Bonum Certa Men Certa

Links 10/11/2022: AlmaLinux 8.7, PipeWire 0.3.60, and PostgreSQL 15.1



  • GNU/Linux

    • LWNA pair of new LWN site features [Ed: A vastly better approach would be to make a Gemini capsule for LWN]

      We have finally added a set of dark mode defaults to the customization options for the site for those who prefer the dark side. Thanks to all the readers who have asked for this; apologies for taking so long to do it. The defaults seem good, but we are not dark-mode users, so please let us know if you have suggestions for improvements.

    • Desktop/Laptop

      • DedoimedoGoing Linux all the way on my hybrid-card laptop

        Roughly four years ago, I started my Linux-only adventure with the Slimbook machine, for which I've written some fourteen individual usability reports. Things are going quite well there. Now, we're taking it up one notch. A "gaming" rig, with Nvidia graphics and even more common desktopy stuff. From this early test, I'm quite happy, and for me to be happy about technology takes quite some effort. I feel, for the first time ever, that it might be possible, even enjoyable, for me to leave the Windows desktop behind without any great suffering or major loss of functionality. On that bubbly note, let us bid each other farewell. The testing shall continue.

    • Server

      • ZDNetWith Linode, Akamai expands into edge cloud computing development [Ed: The typical buzzwords salad: "edge cloud computing"]
      • NetcraftNovember 2022 Web Server Survey | Netcraft News [Ed: Microsoft down, Microsoft down, and Microsoft not even listed anymore (going extinct on the Web)]

        In the November 2022 survey we received responses from 1,135,089,912 sites across 271,689,143 domains and 12,306,625 web-facing computers. This reflects a gain of 4.7 million sites, a loss of 194,480 domains, and a gain of 6,685 web-facing computers.

        The biggest growth this month comes from Cloudflare, with it gaining 8.3 million sites (+8.91%) and 490,000 domains (+1.94%). Cloudflare now accounts for 8.93% of all sites seen by Netcraft, up by 0.70pp since October.

        nginx saw significant losses in its number of sites and domains this month. It lost 8.5 million sites (-2.75%) and 490,000 domains (-0.66%). However, nginx still holds its strong lead as the most widely used web server software, with a market share of 26.51% sites. Apache has the second largest number of sites, with a market share of 21.40%.

        LiteSpeed continues its strong growth — this month it gained 720,000 sites (+1.28%) and 110,000 domains (+1.32%). This brings its market share of sites from 4.97% to 5.01% (+0.04pp).

        Following its web-wide trend, Cloudflare has also seen growth in the top million sites. Since October, it gained 1,733 of the top million sites, with its market share increasing from 20.83% to 21.00% (+0.17pp). Meanwhile, both Apache and nginx have lost market share in the top million sites, with Apache down from 21.72% to 21.66% (-0.06pp) and nginx down from 21.36% to 21.21% (-0.15pp).

    • Audiocasts/Shows

    • Kernel Space

      • LWNLinux 5.4.224
        I'm announcing the release of the 5.4.224 kernel.
        
        

        All users of the 5.4 kernel series must upgrade.

        The updated 5.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.4.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

        thanks,

        greg k-h
      • LWNLinux 4.19.265
      • LWNLinux 4.14.299
      • LWNLinux 4.9.333
      • V3D enablement in mailine kernel | Wen.onweb

        If you enjoy using upstream Linux kernel in your Raspberry Pi system or just want to give a try in the freshest kernel graphics drivers there, the good news is that now you can compile and boot the V3D driver from the mainline in your Raspberry Pi 4. Thanks to the work of Stefan, Peter and Nicolas [1] [2], the V3D enablement reached the Linux kernel mainline. That means hacking and using new features available in the upstream V3D driver directly from the source.

        However, even for those used to compiling and installing a custom kernel in the Raspberry Pi, there are some quirks to getting the mainline v3d module available in 32-bit and 64-bit systems. I’ve quickly summarized how to compile and install upstream kernel versions (>=6.0) in this short blog post.

    • Applications

      • PipeWire 0.3.60

        This is a bugfix release that is API and ABI compatible with previous 0.3.x releases.

      • Linux Links4 Best Free and Open Source GUI Image Compression Tools - LinuxLinks

        Data compression is the process of storing data in a format that uses less space than the original representation would use. Compressing data can be very useful particularly in the field of communications as it enables devices to transmit or store data in fewer bits. Besides reducing transmission bandwidth, compression increases the amount of information that can be stored on a hard disk drive or other storage device.

