There’s been an interesting development on the patent front, which has been deceptively quiet for some time. Surprisingly, the latest news involves a case that went to trial nearly two years ago. It’s not a surprise, however, that the case was tried in the Eastern District of Texas, infamous for awarding verdicts in favor of patent holders. Also not surprising, the plaintiff is a non-practicing entity (NPE), a fancy term for “troll.”

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux






Apple? So long as it continues to be an overpriced walled garden, it’s not likely to pose much of a threat. It’ll always be held in disdain by free tech folks, but always in the number two position because it’s easily ignored.
Red Hat, Samsung Team Up: While there has been a lot of oooh-ing and ahhh-ing over what’s been coming out of the 


Somehow I managed to get up on time to make the hour and a half trip from my house to the Charlotte area in plenty of time for the 9 A.M. opening, groggy from only getting about three hours sleep, then wondered why I bothered arriving early. After all, the first presentation I planned to attend wasn’t until 11:30, and with no keynote address scheduled for Friday morning, that left me with a lot of time on my hands.
Newer converts to open source probably don’t know much about the site, but it wasn’t long ago when Linux users were very aware of SourceForge and how to use the service, at least well enough to download software — perhaps more aware than they wanted to be. It was the go-to site when looking for a program not available in a particular distro’s repository. Not anymore. Not for a while. These days, the more important projects have either migrated to GitHub or are hosting their own.
At the height of the media frenzy that developed around Snowden’s initial revelations, there were allegations that Microsoft had not only built back doors in its software for the NSA and other government agencies to use against foreign businesses and governments, but that it was cooperating with U.S. authorities in other ways as well. For example, one report indicated that the company was passing along details of unpatched security vulnerabilities in Windows to the NSA, effectively adding temporary tools to the spy agency’s cyber arsenal.
