Bonum Certa Men Certa

Links 10/7/2021: IBM Buying Another Company, More European Patents Perish



  • GNU/Linux

    • Server

      • Best CentOS Alternatives for Large Companies

        The system of most of the top companies is based on CentOS distribution, which includes Verizon, Toyota, Disney, etc. Other major technology companies utilize this Linux distribution for creating various products. What can these and other companies that use CentOS daily do? They try to find out different Linux distributions. But, you don’t have to roam around cause you are at the right place. This post is all about the Best CentOS alternatives for larges companies. So, let’s this journey started:

    • Audiocasts/Shows

    • Kernel Space

      • AMD VanGogh APUs Get New Audio Driver For Linux - Phoronix

        Since last year AMD has been working on VanGogh APU support for Linux initially with their graphics driver support and that has spread to other areas. It also turns out now that with VanGogh APUs will be a new Linux audio driver.

      • Graphics Stack

        • Mike Blumenkrantz: At Last

          Zink(-wip) now fully supports GL_KHR_blend_equation_advanced, which means ES 3.2 is a go (once my local CI clears me to push today’s snapshot).

        • Zink Now Supports OpenGL ES 3.2 Over Vulkan - Phoronix

          The latest achievement for Mesa's generic OpenGL implementation atop Vulkan is being able to handle OpenGL ES 3.2.

          Within the "zink-wip" development code, today's work now allows for OpenGL ES 3.2 to be exposed with KHR_blend_equation_advanced being the last extension necessary for this embedded OpenGL version. On the desktop side Zink has supported OpenGL 4.6 while for those making use of GLES there is now v3.2 support. OpenGL ES 3.2 mandates KHR_debug, KHR_robustness, OES_geometry_shader, OES_gpu_shader5, OES_texture_buffer, OES_tessellation_shader, and other extensions.

        • Intel's Linux Compute Stack Now Boasts Production-Ready OpenCL 3.0, Integrates IGSC FU - Phoronix

          Shortly after OpenCL 3.0 was finalized last year it was enabled for Intel's open-source Compute Runtime stack (and even earlier with their Tiger Lake enablement). But since last year that OpenCL 3.0 support was marked as "beta" while last week was quietly promoted to being "production" grade.

          With last week's Intel Compute-Runtime 21.26.20194 build and carried forward with today's 21.27.20266 build, the OpenCL 3.0 support is marked as production ready. This is a subtle change in noticing the difference from the version tables and just seems to reflect the good state of Intel's open-source OpenCL support. Even in the months of the "beta" support, OpenCL 3.0 with the Intel Compute-Runtime has been working well for me from Gen9 Skylake graphics through Gen12 Tiger Lake.

    • Applications

      • [Older] Audacity 'Spyware' Claims Follow Privacy Policy Changes By New Owner

        Popular open-source audio editing software Audacity is facing "spyware" allegations from users for recent privacy policy changes that suggest the desktop app is collecting user data and sharing it with third parties, including state regulators where applicable.

        Two months ago, Audacity was acquired by Muse Group, which owns other audio-related projects including the Ultimate Guitar website and the MuseScore app. According to Fosspost, changes to the privacy policy section on the Audacity website indicate that several personal data collection mechanisms have since been added by the parent company.

        The type of data collected now includes the computer's processor, operating system and version, the user's IP address, and any crash reports, fatal error codes and messages generated by their machine. More concerning perhaps is the inclusion of a vague section listing data that must be collected "for legal enforcement, litigation, and authorities' requests (if any)."

      • The Audacity! How to wreck an open-source project and anger a community

        Audacity. Surely, you've heard of it. It's one of the most widely used apps by podcasters everywhere. It's one open-source project that has managed to strike the perfect balance between feature list and usability. It has everything you could possibly need to record podcasts, music and just about any type of audio, and it does this while maintaining a level of user-friendliness that few software titles can touch. It's as easy to use as it is feature-rich.

        [...]

        Here's what happened. A company acquired Audacity. Now, prior to this, you may or may not have heard that the Audacity developers were toying around with adding telemetry to collect data from users. After a public outcry, it seemed that idea was sent to /dev/null to die a timely death.

        [...]

        Then they continue that they might share data with anyone they classify as a "third-party" or even "potential buyers." The actual verbiage of the new privacy policy describes those entities they might share your data with as such (taken directly from the official privacy notice that was posted July 2...

      • Users suspected that the successful audio software was spying on them, so they created a new version of it. [Ed: Seems like automated mishmash]

        Over the years, Audacity has developed a large and loyal user base in line with successful open source software – which some would define as the “default” for sound editors and podcasts. But since the software has changed hands in recent months, it hasn’t stopped bothering users – and this time they’re no longer just protesting and moving on.

      • What’s The Deal with the New Audacity Privacy Policy?

        The popular audio editing platform has come under fire for new privacy policies, so what’s the fuss all about?

        Audacity sparked controversy this week amid claims that its new privacy policy essentially turns the platform into ‘spyware’.

        The allegations, first published by tech site Fosspot, have raged on social media and prompted the company to revise the new privacy Ts & Cs.

        Audacity is among the most popular audio editing software tools available, boasting at least 100 million users globally.

      • Audacity clarifies privacy policy over spyware allegations

        The first version of the privacy policy mentioned sharing data with potential buyers, governments and law enforcement Popular open-source audio-editing software Audacity has promised to revise its privacy policy, following allegations that it is being transformed into 'spyware'.

      • Audio Recording And Editing Software ‘Audacity’ Is Not Spyware, Reports Said

        Early July, numerous reports from tech websites said that the popular audio recording and editing software Audacity is now considered spyware as it claims to collect sensitive data from the users that installed it in their PCs. Since this information was released, many users have already said that they are uninstalling their software and use other alternative software instead.

        However, it is said that this case has already been addressed two months ago.

        According to a recent report, although the software is free and open-source, its new owner Muse Group can create "pretty damaging changes" especially on its telemetry features and privacy policy which many people think is too vague and overarching.

        The new privacy policy released on July 2 mentioned the five bullet points that are not really broad. It's actually just similar to the collected data that was mentioned in FOSSPost's own privacy policy which is the following: browser cookies you may provide, browser user-gent, IP address, and your geographical location, cookies for other websites you visited or any other information your browser can give about you. The last row covers the "data necessary for law enforcement, litigation and authorities' requests (if any)" that is actually broad and not well-defined for its users. The other one is the fact that Audacity is not allowed to be used for users age 13 and below, requesting them to not use the app in order to avoid the expense of dealing with laws related to collecting personal data from children.

    • Instructionals/Technical

      • rsync over SSH

        I’ve migrated a few rsync pages yesterday and realised there’s been something I’d wanted to document for some time: using rsync over ssh.

        rsync initially started as a tool for synchronising local folders, then expanded to also working with external drives, then progressed to working with networking folders and eventually started working with remote servers using its own native rsync protocol.

      • How to Install Libinput-gestures to Enable Multi-Touch Gestures in Ubuntu | UbuntuHandbook

        For laptop users, the built-in touchpad can do more magic by enabling multi-touch gestures. And libinput-gestures is a popular solution besides touchegg.

        Libinput-gestures is a free open-source utility that reads libinput gestures from your touchpad and maps them to user customized gestures. Each gesture can be configured to activate a keyboard key combination via xdotool utility.

      • IP Address Classes Explained – Linux Hint

        This tutorial explains IP address classes or classful networks, their classification and their use. An IP address is a 32 bits unique binary number used to identify networks and devices or hosts, the result of the conversion of the binary number to decimal is what we know as IP address.

        In decimal format this address consists of 4 numbers ranging from 0 to 255 separated by a dot. For example: 240.34.87.22 is an IP address (in binary format: 11110000.00100010.01010111.00010110).

        Each one of those numbers separated by dots is called octet. In the previous example 240 is an octet, 34 is another octet, 87 the third octet and 22 the fourth octet. Each octet consists of 8 bits. Some bits are used to identify a network, while the rest are used to identify hosts within a network.

      • How to install Nitrux 1.5.0

        In this video, I am going to show how to install Nitrux 1.5.0.

      • Bash Cut Command with Examples – Linux Hint

        The cut command is used to extract the specific portion of text in a file. Many options can be added to the command to exclude unwanted items. It is mandatory to specify an option in the command otherwise it shows an error. In this article, we will throw light on each option of the cut command.

      • UEFI Shell Scripting Tutorial

        UEFI (Unified EFI – Extensible Firmware Interface) is a software specification used to interface between the operating system and the firmware of your computer’s hardware.

        UEFI has a built-in shell program called UEFI Shell or EFI Shell. You can use it to run EFI Shell commands and run your own EFI scripts.

        This article will show you how to write UEFI/EFI Shell scripts and run them from the UEFI/EFI Shell. So, let’s get started.

      • How to Map a Host Port to a Container Port? – Linux Hint

        The Docker open-source platform has completely changed how we build, deploy, and handle containerized apps. You will need to construct a Dockerfile to containerize an application, which contains the instructions Docker needs to generate and run images. To allow seamless communication among containers in multi-container applications and making your Docker ports available by services with the outside world, you may have to set certain networking rules.

        When you start a container with Docker, all of the applications in the container run on specific ports. If you wish to use a port number to access a specific application, you must first map the container’s port number to the docker host’s port number. Containers can use port mappings to send and receive traffic through ports on the host container instance. The container’s port mappings are defined as part of the container definition. The port number on the container that is connected to the host port was either chosen by the user or allocated automatically.

        Containers in Docker can have their applications running on ports. When running a container, you must map the container’s port number to the Docker host’s port number if you would like to connect the container’s application via a port number. In this tutorial, we will explain you about mapping a host port to a container port in docker.

      • Sort Command in Linux with Examples – Linux Hint

        SORT command in Linux is used to arrange the record in a specific order according to the option used. It helps in sorting the data in the file line by line. SORT command has different features that it follows in the resultant of commands. First is that the lines having numbers will come before the alphabetic lines. Those lines having lower case letters will be displayed earlier than the lines having the same character in uppercase.

      • Linux Tail Command with Examples – Linux Hint

        As the name implies, the tail command is used to display the last values of the content of the file. By default, the last 10 lines are selected. Whereas, we can customize the number of lines by providing the number in the command.

      • Linux Head Command with Examples – Linux Hint

        As the name shows, the head command displays the first N lines of data. By default, it is a 10 number but can be customized. It is opposite to the tail command because the tail command helps in displaying the last N lines from the file.

      • How to Run Virtual Machines Using GNOME Boxes in Linux – Linux Hint

        This article will cover a guide on installing and using “GNOME Boxes” application in Linux. You can use it to create and manage local or remote virtual machines. You can run many supported operating systems in these virtual machines by saving content in virtual hard drives.

        [...]

        Developed by the GNOME team, GNOME Boxes is a part of the official GNOME software suite. It is a graphical frontend for creating and managing QEMU virtual machines. QEMU is a command line tool that can emulate hardware components and run virtual machines containing full installation of various operating systems available out there. A graphical utility called, “virt-manager” is available that can be used to manage QEMU virtual machines. However, its user interface can be a bit overwhelming with its numerous built-in configuration options. GNOME Boxes aims to simplify the interface by only exposing necessary features to end users. It is more oriented towards casual desktop users who want to manage virtual machines for day to day tasks and want to run virtual machines quickly without much hassle. Advanced users, specially those who manage QEMU virtual machines for businesses and organizations, can always use the virt-manager graphical frontend.

      • How to Mount CD-ROM on CentOS 8 – Linux Hint

        CDs and DVDs are slowly becoming irrelevant, but they are still efficient data storage devices. They can store data in a large quantity for long periods of time. In this article, we will discuss the mounting process of CD-ROM on CentOS 8 step-by-step. The method we will perform in this article will also work if you want to mount an ISO file on CentOS 8 system.

      • How to Install and Use CentOS Web Panel on CentOS 8 – Linux Hint

        CentOS Web Panel (CWP) is a control panel for web hosting. It is a free alternative to cPanel. It has an easy-to-use interface and several other features for newbies who want to create and manage hosting servers. Using CWP is easy and convenient as you don’t have to access the server with SSH for every small task that needs to be completed.

        This article provides a detailed guide on installing and using the CentOS Web Panel on CentOS 8.

      • How to Install and Use Vagrant on CentOS 8 – Linux Hint

        A vagrant is an open-source tool that helps create, maintain and manage virtual environments. Vagrant has an easy-to-use workflow and focuses on automation. It decreases setup time and increases productivity. On Vagrant, it is straightforward to share setups between team members, enabling everyone to have the same setup.

        This article provides an extensive guide on how to install Vagrant on CentOS 8. We will also discuss how to create virtual development environments.

      • How to Delete Old Unused Kernels on CentOS 8 – Linux Hint

        The kernel is the bridge between software and hardware, and it is part of an operating system that interacts with the hardware.

        In normal circumstances, the number of installed kernels does not affect the system’s performance, but it is still recommended to remove old unused kernels as it frees up space. Before we start removing old unused kernels, it is essential to note that you should always have at least two kernels on your system at any time.

      • How to Pass Environment Variables to a Docker Container – Linux Hint

        Docker is an open-source program that executes server applications using containers rather than virtual machines. Docker is a development and hosting configuration that utilizes fewer resources, so it’s no surprise that it is sweeping the development world. Docker environment variables are significant to this procedure because they store data that is unique to each user account accessing the software.

        Using any modern JavaScript framework to create a container for a single app, you may discover that the configuration settings vary depending on where the container will execute. The basic URL for your API, for example, can vary based on whether you are testing or publishing the app. Environment variables are commonly used by developers to tackle this problem because code operates on the backend, environment variables are usually used there.

        During the image construction, we may need to pass environment information to the operating container. To do so, we employ both ENV and ARG commands. The ARG command creates a variable that can be provided during the build process. Once it’s defined in the Dockerfile, you can use the parameter —build-arg to provide it to the image builder. In the Dockerfile, we can have numerous ARG instructions. In the Dockerfile, the ARG command is the only one that can come before the FROM instruction.

        However, The ENV instruction sets the environment variable, which in turn specifies the environment for the construction instructions that follow. The ENV instruction is accessible during the construction process as well as when the container is started with the —env flag. However, we are unable to pass the ENV instruction while constructing the image. The ARG directive has the drawback of being unable to persist after the image has been built. To pass the environment data inline when creating the image, we will just utilize both ENV and ARG. In this guide, we will teach you how to pass an environment variable to a docker container.

      • How to download and extract a .deb package on Ubuntu or Debian Linux

        Sometimes you require a certain file from a Debian .deb package. For example, because you accidentally deleted a file. Or because the package's installation is faulty and it can't be restored without first adding the missing file. This FAQ explains how to extract the contents of a.deb file downloaded from the Debian or Ubuntu repository.

      • How to Enable SSH in Ubuntu 20.04 Step by Step Tutorial

        Do you know what is SSH? If yes then move to the next step how to enable ssh in ubuntu. If you don’t know, listen to my words.

        SSH (Secure Shell) is a cryptographic network protocol used to establish a secure connection between the client and a server, and both can communicate securely on an encrypted channel.

        It allows the client to transfer files securely and perform the administrative task on the server remotely by accessing the command line interface on the client machine. The client machine may have an operating system like Windows, Linux, MAC and other.

      • How to Use Maltego Kali Linux a Complete guide for beginners

        Welcome you, I am glad you are here and continue reading my notes on Penetration Testing Tutorial and this post is part of Information Gathering and This article will cover How to use Maltego Kali Linux tutorial is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.

      • Cain and Abel software for cracking hashes Guide for Beginners

        According to the official website http://www.oxid.it/cain.html , Cain and Abel software is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking hashes passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analysing routing protocols.

        The latest version is faster and contains a lot of new features like APR (ARP Poison Routing) which enables Sniffing on switched LANs and man in the middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

      • Maxim Burgerhout: Building a load balanced Ansible Tower cluster

        As you might know, I do a bit of YouTubing. One video request I got a couple of times, was to do a video about clustering Ansible Tower behind a load balancer.

        As I had never done that before myself, it sounded interesting, so I did it.

      • 7 steps: Learn how to migrate to Linux desktop - TechRepublic

        Many businesses depends on Linux and open source in the data center or any number of Linux-based virtual machines hosted on a third-party cloud service. So why are you continuing to ignore Linux on the desktop? Is it because Windows is simply the desktop operating system you’ve always used and can’t figure out a reason to make the switch? Or are you afraid your end-users won’t be able to accept that drastic change? Given that so much of what users do these days happens within a web browser, using a less-than-reliable and easily broken OS as Windows should be a no-brainer of a switch.

    • Distributions

      • IBM/Red Hat/Fedora

        • CentOS Stream: 'I was slow on the uptake, but I get what they are doing now,' says Rocky Linux founder

          Last December Red Hat announced that it would cease work on CentOS Linux, switch its focus to CentOS Stream, and sunset CentOS 8 in December 2021 instead of 2029. It was a change that shook the Linux community. CentOS is hugely popular: exact figures are difficult, but W3techs suggests that CentOS has 10.6 per cent of the websites running Linux, versus 0.9 per cent for Red Hat Enterprise Linux (RHEL). CentOS is a community build of RHEL whereas CentOS Stream is an upstream project, "a preview of upcoming Red Hat Enterprise Linux minor and major releases," as described by Red Hat.

          "The end of life of CentOS as we know it had a negative effect on my company and my company's customers as well as pretty much everybody in the industry," Kurtzer told The Register. "I felt it was important to take the lessons learned from CentOS and bring that into a new project... and I enjoy operating systems."

        • IBM Plans To Acquire Hybrid Cloud Consulting Firm BoxBoat

          IBM has announced plans to acquire BoxBoat Technologies, a DevOps consultancy and enterprise Kubernetes certified service provider. BoxBoat will extend IBM’s container strategy and implementation services portfolio to further advance IBM’s hybrid cloud strategy and accelerate Red Hat OpenShift adoption globally.

        • You asked, we acted: How Red Hat has acted on customer feedback [Ed: But Red Hat, you still killed CentOS (as it was) in spite of popular demand]

          At Red Hat, we take customer feedback seriously. At the end of projects with our clients, formal training, purchases of software or solutions, and even technical support, we regularly hold feedback sessions. In doing so, this feedback loop can help identify points of improvement in various aspects and areas of the company to provide an improved customer experience.

          In our Customer Portal, you will find a page dedicated to showing the actions we’ve implemented based on feedback we’ve received called "You Asked. We Acted."

          This is one of the ways that we show how Red Hat is taking action to implement changes based on feedback we’ve received.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Events

        • Linux Plumbers Conference: Testing and Fuzzing Microconference Accepted into 2021 Linux Plumbers Conference

          We are pleased to announce that the Testing and Fuzzing Microconference has been accepted into the 2021 Linux Plumbers Conference. In spite of the huge number of products shipping with the Linux kernel which are being thoroughly tested by OEMs and distribution providers, there is still no enforced quality standard upstream. How can we make best use of all the publicly available infrastructure and test frameworks in order to fill this gap? Testing and fuzzing upstream as well as gathering results from products is crucial to keeping a project that has over 5,000 commits every month stable for all to use.

        • Practical Open Source Needs You!

          This is the first such event we’ve planned, so to get the word out, we’ve been reaching out directly to a wide array of open source community members of all stripes -- strategists, activists, lawyers, developers -- to spread the word about our Call for Speakers, which closes on July 15th, 8:00 EDT. We want this event to be a place where folks can find an accessible entry point into open source practices, learning from community members about best practices, common mistakes, and answers to topics as deceptively simple as choosing the right license for a project, so if that’s something you know about, we want to hear from you!

        • Florence to host International FOSS4G Conference 2022

          The 16th annual congress of the Open Source Geospatial Foundation (OSGeo), the non-profit organisation that supports and promotes the collaborative development of free and open source geographic technologies and open geospatial data, will be held in Florence at the Palazzo dei Congressi, Palazzo degli Affari and the University of Florence, 22-27 August 2022.

  • Leftovers

    • Science

      • The evolution of POS (Point of Sale) Systems

        The first computer-driven cash register, which resembles what we have today, was developed by IBM in 1973 – and it marked the first commercial use of a computer-based system used by the restaurant industry.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Friday

            Security updates have been issued by Debian (apache2 and scilab), Fedora (chromium and perl-Mojolicious), Gentoo (inspircd, redis, and wireshark), and Mageia (fluidsynth, glib2.0, gnome-shell, grub2, gupnp, hivex, libupnp, redis, and zstd).

          • Linux kernel Livepatching

            Canonical livepatch is the service and the software that enables organizations to quickly patch vulnerabilities on the Ubuntu Linux kernels. Livepatch provides uninterrupted service while reducing fire drills during high and critical severity kernel vulnerabilities. It is a complex technology and the details can be confusing, so in this post we provide a high level introduction to Ubuntu Linux kernel livepatching and the processes around it.

          • Increased security: Open Policy Agent reaches version 0.30 [Ed: Automated translation]

            Designed as an open source general-purpose policy engine, the Open Policy Agent (OPA) is used to program, provision, enforce and monitor context-related policies. The team behind the open source project managed by the Cloud Native Computing Foundation (CNCF) has now presented OPA 0.30.0 – immediately followed by the bug fix release 0.30.1, which contains an error in the behavior of indexof fixes.

    • Internet Policy/Net Neutrality

      • Biden’s new executive order urges FCC to restore net neutrality

        President Joe Biden will urge the Federal Communications Commission (FCC) to reinstate net neutrality rules in an executive order he’s expected to sign Friday.

        Biden’s call will be part of a larger sweeping executive order attempting to promote competition in the country’s economy and combating corporate consolidation.

        Net neutrality rules were adopted by the FCC in 2015 and prevent internet service providers (ISPs) from blocking, throttling, or using paid prioritization on internet speeds. The rules also classified ISPs under Title II of the Communications Act, which gave the FCC authority over the providers.

        All of that was undone in 2017 by the Republican-led FCC, which repealed the rules.

    • Monopolies

      • Patents

        • News from Abroad: European CVC CRISPR Patent Revoked Because of Invalid Priority Claim [Ed: More fake patents, including patents on life]

          While many patiently await developments in the pending U.S. interference proceedings relating to the CRISPR patents in the U.S., matters are progressing in Europe. The Opposition Division (OD) of the European Patent Office (EPO) has just issued (on June 29, 2021) its written decision in the case of EP3241902, owned by the University of California/Berkeley, the University of Vienna, and Emmanuelle Charpentier (collectively termed "CVC"). While the headline decision of the OD to revoke the patent was delivered orally at the hearing on April 13, 2021, the OD has now provided its detailed reasoning behind the decision.

          Formally, EP3241902 was revoked for lack of inventive step. However, pivotal in this decision was the finding by the OD that the patent was not entitled to priority from at least the first priority claim of May 25, 2012 (US 61/652,086; "P1"). In view of this, the inventors' own landmark publication from June 28, 2012 ("Jinek 2012") became prior art.



Recent Techrights' Posts

Topics We Lacked Time to Cover
Due to a Microsoft event (an annual malware fest for lobbying and marketing purposes) there was also a lot of Microsoft propaganda
EPO Education: Workers Resort to Legal Actions (Many Cases) Against the Administration
At the moment the casualties of EPO corruption include the EPO's own staff
 
Links 22/11/2024: Dynamic Pricing Practice and Monopoly Abuses
Links for the day
Microsofters Try to Defund the Free Software Foundation (by Attacking Its Founder This Week) and They Tell People to Instead Give Money to Microsoft Front Groups
Microsoft people try to outspend their critics and harass them
[Meme] EPO for the Kids' Future (or Lack of It)
Patents can last two decades and grow with (or catch up with) the kids
Gemini Links 22/11/2024: ChromeOS, Search Engines, Regular Expressions
Links for the day
This Month is the 11th Month of This Year With Mass Layoffs at Microsoft (So Far It's Happening Every Month This Year, More Announced Hours Ago)
Now they even admit it
Links 22/11/2024: Software Patents Squashed, Russia Starts Using ICBMs
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, November 21, 2024
IRC logs for Thursday, November 21, 2024
Gemini Links 21/11/2024: Alphabetising 400 Books and Giving the Internet up
Links for the day
Links 21/11/2024: TikTok Fighting Bans, Bluesky Failing Users
Links for the day
Links 21/11/2024: SpaceX Repeatedly Failing (Taxpayers Fund Failure), Russian Disinformation Spreading
Links for the day
Richard Stallman Earned Two More Honorary Doctorates Last Month
Two more doctorate degrees
KillerStartups.com is an LLM Spam Site That Sometimes Covers 'Linux' (Spams the Term)
It only serves to distract from real articles
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, November 20, 2024
IRC logs for Wednesday, November 20, 2024
Gemini Links 20/11/2024: Game Recommendations, Schizo Language
Links for the day
Growing Older and Signs of the Site's Maturity
The EPO material remains our top priority
Did Microsoft 'Buy' Red Hat Without Paying for It? Does It Tell Canonical What to Do Now?
This is what Linus Torvalds once dubbed a "dick-sucking" competition or contest (alluding to Red Hat's promotion of UEFI 'secure boot')
Links 20/11/2024: Politics, Toolkits, and Gemini Journals
Links for the day
Links 20/11/2024: 'The Open Source Definition' and Further Escalations in Ukraine/Russia Battles
Links for the day
[Meme] Many Old Gemini Capsules Go Offline, But So Do Entire Web Sites
Problems cannot be addressed and resolved if merely talking about these problems isn't allowed
Links 20/11/2024: Standing Desks, Broken Cables, and Journalists Attacked Some More
Links for the day
Links 20/11/2024: Debt Issues and Fentanylware (TikTok) Ban
Links for the day
Jérémy Bobbio (Lunar), Magna Carta and Debian Freedoms: RIP
Reprinted with permission from Daniel Pocock
Jérémy Bobbio (Lunar) & Debian: from Frans Pop to Euthanasia
Reprinted with permission from Daniel Pocock
This Article About "AI-Powered" is Itself LLM-Generated Junk
Trying to meet quotas by making fake 'articles' that are - in effect - based on plagiarism?
Recognizing invalid legal judgments: rogue Debianists sought to deceive one of Europe's most neglected regions, Midlands-North-West
Reprinted with permission from Daniel Pocock
Google-funded group distributed invalid Swiss judgment to deceive Midlands-North-West
Reprinted with permission from Daniel Pocock
Gemini Links 20/11/2024: BeagleBone Black and Suicide Rates in Switzerland
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, November 19, 2024
IRC logs for Tuesday, November 19, 2024