From owner-freebsd-gnome@freebsd.org Sun Nov 27 19:52:21 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DA1D5C59B50 for ; Sun, 27 Nov 2016 19:52:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id C4199777 for ; Sun, 27 Nov 2016 19:52:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id C37D5C59B4F; Sun, 27 Nov 2016 19:52:21 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C3252C59B4E for ; Sun, 27 Nov 2016 19:52:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B30B7775 for ; Sun, 27 Nov 2016 19:52:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uARJqLTe002527 for ; Sun, 27 Nov 2016 19:52:21 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214454] [exp-run] devel/dbus: update to 1.10.12 Date: Sun, 27 Nov 2016 19:52:21 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: antoine@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rm@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_status assigned_to Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Nov 2016 19:52:22 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214454 Antoine Brodin changed: What |Removed |Added ---------------------------------------------------------------------------- Status|Open |In Progress Assignee|antoine@FreeBSD.org |rm@FreeBSD.org --- Comment #2 from Antoine Brodin --- Exp-run looks fine. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Sun Nov 27 21:00:30 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 42AE9C59DD6 for ; Sun, 27 Nov 2016 21:00:30 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 33790BA6 for ; Sun, 27 Nov 2016 21:00:30 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 32F09C59DD4; Sun, 27 Nov 2016 21:00:30 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 32A60C59DD3 for ; Sun, 27 Nov 2016 21:00:30 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 29EA3BA4 for ; Sun, 27 Nov 2016 21:00:30 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uARL01v5079702 for ; Sun, 27 Nov 2016 21:00:30 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <201611272100.uARL01v5079702@kenobi.freebsd.org> From: bugzilla-noreply@FreeBSD.org To: gnome@FreeBSD.org Subject: Problem reports for gnome@FreeBSD.org that need special attention Date: Sun, 27 Nov 2016 21:00:30 +0000 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Nov 2016 21:00:30 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- New | 206197 | devel/dbus: help to identify & fix "Rejected send Open | 211071 | x11/gnome3: Spell checking doesn't work, missing New | 210718 | mail/geary: update to 0.11.1 New | 213359 | graphics/poppler: Update to 0.48.0 New | 213498 | devel/libnotify: Update to 0.7.7 Open | 202006 | textproc/libxml2: xml2-config --libs output lists Open | 207243 | [exp-run] devel/glib20 and friends c++ bindings u Open | 202982 | Installation of gnome related ports (xfce, vbox, Open | 213199 | archivers/file-roller CVE-2016-7162 In Progress | 211201 | print/freetype2: update to 2.7, add V40 code New | 209870 | multiple ports: Building manpages with xsltproc - In Progress | 214454 | [exp-run] devel/dbus: update to 1.10.12 12 problems total for which you should take action. From owner-freebsd-gnome@freebsd.org Mon Nov 28 08:15:20 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3B978C57413 for ; Mon, 28 Nov 2016 08:15:20 +0000 (UTC) (envelope-from portscout@FreeBSD.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 2907E1CA5 for ; Mon, 28 Nov 2016 08:15:20 +0000 (UTC) (envelope-from portscout@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 25604C57412; Mon, 28 Nov 2016 08:15:20 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 25065C57411 for ; Mon, 28 Nov 2016 08:15:20 +0000 (UTC) (envelope-from portscout@FreeBSD.org) Received: from portscout.ysv.freebsd.org (portscout.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 182251CA4 for ; Mon, 28 Nov 2016 08:15:20 +0000 (UTC) (envelope-from portscout@FreeBSD.org) Received: from portscout.ysv.freebsd.org ([127.0.1.123]) by portscout.ysv.freebsd.org (8.15.2/8.15.2) with ESMTP id uAS8FJBb048188 for ; Mon, 28 Nov 2016 08:15:19 GMT (envelope-from portscout@FreeBSD.org) Received: (from portscout@localhost) by portscout.ysv.freebsd.org (8.15.2/8.15.2/Submit) id uAS8FJgj048183; Mon, 28 Nov 2016 08:15:19 GMT (envelope-from portscout@FreeBSD.org) Message-Id: <201611280815.uAS8FJgj048183@portscout.ysv.freebsd.org> X-Authentication-Warning: portscout.ysv.freebsd.org: portscout set sender to portscout@FreeBSD.org using -f Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain MIME-Version: 1.0 Date: Mon, 28 Nov 2016 08:15:19 +0000 From: portscout@FreeBSD.org To: gnome@freebsd.org Subject: FreeBSD ports you maintain which are out of date X-Mailer: portscout/0.8.1 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Nov 2016 08:15:20 -0000 Dear port maintainer, The portscout new distfile checker has detected that one or more of your ports appears to be out of date. Please take the opportunity to check each of the ports listed below, and if possible and appropriate, submit/commit an update. If any ports have already been updated, you can safely ignore the entry. You will not be e-mailed again for any of the port/version combinations below. Full details can be found at the following URL: http://portscout.freebsd.org/gnome@freebsd.org.html Port | Current version | New version ------------------------------------------------+-----------------+------------ deskutils/gnote | 3.18.1 | 3.22.1 ------------------------------------------------+-----------------+------------ x11-toolkits/gtksourceview3 | 3.18.2 | 3.22.2 ------------------------------------------------+-----------------+------------ x11-toolkits/gtksourceview3-reference | 3.18.2 | 3.22.2 ------------------------------------------------+-----------------+------------ If any of the above results are invalid, please check the following page for details on how to improve portscout's detection and selection of distfiles on a per-port basis: http://portscout.freebsd.org/info/portscout-portconfig.txt Thanks. From owner-freebsd-gnome@freebsd.org Mon Nov 28 09:33:22 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BD950C592C2 for ; Mon, 28 Nov 2016 09:33:22 +0000 (UTC) (envelope-from andy.silva@snsresearchreports.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 9E85E1818 for ; Mon, 28 Nov 2016 09:33:22 +0000 (UTC) (envelope-from andy.silva@snsresearchreports.com) Received: by mailman.ysv.freebsd.org (Postfix) id 9DA1BC592C1; Mon, 28 Nov 2016 09:33:22 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9D163C592C0 for ; Mon, 28 Nov 2016 09:33:22 +0000 (UTC) (envelope-from andy.silva@snsresearchreports.com) Received: from mailer238.gate85.rs.smtp.com (mailer238.gate85.rs.smtp.com [74.91.85.238]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5C4711816 for ; Mon, 28 Nov 2016 09:33:21 +0000 (UTC) (envelope-from andy.silva@snsresearchreports.com) X-MSFBL: Cgni3TNwSW6xtfPUp/i4eZc8lgKSAPuWnVYJC14Ie34=|eyJiIjoiNzRfOTFfODV fMjM4IiwiZyI6IlNuc3RlbGVjb21fZGVkaWNhdGVkX3Bvb2wiLCJyIjoiZ25vbWV AZnJlZWJzZC5vcmcifQ== Received: from [192.168.80.22] ([192.168.80.22:54200] helo=rs-ord-mta02-in2.smtp.com) by rs-ord-mta03-4.smtp.com (envelope-from ) (ecelerity 4.2.1.55028 r(Core:4.2.1.12)) with ESMTP id B5/86-14625-7D9FB385; Mon, 28 Nov 2016 09:33:11 +0000 DKIM-Signature: v=1; a=rsa-sha256; d=smtp.com; s=smtpcomcustomers; c=relaxed/simple; q=dns/txt; i=@smtp.com; t=1480325591; h=From:Subject:To:Date:MIME-Version:Content-Type; bh=k/HwfnEVsP9Cp9zl5V4LBnshSCOc/uISPoS09CrGl+U=; b=I1ktFp8wRansjw8KGAgeoG1x4S9JXBkYRBuw/UMVL4WObjgEURW/b8ODg9cWYSHc 0qifX1AUkZ8c3tcv/8DSQFEIgN4y9HB5If9fmuq9jXJrlKRC2/gnXPzUWza8zTx3 zrfqttQqRAPS5L7G2Yo3ygdLeTGZc1A4s0EiwJLdpbc=; Received: from [70.79.69.78] ([70.79.69.78:59059] helo=S01061c1b689e28c7.vc.shawcable.net) by rs-ord-mta02-in2.smtp.com (envelope-from ) (ecelerity 4.1.0.46749 r(Core:4.1.0.4)) with ESMTPA id D3/CB-25319-7D9FB385; Mon, 28 Nov 2016 09:33:11 +0000 MIME-Version: 1.0 From: "Andy Silva" Reply-To: andy.silva@snsresearchreports.com To: gnome@freebsd.org Subject: The VoLTE (Voice over LTE) Ecosystem: 2016 - 2030 - Opportunities, Challenges, Strategies & Forecasts (Report) X-Mailer: Smart_Send_2_0_138 Date: Mon, 28 Nov 2016 01:33:03 -0800 Message-ID: <89084065034321015516462@Ankur> X-Report-Abuse: SMTP.com is an email service provider. Our abuse team cares about your feedback. Please contact abuse@smtp.com for further investigation. X-SMTPCOM-Tracking-Number: c290a65c-76cc-4954-858f-c8b01e1fe30d X-SMTPCOM-Sender-ID: 6008902 Feedback-ID: 6008902:SMTPCOM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Nov 2016 09:33:22 -0000 The VoLTE (Voice over LTE) Ecosystem: 2016 =96 2030 =96 Opportunities, Chal= lenges, Strategies & Forecasts (Report) Hello Let me offer you the latest SNS Research report to you and your team, "The = VoLTE (Voice over LTE) Ecosystem: 2016 =96 2030 =96 Opportunities, Challeng= es, Strategies & Forecasts" Below is the report highlight and if you like I= can send you sample pages for your details inside.=20 =20 SNS Research estimates that VoLTE service revenue will grow at a CAGR of 34= % between 2016 and 2020. By the end of 2020, VoLTE subscribers will account= for more than $200 Billion in revenue. Although traditional voice services= will constitute a major proportion of this figure, nearly 15% of the reven= ue will be driven by video calling and supplementary services. Report Information: Release Date: Oct 2016 Number of Pages: 217 Number of Tables and Figures: 47 Key Questions Answered: How big is the VoLTE opportunity=3F What trends, challenges and barriers are influencing its growth=3F How is the ecosystem evolving by segment and region=3F What will the market size be in 2020 and at what rate will it grow=3F Which regions and countries will see the highest percentage of growth=3F How will VoLTE capable smartphone shipments grow over time=3F Who are the key market players and what are their strategies=3F How can VoLTE help operators in reducing the flow of voice subscribers to O= TT application providers=3F What are the prospects of Wi-Fi calling, RCS and WebRTC=3F What much will operators invest in VoLTE service assurance solutions=3F How can mobile operators and MVNOs capitalize on VoLTE to drive revenue gro= wth=3F How can VoLTE help operators in refarming their 2G and 3G spectrum assets=3F What is the status of international roaming and VoLTE-to-VoLTE interconnect= ion agreements=3F What strategies should VoLTE solution providers and mobile operators adopt = to remain competitive=3F =20 Key Findings: The report has the following key findings: By 2020, SNS Research estimates that VoLTE services will account for over $= 200 Billion in annual service revenue, as mobile operators remain committed= to VoLTE as the long term solution to secure a fully native IP-based telep= hony experience. As the transition to VoLTE accelerates, mobile operators have already begun= shutting down their legacy networks in a bid to reallocate additional spec= trum to their LTE networks. Japan and South Korea have already shut down their 2G networks, and multipl= e operators in other