On this episode of This Week in Linux: SUSE Linux Enterprise 15 SP4, openSUSE Leap 15.4, Tails OS 5.1, Blender 3.2, GIMP To Get CMYK Support, Regolith Desktop 2.0, EasyOS 4.0, PeerTube 4.2, Vivaldi Email Client, System76 to Open European Distribution Hub, Atom Text Editor Has Been Discontinued, Humble Bundles and the GOG Summer Sale is Live. All that and much more on Your Weekly Source for Linux GNews!
 Email remains the killer information and communications technology. Email volume shows no sign of diminishing, despite the increasing popularity of collaborative messaging tools. There were over 330 billion emails sent in 2021.
Messages are exchanged between hosts using the Simple Mail Transfer Protocol with software programs called mail transfer agents, and delivered to a mail store by programs called mail delivery agents, frequently referred to as email clients.
Within the Internet email system, a message transfer agent, or mail transfer agent, or mail relay is software that transfers electronic mail messages from one computer to another using SMTP. The terms mail server, mail exchanger, and MX host are also used in some contexts.
Hi techies, as we know Fedora is one of popular open source Linux based operating system. Fedora Linux can be used as workstation, Server, and CoreOS.
In this guide, we learn how to manually configure static ip address on Fedora Linux (Fedora 36 Workstation). A static IP address is an IP address that stays the same over time and remain persistent across the reboot. There are two different ways to configure static IP.
I hope I've persuaded you to write good HTML from now on. Failing that, I hope I've at least expressed myself well enough to get you thinking about it. You can view the source of this document to see how these principles play out (or don't!) in practice.
For a long time, the Linux kernel text console on x86 hardware used VGA text mode (also). The important thing about VGA text mode is that what the kernel wrote into display memory in order to show things was not pixels but characters (okay, 8-bit codepoints). The actual text buffer used two bytes in order to add colour and attributes, but that's only a small change. The important thing is that manipulating an 80x25 buffer of 16-bit objects is quite fast. Completely repainting the entire screen requires writing only 4,000 bytes.
This began as a reply to another article by Lucas F. Costa; it lists practices to improve user-experience (UX) of command-line interfaces (CLIs). It comes from a good place, and has some good advice: I particularly like its advice on input-validation and understandable errors. Unfortunately, a number of its suggestions are problematic, particularly from an accessibility perspective.
Maybe, like me, you tried to selfhost a Matrix Synapse server, miserably failed because it's just not quite that easy and then settled for Cloudron's Synapse app because it just works. Pay a bit more, worry a little less.
Sure, it works but you still introduced a middle man in your pristine homelab setup and the itch never goes away to get rid of it.
Time for round 2.
Docker Engine exposes a REST API which you can use to control your containers without the docker CLI. The API exposes equivalent functionality using HTTP network calls. You can script common Docker operations using your favorite programming language or remotely control one of your hosts. The CLI internally relies on the same API to provide its built-in commands.
Learning to create a file in Linux using many ways is a recommendable step toward speeding up the use of the operating system.
For a while now, I’ve been looking for a good way to stream music from my home music collection on my phone.
There are quite a few options for music servers that support streaming. However, Android apps that can stream music from one of those servers tend to be unmaintained, clunky or slow (or more than one of those).
It is possible to use something that runs in a web server, but that means no offline caching - which can be quite convenient in spots without connectivity, such as the Underground or other random bits of London with poor cell coverage.
I made a small Proof-of-Concept: cs-mitm.py is a mitmproxy script that intercepts Cobalt Strike traffic, decrypts it and injects its own commands.
The Linux dd command is one of the most powerful utilities for Unix and Unix-like operating systems. It can be used in a variety of ways.
In this tutorial, we learn about dd command in Linux with practical examples.
 There might be a situation where you need to change MySQL default port 3306 to something else to hide the port number for security purposes, or MySQL port 3306 is already being used by another application.
No matter what your reason for changing ports is, in this article, you will find the steps to change the default MySQL port from 3306 to 3360 or something else.
We’ve all got to that point on a given system where we start to run out of storage space. Do we buy more storage, perhaps one of the best SSDs, or do we search and find the largest files quickly? In this how to we will look at a few simple approaches to help us maintain and manage our filesystems.
All the commands in this article will work on most Linux machines. We’ve used a Ubuntu 20.04 install but you could run this how-to on a Raspberry Pi. All of the how-to is performed via the Terminal. If you’re not already at the command line, you can open a terminal window on most Linux machines by pressing ctrl, alt and t.
In a Linux GUI, we usually take it for granted that when we insert a USB flash drive, hard drive or even a DVD disk, they just appear ready for use. But under the hood there is a process where the device is mounted (made ready for use) and assigned a mountpoint. When using a server or a remote connection, it is not certain that a device will automatically be made available, so how can we mount our own devices?
In this how-to we’ll look at various ways of mounting and unmounting disks and disk images. We will use a variety of approaches and tools including both terminal emulator commands and GUI tools.
All the commands in this how-to will work on most Linux machines. We’ve used a Ubuntu 20.04 install but you could run this how-to on a Raspberry Pi. All of the how-to is performed via the Terminal. You can open a terminal window on most Linux machines by pressing ctrl, alt and t.
Let’s discuss the steps to install the Pale Moon browser on Debian 11 Bullseye Linux using the command terminal.
The Web browser Pale Moon is a fork of Firefox. The program initiated and maintained by Moonchild Productions, like the original program, is licensed under the MPL license. However, special rules apply to the distribution of the binary version: Redistributing Pale Moon. In addition to Linux, it is also available for Windows and Mac (unofficially), and the Android version has been discontinued.
Simple steps to install Lighttpd web server on Ubuntu 22.04 LTS Jammy JellyFish using the commands given in this article.
lighttpd (lighty) is a web server that requires far fewer resources than Apache, for example, and is therefore particularly suitable for very large loads or very weak systems. It was developed by Jan Kneschke and can be expanded with modules. FastCGI, for example, enables PHP code to be executed. SCGI supplements lighty with Ruby or Python.
Tutorials to learn the steps for installing OwnCloud on Ubuntu 22.04 LTS Jammy JellyFish for setting up your own storage cloud server.
Cloud storage services such as Microsoft OneDrive, Dropbox, and Google Drive are convenient for accessing files and information on the go, as well as enabling data sharing with others, improving productivity. However, your files are stored on servers of third parties, which prevents all-encompassing control. A version of the private cloud such as ownCloud provides a remedy.
Here’s a quick guide on how to install the latest LibreOffice version in Ubuntu and other Linux.
The free and open-source office suite LibreOffice comes with two versions. The Community and Enterprise version. The “community” version is for early adopters who want the latest bleeding-edge software tech. And the “enterprise” version is more stable, and it may not include all the latest features but is ideal for the production environment and serious work.
Sky Checkers is a multiplayer action based game. Knock off your enemies and be the last one standing! This game is based on an old N64 Kirby mini-game.
With Sky Checkers, you can expect many hours of fun because you can invite your friends to play online via client—server connections. From a more technical perspective you are in the presence of an open-source application (GPLv3) created, mainly, in C language, so you can expect a fast, light and well done game.
The video game can be installed on many platforms such as Windows, Linux, and macOS. With native support as the author intended.
Follow through this guide to learn how to integrate Portainer with OpenLDAP for authentication. By default, Portainer ships with its own internal authentication mechanism. But if you are using OpenLDAP in your environment, you can easily integrate Portainer with it to make the management of user accounts and access to various container environments easy.
my mate made a post about how good void is for older hardware and helped me installing it on my newest laptop: a thinkpad t430. the machine is really good, and void is actually really nice too. it's really light due to the fact that it uses runit instead of systemd. in terms of installation, it's similar to arch. i kept an eye on void ever since i found out about it, but it didn't have gamemode at the time. now gamemode is an official package in the xbps queries so i went like "sure, why not? i can still play some games there."
the thinkpad t430 is a really nice machine. i nicknamed it the dinkypad. i really like this thinkpad. the specs are an intel i7-3632QM as the cpu and an nvidia nvs 5400m as the gpu. now here are the issues i had and how i fixed them.
Ratpoison is a wonderful and light weight tiling window manager. It is largely modeled after GNU Screen. Ratpoison is like the mother of all tiling window managers, it was one of the first, and I have been using it very long.
Windows in Ratpoison are borderless and open full screen, unless you tile multiple windows next to each other. So you actually use every pixel of the display.
Ratpoison is completely keyboard driven. Which makes it extremely fast. Adoption is smooth, because the Ratpoison key bindings mimic the key bindings of GNU Screen. Most people use Tmux now, as a replacement for GNU Screen, but the key bindings of Tmux are compatible with those of GNU Screen.
 Ever wondered what it would take to roll your own OS? [Sebastian]’s Snowdrop OS might just provide you with some insight into that process, and maybe even some inspiration.
[Sebastian] created Snowdrop completely from scratch, using only x86 assembly language. It’s more than just bare-bones, and boasts a number of useful utilities and programs including a BASIC interpreter and linker (for creating standalone BASIC executables.) That’s not even touching on the useful essentials, like multitasking and a GUI framework. There are even a number of resources specifically for making game development easier. Because as [Sebastian] puts it, what’s a operating system without games?
Right now, running EasyOS 4.0.1. Have taken out Gimp, Samba and HexChat, and brought back SeaMonkey. 'easy.sfs' is 748MiB.
I have posted about the easy*.img file having a 767MiB boot-partition, and running into a problem as now using lz4-hc squashfs compression, easy.sfs has suddenly become too big.
On May 31, 2022 The FreeBSD Foundation held its Annual Board Meeting. An important part of the meeting includes electing Board Officers and Directors for the following 12 month period. We’re pleased to announce the FreeBSD Foundation 2022-2023 Board includes:
President, Treasurer, and Founder: Justin T. Gibbs
Vice President: Andrew Wafaa
Secretary: Kevin Bowling
Director: Cat Allman
Director: Hiroki Sato
Director: Robert N.M. Watson
Assistant Secretary: Deb Goodkin
BSDCan, a BSD conference held in Ottawa, Canada, quickly established itself as the technical conference for people working on and with 4.4BSD based operating systems and related projects. This year the conference was held online.
Early this month, AAEON launched the PICO-V2K4 which accommodates the Ryzen V2000 embedded processor and it’s available in an ITX form factor. The PICO-V2K4 measures about 100mm x 72mm and it supports Windows 10 and Linux.€
The PICO-V2K4 uses AMD’s 7nm processing technology and accommodates the AMD Ryzen V2718 or the V2516 variant. The V2718 features 8-cores/16-threads and it has a processor speed that ranges from 1.7GHz to 4.15GHz. The V2516 features 6-cores/12-threads and its processor speed ranges from 2.1GHz to 3.95GHz.€
Instead, Nappi's project relies on the much more exotic-sounding method of radioactive decay. The BRNG takes advantage of the potassium found in bananas, which is slightly radioactive.
The core of the circuit board is an STS-5 Geiger-Müller tube. These tubes need a high voltage source. So, a 555-based step-up converter generates the required 400V. For control, Nappi implemented the Microchip ATmega328P 8-bit microcontroller. This processor is the same as the chip found on Arduino Uno and Nano boards.
The possible way using bananas is that of radioactive decay. Bananas in fact are known to contain a lot of potassium, and a small but significant percentage of the potassium present in nature is radioactive. Specifically we are talking about the 40K isotope, which makes up 0.01% of potassium in nature. Plus they’re delicious with lemon and sugar, which alone would be a great reason to always have one on hand.
Let’s start by understanding what the chi-square (also referred to as \chi^2) is and how it works. This is a value used in statistics to test the fit of a set of values to a theoretically predicted distribution. Let’s address the traditional use in statistics first, then we’ll turn our gaze to the use of \chi^2 for this application.
When you want to build a software business in the 21st century successfully, you have to borrow some ideas from the 20th century. There are basically two ways. And document database maker MongoDB has employed both methods and is growing fast because it has maintained the first tactic with key accounts while using the second tactic to build a huge pyramid of customers out on the cloud, some of whom will turn into key accounts.
The first strategy, epitomized by the IBM System/360 mainframe, the Oracle database, the Sun Microsystems Sparc server and its Unix and then Java platform, is to go after a core set of advanced IT customers who have some pressing needs and address them like crazy. Eventually, if all goes well and the engineering and manufacturing costs allow it, there is some trickle down to smaller, but still reasonably large, customers who have similar if less complex or highly scaled problems, thus allowing market expansion.
The other strategy, best illustrated, is to build a vast base of the pyramid on less sophisticated technology suitable for a large number of customers with modest needs, and then build more and more sophisticated and scalable platforms and build up to having something that is suitable for large enterprises in a decade or two. Microsoft’s Windows Server and Red Hat’s Enterprise Linux – and indeed, the idea of any Linux in the enterprise – fall into this camp.
A list of new features in the LibreOffice 7.4 edition, including the highlights of enhancements across Calc, Impress, Writer and more.
The "WYSIWYG" acronym stands for (What You See Is What You Get), is often used to describe a text and document editor features tools and libraries. As an example Microsoft Word and Google Document are the right examples for WYSIWYG editors.
The WYSIWYG editors are commonly used in blogging and web publishing, email editing, email list creation, and book writing.
In this article, we will list the best open-source WYSIWYG JavaScript libraries that developers can use to add rich document editing functionalities in their projects.
The Erlang Ecosystem Foundation is a non-profit organization for driving the further development and adoption of Erlang, Elixir, LFE, and other technologies based on the BEAM virtual machine.
When David Heinemeier Hansson created Ruby on Rails (interview), he was guided by his experience with both PHP and Java. On the one hand, he didn’t like the way the verbosity and rigidness of Java made Java web frameworks complex and difficult to use, but he appreciated their structural integrity. On the other hand, he loved the initial approachability of PHP but was less fond of the quagmires that such projects tended to turn into.
This is a great solution for people who are writing their own gemtext and wanting to include math. However it requires a fair amount of manual work to make it look right, and a good know of the unicode characters you have available. Unfortunately for me, I'm dealing with arbitrary math formulas Wikipedia content. I think it would be really difficult to write code that could do this conversion automatically.
Luckily for me, most of these math formaula's a defined using LaTeX, which is exactly made for this, and Wikipedia gets me access to PNG with beautifully rendered LaTeX
The Open Geospatial Consortium (OGC) and the Open Source Geospatial Foundation (OSGeo) have renewed their Memorandum of Understanding (MoU).
Open Software and Open Standards are complementary pieces of the geospatial ecosystem to which OGC and OSGeo are both committed.
For a large part of human history, people made things from what they could find. Some stones make arrowheads. Others make sparks. Trees can turn into lumber. But the real power is when you can take those same materials and make them into something with very different properties. For example, plant fibers turning into cloth, or rocks giving up the metals inside. One of the oldest engineered materials is glass. You’d think as old as glass is (dating back at least 4,500 years), we’d understand all there is to know about it by now. According to an interesting post by [Jon Cartwright] writing in Physics World, we don’t. Not by a long shot.
If you worked with computers back in the 1970s, there’s a good chance you used a light pen at some point: a simple input device that you’d point at the CRT screen to highlight text, choose menu options or manipulate graphic objects. Although ubiquitous in those days, the light pen lost the battle for ergonomics to the humble mouse and was all but extinct by the late 1980s. Touchscreen styluses implement a similar function today, but touching the screen somehow doesn’t feel the same as simply pointing at it.
When it comes to trolling eBay for cool stuff, some people have all the luck. Whereas all we ever seem to come across is counterfeit chips and obviously broken gear listed as, “good condition, powers on”, [Les Wright] actually managed to get more than he bargained for with one of his recent eBay purchases.
Usenet used UUCP – Unix-to-Unix Copy – a (roughly)1 peer-to-peer (p2p) protocol that let users transfer files, email, and text between computers.
Threaded articles posted to Usenet were organized into different newsgroups, e.g., comp.software, misc.education, talk.politics which users could subscribe to. Articles would be pushed and propagated to all subscribers. Think Reddit's subreddit concept in Google Groups form.
Moderators curtailed spam in the most popular newsgroups. Otherwise, in the first decade of Usenet, the small community of early computer enthusiasts established and followed online norms quickly.
Hedonism should not be endorsed by any means. Long term gratification is much more worth it for the individual than short term fleeting pleasures, because it demonstrates one's ability of self control, resulting in more wise decisions. Hedonism proliferates in 21st century culture, being promoted in pop culture, lifestyle magazines, and almost everywhere you look. Pleasure is being promoted as the definitive good in life, while pain is to be feared. These are fallacies that we've grown accustomed to believe. Pain and pleasure are not inherently good or evil, but they can become if our perception of them is so.
Researchers have pioneered a technique that can dramatically accelerate certain types of computer programs automatically, while ensuring program results remain accurate.
Their system boosts the speeds of programs that run in the Unix shell, a ubiquitous programming environment created 50 years ago that is still widely used today. Their method parallelizes these programs, which means that it splits program components into pieces that can be run simultaneously on multiple computer processors.
This enables programs to execute tasks like web indexing, natural language processing, or analyzing data in a fraction of their original runtime.
Jean-Baptiste Tristan, an associate professor in the Morrissey College of Arts and Sciences Computer Science Department, is among seven co-recipients of the 2021 Association for Computing Machinery Software System Award for contributions to groundbreaking research and practical applications that impact everyday users of technology.
Tristan shared the award with French and German colleagues for the development of CompCert, the first practically useful software that was developed not by writing its code but by extracting the set of instructions from the software’s mathematical proof of existence, resulting in an error-free construction.
Chimpanzee (Pan troglodytes) sclera appear much darker than the white sclera of human eyes, to such a degree that the direction of chimpanzee gaze may be concealed from conspecifics. Recent debate surrounding this topic has produced mixed results, with some evidence suggesting that (1) primate gaze is indeed concealed from their conspecifics, and (2) gaze colouration is among the suite of traits that distinguish uniquely social and cooperative humans from other primates (the cooperative eye hypothesis). Using a visual modelling approach that properly accounts for specific-specific vision, we reexamined this topic to estimate the extent to which chimpanzee eye coloration is discriminable. We photographed the faces of captive chimpanzees and quantified the discriminability of their pupil, iris, sclera, and surrounding skin. We considered biases of cameras, lighting conditions, and commercial photography software along with primate visual acuity, colour sensitivity, and discrimination ability. Our visual modeling of chimpanzee eye coloration suggests that chimpanzee gaze is visible to conspecifics at a range of distances (within approximately 10 m) appropriate for many species-typical behaviours. We also found that chimpanzee gaze is discriminable to the visual system of primates that chimpanzees prey upon, Colobus monkeys. Chimpanzee sclera colour does not effectively conceal gaze, and we discuss this result with regard to the cooperative eye hypothesis, the evolution of primate eye colouration, and methodological best practices for future primate visual ecology research.
Voronoi diagrams partition multi-dimensional space into regions, where all positions within a given region are closest to the same known point in the multi-dimensional space. Voronoi diagrams are named after Georgy Voronoy, but can also be called a Dirichlet tessellation (Peter Gustav Lejeune Dirichlet), or Thiessen polygons (Alfred H. Thiessen), as the same thing was implemented in different fields independently.
OK, so reading up a bit on Al Feldstein’s process; he would start on page one and hand write in pencil directly on the bristol board, writing the text and indicating narration plates and speech bubbles, but no art. As in, he was writing it in one go.
Rebecca Gordon explores why the women who now make up the majority of college students may be missing their moment through no fault of their own.
The structure of computer game assets can be a bit of a mystery, even more so the older a game is, and some amount of reverse-engineering can be expected when pulling apart a game like 1995’s Night Light.
The idea of a macro keypad is a great one, a set of keys programmable with frequent but complex tasks. But once programmed, how can the user keep track of which key does what? To save the world from grubby, hand-written sticky labels, here’s [Andreas Känner] with the Badger 2040 keypad — a macro pad with a display to show keymap info that’s fully programmable using CircuitPython.
DAP manufacturers have (largely) conceded the general portable music market to the almighty smartphone, just as music stores are starting to with streaming services. I’ve said this was inevitable, though I don’t have to like it.
I was worried that the market solution would be mass-produced knockoffs, which admittedly has happened (just look at eBay). But manufacturers like Sony have continued to remain viable and even increase their install bases for music players by moving upmarket, and innovating with features even phones don’t have.
Nicolas Espinosa’s hopes for his 11-year-old daughter, Julia, are basic and profound: He wants her to stay alive and perhaps be able to eat normally someday.
And she might, if she can get three organs transplanted — and if the U.S. immigration system doesn’t get in the way.
Health Canada Friday proposed a regulation mandating warning labels on individual cigarettes and cigars. The proposed regulations would place “health-related messages that are memorable, noticeable and impactful” on each cigarette, covering at least 75 percent of the surface area. If enacted, Canada will be the first country to have such regulations.
Microsoft has sought to clarify the reasoning behind the imminent departure of HoloLens boss Alex Kipman.
Kipman was very much the face of Microsoft's mixed reality play over the years. He also had a hand in the company's Xbox add-on, the Kinect.
A cloud has hovered over the HoloLens division for some time, as reports of issues within the team circulated and a hoped-for follow-up to the increasingly long-in-the-tooth HoloLens 2 conspicuously failed to make an appearance during Microsoft's Build event in May.
My new job wants me to do my work on a Macbook Pro, which in most ways is only a little more terrible than the Linux laptops I am used to. I don't love anything about it, and one of the things I love the least is the Mystery Key.
A further insult is the implication that I make buying decisions based solely on price. There might be numerous reasons why I choose one retailer over another for my book purchases. I might prefer a retailer that focuses solely on books, or a retailer that is not a large chain. More generally, I might make a decision based on the company’s carbon footprint, or perhaps their reputation in paying fair wages, or what political candidates and movements they support, or whether the CEO uses his wealth to launch himself into space.
The company behind digital forensics and penetration testing Kali Linux platform has announced that it will be livestreaming a free 25-week course for those looking to build offensive cyber security skills.
Offensive Security, which maintains the Debian-based Kali Linux distro, launched its remote learning course, OffSec Academy, during the pandemic when live training became unworkable.
Researchers discovered that the Bluetooth signals emitted by mobile phones carry a unique fingerprint, caused by small imperfections accidentally created during the manufacturing process.
The results of their real-world experiment around the UC San Diego campus are impressive: [...]
Mobile devices increasingly function as wireless tracking beacons. Using the Bluetooth Low Energy (BLE) protocol, mobile devices such as smartphones and smartwatches continuously transmit beacons to inform passive listeners about device locations for applications such as digital contact tracing for COVID-19, and even finding lost devices. These applications use cryptographic anonymity that limit an adversary’s ability to use these beacons to stalk a user. However, attackers can bypass these defenses by fingerprinting the unique physical-layer imperfections in the transmissions of specific devices.
We empirically demonstrate that there are several key challenges that can limit an attacker’s ability to find a stable physical layer identifier to uniquely identify mobile devices using BLE, including variations in the hardware design of BLE chipsets, transmission power levels, differences in thermal conditions, and limitations of inexpensive radios that can be widely deployed to capture raw physical-layer signals. We evaluated how much each of these factors limits accurate fingerprinting in a large-scale field study of hundreds of uncontrolled BLE devices, revealing that physical-layer identification is a viable, although sometimes unreliable, way for an attacker to track mobile devices.
Despite being foreign owned since 2014, Tim Hortons still waves the Canadian flag as vigorously as it can. But last week, a scathing report by the federal privacy commissioner and three of his provincial counterparts laid out in great detail how Tim Hortons ignored a wide array of laws to spy on Canadians, creating “a mass invasion of Canadians’ privacy.”
“As a society, we would not accept it if the government wanted to track our movements every few minutes of every day,” the federal privacy commissioner, Daniel Therrien, said in his last official news conference. “It is equally unacceptable that private companies think so little of our privacy and freedom that they can initiate these activities without giving it more than a moment’s thought.”
Oracle developing national health records database: Larry EllisonSan Francisco, Cloud major Oracle, which just completed its $28.4 billion acquisition of electronic health records company Cerner, is developing a national health records database.
Oracle's board chairman and chief technology officer Larry Ellison said that patient data would be anonymous until individuals give consent to share their information, reports medcitynews.com.
Most of our communication nowadays happens via messaging apps, first and foremost WhatsApp (WA). These apps offer different level of security.
WhatsApp secures content data (i.e., the message itself), but shares meta data with other Facebook companies to enhance their services (limited in EU by GDPR).
A good alternative is Signal. Signal is owned by the non-profit Signal Foundation, which is heavily backed by WhatsApp co-founder Brian Acton. Alongside E2EE, Signal implements the zero-knowledge encryption (ZKE), reducing meta data to the bare minimum.
With Smart Home products connecting to the cloud, if a company decides to end support for a product or is required to close due to final troubles, there are few courses of action. The easiest one is to give up, and switch to another brand, or promise yourself you’ll never use one of those “Internet of Shit” products. The second one is quite more time-consuming and you’d have to work with the community to reverse-engineering the product and give it a second life, but obviously, this does not solve the supply issue since the product will not be manufactured anymore. Today, I learn about a third one: simply gather a small group of users, and buy the company!
Hundreds of thousands took to the streets in over 450 protests across the country Saturday demanding lawmakers take action on gun control laws in the wake of recent mass shootings in Uvalde, Texas, and Buffalo, New York. March for Our Lives, the youth-led organization created by students who survived the mass shooting at Parkland's Marjory Stoneman Douglas High School in 2018, organized Saturday's rallies.
"Avoid attending school if your leaders fail to do the job and keep us safe from gun violence."
With a never-before-seen 12-minute video of extremist groups leading the deadly siege and startling testimony from Mr. Trump’s most inner circle, the 1/6 committee provided gripping detail in contending that Mr. Trump’s repeated lies about election fraud and his public effort to stop President Joe Biden’s victory led to the attack and imperiled American democracy.
“Democracy remains in danger,” said Rep. Bennie Thompson, D-Miss., chairman of the panel, during the hearing, timed for prime time to reach as many Americans as possible.
“Jan. 6 was the culmination of an attempted coup, a brazen attempt, as one rioter put it shortly after Jan. 6, to overthrow the government,” Mr. Thompson said. “The violence was no accident.”
The hearings may not change Americans’ views on the Capitol attack, but the panel’s investigation is intended to stand as its public record. Ahead of this fall’s midterm elections, and with Mr. Trump considering another White House run, the committee’s final report aims to account for the most violent attack on the Capitol since 1814, and to ensure such an attack never happens again.
Gun worship is transcendent in the United States, with 400 million guns in circulation—more guns than people—and only cursory controls on who can buy or access them. Firearms are fetishized, celebrated and brandished throughout our society, delivering a devastating daily death toll unknown anywhere else in the world. This idolatry reveres above all else the semiautomatic AR-15, dubbed "America's rifle" by the NRA. In the wake of back to back massacres in Buffalo, New York and Uvalde, Texas, both committed by 18-year-old men with legally-purchased AR-15-style semiautomatic rifles, victims and their advocates are pushing for genuine gun control. But the Senate—with so many of its members in thrall to and funded by the gun lobby—will only posture, pray, hold a moment or two of silence…and then do virtually nothing.
Mass shootings are good for gun sales.
What's the use of the hearings by the House committee to investigate the January 6 insurrection—hearings that began last night and will run for the next several weeks—unless they lead to criminal prosecution of Donald Trump for his patently criminal actions?
Drought, climate change, and new regulatory forces, like the Sustainable Groundwater Management Act (“SGMA”), are bringing change to California’s land uses. Climate policies are spurring renewable energy development, while drought and new water restrictions may force the fallowing of agricultural land. These external factors bring significant challenges and stress to many industries and livelihoods, but there are strategic opportunities for renewable energy developers and agricultural interests to explore in responding to the state’s drought and climate change problems. This article explores a few of these water-related partnership opportunities wherein agricultural interests can mitigate increased water costs and decreased water supply and renewable energy developers can add value to their project development.
A bright yellow building with bold green trim hums with activity in Caguas, a city sprawled across a mountain valley south of San Juan, Puerto Rico. In a spacious kitchen, volunteers chop vegetables and cook rice for community meals. Down the hall, visitors browse racks of free and discounted produce, canned beans and bottles of oil. Outside, beneath a large metal awning, retirees soak in calming music as they take part in a stress-relief workshop.
It’s been six years since Jeff Xavier hid in a bathroom at the Pulse nightclub in Orlando, Fla., after being wounded by gunfire during the second-deadliest mass shooting in American history.
“Losing blood, love u all,” Xavier wrote in a post on social media letting his friends and family know that he might not survive.
It is time for an unusual but long overdue revolt by the 150 million tax-with-held taxpayers. I’m not speaking of rates of taxation that the rich and corporations largely avoid because of the gigantic tax escapes, which they grease through Congress. Today I’m hoping to get your dander up by showing how corporatist politicians make you pay for big corporations to come to their corporate welfare-friendly state and make profits.
Sen. Bernie Sanders (I-Vt.) and Sen. Kirsten Gillibrand (D-N.Y.) Friday sent a letter to Amazon CEO Andy Jassy urging him to drop the company’s objections to the historic union election on Staten Island before a National Labor Relations Board (NLRB) hearing on Monday and finally recognize the Amazon Labor Union.
“If Amazon can afford to spend $10 billion in stock buybacks to enrich its wealthy shareholders and executives—including the second richest person in the world, Jeff Bezos—it can afford a unionized workforce,” the senators wrote. “If Amazon can spend over $4 million in a single year on union-busting and $213 million on your compensation, it can afford a workforce that can collectively bargain for better wages, better benefits, safer working conditions, and reliable schedules…We strongly urge you to respect the will of Amazon workers by dropping your objections, recognizing the Amazon Labor Union and negotiating in good faith before the NLRB hearing on June 13th. It is time for Amazon to end its blatant disregard of labor law and treat workers with the respect and dignity they deserve.”
In recent years, voting rights advocates and state lawmakers have made significant strides in restoring voting rights to U.S. citizens with felony convictions.
The majority of Hungarians don't want to get closer to Russia, the desire for belonging to the West is still much stronger in the country. Putin’s popularity has declined in the last 5 years. Závecz Research conducted a survey at the request of Telex at the end of May. The research looked at topics about which data was available in 2017 as well, which makes it possible to compare how much the situation has changed in the last few years.
In a tweet, the chairman of the Party for Freedom, said: "I receive many death threats now from Muslims who want to kill me for supporting Nupur Sharma who spoke the truth and nothing but the truth about Muhammad and Aisha."
Captured on surveillance video, UI police identified Quraishi as the alleged rock thrower. He told them he was present to support the Palestinian group and that he felt the Jewish students were being disrespectful as the Palestinian speakers talked of women and children being killed. He said he threw the rock in the direction of the Jewish students knowing that it is a sign of protest where a rock is used as a weapon.
Anti-piracy coalition ACE has booked another victory by shutting down We-Play, one of the largest piracy portals in Thailand. Local police carried out a raid in Bangkok and arrested the alleged operator of the site. We-Play reportedly 'caused' $1.2 million in losses per month, which translates to $0.50 for every visit to the site.
50-year-old Frenchman Max Louarn began his hacking career in the 80s and during the following decades built up quite a reputation. He earned millions of dollars and traveled the world, but also spent time in prison. Despite being wanted by the FBI for his alleged involvement with Nintendo hacking group Team Xecuter, Louarn doesn't view himself as a criminal, but as a rebel instead.