Bonum Certa Men Certa

Links 03/08/2022: Peppermint OS Release



  • GNU/Linux

    • Server

    • Audiocasts/Shows

      • VideoFrom MIT To Linux: How Xorg Died Many Deaths - Invidious

        The history of Xorg and the x window system is far older than Linux and any project that long is going to have a troubled history, Im impressed that we even have a functioning display server in 2022.

      • Linux Made SimpleLinux Mint 21 Cinnamon

        Today we are looking at Linux Mint 21, Cinnamon edition. It is based on Ubuntu 22.04, Linux Kernel 5.15, Cinnamon 5.4, and uses about 1GB of ram when idling. Enjoy!

      • VideoLinux Mint 21 Cinnamon Run Through - Invidious

        In this video, we are looking at Linux Mint 21, the Cinnamon edition.

      • Sugar-Free Hammer

        Fedora dumps CC0. What does this mean for open source developers? Doc Searls, Shawn Powers and Jonathan Bennett discuss on FLOSS Weekly the implications of this move from Fedora and how it relates to developers. Intel plants its flag in the discrete GPU marketspace with ARC GPU. Shawn Powers feels this is a very good thing.

      • VideoSCaLE 19x - Canonical, AREDN, and System76 - Invidious

        SCaLE 19x was so much fun! In the second video in a series that will cover this year's event, I'll play back conversations I've had with three really awesome people: Monica Ayhens-Madon (Community Representative at Canonical), Tim Wilkinson (Technologist and Contributor for AREDN), and Adam Balla (Content Producer for System76). These individuals are very passionate about their projects, and the conversations we had were a lot of fun. Check it out! (And there's definitely more to come).

    • Kernel Space

      • LWNLinux 5.18.16
        I'm announcing the release of the 5.18.16 kernel.
        
        

        All users of the 5.18 kernel series must upgrade.

        The updated 5.18.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.18.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

        thanks,

        greg k-h
      • LWN Linux 5.15.59
      • LWNLinux 5.10.135
      • LWNLinux 5.4.209
      • The Register UKRe: That proposal to remove DECNET support from Linux kernel ● The Register

        There's a proposal to remove the code for the DECnet networking protocol from the Linux kernel… but what was DECnet anyway?

        Microsoft software engineer Stephen Hemminger has proposed removing the DECnet protocol handling code from the Linux kernel. The timing is ironic, as this comes just two weeks after VMS Software Inc announced that OpenVMS 9.2 was really ready this time…

        That announcement, of course, came some months after the first time it announced [PDF] version 9.2, as we covered in The Reg in May.

        The last maintainer of the DECnet code was Red Hat's Christine Caulfield, who flagged the code as orphaned in 2010. The change is unlikely to vastly inconvenience many people: VMS is the last even slightly mainstream OS that used DECnet, and VMS has supported TCP/IP for a long time. Indeed, for decades, the oldest email in this reporter's "sent" folder was a 1993 enquiry about the freeware CMUIP stack for VMS.

      • Locking Engineering Hierarchy

        The first part of this series covered principles of locking engineering. This part goes through a pile of locking patterns and designs, from most favourable and easiest to adjust and hence resulting in a long term maintainable code base, to the least favourable since hardest to ensure it works correctly and stays that way while the code evolves. For convenience even color coded, with the dangerous levels getting progressively more crispy red indicating how close to the burning fire you are! Think of it as Dante’s Inferno, but for locking.

        As a reminder from the intro of the first part, with locking engineering I mean the art of ensuring that there’s sufficient consistency in reading and manipulating data structures, and not just sprinkling mutex_lock() and mutex_unlock() calls around until the result looks reasonable and lockdep has gone quiet.

        [...]

        Simple, dumb locking is good locking, since with that you have a fighting chance to make it correct locking.

      • LWNVetter: Locking engineering hierarchy

        Daniel Vetter continues his series on locking in the kernel.

    • Instructionals/Technical

      • CitizixHow to Install and Configure Postgres 14 on Rocky Linux 9

        In this guide we are going to install Postgresql 14 in Rocky Linux 9.

        Postgresql is an open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. Postgres, is a free and open-source relational database management system emphasizing extensibility and SQL compliance. It was originally named POSTGRES, referring to its origins as a successor to the Ingres database developed at the University of California, Berkeley. PostgreSQL is used as the primary data store or data warehouse for many web, mobile, geospatial, and analytics applications. PostgreSQL can store structured and unstructured data in a single product.

      • CitizixHow to run PGAdmin 4 Using Docker and Docker-Compose

        PGAdmin is a web-based GUI tool used to interact with the Postgres database sessions, both locally and remote servers as well. You can use PGAdmin to perform any sort of database administration required for a Postgres database.

        pgAdmin 4 is designed to meet the needs of both novice and experienced Postgres users alike, providing a powerful graphical interface that simplifies the creation, maintenance and use of database objects.

        In this guide, we are going to set up pgAdmin 4 in a container, the web based administration tool for the PostgreSQL database.

      • MakeTech EasierHow to Use Chroot in Linux and Fix Your Broken System - Make Tech Easier

        Chroot is a Linux/Unix utility that can change or modify the root filesystem. With the help of the chroot command, you can easily create an isolated filesystem inside your primary filesystem. Chroot is especially helpful to make your work and home environment separated or if you want a test environment to test software in isolation.

      • Linux JournalHow to Use the rsync Command | Linux Journal

        One of my favorite utilities on the Linux command-line, and block storage is one of my favorite features on Linode's platform, so in this article I get to combine both of these together - because what I'm going to be doing is show you how to use rsync to copy data from one server to another, in the form of a backup. What's really cool about this, is that this example will utilize block storage.

        Note: I'll be using the Nextcloud server that was set up in a previous article, but it doesn't really matter if it's Nextcloud - you can back up any server that you'd like.

      • LinuxSecurityHow a WAF Could Improve the Security of Your Linux Web Applications
      • ZDNetHow I installed Chrome OS Flex in 30 minutes
      • How to find the current ChromeOS Flex image €« Ville-Pekka Vainio's blog

        My dad has an Acer Chromebook 14 CB3-431, codenamed Edgar. Google just stopped supporting it with ChromeOS, but it’s still working well. Luckily, Google also just released the first stable version of ChromeOS Flex.

        I decided to install the full UEFI image to the Chromebook from https://mrchromebox.tech/ so that starting Flex would be as easy as possible. That went well after finding and removing the write protect screw.

      • Peter Czanik: Vmware Photon OS 4.0: an interesting syslog-ng package
      • Verification CLT via flask && matplotlib

        Central limit theorems (CLT) are a class of theorems in probability theory stating that the sum of a sufficiently large number of weakly dependent random variables that have approximately the same scale (none of the terms dominates, does not make a decisive contribution to the sum), has a distribution close to normal. Since many random variables in applications are formed under the influence of several weakly dependent random factors, their distribution is considered normal. In this case, the condition must be observed that none of the factors is dominant. Central limit theorems in these cases justify the application of the normal distribution.

      • Linux Made SimpleHow to install GDevelop on a Chromebook

        Today we are looking at how to install GDevelop on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • LinuxiacHow to Create tar.gz Archive Using the tar Command on Linux

        This article shows you the best practices for creating tar.gz archives from the command line in Linux using the tar command.

        Using the tar command to create tar.gz archives in Linux is a must-have skill for any Linux administrator. For this reason, in this article, we will show you how to create tar.gz archives in Linux using real-world examples following best practices.

        Additionally, if you want to learn how to extract tar.gz files in Linux, check out our excellent guide, “How to Extract tar.gz File in Linux by Using the Command Line.”

      • Install Malcolm Network Traffic Analysis Tool on Ubuntu 22.04 - kifarunix.com

        Follow through this tutorial to learn how to install Malcolm network traffic analysis tool on Ubuntu 22.04. Malcolm is a network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs. The PCAP files or Zeek logs can be uploaded to Malcolm via browser, forwarded via the forwarders or can capture live traffic, parses and normalize the traffic for visualization via OpenSearch dashboards or Arkime. Read more about Malcolm network traffic analysis tool and its features on their page.

      • ID RootHow To Install ClamAV on Rocky Linux 9 - idroot

        In this tutorial, we will show you how to install ClamAV on Rocky Linux 9. For those of you who didn’t know, ClamAV is an open-source antivirus engine for detecting trojans, viruses, malware, adware, rootkits, and other malicious threats. ClamAV offers a Command-line scanner, a Milter interface for Sendmail, an Advanced database updater, and built-in support for archive formats, ELF executables + Portable Executable files, and popular document formats. Though it was created for Unix, it is also available in third-party versions for BSD, Linux, macOS, OpenVMS, OSF, and Solaris.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the ClamAV open-source antivirus on Rocky Linux. 9.

      • TechRepublicHow to clone a GitHub repository | TechRepublic

        Git is the most widely-used distributed version control system on the planet. It’s free, open-source and can handle anything from small to massive projects. Git makes it easy to create new project repositories on your local drive or clone them from remote repositories.

      • Unix MenThe Best Linux Commands Every User Should Know (Clear and Simple Documentation)

        Nearly 75% of all mobile phones run Android, based on the Linux kernel, and most servers that host websites and other content run on Linux. There are also several Linux distributions that individuals and organizations use to get their work done every day.

        Being new to Linux can be overwhelming since the look and feel of the distributions is quite different from what most Windows and macOS users are accustomed to. Furthermore, the command line interface can make learning to use Linux seem like rocket science.

        In this guide, we walk you through basic file manipulation commands and all the best Linux commands that every user should know. While this guide is based on Ubuntu 18.04, you should be able to use the commands on other distros just as easily.

    • Games

      • Boiling SteamNew Steam Games with Native Linux Clients - 2022-08-03 Edition - Boiling Steam

        Between 2022-07-27 and 2022-08-03 there were 28 New Steam games released with Native Linux clients. For reference, during the same time, there were 284 games released for Windows on Steam, so the Linux versions represent about 9.9 % of total released titles. Here’s a quick pick of the most interesting ones...

  • Distributions and Operating Systems

    • Make Use Of9 New Linux Distros to Try Out in 2022

      Hundreds of new Linux distros spawn each year, with many becoming the norm among the community. Here are some new distros for you to try in 2022.

      As an open-source operating system, Linux continues to rule the market, even in 2022. The highly malleable Linux kernel has come a long way, evolving into many avatars and spawning different desktops suitable for numerous use cases.

      As is custom, a slew of new Linux distributions has become available to believers looking for high-tech computing on low-end hardware. Each distro comes with its unique USP, which makes it stand out amongst its competitors.

      Without further ado, here are the top most-anticipated Linux distros within the open-source software community, which are worth a mention.

    • New Releases

      • 9to5LinuxPeppermint OS Now Offers Devuan-Based ISOs for Software Freedom Lovers

        Peppermint OS’s goal was always to provide a familiar operating system environment to new Linux users. Initially derived from Ubuntu, Peppermint OS was rebased on Debian Stable earlier this year, a release that came almost three years after the previous version, Peppermint 10.

        On August 2nd, 2022, Joseph Dickson announced that the first Devuan-based release of Peppermint OS is now ready for mass deployment, targeting everyone who doesn’t want systemd in their system and wants to build a 100% free computer without any proprietary software.

    • SUSE/OpenSUSE

      • Work Group Shifts to Feedback Session - openSUSE News

        Members of openSUSE’s Adaptable Linux Platform (ALP) community workgroup had a successful install workshop on August 2 and are transitioning to two install feedback sessions.

        The first feedback session is scheduled to take place on openSUSE’s Birthday on August 9 at 14:30 UTC. The second feedback session is scheduled to take place on August 11 during the community meeting at 19:00 UTC.

        Attendees of the workshop were asked to install MicroOS Desktop and temporarily use it. This is being done to gain some feedback on how people use their Operating System, which allows the work groups to develop a frame of reference for how ALP can progress.

    • Slackware Family

      • 9to5LinuxSlackware-Based Slax Linux Is Back After 9 Years of Hiatus

         In 2015, Slax Linux, a lightweight and portable GNU/Linux distribution based on Slackware Linux, disappeared from the Linux scene. Two years later, in late 2017, Slax Linux developer Tomas Matejicek announced the release of a new version of Slax Linux based on Debian GNU/Linux, not Slackware.

        In mid-July 2022, Tomas Matejicek announced that “having nothing better to do” he is considering bringing back the Slackware-based version, and today he released a new Slax release based on Slackware 15.0.

      • Linuxiac9 Years Later, Slax Linux Has Found Its Way Back Home

        Slax 15.0, the lightweight Live CD Linux distro, is now available, re-based back to its roots on Slackware Linux.

        Slax is a portable and fast Linux operating system with a modular architecture and beautiful design that can be operated from a USB stick. It supports many filesystems, including NTFS, FAT, EXT4, and Btrfs.

        The ability to persist data is one of the key features that distinguishes Slax from other Live CD Linux distributions. In other words, if you run Slax from a read-only media, such as a CD/DVD, it only saves system modifications in memory, which you lose when rebooting.

    • Fedora Family / IBM

      • Red Hat OfficialForrester Consulting Total Economic Impactâ„¢ study reveals Red Hat Services and Support for OpenShift delivered ROI of over 700% [Ed: Red Hat pays Microsoft marketing/de facto PR firm for fake, paid-for, manufactured "recommendation", feeding a vicious and rogue industry of fake "analysts"]
      • Red Hat OfficialI will take the Red (Hat) SLSA please: Introducing a framework for measuring supply chain security maturity

        At Red Hat, we strive for transparency with our customers. It is who we are. It is what we do. But transparency in product security can be tricky. We must provide our customers with the information they need to make informed decisions without opening ourselves or them up to attacks. With the uptick in software supply chain attacks over the last couple of years, we have harnessed a particular focus on software supply chain security within our Product Security organization.

      • FOSSLifeWhat’s an Automation Engineer?

        Generally, automation involves “the use of technology to perform tasks with reduced human assistance,” says Red Hat. “Any industry that encounters repetitive tasks can use automation, but automation is more prevalent in the industries of manufacturing, robotics, and automotives, as well as in the world of technology — in IT systems and business decision software.”

        “Automation has been a cornerstone of the manufacturing industry for decades,” explains Sarah White, but now companies are automating IT and software processes as well.

        Specifically, Red Hat says, “IT automation, sometimes referred to as infrastructure automation, is the use of software to create repeatable instructions and processes to replace or reduce human interaction with IT systems.” In terms of software, automation can help improve efficiency and solve workflow challenges.

    • Devices/Embedded

      • CNX SoftwareNVIDIA Jetson AGX Orin 32GB production module is now available

         NVIDIA Jetson AGX Orin 32GB production module is now in mass production and available, after the 12-core Cortex-A78E system-on-module was first announced in November 2021, and the Jetson AGX Orin developer kit was launched last March for close to $2,000.

        Capable of up to 200 TOPS of AI inference performance, or up to 6 times faster than the Jetson AGX, the NVIDIA Jetson AGX Orin 32GB can be used for AI, IoT, embedded, and robotics deployments, and NVIDIA says nearly three dozen partners are offering commercially available products based on the new module.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • OSI BlogThe five stages of the Open Source Program Office [Ed: Two Microsoft front groups converge, LF and OSI. The LF and OSI nowadays exist for openwashing of proprietary software, i.e. to not actually change anything except buzzwords and perception.]
    • Productivity Software/LibreOffice/Calligra

      • Document FoundationLibreOffice is a flagship project for social service at UACM - The Document Foundation Blog

        This year, nine students from the Universidad Autónoma de la Ciudad de México (UACM), one of the most important universities in the country and in the capital of Mexico, have joined the social service programme that LibreOffice offers to all Mexican students. This is a record number in the three semesters that the programme has been running at the university.

      • GTK[3|4] GtkScrollbar for writer documents

        GTK4 screenshot of writer using true GtkScrollbars rather than themed Vcl ScrollBars. Long press enters gtk's usual fine control mode for scrolling.

    • Content Management Systems (CMS)

      • Medevel16 Best Open-source Free Ghost Blog Themes for 2022

        Ghost blog is an open-source blogging platform, headless CMS for individuals and enterprise. We have been using it for years since the early version.

        Thanks to its developers and the community, Ghost blog came a long way in the recent releases by adding the search, improving the backend, the SEO features and more.

        However, the community is still small comparing to WordPress or other competitors, so it may look like there is no enough free open-source themes, but there are many.

        Therefore, we write this post as a guide for open-source Ghost themes for anyone who are sticking to the open-source realm.

    • Programming/Development

      • Tristan Van Berkom: BuildStream 2 news

        After a long time passed without any BuildStream updates, I’m proud to finally announce that unstable BuildStream 2 development phase is coming to a close.

        As of the 1.95.0 beta release, we have now made the promise to remain stable and refrain from introducing any more API breaking changes.

        At this time, we are encouraging people to try migrating to the BuildStream 2 API and to inform us of any issues you have via our issue tracker.

        [...]

        Plugins which used to be a part of the BuildStream core, along with some additional plugins, have been migrated to the buildstream-plugins repository. A list of migrated core plugins and their new homes can be found in the porting guide.

  • Leftovers

    • Hardware

      • The Next PlatformAMD Finally Reaps The Fortunes It Has Sown

        Sometimes, competing for business means coming up with better products than your rivals. And other times, competing means just not screwing up while your competitor stumbles. For the heated battle between AMD and its archrival, Intel, when it comes to compute engines in the datacenter, AMD is in the fortunate position of being able to leverage both tactics at the same time.

        And we say fortunate, we mean that AMD is raking in money and rapidly re-investing it into the further expansion of its business as well as buying up the stock that will allow it to reward employees who have worked hard for this day to come.

        Seven years ago, when the Epyc comeback plan was formulated, AMD could not have dreamed in a million years that Intel’s vaunted foundries would run into so many troubles with 10 nanometer and then 7 nanometer processes. The current situation has created as big of a gap for AMD to exploit as Intel’s stubborn decision to put forth the Itanium architecture as the future of datacenter compute back in the late 1990s and early 2000s, which gave AMD the immense opportunity to peddle 64-bit Xeon-compatible Opteron processors against 32-bit Xeons (which Intel initially refused to bit-wise embiggen) and 64-bit – and mostly non-compatible – Itaniums.

      • GoogleGlobalFoundries joins Google’s open source silicon initiative | Google Open Source Blog

        Over the last year we have been busy planning the expansion of our free open source silicon design and manufacturing program to further grow the community of developers and companies building custom silicon, and build a thriving ecosystem around open source hardware.

        Today, we’re excited to announce an expansion of this program and our partnership with GlobalFoundries. Together, we're releasing the Process Design Kit (PDK) for the GlobalFoundries 180MCU technology platform under the Apache 2.0 license, along with a no-cost silicon realization program to manufacture open source designs on the Efabless platform. This open source PDK is the first result of our ongoing partnership with GF. Based on the scale and breadth of GF’s technology and manufacturing expertise, we expect to do more together to further access and innovation in semiconductor development and manufacturing.

    • Proprietary

      • DuoNVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux | Decipher

        NVIDIA, which makes graphics processing units (GPUs) for gaming systems, high-end PCs and handheld devices, has issued fixes for several high-severity vulnerabilities in its graphics drivers for Windows and Linux that in some cases could lead to code execution.

        The graphics driver (also known as the NVIDIA GPU Display Driver) is the software component that allows the device’s operating system and application to use its enthusiast gamer-optimized graphics hardware. NVIDIA’s graphics driver has previously been found to contain serious flaws, including ones disclosed in May that could allow attackers to execute arbitrary code and, in some cases, perform guest-to-host escapes on systems running virtual machines.

      • CISAVMware Releases Security Updates | CISA

        VMware has released security updates to address multiple vulnerabilities in VMware’s Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector, and vRealize Automation. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

    • Security

      • Privacy/Surveillance

        • AccessNowNo place for privacy in India as government withdraws Personal Data Protection Bill - Access Now

          The wait for meaningful legal protection of people’s privacy in India — long under ever-increasing attack — has just gotten longer. The government has withdrawn the Personal Data Protection Bill, which had been in the works for three years, slamming the brakes indefinitely on privacy safeguards in India. This decision, and the government’s consistent failure to advance a meaningful, people-centric data protection law, comes with a steep cost to human rights in the world’s largest democracy.

          The initial 2019 version of the legislation, and the following 2021 draft with recommendations by a parliamentary committee, each failed to adequately protect privacy and granted excessive discretionary powers to the government. However, these iterations could have served as a basic foundation that lawmakers could subsequently improve, creating a law that would have strengthened Indians’ rights and control over their personal data. The government’s withdrawal of the bill without any discussion in parliament, and without presenting a concrete replacement, deepens the uncertainties and risks surrounding privacy and erodes people’s confidence in the government.

          “As India celebrates 75 years of independence, we are also marking 12 years since policymakers first proposed a federal-level privacy and data protection law, and over five years since the Supreme Court of India ruled that privacy was a fundamental right, requiring government action to safeguard our personal data,” said Raman Jit Singh Chima, Asia Pacific Policy Director and Senior International Counsel at Access Now. “Today, far too many sessions of parliament have passed with zero progress on the Personal Data Protection Bill, when it should have been the top priority. The government’s withdrawal of legislation and failure to say when we will move forward on a strengthened, people-centric data protection law — one that does not privilege the interests of government and the tech sector over fundamental rights — is wholly unacceptable.”

        • AccessNowThe Jamaica NIDS digital identification program: a cautionary tale​​ - Access Now

          Within a matter of weeks, Jamaica will roll out a pilot program for the National Identification System (NIDS) — a voluntary biometric digital identification system created through the National Identification and Registration Act (NIRA). The Jamaica NIDs program is going ahead in spite of the very real privacy and security risks civil society has identified, as well the potential for the new digital ID to enable discrimination or even exclusion of vulnerable communities from government services and benefits.

          Before passing the NIRA, the Jamaican parliament failed to resolve all of the concerns that we and our partners flagged. Our hope is that other countries considering implementing similar programs will avoid making the same mistakes.

    • Finance

      • DaemonFC (Ryan Farmer)T.J. Maxx in trouble for knowingly selling recalled products that can cause fires and kill babies. This is the natural result of Republican political corruption. – BaronHK's Rants

        The U.S. Consumer Product Safety Commission fined the company $13 million dollars for knowingly selling such items as “a portable speaker model that posed an explosion hazard, hoverboards linked to 16 reports of burn injuries and knives that broke and caused multiple lacerations requiring stitches.”

        The company also sold infant products that were known to have actually caused infants to be killed.

        T.J. Maxx runs stores under that name, Marshalls, and HomeGoods.

        The CPSC Web site lists at least 19 products that T.J. Maxx sold which it knew were recalled and dangerous to the American public.

        The problem going on here is that T.J. Maxx mainly runs stores for poor people. You see them in run down shopping malls and low end strip malls.

        They bring shoppers in mainly by selling things that didn’t sell at larger stores because of serious design flaws, but also due to liquidation sales.


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

SoylentNews Grows Up, Registers as a Business, Site Traffic Reportedly Grows
More people realise that social control media may in fact be a passing fad
 
Richard Stallman's Talks in Switzerland This Week
We need to put an end to 'cancer culture'; it's trying to kill people and it is even swatting people
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, March 28, 2024
IRC logs for Thursday, March 28, 2024
[Meme] EPO's New Ways of Working (NWoW), a.k.a. You Don't Even Get a Desk at Work and Cannot be Near Known Colleagues
Seems more like union-busting (divide and rule)
Hiding Microsoft's Culpability in Security Breaches and Other Major Blunders (in the United Kingdom, This May Mean You Can't Get Food)
Total Cost of Ownership (TCO) is vast
Giving back to the community
Reprinted with permission from Daniel Pocock
Links 28/03/2024: Sega, Nintendo, and Bell Layoffs
Links for the day
Open letter to the ACM regarding Codes of Conduct impersonating the Code of Ethics
Reprinted with permission from Daniel Pocock
With 9 Mentions of Azure In Its Latest Blog Post, Canonical is Again Promoting Microsoft and Intel Vendor Lock-in, Surveillance, Back Doors, Considerable Power Waste, and Defects That Cannot be Fixed
Microsoft did not even have to buy Canonical (for Canonical to act like it happened)
Links 28/03/2024: GAFAM Replacing Full-Time Workers With Interns Now
Links for the day
Consent & Debian's illegitimate constitution
Reprinted with permission from Daniel Pocock
The Time Our Server Host Died in a Car Accident
If Debian has internal problems, then they need to be illuminated and then tackled, at the very least in order to ensure we do not end up with "Deadian"
China's New 'IT' Rules Are a Massive Headache for Microsoft
On the issue of China we're neutral except when it comes to human rights issues
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 27, 2024
IRC logs for Wednesday, March 27, 2024
WeMakeFedora.org: harassment decision, victory for volunteers and Fedora Foundations
Reprinted with permission from Daniel Pocock
Links 27/03/2024: Terrorism Grows in Africa, Unemployment in Finland Rose Sharply in a Year, Chinese Aggression Escalates
Links for the day
Links 27/03/2024: Ericsson and Tencent Layoffs
Links for the day
Amid Online Reports of XBox Sales Collapsing, Mass Layoffs in More Teams, and Windows Making Things Worse (Admission of Losses, Rumours About XBox Canceled as a Hardware Unit)...
Windows has loads of issues, also as a gaming platform
Links 27/03/2024: BBC Resorts to CG Cruft, Akamai Blocking Blunders in Piracy Shield
Links for the day
Android Approaches 90% of the Operating Systems Market in Chad (Windows Down From 99.5% 15 Years Ago to Just 2.5% Right Now)
Windows is down to about 2% on the Web-connected client side as measured by statCounter
Sainsbury's: Let Them Eat Yoghurts (and Microsoft Downtimes When They Need Proper Food)
a social control media 'scandal' this week
IRC Proceedings: Tuesday, March 26, 2024
IRC logs for Tuesday, March 26, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Windows/Client at Microsoft Falling Sharply (Well Over 10% Decline Every Quarter), So For His Next Trick the Ponzi in Chief Merges Units, Spices Everything Up With "AI"
Hiding the steep decline of Windows/Client at Microsoft?
Free technology in housing and construction
Reprinted with permission from Daniel Pocock
We Need Open Standards With Free Software Implementations, Not "Interoperability" Alone
Sadly we're confronting misguided managers and a bunch of clowns trying to herd us all - sometimes without consent - into "clown computing"
Microsoft's Collapse in the Web Server Space Continued This Month
Microsoft is the "2%", just like Windows in some countries