I hope you are doing well!
We had a good week in the world of Linux releases with the releases of openSUSE 15.4 and MakuluLinux 2022-06-10.
If you are a Windows user and still haven't made the switch to the latest version, you may want to consider migrating to Ubuntu, the popular Linux distribution from Canonical.
Ubuntu has strong support from developers and a massive software repository. It's free, fast, and safe to use. Like many versions of Linux, it's easy to install on a wide range of hardware.
If this sounds good to you, here's how you go about making the switch.
Google introduced Chromebooks back in 2011 as an alternative to traditional laptops. However, Chromebooks have only managed to capture 2.22 percent of the worldwide PC market in over a decade.
These laptops by Google use Chrome OS as their default operating system, which is Linux-based. The OS has a great deal of potential and is extremely user-friendly. To be fair, if Google tweaks its strategies, these machines could potentially dominate the market.
Josh and Kurt talk about a funny GitHub reply that notified 400,000 people. It’s fun to laugh at this, but it’s an easy open to discussing alert fatigue and why it’s important to be very mindful of our communications.
From skeptic to buyer, why the HP Dev One is the best Linux laptop yet. This is the one review you don’t want to miss.
**kcodecs** , **kcolorchooser** , **kcompletion** , **kconfig** , **kconfigwidgets** , **kcontacts** , **kcoreaddons** , **kcrash** , and **kcron** from Slackware set **kde**.
I have always thought that one of the biggest strengths of Linux is that we have so many distros to choose from. But many see the biggest weakness of Linux being that we have too many distros. I see a change coming though. I think in the future we might see far few Linux distros.
It's Sunday afternoon, so it must be time for another release candidate.
As usual, rc2 is fairly small, and there isn't really a ton going on here. Fixes spread all over, and the diffstat is fairly flat apart from a few notable things that had bigger changes: some amdgpu fixes, the xen stub iommu driver, and some ceph and zonefs fixes. The rest is all pretty much one- or few-liners spread out mostly everywhere.
And yes, because I expected the rc2 week to be fairly quiet, I did a system update on my workstation, and as a result I spent a day or two then sorting out most of the fallout from the resulting compiler upgrade to gcc-12. Some of it ended up being a bit heavy-handed, and we'll be tweaking things further. And some of it ends up being an actual compiler misfeature, but it's being discussed too and is limited to just one file on the 32-bit i386 side (and does not seem to result in any actual bad code, just excessive stack use).
Anyway, nothing hugely scary going on, let's just keep testing and fixing things.
Linus
[Konrad Dybcio] tells about his journey booting Linux on A7/8/8X processors, playing around with an old iPhone 5 he’s got in a drawer. It’s been a two-year “revisit every now and then” journey, motivationally fueled by the things like Linux on M1 Macs announcement. In the end, what we have here is a way to boot mainline Linux on a few less-than-modern but still very usable iPhones, and a fun story about getting there.
Undecided between Windows and Linux? It's possible to run multiple OSes on a single machine either by dual booting or using a virtual machine.
For most people, there's no such thing as a "best" OS. You're fine using the OS you're most comfortable with.
That said, each OS is different, and sometimes using multiple OSes is the most practical way to go. A programmer might use Linux for coding and Windows for testing, or an artist might use Windows for Photoshop and Linux for casual home use.
But what if you only have one machine? That's not a problem. You can run multiple OSes either by dual-booting or using a virtual machine. Let's find out which one is best for you.
Considering installing a second operating system, and want to be aware of the risks? Having Windows and Linux installed on your PC gives you the best of both worlds. But it isn't always smooth sailing. Dual booting can lead to problems, some of which are difficult to foresee.
Is dual booting safe? Does it affect performance? Here are 10 risks of dual booting that you should be aware of before installing a second operating system.
It's easy to create a DIY bootable live CD in Linux, using third-party tools or official Linux operating systems. Need help? Follow these steps to create a Linux Live CD in minutes.
A live CD (or "live disc") is a CD, DVD, or USB drive with an operating system you can boot from instead of the one installed on your computer's hard drive.
Whether for system recovery or merely a portable disk for guest devices, a live CD offers varied functionality. You can use one to address problems with boot records, lost passwords, and infections.
With Linux, it's pretty easy to create a DIY bootable live CD. Check out how to build your own bootable Linux live CD, from software to creating a disc and finding an ISO.
You're in the middle of a Raspberry Pi project when suddenly you realize there's something wrong: fixing it means editing the config.txt file, which is found in the /boot directory.
But what is the easiest way to access this file while the Raspberry Pi is still running? And if you must shut down to retrieve the microSD card, how should you edit it? Here's everything you need to know about how to edit the Raspberry Pi config.txt file.
Chrome OS is largely a cloud-based operating system, which means you can easily synchronize your data between devices. This can be helpful for students and corporate users who want to keep their data and presentations at hand at all times.
A boost in hybrid work environments has increased the demand for the virtual sharing of ideas, and presentations are one of the best ways of doing so. The good news is you can use your Chromebook to create and run presentations pretty conveniently.
So, let's look at how you can run PowerPoint presentations on your Chromebook using two different apps.
Kubernetes is a container orchestrator consisting of master and worker nodes. It allows communication only through an API server, which serves as the core component of the control plane. The API server exposes an HTTP REST API that allows communication between internal components—like users and the cluster—and between external components.
Need a lightweight operating system? These special Linux distros can run on older PCs, some with as little as 100MB of RAM.
Old PCs can't cope with the demands of modern operating systems and software. While upgrading hardware such as memory can help, the better solution is a lightweight operating system.
Many Linux distros are designed to be lightweight, with versions of Linux under 500MB and even under 100MB available.
If you're looking for a resource-light operating system for your PC, try these compact, lightweight Linux distros.
Red Hat this week announced it has allied with multiple U.S. Department of Energy laboratories to advance the adoption of containers in high-performance computing (HPC) environments. Lawrence Berkeley National Laboratory, Lawrence Livermore National Laboratory and Sandia National Laboratories will collaborate with Red Hat to make sure that the same types
The software operator is a design pattern. A design pattern describes the approach to cover the operational tasks of an application’s implementation. The first post in this series introduced the concept of a design pattern in general. The second post covers the software operator design pattern in particular.
In the second part, we also explained that a design pattern usually covers a discussion about consequences, advantages or disadvantages. After all, a “pattern” refers to an approach that has been applied multiple times. As a consequence, this experience should be written down to help software developers make informed decisions about which design to apply.
Passed almost a quarter of a century ago, the DMCA prevents citizens from repairing many of their own electronic devices. The proposed Freedom to Repair Act 2022 seeks to fix this problem by allowing circumvention in strictly limited circumstances. This week the proposal was labeled "pro-piracy legislation" but is that a fair assessment or an expected overreaction?
The greatest trend in telephone technology for the last decade or so has been the shift to all-IP. While this change is occurring inside telco networks as well (albeit more slowly), it's most visible in the form of IP-based end-user communications devices. In other words, the ubiquitous office IP phone.
We’ve seen hackers run DOOM on a variety of appliances, from desk phones to pregnancy tests. Now, the final frontier has been conquered – we got DOOM to run on an x86 machine. Of course, making sure we utilize your PC hardware to its fullest, we have to forego an OS. Here are two ways you can run the classic shooter without the burden of gigabytes of bloated code in the background.
[Sevan Janiyan] shares their research on putting an open FPGA toolchain together. Specifically, this is an open toolchain for the Sipeed Nano Tang FPGAs, which are relatively cheap offerings by Sipeed from China. The official toolchain is proprietary and requires you to apply for a license that’s to be renewed every year. There’s a limited educational version you can use more freely, but of course, that’s not necessarily sufficient for comfortable work.
What’s the current stable version of Google Chrome, Firefox, and Safari? Your browser automatically checks for and keeps itself up to date. However, sometimes you need to find the latest version numbers for other uses. How do you get the latest version numbers of the most popular web browsers?
You could theoretically parse your server logs and get an approximate idea by observing the greatest of the most common version numbers. However, why bother to analyze and guesstimate data from logs when Wikidata (a sister project to Wikipedia) has the answer?
A quick plea before I proceed: Please don’t discriminate against people’s browser of choice. Don’t restrict access to your site or services based on the visitor’s User-Agent.
This site is now powered by a static site generator called 11ty. It’s awesome! I’ll try to explain some of my favourite things about it and reasons you might prefer it to stalwarts in the SSG arena.
15 years ago, training up on Django, I built a blog. It’s what webdevs did back then. It was really fast compared to Wordpress but the editing always fell short, the database design got in the way more than it helped. Dogfooding your software means every problem is yours. I had a glossy coat but the jelly and chunks arrested my writing process.
Scala is an object-oriented, open-source programming language released under the Apache 2.0 license. This makes it possible to examine its source code for learning or adaptations.
This blog post will cover some of the tricks I've used to make c / c++ / python binaries smaller using x86 assembly. Much of it will revolve around the Cosmopolitan codebase, since I recently received feedback from the ELKS project that they love the code and want to hear more about how the tricks cosmo uses can potentially improve projects as intriguing as a i8086 Linux port. In many ways I feel a kinship with the ELKS project, since the first thing I had to do, to build Cosmopolitan, was write an i8086 bootloader called Actually Portable Executable. Plus it pleased me to hear that people who've been focusing on the problem a lot longer than I have are pleased with what they've read in Cosmopolitan so far. So I figured it'd be nice to share with a broader audience.
Projects get completed right before their deadline (if you're lucky). Design complexity increases with more time (even for simple bugs). The principle applies to more resources than time – programs often are written (subconsciously) to make use of as much CPU and storage are available (see Google Chrome or Slack).
I'd write fluff in grade school to reach an arbitrary 500-word requirement. Now – I try to keep it as short as possible while expressing my point.
Work expands to fill the space.
Imagine your favorite thing that you own. For whatever reason, it is the material thing that you most enjoy. When you are having a bad day or a good day, it is always comforting to have and use that thing. You are definitely attached to it. Now imagine it is gone. One day you wake up and it is missing. There is no hope of finding it. Maybe you know exactly what happened to it. you know where it is. But it is completely destroyed. You could replace it with a very similar thing, perhaps an exact replacement. But that new one will never be the original.
According to [Victor Tangermann] over at Futurism, JetPack Aviation is showing a prototype of its P2 Speeder flying motorcycle and it looks both awesome and — to quote Ralph Nader — unsafe at any speed. The prototype can lift 1,000 pounds, travel at up to 500 miles per hour, and cover up to 400 miles. We assume those things are not at the same time, of course.
Sometimes it might seem as if your electronics are just jinxed. For [Niva_v_kopirce] it was the control board of his nephew’s RC car that kept frying the transistors. In situations like this, you can either throw it in the bin, invest your time in troubleshooting, hoping to find the error and try to fix it then, or get creative. He chose the latter, and designed and etched a replacement board.
A few weeks ago, right after I finished producing this Life Kit episode on how to take a break from our screens, I passed a mom and her daughter on their way to the park. The mom stopped suddenly. Patting her pockets frantically, she turned to her daughter and said, "Sweetie, we have to go back to the car. I forgot my phone."
Her daughter, who was already making a beeline toward the swings, turned to her mom and said, "Why?"
The Senate is set to vote this week on the Sgt. First Class Heath Robinson Honoring our PACT Act to expand healthcare and other benefits for a new generation of veterans who were exposed to toxic chemicals. The bill would largely benefit those who served after 9/11 and were exposed to toxic substances during that time.
DocuSign says the strategic partnership helps joint customers further achieve ‘anywhere’ collaboration and builds on Microsoft’s relationship as a DocuSign customer and partner - and also deepens existing integrations across Microsoft 365, Dynamics 365, and Power Platform applications to further automate contract processes.
Did Agent Zula Nine Alpha lurk in the shadows of the black site in Thailand she ran as the two torture shrinks strapped a man down and poured water down his throat until he felt as if he was drowning, over and over again? Or did she step into the harsh interrogation light to let the terrified man glimpse the face of the woman who was supervising his torments? He had been stripped naked; every part of his body exposed before this silent, severe woman. Was it part of the plan? To ratchet up the psychological humiliation? To squeeze him from every angle until he broke?
The man’s name is Abd al-Rahim al-Nashiri. He is a Saudi, who the CIA fingered as an Al Qaeda member who helped plan the 2000 bombing of the USS Cole, while it was docked in the harbor at Aden in Yemen. Two years later, Al-Nashiri was nabbed in Dubai by a CIA snatch-and-grab unit and hustled off to a CIA prison in Afghanistan. For the next four years, al-Nashiri was shuffled from one CIA black site to another: Thailand, Poland, Afghanistan and Romania. At each stop he was interrogated, threatened, abused, and tortured. Then in 2006, al-Nashiri was sent to Guantanamo, where he remains.
Glenn Greenwald criticizes Joe Biden's increasing support for the bloody Saudi Arabian regime.
A group of 20 US senators€ announced a deal Sunday on an outline of a bill designed to give the appearance that they are taking meaningful action.
But gun safety advocates were quick to point out that the deal mostly ignored guns -- and rather focused on those areas that the NRA and their Republican supporters prefer the debate to be: mental health and hardening of schools.
Hundreds of thousands took€ to the streets in over 450 protests across the country Saturday demanding lawmakers take action on gun control laws in the wake of recent mass shootings in Uvalde, Texas, and Buffalo, New York.
There is more than one way to skin a cat. That was the lesson learned from (a) the murder of the school children in Uvalde, Texas and (b) revelations that came during the first public hearing of the January 6 committee that took place on June 9, 2022. But first things first. The Uvalde lessons.
I have two memories of Haiti. The first was in 1993. I had led a United Nations delegation to Haiti to ascertain the consequences of the embargo imposed by the U.N. The embargo intended to put pressure on the military-installed regime to restore president Jean-Bertrand Aristide to power.
"Africa is home to 17 percent of Earth's population but accounts for less than four percent of global greenhouse-gas emissions and only half-a-percent of historic emissions. The continent emits less than 1 tonne of CO2 per person, compared to seven in Europe or China, and more than 15 in the United States.
"If the least-developed continent on our planet is going to leapfrog fossil fuels to renewables, rich nations must pay the climate debt they owe."
Of all the indelible images from my 12-day Walk for Appalachia’s Future along the 303-mile route of the under-construction Mountain Valley Pipeline through West Virginia and southwest Virginia, none sticks with me more than 13-year-old Callie Coffey swinging on the playground of the community center where we camped one day. She is a child and that’s what children should be doing, instead of fighting for their future during climate chaos. So, she planned the grand finale rally in Richmond, VA, on June 4 with her middle school classmates.
I came across an Urbit group this morning for a company branding itself as a creators' collective. The company sells NFTs, and owning one of their NFTs is currently a requirement for being invited to their platform.
I find such a requirement to run counter to their purported goals. They claim to want to lower barriers of entry to their platform, but their NFT at time of writing costs about $150 USD. They claim to want to allow discovery of content without having to compete with paid promotions, but one must purchase a token from them in order to even access the content. They claim to want to protect consumers from invasive tracking, identification, and privacy violations, but the non-fungibility of NFTs inevitably ties the ownership of a given token to a uniquely-identifiable wallet.
One of the drawbacks of being an early adopter is that you might end up investing in equipment that becomes obsolete rather quickly. Although it’s clear that electric vehicles are here to stay, those who bought a charging station for their EV a few years ago may find it slow and incompatible with modern cars or billing networks, necessitating an upgrade to one of the latest models.
Rep. Mark Pocan recognized the significance of the language employed during last week’s extraordinary prime-time hearing of the Select Committee to Investigate the January 6th Attack on the United States Capitol. And he embraced it.
New federal court filings obtained Tuesday outlined a potential criminal case against former Marine Gen. John R. Allen, who led U.S. and NATO forces in Afghanistan before being tapped in 2017 to lead the influential Brookings Institution think tank.
It’s part of an expanding investigation that has ensnared Richard G. Olson, a former ambassador to the United Arab Emirates and Pakistan who pleaded guilty to federal charges last week, and Imaad Zuberi, a prolific political donor now serving a 12-year prison sentence on corruption charges. Several members of Congress have been interviewed as part of the investigation.
Microsoft-owned search engine Bing is targeting politically sensitive Chinese names for censorship in the United States, according to research.
Citizen Lab, a cyber research center at the University of Toronto’s Munk School of Global Affairs, found that the censorship applied to Bing’s autosuggestion feature. Moreover, it impacts not only Bing but also the Windows Start menu search and DuckDuckGo, which share this same feature.
“We consistently found that Bing censors politically sensitive Chinese names over time, that their censorship spans multiple Chinese political topics, [and] consists of at least two languages, English and Chinese,” Citizen Lab stated in the report released on May 19.
Facebook, Google and Twitter now have an hour to take down flagged terrorist content spreading on their platforms or risk fines of billions of euros.
Passed in 2021, the EU’s terrorist content regulation enters into force Tuesday. It seeks to crack down on terrorist propaganda on social media and viral livestreams of gruesome attacks such as the 2019 Christchurch mosque shootings.
Public authorities such as law enforcement, interior ministries and Europol can now require a platform or cloud services to remove specific posts, music, livestreams, photos and videos inciting violence and glorifying terrorist attacks. Promoting terrorist groups and instructions for how to commit an attack will also be forbidden online.
Any European Union country, from Hungary to Poland, can tell a company to remove terrorist content across the bloc.
The US didn't invite Venezuela, Cuba, and Nicaragua to Summit of Americas.
White nationalists and supremacists, on accounts often run by young men, are building thriving, macho communities across social media platforms like Instagram, Telegram and TikTok, evading detection with coded hashtags and innuendo.
Their snarky memes and trendy videos are riling up thousands of followers on divisive issues including abortion, guns, immigration and LGBTQ rights. The Department of Homeland Security warned Tuesday that such skewed framing of the subjects could drive extremists to violently attack public places across the U.S. in the coming months.
Director and editor-in-chief of YLE news Jouko Jokinen brushed off Turkish President Recep Tayyip Erdogan’s demands to stop broadcasting interviews with “terrorist leaders” on Thursday by describing them as “delusional imaginations of a dictator.”
The second consecutive day of protests against blasphemy on the figure of the last of the prophets turned more violent. The torched houses and vehicles and the revelation of a video of police officers beating detained protesters all affirm the gravity of the situation.
Prime Minister Anthony Albanese has previously spoken against Mr Assange's incarceration, and the activist's family are counting on him to put pressure on the UK as the deadline for a critical deportation decision looms.
Among the rest (the majority) are the indifferent and those who are hostile to various degrees, precisely because the U.S. and the UK have captured him and put him on trial. Assange has to be guilty of something or other. After all, these countries are pivotal leaders of the “free world”.
She said: “The UK Government has now admitted that its surveillance and information-sharing arrangements with the US violated my rights. That includes in relation to the protection of confidential journalistic material.
A newly released pair of legal memos from 1971 — written by lawyers from the U.S. Justice Department’s Office of Legal Counsel as the Nixon administration scrambled to respond to the Pentagon Papers leak — reveal just how calamitous the case might have been for journalism.
In the two years since Hong Kong enacted its national security law, authorities have detained over 180 people including journalists, activists and lawmakers, — data from news and analysis site China File shows.
And at least five news outlets have been shuttered. Some like Apple Daily and Stand News closed after authorities arrested staff or executives under national security or sedition laws. Others like the investigative outlet FactWire, which announced its closure Friday, cited only a “great change” in the reporting environment.
In the past year, Hong Kong dropped from 80 to 148 on the press freedom index, where No.1 is considered the most free. Media watchdog Reporters Without Borders, which curates the list, says the security law triggered an “unprecedented setback.”
In the second of the two-part series The Long Road Home, we learn how five former prisoners have reentered society after spending a collective 119 years locked up.
Polygamy was seen as uncivilized and thus not-white by many in the late 19th century United States. In President Hayes’s 1880 State of the Union, he called out Mormon polygamy proclaiming that “marriage and the family relation are the cornerstone of our American society” and asking Congress to reorganize Utah Territory to allow more “intelligent and virtuous immigrants'' in.
Immigration, marriage, and the family were as central to the rhetoric and politics of this Euro-settler-nation then as they are now. Settler-colonialism “destroys to replace” and “intelligent and virtuous immigrants” who become married and reproductive Euro-settler-couples are essential to the “replace” half of this equation.
Yet the ruthlessness of machines does not imply or require malevolence on the part of their designers. Instead, the ruthlessness of machines is an intrinsic consequence of their nature, perhaps even an inevitable one. Suppose, for example, that a computer system is setup to accept some kind of bureaucratic filing, and to enforce a certain deadline. Were a human to accept delivery of such a filing, it is unlikely they would be bothered by the filing being late by a second. Not so with a computer; the computer was given a deadline of noon, and so a filing one nanosecond later is rejected. It does not matter if the filing not being accepted ruins someone's life utterly, or leads to the destruction of one's whole family, or for that matter to nuclear war; it was a nanosecond late, so it was late. There is no magnitude or scale of human misery that a computer's decision might cause that will naturally overturn it.
In firing union supporters, Amazon is viciously pursuing its goal of destroying the union. The existence of workers such as Cioffi inside JFK8 was intolerable for the company, so they are getting rid of them, hoping to tamp momentum even if the NLRB ultimately orders their reinstatement. The company continues to refuse to recognize the union and is fighting in the courts as well. Amazon filed twenty-five objections to the NLRB vote at JFK8 and is set to argue before a labor board judge on Monday that the union’s victory should be overturned. Amazon sought to restrict attendance at the hearing, which will be held over Zoom — a request the NLRB denied.
Other states have also attempted to criminalize homelessness in recent years. A review by the Pew Charitable Trusts’s Stateline outlet unearthed nine bills introduced in six states over the past two years that ban permanent homeless encampments, penalize cities and municipalities who don’t enforce laws to remove them, and make it a misdemeanor — punishable in some cases by fines up to $5,000 and a month in jail — to sleep on most public property.
RSS is an all-male, far-right Hindu nationalist paramilitary organization that boasts more than one million men under arms and draws its ideological inspiration from Adolf Hitler’s Nazi Party. Its political wing is Bharatiya Janata Party (BJP), which is led by Indian Prime Minister Narendra Modi, a lifelong member of RSS.
To read this article, log in here or subscribe here. If you are logged in but can't read CP+ articles, check the status of your access hereIn order to read CP+ articles, your web browser must be set to accept cookies.