        There are 2 main types of compression. Lossy compression is a data encoding method which reduces a file by discarding certain information. When the file is uncompressed, not all of the original information will be recovered. Lossy compression is typically used to compress video, audio and images, as well as internet telephony. The fact that information is lost during compression will often be unnoticeable to most users. Lossy compression techniques are used in all DVDs, Blu-ray discs, and most multimedia available on the internet.

        Images take up massive amounts of internet bandwidth because they often have large file sizes. They are the most popular resource type on the web. According to the HTTP Archive, 60% of the data transferred to fetch a web page is images composed of JPEGs, PNGs and GIFs. 45% of the images seen on sites crawled by HTTP Archive are JPEGs.

    • Instructionals/Technical

      • Make Use OfHow to Enable or Disable Automatic Login on Linux Mint

        If you want to log in to your Linux desktop automatically after boot, consider enabling the auto-login feature on Linux Mint.

        It's certainly annoying when you leave your Mint desktop idle for a couple of minutes only to be welcomed by a login screen asking you to enter your password again. What if you're the only one using the computer and don't want to type your lengthy and secure password every time you want to log in?

        Luckily, Linux Mint offers an easy, graphical way to enable or disable automatic login. We'll show you how.

      • Linux HintHow to Run Ubuntu on Top of Android
      • DebugPointHow to Install LibreOffice Base Database in Ubuntu and Other Linux

        Here’s how to install the LibreOffice Base database module in Ubuntu and other Linux distributions.

      • Linux HintManage Virtual Box Remotely With RemoteBox – Install on Ubuntu 22.04
      • LinuxStansHow to Count the Number of Files in a Directory on Linux

        In this beginner-friendly tutorial, we’re going to show you how to count files in a directory on Linux.

        For this tutorial, you’ll need access to the Terminal (open it with CTRL + ALT + T) or SSH access to a server. This tutorial will only include instructions for the CLI. If you want to count the files in a directory via the GUI (Graphical User Interface) just right-click on the directory and click on Properties. You’ll get a window with stats about that directory, including the number of files.

      • KifarunixHow to Enable and Configure Cortex Analyzers - kifarunix.com
      • Real Linux UserHow to add RSS Feeds for your favorite YouTube channels to Thunderbird Mail - Real Linux User

        If you have a busy life, you have little time to manually go through all your favorite blogs, websites, and YouTube channels every day to see if there are any updates. If you want to organize your digital life more efficiently, you can do that by automating certain processes and bringing updates to you instead of collecting them yourself. That’s why I really like the benefits that RSS Feed functionality has to offer. For my articles for RealLinuxUser.com, I often get inspired by other websites, blogs, and also YouTube channels. And I know that many of us would like to be more efficiently informed about updates from our favorite YouTube channels, without actively going through all the channels ourselves. In this article, I will therefore explain how to add RSS Feeds for your favorite YouTube channels to Thunderbird Mail. But it works exactly the same for other RSS Feed applications if you want to use a dedicated RSS app.

      • Linux HintHow to Install Rust on Ubuntu 22.04
      • Linux CapableHow to Install Microsoft Edge on Fedora 37/36/35 [Ed: Edge is a password stealer. Nobody should install it and Microsoft should be fined. But the state commits the same crimes, so it won't hold Microsoft accountable for this.]

        Microsoft Edge is a popular browser choice for those who prefer fast browsers that are based on a chromium-based engine. Unlike Chrome, it disables third-party tracking by default, the same as Firefox does. Fedora desktop users can now install Microsoft Edge as an alternative browser to Firefox. The official RPM contains a stable, beta, and development (nightly) version of the browser. Microsoft Edge is a great choice for users who value privacy and speed. With the official RPM, Fedora users can easily install and use Microsoft Edge on their desktop computers.

      • H2S MediaHow to install Telegram on Fedora Linux 37/36/35

        Tutorial to install the Telegram messaging app on Fedora Linux such as 37/36/35 to start chatting and access media from various channel groups.

        Telegram is a free messenger for smartphones like WhatsApp. Users log in with their mobile numbers and can chat with each other and share pictures, videos, documents, and files or download them very easily. In addition, video and voice calls can be made, as well as surveys, groups, and channels can be created to network with each other. Especially because of the latter function, Telegram is particularly popular.

        Well, installing applications in Windows and macOS is quite simple but when it comes to Linux users, are not much familiar with how to do that. Therefore, for those who are using Fedora Linux and want the Telegram app, then the steps given here can be used.

      • ID RootHow To Install OpenMRS on Ubuntu 22.04 LTS - idroot

        In this tutorial, we will show you how to install OpenMRS on Ubuntu 22.04 LTS. For those of you who didn’t know, OpenMRS is an enterprise electronic medical record system framework that allows the exchange of patient data with other medical information systems. It is written in Java and provides a web interface to manage electronic medical records.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the OpenMRS on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

    • WINE or Emulation

      • 9to5LinuxDXVK 2.0 Released with Major Changes and Improved Support for Many Games

        DXVK, the popular open-source Vulkan-based translation layer for Direct3D 9, 10 and 11 that allows you to run 3D apps and games designed for Windows on GNU/Linux systems through Wine, has been updated today to version 2.0, a major release that introduces important changes and improvements.

        As expected from a new DXVK update, version 2.0 also brings improvements for numerous games including Alan Wake, Alice Madness Returns, Anomaly: Warzone Earth, Beyond Good and Evil, Dragon Age Origins, Empire: Total War, Final Fantasy XV, GTA IV, Heroes Of Annihilated Empires, Limit King Of Fighters XIII, Metal Gear Solid V: Ground Zeroes, SiN Episodes: Emergence, Sonic Generations, Spider-Man: Shattered Dimensions, The Ship, Warhammer Online, and Ys Seven.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Make Use OfYour Own Social Network: How to Set Up a Mastodon Instance on Linux

      Sick of Twitter? Fed up with Facebook? Online abuse and NSFW content getting you down? Just want to exchange ideas away from the glare of people who oppose you?

      Mastodon is the answer. And thanks to its open-source nature, it is possible to set up your own Mastodon instance, enabling conversation on any topic and giving your users some safety and privacy from trolls of all kinds.

    • Events

      • CollaboraFully charged for electronica 2022

        Making our grand debut, Collabora will be attending electronica next week in Munich for the first time! Diving into the world of electronics alongside the leading examples of the industry, we're excited to partake on all fronts. Taking place from November 15 to 18 at the Trade Fair Center Messe München, we'll have a booth to showcase our demos at B4.428.

        Drop by and our engineers will be delighted to walk you through one of our three demos. Highlighting different projects from our multimedia, machine learning and core teams, you'll gain a behind-the-scenes look at different solutions we've developed.

      • BootlinUpcoming Yocto Project Summit 2022.11 - One talk from Bootlin - Bootlin's blog

        As every six months for the last two years, a new virtual edition of the Yocto Project Summit is coming, and its schedule has been announced.

    • Web Browsers/Web Servers

      • Daniel StenbergAppend data to the URL query

        curl offered the -d / --data option already in its first release back in 1998. curl 4.0. A trusted old friend.

        curl also has some companion versions of this option that work slightly differently, but they all have the common feature that they append data to the the request body. Put simply: with these options users construct the body contents to POST. Very useful and powerful. Still today one of the most commonly used curl options, for apparent reasons.

        [...]

        This new friend we call --url-query makes -G rather pointless, as this is a more powerful option that does everything -G ever did and a lot more. We will of course still keep -G supported and working. Because that is how we work.

        A boring fact of life is that new versions of curl trickle out into the world rather slowly to ordinary users. Because of this, we can be certain that scripts and users all over will need to keep using -G for yet another undefined period of time.

      • Mozilla

        • ThunderbirdMozilla Thunderbird: Important Message For Microsoft Office 365 Enterprise Users [Ed: Now Microsoft tells Mozilla how to do Thunderbird

          In a coming release of the Thunderbird 102.x series, we will be making some changes to the way we handle OAuth2 authorization with Microsoft accounts, and this may involve some extra work for users currently using Microsoft-hosted accounts through their employer or educational institution.

          In order to meet Microsoft’s requirements for publisher verification, it is necessary for us to switch to a new Azure application and application ID. However, some of these accounts are configured to require administrators to approve any applications accessing email.

        • MozillaThe Mozilla Blog: Over a quarter of parents believe their children don’t know how to protect their information online – Firefox can help with that

          Parenting has never been easy. But with a generation growing up with groundbreaking technology, families are facing new challenges along with opportunities as children interact with screens everywhere they go — while learning at school, playing with friends and for on-the-go entertainment.

