Links 13/9/2021: Zink’s Completion and 72% of Top 50 Steam Games Can Run on GNU/Linux

Posted in News Roundup at 8:14 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • A Quick Look at Garuda Linux Qtile Edition – Invidious

        Garuda Linux is a desktop Linux distribution that has exploded in popularity in recent months. A few months ago, I took a look at their KDE Dr4gonized edition, which I thought was the most gorgeous desktop Linux distro that I’ve ever looked at.

      • Web Apps Will Be The Year Of Linux Desktop

        The year of the linux desktop is just a meme but if it did actually happen, I have a prediction for what it might be like and you probably won’t like it. I expect a future full of of web apps and this seems to be the direction a lot of companies are going.

      • So You Want To Learn Linux

        A video for the beginner… It might also help Linux users who are working with new users.

    • Kernel Space

      • Intel Posts Initial Code For x86 User Interrupts On Linux – Shows Great Performance Potential – Phoronix

        In addition to the big Advanced Matrix Extensions support still being in flux and the kernel-side AMX code not yet being merged, another feature of next year’s Xeon “Sapphire Rapids” that we are only now seeing in early published form for the Linux kernel is handling of x86 user interrupts.

        Going back to last year Intel disclosed user interrupts with the new UIRET instruction. The x86 User Interrupts functionality is premiering with Sapphire Rapids processors. A few minutes ago the initial Linux kernel code for x86 User Interrupts was finally published under a “request for comments” flag on the Linux kernel mailing list.

      • FUTEX2 System Call Updated To Work On ARM – Phoronix

        While Linux 5.15 has many new features and improvements, one of the patch series we have been eager to see land is the work introducing the new FUTEX2 system call. FUTEX2 can help improve the performance of newer Windows games running on Linux via Wine / Steam Play’s Proton by better matching the Windows kernel behavior, but while it didn’t land for Linux 5.15, at least a new version of the patches were posted.

      • Graphics Stack

        • Zink OpenGL-On-Vulkan Tackling Support For More Games

          After last month landing the Zink sub-allocator code for improved performance and also enabling OpenGL ES 3.2 support for Zink, lead developer Mike Blumenkrantz at Valve has been spending time this month working to get more games running on this OpenGL-over-Vulkan Mesa driver.

          Zink continues on a great trajectory for running more OpenGL games and applications atop Vulkan. The performance of Zink continues to be quite good as shown in last month’s Zink comparison benchmarks. This month Mike Blumenkrantz has been working to address issues that prevented more OpenGL games from running or running well.

    • Instructionals/Technical

      • How to merge PDFs with PDFSam on Linux

        Need to merge two PDF documents on your Linux PC? Check out PDFSam; it’s an excellent tool that gives users incredible power to modify and edit PDF documents on Linux. Here’s how to use it to merge PDFs.

      • How to utilize openssl in Linux to check SSL certificate details – TechRepublic

        Administering SSL certificates can be quite a chore, especially when it comes time to renew or replace them. Expiring SSL certificates can be devastating for technological operations, with the impact ranging from worrisome browser error messages to complete production outages. Therefore, it’s important to not only keep an eye on upcoming SSL certificate expirations (network scans or at the very least a log keeping track of these certificates are essential) but to completely verify the success of renewing/replacing these certificates.

      • How To Install and Configure The Latest release of Drupal on CentOS 7/8 – Unixcop

        Drupal is a free and open-source web content management system (CMS) written in PHP and distributed under the GNU General Public License. Drupal provides a back-end framework for at least 13% of the top 10,000 websites worldwide – ranging from personal blogs to corporate, political, and government sites. Systems also use Drupal for knowledge management and for business collaboration.

      • 2 Ways to install Flutter on Ubuntu 20.04 |18.04 | 21.04 Linux – Linux Shout

        Flutter is an open-source SDK developed to program applications to work on multiple operating systems using a single codebase such as Android, iOS, Linux, Mac, Windows, Google Fuchsia, and the web. Hence, save the developers time and manpower to write code for an app according to the specific OS. Flutter is developed by Google written in C, C++, and Dart.

      • Clear Cached Memory on Ubuntu
    • Games

      • PS4 Emulator for Linux Now Plays Hundreds of Games

        Nothing says that a new console generation is here quite like the old console gen getting working emulators. And despite the PS5 still being hard to come by, the PS4’s emulation day has come. Spine, a closed source PS4 emulator for Linux that’s been privately in the works since 2019 just made its first full public release earlier this month, complete with a new compatibility list featuring hundreds of games.

        There are a few caveats, though. PS4 emulation is still in its early days, and the games that currently work with emulation reflect that. While Spinedev’s pushed far beyond what they had working in Spine’s 2019 demo, most of what the current compatibility list labels as working “ingame” (one word) are smaller 2D titles that already have their own proper PC releases. In other words, don’t expect to be playing God of War or Spider-Man: Miles Morales on your PC any time soon. And just because a game technically runs doesn’t mean it works flawlessly. For instance, you can play Sonic Mania in Spine, but the color palette looks trippy even for Sega’s blue blur.

      • Steam Deck Check: 72% of Top 50 Steam Games Can Run on Linux

        According to a report by Linux gaming site Boiling Steam, 72% of the current top 50 games on Steam can run on Linux, either using Proton or running natively. Some of the unsupported games should eventually work with Linux due to Valve’s efforts to enable a vast roster of games for its forthcoming Steam Deck handheld console, but anti-cheat programs have hindered progress on Linux-based systems.

        The Top 50 list of Valve’s Steam chart includes games with the most concurrent players over two weeks. So rather than sales, whatever game is played the most gets a spot on the chart. Unsurprisingly, these include titles like CS: GO, Dota 2, PUBG, and GTA V.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • Pika Backup is A Modern New Backup Utility for GNOME Desktop

          For personal data backup, Pika Backup is a simple GNOME app with an elegant user interface.

          Pika Backup is free open-source tool to save your personal data into either local disk (e.g., an USB stick) or remote server using secure shell or sftp. As modern GTK4 apps, it has an adaptive UI design which is resizable and works great on different screen sizes & devices.

          The utility is based on BorgBackup (aka Borg), features data de-duplication technique to save time and disk space since only changes are stored for daily backups. With the power of authenticated encryption technique, it also supports password protect for your data.

          The app starts in a clean UI with a “Configure Backup” button to get started creating repositories to store backups. The top-left ‘+‘ icon is also present to do the same job.

    • Distributions

      • Debian Family

        • The Lounge

          There is a new application available for Sparkers: The Lounge

      • Canonical/Ubuntu Family

        • Bored of Flat UIs? Check Out Skeuos GTK Theme

          Ever find yourself wishing your GTK theme had a bit more depth to it?

          If so, check out the Skeuos GTK theme by Daniel Ruiz de Alegría. His sumptuous skin skewers modern expectations by embracing the bevels, drop-shadows, and gradients most modern themes actively avoid.

          The result is a confident look with real visible visual hierarchy to it. Buttons look like buttons, toggles look like toggles, and focused elements have clear presence — you won’t mistake a label for an action while using this theme.

          Although it is still fairly flat (as themes go), in this era of ever-flatter UIs I’m surprised at how refreshing the theme’s “ornamentation” feels. It’s like a mix of Adwaita and elementary themes, with a splash of Layan for colour.

        • Ubuntu Weekly Newsletter Issue 700

          Welcome to the Ubuntu Weekly Newsletter, Issue 700 for the week of September 5 – 11, 2021.

    • Devices/Embedded

      • Solar monitoring system builds on Linux-based LoRaWAN gateway

        Cloud Energy and Semtech announced a LoRaWAN equipped rooftop solar monitoring system based on a Linux-based Kerlink Wirnet gateway and Semtech’s LoRaWan modules.

        Vietnam based IoT integrator Cloud Energy has joined with Semtech Corp. in announcing a wireless monitoring system for rooftop solar facilities in Vietnam. The unnamed system combines Semtech LoRaWAN modules with software and integration from Cloud Energy, which is deploying a Linux-powered Wirnet LoRaWAN gateway from hardware partner Kerlink.

      • Firmware Modding Your Vintage Nokia Handset

        These days we’re spoiled for choice when it comes to smartphone software, especially games. Official repositories for the leading handsets feature hundreds of thousands of games, and sideloading adds infinite possibilities. If you were lucky enough to be sporting a Nokia handset in the late 1990s, you probably had all of three games to choose from (and only one that was actually fun). [Janus Cycle] explores the steps needed to firmware mod your vintage Nokia phone, and how to expand on that paltry games library.

        Enthusiasts have been modding their Nokia handsets since the 2000s, and the tools required now are the same as they were then. The Nokia 5110 and 6110 (as featured in the video below) use a proprietary cable and connector for communicating with PCs and other devices. Nokia’s official serial cable already opens up many possibilities for handset tinkering, including access to RAM and toggling Monitor Mode. This cable interfaces solely with the phone’s fast FBUS protocol, however firmware flashing takes place using the slower MBUS protocol over a single wire bi-directional pin.

      • GLaDOS Voice Assistant Passive-Aggressively Automates Home

        Using open source designs from fellow YouTube creator [Mr. Volt], [nerdaxic] 3d printed as much of the GLaDOS animatronic model as he was able to, and implemented much of the same hardware to make it work. [nerdaxic] put more Open Source Software to use and has created a functional but somewhat limited home AI that can manage his home automation, give the weather, and tell jokes among other things. GLaDOS doesn’t fail to deliver some great one liners inspired by the original Portal games while heeding [nerdaxic]’s commands, either.

      • UNO-420 PoE-powered data sensing gateway Certified on Ubuntu 20.04 LTS

        Advantech, a leading provider of intelligent IoT systems and automation technology, is pleased to announce that its UNO-420 data gateway is certified on Ubuntu 20.04 LTS and Ubuntu Core 20. UNO-420 is a PoE-powered data sensing gateway powered by an Intel Atom E3815 processor, characterized by its high compatibility with diverse data acquisition devices and Power-over-Ethernet (PoE) permitting local data processing and cloud connectivity. By certifying Advantech’s UNO-420 for Ubuntu 20.04, Canonical, the publisher of Ubuntu, guarantees 5-years of maintenance updates and 5-years of extended security maintenance(ESM) software update support that give enterprises a stable and secure IoT platform for device management and service reliability.

      • Open Hardware/Modding

        • Vektor Kollektor Inspector

          The build started with an HP7475A pen plotter from the 80s, one that was DOA (or was fried during initial testing). [Niklas] and [Kati] kept the mechanism but rebuilt the controls allowing for easy integration with an Arduino Nano and to be powered with a motorcycle battery.

    • Free, Libre, and Open Source Software

      • John Goerzen: Facebook’s Blocking Decisions Are Deliberate – Including Their Censorship of Mastodon

        In the aftermath of my report of Facebook censoring mentions of the open-source social network Mastodon, there was a lot of conversation about whether or not this was deliberate.

        That conversation seemed to focus on whether a human speficially added joinmastodon.org to some sort of blacklist. But that’s not even relevant.

        OF COURSE it was deliberate, because of how Facebook tunes its algorithm.

        Facebook’s algorithm is tuned for Facebook’s profit. That means it’s tuned to maximize the time people spend on the site — engagement. In other words, it is tuned to keep your attention on Facebook.

        Why do you think there is so much junk on Facebook? So much anti-vax, anti-science, conspiracy nonsense from the likes of Breitbart? It’s not because their algorithm is incapable of surfacing the good content; we already know it can because they temporarily pivoted it shortly after the last US election. They intentionally undid its efforts to make high-quality news sources more prominent — twice.

        Facebook has said that certain anti-vax disinformation posts violate its policies. It has an extremely cumbersome way to report them, but it can be done and I have. These reports are met with either silence or a response claiming the content didn’t violate their guidelines.

      • Web Browsers

        • Destination Linux 243: Vivaldi CEO Interview – Jon Stephenson von Tetzchner

          This week’s episode of Destination Linux, we have the CEO of Vivaldi joining us to discuss their partnership with Manjaro and their support for Linux. Then we’re going to talk about two great anonymous, privacy focused distros that both had a new release this week. Plus we’ve also got our famous tips, tricks and software picks. All of this and so much more this week on Destination Linux. So whether you’re brand new to Linux and open source or a guru of sudo. This is the podcast for you.

      • SaaS/Back End/Databases

      • FSF

  • Leftovers

    • Hardware

      • Cisco Router Repair Revives Piece Of Internet History | Hackaday

        These days, it would be fair to say that the Internet as we know it runs on Cisco hardware. While you might never see them at work, there’s an excellent chance that every web-bound packet leaving your computer or smartphone will spend at least a few milliseconds of its life traveling through hardware built by the San Jose, California based company. But of course, even a telecommunications giant like Cisco had to start somewhere.

        Cisco’s first commercial router, the Advanced Gateway Server (AGS), was released in 1986 and helped put the company (and the Internet) on the path towards unfathomable success. [Andreas Semmelmann] had wanted to add one of these microwave-sized machines to his collection for some time, so when an AGS+ popped up in the local classifieds he didn’t hesitate to make the hour drive to go pick it up. But like many pieces of vintage computing equipment, it needed a little help getting back on its feet.

      • How The PS5’s Genuinely Clever Adaptive Triggers Work | Hackaday

        The feedback for the trigger assembly is handled by a lever, a geared wheel, and a worm gear on an electric motor. Under normal circumstances, nothing interferes with the trigger at all and it works like a normal analog trigger. But when the motor moves the lever into place, trigger movement now has to overcome the added interference with a mechanical disadvantage. The amount of resistance felt can be increased a surprising amount by having the motor actively apply additional force to counter the trigger’s movement.

        That’s not all, either. The motor can also actively move the lever into (or out of) position, which means that pulling the trigger not only has the ability to feel smooth, mushy, or stiff in different places, but it can also actively push back. This feedback can be introduced (or removed) at any arbitrary point along the trigger’s range of motion. A trigger pull can therefore feel like it has a sharp breakpoint, a rough travel, a hard stop, an active recoil, or any combination of those at any time.

    • Integrity/Availability

      • Proprietary

        • Apple Releases Security Updates, iOS 14.8 and iPadOS 14.8

          Apple has released security updates to address vulnerabilities—CVE-2021-30860, CVE-2021-30858—in iOS and iPadOS. An attacker could exploit these vulnerabilities to take control of an affected device. CISA is aware of public reporting that these vulnerabilities may have been exploited in the wild.

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • Antmicro Doubles Down on Commitment to the Zephyr Project as Community Grows to More Than 1,000 Contributors [Ed: The so-called 'Linux' Foundation promotes operating systems that compete with Linux and are from proprietary software companies]

                On the heels of its 5th anniversary and inaugural Developer Summit, the Zephyr™ Project today announces a major milestone with more than 1,000 contributors and 55,000 commits. Zephyr, an open source project at the Linux Foundation that builds a safe, secure and flexible real-time operating system (RTOS) for resource-constrained devices, also welcomes Antmicro as a Platinum member and Wind River as a Silver member.

        • Security

          • Time is running out for CentOS 8

            It came as a shock when RedHat announced that CentOS 8 support would end this year. Organisations who thought they had eight years to plan for its replacement now have less than four months.

          • Hacker-made Linux Cobalt Strike beacon used in ongoing attacks

            An unofficial Cobalt Strike Beacon Linux version made by unknown threat actors from scratch has been spotted by security researchers while actively used in attacks targeting organizations worldwide.


            However, Cobalt Strike has always had a weakness — it only supports Windows devices and does not include Linux beacons.

          • Hackers port Cobalt Strike attack tool to Linux [Ed: Do malicious tools only become "news" when you can badmouth "Linux" somehow? And that says nothing about how such tools get there in the first place? Windows has back doors.]

            Security experts say the Cobalt Strike Beacon tool has been adapted by hackers to work against Linux machines.

            Designed for use by penetration testers and other security professionals, Beacon is the automated attack component of the $3,500 per-year Cobalt Strike security testing suite that enables attacks like keylogging and file theft. Because it is so effective at automatically compromising machines, the software has also become effective with cybercriminals looking to remotely break into a network.

    • Defence/Aggression

      • NSO Group iMessage Zero-Click Exploit Captured in the Wild

        In March 2021, we examined the phone of a Saudi activist who has chosen to remain anonymous, and determined that they had been hacked with NSO Group’s Pegasus spyware. During the course of the analysis we obtained an iTunes backup of the device.

    • Civil Rights/Policing

      • I fought the law and I won. (Traffic ticket.)

        I’ve been wanting to blog about this for some time now, but it’s never wise to draw attention to a pending case.

        (I’ve changed the names of the other two drivers.)

        A few months ago, I was traveling northbound on a street headed for home. I reached the 4-way red flasher at the intersection between that street and the street I lived on. The other driver was traveling southbound on and was at the flasher.

        I signaled my right-hand turn and proceeded to make the turn when the other driver, Mr. Beavis, sped up to try to get out ahead of me, and by the time I looked back and realized what was going on, the two cars hit each other at approximately a 45 degree angle, damaging the plastic bumper cover on the left side of my car, and a hubcap and part of the other driver’s right fender.

        Mr. Beavis got out of his car, and I exited my car, and he asked me whether we should “trade insurance” or “call the police”, and I said I would rather call the police, so I did, and it took them approximately half an hour to arrive on the scene. By this time, I and Mr. Beavis had agreed to move our cars out of the way into a nearby parking lot.

        While waiting on the police to arrive, it seemed to me that nobody was hurt, but Fire and Rescue showed up, and I was baffled, so I told them that I didn’t think anyone was hurt.

    • Monopolies

      • Patents

        • Buyers’ desires: what patent sellers need to know to seal deals [Ed: They say "four patent-buying companies" which is almost a euphemism for patent trolls (because some trolls and their litigation firms fund this conflict-of-interest propaganda mill]]

          Sources at four patent-buying companies explain why a portfolio’s licensing history matters and why sellers’ need for confidentiality can complicate deals

        • How to assess patent quality ? (2/2) [Ed: As if this Team UPC propaganda outlet, REGIMBEAU, ever cared about the quality of patents (instead it sought to reduce it; more litigation!)]

          ollowing our previous article presenting the different methods of rating patent quality, this publication outlines the new quality assessment method developed by Regimbeau. This new solution uses strategic information available in patent databases to assist the evaluator with legal, technological, economic, and geo-temporal criteria.

        • Integrated Biometrics plans integration of touchless fingerprint enhancements

          The patent applications were filed with both the U.S. Patent and Trademark Office and The European Patent Office, with one addressing the improvement of touchless fingerprints through minimizing error rates to below 2 percent to meet the FBI’s PIV requirements, ‘smart’ focussing, and enhanced image rendering to capture Level 3 features like pores and ridge shapes. The methods described by this patent result in touchless fingerprints with a strong resemblance to contact prints, according to the announcement. A second patent filing describes the concept of “archived identity,” with the fingerprint serving as a transaction record.

        • Integrated Biometrics Announces Advancements in Contactless Fingerprint Intellectual Property [Ed: This title contains a lie; it should say patents -- very dubious at that for that matter -- not this fiction they call "Intellectual Property"]

          Integrated Biometrics (IB), the world leader in mobile FBI-certified biometric fingerprint scanners, today announced its strategic partner, Sciometrics LLC, has applied to the U.S. Patent and Trademark Office and The European Patent Office for new Intellectual Property (IP) that will improve the quality of touchless fingerprinting through mobile devices and expand application of the technology.

        • The Importance of Recognising Multiple Priorities in a Single Claim
        • HTC v. Ericsson – Ladies and Gentlemen, The Fifth Circuit Doesn’t Know What FRAND Means Either [Ed: FRAND is just a misnomer and a FRAUD; we should stop calling it what the patent racketeers have themselves named it]

          In August 31, 2021, the Court of Appeals for the Fifth Circuit ruled in HTC Corp. v. Telefonaktiebolaget LM Ericsson, 2021 U.S. App. LEXIS 26250, __ F.4th __ (Fed. Cir. 2021), affirming the judgment of the District Court for the Eastern District of Texas, 2019 U.S. Dist. LEXIS 170087 (E.D. Tex. 2019). The decision is significant as it is the first by the Fifth Circuit to address the licensing of standards-essential patents and the meaning of “fair, reasonable and nondiscriminatory” (FRAND) licensing terms, adding to the growing body of jurisprudence already issued by the Third, Ninth and Federal Circuits in this area. It is also significant because the court addresses several issues that have become increasingly important in standards-related litigation including (1) the apportionment of value among components of a multi-component product, (2) the proper choice of law for FRAND disputes, and (3) the interpretation of the “nondiscrimination” prong of the FRAND commitment. These issues all arose in connection with HTC’s challenge to District Judge Rodney Gilstrap’s jury instructions regarding FRAND. His vague charge appears to reflect the general uncertainty in this area, not only of the Texas district court, but of the entire judicial system. One can almost hear the weariness permeating the final sentence of Judge Gilstrap’s charge to an admittedly perplexed jury: “Ladies and gentlemen, there is no fixed or required methodology for setting or calculating the terms of a FRAND license rate.”

      • Trademarks

        • As Dior Abandons Saddle Bag Trademark Application in U.S., a Look at the Role of Residual Goodwill [Ed: Wanting monopoly and then having second thoughts (because the law might get in the way) is not "goodwill"]

          Dior has brought an end to its quest to nab a U.S. trademark registration for the design of its Saddle Bag … at least for now. On the heels of receiving an Office Action in March in which the U.S. Patent and Trademark Office (“USPTO”) preliminarily refused to register “the three-dimensional product design of a bag with a curved and sloping base, and a single flap with curved contours covering the opening of the bag” as a trademark, counsel for Dior sought to abandon the application on September 9, and the USPTO signed off on the abandonment a day later, thereby, removing the application from the registration process.

          After reintroducing the bag – which was first created by former Dior creative director John Galliano just over 20 years ago – as part of now-creative chief Maria Grazia Chuiri’s Autumn/Winter 2018 collection, Dior filed an application for registration for the design in March 2020, essentially asserting that the shape of the bag, itself, serves as an indication of source in the minds of consumers in largely the same way as the Dior name, for example, or its “CD” logo.

      • Copyrights

        • EU General Court dismisses Sony’s ‘Gran Turismo’ appeal – The IPKat [Ed: EUIPO is a pipeline of corruption though, as noted in a recent series about it]

          As a computer and video game enthusiast, I could not help but notice that the EU General Court in a recent decision (T-463/20) dismissed Sony’s appeal against an earlier decision of the EUIPO Fourth Board of Appeal, which had upheld the decision of the Opposition Division rejecting Sony’s opposition against an application to register “GT RACING” as an EU trade mark (EUTM).

          The circumstances were such that the General Court considered that, despite the same sequence of word elements “G” and “T” in Sony’s figurative EUTM, their depiction was so stylised that it was unlikely that they would be recognised by the relevant public.

          The decision raises the following question among trade mark holders and practitioners: can trade marks be “too figurative” for their own good?


          The Board considered that the relevant territory was the European Union and comprised the general public with at most an average level of attention. It also considered that the goods were different. As regards the Applicant’s EUTM, the Board found that, since that mark was devoid of any meaning with regard to the goods at issue, it had a normal degree of distinctiveness. The Board, moreover, held that the signs were visually different, and that a phonetic and conceptual comparison was not possible. Since there was no similarity between the signs, the Board concluded that it was not necessary to assess the documents produced by the Applicant in support of its claims relating to the enhanced distinctiveness or the reputation of that mark.

This Coming Saturday Richard Stallman Will Give His First Public Talk Since May

Posted in Free/Libre Software, FSF, GPL at 5:18 pm by Dr. Roy Schestowitz

Richard Stallman on Ukraine event

OSDN - Richard Stallman

Richard Stallman talk slot

Summary: Cordial headsup to Free/libre software aficionados; “Richard Stallman will be giving a talk in Kyiv, Ukraine, on Saturday, September, 18, titled Free Software and the GNU General Public License,” his Web site says. It’s noted here.

Links 13/9/2021: GDB 11.1, Only 2 New Debian Developers in 2 Months

Posted in News Roundup at 5:05 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Operator Day returns for KubeCon NA 2021

        Operators simplify everyday application management on Kubernetes. Learn how to use them, how to create them in Python, and how to evolve from configuration management to application management. We’re working to create a community-driven collection of operators for everything that’s integrated and tested everywhere.

        As the community gets together to share knowledge and push forward ideas and tech around K8s, we’ve been taking the past few KubeCon events as an opportunity to host workshops, community brainstorms, and industry leader presentations through a live, interactive virtual event – Operator Day. Operator Day KubeCon NA 2021 will be the third of its kind, with its predecessors gathering thousands of attendees and multiple Canonical speakers and guests.

    • Kernel Space

      • Still-Pending AMD PSF Control Patch To Be Retailored For KVM

        Of all the great stuff for AMD in Linux 5.15, one of the patches still not having yet been mainlined is the control support around Predictive Store Forwarding (PSF) with Zen 3 processors. It’s been six months since AMD published their security whitepaper around PSF while the Linux patch has yet to be mainlined while now it seems will be updated for a reduced focus on KVM usage.

        It’s been about six months already since AMD published their security analysis of Zen 3′s PSF feature that could potentially lead to a side channel attack. Predictive Store Forwarding with the latest-generation Ryzen and EPYC processors allows for speculatively executing instructions based on what it thinks the result of the load will be and while the predictions should be largely accurate, there is the small possibility of incorrect CPU speculation. PSF speculation going awry would be similar to Spectre V4 / SSB.

      • Linux at 30: 5 Ways Linux has Changed Software Engineering Culture | IT Pro

        From programmer teams to app stores, Linux has had a huge impact on the software engineering model.

      • Linux 5.15 Delivers Many Features With New NTFS Driver, In-Kernel SMB3 Server, New Hardware – Phoronix

        Feature development is over on the Linux 5.15 kernel with Linux 5.15-rc1 being issued. It’s now on to testing and bug fixing over the next two months before the kernel is christened as stable. Here is our original Linux 5.15 feature overview about all of the big changes in this next kernel version.

      • Linux Developers Talk Again About An Accelerator Subsystem – Or Moving Them Into The GPU/DRM Area – Phoronix

        On and off for years has been talk of an accelerator subsystem for the Linux kernel considering that for now most AI training/inference accelerator drivers end up lodged within the “char/misc” area of the kernel. That accelerator subsystem discussion has been restarted with talks of having such a subsystem or moving those drivers within the GPU/DRM subsystem space.

        Stemming from the recent controversy around Habana Labs AI driver code changes (though now at least partially addressed with publishing an open-source compiler and user-space library) and how some changes have been skirted by going through “char/misc” and facing less scrutiny than if the same changes were tried to push through the GPU/DRM tree, the discussion is once again happening about where these accelerator drivers should live within the kernel.

      • Graphics Stack

        • Zink Is Over: This Time I’m Serious.


          I know what you’re gonna say, and maybe I did just say zink was done a week or two ago.

          I’m not saying I didn’t.

          But that was practically last year at the speed with which zink’s codebase moves and its developer community sits in my office eating cookies between Mesa builds, and it was also before I set off on my journey to make the rest of those zany Phoronix benchmark games run instead of crashing or whatever.

    • Applications

      • JamesDSP For Linux Is An Audio Effect Processor For PipeWire Or PulseAudio (Equalizer, Bass Boost, More)

        JamesDSP for Linux is an open source Qt audio effect processor for PipeWire and PulseAudio. Use it to enhance the music you listen to by adding reverberation, bass boost and other filters using a parametric or fixed band equalizer. It also allows you to write your own audio effects using the EEL2 scripting language.

        The application is designed for use with PipeWire, which the developer recommends for its lower latency when injecting audio effects, but PulseAudio is also supported (for backwards compatibility).

        It was initially released as an audio effects processor for Android, and it then ported to Linux.

      • xrdesktop for turning your desktop into a VR space had a productive Summer

        Collabora has given an update on the working going into xrdesktop, the free and open source project that turns your desktop into a VR space and allows you to layer windows on top of others.

        It’s an incredibly promising project and work on it has continued recently, They even had people getting involved through the Google Summer of Code (GSoC) which produced some fun results.

    • Instructionals/Technical

      • GlusterFS multiple nodes In Centos/Almalinux – Unixcop

        GlusterFS is a scalable filesystem through a network suitable for data-intensive. Tasks such as cloud storage and media streaming. GlusterFS is open-source software and can utilize standard off-the-shelf hardware. All Glusterfs document link. Check iscsi tutorial on centos8. It is cost-efficient and can be deployed on bare metal, virtual, container, and cloud environments.

        Enterprises can be scalable, performance, and available on-demand, with no vendor lock-in, across on-premise, public cloud, and hybrid environments. Gluster is used in production at thousands of organizations spanning media, healthcare, government, education, web 2.0, and financial services.

        This tutorial is intended to provide a step-by-step guide to setting up GlusterFS for the first time with the minimum degree of complexity. For this guide, it is required to use virtual machine instances.

      • Understand Cyber Security and Cryptography

        This is the third and last article in the series Understand Cyber Security and Cryptography. The hash function is used to protect data integrity. Hashing is the process of converting an input of any length into a fixed size of string or text. A message to be based on is called input. The Algorithm used to do so is called has to function. Output is called has value or digest.

        Well, how the hash is different from Encryption. Using a key or pair of keys can encrypt or decrypt messages is called encryption. But, the hash is one way you can not generate an original message back from the hash. There must be some quality in the hash function.

      • Audit user accounts for never-expiring passwords with a Bash script

        For decades, periodic password changes have been a staple of system security. The idea is that if someone gets your password, they can gain access for a limited period of time. It’s usually easiest to have the system prompt them rather than relying on users to remember to change their passwords. However, regular user accounts may be set with passwords that never expire and therefore never prompt users to change them.

        The Bash script in this article lists all those regular user accounts on your system whose password is set to never expire. By regular users, I mean accounts that usually have interactive shell access and a /home directory.

      • How to Convert Ubuntu Into Regolith Linux – Make Tech Easier

        Regolith Linux isn’t your typical Linux distribution. It falls somewhere in between being a distribution and a desktop environment, as it is built on top of Ubuntu. And unlike most typical Linux distributions, Regolith doesn’t have to be installed as a standalone operating system. If you are already using Ubuntu as your operating system, then you can install Regolith on top of it for a preconfigured i3 experience.

      • How To Install PHP on Debian 11 – TecAdmin

        PHP abbreviated as “HyperText Processor”, is the open-source programming language used for Web application development. It is a scripting language, mostly used for the front end with HTML. It can be used to create e-commerce websites, manage databases, and do session monitoring.

        It is available for all OS. The latest version of PHP is version 8 and in this article, we will discuss the installation of PHP on the Debian 11 Bullseye Linux system.

      • How To Install ReactJS on Debian 11 – idroot

        In this tutorial, we will show you how to install ReactJS on Debian 11. For those of you who didn’t know, React is an open-source JavaScript library and used to develop front-end web applications. It allows you to make reusable components for a single-page user interface. It is developed and maintained by Facebook and a large community of developers. ReactJS can be used in the development of Web Applications or Mobile Apps.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the ReactJS on a Debian 11 (Bullseye).

      • How to Install Redis Server on Rocky Linux

        Redis is a popular and open-source in-memory key-value data store. It supports various data structures such as Hash, Lists, Sets, Strings, and much more. Redis is designed to be running in the trusted environment only, it can be used as a database, cache, and message broker. Redis is extensively known for its broad support, high performance, high availability, and flexibility.

        You can install Redis as a standalone for small deployment. For large deployment, they provide additional components such as Redis Sentinel for high availability and Redis Cluster for partitioning data across multiple Redis node servers.

        In this guide, you will learn how to install Redis on Rocky Linux. For an easy installation, you will be installing Redis from the AppStream repository, but if you want to get the latest version of Redis (which means more features), you can install Redis from source by compiling it to your system.

      • How to List Unsuccessful SSH Logins on Linux

        “There is no white or black, there are only shades of gray. We can not say if it’s good or bad.”

        And sometimes we need to dig into the shades of gray and look for problems before they occur. One of these checks could be a search for failed SSH login attempts. Fortunately, Ubuntu comes with one solution that is simple enough but powerful enough to detect most cases where someone lets weak passwords and brute force attacks happen.

        Each attempt to login to SSH server are recorded in a file named auth.log located at /var/log/auth.log by the rsyslog daemon.

        Administrators can look through the logs to see if there are strange incoming traffic. A log file contains a lot of information in plain text but it is not easy reading all the output. We need to learn how to use grep to search through the log file and in this example we will focus on failed attempts.

      • How to Install Django Framework on Debian 11

        Django is a free and open-source web development framework written in Python. It is used for developing complex and database-driven Python applications. It comes with a set of Python scripts for creating Python projects. It can be run on any operating system that can run Python including, Windows, macOS, Linux/Unix, and Solaris. It helps developers to write less code and create a new website in a short amount of time.

        In this tutorial, I will explain how to set up Django in Python virtual environment using the PostgreSQL database on Debian 11. We will then install and configure Nginx as a reverse proxy for Django.

      • A podman tutorial for beginners – part I

        This guide explains how to build and deploy applications quickly with Podman to the cloud server of your choice. All examples in this tutorial are tested on Fedora Linux 34, but they should work on any Linux distros as long as you install the correct packages. I prefer to use Fedora when my clients use RHEL 7/8. Experimental podman packages are also available for Windows and macOS, but I have not tested those. Running containers without Docker is possible with Podman. This page is the first part of building containers with Podman, which explains installing Podman and working with images, including basic concepts of containers.

      • How to Install Webmin on CentOS 8 and Rocky Linux 8 – VITUX

        Webmin is an open-source web-based interface that simplifies the administration of Unix systems. Usually, to perform any kind of task in Linux like setting up accounts, setting up web servers, installing software, you have to manually run the commands and edit configuration files. Webmin lets you do all such tasks using a web-based interface. Using Webmin web interface, you can manage user accounts, firewalls, backups, manage software packages, create and configure virtual sites for Apache, monitor system resources graphically, configure network-related settings, and much more. It let you manage your system regardless of where you are and which browser you are using.

        In this post, we will cover how to install Webmin on CentOS, configure firewall, access the Webmin web interface and how to uninstall Webmin if you ever need to do so.

      • Bash Scripting – Variables Explained With Examples – OSTechNix

        Variables are very important concepts in any programming language you work with. Think of a variable as a container in memory that stores data of a certain type. The main purpose of variables is to store a value and access it later for processing. If you are someone from other programming languages like Java, C, C++, you may find differences in how the variable definition differs since Bash does not have a strong type system.

      • How to Install phpBB on Debian 11 with LEMP – LinuxCapable

        phpBB is one of the most extended open-source forum bulletin software on the market. With the rise of social media platforms such as Reddit, Facebook, Twitter, and online chat platforms such as discord, we have seen online bulletin forum communities dwindle. Personally, as I just mentioned, they are slowly making a comeback in specific niche communities over the newer additions.

        phpBB isn’t the only option. Others such as VBulletin, Nodebb, Xenforo, and so on, but most of these are paid with mixed reviews. VBulletin used to be a powerhouse, but now it’s a shadow of its former self. Xenforo is one of the best-paid bulletin pieces of software. However, that is just my personal opinion, but I will always choose phpBB first as it’s free, open-source, and has some great 3rd party open-source developers, both new devs and ones that have been around since the start.

        In the following tutorial, you will learn how to install LEMP with the most up-to-date packages in their respective fields, along with setting up phpBB for first-time use on Debian 11 Bullseye.

      • Efficient service isolation on Alpine with VRFs – Ariadne’s Space

        Over the weekend, a reader of my blog contacted me basically asking about firewalls. Firewalls themselves are boring in my opinion, so let’s talk about something Alpine can do that, as far as I know, no other distribution can easily do out of the box yet: service isolation using the base networking stack itself instead of netfilter.

      • What Linux Version Am I Running? Here’s How to Find Out

        If you are new Linux user and want to know how to find what Linux version you are running, here’s how to do it by using the command line.

        There are various reasons why you might want to find which Linux distribution you are using or the OS version of your Linux system.

        When most people talk of Linux, they are usually referring to a Linux distribution, but this is not the case. Above all, the question “What Linux version am I running?” can mean two different things.

      • Linux 101: What are zombie processes?

        When you think of zombies, your mind probably travels a rather Romero-ian path. Shambling ghouls who want nothing more than to crack open your skull and dine on your thought-meat.

        But within the realm of Linux, zombies are a different creature altogether. Sort of.

        On the Linux platform, a zombie is a remaining bit of a dead process that wasn’t or hasn’t been properly cleaned up. A zombie is created by programs that crash or weren’t adequately coded to handle the cleanup of a crash or exit.

        Technically speaking, when a process dies, the process descriptor remains in memory and becomes labeled EXIT_ZOMBIE. At this point, the parent process is notified that the child process has died with the SIGCHLD signal and the parent is supposed to execute the wait system call, which allows the parent to collect information from the now-dead process. This generally happens almost immediately. But not always.

    • Games

      • Steam has turned 18 years old and PC gaming has never been the same since

        It’s truly hard to imagine just how much Valve managed to change what PC gaming is thanks to Steam. On September 12 2021, the Steam client celebrated 18 years. Steam is now old enough to buy alcohol in the UK.

        Do you remember what Steam originally looked like? I sure do. It was a much simpler time, with none of the fancy tricks Steam does now. There was no Steam Play, no Linux client, no macOS client, no reviews system and just — not much of anything. A few games, a couple of buttons and that was mostly it. This was long before the likes of GOG, Humble, Epic, itch.io, Origin and so on.

      • Surviving Mars gets a needed hotfix clearing up Below and Beyond | GamingOnLinux

        Below and Beyond released recently as the new expansion for Surviving Mars now that Paradox Interactive has decided to pick up development again but it has been problematic.

        Not just the DLC release but the game as a whole since the update and DLC being quite unstable. Currently sat with a Very Negative rating on Steam, Paradox and newer developer Abstraction have their work cut out for them to get it back into the positive.

      • ArmA 3, Steam & unsubscribe from deleted Workshop items
      • Linux Gaming: Veloren 0.11 Massively Multiplayer RPG Release

        The release of the computer role-playing game Veloren 0.11 , written in the Rust language and using voxel graphics, has been published. The project is being inspired by games such as Cube World, Legend of Zelda: Breath of the Wild, Dwarf Fortress and Minecraft. Binary assemblies are built for Linux, macOS and Windows. The code is released under the GPLv3 license.

      • Ahead of Hearth & Home for Valheim, the developer has a longer fireside chat | GamingOnLinux

        Want to listen to the team from Iron Gate talk about Valheim and the upcoming Hearth & Home update that’s due out on September 16? Sit a while and drink some mead.

        It’s just over 30 minutes long, so perhaps a good bit of background noise for you or perhaps to learn something new about the game and what’s to come. They’ve definitely gotten a huge amount better at interacting with the community since the original Early Access release. Who can blame them for being a caught a little off guard though? Not many go on to sell over 6 million copies in little over a month.

      • The Tuxedo Stellaris 15 – Linux Gaming Notebook Review – Invidious

        The Stellaris 15 by Tuxedo Computers is a gaming notebook with some serious power. With a choice between Intel/AMD CPUs, a powerful NVidia GPU, this notebook aims to help you get your work done and also enable you to play some games

      • Total War: WARHAMMER III delayed for all platforms until 2022 | GamingOnLinux

        Creative Assembly announced today that Total War: WARHAMMER III has been moved from late 2021 until sometime in early 2022. We know that it’s coming to Linux officially too, which Feral Interactive recently confirmed (again).

        Posted on Twitter and Steam with one of those annoying text over image delay posts (at least it wasn’t bright yellow like we saw with Cyberpunk), it said:

        “With nearly a decade of development on the Total War: WARHAMMER trilogy behind us, it feels surreal to see its culminating chapter so close to release. While it’s tempting to rush to the finish line as it comes into view, we have made the decision to give it a little more time by moving the launch of Total War: WARHAMMER III from 2021 to early 2022.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • [FALSE] GNOME 41 Has Arrived

          The latest version of the GNOME desktop environment has been released with new functionality and plenty of improvements.

          GNOME has been evolving at a breakneck pace. And no recent release proved that more than 40, where the entire workflow was reconfigured and reworked. For those that have experienced the shift that was brought about by that major release, every update since has been nothing more than minor tweaks.

          And although GNOME 41 isn’t bringing into the picture a similar overhaul, it still adds some important improvements to the desktop.

    • Distributions

      • Screenshots/Screencasts

      • IBM/Red Hat/Fedora

        • Stuart D Gathman: How do you Fedora?

          For 35 years, Stuart worked as a System programmer for a small company where his projects included database servers, device drivers, protocol stacks, expert systems, accounting systems, aged AR/AP reports, and EDI. Currently, he is doing hourly consulting work for small businesses.

          Stuart’s childhood heroes were his Dad and George Müller. His favorite movies are “The Gods must be crazy” and “The mission”. He grew up in a pacifist denomination, so feels “The mission” movie is very relevant to him. He loves over roasted vegetables.

          Composing and performing music, Mesh networking, and refurbishing discarded computers to run Fedora Linux are some of his spare time interests as well as history, especially ancient Western and 19th century English/American.

          “Love/charity, Hope, Faith, Virtue, and knowledge” are the five qualities someone should possess, according to Stuart.

        • Fedora Community Blog: Contribute at Fedora Linux 35 GNOME 41 Test Day

          Wednesday, 2021-09-09 is the Fedora 35 Gnome Test Day! As part of changes Gnome 41 in Fedora Linux 35, we need your help to test if everything runs smoothly!

        • Sending alerts to Discord and others from syslog-ng using Apprise: blocks and Python templates

          Last year, the CentOS project announced a major shift in strategy. Until recently, CentOS Linux has been a rebuild of Red Hat Enterprise Linux (RHEL) sources, each RHEL release was quickly followed by a corresponding CentOS Linux release. While CentOS 7 keeps working this way, CentOS 8 will reach its end of life by the end of this year. The CentOS project is focusing on CentOS Stream. It is a continuous stream of bug fixes and new features. Some of the users were not happy about the change, that is how Rocky Linux and AlmaLinux were born.

          As about 80% of syslog-ng Open Source Edition (OSE) installations run on CentOS and RHEL (if we do not count Kindle devices…), support for CentOS Stream and CentOS Linux alternatives is a returning question. From this blog, you can learn about CentOS Stream and CentOS Linux alternatives and how the situation is affecting syslog-ng OSE users.

        • The state of CentOS Stream: Innovation in action

          In December 2020, Red Hat announced that we would be focusing our CentOS Project engineering efforts and investments solely on CentOS Stream, an upstream open source development platform where users can develop, test and contribute to a continuously delivered distribution that tracks just ahead of Red Hat Enterprise Linux. Since this announcement, we’ve seen significant activity both within and around the CentOS Stream community, including the launch of several derivative operating systems and the introduction of Red Hat Enterprise Linux programs to ease the migration process for users of CentOS Linux.

        • Red Hat Innovation Awards – Advice on writing a great submission

          The nomination period for the 2022 Red Hat Innovation Awards has been extended to September 20, 2021 – which means there is still time for you to nominate your organization for innovative uses of Red Hat’s open source technology.

        • Learn about containers and Kubernetes with Red Hat Academy

          As the next generation of IT professionals prepares to enter the workforce, Red Hat is taking strides to meet them where they are. A major component of this effort is Red Hat Academy, which offers free training on the Red Hat product portfolio to tens of thousands of students per year at high schools and higher education institutions around the globe.

          Among other courses, the curriculum includes offerings on Red Hat OpenShift including Introduction to OpenShift Applications (DO101) and Red Hat OpenShift I: Containers & Kubernetes (DO180). These courses introduce students to building and managing containers for deployment on a Kubernetes cluster.

          Introduction to OpenShift Applications is a developer-focused introduction to OpenShift application building. The course walks you through production scenarios such as scaling and troubleshooting your applications. This course can also help future administrators who might be working with code as infrastructure or with automation take the next step into development.

          Students who are interested in learning more about the underlying OpenShift infrastructure and have strong Red Hat Certified System Administrator (RHCSA)-level skills should start with Red Hat OpenShift I: Containers & Kubernetes (DO180).

        • Let’s talk about industry scoring systems

          When it comes to electronics, sustainability rating systems measure a company’s or product’s performance against established benchmarks in categories such as environmental impact, production, ethics, working conditions, use and disposal of devices and procurement. They usually examine specific topics like repairability, sustainability, environmental footprint or social impact programs. In fact, we are sometimes consulted by such rating organisations to help shape what is assessed.

          These rating systems are useful for both businesses and consumers. The focus areas defined by such systems are relevant points of guidance for any company trying to move in a more sustainable direction, and ratings help consumers make informed decisions.

        • Surprise! It’s IBM i Technology Refresh Time [Ed: 'News' sites about IBM, sponsored by IBM]

          IBM surprised the midrange world last week by announcing Technology Refreshes (TRs) for IBM i 7.3 and 7.4, which became generally available on Friday. The fall TRs, which typically are announced in October, brought support for the new Power10-based Power E1080 server in addition to a slew of enhancements to the operating system and surrounding IBM i products.

          The big piece of news with the new TRs – IBM i TR 7.3 TR11 and 7.4 TR5 – is support for servers based on IBM’s speedy new Power10 processor, which is the first Power chip based on its 7 nanometer process. Companies that want to use one of the new Power10 servers – starting with the high-end Power E1080, which is slated to ship later this month – will have to run 7.3 TR11 or 7.4 TR5. Midrange and entry-level Power10 models, which are expected to be announced later this year and into 2021, will also need one of these two operating systems.

          But IBM packed a lot more goodies into these TRs (its fourth TR refresh during the COVID pandemic) that will interest the bulk of IBM i shops (that is, the 99.9 percent of us who aren’t immediately adopting the big new enterprise-class machine). We’ll give you a general overview of these goodies in this story, to be followed with more detailed stories on specific items.

      • Debian Family

        • New Debian Developers and Maintainers (July and August 2021)

          The following contributors got their Debian Developer accounts in the last two months:

          Aloïs Micard (creekorful)
          Sophie Brun (sophieb)

          The following contributors were added as Debian Maintainers in the last two months:

          Douglas Andrew Torrance
          Marcel Fourné
          Marcos Talau
          Sebastian Geiger


      • Canonical/Ubuntu Family

        • You Can Still Get Ubuntu 16.04 Security Updates, Here’s How

          I didn’t, not until today when a reader mailed in to tell me that Canonical offers free Ubuntu Advantage for Infrastructure accounts for personal use on up-to 3 machines (active Ubuntu members can use it on up to 50 machines).

          A gratis Ubuntu Advantage for Infrastructure account includes a couple of things but the most notable is …Extended Security Maintenance (ESM) for EOL releases.

        • Ubuntu 18.04.6 LTS Special Being Prepared To Deal With Unbootable Media

          While Ubuntu 18.04.5 LTS shipped one year ago as the last planned point release to the “Bionic Beaver”, an emergency issue is leading to Ubuntu 18.04.6 now being prepared.

          Ubuntu 18.04.6 LTS is coming as an unscheduled point release. While Ubuntu 20.04 is out as the latest and greatest long-term support release, Ubuntu 18.04.6 is coming since the existing 18.04 installation media has broke. Due to key revocations, existing Ubuntu 18.04 installation media is having issues and thus Canonical has decided to spin Ubuntu 18.04.6 LTS to offer up bootable media for anyone still making use of this LTS-1 platform.

        • Ubuntu Touch OTA-19 Is Slated for Release on September 17th, Now Ready for Testing

          Still based on the Ubuntu 16.04 (Xenial Xerus) operating system series, Ubuntu Touch OTA-19 is slated for release this Friday on September 17th, 2021, packed with some minor improvements to the App framework, compatibility with QtWebEngine apps, as well as keyboard improvements in the messaging app.

          For Halium 5.1 and 7.1 devices, the Ubuntu Touch OTA-19 update promises access to gyroscope and magnetic field sensors, along with an initial and very basic implementation of a compass.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Revolt: An Open-Source Alternative to Discord

        Discord is a feature-rich collaboration platform primarily tailored for gamers. Even though you can use Discord on Linux with no issues, it is still a proprietary solution.

        You can choose to use Element as an open-source solution collaboration platform, but it is not a replacement.

        But, Revolt is an impressive Discord alternative that is open-source.

        Let me highlight what you can expect with Revolt and if it can be a replacement for Discord on Linux.

      • Revolt project develops an open source alternative to the Discord platform
      • Standing on the shoulders of programmers: the power of free and open-source software

        Free and open-source software is growing to be a powerful tool in academic research, helping scientists to collaborate better and work smarter. Achintya Rao investigates how such software is being used in physics research, and its role in the wider open-science movement


        Free and open-source software (FOSS) allows users to inspect the code, modify it and redistribute it with few or no restrictions. The “free” in FOSS thus refers to these freedoms, not to monetary cost. This makes FOSS particularly powerful in research, enabling collaboration between scientists working on code that they have modified, and today it is seen as an integral part of the wider open-science movement.

      • Dolibarr: An Open-Source ERP and CRM Solution For Business

        Dolibarr is an open-source ERP and CRM system written with PHP, you can use it as an ERP, CRM or as inventory management system comes to make the management of inventory and warehouse easy.

      • 18 Open-source Free SEO tools to improve your site performance

        Search Engine Optimization (SEO) is essential for getting your website know, and ranked in search engines like Google, Bing, Yahoo and Yandex.

        Webmasters and website admins should keep their websites in shape in-order to have their website pages indexed and parsed successfully by search engine bots.

        SEO practice required a lot of time and does not get the results instantly as many may expect. It needs a constant website monitoring, scanning, fixing, and improvements.

      • Open-Source Tool of the Month: Uptycs Addresses Modern Cloud-Nati.

        To better understand the modern cloud-native attack surface and what is required to close security and observability gaps across cloud-native infrastructure, LinuxSecurity researchers had the privilege of speaking with Ryan Mack, Director of Engineering at Uptycs, a leading open source cloud-native security analytics provider, to discuss the challenges organizations face and how to enhance and simplify cloud-native security and observability for the enterprise.

      • Enterprise Open Source Summit: A Business Perspective on Open Source

        Open source solutions are becoming increasingly popular in all areas of business as an important part of a digital strategy to build an open and secure info-communication environment in today’s organizations.

        However, the successful use of open source solutions in organizations is subject to certain conditions. Solutions must meet the requirements for use in large organizations, integrate with existing info-communication infrastructure and provide continuity of business processes in organizations.

        We are pleased to invite everyone to participate in the Enterprise Open Source Summit, a virtual event focused on transition strategies and the subsequent successful use of Open Source solutions in the corporate environment.

        The summit will be held on November 10th, under the aegis of Canonical, creator of the most popular among developers of Open Source operating system Ubuntu and environments OpenStack and Kubernetes. The event will feature presentations by industry leaders in Open Source solutions – Canonical, Nextcloud, Collabora, Linbit, OpenNebula and Factor Group.

      • SaaS/Back End/Databases

        • Trademark Actions Against the PostgreSQL Community

          The PostgreSQL trademark policy is modeled after policies implemented by other major open source projects and is designed to be flexible and in the spirit of open source software. This policy is in place to ensure that the PostgreSQL trademarks are not used in ways that may confuse people and to help protect and grow the community brand. Uses of the trademark that are outside of fair use are permitted only through a trademark license issued by PGCAC.

          There are additional registered trademarks that use the “PostgreSQL” wordmark but are not used to assume the PostgreSQL brand identity or used to make representations of being the PostgreSQL community. Some of these trademarks were registered prior to the updated PostgreSQL trademark policy; PGCAC has and continues to work with these organizations to ensure trademark compliance.

          The PostgreSQL Core Team set up the trademark holdings and policies similar to other aspects of the PostgreSQL project. Through decentralization and fair checks and balances, the trademarks are protected from scenarios such as lack of support or a takeover from a hostile entity. Additionally, it is essential that the trademarks are properly used and defended, otherwise there is a risk that they may be deemed invalid or abandoned by the issuing trademark offices.

        • PostgreSQL Weekly News – September 12, 2021

          pg_dumpbinary 2.5, a program used to dump a PostgreSQL database in binary format, released.

          pgBadger v11.6, a PostgreSQL log analyzer and graph tool written in Perl, released.

          [pgagroal 1.3.0, a high-performance protocol-native connection pool for PostgreSQL, released

      • Productivity Software/LibreOffice/Calligra

        • Document searching and indexing export – Part 3

          In the part 1 we looked into indexing XML export, and in the part 2 into rendering a search result as an image. In this part we will glue together both parts with an indexing search engine (Solr) into a full solution for searching and introduce a “proof of concept” application for searching of documents.


          Solr has a extensive API for querying/searching, but for our needs we just need a small subset of those. Searching is done by sending a HTTP GET to Solr server. For example with the following URL in browser:


          “documents” in the URL is the name of the collection (where we put our index data), “q” parameter is the query string, “content” is the field we want to search in (we put the paragraphs text in “content” field) and “Lorem*” is the expression we want to search for.

      • CMS

        • The 11 Best WordPress Plug-Ins for Supercharging Your Website

          WordPress is so much more than a blogging tool. This flexible, easy-to-set-up web publishing platform has served as the foundation for more than 64 million websites since its launch more than a decade ago. Its popularity has spawned an incredibly rich plug-in ecosystem that helps webmasters improve their sites in many ways. From search engine optimization (SEO), to article enhancement, to comments management, you’ll find an amazing number of ways to trick out your WordPress installation’s base functionality, whether you’re hosting your own website or using a managed WordPress hosting service.

        • Acquia buys Widen

          Acquia, the Boston software firm that powers online content for businesses, announced on Wednesday that it has acquired Widen, a company that helps brands manage marketing online. Dries Buytaert, co-founder and chief technology officer of Acquia, said his company has “long been an established leader in managing textual website content.” Now, Acquia is looking to expand into video and audio content, as well as product information management. Acquia was founded in 2007 as a way to commercialize Drupal, an open source content management system also founded by Buytaert. As a “software-as-a-service” company, Acquia makes Drupal — a free product — enticing to paying customers by offering additional products and support services. Businesses use Acquia to build and operate websites, apps, and other digital products. Mike Sullivan, president and CEO of Acquia, wrote in a blog post that the deal is Acquia’s “fourth and largest acquisition in the past two years,” but he did not disclose a purchase price. Sullivan said the company will “immediately invest in accelerated development” of Widen’s technology, which will soon allow Acquia to add videos, charts, PDFs, memes, and social images to content. Wilden is also a leader in product information management, allowing businesses to track metrics such as the size or color of a product, or enhance marketing with digital features such as demonstration videos. Sullivan said about 700 organizations use Widen, including New Balance, Crayola, and sports retailer Fanatics. The two companies already have “numerous joint customers,” according to Buytaert. Acquia raised roughly $200 million before it was bought in 2019 for $1 billion by investment firm Vista Equity Partners, according to Pitchbook. The company has hired 500 people so far this year and has plans to “continue this rapid pace,” Sullivan said. — ANISSA GARDIZY

      • FSFE

        • Demand for transparent CovPass apps in EU +++ Dutch gain Router Freedom

          In our August-September Newsletter, we celebrate the right of using a custom router in the Netherlands. We explain why every app that tackles the spread of Covid-19 has to be Free Software. We share the news of our vibrant community, following up what happened in the summertime and what lies ahead of us.

      • FSF

        • GNU Projects

          • GDB 11.1 released!
                        GDB 11.1 released!
            Release 11.1 of GDB, the GNU Debugger, is now available.  GDB is
            a source-level debugger for Ada, C, C++, Fortran, Go, Rust, and many
            other languages.  GDB can target (i.e., debug programs running on)
            more than a dozen different processor architectures, and GDB itself
            can run on most popular GNU/Linux, Unix and Microsoft Windows variants.
            GDB is free (libre) software.
            You can download GDB from the GNU FTP server in the directory:
            The vital stats:
              Size   md5sum                            Name
              22MiB  257cb0f67927f79acf636d8c01e19990  gdb-11.1.tar.xz
              37MiB  eb6596d83bdccea06caa6d49d923e119  gdb-11.1.tar.gz
            There is a web page for GDB at:
            That page includes information about GDB mailing lists (an announcement
            mailing list, developers discussion lists, etc.), details on how to
            access GDB's source repository, locations for development snapshots,
            preformatted documentation, and links to related information around
            the net.  We will put errata notes and host-specific tips for this release
            on-line as any problems come up.  All mailing lists archives are also
            browsable via the web.
      • Public Services/Government

        • Open source matters, and it’s about more than just free software

          Open-source software is not only a global pool of free code available for creative programmers to build upon: take it to the geo-political level, and it is also a tool that countries can leverage to achieve independence from the growing monopoly of foreign tech giants.

          That’s according to a new report commissioned by the EU and carried out by non-profit organization OpenForum Europe, which found that the impact that open source could have on the bloc’s digital independence is such that the technology can be seen as a “public good”.

      • Programming/Development

        • Joachim Breitner: A Candid explainer: Language integration

          Now for something completely different: How does Candid interact with the various host languages, i.e. the actual programming languages that you write your services and clients in?

        • Introduction to the QML CMake API

          When Qt 6 migrated to CMake, we also wanted to provide a nicer experience for setting up QML projects. With the initial Qt 6.0 release, we did however only provide some tech preview API, which did not do much more than what was available in qmake since Qt 5.15.

        • Translation Sadness

          Qt comes with translations for many things; applications can organize their translations into catalogs. To display a text, Qt applications will typically use the tr() function to look up a source-text and return a translation in the current language. For instance, tr(“OK”) will return the translation of “OK”.

          Translations have a context, which in the case of a naive call to tr() is generally the class name performing the call. This gives the translations at least the opportunity to change the way “OK” is translated in the context of classes MyFancyWidget or MyAwkwardDialog.

          So a catalog will basically be a table, helping to look up string in context to produce a translation.


          My remaining sadness is that Qt is almost there, and documentation says that it should all work, and that in the end I need to pull off some stupid hack to provide the right display of a 2-character string (2 glyphs in Simplified Chinese, 5 in Turkish). At least it’s documented, and the next time someone files an issue that there’s a missing translation I have a handle on what kind of code to add.

        • opensource.com: What was your first programming language?

          My first ever programming language was BASIC in the early eighties. One of my relatives bought a C64 for their kids to get started with learning computers. They only used it for gaming, and I was also invited. But they also had a book about BASIC, and I was curious and gave it a try. I wrote some short code, I did not even know how to save it, but it was exciting to see that the computer does what I say to it. This means that I was not paid to learn it, and it was not my choice. It was the language available to me. Obviously, when I got my first computer a few years later, an XT compatible box, I first wrote some code in GW-BASIC, the dialect of BASIC available with DOS.

        • Programming languages: Python is on the verge of another big step forward

          Tiobe, a software testing company, bases its rankings on searches for programming languages on popular websites and search engines. The Tiobe index is updated monthly, and it doesn’t align with other language popularity rankings. For example, the electrical engineering magazine IEEE Spectrum has ranked Python as the most popular language since at least 2020, followed by Java, C, and JavaScript, while developer analyst RedMonk has JavaScript in top place, followed by Python and Java, and places C at tenth.

        • Perl/Raku

          • Rakudo Weekly News: 2021.37 Receding

            This week not a lot happened, so it seemed. It feels a bit like the waters receding from the beach, just minutes before the tsunami is going to hit.

  • Leftovers

    • Science

    • Health/Nutrition

      • Stephen Michael Kellat: Mid-September Seasonal Update

        The situation locally is starting to get a bit out of control. It is very hard to conduct a political campaign with the coronavirus situation in our local hospitals getting bad to the point that we are seeing overload intensive care units in one part of the state. The arguments over the use of the law to deal with the pandemic are simply overwhelming.

      • Tea Party Patriots Are Behind Pro-Trump Doctors Grifting Off of Fake Covid Cures – Sludge

        Documents obtained by CMD show that the Tea Party Patriots Foundation was the fiscal sponsor of the organization behind America’s Frontline Doctors, which spread lies about Covid-19 and is scamming customers looking for vaccine alternatives.

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

        • Security

          • Disclosing CVE-2021-40823 and CVE-2021-40824: E2EE vulnerability in multiple Matrix clients
          • CISA’s Annual National Cybersecurity Summit
          • Linux Implementation of Cobalt Strike Beacon Targeting Organizations Worldwide

            The as-yet undetected version of the penetration testing tool — codenamed “Vermilion Strike” — marks one of the rare Linux ports, which has been traditionally a Windows-based red team tool heavily repurposed by adversaries to mount an array of targeted attacks. Cobalt Strike bills itself as a “threat emulation software,” with Beacon being the payload engineered to model an advanced actor and duplicate their post-exploitation actions.

          • Security updates for Monday

            Security updates have been issued by Debian (qemu and thunderbird), Fedora (chromium, firefox, and mosquitto), openSUSE (apache2-mod_auth_openidc, gifsicle, openssl-1_1, php7-pear, and wireshark), Oracle (oswatcher), Red Hat (cyrus-imapd, firefox, and thunderbird), SUSE (apache2-mod_auth_openidc, compat-openssl098, php7-pear, and wireshark), and Ubuntu (git and linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-hwe, linux-kvm, linux-oracle, linux-snapdragon).

          • Privacy/Surveillance

            • Pegasus Scandal: it’s been two months with no investigation! #SaveOurPrivacy

              In light of the revelations related to NSO Group’s Pegasus spyware made in July 2021, the Government of West Bengal has instituted a Commission of Inquiry to investigate the issue. Responding to the Public Notice calling for statements, we have sent across a submission to the Commission.

            • Ireland fails to enforce EU law against Big Tech [Ed: When Ireland is so complicity in tax evasion by a company like Microsoft will it bother investigating its privacy crimes?]
            • The State of Consumer Data Privacy Laws in the US (And Why It Matters)

              With more of the things people buy being internet-connected, more of our reviews and recommendations at Wirecutter are including lengthy sections detailing the privacy and security features of such products, everything from smart thermostats to fitness trackers. As the data these devices collect is sold and shared—and hacked—deciding what risks you’re comfortable with is a necessary part of making an informed choice. And those risks vary widely, in part because there’s no single, comprehensive federal law regulating how most companies collect, store, or share customer data.

              Most of the data economy underpinning common products and services is invisible to shoppers. As your data gets passed around between countless third parties, there aren’t just more companies profiting from your data, but also more possibilities for your data to be leaked or breached in a way that causes real harm. In just the past year, we’ve seen a news outlet use pseudonymous app data, allegedly leaked from an advertiser associated with the dating app Grindr, to out a priest. We’ve read about the US government buying location data from a prayer app. Researchers have found opioid-addiction treatment apps sharing sensitive data. And T-Mobile recently suffered a data breach that affected at least 40 million people, some who had never even had a T-Mobile account.

            • Apple delays plans to scan iPhones for child abuse [Ed: Loaded headline. It's not about children. They hash and scan all files. In due course the scope would expand.]
            • Confidentiality

              • Overengineering A Smart Doorbell [Ed: Let doorbells be doorbells, quit trying to make them "smart" (which usually enables spying on non-consenting parties)]

                Fresh from the mediaeval splendour of the Belgian city of Gent, we bring you more from the Newline hacker conference organised by Hackerspace Gent. [Victor Sonck] works at the top of his house, and thus needed a doorbell notifier. His solution was unexpected, and as he admits over engineered, using machine learning on an audio stream from a microphone to detect the doorbell’s sound.

              • IoT Devices See More Than 1.5bn Cyberattacks so Far This Year [Ed: 'Smart'. Or "Kaspersky" 'security' trying to sell more of its dodgy software/malware with inflated numbers, conflating attempts with breach]

                Kaspersky research showed that Internet of Things devices are more vulnerable than ever with attacks increasing by more than 100%.

              • Lincoln Laboratory honored for transfer of security-enhancing technologies [Ed: When MIT isn't busy protecting and covering up for high-profile pedophiles it's attacking people's privacy, framing that as "security"]

                The first technology, Forensic Video Exploitation and Analysis (FOVEA), is a suite of analytic tools that makes it significantly easier for investigators to review surveillance video footage. The second technology, Keylime, is a software architecture designed to increase the security and privacy of data and services in the cloud. Both technologies have transitioned to commercial use via license or open-source access.

              • Digital exposure tools: Design for privacy, efficacy, and equity

                Use of smartphone-based digital contact- tracing apps has shown promise in responding to the COVID-19 pandemic. But such apps can reveal very personal information; thus, their use raises important societal questions, not just during the current pandemic but as we learn and prepare for other inevitable outbreaks ahead. Can privacy-protective versions of such apps work? Are they efficacious? Because the apps influence who is notified of exposure and who gets tested—and possibly treated—we need to consider the apps in the context of health care equity. Exposure-notification apps are predicated on the assumption that if someone is informed of exposure, they will follow instructions to isolate. Such an expectation fails to take into account that isolation—and sometimes even seeking care when ill—is much harder for some populations than others. If apps are to work for all, and not make this worse for disadvantaged populations, there needs to be basic social infrastructure that supports testing, contact tracing, and isolation.
                When severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) reached Singapore in spring 2020, the nation instituted a centralized contact-tracing app in which identifiers linked to the user were shared with nearby phones running the app. If a person was diagnosed with SARS-CoV-2, the collected identifiers would be communicated to the Ministry of Health, which would use them to do contact tracing (1). Such proximity information—who is near whom for how long—is very revelatory. It can expose a journalist’s source or the existence of an extramarital affair. Singapore had originally committed to the data being used solely for tracking SARS-CoV-2 exposures, but in January 2021, the government changed its policy, permitting the use of app data in criminal investigations.

              • Tamil Nadu announces Health ID for people, experts urge caution

                Be it government or private entities, whenever public data is collected it is vulnerable to breach and raise privacy concerns, says the President of Free Software Foundation Tamil Nadu (FSFTN).

    • Defence/Aggression

      • Voices from Tigray: ongoing internet shutdown tearing families, communities, businesses apart

        Since the start of the Tigray conflict in November 2020, warring parties in Ethiopia have used internet and telecommunication shutdowns as a weapon to control and censor information. The Tigray region has been in the dark for over 300 consecutive days, with both broadband and mobile internet shut off.

        This region-wide blackout is not only making it difficult for journalists and human rights defenders to document and uncover heinous crimes against civilians — including mass rape and sexual violence, mass murder, and abuse of refugees committed by Ethiopian and Eritrean troops and the Amhara militia — but it’s also tearing families, communities, and businesses apart during already challenging times.

        First-hand stories from those impacted by the current shutdown in Tigray, gathered through Access Now’s Shutdown Stories Project, highlight how the blackout is making it extremely hard for people to connect with their families, sustain their livelihoods, and maintain their mental health. Below we share survivors’ stories, and provide insight as to how you can support our global #KeepItOn campaign in the fight against internet shutdowns. For safety reasons, contributors in this blog post are identified by their first names or pseudonyms, while some are anonymous.

    • Environment

    • Internet Policy/Net Neutrality

      • He founded the Internet Archive with a utopian vision. That hasn’t changed, but the internet has

        Inside his library, Brewster Kahle is dancing. He smiles as he sways on the spot, an antique Victrola filling the foyer of the building, a former church, with the scratchy jazz tunes of yesteryear.

        He lifts the needle and the music stops, but just for now. Soon his staff will convert the aging record to a string of ones and zeroes that will live forever in cyberspace. This is the Internet Archive, and that is why Kahle, and it, are here: To make available for free, online, every bit of digital or physical information that exists.

        To walk with Kahle through his columned temple of knowledge in San Francisco’s Richmond District is to understand the scale of what he and his staff, which now numbers more than 100, have been hard at work for almost 25 years. In a loading area stacks of donated books await their turn on a specialized scanning machine where, shrouded behind a black curtain, a technician painstakingly copies endless pages.

      • Bipartisan Social Media Platform Developed By Students Launch Beta Version – Grit Daily News

        Perspective, a new bipartisan social media platform designed to promote bipartisan conversation, has launched its early beta version.

        The platform was envisioned by Samuel W. Wolfson High students, a high school in Jacksonville, to change how individuals with different political views engage in online conversations. Perspective has already assembled a team of experienced software developers, mentors, and a board of directors.

    • Monopolies

      • FOSS Patents: App developers must know that any alleged ambiguity in the Epic Games v. Apple injunction favors Apple, not them: there won’t be IAP alternatives, not even in WebView

        This is a follow-up to my previous post on this topic: “No, the Epic v. Apple injunction absolutely positively DOESN’T allow developers to incorporate ‘buttons’ for alternative IN-APP payment mechanisms”.

        The original version of that post said Daring Fireball’s John Gruber was “right for the wrong reasons.” He did state reasons on Twitter that didn’t convince me because it sounded like Apple’s app review practices were going to inform the interpretation of the Epic v. Apple injunction. But John also referred at some point to Apple telling him that the ruling is unambiguous, such as in this tweet, though I disagree with the pages referenced there as that’s the Sherman Act–not California UCL–analysis.

        It’s regrettable (to put it mildly) that The Verge’s Nilay Patel just keeps digging himself an ever bigger hole instead of acting responsibly and admitting his error. The man is actually a lawyer by training (and journalist by vocation), so it shouldn’t be hard for him to figure out that his analysis was fundamentally flawed because he focused myopically on the wording of the injunction while ignoring the underlying Rule 52 order.


        I am a developer, and a complainant against Apple in another App Store context. I wish I had better news for the wider developer community. But someone has to counter all that disinformation out there. It hurts me to see people fantasizing and theorizing about out-of-this-world crap that’s simply not going to help anyone.

      • Conference Report: UIC Law Thinking Internationally about IP and ADR – What Every Lawyer & Corporate Counsel Should Know [Ed: IPOS and WIPO (now run by IPOS person) misuse propaganda terms like "IP"]

        Back on August 19, 2021, the University of Illinois Chicago School of Law’s Center for Intellectual Property (“IP”), Information, and Privacy Law, the IP Office of Singapore (IPOS), and the World IP Organization’s (WIPO) Arbitration and Mediation Center co-organized a seminar on the intersection of intellectual property and alternative dispute resolution (“ADR”) from a global perspective.


        One option available to courts is to explicitly and strongly encourage mediation. Another is to consider the strategic value of court opinions. For example, Judge Holderman recounted his overseeing the In re Innovatio IP Ventures, LLC Patent Litigation. Specifically, the parties moved for partial summary judgment on essentiality, which allowed the parties to pursue mediation presuming for the sake of mediation both validity and infringement. Had Judge Holderman ruled on either validity or infringement, it would have taken a significantly longer time and would have all but decided the case one way or the other. Instead, the parties were able to set the mediation stage and tailor a unique resolution to the facts and industry.

      • Patents

        • Challenges and Issues in Promoting ‘Eco-Patenting: A Techno-Legal Weapon to Mitigate Climate Change’ [Ed: This is greenwashing; patents won’t tackle climate change but exacerbate it by issuing monopolies on potential solutions, limiting their adoption]

          This paper aims to analyze the matter concerning the challenges and issues in promoting “Eco-Patenting: A techno-legal weapon to mitigate climate change”. The paper broadly covers and attempts to answer the prominent questions like, what encourages green technology transfer? What is the impact of green technology on climate change? Does IP law inhibit technology transfer? What role do patents play in encouraging green technology innovation? How can compulsory licensing be used in green technology? Further, it also discusses the requirement of the de-blocking provisions and the generous experimental use clause in patent laws for encouraging improvements and know-how transfer in green technology. Furthermore, the paper elaborates on the importance of invoking compulsory licensing provisions in developing countries for ESTs in light of public health and welfare. Also, the paper mentions the use of the proposed “modified” international exhaustion principle to maintain a balance between the interest of innovators and public needs. The author proposes to build an environment in developing countries like India that can resolve the issues of climate change using the model of Eco-patenting without prejudicing the rights and interests of innovators. [enter Abstract Body]

        • Tesla obtains patent on its wild idea to use lasers as windshield wipers

          Tesla has actually managed to obtain a patent on its wild idea to use lasers to clean debris off of vehicles.

          We are basically talking about using laser beams as windshield wipers.

          About two years ago, we reported on Tesla working on a technology to use laser beams to automatically clean debris off cars.

          We discovered the idea through a patent application filed by the company.

        • China Patent Linkage System [Ed: Linking a bunch of very low-quality patents will make jobs for unproductive people without improving anything in society]

          Starting in July of this year, China initiated a patent registration platform that bears some similarity to the generic drug framework under the Hatch-Waxman Act in the U.S. The purpose of this alert is to describe this new Patent Linkage System in China and to compare it to the corresponding generic drug framework in the U.S.

        • Patent Office ‘in Neutral’ as It Awaits Biden’s Pick to Lead It

          The lack of a permanent U.S. Patent and Trademark Office director has left attorneys guessing about how the agency will tackle some high-profile policy questions.

          The patent office has been grappling with issues such as review of Patent and Trial Appeal Board decisions and how its examiners should determine if certain inventions are eligible for patents. Progress on those issues is largely stalled until a new director is in place.

          It’s a waiting game for attorneys because the agency official temporarily performing the director’s duties, Drew Hirshfeld, isn’t setting policy in some areas while the office awaits a U.S. Senate-confirmed director.

          “Everything has been kept in neutral and just cruising along,” said Joseph Matal, a Haynes and Boone LLP partner who temporarily led the agency early in the Trump administration. “It’s surprising that we’ve all had to wait that long, but I don’t see the agency’s interim leadership as having any choice.”

        • Arbutus rises 15% on Apparent Patent Fight Win with Moderna [Ed: While millions of people die these greedy companies fight over patents]
        • Stealth BioTherapeutics Strengthens IP Portfolio with Issuance of U.S. Patents Covering Elamipretide for Barth Syndrome
        • A Million Inventions Lost: Abandoned Provisional Applications [Ed: Dennis Crouch is funded by the patent litigation industry, so he's promoting the same old lies that each patent is an invention and there are millions of inventions. Cheap scholarly facade for overzealous lawyers.]

          US provisional patent applications continue to be popular, with about 170,000 filed each year since 2013. After filing a provisional, the applicant then has one-year to move the case to a non-provisional or PCT application, and eventually toward patent issuance.


          There is a good amount of talk about patent grant rate — what percentage of patent applications eventually end up as issued patents. In general though, I have never seen any grant rate calculation take these abandonment numbers into account.

        • License CRISPR patents for free toshare gene editing globally
          [Ed: Those patents ought not exist in the first place; do not license them, abolish them instead (life and nature are not inventions)]

          Universities hold the majority of CRISPR patents. They are in a strong position to ensure that the technology is widely shared for education and research.

        • The Hit Parade of Patent Infringement Damages in Europe: France is Great (Again) [Ed: Team UPC is cheering for patent litigation in France]

          My eminent colleague Pierre Véron, who needs no introduction here, is the author of a recent survey on the ranking of European jurisdictions in terms of damages awarded over the period 2000-2019 [1]The full version was published in English in Festschrift for President Meier-Beck in the journal GRUR (GRUR 2/2021)., which particularly caught my attention and of which I will make a brief summary in my own way here.

          First and foremost, I would like to thank Pierre Véron, for such great work of course, but also for giving me permission to report its results, while entrusting me with the accompanying graphics, so that I can reproduce some of them here.

          I must admit that the results of the study may be surprising, since they are so at odds with the idea that we generally have of European Courts. To me it seems, more especially, to complete the interviews Part I and Part II of French Judges that we had recently carried out, to undo certain untruths about the French system. Thus, I will deliberately adopt a “French bias” hereafter (which some will not fail to criticize); but after all I will just assume my role of French referent of the Blog.

      • Trademarks

      • Copyrights

        • China Aims to Amend E-Commerce Law With Heightened Ramifications for Counterfeit Sales – The Fashion Law

          China regulators are looking to bolster its e-commerce law amid a larger crackdown on big tech. On Tuesday, China’s State Administration for Market Regulation released a draft version to amend the national e-commerce law, subject to a period of public comment, which includes new penalties for e-commerce operators, such as Alibaba and JD.com should they fail to address intellectual property violations on their platforms, adding the potential revocation of companies’ business licenses to the existing ability of the SAMR to slap bad actors with steep fines.

          In addition to having the authority to levy monetary penalties of up to 2 million yuan ($309,400) on service providers that are found to have engaged in “less serious” intellectual property infringements, the proposed new rules seek to bolster the ramifications of wrongdoing by revoking the necessary licenses “if the platforms fail to take necessary measures against vendors who infringe intellectual property rights,” and also by extending the window of time that “an individual merchant’s business can be restricted while infringement claims are settled” to 20 business days, Reuters reports. Currently, the time frame is 15 business days.

        • Around the IP Blogs

          The CREATe blog continued with posts from their 21 for 2021 project. In this series, the blog’s authors offer answers to 21 topical copyright questions for the 21st century. Last week’s post is dedicated to performers’ rights. It reviews the basic issues on the topic, then elaborates on the importance of performers’ rights for creative industries and the main debates and developments in the area.

        • Copyright Evidence Portal: Introducing the 21 for 2021 Project [Ed: Make copyright law more lenient for sharing and reciprocity to crush monopolies that "lobby" (bribe) 'our' politicians]

          The question of what should count as evidence for the purposes of public policy has been at the heart of CREATe’s work since we were established in 2012 (as the “Centre for Copyright and New Business Models in the Creative Economy”, funded by three research councils AHRC, EPSRC and ESRC).

        • Literacy Platform Simbi Adopts the Annual Copyright License for Curriculum & Instruction From CCC

          CCC, a leader in advancing copyright, accelerating knowledge, and powering innovation, announces Simbi, the Canada-based reading platform for kids, has adopted the Annual Copyright License for Curriculum & Instruction to streamline their permissions process in using copyrighted content.

The Register Cannot Stop Trolling Linus Torvalds (It Recently Corrected Falsehoods in the Headlines, But No Lessons Have Been Learned)

Posted in Deception, GNU/Linux, Kernel, Microsoft at 8:35 am by Dr. Roy Schestowitz

Video download link | md5sum 7029e9635158e447f2f31d72eca1474d

Summary: The media coverage about “Linux 5.15-rc1″ says a lot about the general agenda of many publications, such as The Register with Microsoft operatives inside it

TWELVE hours after Linus Torvalds had announced the closing of the merge windows (page will be updated with more news picks as they arrive) we began to see the typical slant from Linux-hostile people. It’s not a new habit and it is done consistently, not merely as clickbait because underlying facts too get distorted (previously, after Torvalds protested the matter the headline was modified/corrected as well).

“Too much marketing, obligatory (paid-for) puff pieces, and sponsored fluff.”The above is a rant about the sort of ‘news’ coverage we nowadays find about Linux; sometimes it’s not about Linux at all and oftentimes it’s just misusing the brand to say something negative about things that aren’t Linux. If the media perishes and if “professional” (paid) journalism dies, maybe it is well deserved. We’re struggling to find anything that can be labeled journalism in today’s “tech” press. Too much marketing, obligatory (paid-for) puff pieces, and sponsored fluff.

“Mind Control: To control mental output you have to control mental input. Take control of the channels by which developers receive information, then they can only think about the things you tell them. Thus, you control mindshare!”

Microsoft, internal document [PDF]

Links 13/9/2021: First Linux 5.15 Release Candidate and Fedora 35 Beta Tomorrow

Posted in News Roundup at 5:48 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Microsoft Defender leads the user to assume Free and Open Source Software is malicious with scary red warnings.

      Microsoft “Defender”, the questionable “free” antivirus software included with Windows, routinely flags Free and Open Source Software that I try to install as a potential virus.

      So far, I’ve gotten warnings like these on LibreOffice installers, as well as PeaZip, HexChat, and QBitTorrent.

      In fact, over on Reddit, some people even say Microsoft has been removing BitTorrent programs in general, without asking them first, even when there’s no malware at all in them. In fact, there’s so many complaints of Microsoft doing this, here’s an entire search result. Take your pick.

      Windows itself meets the definition of spyware and adware set forth by the overall anti-spyware and anti-adware communities in the late 1990s, when the problem first emerged with the stuff piggybacking on software that claimed to be free of charge.

      Windows “11” even had the entire OS crash and freeze on the dev and beta channels recently, because a lookup to a Microsoft ad server from the Start Menu failed to respond.

    • 9to5Linux Weekly Roundup: September 12th, 2021

      This has been a great week, starting with the release of the Firefox 92 web browser and continuing with the latest HPLIP printer and scanner drivers with support for Linux Mint 20.2 “Uma” and Red Hat Enterprise Linux 8.4 operating systems, as well as a major Steam Client update for Linux gamers.

      The KDE Project released a new maintenance update to their KDE Frameworks software suite for KDE Plasma users, and sysadmins now have a new version of the Finnix live system to play with, based on Debian GNU/Linux 11 “Bullseye.”

    • Server

      • Advancing the Tactical Edge with K3s and SUSE RGS [Ed: Who at SUSE thought Booz Allen Hamilton was good for marketing?]

        An early adopter of open source, it was not until 2018 that the team at Booz Allen identified K3s as the right solution, due to its small footprint and lightweight distribution. Their relationship with the Rancher Federal team (now SUSE RGS) was a natural next step, and Booz Allen deployed K3s, defining a new era in military tactics at the edge.

      • Fostering Innovation with a Kubernetes Platform | SUSE Communities

        Hybrid and multi-cloud are now the established order in the tech world. According to SUSE’s recently commissioned Insight Avenue report, Why Today’s IT Leaders are Choosing Open, more than 800 IT leaders believe the biggest benefits of a hybrid and multi-cloud approach are cost-effectiveness (45%), increased flexibility and agility (44%), and being able to take advantage of best-of-breed solutions (35%).

      • Managing Livepatch on-prem

        Ubuntu Livepatch is the service and the software that enables organizations to quickly patch vulnerabilities on the Linux kernel. It enables uninterrupted service while reducing fire drills during high and critical severity kernel vulnerabilities. With Ubuntu Livepatch on-prem we enhance our service to enable enterprises manage on private or public cloud their livepatched systems.

        In this post, we will introduce Ubuntu Livepatch on-prem and look into how it can be deployed for your organization, as well as answer some of the most commonly asked questions.

      • Blog: Introducing Single Pod Access Mode for PersistentVolumes

        Last month’s release of Kubernetes v1.22 introduced a new ReadWriteOncePod access mode for PersistentVolumes and PersistentVolumeClaims. With this alpha feature, Kubernetes allows you to restrict volume access to a single pod in the cluster.

    • Audiocasts/Shows

      • Josh Bressers: Episode 288 – Linux Kernel compiler warnings considered dangerous

        Josh and Kurt talk about some happenings in the Linux Kernel. There are some new rules around how to submit patches that goes against how GitHub works. They’re also turning all compiler warnings into errors. It’s really interesting to understand what these steps mean today, and what they could mean in the future.

      • LHS Episode #428: Pat and Winlink Deep Dive

        Welcome to the 428th installment of Linux in the Ham Shack. In this episode, the hosts take a deep dive into the Winlink radio-based e-mail system. Discussed are native applications that make Winlink access possible on Linux including Pat, AX.25, Dire Wolf, ARDOP, PACTOR and more. The discussion ranges from how to get the software to how to build it, deploy it, configure it and use it. We hope you enjoy this discussion about Winlink and are able to use and enjoy the system after our in-depth tutorial. Have a great week and see you next time around!

      • Linux Action News 206

        Linus Torvalds attempts to get kernel developers to clean up their code, the performance regression that almost shipped, and the major production struggle Red Hat acknowledged this week.

    • Kernel Space

      • Asahi Linux Closing In On ‘A Polished Linux Experience’ On M1 Macs

        Apple’s M1 Macs may not fully support Linux just yet, but that’s on the verge of changing.

        Apple’s M1 processors power its next-generation Macs. Based on the same designs the company has been using in its iPhones and iPads for years, the M1 has received accolades for its performance and battery life. While most users are perfectly content with Apple’s macOS, some would prefer to run Linux.

        Linux on the Mac has a long and healthy history. Many individuals prefer running Apple’s hardware, thanks to its leading-industry design and features, but want the freedom Linux provides. Unfortunately, because Apple just started using the M1 in its Macs, developers have to start from scratch, reverse engineering the hardware and drivers.

      • Linus Torvalds Announces First Linux 5.15 Kernel Release Candidate

        It’s been two weeks since the release of Linux kernel 5.14, which slowly makes its way into the stable software repositories of various popular GNU/Linux distributions, and now it’s time to go out and test another new kernel series, Linux 5.15, which will be released later this fall.

        Linux 5.15 looks to be yet another release that focuses on further improving the support for AMD CPUs and GPUs, but it will also bring new features like NTFS3 and KSMBD (CIFS/SMB3) support, and the usual new and updated drivers for better hardware support. But all in all, it looks like a small release.

      • Linux 5.15-rc1
        So 5.15 isn't shaping up to be a particularly large release, at least
        in number of commits. At only just over 10k non-merge commits, this is
        in fact the smallest rc1 we have had in the 5.x series. We're usually
        hovering in the 12-14k commit range.
        That said, counting commits isn't necessarily the best measure, and
        that might be particularly true this time around. We have a few new
        subsystems, with NTFSv3 and ksmbd standing out. And as a result, when
        you look at the stats on a "lines changed" basis, 5.15-rc1 ends up
        looking much more middle-of-the-road. It still doesn't look like a
        particularly _big_ merge window, but also not remotely the smallest
        And while this is not up there with some larger releases, it's
        actually been one of the messier merge windows. Part of it was
        self-inflicted damage from me trying to enable -Werror much more
        aggressively, but I also ended up having to push back a lot more on
        some of the patch series and had a number o full requests where I went
        "ok, I've pulled this, but XYZ is wrong".
        So we've had merge windows that went much more smoothly. In fact, I
        have a pull request or two that I just didn't feel like going through
        fully, and I might still pull the upcoming week, but I got a bit fed
        up with how I ended up seeing new pull requests - and not for fixes -
        coming in fairly late in the merge window. Yes, the merge window is
        two weeks, but part of that is very literally to give _me_ time to
        actually look things through, not for people to send me new requests
        up until the very end of the merge window.
        Anyway, I'm hoping that things calm down, and I'll take a look at a
        few things still in my inbox, but on the whole you should expect that
        "that's it" and send me fixes only.
        And in order to get those fixes going, please go out and test this.
        Appended, as always, is my "mergelog" - since even at "only" 10k+
        commits, the shortlog is not really realistically readable or useful
        as a summary. And as always, the mergelog credits the person I pulled
        from, which is not the same as the actual author of all the changes.
        There's just over a hundred people listed below that I've pulled from,
        but over 1500 people with authorship credit in the git tree. So that's
        where you'd need to dig for all the details.
      • Linux 5.15-rc1 Brings New NTFS Driver, In-Kernel SMB3 Server, AMD Changes, Intel DG2

        As expected this evening the Linux 5.15-rc1 kernel was released to top off the two week merge window that saw many changes to the kernel.

        Tomorrow I’ll have published our extensive feature overview of Linux 5.15 changes, but some of the highlights include Paragon NTFS3 as the new NTFS file-system driver, KSMBD as an in-kernel SMB3 file server, opt-in L1d cache flushing on context switching, continued Apple M1 bring-up work, many AMD improvements, and initial Intel DG2/Alchemist and XeHP discrete graphics bring-up work, among a lot of other new hardware enablement.

      • Kernel prepatch 5.15-rc1

        Linus has released 5.15-rc1 and closed the merge window for this development cycle.

      • Linus Torvalds admits to ‘self-inflicted damage’ with ‘-Werror’ as Linux 5.15 rc1 debuts

        Linus Torvalds has loosed the first release candidate for version 5.15 of the Linux kernel, with but isn’t sure if it’s a big ‘un or nothing to get excited about.

        “So 5.15 isn’t shaping up to be a particularly large release, at least in number of commits. At only just over 10k non-merge commits, this is in fact the smallest rc1 we have had in the 5.x series,” he wrote in his weekly missive on the state of kernel development. But he also wondered if measuring kernels by commits is valid and suggested measuring new kernel versions by the number of lines changed.

        On the latter measure, thanks to substantial new subsystems like NTFSv3 and KSMBD, Torvalds stated “5.15-rc1 ends up looking much more middle-of-the-road. It still doesn’t look like a particularly _big_ merge window, but also not remotely the smallest one.”

        Whatever the size of the new kernel, Torvalds rated it “one of the messier merge windows”.

    • Applications

      • PeaZip 8.2.0

        PeaZip is an open source file and archive manager. It’s freeware and free of charge for any use. PeaZip can extract most of archive formats both from Windows and Unix worlds, ranging from mainstream 7Z, RAR, TAR and ZIP to experimental ones like PAQ/LPAQ family, currently the most powerful compressor available.

        Open and extract 200+ archive formats: 001, 7Z, ACE(*), ARC, ARJ, BZ2, CAB, DMG, GZ, ISO, LHA, PAQ, PEA, RAR, TAR, UDF, WIM, XZ, ZIP ZIPX – view full list of supported archive file formats for archiving and for extraction.

        PeaZip provides fast, high compression ratio multi-format archiving – view file compression and decompression benchmarks for more information.

    • Instructionals/Technical

      • How to Add or Create a New Superuser on Linux

        Granting admin privileges to a new user can be complicated for beginners. Here’s how you can easily create a new superuser on Linux.

        On Linux, the sudo command gives you the ultimate privilege to perform various administrative functions, despite your non-root access. But to use sudo, you need to have a superuser account on your system.

        Since there are several Linux operating systems, more commonly known as distros, there are multiple ways to add a sudo user. Read on to find more about how you can use Linux commands within different distros to achieve this simple, yet essential task.

      • Vincent Bernat: Short feedback on Cisco pyATS and Genie Parser

        Cisco pyATS is a framework for network automation and testing. It includes, among other things, an open-source multi-vendor set of parsers and models, Genie Parser. It features 2700 parsers for various commands over many network OS. On the paper, this seems a great tool!

      • How to Make Ubuntu Bootable USB in Windows 10

        In the current computing era, users have several interests behind using any operating system of their choice, and for that they might need to switch to another OS or to install the fresh copy of the current OS. The leading operating systems being used are MS-Windows, Linux (includes several distributions like Ubuntu) and macOS; it is observed in the recent past that if you wanted to get any of these operating systems on your machine, you had two ways to do so; via DVD/CD drives or using USB (used rarely in past). However, as the technology evolved the use of CD/DVD became very less, and in today’s smart computing machines, the manufacturers are not even offering laser disc drives. So, the users have started using USBs to accomplish such needs, and thus it nullifies the need of laser disc drives for OS installation. Keeping an eye on this evolution, our today’s guide will demonstrate how to make Ubuntu bootable USB in Windows 10.

      • How Do I Roll Back a Kubectl?

        For the past couple of years, Kubernetes has been heavily employed in production. Its declarative API provides a variety of options for orchestrating the containers. One of Kubernetes’ most notable features is its resiliency, which includes the ability to do Rolling and Rollback Deployments. When it comes to putting apps into operation, there are various options. Rolling updates are the default approach for updating the running version of your application in Kubernetes.
        The rolling update periodically removes older Pods and replaces them with newer Pods. You can change the images, settings, labels, annotation, and resource restrictions of the workload in your clusters using a rolling update. Rolling updates start replacing your resource’s Pods with new stuff, which are then planned on nodes when resources are needed. Rolling updates are built to maintain your workloads updated without causing any disruption.

        Kubernetes and kubectl provide a straightforward mechanism for rolling back resource modifications. When a Deployment is not secure, such as when it crashes looping, you also might want to roll back the Deployment. By default, the system saves all of the Deployment’s rollout history so that you might roll back at any moment. In this guide, we are going to talk over the method to roll back a kubectl.

      • How to Setup Rsyslog Server on Debian 11 (Bullseye)

        Log files are crucial in probing and troubleshooting errors. They are the first files that system administrators scrutinize in order to narrow down to the probable cause of an error and by so doing, come up with resolutions to resolve the problem. In an infrastructure with tens or hundreds of servers, and other devices, managing log files can be a challenge. And this is where rsyslog comes in.

        Rsyslog is an opensource logging program that facilitates the forwarding of log files to a centralized log server in an IP network. With centralized logging, administrators can easily keep tabs on log files of multiple systems from a central point. In this post, we will walk you through the installation and configuration of Rsyslog Server on Debian 11.

      • How to edit PDF file in Ubuntu

        Portable document format (PDF) is one of the most used file formats, primarily to view the content of a file. The content inside the PDF file looks good, and users can view it in the same format on various devices. Irrespective of the operating systems, sometimes users need to edit the PDF files to attain a specific goal, such as some minor as well as major mistakes that can be corrected. However, it is observed that editing PDF may not be easily available. In this article, we will demonstrate the ways to edit the PDF files in Ubuntu:

      • How to Install the Latest MySQL 8 on Ubuntu 20.04 – LinuxCapable

        MySQL is a relational database management system based on SQL (Structured Query Language). It is one of the most widely used database software for several well-known applications that utilize it. MySQL is used for data warehousing, e-commerce, and logging applications, but its most used feature is a web database storage and management.

        Ubuntu 20.04 comes with MySQL in its repository, and however, as many know, Ubuntu LTS releases only provided security updates for its releases to keep its stable build essentially stable. This has great benefits but some drawbacks; in the tutorial, you will learn how to install MySQL 8 for Ubuntu 20.04.

      • How to Install and Use Git in Linux System

        When you start out as a coder or software developer under a Linux operating system environment, you start to make reasonable milestones due to the flexibility and open-source nature of the various Linux distributions.

        A developer with an enterprise mindset will always want to improve their code to better versions. Such a mindset gets you thinking of a platform that can keep track of the growth steps of your developer code.

      • How Do I Become a Root User in Linux

        The root user appears to be a superuser in Linux, controlled by the system. Superusers are called root in Unix and Linux. The root account has the most access rights within the Linux system, and it is used for administrative purposes. Users are usually called root when they are logged into the root account. However, under Linux and Unix, a root account is a user account with no name and has no user ID. Linux and Unix default to giving root access to files and commands.

      • How to check network interface status in CentOS8

        CentOS 8 generally comes with a preinstalled Network Manager, which helps to configure available connections and keep them active. It provides tools based on both in-line command and graphical user interfaces to accomplish trouble-free setup and management of networks. An API controls network configuration through D-Bus and performing queries.

      • Ubuntu 20.04 Change Desktop Icon Size

        If the icons on your Ubuntu desktop have unexpectedly become excessively large, you may have accidentally altered the rendering size. A few wrong mouse scroll wheel rolls, or even a touchscreen or touchpad, might cause this easy error. To fix the problem, rotate the scroll wheel while pressing a ctrl button. If it still doesn’t help, try the following methods to fix your problem.

        In Ubuntu 19.04 Gnome 3.32, the desktop icons are now managed by a gnome-shell extension. Though this extension causes so many bugs, on the plus side, the size of desktop icons may now be customized.

      • How to empty trash from Ubuntu terminal

        Ubuntu is the widely used desktop operating system in the open-source community. The “Recycle Bin” in Windows and “Trash” in Ubuntu are both utilized to store deleted files and restore them at any time. While working in an Ubuntu, if you delete a file or directory from your system, the system moves that file to the trash folder. You can also empty your system trash to get rid of unwanted folders and files. This operation will also free up some space from your system that can store other crucial data.

        Each Linux distribution has its methods for emptying the trash. This article will show you how to empty trash from Ubuntu terminal using two different methods. So let’s start!

      • Creating A User with Different Home Directory in Linux

        Linux is a powerful multi-user operating system. It can have many concurrent users accessing the system at the same time. The system admin can manage permissions for each user to specify which user can access what part of the system.

        This guide will demonstrate how to create a new user with a different home directory in Linux.

      • How to Play DVD in Ubuntu

        Ubuntu lies in the top distributions of Linux because of its functionalities and user-friendly behavior. This distribution of Linux supports all the tools and offers the features that any other famous operating system does have, some packages and tools come with built in support, but other useful tools can be downloaded and installed from the Ubuntu repository. For instance, the DVD playing support in Ubuntu is not available by default; however, you can get the required library for playing DVD. Although Ubuntu comes with a lot of extra tool support by getting the Ubuntu Restricted Extras, it may not allow you to play the DVD on your system. In this article, we have demonstrated the method that enables the users to play DVD in Ubuntu:

      • Xrdp configuration on Debian

        This tutorial explains how to install XRDP (X Remote Desktop Protocol) to graphically connect to a Linux device from a Microsoft Windows device.

      • How to Setup NTP Server and Client on Ubuntu

        NTP stands for Network Time Protocol which is utilized for synchronizing all system clocks in a network at the same time. NTP works as a protocol and handles the programs related to client and server synchronization on networked systems. It is a part of the standard TCP/IP protocol suite and is considered one of its oldest components.

        Fraction of inaccurate time can cause a lot of issues for your system. For instance, distributed processes rely on synchronized time to ensure that proper sequences should be followed. Consistent timekeeping across the network is required for security features to work. File-system upgrades involving many machines are dependent on synchronized clock times as well. Troubleshoot problems, monitor performance, network acceleration, and network management systems; all of these tasks rely on the precision of timestamps.

        Now, we will show you how to set up NTP Server and Client on an Ubuntu system. So let’s start!

      • How to add programs to Ubuntu Desktop

        Operating Systems provide as much ease as they can give to users without compromising the basic functionality or working mechanism of the system. Windows operating system wins the lead in this regard, as it is pretty much easy for a user to use, and a lot of customization options are available. It is not like you cannot perform those tasks on other OS; you can, but in a different or you can say in a tricky manner. For instance, if you want to move or copy a file from one directory to another directory, you cannot simply drag and drop in Ubuntu 20.04 as you do in windows. Similarly, if you want to take the shortcut of any application on Ubuntu Desktop, you have to follow a tricky procedure to perform this action. This article is focused on adding programs to Ubuntu Desktop from other directories to Ubuntu Desktop, and a step-by-step guide is provided to do this task effectively.

      • Replace smart quotes with the Linux sed command

        As computers became popular in the mid-twentieth century, the orientation was often abandoned. The original character set of computers didn’t have much room to spare, so it makes sense that two double-quotes and two single-quotes were reduced down to just one of each in the ASCII specification. These days the common character set is Unicode, with plenty of space for lots of fancy quotation marks and apostrophes, but many people have become used to the minimalism of just one character for both opening and closing quotes. Besides that, computers actually see the different kinds of quotation marks and apostrophes as distinct characters. In other words, to a copmuter the right double quote is different from the left double quote or a straight quote.

      • How to Setup Dual Monitor on Ubuntu

        Dual Monitor setup is connecting two monitors to your computer or laptop. Most people now require numerous screens or monitors connected to their computer as minimal need for multitasking. We can set up dual monitors in both Windows and Linux. Here I will provide you the procedure on how to set up a dual monitor on Ubuntu (Linux).

        Two approaches are provided below to setup a dual monitor on Ubuntu, you can choose the one you find convenient for you.

    • Games

      • Pygame: Video Games

        Pygame is a module in Python used for video game design; these video games range from a simple tic tac toe to space fighters. Whether you want to design a simple game or a complicated one, you have to start with the basics of how Pygame works. In this tutorial, we will review the basics of Pygame by creating a video game.

      • Wild time-looping adventure Kraken Academy!! is out now | GamingOnLinux

        A high school like no other with ghosts, cultists, crocodiles and something about a magical kraken that can manipulate time. Kraken Academy!! sounds nuts and it’s out now. Developed by Happy Broccoli Games, a small indie outfit from Germany.

        Something fishy is going on with a threat of impending doom so you, a high-schooler, join forces with this magical Kraken to find out who the traitor is that’s planning to destroy everything. A pretty standard day at Kraken Academy!! by the sounds of it, what else do you expect from such a place?

      • Classic 1997 adventure Voodoo Kid gets a Linux release with Boxedwine | GamingOnLinux

        Originally published by Infogrames back in 1997, Voodoo Kid is a classic 1997 point and click adventure which recently saw a re-release earlier in April 2021 and now it’s on Linux too. A title that likely went under the radar for many, it’s good to see another classic get new life so more people can experience this gem.

        Funnily enough, this is one game that got mentioned in an older Sunday Section here on GOL where Digital Theory mentioned it would be coming. This release uses special software called Boxedwine, which is an “emulator that runs Windows applications” that they say is a little closer to DOSBox with it providing an “unmodified 32-bit version of Wine, and emulating the Linux kernel and CPU”. So it uses Wine and Linux to create an environment to run old Windows games on Linux, macOS and Windows.

      • Psychological horror detective adventure Saint Kotar to release on October 28 | GamingOnLinux

        Following on from a successful Kickstarter campaign and Red Martyr Entertainment teaming up with publisher SOEDESCO, their psychological horror detective Saint Kotar is set to release on October 28.

        “In this story-and-choice driven psychological horror detective game, you play as Benedek and Nikolay – two troubled godly men in search for their missing relative in an ancient God-devoted town called Sveti Kotar. Here, an unknown presence preys upon the weak and sways on devil worship and witchcraft. Evidence points to your missing relative being involved in the grisly murders and the occult, but what is the truth? Are you also to blame for what happened?”

      • Version 0.11 is out for Veloren, a multiplayer voxel RPG written in Rust | GamingOnLinux

        Veloren continues to impress as an upcoming in-development free and open source multiplayer voxel RPG written in Rust. Inspired by the likes of Cube World, Legend of Zelda: Breath of the Wild, Dwarf Fortress and Minecraft it’s starting to really come together with version 0.11 that’s out now.

        The developer says the big focus on this version was to make combat feel more dynamic with a new spot system, plus lots of tweak to NPC and mob behaviour. One of the core developers said “I’m most excited about 0.11 because it finally starts to tie together some of the grander themes and plans that we’ve always had for the game: a sense of freedom, adventure, and place within a dynamic, open world without scripted events or hard-coded locations.”.

      • Linux for Starters: Your Guide to Linux – Gaming – Part 17

        This is a series that offers a gentle introduction to Linux for newcomers.

        “Can I game on it” is a frequently asked question we hear from Windows users toying with the idea of trying Linux for the first time. Well, the simple answer is yes!

        In the eyes of many computer users, Linux is perceived as largely functional, mostly restricted to running servers, office tasks and web browsing. However, a wide and ever growing range of native Linux games are available, but given the range, there are a number of locations where you pick them up. Whatever type of game you like, there’s lots to choose from including the latest games as well as classics and remastered titles.

    • Distributions

      • postmarketOS Release: v21.06 Service Pack 2

        The second service pack for postmarketOS v21.06 has been released. As usually, it brings improvements from edge to the stable release of postmarketOS, after careful testing by developers and brave community members on living on the edge.

      • Reviews

        • Review: Archcraft 2021.06.06

          I feel that I don’t have a lot to say about Archcraft and I feel this is because the distribution doesn’t, for better or worse, attempt to do much. The project’s website is understated, claiming to offer a minimal distribution based on Arch Linux with a lightweight window manager and yay for acquiring software from the AUR. This is what we get, along with the friendly Calamares system installer. There isn’t much else to look at, out of the box.

          This seems to be the point, really, of Archcraft – it delivers a fairly minimum base, low RAM consumption, and offers better than average performance. It isn’t particularly flashy, convenient, or full of features. The idea appears to be that users can build their system from a small foundation and add the pieces they need. There isn’t a lot of documentation and I suspect we are expected to seek out the Arch Linux wiki if we need help.

          Most of the time Archcraft takes on this role fairly well. I did have a few complaints though. Personally, I’m not a fan of system monitors built into the panel or desktop. I find them distracting and the ones used by default don’t provide information I find all that useful. There are a lot of little configuration tools and, oddly enough, some duplication in functionality in the application menu. I’m not sure why we need three application menus, two file managers, and a couple of text editors in what is otherwise a very minimal platform.

          In short, Archcraft does what it sets out to do. It’s basically Arch Linux with a window manager and yay pre-installed for us. This works and yet I don’t feel the distribution distinguishes itself from the many other minimal Arch-installed-via-Calamares distributions currently available.

      • IBM/Red Hat/Fedora

        • Fedora 35 Release Date and Expected New Features

          The expected release date for Fedora 35 beta is 14th September 2021. But, if delayed, the next planned date is 21st September 2021.

          After the public beta testing, the final release has been planned for 19th October 2021, with a delayed date for 26th October 2021.

          Of course, you can get your hands on Fedora 35 before the final and beta releases as well. But, considering it is just a few days away from its first beta release, you may want to wait it out.

        • How to explain DevSecOps in plain English

          Just as DevOps transformed how many IT shops build, deploy, and maintain software, DevSecOps – short for development, security, and operations – is changing how they secure that same software.

          As the closely linked terms DevOps and DevSecOps suggest, there’s a lineage here.

          “DevSecOps is building upon DevOps, the practice of combining software development with more traditional IT operations,” says Sean Wright, lead application security SME at Immersive Labs.

    • Devices/Embedded

      • Mobile Systems/Mobile Applications

        • Best Free Android Apps: FBReader – multiplatform e-book reader

          FBReader is a slick e-book reader.

          FBReader is fast and highly customizable. You can use external TrueType/OpenType fonts and custom backgrounds, the screen brightness can be adjusted while reading (slide finger up/down along the left screen edge), and different day/night colour schemes can be selected.

          You can add custom OPDS catalogs such as Project Gutenberg (shown in the middle image below).

    • Free, Libre, and Open Source Software

      • LedgerSMB: Accounting and ERP Platform for business

        LedgerSMB is an open source web-based ERP system and accounting software for small and medium-sized companies. It helps the accounting team in order processing, integrating invoicing, quotation, and more.

        The main purpose for this software is to provide a strong multi-currency accounting to improve your business.

        It is used for any business used the basic accounting functionalities such as track invoices and their payments, inventory, and more. It is used from many companies around the world.

        LedgerSMB is a browser-based UI that help accounting team to directly send orders and invoices as a PDF attachment from built in email to the customer, vendors.

      • 20 Free Open-source Time Tracker Solutions To boost your Productivity

        Tracking your time, tasks, and progress is a necessity. Some project management tools have built-in time tracker and time management tools, but what if you want the time management and tracking as a separate software package?

      • Web Browsers

        • Mozilla

          • SD Times news digest: JetBrains launches DataSpell, an IDE for data scientists, Firefox 92 released, Apache weekly roundup

            The new Firefox 92 release offers more secure connections, offering many new features and fixes.

            Firefox can now upgrade using HTTPS RR as Alt-Svc headers, full-range color levels are now supported for video playback on many systems, Mac users can now access the macOS share options from the Firefox File menu, and support for images containing ICC v4 profiles is enabled on macOS.

            In terms of fixes, Firefox performance with screen readers and other accessibility tools is no longer severely degraded if Mozilla Thunderbird is installed or updated after Firefox. An open alert in a tab no longer causes performance issues in other tabs that are using the same process.

      • Programming/Development

        • How can I encrypt/protect JavaScript source code

          JavaScript is the most popular web programming language that comes with a lot of useful features. One of these features is immediate parsing i.e the browser executes the code as it downloads the content. This makes it browser interpreted or client side programming language. Therefore, it works on the client machine and hence making it difficult to hide the code from the client.
          Immediate parsing has its perks but it also comes with major downsides. As the source code is easily visible, everyone can read it. This can cause major security risks and hence the code needs to be protected.

          Sometimes you want to protect your JavaScript code from hackers, and sometimes you want to showcase an application but at the same time you don’t want your code to be copied. In this article, we’ll learn how to protect your JavaScript code and decrease the security risk.

        • How to Show or Hide an Element on Website using JavaScript

          Throughout web development, users need to hide or show some elements. These elements can be a button, some animation, or a navigation bar etc. Most of the time the user wants a button or a navigation bar to be visible for the desktop viewpoint but not for the mobile viewpoint.

          With JavaScript, users can easily hide or show an element on the webpage, depending on the behavior of the user. In this article we’ll see how JavaScript is used for this purpose.

        • How to Remove Elements from an Array in JavaScript

          Arrays allow us to store similar kind of data in a single variable. We can then iterate over the data stored in the arrays and perform different functions to manipulate the data according to our needs. A single piece of data in an array is known as its element. JavaScript gives us the option to add and remove elements from an array after we have declared and initialized it. In this post we will only focus on the methods which can be used removing an element from an array.

          JavaScript provides numerous methods which can be used to remove array elements; In this post we will discuss four such methods.

        • How to Loop/Iterate Through an Array in JavaScript

          Loops are key components of every programming language. They are used to run the same code or logic again and again in a cycle. Usually loops have an index value which is different each time the loop repeats. There are different kinds of loops available in JavaScript which help us iterate over an array. An array is a collection that is used to store different elements;

        • How to Minify (Compress) JavaScript Code

          To compress or minify a code means removing all the irrelevant characters from your source code without changing its functionality. These characters include white spaces, comments, new line characters, semicolons etc. But why is minimization of your code necessary? Well, it reduces the size to lesser kilobytes. Hence, making the loading of your website faster and providing the user an amazing experience.

          Various developers write well structured code with spaces and comments. This makes their code understandable. But, at the same time it creates extra space and hence increases the load time.

          This is why minimization of code is extremely useful in JavaScript as it reduces the size of the page. This minimized version provides better functionality without any additional network traffic.

        • How to Read, Write and Parse JSON in JavaScript

          The full form for JSON is JavaScript Object Notation and it is derived from the JavaScript programming language. A standard text format that defines the structured data is based on JavaScript object syntax. Transmission of data in web applications takes place through JSON. Have you heard about JavaScript object literal syntax? Yeah, JSON resembles it in a close manner. We are not limited to use it always with JavaScript.

        • How Do I Delete a Specific Row in PostgreSQL?

          Whenever we talk about the data storage of any website or application, postgresql comes to our mind. This database supports both JSON and SQL querying. Postgresql is customizable, and you can add many services and plugins you think are not present in postgresql, and you need them for your project. If you want to select specific rows to be deleted, postgresql allows you to use the command having Delete statement with “where” command. We have quoted a sequence of examples here in psql and pgAdmin as well.

        • Can You Delete a Vector in C++?

          Yes! Yes, but it does not go without constraints. There are two ways of deleting a vector. Again they do not go without constraints. One way of deleting a vector is to use the destructor of the vector. In this case, all the elements are deleted, but the name of the vector is not deleted. The second way to delete a vector is just to let it go out of scope. Normally, any non-static object declared in a scope dies when it goes out of scope. This means that the object cannot be accessed in a nesting scope (block). A nesting scope is an outer scope (block). A nested scope is an inner scope, which is still part of the scope of interest. These two ways of deleting a vector are discussed in this article.

        • C++ Vector Clear vs Erase

          The C++ vector has many member functions. Two of them are clear() and erase(). clear() “removes” all the elements of the vector. erase() “removes” a single element or a range of elements. There are two overloaded variants of the erase() member function for the vector.

          The title of this article is actually “Vector clear() Member Function versus Vector erase() Member Function, in C++”. This is a comparison of the two-member functions. It deals with when to use which, how to use which, and under which conditions either is used.

        • Perl/Raku

          • Russ Allbery: DocKnot 5.00

            This release is the culmination of a project that I’ve been wanting to do for two years, but nearly all the work was done in the past week. That experience made me rethink some of my skepticism, but I’ll get to that part of the story later.

            In March of 1999, I got tired of writing HTML by hand and wrote a small program called spin that implemented a macro language that translated into HTML. This makes it one of the oldest programs for which I have a continuous development history, predating podlators by three months. I think only News::Gateway (now very dormant) and Term::ANSIColor (still under active development but very stable) are older, as long as I’m not counting orphaned packages like newsyslog.

            I’ve used spin continuously ever since. It’s grown features and an ecosystem of somewhat hackish scripts to do web publishing things I’ve wanted over the years: journal entries like this one, book reviews, a simple gallery (with some now-unfortunate decisions about maximum image size), RSS feeds, and translation of lots of different input files into HTML. But the core program itself, in all those years, has been one single Perl script written mostly in my Perl coding style from the early 2000s before I read Perl Best Practices.

        • Python

          • How I rediscovered Logo with the Python Turtle module | Opensource.com

            When I was in high school, one of the very first programming languages I was introduced to was Logo. It was interactive and visual. With basic movement commands, you could have your cursor (“turtle”) draw basic shapes and intricate patterns. It was a great way to introduce the compelling concept of an algorithm—a series of instructions for a computer to execute.

  • Leftovers

    • Science

      • Right to contest automated AI decision under review as part of UK government data protection consultation [Ed: Can we stop calling "computers" and "programs" just "Hey Hi"?]

        The UK government has launched a consultation that suggests it could water down individuals’ rights to challenge decisions made about them by artificial intelligence.

        In documents released today, the Department for Digital, Culture, Media & Sport (DCMS) said that the need “to provide human review [of AI decisions] may, in future, not be practicable or proportionate.”

        In the UK’s current implementation of the EU’s General Data Protection Directive (via the Data Protection Act 2018), people have a right to not be subject to a solely automated decision-making process with significant effects. However, these rights should be reviewed, according to a consultation [PDF] launched by the DCMS.

    • Education

      • Sweden risks brain drain with ‘crazy’ post-PhD residency rules

        As postdoctoral research positions in academia or industry rarely last longer than a year, although they can be extended on a rolling basis, the new rules could cause an exodus of overseas doctoral graduates, warned Jenny Iao-Jörgensen, chair of Sweden’s National Doctoral Candidate Association, part of the Swedish Association of University Teachers and Researchers.

    • Hardware

      • Massive Cleaning Effort Saves Acid-Drenched Atari

        Anyone who’s ever had to deal with the aftermath of a leaking battery knows how much damage such a failure can cause. Degrading batteries leak corrosive chemicals that eat away PCB traces, clog up connectors and generally leave everything looking nasty. Getting your gadget working again usually calls for lots of scrubbing, followed by patiently tracing suspect connections and restoring any broken ones.

        We doubt, however, that anyone has ever gone through as much effort as [Lee Smith] has on his Atari 800 XL. This example was listed on eBay in a severely damaged state, having been stored under an entire box of leaking batteries. [Lee] put in a bid and, to his own bemusement, won the auction. He was now the proud owner of a classic gaming machine which was covered in a thick brown crust of battery residue.

    • Integrity/Availability

      • Proprietary

        • Security

          • BrakTooth vulnerabilities impact closed-source Bluetooth stacks used in chips from Espressif, Intel, Qualcomm… – CNX Software

            BrakTooth is a family of new security vulnerabilities in commercial, closed-source Bluetooth Classic stacks that range from denial of service (DoS) via firmware crashes and deadlocks to arbitrary code execution (ACE) in certain IoT devices.

            A team from Singapore has discovered 16 new security vulnerabilities after evaluating 13 Bluetooth devices from 11 vendors, but after browsing through the list of certified Bluetooth devices with impacted processors, they estimate it could impact 1400 devices.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • Trend Micro detected nearly 13 million malware events targeting Linux-based cloud environments [Ed: This self-promotional FUD is still peddled by some sites almost a fortnight later]

              Trend Micro Incorporated, a global cybersecurity firm, released new research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape.

          • Privacy/Surveillance

            • LA cops told to harvest social media handles from people they stop, suspect or not

              Los Angeles police are instructed to collect social media details from people they stop and talk to, even if those civilians aren’t suspected of breaking the law, according to documents finally revealed after a lengthy legal battle.

              The Brennan Center for Justice, a non-profit institute at New York University, last year submitted a request [PDF] under the California Public Records Act for information on LAPD’s use of social media to monitor people and groups.

              The center hauled the police department into the US state’s superior court when its request was not fulfilled, and the cops relented.

              Having at last obtained that information from LAPD, the center on Wednesday published all 6,000 pages of it.

            • Facebook: Taping Over Camera LED On Our Glasses Is A TOS Violation

              Facebook has teamed up with Ray-Ban to come up with a pair of smart sun glasses that absolutely nobody asked for.

              The design is as creepy as it is familiar. There’s a tiny, spy-sized camera mounted to the sunglasses frame so everybody can creep on their neighbor while going unnoticed. No fancy augmented reality here — they’re essentially a smartphone camera strapped to a pair of glasses.

              With a track record as abysmal as Facebook’s when it comes to privacy, the announcement shouldn’t come as too much of a shock — but you’d really think they would know better by now. Did we mention they cost $299?

            • What to Expect From the Future of Entertainment

              The best way to anticipate the future is to look at how behaviors among the young differ from older generations in order to pinpoint where changes are occuring.

              When it comes to entertainment, this suggests a substantially different content mix than the current landscape, with current media giants wise to pay attention to the new ways content is being consumed.

              By that, we don’t mean just streaming video. As can be seen when comparing age groups across the services they report usiing most in a week, exclusive survey data from GetWizer Consumer Insights for VIP+’s “Demographic Divide” report shows there are video formats overall in the top 30, as the emergence of large-scale streaming platforms sees younger generations watching a few and doing other things with their entertainment time.

            • TikTok Fights Off Copycat Competition, Data Suggests

              Sensor Tower numbers show that in May, June and July, TikTok has been the most downloaded social app globally, attracting 208.9 million downloads across the App Store and Google Play during that time frame.

    • Defence/Aggression

      • Opinion | From Our Post-9/11 Archive: ‘Granfalloons, Toy Balloons, and American Flags’

        A CD editorial note: The following article, first published on September 26, 2001 and part of our “Post-9/11 Archive,” was among the most-read articles featured on Common Dreams in the immediate wake of the attacks that took place in New York City and Washington, D.C. on September 11, 2001. As the world reflects on those events that took place 20 years ago, we’re re-posting a selection from the archive to acknowledge and celebrate the salient and prescient voices from that time.

      • 9/11: The Doctrines of Bush, Obama, Trump & Biden

        Richard Falk: The attack itself on 9/11 was a most momentous event from the perspective of international relations, undermining the dominating historic role of hard power under the control of national governments in explaining historical agency.

        Dramatically, 9/11 revealed the vulnerability of the most powerful country, as measured by military capabilities and global security hegemony, in all of world history, to the violent tactics of non-state combatants in coercive interactions labeled by war planners as ‘asymmetric warfare.’

      • Long-Secret FBI Report Reveals New Connections Between 9/11 Hijackers and Saudi Religious Officials in U.S.

        A long-suppressed FBI report on Saudi Arabia’s connections to the 9/11 plot has revealed that Saudi religious officials stationed in the United States had more significant connections to two of the hijackers than has been previously known.

        The 2016 report was released late Saturday night under an executive order from President Joe Biden, who promised to make it public no later than the 20th anniversary of the Sept. 11 attacks that killed 2,977 people and injured more than 6,000 others. The 16-page document was a final inventory of circumstantial evidence and leads from the FBI’s investigation of Saudi ties to the plot; it was heavily redacted.

      • FBI Releases First Declassified 9/11 Document Following Biden Order

        The Federal Bureau of Investigation on Saturday night released a previously withheld document related to its probe of the September 11, 2001 attacks and allegations of Saudi government support for the plane hijackers.

        The 16-page document, which was written in 2016 and remains heavily redacted, is the first of several classified records expected to be published in the coming months following an executive order issued last week by U.S. President Joe Biden.

      • Investigations Find No Proof of Bombs in Car Targeted by US Drone in Afghanistan
      • Central America’s Forgotten History
      • IAEA will have no access to surveillance camera footage in Iran-state-run TV

        The International Atomic Energy Agency (IAEA) will have no access to footage captured by surveillance cameras at Iranian nuclear sites, Iran’s state-run Press TV channel said on Twitter on Saturday.

        The channel added that an “informed source rejects reports suggesting that Iran may reconsider (its) decision on IAEA access restrictions.”

    • Environment

      • Record number of environmental activists murdered

        227 people were killed around the world in 2020, the highest number recorded for a second consecutive year, the report from Global Witness said.

        Almost a third of the murders were reportedly linked to resource exploitation – logging, mining, large-scale agribusiness, hydroelectric dams and other infrastructure.

      • Energy

        • Former Top Gear Host Quits Motoring Lobby Group Over Electric Vehicle ‘Urban Myths’

          Former Top Gear host Quentin Willson has acrimoniously quit a motoring lobby group currently working with a group of MPs to stop the government’s planned phase-out of petrol and diesel cars, accusing it of spreading “old urban myths” about electric vehicles.

          Willson, who co-hosted the TV show in the 1990s with Jeremy Clarkson, announced online that he had severed ties with FairFuelUK, criticising a recent report produced by the group for containing “unforgivable howlers”.

        • Oil sector in balance as Norway votes

          Norwegians head to the polls on Monday, in a parliamentary election where the “Red-Green” opposition looks to be ahead, potentially influencing the fate of oil activities in the largest producer in Western Europe.

          According to opinion polls, a clear majority is emerging to unseat Prime Minister Erna Solberg’s centre-right government, which has ruled the Nordic country for the last eight years.

        • Harvard to divest from fossil fuels after decade of protests

          In a statement to the Harvard community, Professor Bacow suggests that recent climate-related catastrophes have convinced him of the seriousness of the situation.

        • High Natural Gas Prices Strain Europeans, Weighing on Recovery – The New York Times

          As the world struggles to recover from the pandemic, soaring natural gas prices threaten to become a drag on the economies of Europe and elsewhere. Wholesale prices for the fuel are at their highest in years — nearly five times where they were at this time in 2019, before people started falling ill with the virus.

          The high costs feed into electric power prices and have begun showing up in utility bills, weighing on consumers whose personal finances have already been strained by the pandemic. The price jumps are unusual because demand is typically relatively low in the warmer summer months, raising alarms about the prospects for further increases when demand jumps in the winter.

      • Wildlife/Nature

        • Researchers complete first-ever detailed map of global coral

          Coral Mapping-Global Atlas In this August 2018 photo provided by the Allen Coral Atlas, a shark swims on a reef in Ailinginae Atoll in the Marshall Islands. Researchers have completed a comprehensive online map of the world’s coral reefs by using more than 2 million satellite images from across the globe. The Allen Coral Atlas was named after late Microsoft co-founder Paul Allen and will act as a reference for reef conservation, marine planning and coral science as researchers try to save these fragile ecosystems that are being lost to climate change. (Greg Asner/Allen Coral Atlas via AP) (Greg Asner)

        • Wildfire Smoke Is Killing More Than 33,000 People Every Year
    • AstroTurf/Lobbying/Politics

      • Twenty Years Ago, the Mainstream Press Created the War on Terror

        How, having just witnessed the Washington foreign policy establishment’s monumental failure in the country, and having covered firsthand the war’s aimless carnage for years, could the press be eager for more of it?

        The answer lies twenty years ago in the weeks after the attack that started it all, where this same media — the same institutions, nationalist worldview, and even the same high-profile figures — were instrumental in sending the US military into Afghanistan to begin with.

      • Manchin’s Obstruction of Build Back Better Act Is ‘Absolutely Not Acceptable,’ Says Sanders

        Conservative Democratic Sen. Joe Manchin’s recent vow, repeated on Sunday morning, to oppose a reconciliation bill larger than $1.5 trillion is “absolutely not acceptable,” Senate Budget Committee Chair Bernie Sanders made clear this weekend.

        “We are not going to build bridges just so our people can live under them. No infrastructure bill without the $3.5 trillion reconciliation bill.”—Sen. Bernie Sanders

      • Trump Razed the Resettlement Infrastructure That Afghan Refugees Now Need
      • Opinion | From Our Post-9/11 Archive: ‘Bush Is Walking Into a Trap’

        A CD editorial note: The following article, first published on September 16, 2001 and part of our “Post-9/11 Archive,” was among the most-read articles featured on Common Dreams in the immediate wake of the attacks that took place in New York City and Washington, D.C. on September 11, 2001. As the world reflects on those events that took place 20 years ago, we’re re-posting a selection from the archive to acknowledge and celebrate the salient and prescient voices from that time.

      • Next Attack on the Affordable Care Act Could Wipe Out Free Preventive Care
      • Arendt and QAnon

        Since 2016, it’s been obvious that Trump himself is a purveyor of conspiracy theories, notably about a “deep state” conspiracy (which about 40% of Americans now believe) and 2020 election fraud. Republicans’ steadfast, sycophantic support for Trump, coupled with their recent decision to neither censure Taylor Greene nor strip her of her committee posts, their failure to vote to convict Trump in the Senate during the recent impeachment trial, and an ongoing, farcical “election fraud” investigation in Arizona authorized by state Republicans, confirm that they have morphed into a far-right party with a solid authoritarian base, one reminiscent of European extremist parties.

    • Censorship/Free Speech

      • Taliban smash wine bottles, destroy books after taking over Norwegian embassy

        The Taliban have taken over the Norwegian embassy in Kabul and took to smashing wine bottles and destroy books at the establishment.

        Norwegian ambassador to Iran, Sigvald Hauge, said in a tweet, “Taliban has now taken over the Norwegian Embassy in Kabul. Say they will return it to us later. But first wine bottles are to be smashed and children’s books destroyed. Guns apparently less dangerous.”

      • Australian Court Rules Media Companies Responsible for Comments on their Facebook Pages

        Some of Australia’s biggest media companies have lost a legal battle with a former youth detainee over allegedly defamatory comments posted about him on their Facebook pages. The high court has found the media groups are legally responsible as “publishers” for third parties’ comments on their Facebook pages.

    • Civil Rights/Policing

    • Monopolies

      • A comprehensive breakdown of the Epic v. Apple ruling

        On Friday, a California judge ruled on the influential Epic v. Apple lawsuit, and both sides lost. Judge Yvonne Gonzalez Rogers concluded that Apple wasn’t unfairly monopolizing the mobile app space with iOS or its in-app purchasing system, and she ordered Epic to pay damages for violating its developer agreement with Fortnite. At the same time, she ordered Apple to remove its anti-steering rules — policies banning developers from telling users about alternatives to Apple’s in-app purchase system.

      • Epic has appealed Friday’s ruling in the Epic v. Apple case

        Most notably, the judge found that Epic failed to make the case for Apple as a monopoly in the mobile gaming marketplace, which she ultimately found was the relevant market for the company’s claims. “The evidence does suggest that Apple is near the precipice of substantial market power, or monopoly power, with its considerable market share,” Judge Rogers wrote — but said the antitrust claims failed in part “because [Epic] did not focus on this topic.”

      • Sort-of Epic win as judge kills Apple ban on apps linking to outside payment systems

        Epic Games on Friday won a Pyrrhic victory against Apple in its antitrust lawsuit, with US District Judge Yvonne Gonzalez Rogers ruling that Apple must allow developers to tell customers about third-party payments systems.

        But Epic will not immediately benefit from that decision because the judge also determined that Apple has not monopolized gaming transactions and that the iGiant has the right to terminate Epic’s developer account for violating Apple’s Developer Program License Agreement.

        The ruling [PDF] does not require Apple to reinstate Epic Games’ developer account nor allow its apps back in its App Store.

      • Epic Games asks for Apple’s help to put South Korea’s alternative app payments law to work • The Register

        Epic Games has decided to put South Korea’s new law requiring Apple and Google to offer third-party payment options in their app stores to the test.

        The developer of hit game Fortnite last year picked a fight with Apple over the 30 per cent commission it charges on both apps and in-app purchases in the iOS App Store.

        Epic offered Fortnite players the chance to use in-game virtual currency to buy in-game items directly from Epic, at a price that undercut prices offered in the iOS App Store.

        Apple promptly exiled Epic from the App Store.

      • Search ‘middle finger’ on Giphy: Basically Facebook’s response to UK competition concerns over merger • The Register

        Facebook has hit back at the UK’s regulatory challenge to its decision to buy gif slinger Giphy, claiming the provisional findings by the competition watchdog are based on “fundamental errors.”

        The tech giant’s no-nonsense response was sent to the Competition and Market’s Authority (CMA) last month but has only just been made public [PDF].

        It follows publication of the CMA’s findings in August which claimed Facebook’s merger with Giphy would “harm competition between social media platforms and remove a potential challenger in the display advertising market.”

        If the CMA gets its way, it could force Facebook to unwind the deal and sell Giphy.

      • Patents

        • UKIPO gives £24m to Deloitte to revamp patent system

          The UKIPO has awarded a £23.8 million ($32.8 million) contract to Deloitte in an effort to transform its patent filing system, it was announced last Friday, September 3.

          According to the award notice published by the office, Deloitte will serve as a “strategic supplier to deliver digital services” under the terms of the contract as part of the UKIPO’s phase-one transformation.

          The office also awarded software consultancy NTT Data £7.1 million ($9.8 million) in August to offer the common technology components workstream within its transformation programme.

          The UKIPO said in April that it was embarking on a five-year programme called ‘One IPO’, which, according to the office, would transform the way services were delivered and would implement modern technology.

          CEO Tim Moss said in a statement that the UKIPO hoped to become the best IP office in the world.

          “Our transformation programme is our pledge to up our game – to deliver excellent IP services that meet the needs of our customers,” he said.

          The key to the transformation, according the UKIPO, would be a single, integrated system for all registered IP rights known as the common IP system, which would allow users to seamlessly apply for, manage, and research all of their IP in one place.

        • Hoffmann Green Cement Technologies is granted a H-P2A patent in Europe

          This issuance of a second patent for the company’s H-P2A technology, following the one granted in the United States in 2020, further strengthens the protection of Hoffmann Green Cement’s intellectual property and therefore intensifies the barriers to entry on the decarbonised cement market. Following over five years of appraisals, the H-P2A patent was validated by the European Patent Office under number 3274315.

          As a reminder, H-P2A (High Performance Alkaline Activation) is a geopolymer technology enabling low-carbon cements to be formulated, based on the co-products produced by industry, for the mortar and industrial adhesive markets.

        • Wall Street in Holding Pattern Pre-Bell as Traders Return After Labor Day Weekend

          On the losing side, Forward Pharma (FWP) shares tumbled 16% after the European Patent Office dismissed the company’s appeal against cancellation of multiple sclerosis drug patent.

        • Mid-Morning Market Update: Markets Open Lower; Avantor To Acquire Masterflex

          Forward Pharma A/S (NASDAQ: FWP) was down, falling 16% to $6.60 as investors responded negatively to the Technical Board of Appeal (TBA) of the European Patent Office (EPO), dismissing Forward’s appeal to revoke the EP2801355 patent (355 patent) following the oral hearing. The TBA had made its decision after considering Forward’s appeal against the decision of the Opposition Division and third-party submissions from several opponents.

        • What Patent Applications Signal About Green Energy Trends [Ed: Just fool’s errand: trying to assess what’s happening in a market based on patent monopolies, moreover based on data from greenwashing criminals who hijacked the EPO and try to seem like they save the planet]

          With a growing number of extreme weather events happening around the world in 2021, climate change is high on the public agenda. Climate scientists have stated that, for example, the extreme temperatures seen across the U.S. and Canada in June would be virtually impossible without global warming.

          One way in which climate change can be combated is through the development and implementation of novel technologies for generating the ever-increasing amount of energy needed by the world’s population in a more climate-friendly way.

        • Belcher Pharmaceuticals, LLC v. Hospira, Inc. (Fed. Cir. 2021) [Ed: Rader is corrupt and an extremist, stop quoting this crook.]

          Imposition of liability under the equitable doctrine of inequitable conduct (as it has been variously defined) can result in a patent being held unenforceable; for this reason, former Chief Judge Rader called it the “atomic bomb of patent law” (see Aventis Pharma S.A. v. Amphastar Pharms., Inc., 525 F.3d 1334, 1349 (Fed. Cir. 2008) (Rader, J., dissenting)). The Federal Circuit’s most recent attempt to cabin the application of the doctrine arose in Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d 1276 (Fed. Cir. 2011) (en banc), and has generally led to narrowing the application of the doctrine by requiring a showing of materiality and intent to deceive, each under a clear and convincing evidentiary standard (but imperfectly; see Regeneron Pharma., Inc. v. Merus N.V., 864 F.3d 1343, 1350 (Fed. Cir. 2017)). But sometimes even under this more exacting standard the patency of the violation is evident, as was the case in Belcher Pharmaceuticals, LLC v. Hospira, Inc. As the Christian Bible says, “no one can serve two masters,” at least not well. Matthew 6:24. But the attempt to satisfy the statutory requirements for patenting, particularly non-obviousness, can invite contradictory attempts to satisfy regulatory requirements before the FDA. And that can (and did) lead to the outcome in this case.

        • Simplifying the patent application process: a result of collaboration between CNIPA and the EPO [Ed: Associating with the #EPO is probably more of a liability and reputation risk to CNIPA (China) than the other way around]

          The European Patent Office is one of the first patent offices to cooperate with the State Intellectual Property Administration of China. For 36 years…

        • Recent wins for AI device: Patenting in era of artificial intelligence

          DABUS, short for device for the autonomous bootstrapping of unified sentience, is an artificial intelligence (AI) machine that can invent and generate new ideas without any human input.”

        • Poolbeg Pharma POLB 001 US patent assessment is going to plan [Ed: When you focus too much on patents instead of products]

          Poolbeg Pharma plc (LON:POLB), a clinical stage infectious disease pharmaceutical company with a capital light clinical model, has provided an update on the strengthening of its intellectual property (IP) position around lead product, POLB 001, a small molecule immunomodulator for the treatment of severe influenza.

          As detailed in the Admission Document, Poolbeg has a worldwide license for POLB 001 and is developing a strong IP portfolio with patent protections in place covering the use of the class of p38 MAP kinase (mitogen-activated protein kinase) inhibitors for the treatment or prevention of severe influenza and hypercytokinaemia (or “cytokine storm”). The Company continues to also evaluate POLB 001’s therapeutic uses beyond severe influenza.

        • Save Foods Inc. Receives Patent For Proprietary Compound From European Office
        • Arbitration Agreement Does Not Control Inter Partes Review Proceedings [Ed: Litigation giants-sponsored Dennis Crouch still at it, railing against patent quality by all means imaginable]

          The Supreme Court has strongly supported arbitration as an alternative dispute resolution mechanism. The Federal Arbitration Act (FAA) codifies this “liberal federal policy favoring arbitration agreements.” Quoting Moses H. Cone Mem’l Hosp. v. Mercury Constr. Corp., 460 U.S. 1, 24 (1983). Although the right to arbitrate patent cases is seemingly clear from the FAA, Congress went further in its 1982 PTO appropriations bill to expressly codify the enforcement of arbitration agreements for “any dispute relating to patent validity or infringement.” 35 U.S.C. 294. Sometimes a party subject to arbitration will still file their dispute in court. At that point, the opposing side will move to stay or dismiss the case and compel arbitration.

        • Can a Robot Invent? The Fight Around AI and Patents Explained [Ed: Patent maximalists have been hired by Bloomberg to push toxic agenda of patents for bots; this is good for monopolies and litigation companies, nobody else]

          Patent offices and courts around the world are being asked to tackle a similar question: can an artificial intelligence system qualify as an inventor for a patent?

          A test case making its way through several countries—from Saudi Arabia to Australia to Brazil—has spurred debate about advancements in artificial intelligence technology and questions about whether patent laws need to be revised to recognize machines as inventors.

          A judge in the U.S. District Court for the Eastern District of Virginia recently ruled that, under current U.S. law, AI can’t be listed as an inventor on a patent. The ruling was in line with what U.S., British, and EU patent officials have concluded.

        • U.S. District Court Holds that AI Algorithms Cannot Be Listed as Inventors on Patents | Kilpatrick Townsend & Stockton LLP – JDSupra [Ed: Just deciding the very obvious; otherwise, the patent system would soon become a total circus, like rigged Wall Street being gamed by "high-frequency" 'trading']

          As we discussed earlier, a variety of artificial intelligence (AI) technologies exist and are being used in biopharma (e.g., discovery and development of drugs, optimization of clinical trial design, identification of novel biological targets and pathways of interest, analysis and use of biomedical, clinical, and patient data, and many others). As in most industries, AI will play an increasingly larger role in biopharma patents. However, there are a number of challenges of AI in biopharma patents. One of these challenges that has recently come to the forefront is the question of inventorship.

        • DABUS was Denied Inventorship by Taiwan IPC Court [Ed: Rickrolling Taiwan? No thanks, they're not falling for it.]

          DABUS, an acronym standing for “device for the autonomous bootstrapping of unified sentience,” is a complex artificial intelligence (“AI”) system developed by Imagination Engines Inc.’s founder Dr. Stephen Thaler. Dr. Thaler and his team filed patent applications in many countries, claiming DABUS to have conceived the inventions in question.[1] Indeed, Dr. Thaler named DABUS as an inventor in patent applications.

          Most of the patent authorities which received Dr. Thaler’s cases refused to grant inventorship to an AI system. Some rejected cases were brought to the courts. Recently, the courts of South Africa and Australia recognized the inventorship of the AI system, while the UK court rejected it. The question of whether a non-human being can claim inventorship has sparked a huge controversy and has become one of the key topics of debate among the various legal communities of the world.

        • Hashtag Trending Sept. 7, 2021 – Resume scanners reject good hires; AIs can’t file for patents; Germany wants to extend smartphone lifespan [Ed: Rickrolling offices and courts for lots of media/publicity.]

          Can AIs create patents? One U.S. judge says no. The original issue stemmed from a company called Imagination Engines based in Missouri. Imagination Engines had filed two patents in 2019 under DABUS, the company’s neural network engine. The patents were rejected by the U.S. Patent and Trademark office as according to the organization, only “natural persons” can be named as patent creators. Stephen Thaler, the founder of Imagination Engines, then sued the director of the patent office at the time in federal court. The case ultimately ended with the judge siding with the patent office, but Thaler plans on continuing to advocate for AIs’ rights as patent creators.

        • UK: IP Intros: What Is Priority And Why Is It Useful?

          An invention must at least be new and inventive to be patentable. Filing a patent application before publicly disclosing an invention is essential, as a public disclosure of your own invention can mean the invention is not considered new by the patent office.

          However, before filing and prosecuting a patent application, you may not actually know whether a granted patent will be beneficial given the fact that you have not had the opportunity to publicly disclose, discuss, or share the invention with potential investors, consumers, or licensees.

        • Do You Know A Young Inventor? [Ed: EPO propaganda pandering to young people. The latest means by which to distract from the crimes of the EPO?]

          Maybe you should consider nominating him or her for the Young Inventors prize established by the EPO.

          Focus is on sustainability and problem-solving initiatives created by a young inventor aged 30 and under.

        • How to speed up EPO procedures [Ed: Corrupt (infiltrated) EPO has put speed before quality]

          The choice to speed up a procedure before the European Patent Office (EPO) is a strategic one, motivated by various factors. Shortening the duration of the procedure is particularly important for applicants involved in rapidly evolving technologies. This article discusses the options available to applicants wanting to expedite their applications through the EPO procedure.

        • Dabus is coming: Federal Court finds AI system can be inventor under Patents Act [Ed: Federal Court in Australia shows utterly poor grasp of buzzwords and the actual purpose of patent systems]

          In a recent decision, the Federal Court found that an artificial intelligence (AI) system can be an inventor for the purposes of the Patents Act 1990 (Cth) and remitted the matter back to the Commissioner of Patents for reconsideration. It is thought that this is the first time in the world that a court has decided that an AI system can be an inventor. This decision has the potential to significantly impact many industries moving forward, particularly the biotech and pharmaceutical industries.

        • Live Arguments Are Back at the Federal Circuit. So Are Rule 36 Judgments + There’s a New Sheriff in Town for SEP Contract Cases [Ed: Lawyers' income more important than public safety?]

          Live, in-person arguments are back at the Federal Circuit, but the appellate court is proceeding cautiously (and appropriately so).

        • Software Patents

          • Report details how Airbus pilots saved the day when all three flight computers failed on landing

            Airbus is to implement a software update for its A330 aircraft following an incident in 2020 where all three primary flight computers failed during landing.

            The result was a loss of thrust reversers and autobrake systems and the pilots having to use manual braking to bring the aircraft, a China Airlines A330-302, to a halt just 30 feet before the end of the runway. The incident happened at Taipei Songshan Airport on 14 June 2020.

            The flight, CI202 from Shanghai with 87 passengers and nine cabin crew members, had been uneventful. The landing, however, was anything but.

          • The AIA at 10: the good and debatably bad, according to counsel [Ed: Asking patent aggressors what they think about fake patents being thrown out by PTAB? Sounds like a work assignment for Patrick Wingrove]

            Counsel from Novartis, IBM, Siemens and Facebook say most of the changes made by the America Invents Act have been great – but not necessarily the PTAB

          • New DABUS ruling highlights rocky path for AI inventorship in US [Ed: Why are only lawyers from companies that lobby for software patents asked about this? It's not journalism and conflict of interest is all over this place.]

            Counsel at Siemens, IBM and elsewhere say the district court edict shows that tech advancements or a US law change are needed for AI inventor acceptance

          • Patenting computer simulations: an opportunity for growth in the fusion sector [Ed: After EPO tribunals were rigged by gangsters who took over the Office the big litigation firms use "simulation" as an excuse to patent software; the crimes of the EPO harm Europe a great deal]

            The UK Atomic Energy Authority (UKAEA) and the Science and Technologies Facilities Council (STFC) recently started a new collaboration to grow sophisticated computing capabilities for commercial fusion[1].

            The STFC’s Hartree Centre (where staff under the collaboration are to be based) is a UK leader in some of the most advanced computing, data and AI technologies. The collaboration is particularly hoping to exploit high performance computing and AI to solve outstanding problems for commercial reactor design, in particular digital twins of real reactors (in the future at least).

            Whilst this collaboration is exciting for a variety of reasons, from an intellectual property (IP) perspective it is interesting to look at whether the UKAEA & STFC are heading into well-tread ground or exploring uncharted territory.

      • Copyrights

        • The World’s Oldest Active Torrent Turns 18 Soon

          The world’s oldest active torrent file turns 18 years old this month and it’s still being seeded by dozens of people. “The Fanimatrix” torrent was published in 2003 when BitTorrent was still a relatively new protocol. At the time, the torrent’s creator saw it as the only affordable option to share the Matrix fan film with the world.

IRC Proceedings: Sunday, September 12, 2021

Posted in IRC Logs at 2:00 am by Needs Sunlight

Also available via the Gemini protocol at:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmQmXjRCkgpsHjsEJG22D3hCQcHumzzWpfP7Xhz76DqD4n IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmWJ1eqKq9vwSFBLa1kkVYZnPGUTCycj6EKgwYRwqDgdpn IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmfTNnp1DJJ6e9J4WNBiUiUJdNNctDdpYH31wu4pBb6kH5 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmW9iyPukxvyBRtA6hu4hgbfvperDkRLHi3fkwCzK1dYZz IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmXqwhuhoW97Fbz9Zrgug8uH526epvPGXPMPr9LLfh9rHL IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmQPRZMtNb6HStSKJv1kwxevaiX6LKdaKXavh1HvSf8Db4 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmR9QT9pjaCuqLn2saGDBBaBSdpLkeU8k1gLvDrxjdKhJr IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 Qmbw9WTHS3sXWC6Q7XQXkBNeTxxtBRLXxK68HZLGuQTHbc IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmNdAU6bFwZMUbnvK1m3e7aSwoHNFY97JdqWjpMVzvVT6V

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts