a nice easy to use OAuth2 provider, especially Prabath for answering the questions I had.

Here is the pyauth plugin I wrote. Apologies for poor coding, etc - my only excuses are (1) its a prototype and (2) I'm a CTO... do you expect nice code?!
Loading ....




ut

A rose by any other name would smell as sweet, but with no name, maybe not

The famous quotation from Shakespeare is that "a rose by any other name would smell as sweet". But what if the rose had no name. What if every time you talked about it, you had to come up with a description, you know that thing with the pretty pink petals, except sometimes they are red, and sometimes white, but it smells really nice, except some don't really smell and others do. You know the thing with multiple layers of petals except for the wild ones that only have one layer of petals.

Maybe not so sweet.

What about the other way round? You build a really cool system that works effectively and then it turns out that someone has named it? Now that is nice, and yes, your thing suddenly smells sweeter.

I've had this happen a lot. When we first started WSO2 we applied a lot of cool approaches that we learnt from Apache. But they weren't about Open Source, they were about Open Source Development. And when they got names it became easier to explain. One aspect of that is Agile. We all know what Agile means and why its good. Another aspect is Meritocracy. So now I talk about a meritocratic, agile development team and people get me. It helps them to understand why WSO2 is a good thing.

When Sanjiva and I started WSO2 we wanted to get rid of EJBs: we wanted to remove the onion-layers of technology that had built up in middleware and create a simpler, smaller, more effective stack. It turns out we created lean software, and that is what we call it today. We also create orthogonal (or maybe even orthonormal) software. That term isn't so well understood, but if you are a mathematician you will get what we mean.

Why am I suddenly talking about this? Because today, Srinath posted a note letting me know that something else we have been doing for a while has a nice name.

It turns out that the architecture we promote for Big Data analysis, you know, the one where we pipe the data through an event bus, into both real-time complex event processing and also into Cassandra where we apply Hive running on Hadoop to crunch it up and batch analyse it, and then store it either in a traditional SQL database for reports to be generated, or occasionally in different Cassandra NoSQL tables, you know that architecture?

Aha! Its the Lambda Architecture. And yes, its so much easier to explain now its got a nice name. Read more here: http://srinathsview.blogspot.co.uk/2014/03/implementing-bigdata-lambda.html




ut

How to Make More $$ without Really Trying


Have you noticed how different businesses are constantly inventing new ways to nickel and dime their customers? Airlines have first stopped offering free in-flight meals; then introduced a fee for checked-in luggage; they reduced the leg space of their seats and are now charging for "special" (exit row and bulkhead) seats that leave you less cramped at the end of a two-hour flight. At the same time, they tacked a host of fees to their ticket prices, so that now the amount of these fees (and government taxes) exceeds the nominal price of the ticket itself.

Other businesses are not bashful either in inventing sneaky ways to separate you from your money. A carton of orange juice, which used to contain half a gallon (64 oz) of juice now contains only 59 oz. A can of coffee, which at one time contained a pound (16 oz) now contains 12, 11, or 10.5 oz. And don't expect the price to go down for these shrinking quantities of products.
Gas stations are now adding a separate fee, in addition to their already sky-high prices, for credit card payments.

Some physicians are charging thousands of dollars in yearly fees just to keep you as a patient (no specific service included). The list may go on and on. Many of these and other businesses count on their customers being stupid or at least not paying attention to what they are being charged for and how much they are getting. Of course, they're also trying to compensate for their own rising costs (in part due to similar tactics by other businesses) and shrinking revenues due to the recession.
So, why don't we, translators, get imaginative and enhance our incomes by adding a few items to our rates? I envision my future bill to my clients to look something like this:
Translation
50.00
Availability fee
2.50
Keyboarding fee
3.00
Administrative fee
2.00
Billing fee
1.50
Software usage fee
1.75
Hardware usage fee
1.80
e-mailing fee
1.65
Alertness fee*
1.60
Innovation fee **
2.50
Bundling fee***
  2.00
Total payable
70.30

* That's for the espresso to keep me awake while I'm translating.
** That's for inventing all these possible and impossible fees.
*** Let them figure out what this means (you can use any random word from the dictionary here).

Feel free to add your own bright ideas to this list.

Thanks to witty Gabe Bokor from Translation Journal Blog.




ut

Guillaume Kasbarian félicite Elon Musk tout juste nommé ministre par Trump, la gauche s’insurge

Apres la nomination d'Elon Musk a la tete d'un ministere de l'Efficacite gouvernementale, le ministre de la Fonction publique francais a exprime sa << hate >> de << partager les meilleures pratiques >>.




ut

Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes

This paper systematically discusses the security and privacy concerns for e-learning systems. A five-layer architecture of e-learning system is proposed. The security and privacy concerns are addressed respectively for five layers. This paper further examines the relationship among the security and privacy policy, the available security and privacy technology, and the degree of e-learning privacy and security. The digital identity attributes are introduced to e-learning portable devices to enhance the security and privacy of e-learning systems. This will provide significant contributions to the knowledge of e-learning security and privacy research communities and will generate more research interests.




ut

Modeling Quality Attributes with Aspect-Oriented Architectural Templates

The quality attributes of a software system are, to a large extent, determined by the decisions taken early in the development process. Best practices in software engineering recommend the identification of important quality attributes during the requirements elicitation process, and the specification of software architectures to satisfy these requirements. Over the years the software engineering community has studied the relationship between quality attributes and the use of particular architectural styles and patterns. In this paper we study the relationship between quality attributes and Aspect-Oriented Software Architectures - which apply the principles of Aspect-Oriented Software Development (AOSD) at the architectural level. AOSD focuses on identifying, modeling and composing crosscutting concerns - i.e. concerns that are tangled and/or scattered with other concerns of the application. In this paper we propose to use AO-ADL, an aspect-oriented architectural description language, to specify quality attributes by means of parameterizable, and thus reusable, architectural patterns. We particularly focus on quality attributes that: (1) have major implications on software functionality, requiring the incorporation of explicit functionality at the architectural level; (2) are complex enough as to be modeled by a set of related concerns and the compositions among them, and (3) crosscut domain specific functionality and are related to more than one component in the architecture. We illustrate our approach for usability, a critical quality attribute that satisfies the previous constraints and that requires special attention at the requirements and the architecture design stages.




ut

Automatically Checking Feature Model Refactorings

A feature model (FM) defines the valid combinations of features, whose combinations correspond to a program in a Software Product Line (SPL). FMs may evolve, for instance, during refactoring activities. Developers may use a catalog of refactorings as support. However, the catalog is incomplete in principle. Additionally, it is non-trivial to propose correct refactorings. To our knowledge, no previous analysis technique for FMs is used for checking properties of general FM refactorings (a transformation that can be applied to a number of FMs) containing a representative number of features. We propose an efficient encoding of FMs in the Alloy formal specification language. Based on this encoding, we show how the Alloy Analyzer tool, which performs analysis on Alloy models, can be used to automatically check whether encoded general and specific FM refactorings are correct. Our approach can analyze general transformations automatically to a significant scale in a few seconds. In order to evaluate the analysis performance of our encoding, we evaluated in automatically generated FMs ranging from 500 to 2,000 features. Furthermore, we analyze the soundness of general transformations.




ut

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered.




ut

Least Slack Time Rate first: an Efficient Scheduling Algorithm for Pervasive Computing Environment

Real-time systems like pervasive computing have to complete executing a task within the predetermined time while ensuring that the execution results are logically correct. Such systems require intelligent scheduling methods that can adequately promptly distribute the given tasks to a processor(s). In this paper, we propose LSTR (Least Slack Time Rate first), a new and simple scheduling algorithm, for a multi-processor environment, and demonstrate its efficient performance through various tests.




ut

Ontology-based Competency Management: the Case Study of the Mihajlo Pupin Institute

Semantic-based technologies have been steadily increasing their relevance in recent years in both the research world and business world. Considering this, the present article discusses the process of design and implementation of a competency management system in information and communication technologies domain utilizing the latest Semantic Web tools and technologies including D2RQ server, TopBraid Composer, OWL 2, SPARQL, SPARQL Rules and common human resources related public vocabularies. In particular, the paper discusses the process of building individual and enterprise competence models in a form of ontology database, as well as different ways of meaningful search and retrieval of expertise data on the Semantic Web. The ontological knowledge base aims at storing the extracted and integrated competences from structured, as well as unstructured sources. By using the illustrative case study of deployment of such a system in the Human Resources sector at the Mihajlo Pupin Institute, this paper shows an example of new approaches to data integration and information management. The proposed approach extends the functionalities of existing enterprise information systems and offers possibilities for development of future Internet services. This allows organizations to express their core competences and talents in a standardized, machine processable and understandable format, and hence, facilitates their integration in the European Research Area and beyond.




ut

Cloud Computing




ut

Gilets Jaunes… des fachos-gauchistes et pis c’est tout ?

Les images sont « belles », elles tournent en boucle sur les réseaux sociaux, elles tendent à vouloir accréditer la thèse d’un mouvement composé d’ultra des deux extrêmes. La chose devrait donc être entendue, pour les « bons » militants ; rassurons-nous...




ut

Laurent Alexandre, les Gilets Jaunes et les Inutiles

Billet par Vincent Grenier. Il faut regarder cet extrait vidéo. Cela se passe devant nos futurs polytechniciens. Laurent Alexandre (heureux startuper millionnaire et apôtre du transhumanisme) nous explique pourquoi "les gilets jaunes sont des êtres substituables",...




ut

Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin

Trump et Poutine auraient discuté de la guerre en Ukraine, "une pure fiction", selon le Kremlin




ut

No Comment : Tyrannosaure Rex, un mannequin pas comme les autres

No Comment : Tyrannosaure Rex, un mannequin pas comme les autres




ut

Les enfants de Gaza au Liban sont pris dans une autre guerre

Les enfants de Gaza au Liban sont pris dans une autre guerre







ut

What is walking pneumonia? As cases rise in Canada, the symptoms to look out for - The Globe and Mail

  1. What is walking pneumonia? As cases rise in Canada, the symptoms to look out for  The Globe and Mail
  2. Walking pneumonia on the rise in Kingston, but treatable  The Kingston Whig-Standard
  3. What parents need to know about walking pneumonia in kids  FingerLakes1.com
  4. Pediatric pneumonia is surging in Central Ohio  MSN
  5. Walking Pneumonia is spiking right now. How do you know you have it?  CBS 6 News Richmond WTVR




ut

Hiking with a backpack is the workout of 2024. An exercise scientist says it’s worth the extra effort - The Globe and Mail

  1. Hiking with a backpack is the workout of 2024. An exercise scientist says it’s worth the extra effort  The Globe and Mail
  2. Military-Inspired Workout Has 'Huge Wins' for Women, Says Personal Trainer  MSN
  3. How Rucking Can Turn Your Walks into a Full-Body Workout  Verywell Health
  4. What Is Rucking and Is It Better Than Regular Walking? Here's What Personal Trainers Say  EatingWell
  5. Rucking: Why It’s a Great Workout & How to Get Started  Athletech News











ut

Former B.C. premier John Horgan dies aged 65, after third bout of cancer - National Post

  1. Former B.C. premier John Horgan dies aged 65, after third bout of cancer  National Post
  2. Adam Pankratz: John Horgan wasn't your typical NDP premier  National Post
  3. John Horgan: Reluctant leader became B.C.'s most-loved premier  Vancouver Sun
  4. Premier’s statement on the passing of John Horgan  BC Gov News
  5. UBC political scientist remembers former B.C. premier John Horgan’s legacy  CBC.ca




ut

Insurrection à Washington - Assaut du Capitole: culpabilité pour l'homme photographié dans le bureau de Nancy Pelosi

(Belga) Un Américain, qui avait été immortalisé les pieds sur une table dans le bureau de la cheffe démocrate Nancy Pelosi lors de l'assaut sur le Capitole, a été reconnu coupable lundi de plusieurs délits.

Après une courte délibération, les jurés ont déclaré Richard Barnett, 62 ans, coupable, entre autres, d'entrave à une procédure officielle, vol et intrusion dans un bâtiment officiel avec une arme dangereuse (un bâton de marche capable d'envoyer des décharges électriques). Le 6 janvier 2021, il avait envahi, comme des centaines de partisans de l'ex-président républicain Donald Trump, le siège du Congrès au moment où les élus certifiaient la victoire du démocrate Joe Biden à la présidentielle. Il avait été photographié par l'AFP dans le bureau de la cheffe de la chambre des représentants, Nancy Pelosi, les pieds sur un meuble. Le cliché avait fait le tour du monde et permis à la police de l'interpeller rapidement. Selon le dossier d'accusation, ce partisan de la mouvance complotiste Qanon avait laissé un message insultant à la démocrate et volé une enveloppe qu'elle avait signée. Pendant son procès, il s'était montré défiant, assurant avoir été "poussé à l'intérieur" du Capitole par la foule. Sa peine sera prononcée en mai. En attendant, il reste assigné à résidence avec un bracelet électronique. En deux ans d'enquête, plus de 950 participants à cette attaque ont été arrêtés, et près de 200 condamnés à des peines de prison. (Belga)




ut

Insurrection à Washington - Assaut du Capitole: des membres de la milice Oath Keepers reconnus coupables de "sédition"

(Belga) Quatre membres de la milice d'extrême droite "Oath Keepers" ont été reconnus coupables lundi de sédition pour leur rôle dans l'assaut du Capitole, à l'issue du second procès organisé sur ce chef d'accusation extrêmement rare.

Depuis l'attaque du 6 janvier 2021, plus de 950 partisans de l'ex-président républicain Donald Trump ont été arrêtés et inculpés pour avoir semé le chaos dans le siège de la démocratie américaine. Parmi eux, seuls 14 militants de groupuscules d'extrême droite - neuf membres des "Oath Keepers" et cinq "Proud Boys" - ont été accusés de "sédition", un chef passible de 20 ans de prison qui implique d'avoir planifié l'usage de la force pour s'opposer au gouvernement. Faute de place suffisante dans le tribunal fédéral de Washington, la justice a organisé le procès des Oath Keepers, accusés de s'être entraînés et armés pour l'occasion, en deux temps. Un premier procès s'est conclu fin novembre par un verdict mitigé: le fondateur de cette milice, Stewart Rhodes, et un responsable local ont été déclarés coupables de sédition, mais leurs trois co-accusés ont été acquittés sur ce chef. Lundi, à l'issue du second procès, les jurés ont jugé coupables les quatre derniers Oath Keepers, des hommes âgés de 38 à 64 ans décrits comme de dangereux "traîtres" par l'accusation, mais comme des "fanfarons" par leurs avocats. Le procès des Proud Boys, dont leur leader Enrique Tarrio, s'est ouvert en décembre et était toujours en cours lundi, dans le même tribunal. (Belga)




ut

Big Brother is Watching But He Doesn’t Understand: Why Forced Filtering Technology on the Internet Isn’t the Solution to the Modern Copyright Dilemma

by Mitchell Longan[1] Introduction The European Parliament is currently considering a proposal to address problems of piracy and other forms of copyright infringement associated with the digital world.[2] Article 13 of the proposed Directive on Copyright in the Digital Single




ut

Timed influence: The future of Modern (Family) life and the law

By Lucas Miotto Lopes and Jiahong Chen The future of real-time appeal Knowing when to say or do something is often just as important as knowing what to say or do. The right advice at the wrong time is not




ut

La Semaine politique : la France a dᅵtruit ses masques, un ex-collaborateur de Vᅵran a cherchᅵ ᅵ en vendre (et quelques autres infos)

Vous n'avez pas eu le temps de lire Le Canard enchaᅵnᅵ, Mediapart, Le Monde, Arrᅵt sur images et tous les autres titres de presse ? On s'en charge pour vous.