          We are previewing a new Mozilla Firefox survey conducted in partnership with YouGov to better understand families’ needs in the United States, Canada, France, Germany and the United Kingdom that we will release fully in January 2023. We wanted to hear parents’ thoughts around online safety, as well as their biggest concerns and questions when their kids navigate through the sticky parts of the web before getting to the good stuff.

    • SaaS/Back End/Databases

      • PostgreSQLPostgreSQL: PostgreSQL 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23 Released!

        The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23. This release fixes 25 bugs reported over the last several months.

        This is the final release of PostgreSQL 10. PostgreSQL 10 will no longer receive security and bug fixes. If you are running PostgreSQL 10 in a production environment, we suggest that you make plans to upgrade.

    • Productivity Software/LibreOffice/Calligra

    • Funding

    • Programming/Development

      • KDABUnderstanding qAsConst and std::as_const - KDAB

        Every now and then, when I submit some code for a code review, people tell me that I forgot qAsConst.

        Now I have one more enemy, namely: Clazy! It has also started saying this, and I guess it’s about time for me to figure out what is going on. When do I need qAsConst and why do I need to know these things?

      • QtQt Creator 9 RC released

        We are happy to announce the release of Qt Creator 9 RC!

      • Red Hat OfficialHow to get started programming in Go | Enable Sysadmin

        Go is an open source programming language that combines a dynamic language's ease of use with the reliability and performance of a statically typed, compiled language.

  • Leftovers

    • Health/Nutrition/Agriculture

    • Security

      • Privacy/Surveillance

        • The Washington PostTrustCor Systems verifies web addresses, but its address is a UPS Store - The Washington Post

          Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what’s known as a root certificate authority, a powerful spot in the internet’s infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company’s Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which public contracting records and company documents show has sold communication interception services to U.S. government agencies for more than a decade. One of those TrustCor partners has the same name as a holding company managed by Raymond Saulino, who was quoted in a 2010 Wired article as a spokesman for Packet Forensics. Saulino also surfaced in 2021 as a contact for another company, Global Resource Systems, that caused speculation in the tech world when it briefly activated and ran more than 100 million previously dormant IP addresses assigned decades earlier to the Pentagon. The Pentagon reclaimed the digital territory months later, and it remains unclear what the brief transfer was about, but researchers said the activation of those IP addresses could have given the military access to a huge amount of internet traffic without revealing that the government was receiving it.

        • Bruce SchneierAn Untrustworthy TLS Certificate in Browsers - Schneier on Security

          Cory Doctorow does a great job explaining the context and the general security issues.

        • CoryDoctorowDelegating trust is really, really, really hard (infosec edition)

          A previous version of this thread reported that Trustcor has the same officers as Packet Forensics; they do not; they have the same officers as Measurement Systems. I regret the error.

          I've got trust issues. We all do. Some infosec pros go so far as to say "trust no one," a philosophy more formally known as "Zero Trust," that holds that certain elements of your security should never be delegated to any third party.

          The problem is, it's trust all the way down. Say you maintain your own cryptographic keys on your own device. How do you know the software you use to store those keys is trustworthy? Well, maybe you audit the source-code and compile it yourself.

          But how do you know your compiler is trustworthy? When Unix/C co-creator Ken Thompson received the Turing Prize, he either admitted or joked that he had hidden back doors in the compiler he'd written, which was used to compile all of the other compilers....

        • The Wall Street JournalSpyware Scandals Prompt Calls for Further Bans in Europe

          Draft European Parliament report proposes halt on use of surveillance software across 27-member bloc

          [...]

          A Europe-wide moratorium on surveillance software such as NSO Group’s Pegasus and similar products is needed to clamp down on abuses, according to a draft report from European Union lawmakers published Tuesday.

          The report was authored by Sophie in ‘t Veld, a Dutch member of the European Parliament, who chairs a special committee that has been investigating the use of spyware in the 27 EU countries.

          “In a democracy, putting people under surveillance should be an exception and there should be rules,” Ms. in ‘t Veld said.

          [...]

          NSO Group didn’t respond to a request for comment. In a European Parliament hearing this summer, a representative from the company said that it has sold the software to at least five EU member countries.

          Last year, the Biden administration placed NSO Group on an export prohibition list, preventing it from obtaining certain technology from the U.S. and making it more difficult for the company to seek international customers. The move followed investigations from a consortium of news outlets into NSO Group’s sale of Pegasus to dozens of government and law-enforcement customers around the world for spying on journalists, politicians and human rights activists.

          Researchers have pointed to governments outside Europe that use Pegasus to extract information from phones. Citizen Lab said in January that around 35 journalists and activists in El Salvador were targeted with the spyware, The Wall Street Journal reported at the time. Israeli police have said that they use various types of spyware including one developed by NSO Group.

    • Finance

      • IBM Old TimerThe Changing Structure of Global Supply Chains

        “The golden age of globalisation, in 1990-2010, was something to behold,” wrote The Economist in a January, 2019 article. “Commerce soared as the cost of shifting goods in ships and planes fell, phone calls got cheaper, tariffs were cut and the financial system liberalised.” The very nature of the global firm was transformed during these two decades, with The Globally Integrated Enterprise destined to become the corporate model of the future, said IBM CEO Sam Palmisano in a 2006 Foreign Affairs article.

        But, then global trade started slow down. “After the go-go 1990s and 2000s the pace of economic integration stalled in the 2010s, as firms grappled with the aftershocks of a financial crisis, a populist revolt against open borders and President Donald Trump’s trade war,” wrote The Economist in its June 18, 2022 lead article. “The flow of goods and capital stagnated. Many bosses postponed big decisions on investing abroad: just-in-time gave way to wait-and-see. No one knew if globalisation faced a blip or extinction.”

    • Censorship/Free Speech

      • AccessNowHuman rights organizations tell Libyan House of Representatives to immediately repeal Anti-Cybercrime Law

        The undersigned civil society organizations demand that the Libyan House of Representatives repeal the Anti-Cybercrime Law n€°5/2022 issued on September 27th, 2022. We call for the law not to be applied, as it directly undermines human rights and fundamental rights, namely freedom of expression and opinion, and the rights to peaceful assembly, privacy, and personal data protection. The law also regularizes the Executive’s comprehensive, warrantless surveillance over the digital spaces and allows them to censor websites and content.

        Following its ratification on October 26, 2021, the Libyan House of Representatives decided to bring into force the Anti-Cybercrime Law by officially publishing it on September 27, 2022. This happened without prior notice and in complete disregard of demands from civil society organizations and four UN Special Rapporteurs for the law to be withdrawn. The law in question infringes on fundamental human rights principles, as well as Libya’s international commitments, as its drafting process did not include stakeholder dialogue and engagement.

        Libya’s House of Representatives did not publicly share the law until a few days after it came into force, when it was posted on its Facebook page. Before this it was only available as a leaked draft on social media. The following statement highlights our main concerns regarding the risks of this law.

    • Civil Rights/Policing

      • AccessNowWhy we need human rights impact assessments for AI - Access Now

        Around the world, governments and tech companies alike tout artificial intelligence (AI) and forms of automated decision-making (ADM) as cheap, convenient, and fast fixes for a range of societal challenges – from moderating illegal content on social media or scanning medical images for signs of diseases, to detecting fraud and tracking down tax evaders.

        Yet at the same time, scandals over the abuse and misuse of AI systems just keep piling up. Automated content moderation systems, which are constantly presented as the silver-bullet solution to the complex problems of illegal content online, have been shown to be flawed, limited, and prone to dangerous errors. But the dangers aren’t restricted to online spaces. In the Netherlands, tax authorities implemented an algorithm to detect benefits fraud, but in doing so, falsely accused and penalised thousands of people, many of whom were minorities or from low-income backgrounds. These examples beg the question: how can we ensure that uses of AI systems respect or even extend fundamental human rights?

        Fortunately, the conversation has shifted away from vague, non-binding ethical guidelines, and various governments are proposing concrete regulations, such as the EU’s proposed AI Act, instead. There is also growing recognition of the need for other human-rights based approaches to AI governance – including the use of human rights impact assessments (HRIAs). In our new report, we explore the role of HRIAs in AI governance, and offer recommendations for how they can be used to ensure that AI systems are developed and deployed in a rights-respecting manner.

      • AccessNow#ProofOfLife: stop the abuse, free Alaa now - Access Now

        Alaa Abd El-Fattah must be set free. Amid a total local blackout on his precarious health situation, Access Now and civil society from around the globe are incredibly alarmed by the news that the British-Egyptian activist is receiving medical intervention without authorities informing his family or lawyer as he languishes through a hunger and water strike in his prison cell. It is unclear if this means Alaa is being force-fed, a medically dangerous and violent act of torture.

        “Keeping Alaa alive with the intent to cement and prolong his torture is a depraved and inhumane act of vengeance by a regime hellbent on wiping out any trace of the 2011 revolution,” said Marwa Fatafta, MENA Policy and Advocacy Mananger at Access Now. “The UK government must immediately intervene to free Alaa and end this cruelty.”

        As the Egyptian government tightens ranks, Alaa’s family, and the whole world, need proof of life now. While information on Alaa’s current situation is sparse due to authorities blocking his visitation, his sister, Mona Seif, Tweeted about an interaction with prison staff, who reportedly stated, “Medical intervention has been taken with Alaa, with the knowledge of judicial entities.” Alaa’s lawyer reported today, November 10, that he had been granted a visit, but was subsequently denied access to the prison.

    • Internet Policy/Net Neutrality

      • RoseHostingHistory of the Internet - RoseHosting

        Take a step back and imagine the world without the Internet. No social media, websites, e-commerce stores, or online chat rooms. The world would be a little blank for many of us.

        Actually, people did live before the Internet came into existence. However, its presence revolutionized the globe and rapidly created immense opportunities.

        So, who invented the Internet? When was the Internet invented? What was the very first message transmitted over the network? All these questions come to our minds at least once.

    • Monopolies

      • Microsoft “irreparably damaging” EU’s cloud ecosystem, industry group claims | Ars Technica

        CISPE has filed a complaint, urging the European Commission to open a formal investigation into how Microsoft is allegedly “irreparably damaging the European cloud ecosystem and depriving European customers of choice in their cloud deployments.”

      • Public KnowledgePublic Knowledge Cheers FTC’s New Section 5 Statement To Increase Competition - Public Knowledge

        Today, the Federal Trade Commission issued a new policy statement outlining the agency’s powers to address “unfair methods of competition” under Section 5 of the FTC Act, clearing the way for new agency action to curb anti-competitive behavior in Big Tech and across the economy.

        The announcement follows the agency’s move last year to rescind its 2015 competition policy statement that had curtailed the FTC’s ability to create competition rules and limited the kinds of enforcement actions it could bring against dominant firms that engaged in anti-competitive practices. Public Knowledge previously applauded the decision to rescind that policy statement, suggesting that a new statement would prove an important next step. Now, we have that new statement.

  • Gemini* and Gopher

    • Personal

    • Technical

      • Envy

        I play an arcade music game by Konami called "Sound Voltex", which I first picked up in 2015. The game's song charts feature difficulty ratings that range from 1 to 20. Though I've now been playing the game for seven and a half years, I still haven't managed to beat any level-20 charts yet.

        A close friend of mine began playing Sound Voltex, which is often shortened to SDVX, about three and a half years ago. He now regularly clears some of the highest-rated charts. This has bothered me a lot in the past. I'd get frustrated at my own inability to progress, and I'd feel jealous of his skills. What bothered me more, however, was that I was one of the only SDVX players in my area back in 2015, so people often came to me when they were curious about the game or wanted to share scores and tips. Now everyone talks to him instead.

      • Programming and More

        • Re: wayland or tmux

          I know I do a lot of Emacs proselytizing on this phlog, and I'm sure the vanishingly small number of people who read my stuff are sick of it, but I read this post on uninformative.de [1] and it struck such a chord of familiarity that I can't hold myself back. :)

          The post describes how the author, frustrated with the declining support for X11, is hunting for new ways to continue remaining in control of their computer. Not control in the philosophical free software is freedom sense (although this is obviously of paramount importance!) but in the very practical but somewhat orthogonal sense of being _easily_ able to completely customize their interaction with their computer that was previously afforded by the relative ease of writing X11 window managers.

        • Maintainer's thoughts: Twitter (but it's actually about Nim)

          So, this is my first gemlog item on the English variant of my capsule. I'd like to tell you how I packaged Nitter for Gentoo.

          [...]

          The problem was their package manager/build system, called Nimble. It didn't work in network-sandboxed environments, didn't have staged installation support and there was no way to tell if build/test stage could be run without invoking these commands.


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

[Video] