Links 22/5/2021: antiX 19.4, Perl 5.34.0, and Wine 6.9 Released

Posted in News Roundup at 6:38 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Working At Home Sucks. Moving Into An Office.

        In this boomer vlog, I go a lengthy rant about why working at home sucks and why I’ve recently rented an office for creating video content. I first started looking for some office space last summer, but a series of natural disasters derailed those plans until now.

      • Linux in the Ham Shack (LHS) Episode #413: The Weekender LXXII

        It’s time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we’re doing. We’d love to hear from you.

    • Kernel Space

      • CSIRO’s seL4 project shut down

        In 2018, LWN covered a talk by Gernot Heiser about the seL4 project, which has developed an open-source operating system for safety-critical applications and gone to the trouble of proving its correctness. Much of that work has been done at CSIRO in Australia. Heiser has announced via Twitter that CSIRO’s support for this project is being shut down, with the staff being redirected to artificial-intelligence projects.

      • Linux Plumbers Conference: Scheduler Microconference Accepted into 2021 Linux Plumbers Conference

        We are pleased to announce that the Scheduler Microconference has been accepted into the 2021 Linux Plumbers Conference! The scheduler is an important functionality of the Linux kernel, deciding what process gets to run when, where and for how long. With different topologies and workloads, it is no easy task to give the user the best experience possible. Schedulers are one of the most discussed topics on the Linux Kernel Mailing List, but many of these topics need further discussion in a conference format. Indeed, the scheduler microconference is responsible for many topics to make progress.

      • Graphics Stack

        • NVIDIA 470 Series To Be The Last Supporting GTX 600/700 Series Kepler – Phoronix

          NVIDIA Linux users have been looking forward to the upcoming 470 driver series for better Wayland support but for those running GeForce GTX 600/700 series graphics cards, it will mean the end of the line for new feature driver releases with their proprietary driver stack.

          Updated CUDA documentation has revealed that the R470 driver series will be the last supporting NVIDIA Kepler GPUs, which for consumer cards is the once impressive GeForce GTX 600 and GTX 700 series.

        • XDC2021 Goes Virtual Again As Annual Wayland / Mesa / X.Org Summit – Phoronix

          To no surprise at all, the X.Org Developers’ Conference 2021 will be carried out virtually similar to last year given the COVID-19 pandemic. The free XDC2021 registration and call for presentations has now been issued.

          This year’s X.Org Developers’ Conference will run from 15 to 17 September. Registration is free and this year is being hosted using the Indico software.

    • Applications

      • Best File Encryption Apps for Linux

        This article will cover a list of useful command line applications that can be used to encrypt and decrypt files on your Linux system. These apps use a variety of methods and algorithms to secure your files. Once you encrypt files using these methods, you should be able to decrypt them on any platform as long as it includes necessary apps and libraries required for encryption and decryption.

    • Instructionals/Technical

      • How to Add an Application to the Dock in elementary OS

        Recently, I installed elementary OS. It is one of the most beautiful Linux distributions. The user interface is different from Ubuntu’s GNOME and so is the user experience.

        elementary OS comes with a dock with a default set of programs. This dock allows you to quickly access applications that have been added to the dock.

      • How to Setup Three Node MySQL 8 Cluster on Debian 10

        MySQL is a free, open-source, and relational database management system. It is used to store data in various purposes including, data warehousing, e-commerce, and logging applications. MySQL Cluster is a technology that provides scalability and availability at a low cost.

      • What is Kubernetes Ingress Controller?

        There are many ways to show your Kubernetes cluster’s app to the outside network. You just have to choose the best one for your needs. NodePort, Ingress, LoadBalancer, and ClusterIP are the four key choices.

        However, we will walk through about ingress controller in this guide. The Kubernetes Ingress API allows you to reveal your Kubernetes cluster’s apps to the internet by combining routing guidelines into a single source. To use Ingress, you must set up an Ingress controller in your cluster, which is in-charge of processing ingress resource information and enabling traffic based on ingress rules. Let’s quickly examine what a Kubernetes Ingress is and what an Ingress controller offers before digging into the numerous Ingress controllers.

      • Installation of Jenkins on Ubuntu

        Jenkins is a Java-built open-source Steady Integration (CI) and CD platform. Principally, Jenkins builds software program initiatives, checks and deploys them. This is likely one of the most sensible programming instruments you possibly can grasp, and immediately we will present you the way Jenkins is put in on Ubuntu 18.04. Use this highly effective tool to activate your VPS server!

      • RHEL 8.4 released and here is how to upgrade 8.3 to 8.4 – nixCraft

        Red Hat Enterprise Linux (RHEL) 8.4 released. This version includes updates and various improvements for developers, hybrid cloud, edge deployments and more.

        Let us see what’s new in RHEL 8.4 and how to update 8.3 to 8.4 using the dnf command-line option.

      • How to Install Lumina Desktop on Ubuntu – Linux Hint

        Lumina is a plugin-based desktop environment developed for Unix and Unix-based operating systems. Launched back in 2012, Lumina was specifically used as the interface for the TrueOS and other systems based on the Berkeley Software Distribution (BSD). Later, Lumina started to be used for Linux and other Linux-based operating systems as well.

        The features of Lumina are quite similar to the widely-used typical desktop environments. The default interactive screen includes the start menu, task manager, and a system tray usually known as the taskbar. The desktop has icons for the different applications installed. You can access other menus through the start menu or by right-clicking the desktop. There are certain customizations also available so you can set the color theme according to your choice and choose an icon theme from the available presets. More OS-specific features of Lumina can only be used if you have the TrueOS.

      • How to Install and Customize Rhythmbox on Ubuntu – Linux Hint

        Being the default media player for most distributions, Rhythmbox is integral to a Linux user’s audio experience. It’s free, open-source, and designed to ideally work under GNOME. That, however, does not take away from its accessibility as it is also available on other environments. Tag editing, organizing music, playing digital audio files, you name it – Rhythmbox covers all your needs when it comes to playing media. It is a very convenient software; hence we have dedicated this guide to explain to our readers how they can install Rhythmbox on Ubuntu and customize it according to their wishes.

      • 3 Ways to Connect to WiFi from the Command Line on Debian – Linux Hint

        This tutorial briefly explains how to connect to Wifi from the command line on Linux Debian and Debian based distributions in 3 different ways: using nmcli, nmtui and wpa_supplicant. Additionally to nmcli, nmtui and wpa_supplicant, the commands iwconfig, iwlist and dhclient are used and briefly explained in this tutorial.

      • How to Speed Up Package Downloads and Updates with apt-fast on Ubuntu 20.04

        Have you ever experienced slow download speed when downloading or updating packages in Ubuntu, even if your network connection is working fine? This problem mainly occurs when you update and install packages for the first time after installing a new Ubuntu operating system. However, there is a way to work around this problem by speeding up the download speed with the apt-fast command in Linux.

        Apt-fast is a shell script wrapper for “apt-get” and “aptitude” that harnesses the power of both axel and aria 2 download managers to speed up the download process. It improves download performance by downloading multiple packages per connection simultaneously and in parallel.

        In this article, I will show you how to install and configure apt-fast to speed up the package update and download process in Ubuntu. We use Ubuntu 20.04 LTS for the description of the procedure mentioned in this article.

      • How and When to Create an Index in MySQL – Linux Hint

        When it comes to performance optimization for MySQL databases, creating indexes is one of the best ways. SQL indexes help improve database performance by providing fast access to the data stored in the database.

        An SQL index is not that different from a normal book index with a curated list of information and where you can find them.

        In this tutorial, we will discuss when to create an SQL index because, although indexes can help optimize performance, they can also cause slow performance and other negative impacts. We shall also discuss how to create an index using a real database.

      • How to Copy a Table in MySQL – Linux Hint

        There are some instances where we may need to copy a specific table from the same or a different database. For example, when performing backups or migrations, we might need to restore a table without restoring the entire database.

        This tutorial will go over how to copy a table from a database into another table using MySQL CREATE and SELECT clauses.

      • How to Copy or Clone an Entire MySQL Database – Linux Hint

        Backing up databases is a common task for many database users. For example, we might need to migrate the database from development to migration or even restore a copy of a corrupted database.

        This tutorial will show you how to copy or clone an entire database, including all the data, indexes, and keys.

      • How to Use MySQLDump Utility to Backup MySQL or MariaDB Database – Linux Hint

        MySQL databases come with a backup utility called MySQLdump. MySQLdump allows you to quickly backup a MySQL database from the command line. However, the MySQLdump tool is only useful if the database you wish to backup is up and running and accessible.

        This tutorial will show you how to use the mysqldump tool to backup your databases from the terminal.

      • How to Apply MacOS Theme on Ubuntu 20.04? – Linux Hint

        Linux systems already have many impressive built-in themes but you may get bored using them again and again.
        The interesting thing about Linux distributions is you can change the whole machine environment by altering the themes anytime. It does not only give a new look to the operating system but also provides a distinct experience.

        The macOS theme is undeniably the cleanest looking theme that any operating system has. How about getting the same theme on your Ubuntu? A collection of macOS themes is available on different online sources, pick any popular site and download your favorite theme from there.

      • How to Install and Configure a Restic Backup Utility – Linux Hint

        It is vital to have the latest backup copies of your files, tools, and configurations in case of error, system failure, or a cyber attack. Having a backup allows you to restore your system to your most recent state with minimal downtime.

        This tutorial will show you how to install and use the Restic Backup Utility on your machine.

      • How to LOOP in MySQL Stored Procedure – Linux Hint

        A loop construct in SQL and major programming languages refers to a construct that repeatedly executes instructions provided that the specified condition is true. The set of instructions executed inside a loop can be a single query or a collection of commands leading to a larger query set.

        In this tutorial, we will discuss how we can implement a MySQL loop within a procedure.

        For this tutorial, we assume you are aware of how to work with the MySQL procedures.

      • What Is Nohup and How Do You Use It? – Make Tech Easier

        There are a lot of commands available on Linux systems. There are some you’ll use multiple times a day and others generally reserved for special use cases. nohup is one such command. You won’t be using it every day, but you’ll be grateful it’s around when you need it. Here we show you what nohup is and how to use it.

      • LVM: How to Snapshot a Volume or Directory

        Snapshots are the copy of a filesystem, partition or a volume at a specific time. When a snapshot is captured, it copies all the data from a filesystem. In case of data loss, this snapshot can also be used to recover data. In this tutorial, we will use the lvm tool to snapshot a volume or a directory.

        How to Snapshot a Volume

        In the previous tutorial (How to Create Logical Volumes and Filesystems), we have created two logical volumes (lv01, lv02) on top of a volume group (vg01). We also created filesystems on top of these logical volumes. Now in this tutorial, we will write some data in lv01 logical volume and then we will take a snapshot of this logical volume. After this, we will verify whether the snapshot contains the same data as lv01’s logical volume.

      • Linux “hostname” Command Examples

        The “hostname” command in Linux is used to check the system name that is assigned to a Linux machine. However, this command can also be paired up with other different flags for getting different outputs. We will try to throw light on some examples of the “hostname” command in Linux in this article.

      • How to Use Btrfs on Synology NAS?

        Synology officially supports the Btrfs filesystem on all of their NAS devices. The Btrfs filesystem has a lot of advantages over the traditional EXT4 filesystem.

      • How to Use MySQL Temporary Tables – Linux Hint

        Except for a few who have exhaustively studied the MySQL documentation, not many database nuts know that MySQL has temporary tables. A temporary MySQL table is a type of table that allows us to store data temporarily in a single session.

        This tutorial will take you on a deep dive into how MySQL temporary tables work, and how we can use them in our daily database tasks.

      • How to Truncate a Table in MySQL – Linux Hint

        At this point, you may need to clean a table and all the data stored in it while preserving the table structure. In such a scenario, MySQL truncate clause is a very effective query.

        This tutorial highlights how to use MySQL TRUNCATE statements to remove all the data in a database table.

        MySQL TRUNCATE statement is part of the Data Definition Language statements. However, its functions are similar to the DELETE statement, making it seem a part of Data Manipulation Language.

        To use the TRUNCATE statement, you must have the DROP privileges on the database.

      • How to Make a Kubernetes Helm Chart – Linux Hint

        Helm is commonly referred to as Kubernetes’ package manager. Although it appears to be a basic package manager, it has more capabilities. Helm is a fully accessible project that was originally developed by DeisLabs and is now maintained by CNCF. Helm was created to give users the best way to handle all of the Kubernetes YAML files they build on Kubernetes projects.

        Helm Charts are a set of Kubernetes YAML artifacts that can be distributed to your Kubernetes clusters as a single package. It also maintains a version history with all released maps allowing you to revert to an old iteration if anything unexpected happens. This chart comes with native Kubernetes assistance so you won’t have to write any complicated syntax files or something to get started with Helm. Simply drag your design files into a new chart and you are done.

      • Does MySQL Support Materialized Views? – Linux Hint

        In the modern world, speed is key. When building applications and software with a database, we need fast access to data in the most minimal time possible. For that, we implement various database measures, including materialized views.

        However, unlike PostgreSQL or Oracle Database, MySQL does not natively support materialized views, which can be a huge disadvantage. That, however, is no reason to stop using MySQL because it is a great database for major applications.

        In this tutorial, we will quickly discuss what materialized views are, how they work, instances where they are applicable, and how to implement materialized views in MySQL.

      • How to convert a PNG file to JPG on Ubuntu

        JPEG is a lossy compression file format for digital images. It can greatly reduce the amount of storage space used by a graphics file compared to the PNG format. This tutorial describes how to convert a PNG file to JPG on the shell. I use the GraphicsMagick command-line tool on my Ubuntu 20.04 system to do this; the same steps work on Debian and probably on other Linux distributions. GraphicsMagick is an improved version of the well-known tool ImageMagick.

      • Check and Repair All MySQL Databases on Ubuntu

        The following command can be used to check and repair all MySQL databases on a Ubuntu or Debian Linux System. I’ve tested the commands on Ubuntu 20.04 and Debian 10.

      • 3 Ways to install 1Password manager on Ubuntu 20.04/21.04 – Linux Shout

        1Password for Linux is available to install and manage your password on your Ubuntu or Kali Linux. You will get the same feature as the Windows version including integration with system lock, inactivity, and suspension or integration with GNOME, KDE, and other window managers, as well as added, in addition to stability.

      • How to set up RStudio IDE on Linux

        Rstudio IDE is a tool that allows users to be more productive with R as well as Python. It includes loads of useful features, from syntax-highlighting, direct code execution, and more. Here’s how to install Rstudio IDE on Linux.

      • Linux Mint 20.1 Ulyssa Install Guide – If Not True Then False

        This is Linux Mint 20.1 Ulyssa full install guide. I install Linux Mint 20.1 Ulyssa using real PC.

        1. Download, verify and create USB install media.

        2. Boot and install Linux Mint 20.1 Ulyssa.

        3. Upgrade new Linux Mint 20.1 Ulyssa installation.

      • How to Self-Host Using Bitwarden – Linux Hint

        Bitwarden is a powerful open-source password manager app that allows you to customize and configure security for password management in a centralized location you control.
        Bitwarden is highly customizable, lightweight, and provides users with an API and browser extension to help users manage their passwords efficiently. Bitwarden also provides a mobile application, allowing you to synchronize all your personal information across all your devices.

        A self-hosted password manager is powerful and a better option since you are responsible for all the security and the features you deem fit. In case of compromise, you are in control of what happens to your data.

        This tutorial will walk you through how to set up a personal password manager using Bitwarden and Docker.

      • WebSockets Tutorial – Linux Hint

        WebSocket is standard protocol that is able to provide persistent connection between a server and a client. WebSockets are bidirectional, which means a server and client and send and receive data in the same channel, full-duplex communication protocol that is implemented on TCP/IP socket.

        WebSockets were built to counter the limits of HTTP protocol.

        First, in HTTP protocol, is not bidirectional. The client requests a specific resource on the server, once the server finds and sends the resource to the client, the connection is closed. This means that for a very active data flow, such as streaming service, there will be too much requests on the server.

      • WebSockets vs. HTTP/2 vs. SSE Compared – Linux Hint

        There are three primary technologies or features when it comes to the world of data and server-client communication protocols: HTTP/2, SSE, and WebSockets. Depending on your point of view and requirements, either of these technologies can be competitors or allies.
        This tutorial will break down what these technologies entail and what each one of them offers. This will help you understand and make a choice depending on the features you are looking for.

    • Wine or Emulation

      • Wine 6.9
        The Wine development release 6.9 is now available.
        What's new in this release (see below for details):
          - WPCAP library converted to PE.
          - Support for paper forms in the print spooler.
          - More math functions from Musl in the C runtime.
          - Various bug fixes.
        The source is available from the following locations:
        Binary packages for various distributions will be available from:
        You will find documentation on https://www.winehq.org/documentation
        You can also get the current source directly from the git
        repository. Check https://www.winehq.org/git for details.
        Wine is available thanks to the work of many people. See the file
        AUTHORS in the distribution for the complete list.
      • Wine 6.9 Released With More Improvements For Running Windows Apps/Games On Linux – Phoronix

        Wine 6.9 continues the work on converting their libraries to portable executable (PE) format with the WPCAP library now being PE. Wine 6.9 also has support for paper forms in the print spooler and more math functions from Musl libc implemented in the C runtime.

    • Games

      • Inmates will be petting dogs in the upcoming Prison Architect: Second Chances expansion

        Releasing on June 16, Paradox and Double Eleven confirmed today that Prison Architect: Second Chances is the next expansion for the prison building sim allowing you more ways to rehabilitate inmates.

        Offering up multiple new ways to ensure inmates get a chance at redemption, each program in Prison Architect: Second Chances offers a different means of rehabilitating a prisoner and changing their behaviour. These will include chatting to civilians, take on classes to prevent conflicts, pet a dog and more. After all, prison isn’t just about being locked up right? Not everything deserves the key being thrown away. However, some inmates will reoffend so be prepared for the costs.

      • Crusader Kings III gets a first major expansion with the Royal Court | GamingOnLinux

        Due out sometime later this year, Crusader Kings III: Royal Court has been announced today as the first major expansion to the epic role-playing strategy game from Paradox.

        Finally, an expansion fit for a king or queen or whatever. We get our very own throne, we can finally show off our might with shiny things. It’s not all glory though, as always running a country (or many) has lots of demands placed upon you that you will need to deal with. Royal Court is the first major expansion for Crusader Kings III, Paradox Development Studio’s critically-acclaimed strategy role-playing game about the medieval world. Powerful rulers can establish the kind of court that inspires troubadours, decorating it with relics from family history and favouring subjects with the answers to their many problems.

      • Paradox Interactive finally announces the hotly anticipated Victoria 3 | GamingOnLinux

        Paradox fans have been screaming for it for a long time and they’ve finally gone and done it, Victoria 3 is official and it’s coming but no release date yet.

        Speculation has been ripe for years, Paradox have joked about it but it’s really happening. In this ultimate society simulator, players step back in time to the great Victorian Era of the 19th and early 20th centuries to master economics, diplomacy, and politics all for the sake of a better tomorrow in one of the most anticipated games in Paradox’s history.


        Just like previous titles developed in-house by the teams at PDS, it looks like it will once again be supporting Linux with it setup on Steam ready to have Linux system requirements once again (once they’re finalised, it’s all “TBC” right now).

      • Them’s Fightin’ Herds looks better than ever with the HD upgrade out now | GamingOnLinux

        Them’s Fightin’ Herds is a wonderful fighting game that came to Linux officially recently, and with the 2.1.0 update that’s out now it looks graphically better than ever.

      • Multiple Paradox titles free to play this weekend along with a big sale for PDXCON | GamingOnLinux

        Paradox are running another PDXCON from today for the weekend, where we expect a new strategy game to be announced. To get things going Stellaris, Surviving Mars and Cities: Skylines are free to play for the weekend on Steam and a big sale is on. Each title also has a huge discount if you decide you wish to keep them.

        For the new announcement, we don’t have a clue what it will be – but since it’s an internal Paradox title (they’re not just publishing it), hopefully it will continue the tradition of Linux support. When we know, you will know!

    • Distributions

      • New Releases

        • antiX-19.4 available

          The usual uploads of full, base, core and net for 32 and 64 bit architecture.
          There are sysvinit versions and runit versions.

          Note: the runit versions follow Debian’s implementation of it so it is not like how Void linux or Artix set up runit.

          antiX-21 runit series will be closer to the Void/Artix way.

      • BSD

        • Linux Release Roundup #21.21: NetBSD 9.2, Kdenlive 21.04.1, Ubuntu Touch OTA 17, and More New Releases

          NetBSD 9.2 is a mostly a bug fix release that addresses a number of networking fixes along with ZFS stability improvements.

          There are some kernel-level changes and updates to certain programs. You can read all about it in the official announcement.

        • Announcing NetBSD 9.2 (May 12, 2021)

          The NetBSD Project is pleased to announce NetBSD 9.2 “Nakatomi Socrates”, the second update of the NetBSD 9 release branch.

          It represents a selected subset of fixes deemed important for security or stability reasons since the release of NetBSD 9.1 in October 2020, as well some enhancements backported from the development branch. It is fully compatible with NetBSD 9.0.

      • SUSE/OpenSUSE

        • openSUSE Tumbleweed – Review of the week 2021/20

          This week felt quite unspectacular, but maybe that’s just for me and because I already know what will expect us next week. And so will you, soon! Anyway, first we look back one week. Tumbleweed has seen 5 published snapshots (0513, 0514, 0515, 0517, and 0519).

      • IBM/Red Hat/Fedora

        • Stability plus innovation: Red Hat Enterprise Linux 8.4 is now GA

          Red Hat Enterprise Linux (RHEL) 8.4 is generally available to customers as of May 19, 2021. Delivered as part of the predictable, six-month cadence of RHEL releases 8.4 brings important features for hybrid cloud, edge deployments and enhancements for operators, developers and organizations standardized on RHEL.

        • RHEL 8.4 Released With Tiger Lake Graphics, Expanded eBPF Support

          Red Hat Enterprise Linux 8.4 features Intel Tiger Lake graphics support, expanded eBPF kernel capabilities, proactive memory compaction is now available with the RHEL8 kernel, the time namespace and other kernel features back-ported, various package updates, Python 3.9 availability, and other routine updates for this enterprise Linux operating system. Other AppStreams updates include the availability of Redis 6, PostgreSQL 13, MariaDB 10.4, GCC 10, LLVM 11, and Rust 1.49.

        • Red Hat announced Developer Sandbox and new solutions to help get started with Kubernetes

          Red Hat unveiled its Developer Sandbox for Red Hat OpenShift to make it easier for developers to get started with building Kubernetes-based applications using the same infrastructure and tools that they run in their application environments.

          The new solution provides a private OpenShift environment in a shared, multi-tenant cluster that is pre-configured with a set of developer tools. The tight integrations between the infrastructure and tools provide a safe environment for prototyping or building new applications, creating containers from source files or Docker files and more, according to the company.

          Red Hat also announced updates to many of its tools which can be coupled with the Developer Sandbox.

          Red Hat OpenShift 4.7 web console developer perspective makes it easier for developers to get started with new integrations and fully-customizable quick starts.

        • Agile: How to make your strategy succeed | The Enterprisers Project

          Agile transformation is a complex organizational change, and successful implementation requires strong leadership and buy-in from everyone in the organization. If your organization is struggling to adopt Agile, it may not be clear what is hindering the transition.

          Let’s look at some common pitfalls, along with some tips to overcome them.

          Lack of team buy-in. Adopting Agile at the team level is critical. Remember, your teams are the ones responsible for making it all happen and delivering tangible results to customers.

          Decisions involve only C-level. Top leadership may be responsible for managing most of your organization’s operations, but if you want your team to respond, be proactive and support change, you must empower them to share their ideas and concerns. Agile transformation is possible only if you get everyone on the same page and excited for change.

        • Deploying Prometheus/Grafana, learning metrics

          In the Cockpit team we recently started to generate and export metrics about our CI, and collect/graph them by a Red Hat internal Prometheus and Grafana instance. But I am not happy with this yet, as it does not yet answer all the questions that we have for it. Also, it is not accessible outside of Red Hat.

        • Adam Young: Upgrading QGo to QT5

          My Day job has me messing around with QT5. We’re building various RPMs for different RHEL and CentOS versions, and I wanted to get a little more experience on this. Specifically, I wanted to be able to do trial and error on a package that would not pollute our work stream. I wanted it to be something QT based. And I wanted it to be fun.

          So I am working on repackaging QGo for Fedora 34 using QT5. Here’s what I am learning.

        • Friday’s Fedora Facts: 2021-20

          Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! Fedora Linux 32 will reach end of life on Tuesday 25 May. Elections voting is open through 3 June.

          I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

    • Devices/Embedded

      • $99 SBC runs Linux on RISC-V based Allwinner D1

        RVBoards has launched a $99 “Nezha” SBC that runs Linux on the 1GHz Allwinner D1 SoC with a 64-bit, RISC-V XuanTie C906 core. The SBC provides 1GB RAM, GbE, HDMI, 2x USB, 40-pin, and LCD, cam, and audio add-ons.

        RVBoards, a community project from PerXLab, has gone to Indiegogo to launch the first SBC built around the recently revealed, RISC-V architecture Allwinner D1 SoC. The open-spec, Linux supported Nezha SBC starts at $99. Prices move up to $170 for a fully configured model with touch-panel, mic array, and USB camera add-ons, which are also available separately.

      • Low Cost Raspberry Pi Alternative RISC-V Board Starts Crowdfunding

        The 64bit RISC-V Raspberry Pi alternative we wrote about last month has turned up again, this time on Indiegogo, with a new name. The Nezha board, named after a protective deity in Chinese mythology, was also briefly listed for purchase directly from AliExpress but it seems that it has since been taken down. Nezha offers a low cost, point of entry into the RISC-V world for developers eager to try a new IoT platform.

      • Asus Tinker Board 2S Review

        When an old laptop or smartphone is overkill for your DIY electronics project, a single-board computer is the perfect affordable alternative. It’s been almost a decade since the first Raspberry Pi started a phenomenon and four years since Asus joined the party with its original Tinker Board. Now, a next-generation Tinker Board 2S has appeared to compete with today’s more powerful options. It’s pricey at $125, but it packs a lot of potential for sophisticated inventions and dedicated makers.

        A Small But Mighty Foundation

        If you’re reading this, there’s a good chance you’re already familiar with single-board computers, and the Tinker Board 2S doesn’t reinvent the wheel. About the size of a deck of cards—in fact, extremely similar in size and shape to the Raspberry Pi—the 2S (and the Tinker Board 2, which has just a microSD card slot for storage while the 2S has both a slot and 16GB of eMMC flash) fit a lot of functionality onto a small PCB.

        The brain of the Tinker Board 2S is a 64-bit Rockchip RK3399 system-on-a-chip, consisting of a dual-core ARM Cortex-A72 running at 2.0GHz and a quad-core ARM Cortex-A53 running at 1.5GHz. This big.LITTLE design, as ARM calls it, allows the two CPUs to dynamically allocate tasks to the appropriate core for reduced energy usage. You also get a Mali-T860 MP4 GPU running at 800MHz and 2GB or 4GB of dual-channel LPDDR4 memory, depending on the model you choose. Our $125 test model comes with 2GB.

      • Open Hardware/Modding

        • SiFive HiFive Unmatched RISC-V Developer Boards Begin Shipping – Phoronix

          Announced last year was the HiFive Unmatched as the most compelling RISC-V development board to date. Following supply chain issues and everything else brought on by the pandemic, this very interesting RISC-V developer board is now shipping to customers.

          The HiFive Unmatched is a mini-ITX board built around the SiFive FU740 SoC with four U74-MC cores and one S7 core while having 16GB of DDR4 RAM. The board has a PCI Express x16 slot (albeit at PCIe Gen3 x8 speeds), NVMe M.2 slot, micro-SD slot, Gigabit Ethernet, four USB 3.2 Gen 1 ports, and other modern connectivity. It has a decent amount of power to it, can be conveniently mounted inside a mini-ITX case, and feature set makes it quite a nice developer board for those wanting to dive into the RISC-V ecosystem.

        • Foamin is a novel sensing method for detecting deformable gestures with conductive foam | Arduino Blog

          The field of soft tactile sensors is fascinating, as they grant robots the ability to move more freely or have greater granularity. Soft sensors also allow for human-computer interfaces to feel more interactive. However, previous sensors like these required multiple devices or complex wiring, making them difficult to use. To address these challenges, researchers from the University of Tokyo and Mercari R4D were able to come up with a way to integrate touch-sensitive pads onto a piece of foam, which they call “foamin.”

    • Free, Libre, and Open Source Software

      • The Apache News Round-up: week ending 21 May 2021
      • Public Services/Government

        • Dutch Digital Autonomy must be based on Free Software and Open Standards

          “The Netherlands is losing grip on internet security, and is therefore in danger of losing control over democracy, the rule of law and the economic innovation system.” This warning comes from the Cyber Security Council, a national and independent advisory body of the Dutch government and business community with members from the government, industry and academia.

          This warning comes from the Cyber Security Council, a national and independent advisory body of the Dutch government and business community with members from the government, industry and academia. In their recent advice, they do an urgent call on the Dutch Cabinet to take quick action to prevent that Dutch society and economy becomes too dependent on proprietary technology they can not control.

      • Programming/Development

        • Improving Application Security with UndefinedBehaviorSanitizer (UBSan) and GCC

          The UBSan (“UndefinedBehaviorSanitizer”) tool is a very useful, yet relatively unknown member of the GNU/Linux Toolchain family. This tool can improve the security of an application by efficiently detecting several types of errors in the source code. It is a run time tool that reports errors as the program executes.

          In this article we introduce and discuss the features of UBSan; we explain how to use it; and we provide some tips and tricks showing how to get the maximum benefit from this tool.

          What is Undefined Behavior and How Does it Impact Application Security?
          What is undefined behavior? Language specifications often fail to say what the compiler should do when code does not conform to expected values. For example, the C specification does not say what the result should be if an array is indexed with an out-of-bounds value, or what should happen if the shift amount is greater than the size of the expression in a bitwise shift. Since the result for these cases is unspecified, the compiler is free to generate any code that produces the correct result when the values are within the correct range, and ignore the possibility of incorrect values. This means that different compilers may handle these situations differently and in general the result of undefined behavior is unpredictable. The code may “work” with one compiler on certain hardware and not with another combination, it may “work” without optimization and fail with optimization or vice-versa. These situations generally point to an undefined behavior bug in the code.

        • QJSValue vs QJSManagedValue/QJSPrimitiveValue

          When Qt 6.1 got released you might have read about QJSManagedValue and how it “give[s] more fine grained control over JavaScript execution”. But what does that actually mean? To understand this, let’s first recap what QJSValue is all about, and then compare it with the new classes.

        • The C Command Line Arguments Processing – Linux Hint

          C programming language provides us with a way to pass command line arguments in Linux. This article will enlighten you more on this concept by discussing how the command line arguments are processed in C. Moreover, we will look at a suitable example that will possibly remove all your ambiguities regarding the said concept.

        • Calloc in C – Linux Hint

          “calloc” is yet another commonly used function of the “stdlib.h” library. It stands for contiguous allocation. As the name says, this function is also used to allocate memory while using the heap instead of the stack. Again, this kind of memory allocation is known as dynamic memory allocation. The main aim of today’s discussion is to throw light on how the “calloc” function works in C. Then, we will draw a comparison between the “calloc” and “malloc” functions. Finally, we will elaborate on the usage of the “calloc” function in C by sharing an example with you.

        • Perl/Raku

          • Perl 5.34.0 released

            Version 5.34.0 of the Perl language has been released. “Perl 5.34.0 represents approximately 11 months of development since Perl 5.32.0 and contains approximately 280,000 lines of changes across 2,100 files from 78 authors.” See this page for a list of changes; they include a new try/catch syntax, a new octal syntax, and many improvements to various modules.

        • Python

          • How Do I See Directory Changes in Python? – Linux Hint

            In some instances, especially in critical and restricted locations of the filesystem, it can be helpful to know when things change and what has changed. Using Linux Inotify tools and Python, we can view and log the changes that happen within the system.

            This tutorial will go over how to implement a simple script that uses Python and Linux Inotify API to monitor changes in a specific directory and log the console changes.

            Before we get to the script, let us briefly discuss how Inotify works.

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • Linux 5.13 Release Candidate 3 Fixes 37 Patches From Banned University

                It might be time to put away the popcorn. Phoronix today reported that Linux developer Greg Kroah-Hartman reverted 37 patches associated with the University of Minnesota (UMN), which he banned from contributing to the kernel in April. This came via a pull request to Linux 5.13 Release Candidate 3 (5.13-rc3) submitted on Thursday.

                “The majority here is the fallout of the umn.edu re-review of all prior submissions,” Kroah-Hartman said in the pull request for these changes. “That resulted in a bunch of reverts along with the ‘correct’ changes made, such that there is no regression of any of the potential fixes that were made by those individuals. I would like to thank the over 80 different developers who helped with the review and fixes for this mess.”

                UMN was banned from contributing to the Linux kernel in April following two research projects — one into “hypocrite commits” and one the researchers said was meant to “automatically identify bugs introduced by other patches (not from us)”—that drew ire from the Linux developer community. The Linux Foundation Technical Advisory Board (TAB) ended up reviewing 435 contributions associated with UMN.

        • Security

    • AstroTurf/Lobbying/Politics

    • Monopolies

      • Apple App Store profits look ‘disproportionate,’ U.S. judge tells CEO Cook

        A federal judge on Friday grilled Apple Inc Chief Executive Tim Cook over whether the iPhone maker’s App Store profits from developers such as “Fortnite” maker Epic Games are justified and whether Apple faces any real competitive pressure to change its ways.

        Cook testified for more than two hours in Oakland, California, as the closing witness in Apple’s defense against Epic’s charges that the iPhone maker’s App Store controls and commissions have created a monopoly that Apple illegally abuses.

        App makers including music service Spotify Technology, European regulators and U.S. politicians who question whether the company that once urged the world to ‘think different’ has now become too big and too powerful.

        At the end of testimony, Judge Yvonne Gonzalez Rogers questioned Cook, pressing him to concede that game developers generate most App Store revenue and help subsidize other apps on the store that pay no commission.

Links 21/5/2021: Tuxedo Infinity Book Pro 14 and Qualcomm Putting Linux on Chips

Posted in News Roundup at 2:23 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Emulate the Sinclair ZX81 home computer with Linux

      Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer.

      Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user.

      Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software.

    • 1 year update on the ThinkPad X1 Yoga laptop

      Last year I replaced my old laptop with a Lenovo ThinkPad X1 Yoga, and I wrote a preliminary review of it. This laptop is my only computer, used for both work and play. I’ve had it for a year, gotten used to some of my initial annoyances, and discovered a few new ones. So I thought I’d provide an update with some more long-term impressions.


      While I love the sharpness of the laptop’s 3840×2160 4K display, this resolution is overkill for its 14″ screen size. At 200% scaling, things are too small. Currently I am using 200% scale with 11pt Noto Sans font, which takes advantage of a bug in Noto Sans in that 11pt is 22% bigger than 10pt, not 10% bigger like you would expect. The super high resolution also results in excessive power consumption, contributing to poor battery life. And the 16:9 aspect ratio is not ideal.

      Later models of this laptop have a 16:10 screen, but with the same excessive 4K resolution. Boo.

      A 14″ laptop screen ideally needs a resolution of 3200×2000 so that when you scale it to 200%, you get an effective resolution of 1600×1000. This is still perfectly sufficient to make the individual pixels invisible, but would draw less power and yield un-problematic 200% scaling for perfectly crisp and pixel-aligned visuals.

    • Desktop/Laptop

      • This Is TUXEDO InfinityBook Pro14 Linux Laptop : Full Specifications

        Another Linux dedicated Laptop is out as TUXEDO Computers launched TUXEDO InfinityBook Pro 14 Linux laptop with massive configurations.

        TUXEDO InfinityBook Pro 4 is now available for the pre-oder and it will start shipping from May 31, 2021.

      • Tuxedo Infinity Book Pro 14 Linux laptop launched with 3K LTPS LCD display option and Tiger Lake-U CPUs

        Schenker subsidiary Tuxedo is introducing a new Linux-based 14-inch business laptop powered by Intel’s Tiger Lake-U processors. It does not come with a dedicated GPU, unfortunately, but, to compensate, it gets a 3K LTPS display option with 16:10 aspect ratio.

        The new Infinity Book Pro 14 from Tuxedo can be equipped with either a Core i5-1135G7 with 80 EU Iris Xe iGPU or an i7-1165G7 processor with 96 EU Iris Xe iGPU. These can be coupled with a maximum of 64 GB of DDR4-3200 RAM and the storage solution supports up to 4 TB capacities through the M.2 2280 PCIe 4.0 x4 and PCIe 4.0 X2 slots, plus it also offers Intel Optane memory compatibility.

      • Tuxedo takes on Apple’s MacBook with new 3K Linux laptop — equipped with Intel’s latest 11th Gen CPU

        Linux PC developers Tuxedo unveils its 6th-gen InfinityBook Pro 14, a Ubuntu-based Linux laptop with an impressive 3K display panel to take on Apple’s popular MacBook laptops.

        The European company’s 14-inch laptop is set to start shipping on May 13, and it comes pre-installed with the popular Ubuntu-based OS for Linux laptops. For those interested, pre-orders are now available but it might be worth checking out what’s under the hood below.

      • Linux on Chrome OS is finally out of beta, three years later

        Chromebooks have had Linux support for such a long time by now, you’d be forgiven if you forgot that Linux has only ever been in beta testing for all these years. At I/O 2021, Google has announced that that’s about to change with the next version of Chrome OS, 91. Linux is finally losing its beta moniker.

        Chrome OS first introduced support for Linux about three years ago, and it’s been a wild ride. While the OS itself is technically build on top of Linux (just like Android), it isn’t able to run traditional Linux apps by itself. Even before Google introduced the official Linux container, people were going around this limit with a script (crouton) that added Ubuntu or Debian on top of Chrome OS. After its introduction, Google’s official solution quickly gained traction, but it was still pretty limited in the beginning. Only a few select Chromebooks supported it, and things like sound and graphics were broken, severely limiting the utility of the subsystem. But those were the early days, and while it took Google some time, Linux apps almost feel right at home on Chrome OS now.

      • Chrome OS support for Linux apps will exit beta in a few weeks

        Google has announced that Chrome OS support for Linux apps will finally exit beta in a few weeks.

        Linux apps have been available on Chrome OS for three years, albeit in beta. Google is now ready to drop the beta label and declare the feature stable.

      • Entroware bring the Proteus Linux laptop with Intel Xe, a big screen and long battery life
      • Entroware Proteus is a Linux Laptop for Getting Things Done

        Not wanting to be left out is UK-based computer company Entroware, who have just unveiled their latest Ubuntu laptop — and it’s packs some big tech inside.

        Say hello to the Entroware Proteus.

        The Entroware Proteus is 15.6-inch laptop packing a whopping 73 Wh battery. Even used at full tilt, this laptop isn’t going to need recharging as often as other 15-inch workstations, meaning users can get more done,with fewer adapter-related interruptions.

      • Entroware Unveils New Proteus Linux Laptop Powered by Ubuntu 20.04 LTS

        If you’re in the market for a new Linux laptop, you should know that Entroware Proteus is now on sale as an ultra-portable and ultra-professional Linux notebook featuring a generous 15.6-inch Full HD (1920×1080) IPS matte display with an ultra-thin bezel, full backlit keyboard, and an aluminium alloy chassis that’s 2 cm thick.

        Under the hood, the Entroware Proteus laptop can be configured with 11th Gen Intel Core processors, either the Intel Core i5-1135G7 with 4 core, 8 threads, 8M cache, and up to 4.20 GHz clock speeds, or the more powerful Intel Core i7-1165G7 with 4 cores, 8 threads, 12M cache, and up to 4.70 GHz clock speeds.

    • Server

      • 10 Best Webmin Alternative tools for Ubuntu or Linux Servers

        Webmin is a free web-based software platform meant to manage Linux servers and their services. It is distributed under a free license thus, anybody can use it without paying any cost. Here we will find some best alternatives to Webmin for Ubuntu, CentOS, RHEL, Rocky Linux, AlmaLinux, and other Server distros.

        It is a tool with which you can easily manage, coordinate and control almost all services (server processes, daemons ) in a Unix system. It is module-based and tons of management modules can be easily reloaded.

        Thanks to its simple front-end fluent web interface that only requires the Perl interpreter to run, which is installed by default with the operating system in the “/usr/bin/” directory. The work is then done by CGI scripts that are called up with a common web browser.

    • Audiocasts/Shows

      • Plasma gets Prettier and more Blurred by the day!
      • Yes, This Is A FOSS Sonic Fan Game

        A couple of streams back someone told me about an interesting project. Sonic Robo Blast 2, a FOSS Sonic fan game based on the DOOM engine, I knew that I had to go and play it because that sounds amazing.

      • The Future of Home Assistant | Self-Hosted 45

        Join us for a chat with Paulus, the founder of Home Assistant, as we look to the project’s future, hardware devices, new standards, and more.

      • Awesome Window Rules Make Your Life More Awesome

        Window rules are a feature of many window managers but today I thought it’d be helpful to do a bit of exploring of the ones implemented in Awesome WM, these allow you to control how and where your windows will spawn and be allowed to move. This has been sitting in my upload folder for a month, I could have sworn I had already uploaded this video.

    • Kernel Space

      • Multigen LRU Patches Updated For Addressing Linux’s Expensive Page Reclaimation – Phoronix

        One of the interesting performance-related kernel patch series to come about so far this year has been Google’s multi-generational LRU framework that is promising to offer much better performance in addressing the kernel’s expensive page reclaimation handling.

        The Multigen LRU framework addresses issues with the current kernel design, “the current page reclaim is too expensive in terms of CPU usage and often making poor choices about what to evict. We would like to offer an alternative framework that is performant, versatile and straightforward.” This patch series has been touted as leading to ~18% less low-memory kills on Android, code starts reduced by 16%, and Google’s testing on Chrome OS led to ~96% fewer low-memory tab discards and 59% less out-of-memory kills thanks to this improved least recently used framework.

      • ASpeed AST2500 SSIF BMC Driver Being Worked On For The Linux Kernel – Phoronix

        ARM server vendor Ampere Computing has been working on an SSIF BMC-side driver for the Aspeed ASTC2500 baseboard management controller that they are looking to upstream in the Linux kernel.

        SSIF is short for the SMBus System Interface and allows accessing the baseboard management controller by way of the SMBus host controller.

      • AMD “Beige Goby” GPU Support Targeting Linux 5.14 Inclusion – Phoronix

        AMD submitted another set of feature changes to DRM-Next for queuing ahead of this summer’s Linux 5.14 cycle.

        This latest pull request just comes one week after their initial 5.14 pull last week that included more work on their Adebaran CDNA accelerator, initial HHVM SVM support, DP LTTPR handling improvements, PCI Express ASPM enablement, TMZ for Renoir, support for handling multiple eDP panels, and other enhancements.

      • New Patches Posted For Linux Runtime Verification

        A new patch series has been posted implementing Runtime Verification (RV) for the Linux kernel.

      • The second half of the 5.13 merge window [LWN.net]

        By the time the last pull request was acted on and 5.13-rc1 was released, a total of 14,231 non-merge commits had found their way into the mainline. That makes the 5.13 merge window larger than the entire 5.12 development cycle (13,015 commits) and just short of all of 5.11 (14,340). In other words, 5.13 looks like one of the busier development cycles we have seen for a little while. About 6,400 of these commits came in after the first-half summary was written, and they include a number of significant new features.

      • Noncoherent DMA mappings [LWN.net]

        While it is sometimes possible to perform I/O by moving data through the CPU, the only way to get the required level of performance is usually for devices to move data directly to and from memory. Direct memory access (DMA) I/O has been well supported in the Linux kernel since the early days, but there are always ways in which that support can be improved, especially when hardware adds some challenges of its own. The somewhat confusingly named “non-contiguous” DMA API that was added for 5.13 shows the kinds of things that have to be done to get the best performance on current systems.

        DMA, of course, presents a number of interesting race conditions that can arise in the absence of an agreement between the CPU and the device over who controls a range of memory at any given time. But there is another problem that comes up as well. CPUs aggressively cache memory contents to avoid the considerable expense of actually going to memory for every reference. But if a CPU has cached data that is subsequently overwritten by DMA, the CPU could end up reading incorrect data from the cache, resulting in data corruption. Similarly, if the cache contains data written by the CPU that has not yet made it to memory, that data really needs to be flushed out before the device accesses that memory or bad things are likely to happen.

        The x86 architecture makes life relatively easy (in this regard, at least) for kernel developers by providing cache snooping; CPU caches will be invalidated if a device is seen to be writing to a range of memory, for example. This “cache-coherent” behavior means that developers need not worry about cache contents corrupting their data. Other architectures are not so forgiving. The Arm architecture, among others, will happily retain cache contents that no longer match the memory they are allegedly caching. On such systems, developers must take care to manage the cache properly as control of a DMA buffer is passed between the device and the CPU.

      • A pair of memory-allocation improvements in 5.13

        Among the many changes merged for 5.13 can be found performance improvements throughout the kernel. This work does not always stand out the way that new features do, but it is vitally important for the future of the kernel overall. In the memory-management area, a couple of long-running patch sets have finally made it into the mainline; these provide a bulk page-allocation interface and huge-page mappings in the vmalloc() area. Both of these changes should make things faster, at least for some workloads.

        Batch page allocation

        The kernel’s memory-allocation functions have long been optimized for performance and scalability, but there are situations where that work still has not achieved the desired results. One of those is high-speed networking. Back in 2016, networking developer Jesper Dangaard Brouer described the challenges that come with the fastest network links; when the system is processing tens of millions of packets per second, the time available to deal with any given packet is highly constrained. The kernel may only have a few hundred CPU cycles available to process each packet, and obtaining a page from the memory allocator may, by itself, require more than that. Using the entire CPU-time budget to allocate memory is not the way to get the best network performance.

        At the time, Brouer asked for an API that would allow numerous pages to be allocated with a single call, hopefully with a much lower per-page cost. The networking code could then grab a pile of memory, and quickly hand out pages as needed. Nobody objected to the request at the time; it is well understood that batching operations can increase throughput in situations like this. But it took some time for that interface to come around.

      • Linus Torvalds on the Importance of Open Source

        Ahead of the 30th anniversary of Linux, coming up in August of 2021, Jeremy Andrews has conducted an two-part, in-depth interview with Linus Torvalds, covering topics such as open source licensing, corporate contributions, Git, project maintenance, and more.

        When asked about choosing the GPLv2 license for the Linux kernel, Torvalds says, “I’m 100% convinced that the license has been a big part of the success of Linux (and Git, for that matter). I think everybody involved ends up being much happier when they know that everybody has equal rights, and nobody is special with regards to licensing.”

    • Benchmarks

      • Clear Linux Offers Up Advantages For Ice Lake Xeon, CentOS Comes In Strong

        Earlier this week when posting Ubuntu 20.04 LTS / 20.10 / 21.04 benchmarks on the new Intel Xeon Platinum 8380 “Ice Lake” server processors, one of the first questions that came up was about how well these new 10nm server CPUs perform with Intel’s own Clear Linux distribution. While Clear Linux releases have become much less frequent and far less to communicate these days on new improvements/optimizations among other ongoing shifts with that Intel open-source project, it is still performing very strongly with 3rd Gen Xeon Scalable hardware. CentOS in these tests also had a strong showing with the increasing performance focus on that front.

    • Applications

      • Sublime Text 4 Has Finally Arrived, Here’s How to Install it on Linux

        Sublime Text 4 brings refreshed UI and some new major features. Packages and package repositories are provided for most of the major Linux distributions.

        Sublime Text is certainly one of the most popular code editors out there and for good reason. Above all, it is lightning fast. Sublime Text is a cross-platform text editor developed for individuals who are looking for an effective yet minimalist tool for shuffling code around.

        While being a lightweight text editor, it provides powerful IDE-like features, and the ability to customize every aspect of the editor itself, letting users code and refactor with speed and efficiency.

      • Sublime Text 4 Released! How to Install it via Official Repository | UbuntuHandbook

        Sublime Text 4 was officially released a day ago. Here’s how to install it in Ubuntu 21.04, Ubuntu 20.04 via apt repository.

        Sublime Text 4 (Build 4107) feature multi-select tabs. Press and hold Ctrl (or Shift), then you can select tabs to view them side by side.


        The syntax highlighting engine has been significantly improved, with new features like handling non-deterministic grammars, multi-line constructs, lazy embeds and syntax inheritance. Memory usage has been reduced, and load times are faster than ever.

    • Instructionals/Technical

      • How To Remove Symbolic Links on Linux – idroot

        In this tutorial, we will show you how to remove symbolic links on Linux. For those of you who didn’t know, A symbolic link (also known as a symlink) is a term or special type of file in Linux that points to another file or directory. In general Symbolic links are used to link libraries. Also, used to link log files and folders on mounted NFS (Network File System) shares.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step to remove symbolic links on Linux.

      • How to Install Docker CE in Linux Mint 20

        Docker is an open-source containerization technology that is designed to create, deploy and run container-based applications in Linux system.

      • Attempted to compile Paragon NTFS driver
      • How to Install Latest XFCE Desktop in Ubuntu and Fedora

        Xfce is a modern, open-source, and lightweight desktop environment for Linux operating systems, meant to be fast and easy to use and configure.

      • How to Install Odoo on CentOS – ThisHosting.Rocks

        In this tutorial, we’re going to show you how to install Odoo 14 on a CentOS 8 server using Docker.

        After we published our How to Install Odoo on Ubuntu tutorial, there were many requests to do one for CentOS too, so here we go.

        These instructions are similar for other CentOS versions too.

      • Remove grep command while grepping using ps command – nixCraft

        use ps command to find out all running process on my Linux and Unix system. The ps command shows information about a selection of the active processes on the shell. You may also pipe out ps command output through grep command to pick up desired output. Let us see how to exclude grep from ps outputs.

      • Joining Fedora Linux to an enterprise domain – Fedora Magazine

        When you think about corporate networks, the most widely used Linux-based operating system that comes to mind is Red Hat Enterprise Linux (RHEL), used mostly on servers, but also as workstations. Fedora Linux is also a very good choice for a workstation, and comes packed with lots of features to work in the corporate environment and makes management an easy task.

        When you work with many machines in your network you need a way to manage users and machines in a centralized way. That’s why FreeIPA and Active Directory are the technologies of choice for this task. They allow a sysadmin to manage a huge amount of machines using a directory of all the entities in their network.

      • How to Check Disk SSD or HDD in Linux

        Learn here how to check the installed disk is SSD or HDD in a Linux system. Best to way identify disk type can be done by checking disks rotational feature.

      • How to Use NFS to Mount Synology to Linux as a Storage Space? – Linux Hint

        The full meaning of NFS is Network File Service. It is a protocol for accessing remote filesystems.

        You can use the NFS protocol to access your Synology NAS shared folders from Linux. In this article, I will show you how to do that. So, let’s get started.

      • How to Configure Static IP Address on Ubuntu 20.04? – Linux Hint

        The Internet Protocol (IP) address is an identifier between the Internet and network. It is the assigned unique number to every device and allows them to communicate with other networks. Your network can be accessed using the IP address.

      • What is the SS Command in Linux? – Linux Hint

        The ability to view and understand network socket connections as they happen in your Linux system can be valuable when troubleshooting and getting your system status.
        This tutorial will take you on an in-depth look at the ss command-line utility that allows us to view network connections and other detailed information. Using what you’ll learn from this guide, you should understand and use the ss utility for maximum information and productivity.

        Let us get started.

      • How to install Funkin’ VS. Kapi on a Chromebook

        Today we are looking at how to install Funkin’ VS. Kapi on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Bash Loops In-Depth – Linux Hint

        A loop consists of one or more commands that execute repeatedly until a condition is met. In order for this to happen, the commands have to be in a construct. The construct and its commands form a compound command. A Bash command exits with zero if there was no problem. On the other hand, it exits with a number greater than zero if there was an issue or a problem. The exit status of a compound command is that of its last command.

      • How to shutdown FreeBSD laptop when running out of battery power

        After my Raspberry PI died, I decided not to get a new one immediately. Instead, I turned the older laptop into a FreeBSD server. I use this server for Git, backup via ZFS snapshots, running Debian/RHEL VM using bhyve, side project web server and jails with ZFS. It works perfectly, but during monsoon season, the electric supply at home goes for hours, and my battery backup UPS only works for 15 minutes. Hence, when my FreeBSD laptop starts to run out of battery juicy, I want to shut it down automatically to avoid sudden filesystem and other corruption issues.

      • zcommands: Read gzip Compressed Text Files on Linux/Unix – nixCraft

        Linux and Unix like operating systems comes with z* commands. These commands allow you to read gzip compressed text files using zless, zcat, zmore, and friends commands. The gzip command reduces the size of the files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz while keeping the same ownership modes, access, and modification times. z* commands have some cool usage too, such as display the current time in different zonename.

      • How to install Ubuntu 21.04 on Virtualbox – Unixcop

        There are many ways to install ubuntu on your PC or laptop. You can either have a clean install on your system or dual boot with any other operating system (OS). But in this article, I am going to show how to install Ubuntu in Windows 10 using VirtualBox in 2021. But before that here’s the few things you should know.

      • How to Install and Use Curl on Linux Distributions: A Beginner’s Guide

        cURL is one of the most used, safe, and reliable command tools to download and transfer files over a network, FTP, HTTP, SMTP, and other repositories. cURL can be used on both Mac and Linux. It shows and encodes the download data on the console. As a professional Linux user, I have run more than thousands of cURL commands on my Linux shell to download an application, files, GitHub repositories without facing any major issues. If you’re a programmer or software developer, I’m sure you are already a fan of the curl command tool.

      • What is Subshell in Linux?

        You might have heard that a shell script runs in its own shell. Learn more on the concept of subshell in Linux.

    • Games

      • Reverse engineered PlayStation classic Driver 2 reimplementation has a Beta out now

        Originally PlayStation exclusive and later ported to the Game Boy Advanced, Driver 2 lives on again with the REDRIVER2 game engine reimplementation project.

        We did cover this somewhat recently but it was still a bit rough. Now though, there’s a brand new release up that should be quite a lot smoother! REDRIVER2 Beta 1 adds in quite a lot of new features and some great sounding bug fixes to make the experience more enjoyable. There’s also been a number of optimizations, the fullscreen map should look prettier, Flatpak support on Linux, ALT+Enter will toggle Fullscreen, controller configuration and much more.

      • Mighty Goose looks like a stupidly entertaining colourful run and gun game | GamingOnLinux

        Mighty Goose from Blastmode, MP2 Games and PLAYISM was announced recently ready for release on June 5. It looks incredible and it will be supported on Linux.

        A fast paced run & gun shooter starring a bounty hunter Goose. Use epic weapons and devastating war machines to battle against screen filling bosses and hordes of enemies. At the core Mighty Goose is a tight side scrolling run & gun shooter that will test your skill, timing, reflexes. Building upon that solid arcade base, the game adds a ton of crazy weapons, warmachines, upgrades and secrets.

      • Play the Busy Beaver Game through a simulator

        It’s hard to find a game that combines the difficulty of, say, Dark Souls with the elegance of Conway’s Game of Life. In a 1962 paper, Hungarian mathematician Tibor Radó came up with just such a game, which he called the Busy Beaver Game (BBG).

        To play BBG is to create a program that writes 1s on a machine’s tape whose cells initially hold 0s; the 1s need not be consecutive, but the program must halt for the 1s to count. The winning program has the most 1s on its tape after halting.

        I’ll start with an overview of the machine, its programming language, and the game’s constraints.

      • Fast-paced sci-fi arena-styled FPS Viscerafest has entered Early Access and looks great

        Viscerafest from Acid Man Games, Fire Plant Games and 1C Entertainment is a nostalgic trip through fast-paced FPS goodness that you don’t want to miss out on.

        You are Caroline, a “bloodthirsty, psychopathic mercenary” who wants to get married. Money is tight so you set off to claim a rather hefty bounty so you can finally put a ring on it. With the Early Access release out, it’s showing another impressive experience from a small team. It currently has an introductory prelude level, the game’s main and chapter 1 hubs, and the entirety of the first chapter with 7 levels to play through. It also features 8 of the enemies, and 6 (out of total 9) of the game’s weapons.


        You can buy Viscerafest on Steam and GOG.com yet. The GOG store page doesn’t mention it, but the Linux build is there.

      • Sci-fi action-RPG Beyond Mankind launches with Linux support this August | GamingOnLinux

        Looking like it’s from the early 2000s, Beyond Mankind might be an interesting sci-fi action adventure coming from the team behind the Viking Conquest DLC for Mount & Blade.

        Not trying to be mean about the style of it, but games back in the early 2000s had a certain look and feel about them, one that a lot of modern games do genuinely lack. Beyond Mankind: The Awakening aims to revive these games with us being told to think of it like “Fallout meets Spec Ops: The Line”, set in a “post-apocalyptic world sporting a mature and deep narrative, rich exploration, tense combat and immersive RPG mechanics”.


        It’s releasing on August 31 with Linux support on Steam.

      • Roguelite village-builder Kainga: Seeds of Civilization sounds unusual and has Linux plans

        After a village building game that really does try to be a bit different? You may want to keep an eye on the upcoming Kainga: Seeds of Civilization.

        Kainga is an ancient fantasy village builder where your environment affects your culture, technology and strategy. Advance and adapt to the pressures of the climate, beasts and other tribes. It’s unique because the runs in it are quite short, especially for a game where you’re building up a village but each run gives you more for the next.

      • Stellaris is free to play for the weekend along with a big Paradox sale ahead of PDXCON | GamingOnLinux

        Paradox are running another PDXCON from today for the weekend, where we expect a new strategy game to be announced. To get things going Stellaris is free to play for the weekend and a big sale is on.

        For the new announcement, we don’t have a clue what it will be – but since it’s an internal Paradox title (they’re not just publishing it), hopefully it will continue the tradition of Linux support. When we know, you will know!

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE’s Author Avatars and Not Phoning Home

          For a long time now, KDE’s about dialogues (the ones you find in the help menus in many of our apps) have supported the ability to fetch a bunch of information about the authors of our applications from the KDE Store through the Open Collaboration Services API. It does this by sending a request to the store for each of the authors who have an ocs username defined, to get the information on user avatars, profile links, and a few other potentially interesting details.

          If you are paying attention, you are now squinting at the screen and going “wait, I saw that title up there, and it clearly says not phoning home, and this is phoning home”. You are, of course, entirely correct, and while it certainly was never done with ill intent, it is hard to dispute the fact that it is, in fact, phoning home. As a result, we have been poking about with ways of fixing this, without dropping overly much of the functionality.

    • Distributions

      • Garuda Desktops Put a New Spin on Linux Looks

        The minimum requirement for Garuda Linux is 30 GB storage space with 4 GB RAM and a 64-bit system. The recommended requirements, however, provide much better performance. These are 40 GB storage space with 8 GB RAM running a video card with OpenGL 3.3 or better.

        The Garuda distro is optimized for performance on real hardware. Installing Garuda in virtual machines might result in a bad experience.

        Oftentimes, there are two parts to evaluating Linux distros. One is the design and feature sets that make a particular Linux distribution unique from other offerings. The other is how the desktop environment contributes to or weakens the user’s computing experience.

        Rest assured that Garuda Linux covers both of those factors. Not every desktop flavor will be a winning choice. But Garuda’s overall performance and design along with its wide range of environments can eliminate distro-hopping to find your best fit.

        My only real disappointment with this latest Garuda Linux release is that most of the background images are dark and moody. But each flavor still has the Garuda uniqueness that performs solidly.

        One caution to consider is that some of the less commonly used window manager options will take getting used to using. But computing is always about learning curves and adjusting to new processes.

      • IPFire 2.25 – Core Update 157 available for testing

        It is time to test the upcoming release: IPFire 2.25 – Core Update 157. This is the largest release in size we have ever had and updates various parts of the operating system and brings an updated kernel.

        Since IPFire is built from source and not based on any distribution, we get to select the best versions of open source software to be a part of it. This release is the second part of our “spring clean” release which updates various software packages and we have also dropped software that we no longer need. The vast amount of this work has been done by Adolf Belka who has been spending many nights in front of a compiler trying to make it all work. If you want to support him and the entire development team, please help us with your donation.

      • BSD

        • The GNU D Compiler on OpenBSD/arm64

          It works just as well as GDC on OpenBSD/amd64. I want to walk through how I made it happen so that others can replicate if they so choose. And so I can replicate for other archs, like armv7.

      • Screenshots/Screencasts

        • KDE Plasma 5.22 Beta Run Through

          In this video, we are looking at KDE Plasma 5.22 Beta.

        • KDE Plasma 5.22 Beta

          Today we are looking at KDE Plasma 5.22 Beta. As usual, we just do a run-through of the Beta release of the new KDE Plasma desktop environment and when the stable release is out we look at some of the new features that stand out for us, so keep your eyes out for it! However, in this run through you can have a look at some of the new features added and check out the release notes, link below for more info about the changes, and more!

      • Gentoo Family

        • Freenode IRC and Gentoo

          It is not yet clear whether and how these changes will affect Gentoo. We are observing as the situation develops. It is possible that we will decide to move the official Gentoo channels to another network in the best interest of our users. At the same time, we realize that such a move will be an inconvenience to them.

          At the same time, it has came to our attention that certain individuals have been using the situation to impersonate Gentoo developers on other IRC networks. The official Gentoo developers can be identified on Freenode by their gentoo/developer cloak. If we move to another network, we will announce claiming a respective cloak.

      • SUSE/OpenSUSE

        • KDE Gear, GTK, Btrfs Update in Tumbleweed

          Four openSUSE Tumbleweed snapshots were released so far this week.

          The snapshots updated KDE Gear 21.04.1, GTK 4, Btrfs, postgresql, sudo and more.

          Snapshot 20210519 updated the postgresql 13.3 package and addressed three Common Vulnerabilities and Exposures; one of those included the mishandling of a target list and another prevented integer overflows in array calculations. Text editor vim 8.2.2850 fixed a few crashes and the 0.15.0 update of the open remote computing solution SPICE provided some behavior changes and compatibility with OpenSSL. Improved rendering and a font settings fallback for Wayland were made with the gtk4 4.2.1 update. GNOME’s Tetris like game quadrapassel has the 40.1 major version, which updated translations and pressing return now restarts a game. Another major version to update in the snapshot was python-incremental 21.3.0, which is PEP 440-compliant.

          Multiple fixes were made in the update of KDE Gear 21.04.1 in snapshot 20210517. The KDE Gear 21.04.1 packages updated video editor Kdenlive, which fixed rendering presets; text editor Kate fixed a possible leak; and diagram program umbrello made some cosmetic and error detection improvements. The update also restored compatibility with ffmpeg 3 for ffmpegthumbs. Other packages to update in the snapshot were rubygem-rubocop 1.14.0, urlscan 0.9.6 and re2c 2.1.1, which added GitHub Actions Continuous Integration for Linux, macOS and Windows.

      • IBM/Red Hat/Fedora

      • Debian Family

        • Taowa: Video calling in Dino in experimental, oh my!

          Dino, packaged as dino-im in Debian, is an XMPP chat client. Thanks to the hard work of its developers, Dino has been making progress on supporting video and audio calls.

          Building on the work of my co-maintainer, I’ve packaged the latest commits to dino-im in Debian experimental. Adapting to the changes in how Dino is built since the last release took a bit of effort, but I’m glad to say that experimental now has support for video calls in dino-im, and that they work quite well! I was able to test video calling for multiple hours, and while there were clearly still a few issues, the entire experience felt quite… comfortable. I’m confident that video calling will be in great shape for bookworm!

        • LibreWolf

          There is a new application available for Sparkers: LibreWolf

      • Canonical/Ubuntu Family

        • Why I Switched from Ubuntu to Manjaro, Personal Story

          There’s a lot of debate among Linux users when it comes to choosing the best distribution. Any beginner user looking for the appropriate distribution can find many videos, posts, articles, and comparisons between all distributions. Linux distro reviews can sometimes leave you lost without knowing the best distro for you. Irrespective of all the debate from various Linux distribution enthusiasts, there are some clear winners. But, before getting there, we better understand Linux first.

          Linux is not an OS; it’s the core of the OS that is a kernel. The kernel is supplied with the GNU/Linux software with other additions to make it a specific Linux distribution. Another strength of Linux OS is that it offers customization and performance. Hence, the reason behind many Linux distributions is that they are purpose and user-specific.

        • You can now safely upgrade to Ubuntu 21.04

          Those who love Ubuntu will be pleased to know that it’s now safe to upgrade to the latest version. The latest iteration of Ubuntu came out towards the close of last month. Code named Hirsuit Hippo, Ubuntu 21.04 is mostly about tweaks, bug fixes and invisible improvements. Its biggest calling card is the fact that its GUI interface is powered by Wayland instead of the traditional Xorg.

          Although it was released last month, the Ubuntu team discovered a severe bug which prompted them to write code to stop the usual upgrade button from showing to those who were using Ubuntu 20.10.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Chromium

          • An experiment in helping users and web publishers create deeper connections on Chrome

            Today, people have many ways to keep up with their favorite websites, including subscribing to mailing lists, notifications and RSS. It’s a lot for any one person to manage, so we’re exploring how to simplify the experience of getting the latest and greatest from your favorite sites directly in Chrome, building on the open RSS web standard. [...]

        • Mozilla

          • Behind the design of the fresh new Firefox coming June 1

            A new Firefox is coming your way on June 1 with a fresh look designed for today’s modern life online. We pored over the browser’s user interface pixel by pixel, measured the value users were getting from our massive library of features, and ultimately streamlined the Firefox experience to be clean, inviting and easier to use on every device.

      • SaaS/Back End/Databases

        • MongoDB support improved in syslog-ng 3.32

          MongoDB is one of the most popular NoSQL databases. Support for MongoDB was added to syslog-ng almost a decade ago. It was the first syslog-ng destination where you could store arbitrary name-value pairs. The performance of MongoDB has improved considerably over the years, but syslog-ng was not keeping up. Version 3.32 of syslog-ng is a huge step in the right direction. It is not only performance that was improved, but flexibility as well: you can now use templates in collection names.

        • Configure Database Connection Using Environment Variable In Rails – OSTechNix

          This guide explains why you need to use an environment variable to connect to a database and how to configure database connection using environment variable in Rails application in Linux.

        • MySQL Group Concat for Strings – Linux Hint

          GROUP _CONCAT function is a GROUP BY aggregate function that allows you to concatenate column values from multiple rows into a single field. It returns a string if the set group contains one or no-null column value and returns a NULL value if none can be found.

          This tutorial will teach you how to use MySQL GROUP_CONCAT() function to combine strings from a group with several options.

        • MySQL Insert into Select in One Command – Linux Hint

          We are all familiar with the basic MySQL INSERT INTO clause that allows us to insert values into a table.

          In this tutorial, we will defer from that and look at the INSERT INTO — SELECT statement that we can use to insert values in a table where the values are from the result of a SELECT statement.

        • Using the MySQL SUM Aggregate Function – Linux Hint

          MySQL aggregate functions refer to a set of functions that perform calculations on a set of values and return a single value. Aggregate functions include the maximum and minimum value, average, standard deviation, count, sum, etc.

          In this tutorial, we shall learn about one of the popular choices of the aggregate functions: SUM.

        • Using MySQL Column Aliases and Table Aliases – Linux Hint

          MySQL alias is a feature that allows us to give a temporary alternative name for a database table or column. These alternative names allow for easier readability and provide extra functionality when working with MySQL JOINS.

          This guide will look at how to implement both the column and table aliases in MySQL.

          Before we dive into the tutorial, ensure you have a MySQL server installed and accessible on your system. To maximize the learning experience, we recommend you download the MySQL Sakila sample database.

        • Using MySQL Boolean Data Type – Linux Hint

          By default, MySQL does not offer a native Boolean Data Type. However, it provides us with the TINYINT data type, allowing us to store Boolean values—like values with the TINYINT type.

          This guide will focus on how to use the MySQL TINYINT data type to store Boolean Values.

        • MySQL Update Join for Cross-Table Update – Linux Hint

          In the latest versions of MySQL, you can perform a cross-table update, also known as a correlation table update where you can join two or more tables. Using MySQL JOIN (INNER and LEFT) and UPDATE query, we can perform a cross-table update in very simple steps.

          This tutorial will walk you through in how to perform MySQL cross-table updates using native MySQL commands.

      • Productivity Software/LibreOffice/Calligra

        • The LibreOffice Calc Guide 7.1 is Here!

          The LibreOffice Documentation community announces the immediate availability of the Calc Guide 7.1, with additions based on the the improvements in LibreOffice Calc 7.1, which was released in February this year.

          The Guide is the volunteer effort of many members of the documentation community. Revisions and enhancements on the contents are the work of Rafael Lima from Brazilian community, Martin Van Zijl and Kees Kriek from the Dutch community, Celia Palacios from the Hispanic language community. A special mention to Yusuf Keten from the Google Summer of Code program on new extensions and templates dialogs, to Steve Fanning for his editorial review and to Jean Hollis Weber for her improvements and organization of the text. The LibreOffice Calc Guide 7.1 update activities was coordinated by Felipe Viggiano from Brazil.

      • Programming/Development

        • Remi Collet: PHP version 7.4.20RC1 and 8.0.7RC1

          Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests, and also as base packages.

          RPM of PHP version 8.0.7RC1 are available as SCL in remi-test repository and as base packages in the remi-php80-test repository for Fedora 32-34 and Enterprise Linux.

          RPM of PHP version 7.4.20RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 32-34 or remi-php74-test repository for Enterprise Linux.

        • Appwrite 0.8 Released with a Lot of Privacy and Security Improvements

          Appwrite 0.8 comes packed with a ton of cool new features like JWT support, ARM support, Anonymous Login, and more.

          Appwrite is an open-source, end to end backend server for Web, Mobile, Native, or Backend packaged as a set of Docker microservices. It goal is to abstract and simplify common development tasks behind REST APIs and tools, to help developers build advanced apps way faster.

          Using Appwrite, you can easily integrate your app with user authentication & multiple sign-in methods, a database for storing and querying users and team data, storage and file management, image manipulation, Cloud Functions, and more services.

        • Build your own RPM package with a sample Go program

          A deployment usually involves multiple steps that can be tricky. These days, we have a wide variety of tools to help us create reproducible deployments. In this article, I will show you how easy it is to build a basic RPM package.

          We have had package managers for a while. RPM and YUM simplify installing, updating, or removing a piece of software. However, many companies use package managers only to install software from the operating system vendor and don’t use them for deployments. Creating a package can be daunting at first, but usually, it’s a rewarding exercise that can simplify your pipeline. As a test case, I will show you how to package a simple program written in Go.

        • Intel’s IGC Graphics Compiler 1.0.7423 Brings 100+ Changes – Phoronix

          Intel’s open-source team maintaining their graphics compiler (IGC) have issued a big update this week.

          While the open-source Intel Graphics Compiler sees new tagged releases every week or two, they are usually accompanied by just a handful of listed changes. When it comes to the officially listed changes of this week’s IGC 1.0.7423 release, there are more than 100 listed changes! There hasn’t been such a large release in recent time, especially with coming two weeks after the prior compiler release.

        • massCode: A remarkable free snippet manager for macOS, Windows and Linux

          massCode is a nifty open-source solution for developers that helps them organize their code snippets in multiple languages in a stylish organized way.

          Developers have to use web services like GitHub Gist, which is hard to use offline, or often buy a commercial software to keep all snippets. Not anymore with massCode.

          It is originally developed by “Anton Reshetov” a web and deskop app developer, who released it under AGPL V3.0.

        • Recursive Vim macros: One step further into automating repetitive tasks

          The recent article Use Vim macros to automate frequent tasks by Ricardo Gerardi explored what a macro is and the benefits of using macros to automate repetitive tasks. In this article, you will take a step further and explore what recursive macros are some examples where they might be useful, and some pitfalls that you might run into.

          The basic macros workflow consist of record, replay, and profit. When recording, select in which register it will do so. There are registers from a to z available.

        • Colin King: Adjacent C string concatenation gotcha

          C has the useful feature of adjacent allowing literal strings to be automatically concatenated. This is described in K&R “The C programming language” 2nd edition, page 194, section A2.6 “String Literals”:

          “Adjacent string literals are concatenated into a single string.”

        • A Teenager’s Guide to Avoiding Actual Work

          Time is a great moderator. When I look back on this now, I realize that the US minimum wage in 1982 was under $4/hour. That $100 would have been 25 hours of filling in pot holes with the highway department, even more when you consider I was paid under the table for this venture, in classic Jim style. And it led to my first job, that worked out to something like $20/hour or more, because I only worked about 20 hours a week, to make $400. Doing something that still to this day doesn’t really feel like ‘work’, in the sense my father would define it, anyway. In short, a pretty sweet deal.

          Jim definitely made out as well, he was getting discount programming talent, and would later perfect the formula by hiring other college students to work on his system. I don’t really look at it as a matter of who was taking advantage of who any more though. In the end, the situation was mutually beneficial.

        • Python

          • How Python 3.9 fixed decorators and improved dictionaries

            This is the tenth in a series of articles about features that first appeared in a version of Python 3.x. Some of these versions have been out for a while. Python 3.9 was first released in 2020 with cool new features that are still underused. Here are three of them.

            Adding dictionaries

            Say you have a dictionary with “defaults,” and you want to update it with parameters. Before Python 3.9, the best option was to copy the defaults dictionary and then use the .update() method.

          • Best Python Frameworks To Create Mobile Apps and Games

            This article will cover a list of useful Python frameworks that can be used to develop apps and games for mobile devices. Some of these frameworks also support desktop apps or work as standalone build tools for compiling builds for both desktop and mobile devices. You can use the same code base with minor modifications to deploy apps and games to both desktop and mobile devices.

          • Introduction to machine learning with Jupyter notebooks | Red Hat Developer

            Recently, I was working on an edge computing demo that uses machine learning (ML) to detect anomalies at a manufacturing site. This demo is part of the AI/ML Industrial Edge Solution Blueprint announced last year. As stated in the documentation on GitHub, the blueprint enables declarative specifications that can be organized in layers and that define all the components used within an edge reference architecture, such as hardware, software, management tools, and tooling.

            At the beginning of the project, I had only a general understanding of machine learning and lacked the practitioner’s knowledge to do something useful with it. Similarly, I’d heard of Jupyter notebooks but didn’t really know what they were or how to use one.

            This article is geared toward developers who want to understand machine learning and how to carry it out with a Jupyter notebook. You’ll learn about Jupyter notebooks by building a machine learning model to detect anomalies in the vibration data for pumps used in a factory. An example notebook will be used to explain the notebook concepts and workflow. There are plenty of great resources available if you want to learn how to build ML models.

          • Pyodide: Python for the browser [LWN.net]

            Python in the browser has long been an item on the wish list of many in the Python community. At this point, though, JavaScript has well-cemented its role as the language embedded into the web and its browsers. The Pyodide project provides a way to run Python in the browser by compiling the existing CPython interpreter to WebAssembly and running that binary within the browser’s JavaScript environment. Pyodide came about as part of Mozilla’s Iodide project, which has fallen by the wayside, but Pyodide is now being spun out as a community-driven project.

          • How to Implement a WebSocket in Python – Linux Hint

            WebSocket is an application layer protocol that allows two-way communication between a client and a server. WebSocket protocol works first by creating a handshake and then a message framing implemented over TCP rather than basic HTTP.

            WebSockets and other similar technologies such as SSE (Server-Sent Events) and WebRTC are helpful in applications where the server needs to keep an open connection to the connected clients. An excellent example of WebSockets used in applications is a chat application, online multiplayer games, and real-time tools such as analytics and collaboration tools.

            WebSockets provides us with a full-duplex, bidirectional connection between the server and the connected clients over the Web. That means both the server and the client can push data once there is an established connection.

            In this tutorial, I will not dive deep into how WebSockets work. Instead, I will show you how you can use Python to implement a simple application using WebSocket.

            If you wish to learn more about HTTP, WebSocket, and SSEs, check out the other tutorials on this site explaining their differences.

            NOTE: Before we begin, we assume you are familiar with basic networking concepts such as HTTP and HTTP requests. To implement the concepts in this tutorial with a degree of ease, you need to have basic Python and JavaScript Programming knowledge.

    • Standards/Consortia

      • Fuchs your freenode irc server – resignation
      • Freenode Developers Resign From Project Following “Hostile Takeover” by Korean Crown Prince

        Freenode developers are abandoning the project after Andrew Lee, the Crown Prince of Korea, unilaterally took control of the network. Developers familiar with the project call it a “hostile takeover,” with many considering the substantial ramifications this move will have on the open-source community.

      • Open Source World’s Favorite IRC Network Freenode is in Turmoil

        I’m sure that some of you don’t know what Freenode is. Let me explain. Freenode started at an IRC channel named #LinPeople in the 1990s.(IRC or Internet Relay Chat is a chat protocol that has been around since the late 1980s and was widely used by open-source groups.) Over time, the channel became Open Projects Network and because a separate IRC network. The name was later changed to Freenode. At it’s height, Freenode was one of the largest IRC networks on the web.

      • G7 And Technical Standards: Blink And You Might Have Missed The New Battleground

        Amid all the news about the third wave of the COVID-19 Pandemic and the politics behind the vaccination roll out, you might have missed the Ministerial Declaration from the G7 Digital and Technology Ministers’ meeting. As per tradition, the G7 Digital Ministerial provides the opportunity for the seven richest countries of the world to declare their commitments and vision on the type of digital future they would like to see. The document is non-binding but it has the tendency to provide some useful insights on the way the G7 countries view digital issues and their future positions in multilateral fora; it is also informative of other, more formal, multilateral processes. On 28 April 2021, a statement was made addressing key technology issues and opportunities including security in ICT supply chains, Internet safety, free data flows, electronic transferable records, digital competition and technical standards.

      • Striking a balance with ‘open’ at Snowflake

        When we develop products at Snowflake, we evaluate where open standards, open formats, and open source can create the best outcome for our customers. We believe strongly in the positive impact of open and we are grateful for the open source community’s efforts, which have propelled the big data revolution and much more. But open is not the answer in every instance, and by sharing our thinking on this topic we hope to provide a useful perspective to others creating innovative technologies.

        Open is often understood to describe two broad elements: open standards and open source. We’ll look at them each in more detail here.

  • Leftovers

    • Zigbee On Mars!

      According to Zigbee Alliance CEO Tobin Richardson, Zigbee is the ideal wireless protocol to transfer telemetry data between NASA’s Perseverance rover and the semi-autonomous flying drone. “Looking at really extreme environments, like Mars, it’s good to have a very lightweight purpose-built standard,” said Richardson, “where it’s essential to get the basic information across and makes it possible for extended battery usage.”

    • People in Japan can now earn 10,000-yen bounties for scamming scammers

      On May 1, the Minami Precinct of the Aichi Prefectural Police, which serves and protects the city of Nagoya’s Minami Ward, launched a new aspect of Operation Pretend to Be Fooled. This new crime-fighting program asks people who’ve been contacted by someone claiming to be a loved one in need of cash to notify the police, then work with them to draw the scammer out. For each case in which their cooperation leads to the identification of scammers, the original target of the scam will be paid 10,000 yen (US$97).

    • Science

      • Reliance on journal rankings is undermining academic integrity

        Why are journal rankings such poor proxies for quality? The JCR’s impact factors are computed as the average number of citations received by each paper in the journal over a given period of time. This is easily manipulated. Publishers and editors ask authors of accepted papers to cite additional papers published in the same journal. They also artificially boost the number of papers published per issue to increase the opportunities for such citation farming, while authors cut one paper into several or collaborate in larger groups to increase their output of mutually citing publications.

      • Iran Reveals Simorgh Supercomputer, Says Another Is Imminent

        Iran announced this week that its new supercomputer, Simorgh, has debuted with a peak performance of 0.56 petaflops and plans to reach 1 petaflop in two months.

        Al Jazeera reported that Simorgh was “said to be wholly designed and built by a team of Iranian engineers, who developed the country’s first supercomputer a decade ago, but some of its hardware has been imported.” (The original source is the state-run Islamic Republic News Agency, but we can’t find the report on its English website.)

        It’s not clear from where the Amirkabir University of Technology, which developed Simorgh, would have been able to import the parts required to build the system. The U.S. government has imposed harsh restrictions on the sale of American tech—or products created using those technologies, like the processors and GPUs most commonly used in supercomputers—to companies operating in Iran.

    • Health/Nutrition

      • Opinion | Koch’s Americans for Prosperity Continues Its Assault on Medicaid During Covid

        In the states that have not expanded Medicaid, residents have to weigh the costs of health insurance and medical care against other essential needs, such as housing, food, and transportation to work.

      • Unvaxxed
      • Why Big Pharma’s Arguments Against Patent Waivers Don’t Add Up

        Gates had been singing a different tune just a few weeks earlier, expressing opposition to vaccine patent waivers when he said in an interview, “The thing that’s holding things back in this case is not intellectual property. There’s not like some idle vaccine factory, with regulatory approval, that makes magically safe vaccines.”

        Gates’ initial opposition echoes the pharmaceutical industry’s staunch resistance to waiving the intellectual property rights to COVID-19 vaccine technology. In a letter to the Biden administration, members of an industry group called Pharmaceutical Research and Manufacturers of America (PhRMA) wrote, “Eliminating those protections would undermine the global response to the pandemic, including ongoing effort to tackle new variants, create confusion that could potentially undermine public confidence in vaccine safety, and create a barrier to information sharing.” The signatories added, “Most importantly, eliminating protections would not speed up production.”

    • Integrity/Availability

      • SSH CA for host keys

        An SSH CA is a key pair used to sign, or certify, other SSH keys. Such a signed key is called a certificate. An SSH client can be configured to implicitly trust host certificates created using specific CA keys. This makes it easier and more secure to log into new hosts.

      • Proprietary

        • Apple Accuses Microsoft of Using Epic in Legal Attack

          Apple Inc. injected a new level of intrigue in its bitter court fight with Epic Games Inc., suggesting the Fortnite maker was acting as a stalking horse for Microsoft Corp. and withholding evidence.

          The iPhone maker made the accusations Wednesday night in a filing asking a judge to make an adverse credibility finding against Lori Wright, an Xbox executive who testified in the trial on behalf of Epic. That would mean the judge could ignore her testimony.

        • Pseudo-Open Source

          • Privatisation/Privateering

            • University of Minnesota Sabotage

              • Linux 5.13 Reverts + Fixes The Problematic University of Minnesota Patches

                One month ago the University of Minnesota was banned from contributing to the Linux kernel when it was revealed the university researchers were trying to intentionally submit bugs into the kernel via new patches as “hypocrite commits” as part of a questionable research paper. Linux kernel developers have finally finished reviewing all UMN.edu patches to address problematic merges to the kernel and also cleaning up / fixing their questionable patches.

                Sent in on Thursday by Greg Kroah-Hartman was char/misc fixes for 5.13-rc3. While char/misc fixes at this mid-stage of the kernel cycle tend to not be too exciting, this pull request has the changes for addressing the patches from University of Minnesota researchers.

              • Open-Source Ethics, and how the University of Minnesota Failed Linux

                Recently, the University of Minnesota got banned from contributing to the Linux kernel, and this opens up quite a few talking points about validating open-source code, the strengths and weaknesses of open-source, as well as how UMN got it so wrong.

        • Security

          • Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take

            From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before.

            How can you avoid falling victim to a cyber attack? Start with the assumption that perfect cybersecurity doesn’t exist, and then make your network and data so hard to hack that cybercriminals give up and look elsewhere.

          • Security updates for Friday

            Security updates have been issued by Arch Linux (ceph, chromium, firefox, gitlab, hedgedoc, keycloak, libx11, mariadb, opendmarc, prosody, python-babel, python-flask-security-too, redmine, squid, and vivaldi), Debian (lz4), Fedora (ceph and python-pydantic), and openSUSE (cacti, cacti-spine).

          • Holes in the WiFi

            The discoverer of the KRACK attacks against WPA2 encryption in WiFi is back with a new set of flaws in the wireless-networking protocols. FragAttacks is a sizable group of WiFi vulnerabilities that (ab)use the fragmentation and aggregation (thus “Frag”) features of the standard. The fixes have been coordinated over a nine-month period, which has allowed security researcher Mathy Vanhoef time to create multiple papers, some slide decks, a demo video, patches, and, of course, a web site and logo for the vulnerabilities.

            Three of the vulnerabilities are design flaws in the WiFi standards, so they are likely present in all implementations, while the other nine are various implementation-specific problems. The design flaws may be more widespread, but they are much harder to exploit “because doing so requires user interaction or is only possible when using uncommon network settings”. That means the real danger from FragAttacks lies in the programming errors in various WiFi implementations. “Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities.”

          • Privacy/Surveillance

            • Better than the EU’s GDPR? China’s new privacy law includes a rule for handling personal information after death

              The title of the Protocol analysis is “China could soon have stronger privacy laws than the U.S.”; in some respects, the proposed Personal Information Protection Law, likely to pass by the end of the year, even surpasses the EU’s General Data Protection Regulation (GDPR), often regarded as the benchmark in this area. A good example of how the second draft has strengthened privacy protection for users is the new Article 57, which reads as follows in a translation by the Stanford DigiChina Cyber Policy Center:

            • Defense Department Is Buying Domestic Internet Metadata From Data Brokers

              Joseph Cox broke the news for Motherboard late last year: the US military was also making use of location data purchased from data brokers, joining a host of other federal agencies that seemed to feel buying from brokers was an acceptable alternative to respecting the Fourth Amendment.

            • EU lawmaker calls for stronger privacy rights as part of new tech rules

              Proposed EU rules targeting Facebook, Google and other large online platforms should include privacy rights for users as well as their right to anonymity, a key EU lawmaker steering the debate at the European Parliament said on Wednesday.

              The Digital Services Act, announced by the European Commission in December last year, requires the tech giants to do more to tackle illegal content such as hate speech and child sexual abuse material.

            • Censorship, Surveillance and Profits: A Hard Bargain for Apple in China

              Chinese state employees physically manage the computers. Apple abandoned the encryption technology it used elsewhere after China would not allow it. And the digital keys that unlock information on those computers are stored in the data centers they’re meant to secure.

              Internal Apple documents reviewed by The New York Times, interviews with 17 current and former Apple employees and four security experts, and new filings made in a court case in the United States last week provide rare insight into the compromises Mr. Cook has made to do business in China. They offer an extensive inside look — many aspects of which have never been reported before — at how Apple has given in to escalating demands from the Chinese authorities.

            • Proof-of-concept proxy shows user account passwords and private photos can be decrypted

              For example, in a recent video3 published on ICTA’s website, at 2m3s, they say that ICTA won’t get user password, log in, email, private messages, bank details etc.

              In this report, I explain how a proof-of-concept proxy was used to demonstrate the capabilities of the technical framework proposed in Section 11.2 of the consultation paper.

            • Senators roll out bipartisan data privacy bill

              Sen. Amy Klobuchar is back with a bill to protect consumer data privacy when collected by large tech platforms like Facebook and Google.

              Klobuchar (D-MN) has teamed up with a bipartisan group of senators, including Sens. John Kennedy (R-LA), Joe Manchin (D-WV), and Richard Burr (R-NC), to reintroduce the Social Media Privacy Protection and Consumer Rights Act. The privacy legislation would force websites to grant users greater control over their data and allow them to opt out of data tracking and collection.

            • Amazon partners with Tile to take on Apple AirTags

              Amazon is beefing up its network of connected devices to take on technologies like Apple’s new AirTags.

              Amazon announced Friday that it is partnering with Tile, a company that makes trackers for lost items, and Level, which makes smart locks, to use those devices to enhance its tracking network based on Wi-Fi and Bluetooth technology.

    • Defence/Aggression

      • Violent, Bigoted Cop Accused Of Beating Another Cop Is Upset His Text Messages Expose Him As A Violent Bigot

        Lawyers for a cop accused of beating an undercover cop during a 2017 protest are pretty angry prosecutors have let the public know just what kind of bigoted dirtbag the indicted officer is.

      • Opinion | State Terrorism as Public Relations

        This is the mainstream definition of self-defense: provoking the nobodies, then pounding them back into submission.

      • Sanders Pushes Resolution Halting $735 Million in US Military Sales to Israel
      • Chile shifts left to rewrite Pinochet-era constitution, as Goldman Sachs eyes its copper reserves
      • Conservative Jewish Journalists Use False Claims of Censorship to Try to Silence Critics

        The late Village Voice journalist and civil libertarian Nat Hentoff loved telling the story about how three rabbis, gathered in a Massachusetts motel in 1982, officially excommunicated him from the Jewish people for the crime of signing a New York Times advertisement protesting Israel’s invasion of Lebanon. That their clerical authority to extinguish Hentoff’s Judaism was recognized by no one but themselves is a source of both comedy and anger. In matters political, even the smallest of factions can pretend that their extremism matters, but at the heart of that absurdity is the dark human desire to censor and to silence anyone deviating from the party line.

      • Progressives Can’t Ignore Role of Christian Zionism in Colonization of Palestine
      • Sanders Unveils Bill to Force Pentagon to Pass Audit, Citing “Fraud” and “Waste”
      • Former separatist leader Igor Bezler successfully sues Bellingcat over MH17 investigations

        St. Petersburg’s Oktyabrsky Court has ordered the investigative outlet Bellingcat to pay GRU veteran and former separatist leader Igor Bezler 340,000 rubles (about $4,600) in compensation for moral damages, reports the unified press service for St. Petersburg’s courts. 

      • Coalition Pushing Beijing Olympics Boycott Comprised of US-Funded Destabilization NGOs

        The United States’ regime change arm, the National Endowment for Democracy, has funded at least half of the groups involved in the media offensive. Other groups involved are otherwise tied to the national security state.

      • Foreign Wars Will Jeopardize Biden’s Rescue Plans

        Is President Biden afflicted with the political equivalent of a split personality? His first several months in office suggest just that possibility. On the home front, the president’s inclination is clearly to Go Big. When it comes to America’s role in the world, however, Biden largely hews to pre-Trumpian precedent. So far at least, the administration’s overarching foreign-policy theme is Take It Slow.

      • Amnesty Calls on Biden to End ‘Outrageous’ US Weapons Sales to Colombia Amid Police Repression

        “The United States government has been an agonizing party to the killing, disappearances, sexual violence, and other torture and horrendous repression of dozens of mostly peaceful demonstrations.”

      • #ParoNacionalColombia and Digital Security Considerations for Police Brutality Protests

        As the turmoil and demonstrations continue, we’ve put together some useful resources from EFF and allies we hope can help those attending protests and using technology and the Internet to speak up, report, and organize. Please note that the authors of this post come from primarily U.S.- and Brazil-based experiences. The post is by no means comprehensive. We urge readers to be aware that protest circumstances change quickly; digital security risks, and their mitigation, can vary depending on your location and other contexts. 

        This post has two sections covering resources for navigating protests and resources for navigating networks.

        Resources for Navigating Protests

      • ‘January 6 Was Not Due to a Lack of Police Funding’: Squad Members Reject Capital Hill Security Bill

        Reps. Cori Bush, Ilhan Omar, and Ayanna Pressley refused to vote for “more money for a broken system that has long upheld and protected the white supremacist violence we saw on display that day.”

      • Movement For Black Lives In Upstate New York: Confronting Police, White Supremacists, And Craven Politicians

        Joya Stuckman returned home late at night after visiting her friend. It was Labor Day weekend but there was little to celebrate. She felt exhausted after spending the entire day loading a moving truck in order to escape what had become an untenable living situation. Her landlord and his sister had spent the better part of two years harassing Stuckman, who is a Black mother of three boys.  

        She walked up to her house, which is nestled in the working class First Street neighborhood of Rome, New York, and glanced over at her U-Haul truck. The tires were slashed and the truck was completely covered in racist and neo-Nazi graffiti: thinly veiled death threats, racist slurs, an SS symbol, and swastikas. The numbers “1488,” which is a popular neo-Nazi code, were sprayed on the sides of the truck. Stuckman was terrified. 

      • Is Colombia’s Military Displacing Peasants to Protect the Environment or Sell Off Natural Resources?

        In the background of the uprising in Colombia is the question of land. A multi-decade civil war has led to millions of peasants being thrown off of their land, which ended up in the hands of large landowners or was used for corporate megaprojects. In the ongoing corporate land grab that has been taking place in Colombia for the last few years, there is a new and frightening weapon: the militarization of environmental conservation. In a countrywide series of military operations beginning in February, involving a large number of soldiers and police, the army captured 40 people, whom the attorney general accused of deforestation and illegal mining, in six different locations in the country. In an earlier operation, the army captured four people for crimes against the environment, who have been labeled as “dissidents of the guerrillas of the Revolutionary Armed Forces of Colombia (FARC)” by Colombia’s President Iván Duque, according to an article in Mongabay. In another operation in March 2020, soldiers trying to capture illegal ranchers in national parks picked up 20 people, 16 of whom turned out to be peasants who did not own land or cattle, according to Mongabay. According to the Colombian military, eight operations were carried out in 2020, through which it had “recovered more than 9,000 hectares of forest,” while capturing 68 people, 20 of whom were minors, stated the article in Mongabay.

        What the military calls “recovered” forest is a territory emptied of its people. The overall initiative, which began in 2019, is labeled “Operation Artemis.” It deploys what one article in the City Paper (Bogotá) calls “Colombia’s full-metal eco-warriors” in an effort to reduce deforestation by 50 percent, as President Duque told Reuters.

      • King Muhammad of Morocco weaponises migration

        They came in their hundreds, swimming around the border fence that protects the Spanish city of Ceuta, or walking across the beach at low tide under the permissive eyes of Moroccan border guards, who would normally stop them. In 36 hours this week, 8,000 would-be migrants descended on Ceuta, an enclave of 85,000 people (see map). For the Spanish authorities, coping with this influx was an immediate humanitarian headache. And Morocco’s weaponisation of migration also puts the government of Pedro Sánchez, Spain’s prime minister, in a longer-term bind.

        Clearly rattled and caught by surprise, Spain deployed 3,000 troops with armoured cars from the garrison in Ceuta and sent 200 police reinforcements. Mr Sánchez himself flew to the city, vowing to defend its “territorial integrity”. Spanish officials recall the “Green March” of 1975, when Hassan II, then Morocco’s king, mobilised 350,000 civilians to occupy Western Sahara, to the south, as Spain gave up its colony.

      • Pastor Slain after Leading Muslims to Christ at Religious Debate

        After offering a defense of Christianity at the debate using the Bible and the Koran and leading the people to receive Christ, angry Muslims began shouting the jihadist slogan, “Allah Akbar,” or “Allah is greater,” compelling him to rush away from the venue with his son, relatives said.

      • Europe’s left replaced Che Guevara’s cap with Khomeini’s turban, Marx’s beard with Bin Laden’s. To them, Israel deserves the rockets. Op-ed

        Where is the revolt of the bienpensants, Schuster asks? “Do they only light up when right-wing extremists march in front of Jewish places of worship? Raised on canned food of hatred of Jews, most Middle Eastern immigrants to this country believe they can transfer their miserable image of society to Germany. Fleeing here to work and be free, they use this freedom to revolt against the open society.”

        “Furthermore, there is a leftist environment that looks at Muslim and immigrant Arabs with postcolonial caution and forgives many things that the Germans would never let pass. Hamas terrorists are suddenly ‘activists’; the methods of their struggle may not be beautiful, but are understandable ”.

      • Big Tech is Facilitating Jihad Against America and Israel

        Big Tech offers forums to extremists and genocidal leaders, fueling radicalization and inciting violence. But it’s likely that Big Tech has also been selling hardware that’s been used by our sworn enemies for death and destruction.

      • Almost every Jew in Germany has been attacked by a Muslim, according to a survey

        The Jewish population experiences the hostility of Muslims first-hand. In a 2017 study by the Institute for Interdisciplinary Research on Conflict and Violence in Bielefeld, 81 per cent of the Jews surveyed in Germany said they had already been attacked by Muslims, and 61 per cent had suffered verbal insults or harassment.

      • Many dating apps ban people convicted of felonies. Does that make anyone safer?

        Although he can’t prove the reason why, he’s been booted from half a dozen other apps with similar prohibitions tucked into their terms of service: People with felonies — anything from a $10 drug conviction to capital murder — are banned for life. These policies aren’t new, but their enforcement has been haphazard.

        That could change. Match Group, which owns Tinder and a host of other dating sites, plans to launch a feature allowing daters to run background checks on potential matches. The company says its efforts are aimed at keeping users safe. But civil rights advocates say the record checks extend an unfair practice of imposing “collateral consequences” long after people have finished their sentences, and will disproportionately affect people of color without actually improving safety.

    • Environment

      • Could humans really destroy all life on Earth?

        Just look around – you are inseparably surrounded by material objects ­– whether they are needed in your life or not. For every bit of this material we use, there is a growing web of global actions that is slowly stripping human’s emotional health, depleting Earth’s resources and degrading our planet’s habitats. If left unchecked, is there a risk that human consumption may finally turn the Earth into an uninhabitable world? Do we have it in us to stop before it is too late?

        A team of researchers from Weizmann Institute of Sciences, Israel, recently published a study that compared human-made mass – aka anthropogenic mass – with all the living mass, or biomass, on the globe. They revealed that for the first time in human history the former has either surpassed the latter or is close to doing so in coming years.

      • There will be no silver bullet for climate change

        There is no silver bullet for climate change, no one answer. To save civilisation, nations must co-operate on five fronts.

      • Maya Lin’s Insufficiently Haunting Ghost Forest

        Culled from a stretch of New Jersey’s Pinelands, an area destroyed by saltwater from rising sea levels and other manifestations of catastrophic climate change (like 2012’s Superstorm Sandy), Ghost Forest is a solemn affair. Considering its subject, this does make sense. After all, these cedars, and the forms of life they supported, once covered hundreds of thousands of acres of this region. And now, like so many other species disappearing amidst the mass extinction event we’re living through, they’re fading away. Like so many other victims of modern capitalist history, these trees weren’t merely destroyed; their value was violently concentrated into immense wealth and power for a very few, and a concomitant impoverished wasteland for everyone else. So, solemnity is in order. However, Ghost Forest may be too solemn, or perhaps it’s just too sedate.

        Solemnity, of course, worked profoundly for Lin’s most famous piece, her iconic Vietnam Veterans’ Memorial in Washington, D.C.  Not to be too blunt about it, though, that work honors the already dead. Ghost Forest, we’re told, is supposed to warn the not-dead-yet about our rapidly approaching fates (fates caused by our capitalist world system, of which Ghost Forest is silent). With all of this in mind, Lin’s installation could benefit from a bit less silence and a dash of alarmism. Although audio will soon be introduced to the installation, adding the sounds of birds already lost to our all-devouring political-economy, I’d personally like to see, and hear, little ringing alarms on each tree. Such, of course, is not Lin’s aesthetic. In Ghost Forest, however, her aesthetic, sedate as it is, verges on the anesthetic — arguably preparing us more for a comfortable sleep, after a disposable mass-produced picnic on the grass, than waking us up.

      • ‘A Real Hotspot’: Study Shows Arctic Warming 3 Times Faster Than Rest of Earth

        “No one on Earth is immune to Arctic warming.”

      • Ahead of Biden Order on Climate Financial Risk, Coalition Says Wall Street Must Finally Be Held to Account

        “Plans to make plans in no way matches the urgency of the climate crisis; we need action from regulators now to stop the money pipeline to climate chaos.” 

      • Opinion | Immigrants Are Essential: A Manifesto for the Covid-19 and Climate Change Era

        The U.S. needs a reform as sweeping as the 1965 Hart-Celler Act, which eliminated racist immigration quotas, allowing millions of talented people to find a home here and build new lives.

      • As Climate Crisis and Violence Converge, Internal Displacement Hit Global Record High of 55 Million in 2020: Report

        “We are failing to protect the world’s most vulnerable people from conflict and disasters,” said the head of the Norwegian Refugee Council.

      • Anti-Global Warming PR

        Just as the Catholic Church tried to prevent stepping into modernity by fighting the Reformation, Poison Ivy fought modernity by combatting those who disliked capital. He fought an ideological public relations battle for Rockefeller but also advised Adolf Hitler.

        Not only after the unsavoury beginnings of public relations, the true mastermind of PR, Bernays, had even bigger goals. With his help, propaganda became the art of creating consent among the governed. German philosopher Adorno called this the process of mass deception. Decades later, Edward Herman and Noam Chomsky named virtually the same thing:manufacturing consent.

      • Energy

      • Wildlife/Nature

        • Saving the Spotted Frog From Grazing Livestock: a Good Beginning in Oregon

          It demonstrates the adage, endless pressure, endlessly applied, can sometimes result in a positive outcome.

          The 90,000-acre Antelope Grazing Allotment is located near Chemult, Oregon. The allotment contains unique fens and geological hydrology that has created extensive wetlands. Since the uplands are mainly dry lodgepole pine forests growing on volcanic ash from the Mount Mazama eruption (which created Crater Lake), almost all the forage available on the allotment exists in the wetlands and riparian areas.

        • Newt news you can use: Rare amphibian gets own livestream

          A very endangered great crested newt that lives in a forest pond near Joensuu is the latest burgeoning Finnish YouTube star in nature livestreams set up by preservation group WWF Finland.

          The newt is the rarest amphibian in Finland, and with few exceptions only lives on Åland and in North Karelia. In the cold winter months, newts live in damp forest areas and during spawning season thrive in forest ponds.

        • Conservationists Celebrate Federal Introduction of ‘Extinction Prevention Act’

          “The emergency funding provided in this legislation is a desperately needed first step towards stemming the global extinction crisis.”

        • Conservation Organizations Call for Urgent Action to Protect Grizzly Bears

          In letters sent today to federal lawmakers and the Biden administration, numerous conservation organizations are calling for urgent executive and legislative action to bolster grizzly bear recovery, even as western lawmakers and officials seek to remove Endangered Species Act (ESA) protections for the threatened species.

          According to a new report by Dr. David Mattson, removal of ESA protections would undermine grizzly bear recovery, demonstrating the need to increase current populations and detailing Idaho’s importance for the long-term viability of the species.

    • Finance

    • AstroTurf/Lobbying/Politics

      • Clearing the roadblocks Lavrov and Binken discuss regional conflicts, Navalny, and the repression of the opposition during first face-to-face meeting

        Russian Foreign Minister Sergey Lavrov had his first face-to-face meeting with U.S. Secretary of State Antony Blinken in Reykjavik on May 19. During the talks, which lasted two hours, Blinken raised concerns about Russia’s recent military deployments near Ukraine, the repression of opposition groups, and the health of jailed opposition politician Alexey Navalny. In conversation with journalists, Lavrov described the talks as “constructive,” but underscored the “numerous roadblocks” in bilateral relations between Russia and the United States. Here’s what the two top diplomats said to each other.

      • 5 Trump-Voting Counties in Oregon Vote to Leave State and Join Idaho Instead
      • Biden the Bold vs. Joe the Timid

        “Joe Biden Is Electrifying America Like F.D.R.”  So proclaimed the headline of a recent Nicholas Kristof column in the New York Times.  Even allowing for a smidgen of hyperbole, the comparison is not without merit.  Much like President Franklin Delano Roosevelt during his famous First Hundred Days in office in the midst of the Great Depression, Biden has launched a flurry of impressively ambitious domestic initiatives in the midst of the Great Pandemic — an American Rescue Plan, an American Jobs Plan, an American Families Plan, and most recently an environmental restoration program marketed as America the Beautiful.

        Biden’s Build Back Better domestic campaign qualifies as a first cousin once removed of Roosevelt’s famed New Deal.  To fix an ailing nation, FDR promoted unprecedented federal intervention in the economy combined with a willingness to spend lots of money.  As then, so today, details and specifics took a back seat to action, vigorous and sustained, not sooner or later but right now.

      • Final Chapter

        Freenode had been my home on the internet for over half of my life. All things IRC must come to an end, but it felt like Freenode was eternal. The staff had not always made decisions that I agreed with, but I have run IRC networks before. I know how it is. Precedent can drown you.

        It’s just sad to see it end like this. The communities that I have joined there have been catalytic in my life. I have irreparably changed the life of others on Freenode. I met people on Freenode that I talk with daily. I’m sure that I wouldn’t have the career that I have without Freenode.

        But it’s been taken over by a narcissistic Trumpian wannabe Korean royalty bitcoin millionaire, and I just cannot support that.

      • Haiku’s IRC channels are moving to OFTC!

        The OFTC (Open and Free Technology Community) has been around since 2001 and is associated with the 501(c)(3)-registered non-profit organization “Software in the Public Interest, Inc.”, which is based in New York. OFTC hosts discussion rooms for hundreds of popular and widely known open-source projects, such as Debian, QEMU, and LLVM.

    • Censorship/Free Speech

      • Parler Was Allowed Back In The Apple App Store Because It Will Block ‘Hate Speech,’ But Only When Viewed Through Apple Devices

        Last month we noted that Apple told Congress that it was allowing Parler’s iOS app to return to its app store, after the company (apparently) implemented a content moderation system. This was despite Parler’s then interim CEO (who has since been replaced by another CEO) insisting that Parler would not remove “content that attacks someone based on race, sex, sexual orientation or religion.” According to a deep dive by the Washington Post, the compromise solution is that such content will be default blocked only on iOS devices, but will be available via the web or the sideloaded Google app, though they will be “labeled” as hate by Parler’s new content moderation partner, Hive.

      • Did ‘Cancel Culture’ Drive Richard Wright Underground?

        Last month’s publication of the fully restored version of Richard Wright’s novel The Man Who Lived Underground is big news. And for good reason. Against the background of Derek Chauvin’s trial for the murder of George Floyd—and widespread protests against racist police brutality—Wright’s gripping tale resonates. It’s impossible to read these opening pages and not draw connections between Wright’s protagonist Fred Daniels—an innocent black man fingered by police for a crime he did not commit—and too many real-life cases today.

    • Freedom of Information/Freedom of the Press

    • Civil Rights/Policing

      • Mr. Anti-Globalization Meet Alexander Ionov, the self-described ‘human rights defender’ who demanded that Russia label Meduza a ‘foreign agent’

        After the Russian Justice Ministry added Meduza to its “foreign agent” list on April 23, we decided to challenge this designation in court. During pre-trial preparations on May 20, human rights lawyers Anastasia Burakova and Sergey Badamshin — who are representing Meduza’s interests in the case — gained access to documents that a shed bit of light on why Russia ended up recognizing Meduza as a “foreign agent.” Formally, the initiator of this decision was Alexander Ionov — the founder of the Anti-Globalization Movement of Russia, who has been a leading character in Meduza investigations on more than one occasion. One of our reports offended Ionov so deeply that he decided to write a complaint about Meduza to Russia’s censorship agency, Roskomnadzor. Meduza shares the fascinating biography of Alexander Ionov, who, as it turns out, actually considers himself a “human rights defender.”

      • Texas Gov Signs Ban Allowing Private Citizens to Sue Abortion Providers for $10K
      • Top prison official says Alexey Navalny has ‘more or less recovered’ after his hunger strike

        Alexey Navalny is recovering his health after coming off a 24-day prison hunger strike last month. The opposition politician currently weighs 82 kilograms (180 pounds) and is eating normally, Federal Penitentiary Service Director Alexander Kalashnikov told journalists on May 20. 

      • ‘We Need to Stop Taking Employers’ Viewpoint as Gospel’

        Janine Jackson interviewed the LA Times Michael Hiltzik on the “nobody wants to work” trope for the May 14, 2021, episode of CounterSpin. This is a lightly edited transcript.

      • ‘Tortured to Death’: Video Showing Fatal Louisiana Arrest of Unarmed Black Man Sparks Outrage

        A doctor who examined Ronald Greene’s body after the deadly May 2019 encounter said the Louisiana State Police claim that he died in a car crash “doesn’t add up.” 

      • Dubious Arrests, Death Threats and Confederate Loyalists: Welcome to Graham, N.C.

        After George Floyd’s death last May, protests brought to light the bloody past of Graham, North Carolina, as people chanted the name of Wyatt Outlaw, the city’s first Black elected official who was lynched by the Ku Klux Klan in 1870.

      • Fighting Disciplinary Technologies

        Disciplinary technologies are often marketed for benign purposes: monitoring performance, confirming compliance with policy and expectations, or ensuring safety. But in practice, these technologies are non-consensual violations of a subject’s autonomy and privacy, usually with only a vague connection to their stated goals (and with no evidence they could ever actually achieve them). Together, they capture different aspects of the same broader trend: the appearance of off-the-shelf technology that makes it easier than ever for regular people to track, control, and punish others without their consent.

        The application of disciplinary technologies does not meet standards for informed, voluntary, meaningful consent. In workplaces and schools, subjects might face firing, suspension, or other severe punishment if they refuse to use or install certain software—and a choice between invasive monitoring and losing one’s job or education is not a choice at all. Whether the surveillance is happening on a workplace- or school-owned device versus a personal one is immaterial to how we think of disciplinary technology: privacy is a human right, and egregious surveillance violates it regardless of whose device or network it’s happening on.

        And even when its victims might have enough power to say no, disciplinary technology seeks a way to bypass consent. Too often, monitoring software is deliberately designed to fool the end-user into thinking they are not being watched, and to thwart them if they take steps to remove it. Nowhere is this more true than with stalkerware and kidware—which, more often than not, are the exact same apps used in different ways.

      • ‘The First Step of Many’: Advocates Welcome Move to Close ICE Lockups at 2 County Jails

        “The announcement signals a major win for people who’ve been detained at the facility and bravely spoken out against its abuses and for local organizations who have long fought to shut it down.” 

      • “Who Is This Monster?”

        Rose Brady walked alone between bus stops on a busy street in Baltimore County one evening in April 1987. She was 28, with long, curly brown hair and blue eyes — perfect prey for the predator local police had named the “Sunglass Rapist.”

        She hoped so, anyway.

      • Accessibility is hard. It’s also your job.

        And she’s right! If what you built isn’t accessible, it’s not complete.

        There’s no such thing as a website or web app that doesn’t need to be accessible. If you’re a web developer, accessibility is literally your job. If you ignore it, you’re just a hobbyist.

      • Can the ‘right to disconnect’ exist in a remote-work world?

        However, the solution may not be as straightforward as it seems. In practice, it may actually be near impossible to combine the ability to log off with the freedom to work remotely, especially if that means creating timetables different to other colleagues. And, in a worse case scenario, some experts are also warning that mismanagement of these initiatives could compromise some of the flexibility workers have only recently been able to negotiate.

        So, is it possible to enshrine the right to disconnect in a new, remote-work world? Or are we still heading for the overburden and burnout we’re trying to avoid, no matter what laws are in the works?

      • Sweden: Violent Palestinian Protesters Protected, Peaceful COVID Demonstrators Arrested

        In Sweden on Tuesday, several hostile Palestinian demonstrations were held throughout the country. Riots broke out in Stockholm as protesters marched towards the Israeli embassy chanting “Allahu akbar” and “crush Zionism.” In stark contrast to the resolute action police took towards corona-critical demonstrations, they kept a low profile and watched from the sidelines.

      • Director Babak Khorramdin ‘killed and dismembered by parents in apparent honour killing’

        Former London-based Iranian film director Babak Khorramdin has been murdered in an alleged honour killing by his parents, according to police, with his remains found in rubbish bags.

      • Film Director Murdered and Dismembered by Family After Marriage Row

        The body of Babak Khorramdin was found chopped up in bins and in a suitcase in Ekbatan, a planned neighborhood in West Tehran, on Sunday.

        An argument had broken out between the father and son over Babak’s unmarried status, Iran Wire reported.

      • Iranian film director murdered by family in so-called ‘honor killing’

        Babak Khorramdin, who spent time working in London, was the victim of a so-called “honor killing” after an argument with his father over his unmarried status.

        Mohammad Shahriari, head of the Tehran Criminal Court, said Khorramdin’s father confessed to drugging and murdering his son, before cutting up his body and leaving it in the trash.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Unofficial Amiibo Guidebook That Was Essentially Advertising Nintendo Products Gets Nintendo’d

        Nintendo really can’t help itself. With the company’s storied reputation for valuing strict control of all things intellectual property over literally everything else, we have detailed plenty of occasions where this restrictive attitude seems to work directly against the company actually selling things. From DMCAing fan-made ports of Nintendo’s games to antiquated game systems, to getting fan-made expressions of Nintendo fandom taken down from 3rd party creation games like Dreams, to just DMCA carpet-bombing a wide range of fan-made games that serve as homages to Nintendo properties, the company has made it very clear that it will choose strict control over being good to its fans at every opportunity. Even, as is so often the case, when that means getting content taken down that essentially serves as an advertisement for Nintendo products.

      • [Old] Who owns patents, SEPs and develops standards for smart home technologies?

        In order to identify smart home-related patents, the IPlytics platform database was used to perform an extensive keyword search of patents filed worldwide in the smart home technology field. The search was based on the patent’s content (ie, title, abstracts, description and claims), making use of state-of-the-art stemming and semantic indexing methods. As the granting process of patents may take several years, we looked at pending patent applications as well as granted patents. Figure 1 illustrates the number of patents per year of application between 2006 and mid-2020. The numbers overall illustrate increasing filings since 2006.

      • [Reposted] Novelist Cory Doctorow on the Problem with Intellectual [sic] Property [sic]

        Patent was a third thing altogether, and its history is in things like the Patents Royal, where monarchs would hand out exclusive rights and monopolies as a form of patronage (everyone who wants to make silver ribbon, for example, has to get a license).

        When they were reformed in market economies, patents became a quid pro quo where you had inventors who were wasting a lot of energy trying to make the machines hard to understand and make them fall apart if you tried to take them apart but wanted to recoup their investment. And so, we said, “All right, if you’ll just tell us how your machine works and give us a model and publish the schematics, we’ll give you a fourteen-year exclusive right over your invention.”

        Over the years, all of these have changed in different ways, and they’ve all expanded monotonically, but it was rare that we had to refer to them all one breath.

        In the same way that we don’t have a name for tuna fish, cuckoo clocks, and D&D miniatures that encompasses them as a single category, we didn’t really have a category that was patents, trademarks, and copyrights. They were all things that businesses might use, but they weren’t the same thing. If we had to talk about them as a category, we would call them monopolies or creators’ monopolies.

      • Copyrights

        • When Aussies Face a Blocked Pirate Site, 59% Simply Give Up & Don’t Try Legal Options

          According to research commissioned by the Australian government, 59% of people faced with a blocked pirate site are more likely to simply give up than try other means to get content. However, VPN knowledge is already entrenched in Australian society, with almost half of Internet users aware of what they can do and what advantages they can bring to the table.

        • Member of Busted Scene Piracy Group SPARKS Avoids Prison Sentence

          One of the key members of Scene piracy group SPARKS has been sentenced to 27 months supervised release. Jonatan Correa, who previously admitted being part of the notorious Scene group, received a relatively mild sentence due to his limited involvement and cooperative stance. In addition to serving jail time, Correa was also ordered to pay $54,000 in damages to the Motion Picture Association.

        • Redditors Launch A ‘Rescue Mission’ For Embattled Sci-Hub, With The Ultimate Aim Of Building A Decentralized Version

          Techdirt has just written about belated news that the FBI gained access two years ago to the Apple account of Alexandra Elbakyan, the founder of Sci-Hub. This is part of a continuing attempt to stop the widespread sharing of academic papers, mostly paid for by the public, and currently trapped behind expensive paywalls. You might think somebody helping scholars spread their work to a wider audience would be rewarded with prizes and grants, not pursued by the FBI and DOJ. But of course not, because, well, copyright. It’s easy to feel angry but helpless when confronted with this kind of bullying by publishing giants like Elsevier, but a group of publicly spirited Redditors aim to do something about it:

Leaky and Freaky Patent Office

Posted in Europe, Law, Patents at 8:41 am by Dr. Roy Schestowitz

Video download link

Summary: Europe’s second-largest institution freaks out, seeing that its corruption is visible for all to see; in the process it resorts to intensive spying on bloggers and even banning of blogs (such as ours; merely for exposing evidence of abuse)

THE regime of the EPO is utterly disgusting. The staff is absolutely justified in calling them (the managers) “Mafia” because the tactics are indistinguishable; the Corsican Benoît Battistelli has quite some 'pedigree' and he left the Office in the hands of a French friend, who shamelessly lobbies the Boards of Appeal to allow European software patents — a demand to which they oblige.

“The Office is so absolutely out of control that it has decided to attack bloggers and nothing has truly improved since then (we’re still banned by the Office) except the lack of momentum in resistance.”As long as the Office is run by aggressive thugs with platoons of lawyers and aggressive goons nothing will improve. The Office will perish for the sake of short-term money-grabbing moves.

The video above deals with this morning's post about the 2014 letter and EPO spying operations against Techrights (and myself, personally). The Office is so absolutely out of control that it has decided to attack bloggers and nothing has truly improved since then (we’re still banned by the Office) except the lack of momentum in resistance. Almost like learned helplessness, instilling fear rather than acceptance.

EPO: 'We support transparency' - 'Are you watching us?' - EPO: 'we support free speech' - Techrights said what? - Send the lawyers!
Even more timely now that António Campinos is lawyering up against staff, based on internal documents

“The Mob Rushes in Where Individuals Fear to Tread.” ― B.F. Skinner, Walden Two

Posted in Deception at 4:11 am by Dr. Roy Schestowitz

Mob Justice: Korean! Trumpian! Narcissist!

Summary: People may fear defending Freenode (it’s an unpopular position at the moment), but facts must matter, not caricatures of people with class stigma and racial stereotypes; “Mobs have passions, not brains,” said Dan Simmons (The Fall of Hyperion)

The Freenode Users Exodus as Self-Fulfilling Prophecy Boosted by Those Looking to Gain

Posted in Deception at 3:38 am by Dr. Roy Schestowitz

Summary: Take a moment to study what actually begets the current split; the grievances don’t merit a fragmentation, which the communities around Free software aren’t likely to benefit from

THIS is the latest status report. It won’t be the last. Many Free software projects and communities are still sitting on the fence, unable to decide (just yet) what to do. We too are among those and we’re assessing the situation. I have seen and read Lee’s side of the tale (complete with screenshots and photos). I have already read many resignation letters (since more than a week ago). On balance, I think neither side is “perfectly right”; I think that the scandal or alleged scandal is overinflated by those looking to fully control the platform while leaving Lee with scraps. If there are legitimate concerns (e.g. Oracle and OpenOffice.org), then branching or forking away is fine (LibreOffice). If that boils down to superficial nonsense (e.g. GIMP being a supposedly ‘offensive’ acronym), the forkers and disruptors (Glimpse) won’t have a leg to stand on, at least in the long run…

“If people read Lee’s side of the tale, they will see that there are allusions there to the FSF situation. Apparently there was concern about coups and takeovers.”This post is mainly a rebuttal to false narratives, akin to headlines spelling the end of the FSF and telling us that everybody hates Richard Stallman (based on tweetstorms that are algorithmically curated).

If people read Lee’s side of the tale, they will see that there are allusions there to the FSF situation. Apparently there was concern about coups and takeovers.

But here’s the thing: many conveniently forget that the company which owns Freenode is a privacy company, not a surveillance outfit. At one point they rescued Linux Journal and they also donate to a bunch of Free (as in freedom) causes. For those who claim that Freenode’s owner violates privacy there’s this rebuttal showing that the supposed ‘evidence’ was in fact fabricated:

PIA snooping evidence fabricated
PIA snooping ‘evidence’ was allegedly fabricated

A lot of VPNs are faked privacy, but I never saw evidence of PIA itself lying about privacy. I saw the opposite of that. They’ve repeatedly proven, even in court, that they don’t log. So their competitors are eager to find some ‘dirt’ and, failing that, manufacture some ‘evidence’…

Since weeks ago (yes, we’ve been writing about the situation in Freenode for weeks!) we’ve been monitoring the situation and speaking privately to a number of people. Last week we felt morally compelled to shed light on some things, seeing that a boil-over was likely imminent and irreversible. Resignation letters were already being prepared and circulated privately for consultation.

“Last week we felt morally compelled to shed light on some things, seeing that a boil-over was likely imminent and irreversible.”This is not what the Free software community needs and if the nature of the supposed scandal is too shallow, then let’s try to reconcile rather than cause chaos to a lot of people (or projects that would rather code than coordinate migrations, change code that’s hardlinked to Freenode and so on).

There are already problems associated with impersonation due to this whole chaos. This poses seriously severe security risks. As Gentoo has put it, “it has came to our attention that certain individuals have been using the situation to impersonate Gentoo developers on other IRC networks.”

It’s worth noting that Gentoo has not left Freenode. Alpine is leaving (because of its connection to longtime Freenode staff), Haiku is leaving, Xen is currently discussing the matter, and several other projects are in a sort of limbo, trying to get the facts right before (or to avoid) jumping the gun. So let’s actually examine the facts.

“It’s worth noting that Gentoo has not left Freenode.”Hackaday wrote about this yesterday, alluding to a “Staff Exodus” (this is correct, but the users aren't following).

We still see some insulting letters if not borderline (and veiled) racist ones. This new one plays along with the “us versus them” (classism and racism) narrative, alluding to Lee as “narcissistic Trumpian wannabe Korean royalty bitcoin millionaire” (he’s an American and we lack evidence that he bears any resemblance to Trump). We keep seeing this framing in the same media that attacked Richard Stallman by distorting what he had written and then bragging that it caused him to resign.

As someone put it yesterday: “I am hopeful for this to be an end to gender and sexual orientation based harassment on the network while promotice a productive working environment for the open-source development (including libre and even “ethical”) and job offerings!”

“For the time being, very few projects left Freenode entirely.”Based on our understanding, some staff received abuse. This wasn’t Lee’s fault and, if anything, there were attempts to correct this. Rectifying such situations is hard because there’s no resolution that can please everybody.

For the time being, very few projects left Freenode entirely. Many users stay where they are. Yesterday in IRC we peaked at around 90 online users (almost an all-time high). “The channel on Freenode is still active,” PHP star “Remi” (or “Remi Repo”) wrote, “but may be closed in the near future.”

They are studying the situation. Totally understandable.

We’ve noticed that the very same people who worked super-hard to cancel both Stallman and Torvalds campaign against Lee. “I have been on IRC since at least 1993,” said this person. “Currently my main public networks are OFTC and Freenode.”

His project/product is associated directly with the Linux Foundation, whose position on this one can imagine (albeit it’s not a monolith).

“We deserve better fact-finding, not a frantic rush to weapons like pitchforks.”The media has been extremely unhelpful so far, egging people on and falling back on click-bait instead of bothering to listen to both sides. It’s so comfortable to judge from a distance and ruin things, but what if this ruin is based largely on misunderstanding and groupthink. Consensus isn’t the same as truth or justice. 2 months ago an angry, hateful mob offered us predictions of doom and gloom for the FSF. And where is the FSF now? Bigger Board than before, more pro-Stallman (RMS) than before, RMS giving public talks again, and many people (individuals) donating to the FSF. The petition in support of RMS exceeded 6,700 signatures, today it’s at 6,702, and the defamatory hate letter didn’t age well. At all! “VHS is dead – long live BETAMAX!” Yeah, how about that in the 1990s?

Market Research Telecast chose the headline “Freenode is dead – long live Libera Chat!”

In effect they’re lying to people, hoping to bring about a particular outcome. Freenode is still here and much of the controversy is still misunderstood. We deserve better fact-finding, not a frantic rush to weapons like pitchforks.

IRC Proceedings: Thursday, May 20, 2021

Posted in IRC Logs at 2:36 am by Needs Sunlight

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmS4AASwmraZcqwdvbwHa4XwAegPyxjeF1MsDUYzzxTmdi IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmUeCpudCrGH7QUq9YYEJP1cx7eptL7McNPHF1ptsHGdkU IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmY6MvBBzhKePd64JmibcQcBepXxSEjAoAbq9Ae5vYvfLy IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 Qmf5Ca5ESGdt7NBkdgXXcnxd9LzbcJr5XfvXxv5ey5Ypip IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmPvwPr15XfGT9wQsF1x2Jqq6vK2qmK6Ufy7ANoFoDdxsx IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmXBiNXVRc4gwuBbWra6EnUeeMfWzPXD21e5Dd6KuSnt4g IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmXQdwfP21Q7EuxhA6fJcEUiN35JjnAqPTBbfYyrwkUfDW IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmQTLkaf1wifrKNVAgryLEhoULdyakNDpfE8grtTzgPkNh IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmaKVxxA7QfTq1wkvx5K9MCbvtv6r4hwnH6pbJF4HSnvsL

Rational Patent Office Gone Irrational

Posted in Europe, Patents at 1:47 am by Dr. Roy Schestowitz

R 19/12, collusion, EPC
A lot can happen in half a century…

Summary: How the EPO turned or morphed from patent office into ‘printing press’ for grifting politicians like Benoît Battistelli and António Campinos

TREATIES were signed

No judges maligned
Be gentle and kind
Keep that spirit in mind

“Rationale sedated”Union had been formed
While staff performed
Management informed
Accordingly deformed

Independent judges; Kangaroo courtsBut patents conflated
“Facts-based” berated
Maximalists elated
“Innovation” overrated

For litigation they waited
Rationale sedated
“MOAR patents!” they stated
Because invalidations they hated

In comes the crook
The opportunity he took
Many hands he shook
Embarking on a rook

The judges on notice
Bossed by a novice


The EPO’s War on Justice and Assault on the Law — Part 15: The EBA Letter of 8 December 2014

Posted in Europe, Patents at 1:04 am by Dr. Roy Schestowitz

Previously in this series:

EPO IU Surveillance
Internal documents show that the EPO‘s Investigative Unit was active in monitoring “TechRights” and its IRC Channels in the hope of identifying “leakers”.

Summary: The illegal surveillance by Europe’s second-largest institution was a culmination of dictatorial despotism by the institution entrusted to grant patents correctly while respecting the independence of judges

It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair…

“In the middle of an ongoing social conflict that had been festering since at least 2012, the suspension of a Board of Appeal member by the EPO President, under the guise of a “house ban”, generated enormous disquiet, not only among bloggers, attorneys and EPO staff union officials, but also within the Enlarged Board of Appeal itself.”Readers may recall that back in December 2014 the EPO was in a dreadful state of turmoil.

In the middle of an ongoing social conflict that had been festering since at least 2012, the suspension of a Board of Appeal member by the EPO President, under the guise of a “house ban”, generated enormous disquiet, not only among bloggers, attorneys and EPO staff union officials, but also within the Enlarged Board of Appeal itself.

As a matter of fact, the members of the Enlarged Board were so incensed by Benoît Battistelli‘s actions that they sent a letter of complaint to the governing body of the EPO, the Administrative Council.

“Never before had an internal dispute of this kind spilled out into the public domain with such vehemence.”As IPKat correctly noted, this was an extraordinary event which was unprecedented in the 40 year history of the EPO. Never before had an internal dispute of this kind spilled out into the public domain with such vehemence.

The letter of 8 December 2014 from the Enlarged Board protested that Battistelli’s “house ban” amounted to a suspension which was not lawfully imposed.

According to the Enlarged Board, neither the President nor his Investigative Unit had the required authority to suspend a Board member. It was also noted that the computer belonging to the Board member was confiscated, thereby potentially giving office staff unauthorised access to confidential information about ongoing appeal cases.

“It was also noted that the computer belonging to the Board member was confiscated, thereby potentially giving office staff unauthorised access to confidential information about ongoing appeal cases.”The Enlarged Board summarised its concerns in the following terms:

“The actions of the investigation unit on the orders of the President also appear to be a clear challenge to the judicial independence of the Boards of Appeal.”

The Administrative Council was urged to take action to bring Mr Battistelli into line:

“What is needed is a clear limitation on the executive power, as far as the Boards of Appeal are concerned, in situations like the present, so as to avoid any impression of undue influence on their judicial work, contrary to the independence requirements of Article 6 of the European Convention on human rights.”

Shortly afterwards, the Enlarged Board’s letter of protest was endorsed by no less than eight external members from the national judiciaries of the EPO’s contracting states.

  • United Kingdom: Justice Christopher Floyd, Lord Justice of Appeal.
  • Netherlands: Robert van Peursem, Advocate General to the Supreme Court.
  • Sweden: Per Carlson, President of the Market Court.
  • Switzerland: Katherine Klett, Swiss Federal Supreme Court.
  • Cyprus: Stelios Nathaniel, Supreme Court of Cyprus.
  • Denmark: Henrik Rothe, Chief Justice the Maritime & Commercial High Court.
  • Romania: Octvia Spineanu-Matei, High Court of Cassation and Justice.
  • Finland: Ari Wiren, District Court of Helsinki.

The dramatic and unprecedented events of December 2014 were widely covered on various IP news channels.

“The dramatic and unprecedented events of December 2014 were widely covered on various IP news channels.”In the midst of this turmoil, some members of the Enlarged Board leaked copies of the letter of 8 December 2014 to IP Kat and Techrights in an attempt to gain publicity for their protest and draw attention to Battistelli’s outrageous and unprecedented encroachment on judicial independence at the EPO.

Shortly afterwards – presumably under pressure from “Team Battistelli” – IPKat removed the link on its website to the copy of the letter which it had received

However, the original document can still be viewed online on Techrights.

The leaking of this document was not without risk for the Enlarged Board members involved.

It was subsequently revealed in June 2015 that, at the time in question, the EPO’s Investigative Unit had been unlawfully using covert surveillance measures against perceived “internal enemies” of the Battistelli régime.

In fact, it is known that Battistelli’s IU invested a significant amount of effort into monitoring "TechRights" and its IRC channels in the hope of gathering information that would assist in identifying the so-called “leakers”.

Internal documents indicate that EPO management was in a state of “blue funk” when it realised that “[P]eople appear to be flocking to Schestowitz’ cause”.

According to the EPO’s internal "Stasi": “People that were clearly not in contact with him [i.e. Schestowitz] before appear to be mailing him now.”

“As far as the letter itself is concerned, it can be seen that there are 35 signatures appended at the end.”As it turns out, none of the Enlarged Board members involved in leaking the letter of 8 December 2014 were ever apprehended by Battistelli and his goons.

As far as the letter itself is concerned, it can be seen that there are 35 signatures appended at the end.

At first glance it might appear that the letter was unanimously approved and signed by all members of the Enlarged Board.

However, the fact of the matter is that two members did not sign the letter.

In the next part we shall consider the potential implications of these “missing signatures” for case no. G 1 /21.

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts