Bonum Certa Men Certa

Links 18/5/2021: Steam Console and OpenPrinting Developing Upstream CUPS



  • GNU/Linux

    • Desktop/Laptop

      • System76 Launch is an open-source hardware, configurable keyboard - CNX Software

        System76 Launch keyboard ships with alternatives keycaps with different colors, a key puller, and USB cables to connect to the host device. The four USB ports allow you to connect devices like thumb drives or USB SSD’s to the computer/phone/board via the keyboard.

        The QMK firmware running on the USB keyboard is also compatible with some other keyboards, and you can also access the KiCAD hardware design files, and CAD files for the chassis on Launch’s Github repo, while the Keyboard Configurator is part of pop-os repo.

      • 10 Top Most Popular Linux Distributions of 2021

        We are almost half of the year 2021, we thought it right to share with Linux enthusiasts out there the most popular distributions of the year so far. In this post, we will review the top 10 most popular Linux distributions based on the usage statistics and market share.

        DistroWatch has been the most reliable source of information about open-source operating systems, with a particular focus on Linux distributions and flavors of BSD. It collects and presents a wealth of information about Linux distributions consistently to make them easier to access.

        Although it is not a good indicator of a distribution’s popularity or usage, DistroWatch remains the most accepted measure of popularity within the Linux community. It uses Page Hit Ranking (PHR) statistics to measure the popularity of Linux distributions among the visitors of the website.

      • 5 Lightweight Linux Desktop Environments For Older Computers

        Many of us own old computers, and old computers need low resources-constrained GUI’s to be used on them. In this article, we are going to talk about lightweight linux desktop environments to install on your old computer to revive it again.

        There are many other window managers.. however, you can install any window manager you want besides some useful desktop tools like Tint2 (a nice panel which shows the current opened windows and time), Screenlets ( the famous desktop gadgets program ), Conky ( a nice system monitor gadget for your desktop ) beside any other tools that you may like.

        Do you own an old computer? What software did you install on it? And what do you think about creating your own customizable desktop with 3rd party programs?

    • Benchmarks

      • GCC 11 vs. LLVM Clang 12 Performance On The Intel Core i9 11900K Is A Heated Race

        For those wondering how GCC and LLVM Clang are competing when running on Intel's latest Rocket Lake processors, here are some GCC 11 vs. LLVM Clang 12 compiler benchmarks with the Core i9 11900K running from the newly-released Fedora Workstation 34 featuring these very latest compilers. The compiler benchmarks were carried out at multiple optimization levels on each compiler.

        As part of our ongoing benchmarks of GCC 11 vs. LLVM Clang 12 given these fresh open-source compiler releases, today's comparison is looking at the Core i9 11900K "Rocket Lake" performance. With both GCC and LLVM Clang, the benchmarks were carried out three times with varying CFLAGS/CXXFLAGS. Those flags included...

    • Applications

    • Instructionals/Technical

      • How to Exclude in Grep

        grep is a powerful command-line tool that is used to search one or more input files for lines that match a regular expression and writes each matching line to standard output.

        In this article, we’re going to show you how to exclude one or multiple words, patterns, or directories when searching with grep.

      • Compressing & Archiving files and directories - Unixcop

        Archiving is the process of combining multiple files and directories (same or different sizes) into one file. in the second place compression is the process of reducing the size of a file or directory.

        Hope you understand the difference between archiving and compression.So now let’s get into the topic.

      • How to Record Linux Terminal Sessions Using Asciinema

        Asciinema (pronounced as-kee-nuh-muh) is an open-source lightweight command-line program created exclusively for recording terminal sessions and sharing them with other Linux users through the web using an embedded code or the source file as required. It aims to be a “go-to” place for each terminal user who wants to share their expertise with others. Or putting it differently, it’s a place to show off your skills.

      • [Older] Backing up and erasing media, disks, and partitions with DD Command

        In this article, we are going to discuss the dd command. The dd command stands for data duplicator. It is mainly used for converting and copying files. In this section, we are going to learn about backing up and erasing a media file.

      • [Older] Creating graphics and presentations on the Linux CLI

        In this article, we are going to learn how to make presentations and how to create graphics on the CLI. For this, we are going to use a tool named dialog.dialog is a Linux command-line tool used for taking input from users and to create message boxes.

      • [Older] Write a bash script to checking for file integrity and tampering

        In this article, we are going to learn how to check the integrity of a file and how to check for tampering by writing a simple shell script. Why do we need to check integrity? The answer is simple: administrators check integrity when there are passwords and libraries present on a server, as well as when files contain highly sensitive data.

      • [Older] Capturing network traffic headlessly in Linux Operating System

        In this article, we are going to learn how to capture traffic. We are going to capture network traffic with a packet sniffer tool called tcpdump. This tool is used to filter or capture TCP/IP packets that are transferred or received over a network.

      • [Older] Finding binary dependencies in Linux Operating System

        In this article, we are going to check the executable. We will find out which string is present in it by using the string command.

      • [Older] Encrypting/decrypting files from a script in Linux

        In this article, we are going to learn about OpenSSL. In this section, we are going encrypt and decrypt messages and files using OpenSSL.

      • [Older] Mounting network file systems and retrieving files in Linux

        In this article, we are going to learn about the mount command. To mount a file system onto the file system tree, use the mount command. This command will instruct the kernel to mount the file system found on a particular device. There is a mount point in the tree for each partition that is mounted.

      • Do you allow the X protocol on your network?

        For most of my Linux-oriented career, the X protocol (TCP port 6000-60nn) that runs over the network has not been allowed. Most security policies ban the X protocol and have it silently blocked on network equipment. I guess I'm OK with that. I've mildly argued the point a few times but I generally accept the walls in which I must operate.

      • Linux lsof Command Tutorial for Beginners (15 Examples)

        The lsof command in Linux displays in its output information about files that are opened by processes. In this article, we will discuss the Linux lsof tool using 15 easy-to-understand examples. Please note that all examples mentioned in this tutorial have been tested on Ubuntu 20.04 LTS, but they will work on other Linux distributions too like Debian, Fedora, and CentOS.

      • What does null mean in Linux and Computing

        In this article, I will give you a short explanation of what the value null or the null device means in the computing world. The value null basically means that a variable has no value. Null is used in most computer programming languages and there is also a so-called null device (/dev/null) in Linux.

      • 6 lesser-known but seriously useful Linux commands | Enable Sysadmin

        People are creatures of habit. That assertion has both good and bad connotations. The good is that we tend to do things the same way every time we do them. The bad part is that we don't tend to venture out from our routines. That routine keeps changes consistent and surprises to a minimum. The last thing any sysadmin wants to hear another sysadmin say is, "Whoops." But, that's a whole other story. Today's topic is unfamiliar commands. Six unfamiliar commands to be exact. I think you'll like these because they're useful and outside the peripheral vision of most sysadmins. They are presented in alphabetical order.

      • Getting started with ReactOS

        ReactOS is a relatively new open-source operating system that resembles the looks of Windows NT and aims to offer similar levels of functionality and application compatibility. Featuring a wine-based user mode, this system doesn't use any of the Unix architecture, but is a rewrite of the NT architecture from scratch, with its very own FAT32 implementation, and completely free of legal implications. That said, this is not yet another Linux distro, but a unique Windows-like system that is a part of the free software world. This quick guide aims at users who want an easy-to-use, open-source replacement for their Windows system.

      • How to Install and Configure Tripwire IDS on Debian 10

        Tripwire is a free and open-source Linux Intrusion Detection System. It is used to detect and report any unauthorized change in files and directories on Linux. It will also send you an alert on email on file/directory changes. Tripwire works by comparing the current filesystem state against a known baseline state and reports if detect any changes.

        In this post, we will show you how to install and configure Tripwire on Debian 10.

      • How to taint a node in kubernetes cluster to avoid pods scheduling on that node - Unixcop

        Tainting a node means you don’t want any pods to be scheduled on that node by kube-scheduler.

      • Difference Between a Hostname and a Domain Name – Linux Hint

        Many people are confused about the concept of Hostname and Domain Name. A good understanding of the basics of DNS or Domain Name System is needed to properly distinguish the two. This will help network administrators to design and secure the network of their organization in the best manner.

        In the following sections, we will explore the concept of Domain Name and Hostname.

      • Linux Du Command Examples – Linux Hint

        The du Linux command is very popular for UNIX and Linux systems. This command is used to view the information about disk usage of all directory tree and files on a machine. This command has various parameter flags or options that helps to view the information of disk usage in many different formats. Using the du command, you can also display the files and directory size details in a repeated manner.

        We will give a brief demo in this article on the different uses of Linux du command with examples.

      • How to Modify a Host File in Linux – Linux Hint

        The host file is a plain text file used by the operating systems to map Domain names to their corresponding IP addresses.

        Although this tutorial focus on the host file in Linux, the host file is available in all operating systems, including Windows and Mac OS.

      • How to Debug SSH Connections – Linux Hint

        This tutorial will go over some quick methods and techniques you can use to diagnose various SSH connections, including when you cannot connect to SSH, Authentication errors, and such.

      • How to Enable Screen Sharing on Debian 10 – Linux Hint

        VNC or Virtual Network Computing is a protocol used to access the graphical desktop environment of your computer and control it from a remote computer. The Screen Sharing feature of the GNOME 3 desktop environment uses the VNC protocol to allow remote access to the GNOME 3 desktop environment of your computer.

        This article will show you how to enable screen sharing on the GNOME 3 desktop environment of Debian 10 and access it from a remote computer. So, let’s get started.

      • The Difference Between a Real User ID and an Effective User ID in the Linux OS – Linux Hint

        Users, as well as groups, are usually classified by numbers rather than titles within the kernel level of the Linux OS. The kernel must be fast and reliable. In addition, the data structures must be minimal, otherwise passing strings around would be ineffective. As a result, each user, as well as group title, is translated to a specific unsigned integer value which is referred to as UserID and group ID, or “UID” and “GID” for easy reference.

      • Linux Cat Command Examples – Linux Hint

        Linux command cat short for ‘concatenate’, is a very useful command. Using the cat command, you can create a file, view file content, concatenate files, and file output redirection. We will discuss the different uses of the cat command with some examples in this article.

      • Linux cp Command Examples – Linux Hint

        While working on a Linux system, copying files and directories is an important task that is performed daily. All users need simple and easy utility through which they can copy all their files and directories. For this purpose, the most common cp command-line utility is used on UNIX and Linux systems.

      • Linux “ls” Command Examples – Linux Hint

        “ls” is one of the most frequently used commands in Linux. It is used to list down the files and sub-directories within your current directory. This command is equally useful for normal users as well as for system administrators. Therefore, today we will share the five most practical use cases of the “ls” command in Linux Mint 20.

      • Linux rmdir Command Examples – Linux Hint

        The rm and rmdir commands in Linux are used to remove files and directories. Both are powerful commands and have very few command-line options. The difference between these commands is that rmdir only removes “empty directories,” and it does not remove files. If you use rmdir to remove a directory that contains files, it will fail with the message “Directory not empty”. If you need to remove a non-empty directory, use the rm command.

        Another point is that when you remove a file or directory using rm and rmdir, it is instantly removed instead of moving towards Trash. Therefore, you will need to be careful while using these commands as you will not recover the removed files and directories unless you have a backup.

        This post will describe how to use the rmdir command to remove directories in Linux and some examples.

      • LVM: How to Create Logical Volumes and Filesystems – Linux Hint

        Logical Volume Management, or LVM, is a system used to manage logical volumes and filesystems. LVM has much more advanced features than the other volume management tools (like gparted) used to divide a disk into one or more partitions. In order to play around with LVM, we need to have concepts about the following terms.

      • How to install the Vivaldi Browser on Deepin 20.2

        In this video, we are looking at how to install the Vivaldi Browser on Deepin 20.2.

      • How To Install Caddy on Ubuntu 20.04 LTS - idroot

        In this tutorial, we will show you how to install Caddy on Ubuntu 20.04 LTS. For those of you who didn’t know, The Caddy web server is an open-source web server written in Go. It is designed around simplicity and security that comes with a number of features that are useful for hosting websites. Caddy is both a flexible, efficient static file server and a powerful, scalable reverse proxy.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Caddy web server on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • How to Make Ubuntu Lighter on a Low Spec Computer? - Fosslicious

        I often read the question above on forums and groups on Facebook that discuss Linux. This is an interesting discussion because there are so many lightweight Linux distributions that can be used smoothly. I've covered some lightweight Linux Distribution for older computers on this blog.

        And this time our discussion will focus on Ubuntu and maybe it can be applied to other Linux distributions!.

        To make Ubuntu or a Linux distribution run smoothly and lightly on a computer that has potato specifications, you can do a few things below!.

      • Digital audio fidelity | Fitzcarraldo's Blog

        Even with my poor hearing I can hear how bad a 128 kb/s mp3 music track sounds, but when you get up to 320 kb/s it’s a different matter. In most cases I can’t hear the difference between 320 kb/s and a 16-bit 44.1 kHz Audio CD, and, as the tests in the above links demonstrate, most people struggle to tell the difference too (watch the video ‘Audiophile or Audio-Fooled? How Good Are Your Ears?‘). Regarding sampling theory, the video ‘Digital Audio: The Line Between Audiophiles and Audiofools‘ is quite good if someone does not understand why 16-bit 44.1 kHz was chosen for Audio CDs. As to finer quantisation and higher frequencies, ‘The Difference Between 24-bit & 16-bit Audio is Inaudible Noise‘.

      • How to install RE:RUN by Dani on a Chromebook

        Today we are looking at how to install RE:RUN by Dani on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

      • How To Configure GRUB2 BootLoader Settings In Ubuntu - Unixcop

        GRUB2 is the latest version of GNU GRUB, the GRand Unified Bootloader. A bootloader is the first software program that runs when a computer starts. It is responsible for loading and transferring control to the operating system kernel. In Fedora, the kernel is Linux.in addition to The kernel then initializes the rest of the operating system.

        GRUB2 is the follower of the previous version GRUB (version 0.9x). The original version is available under the name GRUB Legacy.

        Since Fedora 16, GRUB2 has been the default bootloader on x86 BIOS systems. For upgrades of BIOS systems, the default is also to install GRUB2, but you can opt to skip bootloader configuration entirely.

    • MySQL

      • Using MySQL Dense_Rank() Function – Linux Hint

        The MySQL DENSE_RANK () function is a function that displays the rank of a row in its partition without gaps in the ranking values. This function is a window function, which means it has similarities to functions such as ROW_NUMBER() and RANK() functions.

      • MySQL Replace Function – Linux Hint

        This guide looks at the MySQL replace function that allows us to replace a string in a table column with a new string.

        The replace function is simple and this guide will be a short one. Nonetheless, the replace function can come in handy when you need to update or change values in a table such as broken URL.

      • MySQL Distinct Values Query – Linux Hint

        In most databases, you will often encounter duplicate values—except for unique primary keys. For example, a database can contain a film table with similar ratings, year of release, and other similar values. Hence, to get a list of unique values, such as the various types of movie ratings, we need to get only the unique values using the MySQL distinct keyword.

        This tutorial will go over how to use the distinct keyword in MySQL queries to get unique results.

        Before we begin, we assume you have MySQL installed on your system and can perform operations on the databases.

      • MySQL IN Query – Linux Hint

        In the world of databases, queries are one of the constant things we all implement. Although SQL has ways and conventions for performing specific queries, sometimes it requires us to set custom conditions.

        One of the popular and useful conditional operators in SQL is the IN operator. Using the IN operator, we can get a Boolean value if a specific value is in a list.

        This tutorial will walk you through the IN operator and how to use it to create customized conditions for SQL queries. Before we begin, we assume that you have a MySQL server installed and configured on your system, and you have a sample database with which to work on.

      • How MySQL Deletes With the Delete Join Statements – Linux Hint

        This tutorial will discuss how to use the MySQL DELETE clause in a JOIN statement to delete data from multiple tables that meet the specified condition.

        The purpose of this tutorial is to help you understand how to use the DELETE clause along with the JOIN clause to remove data at once. If you are new to MySQL, consider our other tutorials, such as JOINS and DROP tables tutorials.

      • How MySQL Delete Duplicate Rows – Linux Hint

        MySQL is a relational dataset that stores data in tables that have rows and columns. However, the data stored in the database may contain duplicate values caused by errors in the applications or users.

        In this tutorial, we shall learn how to remove duplicate rows in a MySQL database to reduce database size and help to increase the server’s performance.

      • MySQL Show Users in Database – Linux Hint

        If you have ever tried to get a list of users available in your MySQL server, you will notice there is no native command to do this. For example, to get a list of databases, you can simply query SHOW DATABASES. However, this is not the case for users.

        This guide will show you how you can view the users available in your MySQL using simple and quick commands.

      • How to Create a View in MySQL – Linux Hint

        In MySQL, a view is a virtual table that does not store data but shows data stored in other tables. Views are nothing but SQL queries because they store SQL queries that return a result set. They are also known as virtual tables.

        This tutorial goes over how to create and use MySQL views in your database to perform various actions. For instance, you can use views to hide specific data from users, thus allowing them to view the data stored in a table using a view. Views can also enable developers to create simple and abstract connections to a database.

      • How and When to Use MySQL UUID Type – Linux Hint

        According to space and time, Universal Unique Identifier, known as UUID, is a 128-bit long value that is unique across the globe. The UUID is specified by the RFC 4122. UUID values are incredibly fascinating because even if the values are generated from the same device, they can never be the same. However, I will not get into details about the technologies used to implement UUIDs.

        In this tutorial, we shall focus on the advantages of using UUIDs instead of INT for primary keys, the disadvantages of UUIDs in a database, and how to implement UUIDs in MySQL.

    • Games

      • Is Gabe talking about a new Steam Console?
      • A fresh Steam client goes out with Linux improvements, Steam Input tweaks and more | GamingOnLinux

        Valve has bundled together a bunch of upgrades from recent Beta versions of the Steam client and push out a new stable release of Steam for everyone.

        On the Linux side it now offers "better diagnostics when Steam Play tools cannot be removed due to dependencies and improved the "overall robustness". Along with that, Valve also updated fossilize layer to be compatible with recent Proton Experimental releases.

        For Remote Play, things get better for AMD GPU users as of this release too. It now uses VA-API 0.2 on Linux for optional hardware decode, as long as you have up to date 32-bit libva packages installed and ready. Valve also solved a potential streaming client crash when starting the stream.

      • Aquarium builder Megaquarium gets a huge performance lift in the latest Beta plus big sale | GamingOnLinux

        It seems like Twice Circled are preparing to continue expanding their aquarium building tycoon sim Megaquarium, as a new Beta is out now with some mighty changes.

        Megaquarium was already an absolute gem, especially when you add in the excellent Freshwater Frenzy expansion. Now though? Prepare for it to be better than ever as a new Beta is up to serve as "a foundation upon which Megaquarium can continue to grow" as the developer saw after the expansion and Steam Workshop popularity that "it became clear to me that some parts of the game needed a significant overhaul if the game was going to be able to continue to grow".

      • An interview with the developer of Rocket Shipment

        As far as platforms go, a small portion of sales were to Linux users, but they were by far the most helpful. I love to chat with players in the Rocket Shipment Discord, and have found that most Linux players there are amazing in feedback and support."

      • Augustus, the open source enhanced reimplementation for Caesar 3 gets a huge upgrade | GamingOnLinux

        Ready for more classic city-building? Caesar 3 is a wonderful game from the late 90s and thanks to Augustus (a fork of another project, Julius), you can get a more modern experience with it.

        It's a game engine reimplementation, meaning it provides a new game engine for Caesar 3 that works across modern systems including Linux. Not only that, Augustus provides zoom controls, road blocks, a global labour pool, increased game limits and much more - whereas the Julius reimplementation aims to be accurate to the original.

        Augustus 3.0.0 and 3.0.1 quickly after bring in some huge new features and changes to the project, making it possibly the best time to get into the classic Caesar 3.

      • Cute looking farming-life sim A New Leaf: Memories will be supporting Linux | GamingOnLinux

        Even more developers are giving farming-life sim a chance with A New Leaf: Memories from developer IronHeart Studios and publisher Crytivo. Like many others, they're inspired by the likes of Harvest Moon, Stardew Valley, Story of Seasons, and Animal Crossing but they want to put their own sweet spin on it.

        Currently crowdfunding on Kickstarter, they've got 23 days to go and against their S$43,460 (Singapore Dollars) they've managed to hit over 100% in funding so clearly it's been quite a hit with potential players.

        "You wake up on the beach of a foreign island, unable to recall anything. Alone and equipped with only basic farming tools provided by the town residents, you aim to recover your memories. Complete quests and explore Omoide Island as you unfold your story."

      • SPRAWL is an upcoming hardcore cyberpunk FPS set in a huge megalopolis

        SPRAWL has me excited. A brand new upcoming hardcore first-person shooter, set in a huge cyberpunk megalopolis and it will be coming to Linux.

        "SPRAWL is a hardcore retro FPS set in an endless cyberpunk megapolis. Escape the walled city and take on the militarized government of the sprawl. Fueled by the blood of your enemies and a mysterious voice in your head, make your way towards the spire to topple whatever lays within."

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.22 Beta testing day

          Plasma 5.22 is now in beta, which gives us one month of intense testing, bugfixing and polishing.

          During this time we need as many hands on deck as possible to help with finding regressions, triaging incoming reports and generally being on top of as much as possible.

          To invite everyone to the process we are hosting a "beta review day". Come join us online and do QA with us together as a group.

        • Kdenlive 21.04.1 Released! How to Install it in Ubuntu 21.04, 20.04

          Kdenlive 21.04.1, the first update for the 21.04 release is out. Here’s how to install it in Ubuntu 21.04, Ubuntu 20.10, Ubuntu 20.04 via PPA.

        • Krita’s Google Summer of Code Students

          This year, like every year since its inception, Krita participates in the abbreviated version of the Google Summer of Code program. It’s shorter than it used to be, but let’s see what our students are going to do!

        • Krita Dev Fund Campaign: Second Update!

          Here’s our second update on the state of Krita 5. We’re bringing you these updates to show what’s going on in Krita and why it’s a good idea to join the Krita development fund! There are already more than 100 members of the dev fund! But let’s have some excitement first. The new smudge brush engine landed in Krita’s master branch last week, the culmination of months of work by Dmitry Kazakov and Peter Schatz...

      • GNOME Desktop/GTK

        • Felipe Borges: Let’s welcome our new interns!

          It is that time of the year again when we get to meet our new interns participating in both Outreachy and Google Summer of Code. This year the GNOME Project is proud to sponsor two Outreachy internships for the May-August season and to mentor 12 students in GSoC 2021!

          Our Outreachy projects are listed here, and you can find our GSoC projects here.

    • Distributions

      • [Old] OT: Open letter to the Linux World

        systemd is a coup. It is a subversive interloper designed to destroy Linux as we know it, foisted upon us by the snarky we-know-better-than-you CamelCase crowd. They just don't get it down deep where it matters. systemd is not pointing in a direction that we should be going. It does not encourage freedom. It does not encourage choice. It does not display transparency. It does not embrace simplicity. It seizes control and forces you to cede it. It makes applications and major system components depend on it, and they cannot function without it. It's gaining speed by luring naive or lazy or just plain clueless developers into the fold with the promise of making their lives easier. Buying into this way of thinking ignores the greater dangers that systemd represents.

      • Screenshots/Screencasts

      • IBM/Red Hat/Fedora

        • IBM makes Python distribution platform Anaconda generally available for Linux

          In an effort to help enterprises scale their data science and AI efforts, IBM today announced that the Python distribution platform Anaconda is now available for IBM Z and IBM LinuxONE customers.

          IBM VP Barry Baker wrote in a blog post that the company believes the move will promote more open source AI capabilities by helping data scientists improve their record systems. Anaconda should also help create a more consistent experience for enterprises using a hybrid cloud strategy, he said.

          By pairing Anaconda with IBM Z and LinuxONE platforms, Baker said data scientists can improve security while still having a choice in AI frameworks.

        • Hybrid work model: 4 ways leaders can build trust

          The hybrid work model, in which employees spend some time in the office and the rest working remotely, is emerging as a leading post-pandemic strategy. Employees want to keep the flexibility they’ve had over the past year or so while getting back those elements of the office that they have missed. Employers don’t want to lose their best employees to competitors – a very real risk if they’re inflexible.

          Some roles, especially in technology, financial, and professional services, are well-suited to combine office and remote work. Many employers are trying to align their talent proposition to reflect this while also striving to boost agility and productivity and reduce real estate costs.

        • Hybrid cloud your way: Automating the RHEL registration process

          In a world where workload automation is easier than ever to develop and manual intervention is lessening by the day, are you getting tired of managing your Red Hat subscriptions day in and day out? Spending hours (if not days) managing contract renewals year in and year out? Are you scratching your head wondering why these menial tasks are even still a thing?

          So why are they? Well, let’s look at these ever-advancing technologies first. You’re building a complex enterprise environment, deploying a number of products across your hybrid cloud, tying together a physical environment, mixed with a virtual environment combining some on-prem, and some hosted in <name your favorite public cloud vendor>.

          With this comes the added complexity of elementary SKU logic that’s become increasingly complex with every new SKU variation created over the years. So now you have to be the logical one and say "this system wants this product, and this SKU provides said product." From there you map them together and (crossing fingers and toes and eyes) these systems can now consume the content they are hopefully entitled to. Hold on… why is this a you problem?

        • Transformational leader vs. transactional leader: Which do you want to be?
      • Canonical/Ubuntu Family

        • Ubuntu Touch OTA 17 Released

          Ubuntu Touch, the community developed mobile version of Ubuntu, has just released a brand-new version of their OS. This time, they have been quite light on new features amid their transition to the Ubuntu 20.04 LTS base.

          Here we will be looking at what it is, what new features are present, and what future releases may look like.

        • Full Circle Magazine: Full Circle Weekly News #210

          Interface for smartwatches added to postmarketOS: https://gitlab.com/postmarketOS/pmaports/-/merge_requests/2124

          New Releases of GNUstep Components: https://www.mail-archive.com/info-gnu@gnu.org/msg02888.html

          Armbian Distribution Release 21.05: https://forum.armbian.com/topic/18081-armbian-2105-jerboa/

          SSH client PuTTY 0.75 released: https://lists.tartarus.org/pipermail/putty-announce/2021/000031.html

          Ubuntu RescuePack 21.05 Antivirus Boot Disk Available: https://ualinux.com/ru/news/obnovlen-ubuntu-rescuepack-21-05

          DragonFly BSD 6.0 released: https://www.dragonflydigest.com/2021/05/10/25731.html

          VLC 3.0.14 media player update with vulnerability fixes: https://www.videolan.org/news.html#news-2021-05-10

          Coreboot 4.14 Released: https://blogs.coreboot.org/blog/2021/05/10/announcing-coreboot-4-14/

          Hubzilla 5.6 Released: https://hub.somaton.com/item/28fd7b30-7770-404f-995e-af97ad154187

          IBM opens CodeNet for machine learning systems that translate and validate code: https://research.ibm.com/blog/codenet-ai-for-code

          Credits: Full Circle Magazine @fullcirclemag Host: @bardictriad, @zaivala@hostux.social Bumper: Canonical Theme Music: From The Dust - Stardust

        • The Fridge: Ubuntu Weekly Newsletter Issue 683

          Welcome to the Ubuntu Weekly Newsletter, Issue 683 for the week of May 9 – 15, 2021.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • OpenPrinting Now Developing Upstream CUPS, Apple Bows Out

        Back in 2007 Apple effectively acquired the open-source CUPS project and in 2017 then decided to no longer develop CUPS under the GPL but instead the Apache 2.0 license for this widely-used Unix/macOS/Linux print server. But then at the end of 2019 the CUPS lead developer left Apple and following that public development of CUPS seemingly halted. Fortunately, now there is a happy next chapter to the CUPS printing story.

        Apple has decided not to pursue feature development further on CUPS and upstream feature development has been effectively transferred to the OpenPrinting project. CUPS founder and former Apple employee Michael Sweet presented on this change at this month's Open Printing Summit. Sweet acknowledged that Apple stopped actively developing CUPS when he left the company. But now he's been contracted by Apple to apply important bug fixes from the OpenPrinting fork of CUPS back to the Apple CUPS code-base for macOS. Apple CUPS will continue seeing these bug fixes pulled in from OpenPrinting CUPS but Apple is no longer interested in feature development on this print server.

      • Zabbix 5.4 Release Comes with Scheduled PDF Report Generation

        Zabbix Team announced the availability of Zabbix 5.4.0. The new version comes with several significant improvements.

        Zabbix is an open source, real-time application, and network monitoring tool. It offers monitoring of thousands of metrics collected from physical machines or virtual machines. Zabbix has a web-based management interface which is centralized through a database. With Zabbix, visualization of your data is available in the form of graphs, screens, maps and overviews.

      • How to save up to 500€/year switching from Mailchimp to Open Source Mailtrain and AWS SES

        Mailchimp is more and more expensive following the growth of your newsletter subscribers and you need to leave it. You can use Mailtrain, a web app running on your own server and use the AWS SES service to send emails in an efficient way, avoiding to be flagged as a spammer by the other SMTP servers (very very common, you can try but… you have been warned against 😉

      • SaaS/Back End/Databases

        • A URL shortener with an interesting storage backend

          What if I could tell you that there was a data store you could be using that was redundant and distributed by design, allowed granular caching per record in your dataset, and is incredibly simple to set up and maintain. Snake oil this is not, this is DNS.

          Now, storing data in DNS is not a new fad, in fact I spoke about this back in 2018. More recently there have been countless memes on social media about using Amazon’s Route53 DNS service as a data store, so I felt it was time to upgrade my URL shortener from using YAML to DNS as its storage medium.

      • Openness/Sharing/Collaboration

        • Open Data

          • Interoperable and robust forestry data management

            The initiative was started under the Forestry Department of the Food and Agriculture Organization of the United Nations in 2018 and has been integrated by dozens of countries in their efforts to make forestry data collection and analysis more efficient and flexible. Data obtained and processed with these tools is crucial for decision making related to climate change. Governments, research institutions and NGOs can use this toolset for a wide range of applications, including forest inventories, climate change reporting, socio-economic surveys, biodiversity assessment, land use, deforestation and desertification monitoring and others.

      • Programming/Development

        • Top 10 Open Source snippets manager alternatives to GitHub Gist

          The snippet is a saved template. It is a software system used to save us from needing to type out repetitive, and we can share them across our team company from day to day. You can think of it as the software responsible for managing the programmer code activities.

          It is very useful to allow various units and sectors in companies and organizations to do their routinely teamwork; from managing teamwork to generating codes and tracking programmers… Everything is included in a snippet manager.

          Open-source software has conquered many sectors in the IT industry, from the open-source healthcare domain and open-source appointment scheduler to open source Open-source data backup and open-source project management solutions… They are everywhere.

          [...]

          We have seen in this list many good open-source snippets managers that you may use in your daily life and organization. You can choose one of them depends on what type of features or scenarios your work needs.

        • Is Programming Difficult for Students?

          Computers require unique languages to perform tasks, and these are the programming languages you learn when you study programming. We can thus define programming as the study of computer languages used by computers to perform tasks. They are JavaScript, Python, and C++. Programming has become even more lucrative as a career these days because it is used in various areas of life. This includes smart fridges and other household appliances that respond to command at the touch of a button or when operated from the phone.

        • Integrating systems with Apache Camel and Quarkus on Red Hat OpenShift

          Apache Camel has been a massively successful tool for integrating heterogeneous systems for more than a decade. You have probably dealt with a situation where you have two systems that were not designed to communicate with each other but still need to exchange data. That's exactly the kind of situation where Camel and its integration pipelines can help. This article shows how Quarkus uses Camel.

          Figure 1 shows Camel's basic operation: Data from one system passes through a transport designed for that system to a transport designed for the recipient system.

        • Selenium Automating Web Browsers

          Selenium is used to automate boring tasks; it automates browsers. From navigating the web to automatically logging into accounts to creating bots for various tasks can be achieved using Selenium.

        • How to Make WebSockets Examples

          WebSocket is a powerful technology that has found its way into many applications. Because of that, there are many libraries implemented in various languages to help programmers work with WebSocket protocol. In this tutorial, we will quickly discuss some of these libraries and what they offer. This makes it easier to choose a specific library for the language you wish to use.

          If you need an introduction to WebSockets and how they work, consider one of our tutorials on the same.

        • Python

        • Shell/Bash/Zsh/Ksh

          • How to Use Multiple Delimiters in AWK – Linux Hint

            AWK is a powerful, pattern-matching programming language that works in the command line to find various patterns in command outputs and files.

            We can consider AWK an improvement over Sed since it offers more features, including arrays, variables, loops, and good old, regular expressions.

            In this tutorial, we will quickly discuss how you can use multiple delimiters in an AWK command. Before we proceed, please note that this tutorial is not a beginner’s guide to AWK, nor did I intend it as such.

  • Leftovers

    • Opinion | Over the Bodies of Children: God Willing We'll Have Fun Tomorrow
    • Crucible City

      Certain cities in the United States have developed a claim to fame for representing some vital aspect of America. New York City has often been hailed as its financial and cultural capital. Chicago, the “big shoulders” of the nation, has been depicted as its boisterous center of industry. Berkeley, Calif., and Cambridge, Mass., serve as symbols of American liberalism, and Atlanta as the political and economic capital of Black America.

    • South Korean Real-Time Video 'Social Discovery' App Might Be The New ChatRoulette -- If It Can Keep Out The Lettuce Fornicators

      Remember ChatRoulette? Eleven years ago, the Web site that pairs random people together for webcam interactions was as hot as today's Clubhouse. A 2010 piece in New York Magazine has a perfect distillation of the ChatRoulette experience at the time:

    • Education

      • How Teachers Fought for Their Safety in the Pandemic—and Won

        At 7 am on Monday, February 8, Kaitlin McCann, a seventh- and eighth-grade history teacher at the General George A. McCall School in Philadelphia, arrived at work. The temperature was in the teens and snow covered the ground, but McCann didn’t go inside the building where she’s taught for a decade. Instead, decked out in snow pants, boots, and gloves with hand warmers nestled inside, she set up a portable power generator and a circle of socially distanced tables and chairs in the schoolyard.1

    • Hardware

      • The Federal Trade Commission enters the fray over the 'right to repair'

        The report also found that tech companies failed to provide any evidence that the right to repair diminished a company's ability to innovate, threatened user security, or inhibited the companies' ability to make competitive products.

        The FTC concluded, "There is scant evidence to support manufacturers' justifications for repair restrictions." It then encouraged state and federal legislators to consider right-to-repair bills and hopefully pass relevant legislation soon.

    • Health/Nutrition

      • Opinion | Redistribution of Health Through the American Families Plan

        The American Families Plan will make the Affordable Care Act subsidies permanent—ensuring that millions of Americans can keep their care. And the top 1% of taxpayers will pay for it.

      • As Unused Vaccines Pile Up in the US, Biden Pledges to Export 80 Million Doses
      • CDC's Confusing Announcement on Masks Creates a Dangerous Honor System
      • National Nurses United Condemns CDC for Endangering Frontline Workers With Latest Covid-19 Guidance

        "Nurses follow the precautionary principle, which means that until we know for sure something is safe, we use the highest level of protections, not the lowest."

      • Pandemic 'Long Way From Over,' Says WHO Amid Stark Global Vaccine Access Divide

        WHO Director-General Tedros Adhanom Ghebreyesus called on "high-income countries that have contracted much of the immediate global supply of vaccines to share them now."

      • How Profiteers Hijacked the CDC’s Covid Response

        This story involves mass death, religious zealots, and the worst case of government malpractice to facilitate what was deemed a business opportunity in the history of the United States, so I’ll choose the biblical opening:1Adapted from Chapter 1 of Nina Burleigh’s Virus, now available from Seven Stories Press.

      • The Law Bytes Podcast, Episode 88: Ellen ‘T Hoen on Waiving Patents to Support Global Access to COVID Vaccines

        CNBC, Biden Administration Supports Waiver of Patent Protections for Covid Vaccines

      • Sharing the Vaccine Is Just the First Step

        On May 5 the Biden administration did the truly unexpected. Bucking the gigantic pharmaceutical lobby in Washington, it sided with low- and middle-income countries (LMICs) by supporting a waiver provision to the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) that would set aside some intellectual property rights in order to expand the production of Covid-19 vaccines, which are now manufactured primarily by only a handful of companies in the world’s richest nations.

      • In Search of a Place to Cry: The Gray Panthers COVID Memorial

        At some point in the pandemic, I don’t remember when, exactly, I noticed that the daily bar graph showing the steadily rising deaths had changed. Wherever it was—the New York Times?—it had started as a simple tally of Covid-19 fatalities, but now, the tally was split between the deaths of those in long-term care facilities and the deaths of “regular” civilians. The bar marking the former category was gray, as if meant to represent the people themselves who had perished: they were primarily old, and, if they were in a skilled nursing facility, they likely had physical and/or mental disabilities.

        “These are among the most ‘other’ peoples,” Jack Kupferman, the director of the New York City chapter of the activist group the Gray Panthers, told me. “They’re literally behind walls. This is what we never want to be. To be in a long-term care facility, particularly a skilled nursing facility, is not on anyone’s bucket list.” It’s easy, in other words, to look away—actually, it might even feel imperative, because the sight is uncomfortable, painful, shocking, guilt-inducing. To actually regard the agonizing deaths-by-covid of the elderly would be a disruption of business as usual—this country has never treated the old, the differently-abled, the “other” of any kind with dignity, let alone attention.

      • Why Strongmen are Losing the Fight Against Covid

        Since Covid-19 exploded in India, the prime minister, Narendra Modi, seems more intent on controlling the news than the outbreak. On Wednesday, India recorded nearly 363,000 Covid cases and 4,120 deaths, about 30 percent of worldwide Covid deaths that day. But experts say India is vastly understating the true number. Ashish Jha, dean of Brown University’s School of Public Health, estimates that at least 25,000 Indians are dying from Covid each day.

      • How Bill Gates Set the Stage for Modi’s Disastrous Response to COVID-19 in India

        The rights to produce the public sector vaccine, Covaxin, which has been developed by the Indian Council of Medical Research (ICMR) and National Institute of Virology (NIV), in collaboration with Bharat Biotech, have been given to the private company partner on an exclusive basis. The Indian government also believed that Serum Institute of India, another private sector company and the world’s largest vaccine manufacturer, which has tied up with AstraZeneca for producing Covishield, would make vaccines according to the country’s requirements without any prior orders or capital support. The government did not even see the necessity to intervene and prevent India’s new Quad ally, the U.S., from stopping sending India supplies of the required raw materials needed by India for manufacturing vaccines.

        The sheer negligence by the government is further highlighted by the fact that even though India has about 20 licensed manufacturing facilities for vaccines and 30 biologic manufacturers, all of which could have been harnessed for vaccine manufacturing, only two companies are presently producing vaccines. That too is at a pace completely inadequate for India’s needs.

      • The latest antivax lie from Peter McCullough, Mike Adams, and RFK Jr.: “COVID-19 vaccines are killing people!!!!”

        Months before emergency use authorizations (EUAs) were granted by the FDA for vaccines against COVID-19, starting with the Pfizer/BioNTech vaccine and then continuing with the Moderna and Johnson & Johnson (J&J) vaccines, those of us who’ve been following and trying to counter the antivaccine movement predicted that antivaxxers would publicize and weaponize reports of death and adverse events after COVID-19 vaccines to give the impression that the vaccines are dangerous. By the end of January, our predictions had come true even more blatantly than I had expected, as I€ discussed this technique three months ago and why it is deceptive. The first time I had noted this technique of antivaccine messaging was actually as far back as December, when antivaxxers were€ publicizing reports of Bell’s palsy and syncope€ within days after the Pfizer vaccine had been released under an EUA. It’s a technique that continued with€ claims based on€ VAERS€ that COVID-19 vaccines cause heart attacks and sudden cardiac deaths, with these sorts of claims being central to€ messaging by antivaccine activist Del Bigtree. None of these reports demonstrated causation, but that didn’t stop antivaxxers from publicizing them. Then, when the FDA issued a pause for the J&J vaccine based on (at the time) one-in-a-million reports to€ VAERS€ of a€ rare type of blood clot, reports that the€ FDA and CDC took very seriously, antivaxxers predictably went wild over it, even though the risk-benefit ratio of the vaccine was still deemed to be favorable.

      • Fighting Weight: How Military Recruiters Take On Obesity, Case By Case

        All those issues feed bigger worries about the sustainability of the country's military, Frost notes. "In a generation or two, this is going to be a potential existential threat to our nation," he says.

        Powerful forces like food insecurity and the ways cheap, high-calorie junk food is heavily marketed add to the challenge, says Jeffrey Snow, another retired major general who headed recruitment for the Army and Army Reserves until three years ago. In his military days, Snow says, he routinely talked about the significance of obesity prevention and mitigation, both inside and outside the Army.

    • Integrity/Availability

      • Proprietary

        • Our cybersecurity 'industry best practices' keep allowing breaches [iophk: Windows TCO]

          So with all of these impressively credentialed experts, we should be getting better at this "information security" business, right? So, what is wrong?

          The core problem is that "industry best practices" are not.

          Not only are "industry best practices" not "best" practices, but they are also dangerous practices.

        • EU’s Apple Probes Press Ahead as Epic Trial Plays Out in U.S.

          The European Union is pressing ahead with its Apple Inc. probes undistracted by allegations of anti-competitive behavior by the tech giant playing out in a Californian courtroom, according to the bloc’s antitrust chief.

          The investigation into Apple Pay is “quite advanced” and European regulators need to “do our own thing” regardless of what happens in the U.S. suit against Epic Games Inc., Margrethe Vestager said in an interview with Bloomberg News.

        • Apple’s Phil Schiller gives Epic iPhone testimony

          We’ve gotten through the expert witnesses of Epic v. Apple, and as a reward, Phil Schiller — currently an “Apple Fellow,” whatever that is, and previously the senior vice president of worldwide marketing — took the stand like a twinkly App Store St. Nick. To hear him tell it, Apple is a wonderful partner to developers, selflessly improving dev tools and responding to their needs. At times the testimony feels like a prolonged ad for iOS.

        • Microsoft sheds some light on perplexing Outlook blank email incident: Word was to blame

          Microsoft has published a Preliminary Post Incident Report on last week's events which broke Outlook on Windows for millions of users, making emails impossible to view or create.

          It was on the evening of May 11th, UK time, and in the middle of the working day in North America (18:24 UTC, 19:24 BST, 11:24 Pacific), that many Office 365 customers using Outlook on Windows observed a frustrating problem: blank emails (or maybe showing just one line), even though a few lines of the email could be previewed in the list of messages. Attempts to create or reply to an email allowed a line of text to be typed, but when the user pressed enter, the text disappeared.

        • Security

          • How to Find Rootkits with RKhunter

            We use the internet to communicate, learn, teach, shop, sell and do many other activities. We are constantly connecting our devices to the internet to share and gather information. However, doing so comes with its benefits and dangers. One of the most prominent and ever-present dangers of connecting to the internet is a comprised system where attackers can use your devices to steal personal information and other sensitive information.

            Although there are various methods someone can use to attack a system, rootkits are a popular choice among malicious hackers. The essence of this tutorial is to help you enhance the security of your Linux device by using the RKhunter or Rootkit hunter.

          • Security updates for Tuesday

            Security updates have been issued by Debian (chromium, curl, prosody, and ruby-rack-cors), Fedora (dotnet3.1 and dotnet5.0), openSUSE (ibsim and prosody), SUSE (kernel and python3), and Ubuntu (caribou and djvulibre).

          • Privacy/Surveillance

            • Smart TV Makers Will Soon Make More Money Off Your Viewing Habits Than The TV Itself

              "Smart" televisions have long been the poster child for the abysmal privacy and security standards inherent in the "internet of things" space. Such televisions have been routinely found to have the security and privacy standards of damp cardboard, making the data they collect delicious targets for hackers and intelligence agencies alike.

            • EU Council and Commission: New roadmap for access to encryption

              The Portuguese Presidency is calling for an EU-wide regulation on access to encrypted content by police and judiciary. This should also affect device manufacturers. Failure to comply could result in companies being banned from doing business in the EU.

            • ACLU: “Digital IDs Could Be a Nightmare”

              As the U.S. Department of Homeland Security is soliciting proposals from vendors for how to put digital versions of drivers licenses and other ID credentials on smartphones, the ACLU has released a timely and insightful white paper, Identity Crisis: What Digital Driver’s Licenses Could Mean for Privacy, Equity, and Freedom, by Jay Stanley of the ACLU Speech, Privacy, and Technology Project, along with an executive summary in the form of a blog post, Digital IDs Might Sound Like a Good Idea, But They Could Be a Privacy Nightmare.

              The ACLU white paper links to some of our research and reporting, and highlights many of our concerns with compelled identification, the REAL-ID Act, invisible virtual checkpoints, ID-based blacklists and controls on what we are and aren’t allowed to do, and the role of AAMVA and other “private” entities as outsourced, opaque, unaccountable, creators of ID “standards” that function as de facto laws and regulations that govern our movements and activities, but that are adopted in secret, exempt from the Freedom Of Information Act or other transparency laws, and lack basic privacy protections. or respect for rights recognized by the U.S. Constitution and international human rights treaties.

              We encourage readers interested in these issues to read the ACLU white paper in full. But here’s an excerpt form the introduction to the white paper, framing the issue:

            • Everything you wanted to know about media metadata, but were afraid to ask

              Metadata is data about data. Every single digital artifact has it. It describes the who, what, when, where, how, and sometimes even, why, for any document, video, photo, or sound clip. This information comes in handy sometimes, like when you’re flipping through old pictures by date, or by location. But in the wrong hands, this same information could be damaging.

            • Here’s how PayPal re-imagined its cloud journey amid the pandemic

              The pandemic accelerated the adoption of digital by what would have otherwise taken 5 years. Digital payments are no longer an option, and digital payments business has never been more relevant than it is today. There have been substantial macro changes which Paypal believes to have a lasting and profoundly positive impact on its business. This is a robust cloud strategy that enables speed which matters for both operational efficiency and scale.

    • Defence/Aggression

    • Transparency/Investigative Reporting

      • The media has incited more hatred than necessary

        It’s difficult to see how this plays out in the coming days, as no doubt “international diplomacy” will step in. But the misinformation we are hearing on the news that the latest flair-up occurred because “Israelis stormed the Mosque”, may convince the majority, but it’s not the main reason this violence broke out. Those behind it have carefully constructed a well-orchestrated move to turn public opinion against Israel and the Jewish communities supporting Israel, and so far, it is working.

    • Environment

      • Asia’s cities are worst hit in warming world

        Climate change, water shortage and pollution are worst for Asia’s cities, researchers say. The rest of us have a lucky escape.

      • 'Time for Us to Have Her Back': Sunrise Movement Endorses Nina Turner for Congress

        The youth-led climate campaign called the former Ohio state senator a "champion for people everywhere on a myriad of issues impacting our communities."€ 

      • Exhuming California’s St. Francis Dam Disaster

        Seven miles up San Francisquito Canyon in far northern Los Angeles County, at an unmarked spot on an abandoned county road, there’s a pile of rubble. Obscured by the cottonwoods and willows that cluster along trickling San Francisquito Creek, the site is indistinguishable from the surrounding shale and sandstone until you’re standing nearly on top of it. Further west, ragged concrete blocks the size of shipping containers lie scattered across the canyon floor. These are the remnants of greater Los Angeles’s deadliest day, obscured from public view by time, neglect, and painstaking effort.

      • Another environmental disaster Russia’s Komi Republic declares emergency after 90-ton oil spill

        Authorities in Russia’s far-northern Komi Republic have declared an emergency over a 90-ton oil spill affecting local soil and waterways. The leak originated from a Lukoil pipeline located in the neighboring Nenets Autonomous Okrug. Reportedly, most of the oil products have pooled on the shore of the Kolva River, however the pollution is continuing to spread into larger waterways and is moving towards the Barents sea. Local environmental activists say the spill already constitutes an environmental disaster and has likely caused hundreds of millions of rubles in damage.

      • Energy

        • Dozens of Christian Organisations Announce Fossil Fuel Divestment Ahead of G7 and COP26

          Three dozen Christian organisations and institutions from across the world — including dioceses from the Church of England — announced their divestment from fossil fuels today and urged leaders to take greater action on climate change ahead of major global summits this year.

          Scheduled for June, leaders of the G7 nations will meet in the UK and environmentalists hope climate will be a priority. Meanwhile, Glasgow will host the annual UN climate conference, COP26, in November.€ 

      • Wildlife/Nature

        • Four Years of ‘The Rev’
        • Forest Service Halts Huge Clearcutting Plan Next to Yellowstone National Park that Threatened Grizzlies, Lynx

          WEST YELLOWSTONE, MONTANA— Following a challenge by multiple conservation groups, the U.S. Forest Service announced Thursdaythat it was halting a plan to clearcut more than 4,600 acres of native forests, log across an additional 9,000 acres and bulldoze up to 56 miles of road on lands just outside Yellowstone National Park in the Custer Gallatin National Forest.

          In April, the Center for Biological Diversity, WildEarth Guardians, Alliance for the Wild Rockies and Native Ecosystems Council challenged€ the South Plateau project, saying it would destroy habitat for grizzly bears, lynx, pine martens and wolverines. The logging project would have destroyed the scenery and solitude for hikers using the Continental Divide National Scenic Trail, which crosses the proposed timber-sale area.

    • Finance

      • Working Women Need the PRO Act

        Jeanne D’Angelo, currently a freelance illustrator, had a job interview at the Comcast headquarters in Philadelphia 13 years ago. The manager who interviewed her, who was employed by Comcast, told her she got the job. Then she was sent to a temp agency to fill out her new-hire paperwork. Like so many other workers, D’Angelo had been a temp before, and many of those jobs had been “temp to hire,” in her experience. “I just figured they’d eventually hire me,” she said.

      • Opinion | Wall Street Banks Reject Racial Equity Audits, While Professing BLM Support

        JPMorgan Chase CEO Jamie Dimon is urging shareholders to vote against a proposed review of the impact of bank policies and practices on racial inequality.

      • Wealthy Progressives Issue Tax Day Message: 'Cut the Bullsh*t' and Tax Rich People Like Us

        "Tax the Rich. Save America. Yes, it's really that simple."

      • The Secret Tax Loophole Making the Rich Even Richer

        Close this stepped-up basis loophole, and we help finance the programs the vast majority of Americans desperately need and deserve. We also end the explosion of dynastic wealth. It should be a no-brainer.

      • Opinion | The Real Purpose of Austerity

        Even if everyone agreed that printing another trillion dollars to finance a basic income for the poor would boost neither inflation nor interest rates, the rich and powerful would still oppose it. After all, their most important interest is not to conserve economic potential, but to preserve the power of the few to compel the many.

    • AstroTurf/Lobbying/Politics

      • Russian court drops embezzlement charges against ex-governor Mikhail Men

        On May 17, Moscow’s Tverskoy Court terminated the criminal case against Russia’s Accounts Chamber auditor, Mikhail Men, due to the expiration of the statute of limitations, reports the state news agency TASS.€ 

      • Trump Plans to Resume His Infamous Rallies in June
      • Biden White House Says Monthly Child Tax Credit Payments Will Begin July 15
      • Marjorie Taylor Greene Is Gunning for AOC—and There’s Only 1 Reason

        Video emerged late last week of bigoted Representative Marjorie Taylor Greene trying to intimidate Alexandria Ocasio-Cortez at her congressional office in Washington, D.C. The video, filmed in 2019, was taken as Greene went to Ocasio-Cortez’s office, uninvited, to laugh at and mock her while purposely mispronouncing her name and talking through the mail slot in her door. Greene was flanked by a small gang of thuggy guys, including one who some think participated in the Capitol insurrection. The video, which was initially streamed by Greene on Facebook Live but later deleted, resurfaced just days after Greene accosted Ocasio-Cortez on the House floor. There, Greene accused Ocasio-Cortez of backing “terrorists and antifa,” which is rich considering that Greene exists only to give aid and comfort to white domestic terrorists.

      • 'Allende Is Smiling': Chilean Voters Elect Progressive Alliance to Rewrite Pinochet-Era Constitution

        "Chile will be the grave of neoliberalism!"€ 

      • Psy-ops in high places Putin’s new science adviser to Russia’s National Security Council is a military intelligence agent accused of spreading disinformation about the coronavirus

        In recent years, Russia’s National Security Council (or Sovbez) has come increasingly to resemble the USSR’s Politburo (the Soviet Communist Party’s powerful executive committee). On May 11, Vladimir Putin made significant changes to the Sovbez’s Science Council, which provides “scientific-methodological and expert-analytical support,” assists with the development of Russia’s national security strategy and strategic planning documents, and helps define priorities, criteria, and metrics. One newcomer to the Science Council is a man named A. G. Starunsky, a deputy commander of Russia’s Military Unit 55111. Meduza has learned that intelligence agencies in Estonia and the United States suspect this person of involvement in online disinformation campaigns run by Russia’s Military Intelligence Directorate (GRU).€ 

      • Why Biden Should Reappoint Powell as Fed Chair, Now

        In making the case for Powell, it is important to understand how much he has moved the Fed from where it has been in prior decades. I have long been in battles with the Fed over its willingness to raise interest rates, slowing growth and killing jobs, in order to head off the risk of higher inflation. It viewed its legal mandate for high employment as an afterthought, at best.

        Powell has turned this around. He has quite explicitly said that he wants to have the economy run hot, pushing it as far he can without kicking off inflation. He has embraced the idea that many of us on the left had long maintained: low levels of unemployment disproportionately benefit those most disadvantaged in the labor market.

      • This is Not a Crisis, This is a Rebellion: a Report from the Front Lines of Haiti

        All of Haitian society is in revolt.

        A mambo and hougan—the traditional voudou priestess and priest—lead ancestral ceremonies before rallies take the streets and block the central arteries of Port-au-Prince, Cap Haïtien, and other Haitian cities and towns. After one of their members was kidnapped, leaders of the Protestant Church directed its congregation to halt all activities at noon on Wednesday and bat tenèb. Bat tenèb, literally “beat the darkness,” is a call for all sectors of Haitian society to beat pots, pans, street lights and anything else as a general alert of an emergency. A Catholic church in Petionville held a mass with political undertones against the dictatorship. When marchers from outside took refuge from the police inside the church, the Haitian National Police tear gassed the entire congregation.

      • The California Prosecutors Who Want to Keep People Out of Jail

        “Politics is often defined or understood as the art of making a deal. But I think, at its best, it’s the art of making possible tomorrow that which we can’t even imagine today,” says Chesa Boudin, the district attorney of San Francisco County. The son of two members of the Weather Underground sentenced to long spells in prison, Boudin was narrowly elected in 2019 under San Francisco’s ranked-choice voting system. He talks of the pain of growing up with imprisoned parents; of the collect calls he still receives every Saturday from his incarcerated father; and of his belief, inculcated in him from childhood, that simply locking people up is a failure of the political imagination. “My personal experience shapes me—my worldview, my fears and hopes, my dreams and aspirations,” he acknowledges.1

        Boudin and three other district attorneys—Republican Tori Verber Salazar of San Joaquin County, in the Central Valley (whose office didn’t respond to requests for comment for this article), and Democrats George Gascón of Los Angeles and Diana Becton of Contra Costa County—joined the Prosecutors Alliance of California in September 2020. Although their offices serve only four of the 58 counties in California, they represent more than 30 percent of the state’s population. The organization was established as a progressive alternative to the more conservative California District Attorneys Association (CDAA), which, for decades, has helped shape criminal justice priorities in the Golden State. In 2022, when 56 of those counties hold elections for their DAs, the number of Californians served by self-identifying progressive prosecutors could well reach the 50 percent mark.2

      • NPR at 50: Straying From Its Civic Mission?

        A few observations, drawn from listening to NPR largely over the WAMC station in Albany, New€ York during a Covid-19 year, are in order.

        1. I find the features and the collaboration with other investigative groups, such as€ Pro Publica,€ very enlightening. One piece about Amazon’s warehouses was especially memorable. Moreover,€ Scott Simon and David Brancaccio are so capable as to be considered under-challenged.

      • Can Democracy Exist in the Digital Era Part II - The Project Censored Show

        Notes: Veena Dubal€ is Professor of Law at the University of California’s Hastings College of Law. Meredith Whittaker€ is Research Professor at New York University, and co-founder of the AI Now Institute. Robin Andersen is Professor of Communication and Media Studies at Fordham University. Maximillian Alvarez is Editor-in-Chief at the Real News Network.

      • What went wrong with the Labour Party?

        All this demonstrates that the Labour Party has consistently failed to offer any real solutions to the problems we face in modern-day Britain, focusing more on petty point scoring. For too long it has enjoyed the blind trust of its supporters. Not anymore. The party seems to have forgotten that it was hope, humility, compassion and progressiveness that attracted people from all backgrounds for years.

        If Labour is to win back the trust of people, it will need a serious overhaul. The party must adhere to liberal principles, promote democratic values such as free speech, and engage people and political opponents in constructive discussions.

    • Censorship/Free Speech

      • Russia’s censorship agency decides not to block Twitter

        Russia’s censorship agency, Roskomnadzor (RKN), has decided against completely blocking Twitter, it announced in a statement on May 17.€ 

      • Facebook facing four more fines for failing to remove content banned in Russia

        Moscow’s Tagansky Court has registered four more proceedings against Facebook over alleged administrative offenses, reports Interfax. If found guilty, the social network will face an additional 16 million rubles (about $216,000) in fines. The magistrate’s court has yet to schedule a date for the consideration of these latest protocols.

      • Belarusian national broadcaster will not air Eurovision 2021

        Belarus’s national broadcaster, Belteleradio (BT), will not air the 2021 Eurovision Song Contest because the country was refused admission to the competition, BT told RIA Novosti,

      • DOJ Sent A Grand Jury Subpoena To Twitter Demanding The Unmasking Of A Twitter User Being Sued By Devin Nunes

        For the past couple of years, Devin Nunes has been suing Twitter users over obviously satirical accounts that use his name, the most famous of which is "Devin Nunes' Cow." He has yet to succeed, but he has managed to clutter the courts with a bunch of vexatious litigation that, so far, has only proved Devin's skin is mighty thin and that he should definitely make better choices when it comes to choosing legal representation.

      • Biden Revokes Trump-Era Executive Order Designed To Crack Down On Big Tech

        Executive orders represent a somewhat ambiguous region in executive authority, and there remain unresolved legal issues regarding the scope of executive policies. All of that considered, it is not unprecedented for an incoming president to revoke in-force executive orders in the early days of his term.

      • Party officials: Hate speech fears deterred local election candidates

        The government study further found that hate speech and ill-natured online debate are having a knock on effect on democracy. Forty-two percent of municipal decision-makers who responded to the survey said their willingness to participate in public debate had diminished.

        Many participants in the study also said that hate speech and harassment have led them to consider giving up politics.

        Saresma said this is a "serious threat" to democracy, as it reduces people's willingness to participate in social debate. However, she added that studies show that only a relatively small number of people engage in hate speech, and this small group produces the largest part of it.

        "If, for example, there is reprehensible hate speech on social media, accounts should be closed. There should be zero tolerance for committing crimes," Saresma said.

      • Online hate speech deters candidates from participating in municipal elections

        A survey commissioned by the government in 2019 found that 66 per cent or two-thirds of municipal councillors believe that hate speech in public debate has increased significantly and reported being at the receiving end of abusive behavior themselves.

        The study also revealed that the toxic online culture represents a direct threat to democracy, as 42 per cent of respondents admitted that their willingness to participate in public debate had decreased.

      • Ukrainian Models Deported After Posing On Birthday Suits In Turkey During Ramadan

        According to reports, six Ukrainian models tried to recreate that scene when they posed in the birthday suits in Turkey, creating great indignation when they posed nude while on a yacht. The models were with two men as they tried to recreate the high-rise balcony debacle in Dubai.

      • Naser Khader faces Supreme Court lawsuit in connection with calling female imam an Islamist

        Naser Khader, who stepped down from his duties as a Konservative MP to take stress leave in April, will today begin his defence in the Supreme Court against charges that he libelled the female imam Sherin Khankan.

        Like she did with an unsuccessful lawsuit in the High Court last year, Khankan will contend that Khader defamed her with a character assassination and abuse of power when he sent an email on 13 September 2017 to a group of MPs (from Radikale, SF and Alternativet) airing concerns about Exit Circle, an organisation that helps victims of psychological violence, which she chairs.

    • Freedom of Information/Freedom of the Press

      • Gaza Journalist: Israel Is Deliberately Targeting the Media by Bombing AP & Al Jazeera Offices

        We speak with Palestinian reporter Youmna al-Sayed, who was among the journalists who had to flee for their lives when Israel bombed and leveled a 12-story Gaza building that housed the offices of media organizations including the Associated Press and Al Jazeera. Israel has claimed, without evidence, that the building was being used by Hamas operatives, but al-Sayed says it’s part of a pattern of Israeli attacks on media. “This is no coincidence,” she says.

    • Civil Rights/Policing

      • Opinion | Demilitarizing the Border: A World of Bikes, Not Walls?

        When it comes to the border and its many "crises," the absurdity runs deep.

      • Ocasio-Cortez Leads House Dems' Demand That Biden 'End the Carceral Approach to Immigration'

        "Instead, we urge the Biden administration to pursue humane and just immigration policies that aim to end mass incarceration, criminalization, and deportation of immigrants."

      • 'Alarm Bells Are Ringing Loudly': Supreme Court Takes Up Case That Could Reverse Roe v. Wade

        "Let's be explicit: Anti-abortion extremists made it clear that this was the goal all along. It's why they couldn't wait to rush Amy Coney Barrett onto the Supreme Court before the November election."

      • Supreme Court Agrees to Hear Case That Could Upend Roe v. Wade
      • ‘Extremism’ case against Navalny’s movement reportedly classified due to security officials’ personal data

        The materials in the case on designating Alexey Navalny’s Anti-Corruption Foundation (the FBK) and political movement as “extremist organizations” were classified because they contain the personal data of security officials, the newspaper Kommersant reported, citing a source in law enforcement. Allegedly, the security officials in question filed lawsuits over damages inflicted by protesters during opposition rallies.€ 

      • Addressing Rape in Four Minutes or Less: Dating App Reps Left Unprepared to Respond to Assault Victims

        On a sunny afternoon in the summer of 2019, Natalie Dong stood outside the glass headquarters of the popular online dating platform Tinder, in downtown Los Angeles, with a poster board draped from her neck. It read: “MY RAPIST IS STILL ON TINDER.”

        More than a year earlier, Dong, then a 21-year-old engineering student, said she had been raped in her home by a man she had met on a different dating website, Coffee Meets Bagel. He told Dong he was on other dating platforms, including Tinder. She reported the events to the police, which didn’t lead to criminal charges.

      • The Police Dog Who Cried Drugs at Every Traffic Stop

        As a drug detection dog, Karma kept his nose down and treated every suspect the same. Public records show that from the time he arrived in Republic in January 2018 until his handler took a leave of absence to campaign for public office in 2020, Karma gave an "alert" indicating the presence of drugs 100 percent of the time during roadside sniffs outside vehicles.

        Whether drivers actually possessed illegal narcotics made no difference. The government gained access to every vehicle that Karma ever sniffed. He essentially created automatic probable cause for searches and seizures, undercutting constitutional guarantees of due process.

      • Joe Biden wants to Europeanise the American welfare state

        Start with the most important bits. At present, one in six American children live in poverty by the government’s own measure. International comparisons, using a measure called relative poverty, suggest that the American rate is among the highest in the rich world. It is caused by flimsy supports for the youngest (as opposed to those for the elderly, who receive Social Security and Medicare). A generous child allowance is the main anti-poverty tool in most rich countries—and also one that America lacks. One such scheme was created this year as part of the covid-19 relief bill that the president signed in March. It will pay most families $3,000 per year per child ($3,600 for young children) and is expected to halve the poverty rate soon after its payments begin in July. A simultaneous boost to the earned-income tax credit, which tops up the wages of low-paid workers, would also reduce poverty among childless adults (while reducing disincentives to work).

      • Sharia France: Mother of 3 Shot and Burned to Death in Public by Muslim Migrant Husband (Video)

        Western feminists’ supposedly cherished principles are not compatible with Islam, yet they remain silent.

    • Internet Policy/Net Neutrality

    • Digital Restrictions (DRM)

      • Apple to bring Lossless Audio to entire Apple Music catalog, alongside Spatial Audio with Dolby Atmos

        Apple notes: “Due to the large file sizes and bandwidth needed for Lossless and Hi-Res Lossless Audio, subscribers will need to opt in to the experience. Hi-Res Lossless also requires external equipment, such as a USB digital-to-analog converter (DAC).”

      • Introduction to Digital Rights Management (DRM)
      • What is DRM? Understanding the tool publishers use to control software and file downloading or sharing

        You're probably used to feeling like you own the software stored on your computer, phone, and other devices, but that's not always the case.

        First and foremost, you typically don't own the software you've purchased. You've simply bought the right to use the software in accordance with a licensing agreement. That's rarely important when using Microsoft Office programs, but many kinds of software are controlled by Digital Rights Management (DRM). That can limit your ability to use the software in important ways.

        In a nutshell, DRM is a way for publishers and distributors to control your access to software. If you think you might be dealing with a DRM situation, here's what you need to know before you get yourself in a bind.

      • [Old] Everything about how we access and listen to music has changed in the past 25 years

        DRM stands for digital rights management and anyone who's downloaded music before 2009 knows what a pain it can be. At its most basic level, DRM puts restrictions on how you can use a digital file that you own. In the heyday of Apple's iTunes Store, the company sold AAC audio files protected with its FairPlay DRM, which restricted playback to its iPod music players and iTunes. Along with limiting what you used to play them, the files couldn't easily be shared on P2P networks. In 2007, Apple started selling premium AAC music files without DRM, and by 2009 it had gone DRM-free. The only rub there was Apple tacked on a charge of 30 cents per song if you wanted to have the FairPlay DRM removed from tracks you'd already bought.

        Of course, Apple wasn't alone here, with Sony BMG's rootkit fiasco likely the most notorious DRM overreach of the era. If you played certain CDs from the music label on your computer, it would secretly install copy-protection software stopping you from copying the music. The software was also difficult to remove, and even the uninstaller created security issues for users.

        By 2008, Apple would be the largest music seller in the US, but streaming was still wide open. Streaming services and stations continued to multiply during this time, starting with the likes of Pandora (now owned by satellite radio and streaming service SiriusXM) and Last.fm, which is owned by CNET's parent company ViacomCBS and no longer streams music. 2008 also was the year Spotify launched in Europe and grew quickly, thanks to a free-music model for anyone willing to put up with some ads between songs. The service wouldn't be available in the US until 2011, but in no time it became the leader, while competitors like MOG and Rdio were gobbled up by other services. Spotify currently has more than 130 million subscribers.

      • FTC calls out Apple in report on ‘anti-competitive repair restrictions’

        The report on anti-competitive repair restrictions also criticizes Apple for tying components to the logic board, which can make repairs uneconomic.

        "Software locks, digital rights management (‘DRM”) tools or technological protection measures (TPMs”) are access control technologies implemented by OEMs. While manufacturers argue that these measures are necessary to protect proprietary hardware and copyrighted technologies, repair advocates argue such tactics lock ISOs and consumers out of basic repairs. Embedded software may force consumers to have the maintenance and repair of their products performed by the manufacturers’ authorized service networks. Furthermore, according to iFixit, “if you replace the screen on your iPhone even if it’s with a brand new OEM screen off of another identical iPhone certain features like TrueTone won’t work correctly."

        "McDonough explained that Apple synchronizes some iPhone parts to the device’s logic board, making the part repairable only by Apple."

      • Digital Rights Management (DRM)

        When you buy an e-book with DRM you don’t really own it but have purchased the permission to use it in a manner dictated to you by the seller. DRM limits what you can do with e-books you have “bought”. Often people who buy books with DRM are unaware of the extent of these restrictions. These restrictions prevent you from reformatting the e-book to your liking, including making stylistic changes like adjusting the font sizes, although there is software that empowers you to do such things for non DRM books. People are often surprised that an e-book they have bought in a particular format cannot be converted to another format if the e-book has DRM. So if you have an Amazon Kindle and buy a book sold by Barnes and Nobles, you should know that if that e-book has DRM you will not be able to read it on your Kindle. Notice that I am talking about a book you buy, not steal or pirate but BUY.

    • Monopolies

      • Patents

        • Considerations for formulation and combination patents in Europe [Ed: Happy to cite the EPC without bothering to mention that the EPO constantly violates the EPC in order to fake 'production' and grant loads of invalid patents]

          In this article, we consider patent applications to new drug formulations and combinations. Where a substance or composition is already known for a medical use, it may still be patentable for treating the same condition, provided the specific formulation or combination of active products is novel and inventive (Art. 54(5) EPC).

          We set out details of how such claims are assessed by the European Patent Office (EPO) and some practical tips on how to maximise the chances of success. In particular, the complex relationship between the concepts of plausibility and inventive step are discussed, focussing on how data in the application are often important to support the patentability arguments at the EPO and how the prior art can be relied upon for plausibility if little or no data are available.

        • T 1952/18 – prior use and inventive step

          T1952/18 relates to an appeal against the decision to maintain European patent EP2512840 in its granted form. The appellant (opponent) requested that the patent be revoked while the respondent (patentee) requested that the patent be allowed in an amended form.

          The invention in question relates to the bumper on a car. A bumper typically is made up from a bumper bar with a number of “crash boxes” that are designed to deform in the event of a crash. It is important that the crash boxes deform in a similar manner or their effectiveness can be inhibited. The invention is concerned with the inclusion of a towing eyelet. This can be achieved by the connection of a threaded sleeve into which the towing eyelet can be screwed. However, as a consequence of pulling the towing eyelet at an angle, the crash box can, if used, deform irregularly. The invention seeks to solve this problem by a particular arrangement of the sleeve in respect of the crash box.

          [...]

          The European Patent Office (EPO) noted that this evidence did not lie within the power and knowledge of the opponent because the patentee could have had similar access to the alleged prior art. The standard of proof required was therefore a “balance of probabilities” (as opposed to “up to the hilt”) and this threshold was met.

          In this case, the abundance of evidence was clearly persuasive and the Board of Appeal decided that the prior use was legitimate prior art. However, the Board of Appeal’s view was that two features (s) and (t) were not known from this prior use:

        • LED iBond International A/S : European LED iBond patents now also set to include data communication features

          With this confirmation from EPO, LED iBond has now decided to take the next steps to follow up on this opportunity to secure additional patent protection of its products.

        • CPA Global hit with new class action claim

          Intellectual property services company CPA Global has been accused of substantial overcharging in a class action complaint brought by a medical device company on behalf of itself and around 100 other CPA clients.

          In the complaint, filed at the US District Court for the Eastern District of Virginia, New York-based Brainchild Surgical Devices claimed CPA overcharged for renewals and issued “opaque invoices” to conceal this.

          The complaint further alleges that CPA uses similar contracts and pricing structures for all, or nearly all, of its clients in a “deliberate and systematic scheme”.

          A spokesperson for Clarivate, which acquired CPA Global in 2020, said it “categorically and emphatically denies any wrongdoing”.

        • MGC Pharmaceuticals submits patent application for CimetrA to European IP Office [Ed: There's no such thing as "European IP Office"; the author here meant something else, but once you examine the text you realise it's marketing spam disguised as 'journalism' (probably just 'copypasta')]
        • MGC Pharma submits patent application for virus symptoms treatment [Ed: Patent offices scattering patent monopolies over COVID-19 instead of working to actually solve the crisis]

          CimetrA is designed to treat multiple ailments including viral infections with acute and chronic inflammation, COVID-19 and variants of influenza, autoimmune diseases, adverse events resulting from the various forms of cancer therapy, and the promotion of an immune response to bacterial, viral, fungal and parasitic infections.

        • English Court of Appeal tightened requirement for Crown use defence to apply, so when will it?

          Back in February, the Court of Appeal in IPCom v Vodafone [2021] EWCA Civ 205 overturned the first instance decision of Mr Recorder Douglas Campbell QC who held that Vodafone could benefit from what seems to be the somewhat mythical defence of Crown use. Although the decision is relatively dusty in the fast-paced age, the decision warrants further review. Brussels-based trainee patent attorney, Henry Yang, provides a summary for readers below.

        • Pharma Patent Litigation in Portugal: A skewed perspective

          When it comes to the judicial enforcement of pharmaceutical patents in Portugal, over the past few decades the general public has been driven to the misconception that the system protects pharmaceutical industry originators’ tactics to delay the market entry of generics.

          The European Generic Medicines Association (EGA)’s “Patent-related Barriers to Market Entry for Generic Medicines in the European Union” report, published in May 2008, denounced allegedly originators abusive tactics, including that originators, in Portugal, tried “to force patent linkage upon regulatory authorities”, i.e. promoted a system where the approval of market authorizations (MAs) for generics depended on the status of patents protecting the originators’ medicines. The European Commission’s DG Comp was quick to fall in step behind EGA, peddling a similar narrative in the famous Preliminary Report of the Pharmaceutical Sector Inquiry published a few months later, in November 2008.

          Although the Preliminary Report acknowledged (page 7) Portugal as a Member State with one of the highest generic market shares (second only to Poland) and that the Portuguese courts had not granted a single interim injunction requested by originators between 2000-2007 (page 194, Figure 77 and paragraph 522), it still depicted Portugal as a case study of originators’ tactics directed at delaying generics market entry.

        • Software Patents

          • Crypto patent boss: bitcoin lawsuit filed to help industry ‘grow’ [Ed: Patrick Wingrove entertaining illegal software patents and parasites that sue with these in order to destroy the whole industry. Patrick Wingrove always likes giving a voice to trolls and patent zealots.]

            Max Sills, general manager at the Cryptocurrency Open Patent Alliance and counsel for Square, sets out his ambitions for IP and cryptocurrencies

      • Copyrights

        • Guy Rub: Copyright or Contract?

          Using software often means you have to sign a contract as a condition for using the software. This "end user license agreement," called a EULA, will lay out the terms under which the software can be used. For example, the EULA you sign to play a video game might say: "The player of this video game cannot cheat while playing the game." What if you breach the EULA by playing the game using a commercially available cheating "bot"? Is this copyright infringement? Or is this just a breach of contract? This may seem obscure, but the question matters a lot. For one thing, in this example, if the video game publisher has a copyright claim against the cheater, not just a contract claim, this could mean very large statutory damages versus no damages at all.

          This is just one of many scenarios in which copyright owners use contracts to control the conditions of use, and whose breach may, or may not, give rise to copyright infringement. In his new article, Against Copyright Customization, Guy Rub addresses this thorny question—copyright or contract?—along with many closely related questions. For example: when is a software user a mere licensee versus an owner? (Spoiler alert: almost always!) The article is forthcoming in Iowa Law Review and a draft can be downloaded on SSRN.

          [...]

          CAH: Ok, so the video game user is a very different situation, because all they are doing is playing using the bot. They are not making intentional copies. That is why we have essential step. But surely there are situations where it is not so easy. The CC license example is interesting to me. You can make copies but with attribution only. You make copies without attribution...

          GUY RUB: I am fine with that being copyright infringement although it depends how exactly the license is drafted. Those copyleft contracts typically say this is a condition for the license. And in that case that is infringement, so long as it is not a fair use, and of course you need to be making additional copies. It can't just be "use."

        • Scammers Use Fake Copyright Warnings to Steal Logins and Spread Trojans

          It’s no secret that scammers are constantly trying to trick people into downloading malicious content from pirate sites. However, scammers are also targeting people who want to avoid copyright troubles. By sending fake infringement notices, bad actors hope to steal social media credentials and spread trojans.

        • Police: Pirate IPTV Raids Shut Down "80 Percent" of Illegal Transmissions in Italy

          Police in Italy say they have shut down a major IPTV network responsible for around 80 percent of illegal IPTV supply in the country. Operation Black Out was carried out by 200 specialists in 11 regions following an investigation into sellers on Telegram and other social networks. The network is believed to have generated around 15 million euros in revenue every month.

        • They Hacked McDonald’s Ice Cream Machines—and Started a Cold War

          The secret menu reveals a business model that goes beyond a right-to-repair issue, O’Sullivan argues. It represents, as he describes it, nothing short of a milkshake shakedown: Sell franchisees a complicated and fragile machine. Prevent them from figuring out why it constantly breaks. Take a cut of the distributors’ profit from the repairs. “It’s a huge money maker to have a customer that’s purposefully, intentionally blind and unable to make very fundamental changes to their own equipment,” O’Sullivan says. And McDonald’s presides over all of it, he says, insisting on loyalty to its longtime supplier. (Resist the McDonald’s monarchy on decisions like equipment, and the corporation can end a restaurant’s lease on the literal ground beneath it, which McDonald's owns under its franchise agreement.)

          So two years ago, after their own strange and painful travails with Taylor’s devices, 34-year-old O’Sullivan and his partner, 33-year-old Melissa Nelson, began selling a gadget about the size of a small paperback book, which they call Kytch. Install it inside your Taylor ice cream machine and connect it to your Wi-Fi, and it essentially hacks your hostile dairy extrusion appliance and offers access to its forbidden secrets. Kytch acts as a surveillance bug inside the machine, intercepting and eavesdropping on communications between its components and sending them to a far friendlier user interface than the one Taylor intended. The device not only displays all of the machine’s hidden internal data but logs it over time and even suggests troubleshooting solutions, all via the web or an app.

          The result, once McDonald’s and Taylor became aware of Kytch’s early success, has been a two-year-long cold war—one that is only now turning hot. At one point, Kytch’s creators believe Taylor hired private detectives to obtain their devices. Taylor recently unveiled its own competing internet-connected monitoring product. And McDonald’s has gone so far as to send emails to McDonald’s franchisees, warning them that Kytch devices breach a Taylor machine’s “confidential information” and can even cause “serious human injury.”

          After watching the efforts of McDonald’s and Taylor to decimate their business over the five months since those emails, O’Sullivan and his cofounder are now on the counterattack. The Kytch couple tells WIRED they’re planning to file a lawsuit against some McDonald’s franchisees who they believe are colluding with Taylor by handing over their Kytch devices to the ice cream machine giant and allowing them to be reverse-engineered—a violation of the franchisees' agreement with Kytch. (Taylor denies obtaining Kytch devices but doesn’t deny trying to gain possession of one or that a Taylor distributor did ultimately access it.) The lawsuit will likely be only the first salvo from Kytch in a mounting, messy legal battle against both Taylor and McDonald’s.



Recent Techrights' Posts

Ian Jackson & Debian reject mediation
Reprinted with permission from disguised.work
How to get selected for Outreachy internships
Reprinted with permission from disguised.work
Red Hat Corporate Communications is "Red" Now
Also notice they offer just two options: MICROSOFT or... MICROSOFT!
Links 26/04/2024: XBox Sales Have Collapsed, Facebook's Shares Collapse Too
Links for the day
 
FSFE (Ja, Das Gulag Deutschland) Has Lost Its Tongue
Articles/month
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 26, 2024
IRC logs for Friday, April 26, 2024
Overpaid lawyer & Debian miss WIPO deadline
Reprinted with permission from disguised.work
Brian Gupta & Debian: WIPO claim botched, suspended
Reprinted with permission from disguised.work
Microsoft's XBox is Dying (For Second Year in a Row Over 30% Drop in Hardware Sales)
they boast about fake numbers or very deliberately misleading numbers that represent two companies, not one
[Meme] Granting a Million Monopolies in Europe (to Non-European Companies) at Europe's Expense
Financialization of the EPO
Salary Adjustment Procedure at the EPO Challenged
the EPO must properly compensate staff in order to attract and retain suitably skilled examiners
Links 26/04/2024: Surveillance Abundant, Restoring Net Neutrality Rules (US)
Links for the day
Gemini Links 26/04/2024: uConsole and EXWM and stdu 1.0.0
Links for the day
Albanian women, Brazilian women & Debian Outreachy racism under Chris Lamb
Reprinted with permission from disguised.work
Microsoft-Funded 'News' Site: XBox Hardware Revenue Declined by 31%
Ignore the ludicrous media spin
Mark Shuttleworth, Elio Qoshi & Debian/Ubuntu underage girls
Reprinted with permission from disguised.work
Karen Sandler, Outreachy & Debian Money in Albania
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 25, 2024
IRC logs for Thursday, April 25, 2024
Links 26/04/2024: Facebook Collapses, Kangaroo Courts for Patents, BlizzCon Canceled Under Microsoft
Links for the day
Gemini Links 26/04/2024: Music, Philosophy, and Socialising
Links for the day
Microsoft Claims "Goodwill" Is an Asset Valued at $119,163,000,000, Cash Decreased From $34,704,000,000 to $19,634,000,000 and Total Liabilities Grew to $231,123,000,000
Earnings Release FY24 Q3
More Microsoft Cuts: Events Canceled, Real Sales Down Sharply
So they will call (or rebrand) everything "AI" or "Azure" or "cloud" while adding revenues from Blizzard to pretend something is growing
CISA Has a Microsoft Conflict of Interest Problem (CISA Cannot Achieve Its Goals, It Protects the Worst Culprit)
people from Microsoft "speaking for" "Open Source" and for "security"
Links 25/04/2024: South Korean Military to Ban iPhone, Armenian Remembrance Day
Links for the day
Gemini Links 25/04/2024: SFTP, VoIP, Streaming, Full-Content Web Feeds, and Gemini Thoughts
Links for the day
Audiocasts/Shows: FLOSS Weekly and mintCast
the latest pair of episodes
[Meme] Arvind Krishna's Business Machines
He is harming Red Hat in a number of ways (he doesn't understand it) and Fedora users are running out of patience (many volunteers quit years ago)
[Video] Debian's Newfound Love of Censorship Has Become a Threat to the Entire Internet
SPI/Debian might end up with rotten tomatoes in the face
Joerg (Ganneff) Jaspert, Dalbergschule Fulda & Debian Death threats
Reprinted with permission from disguised.work
Amber Heard, Junior Female Developers & Debian Embezzlement
Reprinted with permission from disguised.work
[Video] Time to Acknowledge Debian Has a Real Problem and This Problem Needs to be Solved
it would make sense to try to resolve conflicts and issues, not exacerbate these
Daniel Pocock elected on ANZAC Day and anniversary of Easter Rising (FSFE Fellowship)
Reprinted with permission from Daniel Pocock
[Video] IBM's Poor Results Reinforce the Idea of Mass Layoffs on the Way (Just Like at Microsoft)
it seems likely Red Hat layoffs are in the making
Ulrike Uhlig & Debian, the $200,000 woman who quit
Reprinted with permission from disguised.work
IRC Proceedings: Wednesday, April 24, 2024
IRC logs for Wednesday, April 24, 2024
Over at Tux Machines...
GNU/Linux news for the past day