parts of the world, including the United States, are i= n the processing of switching off 2G services. Some operators, such as Telenor Norway, are seeking the closure o= f their 3G networks as early as 2020. Nearly all VoLTE operators are integrating their VoLTE services with Wi-Fi = calling in a bid to offer voice services in areas where their licensed spec= trum coverage is limited. The vendor ecosystem is continuing to consolidate with several acquisitions= such as Sonus Networks=92 recent takeover of IP communications specialist = Taqua. The report covers the following topics: VoLTE ecosystem Market drivers and barriers VoLTE infrastructure, devices, roaming and interconnection technology Case studies of 20 commercial VoLTE deployments OTT mobile voice and video services Complimentary technologies including Wi-Fi calling, RCS and WebRTC MCPTT (Mission Critical Push-to-Talk) voice services VoLTE services over MVNO networks Service assurance platforms for VoLTE Regulatory landscape, collaborative initiatives and standardization Industry roadmap and value chain Profiles and strategies of 100 leading ecosystem players including device O= EMs, VoLTE solution providers and mobile operators Strategic recommendations for VoLTE solution providers and mobile operators Market analysis and forecasts from 2016 till 2030 Forecast Segmentation: VoLTE subscription, service revenue and infrastructure revenue forecasts ar= e provided for each of the following submarkets and their subcategories: VoLTE Services Voice Telephony Video and Supplementary Services VoLTE Infrastructure CSCF (Call Session Control Function) Servers SBCs (Session Border Controllers) VoLTE Application Servers Other IMS Elements (HSS, BGCF, MGCF & MRF) VoLTE Capable PCRF (Policy & Charging Rules Function) Solutions Regional Submarkets Asia Pacific Eastern Europe Latin & Central America Middle East & Africa North America Western Europe Report Pricing: =20 Single User License: USD 2,500 Company Wide License: USD 3,500 =20 Ordering Process: =20 Please provide the following information: Report Title - Report License - (Single User/Company Wide) Name - Email - Job Title - Company - Invoice Address - Please contact me if you have any questions, or wish to purchase a copy. Ta= ble of contents and List of figures mentioned in report are given below for= more inside. I look forward to hearing from you. =20 Kind Regards =20 Andy Silva Marketing Executive Signals and Systems Telecom andy.silva@snsresearchreports.com =20 _________________________________________________________________________ Table of Contents(page number): =20 1: Introduction 1.1 Executive Summary 1.2 Topics Covered 1.3 Forecast Segmentation 1.4 Key Questions Answered 1.5 Key Findings 1.6 Methodology 1.7 Target Audience 1.8 Companies & Organizations Mentioned =20 2: An Overview of VoLTE 2.1 What is VoLTE=3F 2.2 Architectural Evolution of VoLTE 2.2.1 CSFB (Circuit-Switched Fallback): The First Step Towards VoLTE 2.2.2 The Push From CDMA Operators 2.2.3 Towards an IMS Based VoLTE Solution 2.2.4 SRVCC (Single Radio Voice Call Continuity) 2.2.5 Integrating Video Telephony 2.3 Key Enabling Technologies 2.3.1 VoLTE Infrastructure 2.3.1.1 IMS Core: CSCF, HSS, BGCF & MGCF 2.3.1.2 VoLTE Application Servers 2.3.1.3 SBC (Session Border Controller) 2.3.1.4 MRF (Media Resource Function) 2.3.1.5 PCRF (Policy and Charging Rules Function) 2.3.2 VoLTE Devices 2.3.3 Roaming & Interconnection Technology 2.3.3.1 LBO (Local Breakout) 2.3.3.2 S8HR (S8 Home Routing) 2.4 Market Growth Drivers 2.4.1 Spectral Efficiency & Cost Reduction 2.4.2 Enabling HD Voice, Video Calling & Rich IP Communications 2.4.3 Improved Battery Life 2.4.4 Integration with Wi-Fi: Enhanced Indoor Voice Coverage 2.4.5 Bundling Voice with Other Services 2.4.6 Fighting the OTT Threat 2.5 Market Barriers 2.5.1 Initial Lack of Compatible Devices 2.5.2 Roaming & Interconnect Issues 2.5.3 Limited Revenue Potential 2.5.4 Service Assurance Challenges =20 3: Collaboration, Standardization & Regulatory Landscape 3.1 3GPP (3rd Generation Partnership Project) 3.1.1 Release 8 3.1.2 Release 9 3.1.3 Release 10 3.1.4 Release 11 3.1.5 Release 12, 13 & Beyond 3.2 GSMA 3.2.1 Feature Requirements 3.2.1.1 IR.92: IMS Profile for Voice and SMS 3.2.1.2 IR.94: IMS Profile for Conversational Video Service 3.2.2 Roaming, Interworking & Other Guidelines 3.2.2.1 IR.64: IMS Service Centralization & Continuity Guidelines 3.2.2.2 IR.65: IMS Roaming & Interworking Guidelines 3.2.2.3 IR.88: LTE Roaming Guidelines 3.3 VoLTE Interworking Technology Consultation Group, Korea =20 4: VoLTE Deployment Case Studies 4.1 AT&T 4.1.1 Service Launch Strategy 4.1.2 Vendor Selection 4.1.3 Future Prospects 4.2 China Mobile 4.2.1 Service Launch Strategy 4.2.2 Vendor Selection 4.2.3 Future Prospects 4.3 DT (Deutsche Telekom) 4.3.1 Service Launch Strategy 4.3.2 Vendor Selection 4.3.3 Future Prospects 4.4 Du (Emirates Integrated Telecommunications Company) 4.4.1 Service Launch Strategy 4.4.2 Vendor Selection 4.4.3 Future Prospects 4.5 EE 4.5.1 Service Launch Strategy 4.5.2 Vendor Selection 4.5.3 Future Prospects 4.6 KDDI Corporation 4.6.1 Service Launch Strategy 4.6.2 Vendor Selection 4.6.3 Future Prospects 4.7 KT Corporation 4.7.1 Service Launch Strategy 4.7.2 Vendor Selection 4.7.3 Future Prospects 4.8 LG Uplus 4.8.1 Service Launch Strategy 4.8.2 Vendor Selection 4.8.3 Future Prospects 4.9 NTT DoCoMo 4.9.1 Service Launch Strategy 4.9.2 Vendor Selection 4.9.3 Future Prospects 4.10 Orange 4.10.1 Service Launch Strategy 4.10.2 Vendor Selection 4.10.3 Future Prospects 4.11 Reliance Jio Infocomm 4.11.1 Service Launch Strategy 4.11.2 Vendor Selection 4.11.3 Future Prospects 4.12 Rogers Communications 4.12.1 Service Launch Strategy 4.12.2 Vendor Selection 4.12.3 Future Prospects 4.13 Singtel Group 4.13.1 Service Launch Strategy 4.13.2 Vendor Selection 4.13.3 Future Prospects 4.14 SK Telecom 4.14.1 Service Launch Strategy 4.14.2 Vendor Selection 4.14.3 Future Prospects 4.15 SoftBank Group 4.15.1 Service Launch Strategy 4.15.2 Vendor Selection 4.15.3 Future Prospects 4.16 Swisscom 4.16.1 Service Launch Strategy 4.16.2 Vendor Selection 4.16.3 Future Prospects 4.17 Telef=F3nica Group 4.17.1 Service Launch Strategy 4.17.2 Vendor Selection 4.17.3 Future Prospects 4.18 Telstra 4.18.1 Service Launch Strategy 4.18.2 Vendor Selection 4.18.3 Future Prospects 4.19 Verizon Communications 4.19.1 Service Launch Strategy 4.19.2 Vendor Selection 4.19.3 Future Prospects 4.20 Vodafone Group 4.20.1 Service Launch Strategy 4.20.2 Vendor Selection 4.20.3 Future Prospects =20 5: VoLTE Industry Roadmap & Value Chain 5.1 Industry Roadmap 5.1.1 2016 =96 2020: Large Scale VoLTE Rollouts 5.1.2 2020 =96 2025: Building New Services on VoLTE Architecture 5.1.3 2025 =96 2030: Continued Investments with 5G Rollouts 5.2 Value Chain 5.2.1 Enabling Technology Providers 5.2.2 VoLTE & IMS Infrastructure Suppliers 5.2.3 VoLTE Device OEMs 5.2.4 Roaming, Billing & Supplementary Service Providers 5.2.5 Mobile Operators 5.2.6 Test, Measurement & Performance Specialists =20 6: Key Market Players 6.1 Accedian Networks 6.2 Affirmed Networks 6.3 ALEPO 6.4 Altair Semiconductor 6.5 Amdocs 6.6 Anritsu Corporation 6.7 Anritsu Corporation 6.8 Apple 6.9 Aptilo Networks 6.10 Aricent 6.11 Astellia 6.12 Asus (ASUSTeK Computer) 6.13 BICS 6.14 Broadcom 6.15 BroadSoft 6.16 BT Group 6.17 CCN (Cirrus Core Networks) 6.18 CellMining 6.19 Cellwize 6.20 CENX 6.21 CEVA 6.22 Cirpack 6.23 Cisco Systems 6.24 D2 Technologies 6.25 Dialogic Corporation 6.26 DigitalRoute 6.27 Ecrio 6.28 Empirix 6.29 Ericsson 6.30 EXFO 6.31 F5 Networks 6.32 Fujitsu 6.33 GCT Semiconductor 6.34 GENBAND 6.35 Gigamon 6.36 GL Communications 6.37 Hitachi 6.38 HPE (Hewlett Packard Enterprise) 6.39 HTC Corporation 6.40 Huawei 6.41 iBasis 6.42 IBM 6.43 Imagination Technologies 6.44 IMSWorkX 6.45 InfoVista 6.46 Intel Corporation 6.47 InterDigital 6.48 Interop Technologies 6.49 Iskratel 6.50 Italtel 6.51 Ixia 6.52 Keysight Technologies 6.53 Lenovo 6.54 LG Electronics 6.55 Metaswitch Networks 6.56 Mitel Networks Corporation 6.57 Mobileum 6.58 Monolith Software 6.59 Mushroom Networks 6.60 MYCOM OSI 6.61 Napatech 6.62 NEC Corporation 6.63 NetScout Systems 6.64 NewNet Communication Technologies 6.65 Nexus Telecom 6.66 Nokia Networks 6.67 NXP Semiconductors 6.68 OpenCloud 6.69 Openet 6.70 Optulink 6.71 Oracle Communications 6.72 Pantech 6.73 Polystar 6.74 Qualcomm 6.75 Quortus 6.76 RADCOM 6.77 Radisys Corporation 6.78 Redknee Solutions 6.79 Rohde & Schwarz 6.80 Samsung Electronics 6.81 Sandvine 6.82 Sansay 6.83 Sequans Communications 6.84 Sharp Corporation 6.85 SIGOS 6.86 Sonus Networks 6.87 Sony Mobile Communications 6.88 Spirent Communications 6.89 SPIRIT DSP 6.90 Spreadtrum Communications 6.91 Summit Tech 6.92 Syniverse 6.93 SysMech 6.94 TNS (Transaction Network Services) 6.95 Viavi Solutions 6.96 VMware 6.97 VoiceAge Corporation 6.98 Voipfuture 6.99 WIT Software 6.100 ZTE =20 7: Market Analysis & Forecasts 7.1 Global Outlook of VoLTE 7.2 VoLTE Subscriptions & Service Revenue 7.2.1 VoLTE Subscriptions 7.2.2 VoLTE Service Revenue 7.2.3 Segmentation by Application 7.2.4 Voice Telephony 7.2.5 Video & Supplementary Services 7.3 VoLTE Infrastructure 7.3.1 Segmentation by Submarket 7.3.2 CSCF Servers 7.3.3 SBCs 7.3.4 VoLTE Application Servers 7.3.5 Other IMS Elements (HSS, BGCF, MGCF & MRF) 7.3.6 VoLTE Capable PCRF Solutions 7.4 Segmentation by Region 7.4.1 Asia Pacific 7.4.2 Eastern Europe 7.4.3 Latin & Central America 7.4.4 Middle East & Africa 7.4.5 North America 7.4.6 Western Europe =20 8: Conclusion, Key Trends & Strategic Recommendations 8.1 Why is the Market Poised to Grow=3F 8.2 Competitive Industry Landscape: Acquisitions, Alliances & Consolidation 8.3 Geographic Outlook: Which Countries Offer the Highest Growth Potential=3F 8.4 Monetization: Can VoLTE Drive Revenue Growth=3F 8.5 Operator Branded OTT Services: Implications for VoLTE 8.6 Virtualization: Moving VoLTE to the Cloud 8.7 Growing Investments in VoLTE Service Assurance 8.8 Prospects of the EVS (Enhanced Voice Services) Codec 8.9 Convergence with Wi-Fi Calling 8.9.1 Moving Towards IMS-Based Wi-Fi Calling Services 8.9.2 Future Prospects 8.10 Opportunities for MVNOs 8.10.1 Enabling Service Differentiation 8.10.2 Growing MVNE (Mobile Virtual Network Enabler) Investments in VoLTE I= nfrastructure 8.10.3 How Big is the VoLTE Service Revenue Opportunity for MVNOS=3F 8.11 WebRTC: Friend or Foe=3F 8.12 Status of RCS Adoption 8.13 Prospects of Roaming and Interconnected VoLTE Services 8.14 MCPTT over VoLTE: Enabling Critical Communications 8.15 Strategic Recommendations 8.15.1 VoLTE Solution Providers 8.15.2 Mobile Operators & MVNOs =20 List of Figures: =20 Figure 1: The CSFB Mechanism for LTE Figure 2: VoLTE via IMS Figure 3: SRVCC Network Architecture Figure 4: Video Telephony with VoLTE Figure 5: Global VoLTE Capable Smartphone Shipments: 2016 - 2030 (Millions = of Units) Figure 6: VoLTE Industry Roadmap Figure 7: VoLTE Value Chain Figure 8: Global VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 9: Global VoLTE Service Revenue: 2016 - 2030 ($ Billion) Figure 10: Global VoLTE Service Revenue by Application: 2016 - 2030 ($ Bill= ion) Figure 11: Global VoLTE Based Voice Telephony Service Revenue: 2016 - 2030 = ($ Billion) Figure 12: Global VoLTE Based Video & Supplementary Applications Service Re= venue: 2016 - 2030 ($ Billion) Figure 13: Global VoLTE Infrastructure Revenue: 2016 - 2030 ($ Million) Figure 14: Global VoLTE Infrastructure Revenue by Submarket: 2016 - 2030 ($= Million) Figure 15: Global CSCF Server Revenue: 2016 - 2030 ($ Million) Figure 16: Global SBC Revenue: 2016 - 2030 ($ Million) Figure 17: Global VoLTE Application Server Revenue: 2016 - 2030 ($ Million) Figure 18: Global Other IMS Elements (HSS, BGCF, MGCF & MRF) Revenue: 2016 = - 2030 ($ Million) Figure 19: Global VoLTE Capable PCRF Solution Revenue: 2016 - 2030 ($ Milli= on) Figure 20: VoLTE Subscriptions by Region: 2016 - 2030 (Millions) Figure 21: VoLTE Service Revenue by Region: 2016 - 2030 ($ Billion) Figure 22: VoLTE Infrastructure Revenue by Region: 2016 - 2030 ($ Million) Figure 23: Asia Pacific VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 24: Asia Pacific VoLTE Service Revenue: 2016 - 2030 ($ Billion) Figure 25: Asia Pacific VoLTE Infrastructure Revenue: 2016 - 2030 ($ Millio= n) Figure 26: Eastern Europe VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 27: Eastern Europe VoLTE Service Revenue: 2016 - 2030 ($ Billion) Figure 28: Eastern Europe VoLTE Infrastructure Revenue: 2016 - 2030 ($ Mill= ion) Figure 29: Latin & Central America VoLTE Subscriptions: 2016 - 2030 (Millio= ns) Figure 30: Latin & Central America VoLTE Service Revenue: 2016 - 2030 ($ Bi= llion) Figure 31: Latin & Central America VoLTE Infrastructure Revenue: 2016 - 203= 0 ($ Million) Figure 32: Middle East & Africa VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 33: Middle East & Africa VoLTE Service Revenue: 2016 - 2030 ($ Billi= on) Figure 34: Middle East & Africa VoLTE Infrastructure Revenue: 2016 - 2030 (= $ Million) Figure 35: North America VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 36: North America VoLTE Service Revenue: 2016 - 2030 ($ Billion) Figure 37: North America VoLTE Infrastructure Revenue: 2016 - 2030 ($ Milli= on) Figure 38: Western Europe VoLTE Subscriptions: 2016 - 2030 (Millions) Figure 39: Western Europe VoLTE Service Revenue: 2016 - 2030 ($ Billion) Figure 40: Western Europe VoLTE Infrastructure Revenue: 2016 - 2030 ($ Mill= ion) Figure 41: Global Spending on VoLTE Service Assurance Solutions: 2016 - 203= 0 ($ Million) Figure 42: Audio Bandwidth Comparison between EVS and Legacy Codecs Figure 43: Wi-Fi Calling Scenarios Figure 44: IMS-based Wi-Fi Calling Service Architecture Figure 45: Managed IMS Core/IP Services for MVNOs Figure 46: Global VoLTE Service Revenue over MVNO Networks: 2016 - 2030 ($ = Billion) Figure 47: RCS Business Model =20 Thank you once again and looking forward to hearing from you. =20 Kind Regards =20 Andy Silva Marketing Executive Signals and Systems Telecom andy.silva@snsresearchreports.com =20 =20 To unsubscribe please click on the link below or send an email with unsubsc= ribe in the subject line to: remove@snsreports.com =20 From owner-freebsd-gnome@freebsd.org Mon Nov 28 20:52:21 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0CD9EC596F9 for ; Mon, 28 Nov 2016 20:52:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id EA35E1498 for ; Mon, 28 Nov 2016 20:52:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id E983FC596F8; Mon, 28 Nov 2016 20:52:20 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E9292C596F7 for ; Mon, 28 Nov 2016 20:52:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D8DD81493 for ; Mon, 28 Nov 2016 20:52:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uASKqKSO006659 for ; Mon, 28 Nov 2016 20:52:20 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214454] [exp-run] devel/dbus: update to 1.10.12 Date: Mon, 28 Nov 2016 20:52:20 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: kwm@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rm@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback+ X-Bugzilla-Changed-Fields: flagtypes.name cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Nov 2016 20:52:21 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214454 Koop Mast changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|maintainer-feedback?(gnome@ |maintainer-feedback+ |FreeBSD.org) | CC| |kwm@FreeBSD.org --- Comment #3 from Koop Mast --- Just double checked for the kde4.conf files, which was needed when kde4 was still installed in a non-default prefix and it can be removed now. Now that= I asked them about what it was for I also remember it. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Tue Nov 29 04:29:16 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1587BC5BD7E for ; Tue, 29 Nov 2016 04:29:16 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id F38CE162C for ; Tue, 29 Nov 2016 04:29:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id F2ED4C5BD7D; Tue, 29 Nov 2016 04:29:15 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F2974C5BD7C for ; Tue, 29 Nov 2016 04:29:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E262C162B for ; Tue, 29 Nov 2016 04:29:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAT4TFBY084740 for ; Tue, 29 Nov 2016 04:29:15 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214454] [exp-run] devel/dbus: update to 1.10.12 Date: Tue, 29 Nov 2016 04:29:16 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: commit-hook@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rm@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback+ X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Nov 2016 04:29:16 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214454 --- Comment #4 from commit-hook@freebsd.org --- A commit references this bug: Author: rm Date: Tue Nov 29 04:28:52 UTC 2016 New revision: 427353 URL: https://svnweb.freebsd.org/changeset/ports/427353 Log: devel/dbus: update to 1.10.12 - update to 1.10.12 - utilize localbase instead of CFLAGS/LDFLAGS - remove not applicable patching - remove couple of patches, that are no more needed: these files in etc/dbus-1 are now just compatibility stubs. The files were moved to share/dbus-1 = in new version. Thanks Antoine Brodin for an exp-run. PR: 214454 Reviewed by: kwm With hat: gnome Changes: head/devel/dbus/Makefile head/devel/dbus/distinfo head/devel/dbus/files/patch-bus__session.conf.in head/devel/dbus/files/patch-bus__system.conf.in head/devel/dbus/pkg-plist --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Tue Nov 29 04:30:39 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 73BE7C5BEC3 for ; Tue, 29 Nov 2016 04:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 5D54716DD for ; Tue, 29 Nov 2016 04:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 5CC25C5BEC2; Tue, 29 Nov 2016 04:30:39 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5C71CC5BEC1 for ; Tue, 29 Nov 2016 04:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4C3F716DC for ; Tue, 29 Nov 2016 04:30:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAT4Ud4I087457 for ; Tue, 29 Nov 2016 04:30:39 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214454] [exp-run] devel/dbus: update to 1.10.12 Date: Tue, 29 Nov 2016 04:30:39 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: rm@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rm@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback+ X-Bugzilla-Changed-Fields: bug_status resolution Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Nov 2016 04:30:39 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214454 Ruslan Makhmatkhanov changed: What |Removed |Added ---------------------------------------------------------------------------- Status|In Progress |Closed Resolution|--- |FIXED --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Tue Nov 29 04:53:40 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C79F3C5BF66 for ; Tue, 29 Nov 2016 04:53:40 +0000 (UTC) (envelope-from bounces-cf18vofh0crj-gnome=freebsd.org@bx.d.mailin.fr) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id B16901784 for ; Tue, 29 Nov 2016 04:53:40 +0000 (UTC) (envelope-from bounces-cf18vofh0crj-gnome=freebsd.org@bx.d.mailin.fr) Received: by mailman.ysv.freebsd.org (Postfix) id B0D05C5BF65; Tue, 29 Nov 2016 04:53:40 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B0725C5BF64 for ; Tue, 29 Nov 2016 04:53:40 +0000 (UTC) (envelope-from bounces-cf18vofh0crj-gnome=freebsd.org@bx.d.mailin.fr) Received: from bx.d.mailin.fr (bx.d.mailin.fr [185.41.28.124]) by mx1.freebsd.org (Postfix) with ESMTP id 4367B1783 for ; Tue, 29 Nov 2016 04:53:40 +0000 (UTC) (envelope-from bounces-cf18vofh0crj-gnome=freebsd.org@bx.d.mailin.fr) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sendinblue.com; q=dns/txt; s=mail; bh=WpJ5VjlCtbd2nbKPhd4OFUw29/jCxIj5pJeuAVn4p9o=; h=from:reply-to:subject:date:mime-version:content-type:list-id:list-unsubscribe; b=CSirwTIGKxqv8STaH+JjDH+mLFfoVkyIXaZEanTFTDpBFoIv7v0DqSQ7wzvv7qKJLL1+a8ffpVjq XJZL7wGyWARyYYjJlnipM3r6i+5gWPjz4ojU+oE6596igtoWfjzDGTuROpm0nqmAPvv1t6oeKgHi A0S8pbUb7KPpsrtl/jA= To: Subject: =?UTF-8?Q?New_spy__bracelet_camera?= From: =?UTF-8?Q?Jason=2Ezhang?= MIME-Version: 1.0 Precedence: bulk Feedback-ID: thirdclass_185.41.28.124:1513996:1513996_8:Sendinblue X-Mailer: Sendinblue X-Mailin-Client: 1513996 X-Mailin-Campaign: 8 Reply-To: sales@ahdcameras.com Message-Id: <201611290551.cf18vofh0crj@bx.d.mailin.fr> Date: Tue, 29 Nov 2016 05:51:19 +0100 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Nov 2016 04:53:40 -0000 =C2=A0 =C2=A0 Link =C2=A0 =C2=A0 [=0ASpy Bracelet C= amera ]( http://wg7g.r.ca.d.sendibm2.com/1em6vkvh0crf.html ) =C2=A0=0A= =C2=A0 =C2=A0 1080p Spy Bracelet Camera =C2=A0=0A=0ASpecifications:= =0AVideo Format: AVI=0AVideo Coding: M-JPEG=0AVideo Resolution: 1920*1080= =0AVideo Frame Rate: 30fps=0APhysical Pixel: 2560*1440=0APicture Format: JP= G=0AVoice Format: WAV=0AMedia Player Software: Built-in software of operati= on system or mainstream media player=0ASystem: Windows me/2000/xp/2003/vist= a; WIN7 Mac os; Linux;=0ABattery Power: 350mA=0ACharging Voltage: DC-5V=0AS= torage Support: Micro SD (TF card) maximum 32GB=0A=C2=A0=0AFor details plea= se contact sales@wondcam.com Skype: johnwen0822 =C2=A0 Button = =C2=A0 =C2=A0=0A=0A=C2=A9 2016 wondcam.com =C2=A0If you wish to = unsubscribe from our newsletter, click http://wg7g.r.ca.d.sendibm2.com/1em6= vkvh0crg.html From owner-freebsd-gnome@freebsd.org Wed Nov 30 15:08:38 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4FE95C5C177 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3985613D3 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 38DADC5C176; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3883AC5C175 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 284AC13D2 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAUF8c6i000746 for ; Wed, 30 Nov 2016 15:08:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: maintainer-approval requested: [Bug 212004] net/freerdp: Update to 2.0.0.d : [Attachment 177457] Patch to update net/vinagre to 3.22.0 Date: Wed, 30 Nov 2016 15:08:38 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 15:08:38 -0000 Ben Woods has asked gnome@FreeBSD.org for maintainer-approval: Bug 212004: net/freerdp: Update to 2.0.0.d https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 Attachment 177457: Patch to update net/vinagre to 3.22.0 https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177457&action=3Dedit --- Comment #33 from Ben Woods --- Comment on attachment 177457 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177457 Patch to update net/vinagre to 3.22.0 Does the FreeBSD GNOME team see any issue with upgrading net/vinagre to 3.2= 2, which is a more recent version than GNOME itself? From owner-freebsd-gnome@freebsd.org Wed Nov 30 15:08:39 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1551AC5C17B for ; Wed, 30 Nov 2016 15:08:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id F346E13DA for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id F2A32C5C17A; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F252BC5C179 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E218613D9 for ; Wed, 30 Nov 2016 15:08:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAUF8c6u000746 for ; Wed, 30 Nov 2016 15:08:38 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Wed, 30 Nov 2016 15:08:38 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: woodsb02@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: cc flagtypes.name Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 15:08:39 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 Ben Woods changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |gnome@FreeBSD.org Attachment #177457| |maintainer-approval?(gnome@ Flags| |FreeBSD.org) --- Comment #33 from Ben Woods --- Comment on attachment 177457 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177457 Patch to update net/vinagre to 3.22.0 Does the FreeBSD GNOME team see any issue with upgrading net/vinagre to 3.2= 2, which is a more recent version than GNOME itself? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Wed Nov 30 15:09:15 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA8AFC5C1EC for ; Wed, 30 Nov 2016 15:09:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id A431C1482 for ; Wed, 30 Nov 2016 15:09:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id A397DC5C1EB; Wed, 30 Nov 2016 15:09:15 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A33D6C5C1E9 for ; Wed, 30 Nov 2016 15:09:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 931721481 for ; Wed, 30 Nov 2016 15:09:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAUF9EWc011976 for ; Wed, 30 Nov 2016 15:09:15 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Wed, 30 Nov 2016 15:09:15 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: woodsb02@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: flagtypes.name Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 15:09:15 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 Ben Woods changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #177540| |maintainer-approval?(bsdpor Flags| |ts@kyle-evans.net) --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Wed Nov 30 15:32:29 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C4617C5C94E for ; Wed, 30 Nov 2016 15:32:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id ADCB610A4 for ; Wed, 30 Nov 2016 15:32:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id AD184C5C94D; Wed, 30 Nov 2016 15:32:29 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ACBACC5C94C for ; Wed, 30 Nov 2016 15:32:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9C64410A3 for ; Wed, 30 Nov 2016 15:32:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAUFWTKU031122 for ; Wed, 30 Nov 2016 15:32:29 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214338] devel/glib20: patch: new kqueue() backend for file monitoring Date: Wed, 30 Nov 2016 15:32:29 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: rozhuk.im@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: gnome@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 15:32:29 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214338 --- Comment #13 from rozhuk.im@gmail.com --- Is there some real issues with my current implementation? --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-gnome@freebsd.org Wed Nov 30 16:56:36 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1DBA8C5D933 for ; Wed, 30 Nov 2016 16:56:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 073F61543 for ; Wed, 30 Nov 2016 16:56:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 06A33C5D92D; Wed, 30 Nov 2016 16:56:36 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 06548C5D92C for ; Wed, 30 Nov 2016 16:56:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EA249153F for ; Wed, 30 Nov 2016 16:56:35 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uAUGuZt0055372 for ; Wed, 30 Nov 2016 16:56:35 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Wed, 30 Nov 2016 16:56:35 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: z7dr6ut7gs@snkmail.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: blocked Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 16:56:36 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 John Hein changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |214956 Referenced Bugs: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214956 [Bug 214956] net/freerdp: X11_USE=3Dxorg=3D... can't be split with whitespa= ce --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Wed Nov 30 21:12:55 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AA2B8C5D239 for ; Wed, 30 Nov 2016 21:12:55 +0000 (UTC) (envelope-from gabriel.diaz@vgtelecomreports.com) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 9084E130F for ; Wed, 30 Nov 2016 21:12:55 +0000 (UTC) (envelope-from gabriel.diaz@vgtelecomreports.com) Received: by mailman.ysv.freebsd.org (Postfix) id 8F577C5D238; Wed, 30 Nov 2016 21:12:55 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8CFB6C5D237 for ; Wed, 30 Nov 2016 21:12:55 +0000 (UTC) (envelope-from gabriel.diaz@vgtelecomreports.com) Received: from smtp.vgtelecomreports.com (smtp.vgtelecomreports.com [202.0.103.19]) by mx1.freebsd.org (Postfix) with ESMTP id 3DE96130E for ; Wed, 30 Nov 2016 21:12:49 +0000 (UTC) (envelope-from gabriel.diaz@vgtelecomreports.com) X-SmarterMail-Authenticated-As: admin@vgtelecomreports.com DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; d=vgtelecomreports.com; s=smtp; h=received:from:to:message-id:subject:date:mime-version:reply-to :content-type; b=HI/09zdozIPa21TgJOO24cc106/CaOk04eZrWJN4jhGqAZAt/nLK8qOtqKDk1PETg FbHKHk2ag5NwaR4vF+kXg9aedt8tcif4L7AnJL3F/DTa78ObNHxWJHFeeE4MPXAos +to0bugrp9oMVDfg+3zy8uJymZyaXwidiE2EvAIn8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vgtelecomreports.com; s=smtp; h= content-type:reply-to:mime-version:date:subject:message-id:to:from; bh=Rek9o9w5zGdC6H5klBPBeDK5Jts+8uthdogtg5xSIp8=; b=lek/4kZcoJn58xTCTpivdagpBoUGvYMHaM4pyVeifMxDD4ZJoukSi1pDlVIgqt2e7 Yar/BK7eqmW7/hpIm2wGYwrjqj04xKcjVEJA0DIK0k2P/Dry/PON6p2GlD1dACHTJ sbuJjMsP1WR0Y+cBCUHqYwsS925uIBFsaRKYOykZs= Received: from WIN-ASQ29B6R1EP (WIN-ASQ29B6R1EP [202.0.103.127]) by smtp.vgtelecomreports.com with SMTP; Wed, 30 Nov 2016 18:11:05 +0000 From: Gabriel Diaz To: gnome@freebsd.org Message-Id: <20161130181105.-1158026777@vgtelecomreports.com> Subject: Next Generation Cyber Security Market Forecast Report 2016-2021 Date: Wed, 30 Nov 2016 18:11:05 +0000 MIME-Version: 1.0 Reply-To: gabriel.diaz@vgtelecomreports.com Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Nov 2016 21:12:55 -0000 Visiongain - Business Report Updates Speak to our consultant now: +44 (0)20 7549 9933 Next Generation Cyber Security Market Forecast Report 2016-2021 Companies Advancing Beyond Traditional Firewalls Towards Cloud Based & Big Data Solutions For The Internet of Things (IoT) The period 2016-2021 will see a meteoric rise in the market size of Next Generation Cyber Security. During this period, Next Generation Cyber Security will be one of the fastest growing segments of the Cyber sector. Global revenues will reach $35.7 billion in 2016 and will increase in size significantly from 2016 and 2021. The report analyses trends in the market both quantitatively and qualitatively. In recent years, this global Next Generation Cyber Security market has undergone a technological revolution with the rising sophistication of cyber-attacks. Next Generation Cyber Security is of increasing importance currently as both developed and developing nations becomes underlined by threats from hackers. How this 209 page report delivers: • Global Next Generation Cyber Security market forecasts from 2016-2021 • Regional Next Generation Cyber Security market forecasts from 2016-2021 covering Asia-Pacific, Latin America, Europe, Middle East and Africa, and North America; • Country Next Generation Cyber Security forecasts from 2016-2021 covering China, the USA, Japan, France, the UK, Germany, India, Russia, Italy, Brazil & RoW • Next Generation Cyber Security submarket forecasts from 2016-2021 covering Application Security - Cloud Security - Content Security - Endpoint Security - Network Security • Analysis of the key factors driving growth in the global and regional/country level Next Generation Cyber Security markets from 2016-2021 • Profiles of the leading players and analysis of their prospects over the forecast period - BAE Systems - Barracuda Networks - Bay Dynamics - Cisco Systems - Check Point - FireEye - Fortinet - Herjavec Group - Hewlett Packard - Intel Corporation - Juniper Networks - Norse - Palo Alto Networks - Splunk - Watch Guard • Analysis of game changing technological trends being employed by the leading players and how these will shape the cyber security industry. • SWOT analysis of the major strengths and weaknesses of the market, together with the opportunities available and the key threats faced. • Market conclusions & recommendations. • 121 tables, charts and graphs that utilise visual representation in order to illustrate trends and market projections within the Next Generation Cyber Security market • 6 Full transcripts of exclusive Visiongain interviews with key opinion-leaders in the market, from the following companies: - Delve Labs - Digital Guardian - LogRhythm - Nymi - Sandstorm.io - Spikes Security For more information and order please contact gabriel.diaz@vgtelecomreports.com Select the license from the list below and send your details Licensing options: Single User GBP 1999 Dept. (5 Users) GBP 2999 Site GBP 4999 Global GBP 6999 Buy this report Want to know more? Send me more info Table of Contents - Next Generation Cyber Security Market Forecast Report 2016-2021 1. Report Overview 2. Introduction to the Next Generation Cyber Security Market 2.1 Next Generation Cyber Security Market Introduction 2.2 Assessing the Cyber Security Market Landscape 2.3 High Growth Rate Driving up the Next Generation Cyber Security Job and Skills Market 2.4 Next Generations Cyber Security Measures 2.5 Factors Driving the Next Generation Cyber Security Market 2.6 Cyber Security Threat Also Existing for Consumers 2.7 Competitive Ecosystem in the Next Generation Cyber Security Market 2.8 Trend Analysis of the Cyber Security Market 2.9 Why is Cyber Security So Important to Homeland Security? 2.10 What Does the Cyber Threat to Critical Infrastructure Encompass? 2.11 Intentions/Goals of Cyber Attack 2.12 Types of Cyber Attack 2.13 Methods of Cyber Defence 2.14 Notable Cyber Attacks & Incidents 2.14.1 Conficker 2.14.2 Operation Buckshot Yankee 2.14.3 Aurora 2.14.4 Chinese Diversion of Internet Traffic 2.14.5 Stuxnet 2.14.6 Duqu 2.14.7 RSA 2.14.8 Sony Corporation 2.14.9 Operation Shady RAT 2.14.10 Mitsubishi Heavy Industries 2.14.11 Flame / Operation: Olympic Games 2.14.12 Aramco 2.14.13 The Navy and Marine Corps Intranet (NMCI) 2.14.14 Operation Saffron Rose 2.14.15 Operation Dragonfly 2.14.16 Norwegian Oil and Gas 2.14.17 Sony Picture Entertainment 2.14.18 Operation Cleaver 2.15 List of Recent Cyber Security Attacks 3. Global Next Generation Cyber Security Market 3.1 Market Definition 3.1.1 Application Security Submarket Definition 3.1.2 Cloud Security Submarket Definition 3.1.3 Content Security Submarket Definition 3.1.4 Endpoint Security Submarket Definition 3.1.5 Network Security Submarket Definition 3.2 Global Next Generation Cyber Security Market Forecast 2016-2021 4. Global Next Generation Cyber Security Submarket Forecasts 2016-2021 4.1 What are the Leading Submarkets in Next Generation Cyber Security Revenue Forecast 2016-2021? 4.1.1 Global Next Generation Cyber Security Revenue Submarket Forecast AGR & CAGR 4.1.2 Network Security Sector Leading the Next Generation Cyber Security with a Market Share of 38.1% In 2016 4.2 Next Generation Application Security 4.2.1 Next Generation Cyber Security Application Security Submarket Forecast Summary 2016-2021 4.3 Next Generation Cloud Security 4.3.1 Next Generation Cyber Security Cloud Security Submarket Forecast Summary 2016-2021 4.4 Next Generation Content Security 4.4.1 Next Generation Cyber Security Content Security Submarket Forecast Summary 2016-2021 4.5 Next Generation Endpoint Security 4.5.1 Next Generation Cyber Security Endpoint Security Submarket Forecast Summary 2016-2021 4.6 Next Generation Network Security 4.6.1 Next Generation Cyber Security Network Security Submarket Forecast Summary 2016-2021 5. Regional Next Generation Cyber Security Forecasts 2016-2021 5.1 Overview 5.2 North America Leading Region in Terms of Revenue in 2016 5.2.1 Regional Next Generation Cyber Security Revenue Forecast AGR & CAGR 5.2.2 North America Leading Regional Next Generation Cyber Security Market Shares in 2016 with 33.9% 5.3 Top 10 National Next Generation Cyber Security Market Forecasts 2016-2021 5.4 United States Next Generation Cyber Security Market Forecasts 2016-2021 5.4.1 US Cyber Security Market Drivers & Restraints 5.4.2 Changing Concerns: Why the focus on Next Generation Cyber Security will Continue to Drive US Homeland Security Expenditure Upwards 5.4.3 Investment in Next Generation From the Energy Sector 5.4.4 What are Domestic Airlines and the US Federal Aviation Authority Doing to Guard Against a Major Cyber Attack? 5.5 Chinese Next Generation Cyber Security Market Forecasts 2016-2021 5.5.1 Chinese Cyber Security Market Drivers & Restraints 5.5.2 Another Brick in the Great Firewall: How Has China’s Concern for the Control of Information Helped Shape its Defensive Cyber Posture? 5.5.3 A Digital Arms Race: How Strategic Competition with the United States Is Spurring on Chinese Ambitions to Become a Cyber Power 5.5.4 Recent Chinese Cyber Security Events 5.6 UK Next Generation Cyber Security Market Forecasts 2016-2021 5.6.1 U.K. Cyber Security Market Drivers & Restraints 5.7 Japan Next Generation Cyber Security Market Forecasts 2016-2021 5.7.1 Japanese Cyber Security Market Drivers & Restraints 5.7.2 What Measures Has Japan Taken To Boost It’s Cyber Security Capabilities And What Challenges Remain? 5.7.3 Recent Japanese Cyber Security Events 5.8 Germany Next Generation Cyber Security Market Forecasts 2016-2021 5.8.1 German Cyber Security Market Drivers & Restraints 5.8.2 Have German Cyber Security Efforts Acquired New Emphasis? 5.8.3 Recent German Cyber Security Events 5.9 France Next Generation Cyber Security Market Forecasts 2016-2021 5.9.1 French Cyber Security Market Drivers & Restraints 5.9.2 What is the Current State of French Cyber Security? 5.9.3 Recent French Cyber Security Events 5.10 Italy Next Generation Cyber Security Market Forecasts 2016-2021 5.10.1 Italian Cyber Security Market Drivers & Restraints 5.11 Russia Next Generation Cyber Security Market Forecasts 2016-2021 5.11.1 Russian Cyber Security Market Drivers & Restraints 5.11.2 Russian Cyber Security Policy: How Stage Two Has Built Upon Previous Developments 5.11.3 Recent Russian Cyber Security Events 5.12 Brazil Next Generation Cyber Security Market Forecasts 2016-2021 5.12.1 Brazilian Cyber Security Market Drivers & Restraints 5.13 India Next Generation Cyber Security Market Forecasts 2016-2021 5.13.1 Indian Cyber Security Market Drivers & Restraints 5.13.2 How Have Repeated Blackouts Placed a Renewed Emphasis on Indian Critical Infrastructure Protection? 5.13.3 How Will the Recommendations of the JWG Affect Indian Cyber Security? 5.13.4 Recent Indian Cyber Security Events 5.14 Rest of World Next Generation Cyber Security Market Forecasts 2016-2021 5.14.1 Rest of the World Cyber Security Market Drivers & Restraints 5.14.2 Recent Rest of the World Cyber Security Events 6. SWOT Analysis of the Next Generation Cyber Security Market 7. Expert Opinion 7.1 Delve Labs Interview 7.1.1 Delve Labs Company Background & Cyber Security Offerings 7.1.2 Delve Lab’s Strengths in the Cyber Security Sector 7.1.3 Defining Next Generation Cyber Security 7.1.4 Future of Cyber Security Industry 7.1.5 Trends and Factors Affecting Product Development or Implementation 7.1.6 Cyber Security Products and Solutions Clients Frequently Require 7.1.7 Cyber Security Sub-Markets Critical for Delve Lab’s Growth 7.1.8 Cyber Security Market Drivers and Restraints 7.1.9 Technological Development in the Cyber Security Industry and the Impact on Delve Lab 7.1.10 Strong Regional Cyber Security Markets of the Future 7.1.11 Regional Cyber Security Markets Critical to Delve Labs 7.1.12 Challenges & Opportunities in the Cyber Security Market 7.2 Digital Guardian Interview 7.2.1 Digital Guardian Company Background & Cyber Security Offerings 7.2.2 Digital Guardian’s Strengths in the Cyber Security Sector 7.2.3 Defining Next Generation Cyber Security 7.2.4 Future of Cyber Security Industry 7.2.5 Trends and Factors Affecting Product Development or Implementation 7.2.6 Cyber Security Products and Solutions Clients Frequently Require 7.2.7 Cyber Security Sub-Markets Critical for Digital Guardian’s Growth 7.2.8 Cyber Security Market Drivers and Restraints 7.2.9 Technological Development in the Cyber Security Industry and the Impact on Digital Guardian 7.2.10 Strong Regional Cyber Security Markets of the Future 7.2.11 Regional Cyber Security Markets Critical to Digital Guardian 7.2.12 Challenges & Opportunities in the Cyber Security Market 7.3 LogRhythm Interview 7.3.1 LogRhythm Company Background & Cyber Security Offerings 7.3.2 LogRhythm’s Strengths in the Cyber Security Sector 7.3.3 Defining Next Generation Cyber Security 7.3.4 Trends and Factors Affecting Product Development or Implementation 7.3.5 Cyber Security Products and Solutions Clients Frequently Require 7.3.6 Cyber Security Market Drivers and Restraints 7.3.7 Challenges & Opportunities in the Cyber Security Market 7.4 Nymi Interview 7.4.1 Nymi Company Background & Cyber Security Offerings 7.4.2 Nymi’s Strengths in the Cyber Security Sector 7.4.3 Defining Next Generation Cyber Security 7.4.4 Future of Cyber Security Industry 7.4.5 Trends and Factors Affecting Product Development or Implementation 7.4.6 Cyber Security Products and Solutions Clients Frequently Require 7.4.7 Cyber Security Sub-Markets Critical for Nymi’s Growth 7.4.8 Cyber Security Market Drivers and Restraints 7.4.9 Technological Development in the Cyber Security Industry and the Impact on Nymi 7.4.10 Regional Cyber Security Markets Critical to Nymi 7.5 Sandstorm.io Interview 7.5.1 Sandstorm.io Company Background & Cyber Security Offerings 7.5.2 Sandstorm’s Strengths in the Cyber Security Sector 7.5.3 Sandstorm.io Views on the Next Generation Cyber Security Market 7.6 Spikes Security Interview 7.6.1 Spikes Security Company Background & Cyber Security Offerings 7.6.2 Spikes Security’s Strengths in the Cyber Security Sector 7.6.3 Defining Next Generation Cyber Security 7.6.4 Future of Cyber Security Industry 7.6.5 Trends and Factors Affecting Product Development or Implementation 7.6.6 Cyber Security Products and Solutions Clients Frequently Require 7.6.7 Cyber Security Sub-Markets Critical for Spikes Security’s Growth 7.6.8 Cyber Security Market Drivers and Restraints 7.6.9 Technological Development in the Cyber Security Industry and the Impact on Spikes Security 7.6.10 Strong Regional Cyber Security Markets of the Future 7.6.11 Regional Cyber Security Markets Critical to Spikes Security 7.6.12 Challenges & Opportunities in the Cyber Security Market 7.6.13 Final Thoughts on the Cyber Security Market 8. Significant Companies in the Next Generation Cyber Security Ecosystem 8.1 BAE Systems 8.1.1 BAE Systems Cyber Security Overview 8.1.2 BAE Systems Primary Market Competitors 8.1.3 BAE Systems SWOT Analysis 8.2 Barracuda Networks 8.2.1 Cyber Security Overview 8.2.2 Barracuda Networks Products 8.3 Bay Dynamics 8.3.1 Bay Dynamics Cyber Security Overview 8.4 Cisco Systems 8.4.1 Cisco Systems Cyber Security Overview 8.4.3 Cisco Systems Primary Market Competitors 8.4.4 Cisco Systems SWOT Analysis 8.5 Check Point 8.5.1 Cyber Security Overview 8.5.2 Check Point Primary Market Competitors 8.5.3 Check Point SWOT Analysis 8.6 FireEye 8.6.1 FireEye Latest developments 8.6.2 Challenges faced by FireEye 8.7 Fortinet 8.7.1 Fortinet Cyber Security Overview 8.7.3 Fortinet Primary Market Competitors 8.7.4 Fortinet SWOT Analysis 8.8 Herjavec Group 8.8.1 Overview of Herjavec Group’s Cyber Security Offerings 8.8.2 Recent Acquisition and Expansion into United Kingdom & Europe 8.9 Hewlett Packard 8.9.1 Hewlett Packard Company’s Role in the Cyber Security Market 8.9.2 Hewlett Packard Company’s Organisational Structure 8.9.3 Hewlett Packard Company’s Cyber Security Products 8.9.4 Hewlett Packard Company’s Primary Market Competitors 8.9.5 Hewlett Packard Company’s Recent M&A Activity 8.10 Intel Corporation 8.10.1 Intel Company Profile 8.10.2 Intel Primary Market Competitors 8.10.3 Intel SWOT Analysis 8.11 Juniper Networks 8.11.1 Recent Developments 8.11.2 Juniper Networks Partnerships and Ventures 8.11.3 Juniper Networks Products and Services 8.11.4 Juniper Networks Future Outlook 8.12 Norse 8.12.1 Norse Latest Developments 8.13 Palo Alto Networks 8.13.1 Palo Alto Networks Latest Developments 8.14 Splunk 8.14.1 Cyber Security Overview 8.14.2 Splunk Recent Developments 8.14.3 Splunk Products and Services 8.14.4 Splunk Partnerships 8.14.5 Splunk Future Outlook 8.15 Watch Guard 8.15.1 Watch Guard Recent Developments 8.15.2 Watch Guard Products and services 8.15.3 Watch Guard Partnerships and Ventures 8.15.4 Watch Guard Future Outlook 9. Conclusion 9.1 Huge Potential for Growth in the Cyber Security Space 9.2 Regional Analysis of Next Generation Cyber Security Market Growth 9.3 Cyber Security Vital to National Defence 9.4 Increasing Number of Cyber Attacks on Businesses 9.5 Analysing the Evolution of Traditional Cyber Security to Next Generation Cyber Security 9.6 Future Potential of Next Generation Cyber Security 10. Glossary List of Tables Table 2.1 Intentions/Goals of Cyber Attack (Type, Description) Table 2.2 Types of Cyber Attack (Type, Description) Table 2.3 Cyber Defence Systems (Method of Cyber Defence, Description) Table 2.4 Recent History of High Profile Cyber Attacks (Date, Description) Table 3.1 Global Next Generation Cyber Security Market Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.1 Global Next Generation Cyber Security Revenue Submarket Forecast 2016-2021 ($ billion) Table 4.2 Global Next Generation Cyber Security Revenue Submarket AGR Forecast 2017-2021 (AGR %) Table 4.3 Global Next Generation Cyber Security Revenue Submarket CAGR Forecast (%) 2016-2019, 2019-2021, and 2016-2021 Table 4.4 Global Next Generation Cyber Security Market Share Forecast by Type 2016-2021 (%) Table 4.5 Next Generation Cyber Security Application Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.6 Next Generation Cyber Security Cloud Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.7 Next Generation Cyber Security Content Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.8 Next Generation Cyber Security Endpoint Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 4.9 Next Generation Cyber Security Network Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.1 Regional Next Generation Cyber Security Revenue Forecast 2016-2021 ($ billion) Table 5.2 Regional Next Generation Cyber Security Revenue AGR Forecast 2017-2021 (AGR %) Table 5.3 Regional Next Generation Cyber Security Revenue CAGR Forecast (%) 2016-2019, 2019-2021, and 2016-2021 Table 5.4 Regional Next Generation Cyber Security Market Share Forecast 2016-2021 (%) Table 5.5 Top 10 National Next Generation Cyber Security Market Forecast 2016-2021 ($ Billions, AGR%, % Share) Table 5.6 US Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.8 China Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.9 Chinese Cyber Security Drivers & Restraints Table 5.10 UK Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.11 U.K. Cyber Security Market Drivers & Restraints Table 5.12 Japan Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.13 Japanese Cyber Security Market Drivers & Restraints Table 5.14 Germany Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.15 German Cyber Security Market Drivers & Restraints Table 5.16 France Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.17 French Cyber Security Market Drivers & Restraints Table 5.18 Italy Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.19 Italian Cyber Security Market Drivers & Restraints Table 5.20 Russia Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.21 Russian Cyber Security Market Drivers & Restraints Table 5.22 Brazil Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.23 Brazilian Cyber Security Market Drivers & Restraints Table 5.24 India Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.25 Indian Cyber Security Market Drivers & Restraints Table 5.26 RoW Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billion, AGR %, CAGR%, Cumulative) Table 5.27 Rest of the World Cyber Security Market Drivers & Restraints Table 6.1 SWOT Analysis of the Next Generation Cyber Security Market 2016 Table 8.1 Recent BAE Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details) Table 8.2 BAE Systems Selected Cyber Security Products & Services (Company Division, Product, Specification) Table 8.3 SWOT Analysis of BAE Systems 2015 Table 8.4 Barracuda Cyber Security Solutions Table 8.5 Recent Cisco Systems Cyber Security Contracts / Projects / Programmes (Date, Country, Value ($m), Details) Table 8.6 Cisco Systems Inc Selected Cyber-Security Products (Product/Service Name, Specification) Table 8.7 SWOT Analysis of Cisco Systems 2016 Table 8.8 Check Point Selected Cyber Security Products & Services (Product, Specification) Table 8.9 SWOT Analysis Check Point 2015 Table 8.10 Fortinet Major Cyber Security Contracts & Programmes 2013-2014 (Date, Country, Details) Table 8.11 Fortinet Selected Cyber Security Products & Services 2014 (Product, Specification) Table 8.12 SWOT Analysis of Fortinet 2015 Table 8.13 Overview of Herjavec Group’s Cyber Security Offerings Table 8.14 Herjavec’s core managed security services Table 8.15 Recent Hewlett Packard Company Cyber Security Contracts / Projects / Programmes (Date, Country, Value $m, Details) Table 8.16 Sample of Hewlett Packard Company’s Cyber Security Products / Services (Company Section, Product, Specifications) Table 8.17 Hewlett Packard Company Recent M&A Activity (Date, Details) Table 8.18 Intel Corporation Cyber-security (Product/Service Type, Company Division, Product/Service Name, Specification) Table 8.19 SWOT Analysis of Intel 2016 Table 8.20 Juniper Networks Products and Services Table 8.21 Splunk Products and Services List of Figures Figure 2.1 Operation Shady RAT Targets (Sector, Number of Targets) Figure 3.1 Next Generation Cyber Security Market Venn Diagram Representation Figure 3.2 Next Generation Cyber Security Sub-Market Segmentation Figure 3.3 Global Next Generation Cyber Security Market Forecast 2016-2021 ($ billion, AGR%) Figure 4.1 Global Next Generation Cyber Security Revenue Submarket Forecast 2016-2021 ($ billion) Figure 4.2 Global Next Generation Cyber Security Revenue Submarket AGR Forecast 2017-2021 (AGR %) Figure 4.3 Global Next Generation Cyber Security Market Share Forecast by Type 2016 (%) Figure 4.4 Global Next Generation Cyber Security Market Share Forecast by Type 2019 (%) Figure 4.5 Global Next Generation Cyber Security Market Share Forecast by Type 2021 (%) Figure 4.6 Next Generation Cyber Security Application Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.7 Next Generation Cyber Security Application Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.8 Next Generation Cyber Security Cloud Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.9 Next Generation Cyber Security Cloud Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.10 Next Generation Cyber Security Content Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.11 Next Generation Cyber Security Content Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.12 Next Generation Cyber Security Endpoint Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.13 Next Generation Cyber Security Endpoint Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 4.14 Next Generation Cyber Security Network Security Submarket Revenue Forecast 2016-2021 ($ billion, AGR%) Figure 4.15 Next Generation Cyber Security Network Security Submarket Share Forecast 2016, 2019 and 2021 (% Share) Figure 5.1 Regional Next Generation Cyber Security Revenue Forecast 2016-2021 ($ billion) Figure 5.2 Regional Next Generation Cyber Security Revenue AGR Forecast 2016-2021 (AGR%) Figure 5.3 Regional Next Generation Cyber Security Market Share Forecast 2016 (%) Figure 5.4 Regional Next Generation Cyber Security Market Share Forecast 2019 (%) Figure 5.5 Regional Next Generation Cyber Security Market Share Forecast 2021 (%) Figure 5.6 Top 10 National Next Generation Cyber Security Market Forecast 2016-2021 ($ Billions, AGR%, % Share) Figure 5.7 US Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.8 US Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.9 China Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.10 China Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.11 UK Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.12 UK Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.13 Japan Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.14 Japan Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.15 Germany Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.16 Germany Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.17 France Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.18 France Share of Global Next Generation Cyber Security Market Forecast 2016, 2021 and 2021 (% Share) Figure 5.19 Italy Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.20 Italy Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.21 Russia Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.22 Russia Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.23 Brazil Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.24 Brazil Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.25 India Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.26 Indian Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 5.27 RoW Next Generation Cyber Security Market Revenue Forecast 2016-2021 ($ billions, AGR%) Figure 5.27 RoW Share of Global Next Generation Cyber Security Market Forecast 2016, 2019 and 2021 (% Share) Figure 8.1 BAE Systems Organisational Structure of Cyber Security Divisions 2016 Figure 8.2 BAE Systems Primary Market Competitors Figure 8.3 Cisco Systems Organisational Structure of Cyber Security Divisions Figure 8.4 BAE Systems plc Primary Market Competitors Figure 8.5 Check Point Primary Market Competitors Figure 8.6 Fortinet Organisational Structure of Cyber Security Divisions Figure 8.7 Fortinet Primary Market Competitors Figure 8.8 Hewlett Packard Company’s Organisational Structure Figure 8.9 Hewlett Packard Primary Market Competitors Figure 8.10 Intel Organisational Structure of Cyber Security Divisions Figure 8.11 Intel Primary Market Competitors Figure 8.12 Watch Guard Data Loss Prevention and Automated Intelligence and Decision Making Framework Companies Mentioned in this Report Adobe Systems Altron Amazon Amazon Web Services (AWS) American Airlines AMSEC LLC Anthem Anthem Apple Autonomy Barracuda Networks Bay Dynamics Boeing Booz Allen Hamilton BorderWare Technologies British Aerospace (BAe) CACI International Checkpoint China Telecom Cisco Systems Clarent Corporation Cloudflare Code Green Networks Comcast Computer Sciences Corporation ConocoPhillips Cryptolocker CrySyS Lab CSC DELL Inc Delve Labs Digital Guardian Domino's Pizza Dtex Systems Easy Solutions Elderwood Group EMC Engility Extreme Networks ExxonMobil FASTNET Corporation Fireye Fortinet General Dynamics Corp General Electric Company plc (GEC) Global Technical Systems Google Herjavec Group Hewlett Packard Home Depot Honeywell Technology Solutions Horton Networks Huawei IBM IHI Corp. Industrial Defender Inc. Intel Interpath Communications Japan Airlines JP Morgan Chase Juniper Networks Kaspersky Lab Kawasaki Heavy Industries L-3 Services Inc Lockheed Martin LogRhythm Mandiant Marathon Oil Marconi Electronic Systems (MES) McAfee Microsoft Mitsubishi Heavy Industries Mt Gox Muthoot Fincorp Ltd NBC New York Times Norse Northrop Nymi Oracle Palo Alto Networks Primera Blue Cross Quick Heal Rackspace Raytheon Company Redstone Arsenal Rosoboronexport RSA Rusal Sabre Holdings SAIC Sandia National Laboratories Sandstorm.io Saudi Aramco Scientific Research Corporation SecureID Serco Silversky Sony Corporation Sony Entertainment Sourcefire Splunk Symantec Sysec Target Telefonica Telefónica Global Technology Thales Group The Learning Company Topface Trend Micro Tshinghua Tongfang TV5Monde UBS Verio Vertica Systems VINCI group Voltage Security Vu Security Watchguard Wells Fargo WorldTalk Corporation Yahoo Yahoo Japan For more information and order please contact gabriel.diaz@vgtelecomreports.com Terms and Conditions By replying to this e-mail submitting your order for this product you have agreed without limitation or qualification to be bound by and to comply with these Terms and Conditions. You agree that you will not fail to complete any transaction after submitting an order to purchase a product or submit any order to purchase a product where you do not intend to complete the transaction. Management Reports will only be sent on receipt of payment. Our mailing address is: 230 City Road. EC1V 2QY, London, UK. As a valued contact or customer, you are receiving this email with information that we believe will be relevant to you. If however, you wish to stop future messages you can unsubscribe from this list From owner-freebsd-gnome@freebsd.org Thu Dec 1 04:51:07 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9FCD8C5F24E for ; Thu, 1 Dec 2016 04:51:07 +0000 (UTC) (envelope-from bounce-33521_HTML-358840508-55025-7292140-392@bounce.s7.exacttarget.com) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 84CCE1DAF for ; Thu, 1 Dec 2016 04:51:07 +0000 (UTC) (envelope-from bounce-33521_HTML-358840508-55025-7292140-392@bounce.s7.exacttarget.com) Received: by mailman.ysv.freebsd.org (Postfix) id 8124CC5F249; Thu, 1 Dec 2016 04:51:07 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 80B24C5F247 for ; Thu, 1 Dec 2016 04:51:07 +0000 (UTC) (envelope-from bounce-33521_HTML-358840508-55025-7292140-392@bounce.s7.exacttarget.com) Received: from df70.mta.exacttarget.com (df70.mta.exacttarget.com [13.111.2.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4458F1DA6 for ; Thu, 1 Dec 2016 04:51:06 +0000 (UTC) (envelope-from bounce-33521_HTML-358840508-55025-7292140-392@bounce.s7.exacttarget.com) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=200608; d=breakbulk.com; h=Message-ID:Date:Subject:From:Reply-To:To:MIME-Version:Content-Type:List-Unsubscribe:List-ID; i=promero@breakbulk.com; bh=3M3i+T5o5/GS+qEJEuXwTtpLQFU=; b=DDlmggEPSYx2d/BDwTYkMb14oKAmmnVCH7bvcdcsGKdHIJ8m+j96Q2RF+tE4km/CNCC7uGjPqBzy /Text9Ll3qK9ff484sl2I7j4jJGdDmxT6/PyW9WL3GnGk4f2MSbYojD2onsTHUVweX6beFt3fFlQ LggkWSPoR23o0H/+aEA= Received: by df70.mta.exacttarget.com id h7um4u163hsd for ; Thu, 1 Dec 2016 04:39:07 +0000 (envelope-from ) X-Virus-Scanned: amavisd-new at orionsmtp-237.s7.exacttarget.com Message-ID: <0619521b-1389-487e-a3c8-8bb926cb0520@atl1s07mta842.xt.local> Date: Wed, 30 Nov 2016 22:38:46 -0600 Subject: Get Alerts for =?utf-8?Q?Asia=E2=80=99s?= Largest Event for Project Cargo & Breakbulk Industry From: Patrick Romero Reply-To: promero@breakbulk.com To: gnome@freebsd.org MIME-Version: 1.0 X-Report-Abuse-To: abuse@pd25.com X-CSA-Complaints: whitelistcomplaints@eco.de x-job: 7292140_55025 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Dec 2016 04:51:07 -0000 Breakbulk China, Asia's largest exhibition and conference for the project c= argo and breakbulk industry, 13-16 March in Shanghai=2E Email not displaying correctly? View it in your browser http://go=2Epardot=2Ecom/webmail/272542/106147/39fe= 8f093a2884b6388d5768ea83a1280aab2b7787260cbd023fbabd4170babb=2E Logistics is complicated=2E Finding new business doesn't have to be=2E The movement of project cargo and breakbulk goods involves complex logistic= s, months and even years of planning and multi-million dollar contracts=2E = Yours is a complicated job and in this tight economy, finding new business = is a top priority=2E We can help=2E >From 13-16 March 2017, Asia=E2=80=99s largest exhibition and conference for= the project cargo and breakbulk industry will bring together 6,000 industr= y professionals, 200 exhibitors and more than 300 shippers at Breakbulk Chi= na in Shanghai=2E Hear from shippers, forwarders and specialized transport providers, as well= as astute analysts, as they share their experiences and identify areas of = opportunity for new business and development=2E With a full exhibition hall= , you will be able to fill the 2 days with appointments that meet your busi= ness objectives=2E Find out more about exhibitors, sponsors, speakers and VIP Shippers=2E Sign Up for Alerts - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-28-= 92b/d8x/106147 Facebook - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5z6/d8z/10= 6147 Twitter - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5z8/d92/106= 147 LinkedIn - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5zb/d94/10= 6147 YouTube - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5zd/d96/106= 147 SoundCloud - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5zg/d98/= 106147 Instagram - http://go=2Epardot=2Ecom/e/272542/l-272542-2016-11-23-5zj/d9b/1= 06147 Copyright =C2=A9 2016, all rights reserved=2E Our mailing address is: Breakbulk Events & Media 2 Penn Plaza 12th Floor Newark, NJ 07105 unsubscribe from all emails http://go=2Epardot=2Ecom/unsubscribe/u/272542/39fe8f093a2884b6388d5768ea83a= 1280aab2b7787260cbd023fbabd4170babb/106147 =20=20 From owner-freebsd-gnome@freebsd.org Fri Dec 2 06:06:56 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BB6DEC5EA81 for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id A5AEF1089 for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id A5109C5EA80; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A4BCBC5EA7F for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7CFAA1088 for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB266uov034575 for ; Fri, 2 Dec 2016 06:06:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: maintainer-feedback requested: [Bug 214992] devel/dbus: make dependency loop Date: Fri, 02 Dec 2016 06:06:56 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: gnome@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 06:06:56 -0000 Keizo Shimizu has reassigned Bugzilla Automation 's request for maintainer-feedback to gnome@FreeBSD.o= rg: Bug 214992: devel/dbus: make dependency loop https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214992 --- Description --- When installing some ports on 11.0-RELEASE-p1, I met=20 "Cannot fork: Resource temporarily unavailable" message. I investigated log and found following make dependency loop. =3D=3D=3D> dbus-glib-0.104 depends on shared library: libdbus-1.so - not = found =3D=3D=3D> dbus-1.8.20 depends on executable: xmlto - not found =3D=3D=3D> xmlto-0.0.28 depends on executable: w3m - not found =3D=3D=3D> w3m-0.5.3_5 depends on shared library: libgtk-x11-2.0.so - not= found =3D=3D=3D> gtk2-2.24.29_2 depends on shared library: libcups.so - not fou= nd =3D=3D=3D> cups-2.1.4 depends on shared library: libavahi-client.so - not= found =3D=3D=3D> avahi-app-0.6.31_5 depends on shared library: libdbus-glib-1.s= o - not found =3D=3D=3D> dbus-glib-0.104 depends on shared library: libdbus-1.so - not = found =3D=3D=3D> dbus-1.8.20 depends on executable: xmlto - not found =3D=3D=3D> xmlto-0.0.28 depends on executable: w3m - not found =3D=3D=3D> w3m-0.5.3_5 depends on shared library: libgtk-x11-2.0.so - not= found =3D=3D=3D> gtk2-2.24.29_2 depends on shared library: libcups.so - not fou= nd =3D=3D=3D> cups-2.1.4 depends on shared library: libavahi-client.so - not= found =3D=3D=3D> avahi-app-0.6.31_5 depends on shared library: libdbus-glib-1.s= o - not found It seems devel/dbus requires xmlto to install MANPAGES and xmlto itself requires dbus. From owner-freebsd-gnome@freebsd.org Fri Dec 2 06:06:57 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 136E6C5EA8D for ; Fri, 2 Dec 2016 06:06:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id F1941108C for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id F0EDBC5EA8B; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F09C2C5EA89 for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C855C108B for ; Fri, 2 Dec 2016 06:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB266up1034575 for ; Fri, 2 Dec 2016 06:06:56 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214992] devel/dbus: make dependency loop Date: Fri, 02 Dec 2016 06:06:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: keizo@mars.dti.ne.jp X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: gnome@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 06:06:57 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214992 Bug ID: 214992 Summary: devel/dbus: make dependency loop Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: gnome@FreeBSD.org Reporter: keizo@mars.dti.ne.jp Assignee: gnome@FreeBSD.org Flags: maintainer-feedback?(gnome@FreeBSD.org) When installing some ports on 11.0-RELEASE-p1, I met=20 "Cannot fork: Resource temporarily unavailable" message. I investigated log and found following make dependency loop. =3D=3D=3D> dbus-glib-0.104 depends on shared library: libdbus-1.so - not = found =3D=3D=3D> dbus-1.8.20 depends on executable: xmlto - not found =3D=3D=3D> xmlto-0.0.28 depends on executable: w3m - not found =3D=3D=3D> w3m-0.5.3_5 depends on shared library: libgtk-x11-2.0.so - not= found =3D=3D=3D> gtk2-2.24.29_2 depends on shared library: libcups.so - not fou= nd =3D=3D=3D> cups-2.1.4 depends on shared library: libavahi-client.so - not= found =3D=3D=3D> avahi-app-0.6.31_5 depends on shared library: libdbus-glib-1.s= o - not found =3D=3D=3D> dbus-glib-0.104 depends on shared library: libdbus-1.so - not = found =3D=3D=3D> dbus-1.8.20 depends on executable: xmlto - not found =3D=3D=3D> xmlto-0.0.28 depends on executable: w3m - not found =3D=3D=3D> w3m-0.5.3_5 depends on shared library: libgtk-x11-2.0.so - not= found =3D=3D=3D> gtk2-2.24.29_2 depends on shared library: libcups.so - not fou= nd =3D=3D=3D> cups-2.1.4 depends on shared library: libavahi-client.so - not= found =3D=3D=3D> avahi-app-0.6.31_5 depends on shared library: libdbus-glib-1.s= o - not found It seems devel/dbus requires xmlto to install MANPAGES and xmlto itself requires dbus. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-gnome@freebsd.org Fri Dec 2 10:33:43 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 72E41C62CFD for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 5C8711F0A for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 5BEA2C62CFA; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5B9A8C62CF8 for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0FA1F09 for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB2AXgOi081157 for ; Fri, 2 Dec 2016 10:33:43 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214999] [PATCH] audio/pulseaudio: Fix OpenSSL 1.1. compatibility Date: Fri, 02 Dec 2016 10:33:42 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: m.r.sopacua@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: gnome@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 10:33:43 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214999 Bug ID: 214999 Summary: [PATCH] audio/pulseaudio: Fix OpenSSL 1.1. compatibility Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: gnome@FreeBSD.org Reporter: m.r.sopacua@gmail.com Keywords: patch Assignee: gnome@FreeBSD.org Flags: maintainer-feedback?(gnome@FreeBSD.org) Created attachment 177599 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177599&action= =3Dedit Patch to fix openssl 1.1. compatibility Pulseaudio does not compile with OpenSSL 1.1 due to member access of now op= aque structures. Verbatim patch already applied and forthcoming upstream. Obtained from: https://bugs.freedesktop.org/show_bug.cgi?id=3D96726 --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-gnome@freebsd.org Fri Dec 2 10:33:43 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2BDF8C62CF0 for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 15FF11F07 for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 1274AC62CEF; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 121A7C62CEE for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 026511F06 for ; Fri, 2 Dec 2016 10:33:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB2AXgOe081157 for ; Fri, 2 Dec 2016 10:33:42 GMT (envelope-from bugzilla-noreply@freebsd.org) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: maintainer-feedback requested: [Bug 214999] [PATCH] audio/pulseaudio: Fix OpenSSL 1.1. compatibility Date: Fri, 02 Dec 2016 10:33:42 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: gnome@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 10:33:43 -0000 Melvyn Sopacua has reassigned Bugzilla Automation 's request for maintainer-feedback to gnome@FreeBSD.o= rg: Bug 214999: [PATCH] audio/pulseaudio: Fix OpenSSL 1.1. compatibility https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214999 --- Description --- Created attachment 177599 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177599&action= =3Dedit Patch to fix openssl 1.1. compatibility Pulseaudio does not compile with OpenSSL 1.1 due to member access of now op= aque structures. Verbatim patch already applied and forthcoming upstream. Obtained from: https://bugs.freedesktop.org/show_bug.cgi?id=3D96726 From owner-freebsd-gnome@freebsd.org Fri Dec 2 16:40:25 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5CD43C62E9A for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 46AEA1C00 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 4329FC62E98; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 42D6AC62E97 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 328401BFF for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB2GeO4d083369 for ; Fri, 2 Dec 2016 16:40:25 GMT (envelope-from bugzilla-noreply@freebsd.org) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: maintainer-approval requested: [Bug 212004] net/freerdp: Update to 2.0.0.d : [Attachment 177608] Patch to update net/vinagre to 3.22.0 Date: Fri, 02 Dec 2016 16:40:24 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 16:40:25 -0000 Ting-Wei Lan has asked gnome@FreeBSD.org for maintainer-approval: Bug 212004: net/freerdp: Update to 2.0.0.d https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 Attachment 177608: Patch to update net/vinagre to 3.22.0 https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177608&action=3Dedit --- Comment #34 from Ting-Wei Lan --- Created attachment 177608 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177608&action= =3Dedit Patch to update net/vinagre to 3.22.0 Updated patch that seems to work with freerdp 2016.11.24. I will submit it = to upstream for reviewing. From owner-freebsd-gnome@freebsd.org Fri Dec 2 16:40:25 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C88E9C62EA2 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id B1AFE1C04 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id B1171C62EA1; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B0C9BC62EA0 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A03571C03 for ; Fri, 2 Dec 2016 16:40:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB2GeO4j083369 for ; Fri, 2 Dec 2016 16:40:25 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Fri, 02 Dec 2016 16:40:25 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: lantw44@gmail.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: attachments.isobsolete flagtypes.name attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 16:40:25 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 Ting-Wei Lan changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #177457|0 |1 is obsolete| | Attachment #177457|maintainer-approval?(gnome@ | Flags|FreeBSD.org) | Attachment #177608| |maintainer-approval?(gnome@ Flags| |FreeBSD.org) --- Comment #34 from Ting-Wei Lan --- Created attachment 177608 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177608&action= =3Dedit Patch to update net/vinagre to 3.22.0 Updated patch that seems to work with freerdp 2016.11.24. I will submit it = to upstream for reviewing. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Fri Dec 2 21:56:10 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2E0CDC620D6 for ; Fri, 2 Dec 2016 21:56:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 177E3FD0 for ; Fri, 2 Dec 2016 21:56:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 1402EC620D5; Fri, 2 Dec 2016 21:56:10 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 13A3DC620D4 for ; Fri, 2 Dec 2016 21:56:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0351CFCF for ; Fri, 2 Dec 2016 21:56:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB2Lu98f044719 for ; Fri, 2 Dec 2016 21:56:09 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 214289] x11-wm/mutter: Update to 3.18.4 Date: Fri, 02 Dec 2016 21:56:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: patch, patch-ready X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: cpm@freebsd.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: cpm@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: assigned_to Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Dec 2016 21:56:10 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214289 Carlos J. Puga Medina changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|gnome@FreeBSD.org |cpm@freebsd.org --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-gnome@freebsd.org Sat Dec 3 00:44:57 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6DBBDC62DEA for ; Sat, 3 Dec 2016 00:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 574ED1033 for ; Sat, 3 Dec 2016 00:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 52EBDC62DE7; Sat, 3 Dec 2016 00:44:57 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 52961C62DE6 for ; Sat, 3 Dec 2016 00:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 427871032 for ; Sat, 3 Dec 2016 00:44:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB30iuXb060188 for ; Sat, 3 Dec 2016 00:44:57 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Sat, 03 Dec 2016 00:44:57 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: woodsb02@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Dec 2016 00:44:57 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 --- Comment #35 from Ben Woods --- (In reply to Ting-Wei Lan from comment #34) Hi Ting-Wei Lan, Is it possible that this patch (or similar) could be applied to vinagre 3.1= 8 to allow it to work with freerdp2 2016.11.24? I ask because I believe it is normal for vinagre to be updated to new versi= ons in line with the entire gnome desktop, which remains at version 3.18 in por= ts for now. Thoughts? --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Sat Dec 3 17:29:27 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 930FDC65FEB for ; Sat, 3 Dec 2016 17:29:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 7CC69932 for ; Sat, 3 Dec 2016 17:29:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 7C204C65FEA; Sat, 3 Dec 2016 17:29:27 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7BCC1C65FE9 for ; Sat, 3 Dec 2016 17:29:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6BB06931 for ; Sat, 3 Dec 2016 17:29:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB3HTRds075888 for ; Sat, 3 Dec 2016 17:29:27 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Sat, 03 Dec 2016 17:29:27 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: lantw44@gmail.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Dec 2016 17:29:27 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 --- Comment #36 from Ting-Wei Lan --- (In reply to Ben Woods from comment #35) I tried to keep PORTVERSION at 3.18.2. All patches in files directory could= be successfully applied, but vinagre could not be built: plugins/rdp/vinagre-rdp-tab.c:1127:13: error: no member named 'DisableEncryption' in 'struct rdp_settings' settings->DisableEncryption =3D FALSE; ~~~~~~~~ ^ 7 warnings and 1 error generated. --=20 You are receiving this mail because: You are on the CC list for the bug.= From owner-freebsd-gnome@freebsd.org Sat Dec 3 17:55:06 2016 Return-Path: Delivered-To: freebsd-gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5E37FC6579D for ; Sat, 3 Dec 2016 17:55:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 4784619B4 for ; Sat, 3 Dec 2016 17:55:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 46E72C6579C; Sat, 3 Dec 2016 17:55:06 +0000 (UTC) Delivered-To: gnome@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 468E2C6579B for ; Sat, 3 Dec 2016 17:55:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3625B19B3 for ; Sat, 3 Dec 2016 17:55:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uB3Ht5uD039781 for ; Sat, 3 Dec 2016 17:55:06 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: gnome@FreeBSD.org Subject: [Bug 212004] net/freerdp: Update to 2.0.0.d Date: Sat, 03 Dec 2016 17:55:05 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: bsdports@kyle-evans.net X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: woodsb02@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Dec 2016 17:55:06 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D212004 --- Comment #37 from Kyle Evans --- Created attachment 177636 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D177636&action= =3Dedit svn(1) diff, makefile only Hi woodsb02@, After reviewing your proposed patch, it all looks good- but I counter-propo= se the attached patch in place of your Makefile patch. I applied yours, then m= ade the following changes: 1.) Added back in the BROKEN=3D, so that users of affected versions (to inc= lude 11.0-RELEASE) are notified. 2.) Removed redundant xcursor in X11_USE (reported by z7dr6ut7gs@snkmail.co= m, PR 214956) 3.) Added in jbeich@'s recommended aarch64 NEON bits If this looks good, I'd also like to ping jbeich@ and mikael.urankar@gmail.= com so that they can take a peek at the revised form and make sure it still loo= ks OK to them if they wish to. --=20 You are receiving this mail because: You are on the CC list for the bug.=