Bonum Certa Men Certa

Links 15/11/2021: Reviving Old PCs, Red Hat Software Collections 3.8



  • GNU/Linux

    • Desktop/Laptop

      • Revive Your Old Computer with GNU/Linux Made Easy

        Do you have an old desktop PC or laptop? We have happy news to you. You can reuse it, rather than throw it away or leaving it unused. To revive your computer, install a GNU/Linux operating system that supports old computers and is actively supported. This will give your old computer a fresh life once again, for general purpose, as well as for specific purpose like multimedia creativity and programming. You can receive latest software and security updates by using one of them on your old machine. Finally, we compile these choices in alphabetical order from antiX to Zorin OS that still support up to 15 years old computers a.k.a. 32-bit PCs with tens of thousands latest software packages. Happy computing!

    • Kernel Space

      • Graphics Stack

        • Dave Airlie: h264: more AMD hw worked on

          Previously I mentioned having AMD VCN h264 support. Today I added initial support for the older UVD engine[1]. This is found on chips from Vega back to SI.

          I've only tested it on my Vega so far.

          I also worked out the "correct" answer to the how to I send the reset command correctly, however the nvidia player I'm using as a demo doesn't do things that way yet, so I've forked it for now[2].

    • Instructionals/Technical

      • Command to add folder in linux path permanently - Linux Shout

        What is Environment Variable in Linux? The variable is a path of the executable files that Linux systems can recognize globally on the Command terminal or by any other application. For example, We can open firefox via the command terminal by simply typing its name rather than the whole path of the actual executable file where it resides. In the same way when we install Java its executable binary can be used by other applications easily even GUI ones.

      • Linux tips for using cron to schedule tasks | Opensource.com

        Making things happen on a regular and predictable schedule is important on computers. It's important because, as humans, we can sometimes be bad at remembering to do things reliably because we get distracted, have too much on our minds, or we're on holiday. Computers are really good at doing things on a schedule, but a human has to program the computer before the computer takes action.

        In a way, the cron system is an easy and rudimentary introduction to programming. You can make your computer do what you want it to do just by editing a file. You don't even have to know where the file is kept. You have only to type in a simple command, enter the "recipe" you want your computer to follow, and save your work. From then on, your computer executes your instructions at the specified time until it is told to stop.

        By design, cron is not a complex system. Here's what you need to know about it.

      • Running Jenkins with Docker Compose - Unixcop the Unix / Linux the admins deams

        Hello, friends. We really like Docker and Jenkins so I thought why not make a post about both? Yeah, that’s a good idea. So, in this post, you will learn how to run Jenkins with Docker Compose. The process is simple and quick to do.

      • How To Install CUDA on Linux Mint 20

        In this tutorial, we will show you how to install CUDA on Linux Mint 20. For those of you who didn’t know, The Nvidia CUDA toolkit is an extension of the GPU parallel computing platform and programming model. It allows your applications to use different types of GPUs very conveniently.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a CUDA Nvidia on a Linux Mint 20 (Ulyana).

      • How To Install Python 3.10 on Ubuntu, Debian & Linux Mint – TecAdmin

        Python is an object-oriented, high-level programming language. As of today, Python 3.10 is the latest stable version available for productions environments. Most of the Debian-based Linux distribution includes older versions of Python in software repositories. Also, the Debian packages are not available for all distributions. This tutorial has been tested on Ubuntu 20.04 Linux system.

        This tutorial will help you to how to install Python 3.10 on Ubuntu, Debian, and LinuxMint systems using source code. T

      • How to Install / Enable RPM Fusion on Fedora 35 - LinuxCapable

        RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL that a group of community volunteers maintains. RPM Fusion is not a standalone repository but an extension of Fedora’s default packages that could not be included due to Fedora being bound by the same legal restrictions as Red Hat.

        The RPM Fusion repository comes in two flavors, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.

        In the following tutorial, you will learn how to install RPM Fusion on your Fedora 35 operating system.

      • How to Uninstall Android Bloatware Without Root On Ubuntu Linux? - Fosslicious

        When buying an Android smartphone, users may notice that there are some unwanted applications (bloatware), which are installed but cannot be removed, because these applications are installed in the system. And in order to change the system rules and be able to remove the default apps installed in the system, the user needs root privileges.

        But, rooting in android in my country, can void the warranty if the smartphone was recently purchased. So I don't recommend doing this. If you don't like some of the default applications on your smartphone, users can actually disable them. But sometimes some default applications cannot be disabled.

      • How to install KernelCare and clear Kernelcare Cache in Linux - Unixcop the Unix / Linux the admins deams

        KernelCare is fabulous kernel update tool by CloudLinux. We started testing this kernel patch in a few servers and the result has been truly amazing, allowing us to avoid server downtime after kernel updates because of each server reboot we had to apply after the kernel was updated. Today we will show you how to run a KernelCare installation.

      • How to install and use Podman in Fedora 34/35

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • How to install and use Podman in OpenSUSE Leap 15.3

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • Use Ansible tags to save time on playbook runs | Enable Sysadmin

        As a frequent Ansible user, I'm always looking at ways to simplify my playbooks and save time during playbook debugging. One of my favorite features for writing robust Ansible playbooks is its support for tags. This article introduces tags, walks through some common tag scenarios, and outlines more advanced usage.

      • How to Rename Multiple Files in Linux

        In a Linux system, you can easily rename a file using mv command. But, if you have multiple files which you want to rename, in this situation you need some extra tools or built-in Linux utilities for solving this problem.

        In this tutorial, we learn the different methods to rename multiple files in a Linux system at once.

      • How to Build an E-Paper To-Do List with Raspberry Pi | Tom's Hardware

        I’ve often struggled with procrastination, and to-do applications have been lifesaving. I sometimes find myself needing a reminder to just focus on getting the most important task done before working on anything else.

        With that in mind, I created a simple photo frame to sit on my desk and remind me of my most important task of the day using e-paper and a Raspberry Pi. I wanted to use e-Paper specifically since it’s low-power and not as distracting as a standard display would be. If you’re the kind of person who likes a simple reminder of your most important tasks, here’s how to build it for yourself.

      • Install Apache JMeter on Ubuntu 20.04 LTS Focal Fossa

        Apache JMeter is open-source like any other Apache foundation project. It is meant to analyze system functional behavior by running performance tests, regression tests, stress tests, and database servers based on different technologies. However, earlier it was designed to test only web applications.

        JMeter is Java-based, hence can be used to know what would be the performance of various applications and software. It sends a request to web or application servers for different loads by simulating browser behavior. The scripting language for JMeter is Groovy (an object-oriented programming language used for the Java platform). Browser plugins are also supported in this testing platform.

      • How to View Hardware Information in Linux

        Being a Linux enthusiast implies that you are familiar with both the hardware and software entities of your system.

      • How to Run Linux Shell Command / Script in Background

        The usual style of executing a command on a Linux terminal is to simply run it and wait for it to gracefully exit. Once the command exits, you can then proceed to execute other commands in succession. This is what is known as running commands in the foreground. As the word suggests, you can visually see the output of the command on the terminal.

        Sometimes, however, running commands in the foreground can present a set of challenges. The command can take too long to exit causing you to waste precious time and other times, it can be totally attached to the shell session leaving you stuck.

        In such cases, running a command in the background is your best bet. You can send a command(s) to the background as you concurrently execute other commands in the foreground. This improves the efficiency of working on the terminal and saves you time.

        In this guide, we focus on how you can run Linux shell command or script in the background.

      • How to Capture top command output to a file

        Linux top command is widely used by Linux system administrators in real time to check system resources utilization such as CPU, disk I/O, system load average, running processes and memory utilization.

        I usually use Oracle OSWatcher Black Box (OSWbb) to collect various system data to diagnose performance issues for a period of time.

        But if you want to collect a list of processes that consume high CPU and memory on your system for a specific period of time, you can do this using the top command.

        To redirect the top command output to a text file, the top command must be executed in batch mode.

        In this guide, we will show you how to capture the top command output in files for a specific duration for troubleshooting performance issues.

    • Distributions

      • IBM/Red Hat/Fedora

        • Automation by the numbers: 11 stats to know | The Enterprisers Project

          Automation pervades most other contemporary IT trends. Cloud and cloud-native? You’re talking about automation. Security and DevSecOps? Again, you’re talking about automation. Talent and culture? Yep, you’re still talking about automation.

          IT is both in the midst of its own automation transformation and also an indispensable catalyst of organization-wide automation strategies. It’s actually difficult to exaggerate the role that automation is playing in businesses and industries of all kinds today. (The “automate all the things” meme has a kernel of truth to it.)

        • Change management: 9 ways to build resilient teams

          Resilience, in the context of psychology, refers to ability to adapt well to adversity, trauma, tragedy, or other sources of significant stress. Being resilient has benefits for both individuals and organizations – as has clearly been on display over the last two tumultuous years.

          CIOs know well how their team members’ capacity to adjust positively to workplace pressures, changes, and setbacks contributes to the IT function’s performance.

          Because resilience is a set of learnable skills and approaches rather than a fixed characteristic, there are ways that IT leaders can help to build and hone resilience among their people. “Just as with ourselves, fostering resilience in our teams is a matter of helping them build skills and mindset that support a hopeful, solution-oriented response to obstacles, challenges, and unanticipated change,” says Erika Andersen, leader readiness consultant and author of Change from the Inside Out.

          However, doing this well requires a nuanced understanding of what constitutes resilience and a deft touch in encouraging this critical capability in healthy ways. Here are some ways IT leaders can help their team members develop and deploy their resilience:

        • Red Hat Software Collections 3.8 and Red Hat Developer Toolset 11 now generally available

          The latest versions of Red Hat Software Collections and Red Hat Developer Toolset for Red Hat Enterprise Linux (RHEL) 7 are now generally available. Software Collections 3.8 delivers the latest stable versions of many popular open source runtime languages, web servers, and databases natively to the world’s leading enterprise Linux platform. These components are supported for up to five years, helping to enable a more consistent, efficient, and reliable developer experience.

          Here's a quick overview of the updated development tools and collections you'll find in this release.

        • Announcing the 2021 Call for Code Engagement Awards

          Since 2019, the Call for Code Engagement Awards have recognized organizations that have answered the call and exhibited a deep commitment to Call for Code.

          Call for Code inspires a community of change agents to build, contribute to, and deploy solutions for the most pressing global social issues and humanitarian causes. As Call for Code has grown over the last few years, so have the ways corporations and universities have stepped up and engaged with us to help drive tech-for-good solutions. These organizations help us make Call for Code solutions tangible and scalable. Some have provided pathways for their employees to participate in our global challenge. Others have hosted spot challenges to address causes that align with both their own corporate responsibility goals as well as the issues of focus for Call for Code, such as natural disasters, climate change, COVID-19, and racial justice. Whether they provided technology or data sets for challenge participants to use in their solutions, or offered deployment support for winning solutions, or brought Call for Code initiatives into the classroom as a way to engage university students, every one of our sponsors and partners has been instrumental in the success of Call for Code initiatives.

          This year a new Call for Code Ecosystem Engagement Award has been added, providing us the opportunity to also recognize non-profit organizations that are essential in ensuring Call for Code solutions are applicable to real-world problems and adopted by impacted communities to create real change.

          We’re pleased to announce the full list of 2021 Call for Code Engagement Award winners. The Call for Code team is so grateful for the collaboration and commitment from all of this year’s award recipients, as well as our dedicated sponsors.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Programming/Development

        • How to Use std::array

          The std::array notation in C++ is an alternate method of declaring and initializing the arrays in C++. However, a question might arise in your mind that when we can declare and initialize the arrays already, then why do we even need this notation in the first place? In this article, we will try to explore the answer to this question. After that, we will share some examples with you to demonstrate the usage of the std::array notation in C++ in Ubuntu 20.04.

          The std::array Notation in C++:

          We have already stated that the std::array notation in C++ is an alternate method of declaring and initializing the arrays. However, we still need to figure out the need to use this notation. Generally, there are two types of arrays in C++, i.e., static and dynamic. Both these types of arrays have their pros and cons. The static arrays lose all the information regarding their size once they are passed to a function as a pointer, whereas the dynamic arrays’ deallocation is very problematic.

          Therefore, the std::array notation is used to make the best usage of both of these types, i.e., using this particular notation, a static array never loses the information that it contains even when it is passed to a function. This is exactly why we use this notation in C++. You will learn more about the usage of this notation in C++ by going through the next section of this article.

        • Perl/Raku

        • PHP

          • PHP file_get_contents() Function

            PHP contains many built-in functions to read the content of any existing non-empty file. The file_get_contents() is one of the built-in functions of PHP to read the entire content of an existing file as a string. The syntax of this function is given below.

          • PHP in_array() Function

            Array variables are used to store multiple values where each value is accessed by using the index value. Sometimes we need to search a particular element in an array for programming purposes. The in_array() is a built-in function of PHP to search specific elements into an array. It searches data in a case-sensitive manner. The way to use this function for searching value in an array has been described in this tutorial.

          • PHP json_encode() Function

            The JSON is a popular data format that is used to serialize and transmit structured data between the web server and application because the JSON file is human-readable and lightweight. The json_encode() is a built-in function of PHP that converts the array or object into JSON data for various purposes. The various uses of this function have shown in this tutorial.

          • PHP password_verify() Function

            The password_verify() function is used to match the hash password with the original password. Another function, password_hash() is used to generate the hash value based on the hashing algorithm, cost, and salt value. The password_verify() function contains all hashing information to verify the hash with the password. The uses of this function have been shown in this tutorial by using multiple examples.

          • PHP require_once() Function

            When a PHP script is used in multiple files for programming purposes, then it is better to write the script in one file and include the file in those files without writing where the script is required. PHP has many built-in functions to include any existing file in a script. These are require(), require_once(), include(), and include_once().

            The task of require() and require_once() are the same, but the one difference is that the require() function does not check the file has been included before or not but the require_once() function check the file has been included before or not. If the file has been included in the script before, then the require_once() function will not include the same file again. How the require_once() function is used to include files in PHP has been shown in this tutorial.

          • PHP unset() Function

            The unset() function is used to reset any variable that has been defined earlier. Two types of variables are used in any programming language. One is a global variable and another is a local variable. The variable defined outside the function is called a global variable that is accessible from anywhere in the script. The variable defined inside the function is called a local variable that is accessible inside the function only.

            If the unset function is used for the local and global variables, then it resets both variables locally. That means the value of the global variable remains unchanged that was defined before changing inside the function. The $GLOBALS array or global keyword can be used to unset the global variable permanently. The uses of this function to reset PHP variables have shown in this tutorial.

          • PHP var_dump() Function

            The var_dump() function is a built-in function of PHP to find out the information about the value and data type of one or more variables. It also provides information about the length of the data for the string variable. The information about both scalar and compound variables can be retrieved by using this function. Different uses of this function have been shown in this tutorial.

  • Leftovers

    • Education

    • Health/Nutrition/Agriculture

    • Integrity/Availability

    • Defence/Aggression

    • Environment

      • Opinion | As Climate Emergency Worsens, Freak Storm Sends Snow, Scorpion Plague on Egypt's Aswan

        How freakish and biblical our climate emergency could become was illustrated this week in the Upper Egyptian city of Aswan, which was struck in November by rolling lightning storms, downpours, snow, and a plague of scorpions. High winds blew the deadly Egyptian black, fat-tailed scorpions from the surrounding desert into the city and into people’s homes. The scorpions killed three persons with their venom and left hundreds sickened, as Egyptian rescue crews tried to distribute the antidote.

      • Opinion | Biden-Xi Summit Seeks to Avoid 'Clash of the Titans' Moment

        U.S. President Joe Biden and Chinese President Xi Jinping are expected to hold a virtual summit on Monday evening, their most high-profile meeting yet following phone calls in February and September. It comes at a moment of immense uncertainty and flux in the U.S.-China relationship, and its outcome has the potential to set the two sides on a course they will follow for the remainder of Biden's presidency, for better or for worse.

      • Energy

        • Stately Deception: Obama at COP26

          “Collectively and individually we are still falling short,” bellowed Obama, in his signature manner. “We have not done nearly enough to address this crisis. We are going to have to do more. Whether that happens or not to a large degree is going to depend on you.”

          The crux of Obama’s speech was directed at the world’s youth, placing the burden of curtailing climate change on their shoulders. No doubt, if the planet's young people were in charge of COP26, there wouldn’t be empty pledges and sneaky cop-outs (like the US/India/China/Russia refusing to end their coal production), there would be tangible goals, and harsh, real-world consequences for not abiding by these agreements.

        • Why China’s cryptocurrency ban is an opportunity for India?

          China’s latest blanket ban did send the [cryptocurrency] space in a tizzy for a while. But then, don’t we already know that Bitcoin and Altcoins are particularly good at ‘bouncing back’.

          Speculations and possibilities aside, China’s [cryptocurrency] crackdown in 2021 has been rather uncompromising. Despite being considered a running joke by experts, which is to fade out in time, the tough approach hasn’t been all that pleasant for the traders. With the latest announcement coming in with disparate figures, exchanges like CoinSwitch Kuber reported an almost 30 per cent fall in weekend transactions immediately after the ban was reported.

        • Karnataka Bitcoin scam: Arrested accused hacked Bitfinex exchange twice

          Meanwhile, former Karnataka chief minister and Congress leader Siddaramaiah alleged that politicians and officials were involved in a Bitcoin scam in the state. Siddaramaiah has also claimed that there was an effort to cover up the alleged scam but did not mention who the politicians were.

          However, the Karnataka government has referred 'bitcoin scam' to the Enforcement Directorate (ED) and Central Bureau of Investigation (CBI) because of the international nature of transactions.

    • Finance

    • AstroTurf/Lobbying/Politics

      • If You Don’t Give People a Reason to Vote, They Won’t

        Finding reasons for local or state elections in national politics won’t necessarily produce a full picture, particularly in New Jersey, where voters have the habit of electing Democratic congressional and state legislative delegations, consistently voting Democrat in presidential elections but often voting for Republican governors. This time around, particularly in the New York City mayoral race and local races in the city’s Long Island suburbs, unfounded fears of crime waves that largely existed only in the feverish imaginations of right-wing commentators seemed to have tipped more than a few votes. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Do Not Underestimate Evangelical Politicians In Latin America

        In the past two decades evangelicals in Latin America have gone from being marginalised foreign missionaries to powerful political mouthpieces. Explaining their rise as a religious phenomenon in which the lively “garage churches” of poor urban neighbourhoods displaced the theologically stick-in-the-mud Catholic church isn’t very enlightening. In quantitative terms, it seems simple enough: they’ve turned their numerical heft into political capital. But the important point is that the political arena in which they operate is neoliberalism for which, as a kind of theological superstructure or at least justification, they’ve become one of the Hydra’s many monstruous heads.

        To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Opinion | We Need to Shut Down ICE's Mass Immigration Detention Machine

        Every day, ICE locks up over 20,000 people in a sprawling nationwide network of more than 200 detention facilities. The ACLU believes that this system of mass incarceration of immigrants should be dismantled—it's unnecessary and inhumane. For as long as ICE maintains its detention network, though, it has a responsibility to create an oversight system that is actually effective at detecting, addressing, and deterring abuse of detained people. Our analysis of recent ICE inspection documents shows that ICE's inspection system remains ineffective at identifying violations by detention facilities and ensuring compliance with detention standards, allowing facilities with clear records of poor conditions, including some of the deadliest facilities, such as the Stewart Detention Facility in Georgia, to evade accountability.

      • Inside Nicaragua’s 2021 elections – and the latest US/OAS coup attempt
      • Tech disputes at Rittenhouse trial not new issue for courts

        Rittenhouse's defense, though, argued that the method used by a state investigator to enlarge the photos couldn't be trusted to accurately show Rittenhouse's actions.

        James Armstrong, a senior forensic imaging specialist with the Wisconsin State Crime Lab, acknowledged on the stand Thursday that enlarging an image requires the addition of pixels. But prosecutors said the software Armstrong used is widely accepted - as is the method he used to enlarge the photos.

        Software programs used to analyze video evidence provide several ways to enlarge photo or videos, based on algorithms. The attorneys' debate over which is more accurate created a technical slog as testimony wound down this week.

    • Misinformation/Disinformation

      • WTF happened to The BMJ?

        The British Medical Journal€ (now€ The BMJ) is one of the oldest and most respected medical journals in the world that also has a history of publishing some excellent investigative journalism. For instance, over a decade ago, it was€ The BMJ€ that published investigative journalist Brian Deer’s articles€ recounting the strong evidence indicating that Wakefield’s case series published in€ The Lancet€ that linked the measles-mumps-rubella (MMR) vaccine to autism was based on fraud. That study launched the modern iteration of the antivaccine movement and is, as I like to say, the study that launched a thousand quackeries directed at autistic children to “cure” them of their “vaccine-induced autism.” The headline of Deer’s accompanying commentary after his account of how the “case against the MMR was fixed” even referred to Wakefield’s study as “Piltdown medicine“, after the€ infamous Piltdown Man fraud.€ 

    • Civil Rights/Policing

      • Infiltrating Amazon: What I learned going undercover at the corporate giant

        I thought this was a critical moment to stop merely reading about the abuses Amazon workers face, and to work there myself, while hiding my identity as an organizer who advocates for workers’ rights. I wanted to understand on the ground level what the work environment is like. Most importantly, I wanted to understand what kind of organization we will need to challenge and confront not only Amazon, but the entire system of just-in-time delivery and logistics, which has become central to our contemporary economy and its accompanying inequalities.

    • Monopolies

      • Copyrights

        • Piracy Release Group EVO 'Blames' Movie Industry For Its Popularity

          P2P release group EVO has built quite a reputation in recent years by being the first to release pirated copies of screeners and popular movies. But what drives the group to take such an immense risk? Talking to TorrentFreak, EVO says that it's mostly fun and partly motivated by Hollywood's profit focus.



Recent Techrights' Posts

FSFE (Ja, Das Gulag Deutschland) Has Lost Its Tongue
Articles/month
Ian Jackson & Debian reject mediation
Reprinted with permission from disguised.work
How to get selected for Outreachy internships
Reprinted with permission from disguised.work
Red Hat Corporate Communications is "Red" Now
Also notice they offer just two options: MICROSOFT or... MICROSOFT!
Links 26/04/2024: XBox Sales Have Collapsed, Facebook's Shares Collapse Too
Links for the day
 
Almost 2,700 New Posts Since Upgrading to Static Site 7 Months Ago, Still Getting More Productive Over Time
We've come a long way since last autumn
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 26, 2024
IRC logs for Friday, April 26, 2024
Overpaid lawyer & Debian miss WIPO deadline
Reprinted with permission from disguised.work
Brian Gupta & Debian: WIPO claim botched, suspended
Reprinted with permission from disguised.work
Microsoft's XBox is Dying (For Second Year in a Row Over 30% Drop in Hardware Sales)
they boast about fake numbers or very deliberately misleading numbers that represent two companies, not one
[Meme] Granting a Million Monopolies in Europe (to Non-European Companies) at Europe's Expense
Financialization of the EPO
Salary Adjustment Procedure at the EPO Challenged
the EPO must properly compensate staff in order to attract and retain suitably skilled examiners
Links 26/04/2024: Surveillance Abundant, Restoring Net Neutrality Rules (US)
Links for the day
Gemini Links 26/04/2024: uConsole and EXWM and stdu 1.0.0
Links for the day
Albanian women, Brazilian women & Debian Outreachy racism under Chris Lamb
Reprinted with permission from disguised.work
Microsoft-Funded 'News' Site: XBox Hardware Revenue Declined by 31%
Ignore the ludicrous media spin
Mark Shuttleworth, Elio Qoshi & Debian/Ubuntu underage girls
Reprinted with permission from disguised.work
Karen Sandler, Outreachy & Debian Money in Albania
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 25, 2024
IRC logs for Thursday, April 25, 2024
Links 26/04/2024: Facebook Collapses, Kangaroo Courts for Patents, BlizzCon Canceled Under Microsoft
Links for the day
Gemini Links 26/04/2024: Music, Philosophy, and Socialising
Links for the day
Microsoft Claims "Goodwill" Is an Asset Valued at $119,163,000,000, Cash Decreased From $34,704,000,000 to $19,634,000,000 and Total Liabilities Grew to $231,123,000,000
Earnings Release FY24 Q3
More Microsoft Cuts: Events Canceled, Real Sales Down Sharply
So they will call (or rebrand) everything "AI" or "Azure" or "cloud" while adding revenues from Blizzard to pretend something is growing
CISA Has a Microsoft Conflict of Interest Problem (CISA Cannot Achieve Its Goals, It Protects the Worst Culprit)
people from Microsoft "speaking for" "Open Source" and for "security"
Links 25/04/2024: South Korean Military to Ban iPhone, Armenian Remembrance Day
Links for the day
Gemini Links 25/04/2024: SFTP, VoIP, Streaming, Full-Content Web Feeds, and Gemini Thoughts
Links for the day
Audiocasts/Shows: FLOSS Weekly and mintCast
the latest pair of episodes
[Meme] Arvind Krishna's Business Machines
He is harming Red Hat in a number of ways (he doesn't understand it) and Fedora users are running out of patience (many volunteers quit years ago)
[Video] Debian's Newfound Love of Censorship Has Become a Threat to the Entire Internet
SPI/Debian might end up with rotten tomatoes in the face
Joerg (Ganneff) Jaspert, Dalbergschule Fulda & Debian Death threats
Reprinted with permission from disguised.work
Amber Heard, Junior Female Developers & Debian Embezzlement
Reprinted with permission from disguised.work
[Video] Time to Acknowledge Debian Has a Real Problem and This Problem Needs to be Solved
it would make sense to try to resolve conflicts and issues, not exacerbate these
Daniel Pocock elected on ANZAC Day and anniversary of Easter Rising (FSFE Fellowship)
Reprinted with permission from Daniel Pocock
[Video] IBM's Poor Results Reinforce the Idea of Mass Layoffs on the Way (Just Like at Microsoft)
it seems likely Red Hat layoffs are in the making
Ulrike Uhlig & Debian, the $200,000 woman who quit
Reprinted with permission from disguised.work
IRC Proceedings: Wednesday, April 24, 2024
IRC logs for Wednesday, April 24, 2024
Over at Tux Machines...
GNU/Linux news for the past day