01.13.15

Gemini version available ♊︎

Links 13/1/2015: Galaxy A7, Linux Mint 17.1 Reviews

Posted in News Roundup at 6:06 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source software platform released by Lockheed Martin

    Lockheed Martin software engineers have created a platform for easing big data analysis for developers and non-developers and are open sourcing the project on GitHub, a well-known web-based hosting service.

  • 6 excellent open source network monitoring tools

    There are tools that notify users when problems occur as well as when problems have been solved. And others are very good at spotting just about anything out of the ordinary or providing analysis of trends.

  • Three Pillars Of Open Source Governance

    Open source software has morphed from its underground DIY roots to become a common tool that runs essential parts of many businesses. In turn, commercial companies have sprung up around open source projects. These companies make money offering updates, support, and services.

    The intersection of open source and commercial interests raises questions about authority, authenticity, and culture.

    Is the project driven by the commercial sponsor or outside contributors? Will commercial interests trump the wishes of the community? How and where do you draw lines between a commercial entity and the open source community?

  • Top 5 open source project management tools in 2015

    Last year, I covered five of the best open source project management tools, like ProjectLibre and OpenProject. The article struck a chord with readers and continues to prove valuable. So, this year I revisited the tools mentioned in last year’s article, taking into account comments and suggestions from readers, and provided an update on where they are today. Next, I share five new open source project management tools for 2015. All in all, this article will give you a good look at 11 of the top open source project management tools out there.

  • Events

    • Free embedded computing conference posts agenda

      “Tomorrow’s Internet of Things will be built as an orchestration of hardware and software platforms, many of which will be built on Linux,” states the RTC Group in its RTECC event announcement. Attendees will have the opportunity to grab a copy of the most recent free RTC Magazine, featuring a cover that asks: “Linux: Can it run everywhere?”

    • Consumer Electronics Show 2015: Open source highlights

      The 48th annual Consumer Electronics Show (CES) has come and gone, bringing with it some exciting new open source platforms and products. While it’s difficult to capture every open source announcement and unveiling that happened last week, let’s take a look at a few of the highlights:

    • Linux.Conf.Au 2015 Kicks Off In Auckland

      This year’s LCA 2015 keynotes include Linus Torvalds, Bob Young, and Eben Moglen. For those not down under attending the conference, at least there’s usually top-notch videos of the keynotes and various sessions that are available in the weeks ahead. I’ll also be monitoring for the slides and other presentation assets to analyze and share on Phoronix.

  • Web Browsers

    • Mozilla

      • Announcing the Mozilla Science Lab Fellowship Program

        With generous support from the Leona M. and Harry B. Helmsley Charitable Trust, we are excited to announce the Mozilla Science Lab’s first Open Science fellowship program. The grant is one of the first investments by the Trust’s new funding program dedicated to collaboration, reproducibility, and infrastructure in biomedical sciences.

      • Firefox 35 Is Ready For Release, Available For Download Now

        In usual Mozilla fashion, Firefox 35.0 is scheduled to be released tomorrow but if you’re so tempted to upgrade to the latest release of this open-source web-browser you can do so tonight.

  • Oracle/Java/LibreOffice

  • Project Releases

    • rfoaas 0.1.1

      A brand new and shiny version of rfoaas is now on CRAN. The rfoaas package provides an interface for R to the most excellent FOAAS service–which provides a modern, scalable and RESTful web service for the frequent need to tell someone to f$#@ off.

    • Early Preview Release Of Git 2.3

      Beyond announcing Git v2.2.2 on Monday with various bug-fixes, Junio Hamano announced the release of Git 2.3.0-rc0 as a preview release towards Git 2.3.

  • Openness/Sharing

    • Open Access/Content

      • Meet the open access dinosaurs of the year

        As we enter 2015, it’s a good time to reflect on the state of paleontology and the state of open access. Because I’m a dinosaur paleontologist (my apologies to the other 99% of life that ever lived), this post will of course address that clade in particular!

        Thirty-eight new genera or species of dinosaur were announced in 2014 (according to my count based on a list at Wikipedia and the dinosaur genera list), spanning everything from sauropods to tyrannosaurs to horned dinosaurs. Seventeen of these were published in open access or free-to-read journals. This works out to around 45%.

    • Open Hardware

      • Open Source Hardware Advances Science,Technology

        On June 12, 2014 Elon Musk caused a stir by announcing Tesla’s decision to open its patents. To many, Tesla’s bold move signaled the beginning of an era and an open call for open source.

Leftovers

  • Hardware

    • making it work

      Linus recently noted that many-core (1000+ core) computing will never happen because software doesn’t work with it. Fortunately for us, Linus is a man of limited vision and is wrong about the inevitability of that outcome because he makes a flawed assumption: we will continue writing software the way we currently do. He is right that if we keep writing software the way we do, many-core will not happen. Even multi-system will run into limits, particularly on the client side. However, we don’t need to keep writing software the way we do.

  • Health/Nutrition

    • Fall in life expectancy raises alarm amid fears that cuts and pressure on NHS may be to blame for earlier deaths

      Health officials are investigating a “statistically significant, sustained” decline in life expectancy among elderly people in some parts of England, amid warnings that cuts to social care and pressures on the NHS may be contributing to earlier deaths.

    • EU lawmakers pass controversial GMO food law

      EU lawmakers on Tuesday approved controversial legislation to allow EU member states to decide for themselves whether to allow cultivation of Genetically Modified foods after years of bitter dispute.

      “This agreement will ensure more flexibility for member states who wish to restrict the cultivation of the GMOs in their territory,” said Liberal Democrat MEP Frederique Ries who steered the legislation through the assembly.

      For some of the 28 European Union nations such as France, GMO foods are a potential threat to public health and the reputation and integrity of its famed agricultural produce.

  • Security

  • Defence/Police/Secrecy/Aggression

    • The Centcom ‘hack’ that wasn’t

      Hackers claiming links to the Islamic State have hijacked several social media accounts belonging to U.S. military’s Central Command. The hacking group, which calls itself “CyberCaliphate,” is tweeting out what the group claims are U.S. military PowerPoints and data on retired Army personnel — seemingly sensitive files that have no business being publicly aired. The images are meant to show that the hackers have penetrated the Pentagon’s network. But the chances of this actually having happened appear rather slim. Here’s why.

    • Manipulation of Terror

      Nationalists are spreading hate, fanatics are attacking Muslims, governments are capitalizing on this tragedy.

  • Transparency Reporting

    • WikiLeaks: not perfect, but more important than ever for free speech

      The secret CIA files appeared just before Christmas. One detailed how CIA operatives could maintain cover, using fake IDs, when travelling through foreign airports. Israel’s Ben Gurion airport was said to be one of the hardest to trick.

      The other document, from 2009, was an assessment of the CIA’s assassination program. It raised doubts about the effectiveness of the program in reducing terrorism. Likewise with Israel’s killing of Palestinians.

      In Afghanistan, the CIA discovered that murdering Taliban leaders could radicalise the militants, allowing even more extreme actors to enter the battlefield. The Obama administration ignored this advice and unleashed “targeted killings” in the country. Unsurprisingly, the insurgency is thriving.

  • Privacy

    • David Cameron’s internet surveillance plans rival Syria, Russia and Iran

      What David Cameron thinks he’s saying is: “We will command all the software creators we can reach to introduce back doors into their tools for us.” There are enormous problems with this: there’s no back door that only lets good guys go through it. If your WhatsApp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (such as those who fed sensitive information to the tabloids who were implicated in the phone-hacking scandal – and like the high-level police who secretly worked for organised crime for years) and criminals will eventually discover this vulnerability. They – and not just the security services – will be able to use it to intercept all of our communications, from the pictures of your kids in your bath you send to your parents to the trade secrets you send to co-workers.

    • WhatsApp and iMessage could be banned under new surveillance plans

      David Cameron could block WhatsApp and Snapchat if he wins the next election, as part of his plans for new surveillance powers announced in the wake of the shootings in Paris.

    • UK government could ban encrypted communications with new surveillance powers

      Britain’s Prime Minister, David Cameron, is calling for new surveillance powers in the wake of the recent shootings in Paris. Speaking at a public event in the UK this morning, Cameron outlined the government’s stance on secure communications that can’t be read by police or government agencies. “In our country, do we want to allow a means of communication between people which […] we cannot read?” he asked, comparing letters and phone conversations to encrypted communications used online, adding that “we must not” allow a means of communication where individuals can communicate in secret over the internet.

    • David Cameron Should Worry You

      It should have come as a surprise to nobody that leaders around the world are jumping on the Charlie Hedbo attacks in Paris as a means to justify increased warrantless surveillance.

      What you should take away from his statement is that he’s willing to encroach on the civil liberties of millions of British people in a misguided attempt to increase national security. We know from leaked NSA slides (see left) that this has always been the desire of the surveillance arms of the UK and US governments. Now, they’re using the fear that Paris generated to pass legislation.

    • Max Hastings embraces ‘der Deutsche Blick’

      It is concerning that, in the midst of citing the “coherent doctrine[s]” of Nazism and the Eastern Bloc, Hastings advocates their “everything about everyone” methods of domestic surveillance. The NSA’s term is “collect it all”. Apparently, Hastings is blind to the danger of history repeating, a history that includes MI5 finding itself with “very little to do” by the early 1970s, and turning (in the 1980s) on the people it was supposed to protect (see: DS19, and F branch) – surveilling for the first time with data banks and networks. By the 1990s, whistleblowers were reporting that Hastings’ “few mavericks, [...] who abuse such power” were a majority within positions of power, and broadly ignoring the Act of Parliament (1989) meant to curtail the agency’s excesses. Without oversight, institutions are as likely to devolve as reform, and Hastings’ outdated deference creates the space for further abuses.

    • U.K. Prime Minister David Cameron Proposes Banning End-to-End Encryption
    • What David Cameron just proposed would endanger every Briton and destroy the IT industry

      What David Cameron thinks he’s saying is, “We will command all the software creators we can reach to introduce back-doors into their tools for us.” There are enormous problems with this: there’s no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal — and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They — and not just the security services — will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.

      [...]

      Cameron is not alone here. The regime he proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.

    • Why MI5 does not need more surveillance powers after the Paris attacks

      Soon after the attacks in Paris last week, the director general of MI5, Andrew Parker, said of the jihadi threat: “Whenever we lose visibility of what they are saying to each other, so our ability to understand and mitigate the threat they pose is reduced.”

      Few would disagree with this sentiment, or in any way underestimate the enormous responsibility counter-terrorist agencies face after the killings, but the coded suggestion that MI5 needs further sweeping surveillance powers to track down terrorists is more controversial, because it doesn’t take into account the facts.

    • George Brandis still struggling with metadata

      While it is perhaps unsurprising, the Attorney-General’s latest attempt to use the Sydney siege and recent events in France as justifications for the government’s mandatory data retention laws is as distasteful as it is misleading.

    • What new snooping powers do PM and MI5 want – and what are the concerns?
    • In wake of Paris attacks, French surveillance gets a closer look

      French President Francois Hollande chaired an emergency meeting Monday morning with key cabinet ministers and heads of police and security services to discuss how persons known to the country’s intelligence community were still able to coordinate violent raids in Paris. But just days before the attacks on the offices of satirical magazine Charlie Hebdo left 12 dead and wounded another 11, a controversial new law, broadly expanding the French government’s surveillance powers, went into effect.

    • MI6 forced to show how it may snoop on privileged lawyer-client exchanges

      MI6 has been forced to reveal documents detailing how it may access legally privileged communications between solicitors and their clients, even if the lawyers are suing the government.

      Policy guidance handed over to the civil liberties organisation Reprieve shows how the Secret Intelligence Service (SIS) is attempting to regulate its mass surveillance practices and demonstrate compliance with the law.

      The revelations have emerged from a case brought by lawyers for two Libyans, Abdel-Hakim Belhaj and Sami al-Saadi, who, along with their families, were abducted in a joint MI6-CIA operation and sent back to Tripoli to be tortured by Colonel Muammar Gaddafi’s regime in 2004.

      Their complaint about illegal monitoring is being heard before the investigatory powers tribunal and a full trial of the issues is expected this spring.

      Exchanges between lawyers and their clients enjoy a special protected status under UK law. Following exposure of widespread monitoring by the US whistleblower Edward Snowden in 2013, Belhaj’s lawyers feared that their exchanges with their clients could have been compromised by GCHQ’s interception of phone conversations and emails.

    • After Paris: More Intelligence, not More Surveillance

      This is the extraordinary thing about mass surveillance. Every time it fails, its supporters use it as evidence that we must have more (even though blanket surveillance is no longer possible in the EU.) If something doesn’t work, you shouldn’t do more of it, but something different and more effective. One of the striking things to emerge from the report on intelligence matters relating to the murder of Fusilier Lee Rigby, which I wrote about back in November, was that the UK intelligence services simply didn’t have enough people to follow up all the leads they had. So the idea that we need *more* surveillance data, more false positives, more leads to follow up, is clearly folly.

    • What you ‘like’ on Facebook gives away your personality

      Be careful what you “like” on Facebook. You’re opening a small window on your soul.

      A machine-learning algorithm can now predict human personality types using nothing but what people like on the Facebook social media site. A team at Stanford University in California and the University of Cambridge used data from a questionnaire filled out by 86,000 people that identified their “big five” personality traits. The results were correlated with their Facebook activity.

      On the basis of between 100 and 150 Facebook likes, the team’s algorithm could determine someone’s personality more accurately than could their friends and family, and nearly as well as their spouse.

    • Ever liked a film on Facebook? You’ve given the security services a key to your soul

      Why on earth does David Cameron feel the need to call for new digital powers for the security services when they are only beginning to use the ones they already have? Suppose you wanted personality profiles of a quarter of the population of England? Turns out you can mine them from Facebook with publicly published algorithms. About half the adult population of England uses Facebook at least once a month. About a quarter of us have “liked” more than 250 things there. So it’s really disconcerting to discover that completely banal acts on Facebook can add up to a quite detailed psychological profile.

  • Civil Rights

    • Risen finally off hook in leak trial

      New York Times reporter James Risen won’t be called to the witness stand at a leak trial for one of his alleged sources, but jurors may hear some of the words he uttered at a pre-trial hearing last week, according to lawyers and the judge overseeing the case.

    • Feds want Risen out of leak trial

      Federal prosecutors who have decided after a seven-year legal battle not to call New York Times reporter James Risen in the leak trial of one of his alleged sources are now intent on making sure the defense in the case can’t call Risen either—or even talk about the government’s decision not to call him.

    • Psychologists provided legal cover for US torture programs in exchange for status and power, book shows

      James Risen’s new book “Pay Any Price: Greed, Power and Endless War” spells out how the American Psychological Association and the US security apparatus worked together, towards mutually beneficial aims, to cloak the government’s torture programs in a mask of legality. Essentially, the APA gave the military what it wanted—claims that the torture programs were medically sound—in exchange for power and prestige.

      The story is simultaneously pathetic and horrifying.

      Risen describes how in 2002, the APA changed its ethical guidelines to allow members to do things that violate the APA code of ethics, as long as the psychologists were following the law or what they called “governing legal authority.” As long as the US government said it was ok, the APA’s members could engage in torture—its own ethics rules be damned. As Risen observes, the “change introduced the Nuremberg defense into American psychology—following lawful orders was an acceptable reason to violate professional ethics.” Always a bad sign when one begins to take legal cues from Nazis.

    • “Insider Threat” Program Lags Behind Schedule

      Currently, the anticipated achievement of an Initial Operating Capability for insider threat detection by January 2017 is “at risk,” according to a new quarterly progress report. Meanwhile, the date for achieving a Full Operating Capability cannot even be projected. See “Insider Threat and Security Clearance Reform, FY2014, Quarter 4.”

    • The Corrupt Philanderer Who Built the CIA’s Black Sites

      Democratic deliberation rests on the premise that ideas, once exposed to the public—unfolded, challenged, tested, and disputed—will stand or fall on their own merit. The bureaucratic drive for secrecy rests, in many cases, on a need to keep information out of the hands of individuals who could use it to harm the bureaucracy. The bureaucrat will invariably say that an enemy could use the information to harm the country, but more often than not the real concern originates with the bureaucrat personally or the office where he or she works.

    • America’s over-policing bombshell: How new data proves “stop & frisk” critics were right all along

      People are talking about the police a lot these days. The killing of unarmed residents. The killing of cops. Disputes between New York City mayor Bill de Blasio and rank-and-file officers over issues of respect. And yet, a policing issue that totally consumed and divided New York and the nation in recent years now garners little mention: the NYPD’s stop-and-frisk policy.

      One big reason, of course, is that the tactic is used much less now. But another is that, while few have announced it, the debate over the once hotly divisive practice is effectively over. As new data this week confirmed, when it comes to whether a city can reduce crime without stopping-and-frisking enormous numbers of its residents of color, one side was right and one was wrong.

    • The VICE News Interview: Joseph Hickman

      According to the US government, three detainees — all imprisoned as part of the global war on terror — hung themselves in their cells that night. But Army Staff Sergeant Joseph Hickman, who was on guard that night at Camp Delta, came to believe something very different: that the three men were murdered in a secret CIA black site at Guantanamo.

    • Hotter Than Lava

      Every day, cops toss dangerous military-style grenades during raids, with little oversight and horrifying results.

    • Politicians apply double standard in support of David Petraeus amid FBI leaks inquiry

      Though under investigation by the FBI for unauthorized disclosure of classified information related to an affair with his biographer, David Petraeus counts among his defenders a host of prominent politicians who typically denounce security leaks.

      The former US army general and CIA director has deep ties to a bipartisan host of political heavyweights, from potential Democratic presidential nominee Hillary Clinton to former Republican presidential nominee John McCain, and a well of media support stemming from his stewardship of the 2007-08 Iraq troop surge. Many have raced to support Petraeus in the days since word emerged that the most acclaimed military officer of his generation might face felony charges.

    • Obama & Counterterror: The Ignored Record

      Torture, paradoxically, has been the area where Obama’s policy has been both the firmest and the most qualified. By all available evidence, use of the “enhanced interrogation techniques” has stopped. Obama also prohibited further use of secret detention facilities where suspects had “disappeared” in CIA custody for torture. (To be fair, Bush by the end of his presidency seemed to have ended both too.)

    • Guantanamo Bay: A ‘Battle Lab’ Where Personnel Experimented on Prisoners to Develop Torture Techniques

      On the thirteenth anniversary of the first prisoners brought to Guantanamo Bay, a report from the Seton Hall Law Center for Policy and Research examines how the United States government used the facility as a “battle laboratory.”

      Prisoners were treated like “test subjects” as personnel, including medical officers, engaged in experiments to develop new interrogation techniques. Numerous detainees were drugged upon arrival to help interrogators break them. One prisoner, Mohammed al-Qahtani, was treated like a “lab rat” and monitored closely by medical personnel to determine if his body could continue to be tortured.

    • “Circus of Hypocrisy”: Jeremy Scahill on How World Leaders at Paris March Oppose Press Freedom

      An estimated 3.7 million people rallied across France on Sunday in response to the Charlie Hebdo shootings and ensuing attacks that left 17 people dead. More than a million people marched in Paris, making it the largest demonstration in French history. More than 40 world leaders traveled to Paris to help lead the march. “What we saw on display on the one hand was very heartening, to see so many people come into the streets,” says Jeremy Scahill, co-founder of The Intercept. “But on the other hand, this is a sort of circus of hypocrisy when it comes to all of those world leaders who were marching at the front of it. Every single one of those heads of state or representatives of governments there have waged their own wars against journalists.”

    • The Intercept Found Serial’s Elusive Jay, but Can It Find a Profitable Future? [UPDATED]
    • Consent of the Governed

      Recent polling data confirms that a majority of Americans — in some cases a vast majority — have very low levels of trust in our ruling institutions. Only about a fifth of the population has a lot or great deal of trust in big business. Americans have an all-time historic low level of trust for the US Congress — a minuscule 7 percent — and distrust in the government as a whole is at an historic high: 81 percent. Though these numbers are abysmal, the troubling aspect of the reporting is that the numbers continue to trend in the wrong direction. Meaning, it will likely get worse without corrective action. This condition is more serious than some realize.

    • I Helped Create Gitmo. Now I Want It Shut Down.

      Thirteen years ago this month, I arrived in Guantanamo Bay, Cuba, as the commander, Joint Task Force 160, charged with constructing and operating a detention facility to hold Taliban and al Qaeda detainees. Today the detention facility at Guantanamo is a blight on our history, and it should be closed.

    • Nigeria’s Horror in Paris’s Shadow

      Why a 10-year-old suicide bomber isn’t front-page news

  • Internet/Net Neutrality

  • Intellectual Monopolies

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  2. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  3. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  4. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  5. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  6. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  7. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  8. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  9. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  10. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  11. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  12. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  13. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  14. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day



  15. The Web is a Corporate Misinformation/Disinformation Platform, Biased Against Communities, Facts, and Science

    Misinformation/disinformation in so-called 'news' sites is a pandemic which spreads; in the process, the founder of GNU/Linux gets defamed and GNU/Linux itself is described as the problem, not the solution to the actual problems



  16. Links 20/1/2022: McKinsey Openwashing and Stable Kernels

    Links for the day



  17. IRC Proceedings: Wednesday, January 19, 2022

    IRC logs for Wednesday, January 19, 2022



  18. Links 20/1/2022: Linuxfx 11.1 WxDesktop 11.0.3 and FreeIPMI 1.6.9 Released

    Links for the day



  19. Links 19/1/2022: XWayland 22.1 RC1 and OnlyOffice 7.0 Release

    Links for the day



  20. Links 19/1/2022: ArchLabs 2022.01.18 and KDE's 15-Minute Bug Initiative

    Links for the day



  21. When Twitter Protects Abusers and Abuse (and Twitter's Sponsors)

    Twitter is an out-of-control censorship machine and it should be treated accordingly even by those who merely "read" or "follow" Twitter accounts; Twitter is a filter, not a news/media platform or even means of communication



  22. IRC Proceedings: Tuesday, January 18, 2022

    IRC logs for Tuesday, January 18, 2022



  23. Links 19/1/2022: Wine 7.x Era Begins and Istio 1.12.2 is Out

    Links for the day



  24. Another Video IBM Does Not Want You to Watch

    It seems very much possible that IBM (or someone close to IBM) is trying to purge me from Twitter, so let’s examine what they may be trying to distract from. As we put it 2 years ago, "Watson" is a lot more offensive than those supposedly offensive words IBM is working to purge; think about those hundreds of Red Hat workers who are black and were never told about ethnic purges of blacks facilitated by IBM (their new boss).



  25. What IBM Does Not Want You to Watch

    Let's 'Streisand it'...



  26. Good News, Bad News (and Back to Normal)

    When many services are reliant on the integrity of a single, very tiny MicroSD card you're only moments away from 2 days of intensive labour (recovery, investigation, migration, and further coding); we've learned our lessons and took advantage of this incident to upgrade the operating system, double the storage space, even improve the code slightly (for compatibility with newer systems)



  27. Someone Is Very Desperate to Knock My Account Off Twitter

    Many reports against me — some successful — are putting my free speech (and factual statements) at risk



  28. Links 18/1/2022: Deepin 20.4 and Qubes OS 4.1.0 RC4

    Links for the day



  29. Links 18/1/2022: GNOME 42 Alpha and KStars 3.5.7

    Links for the day



  30. IRC Proceedings: Monday, January 17, 2022

    IRC logs for Monday, January 17, 2022


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts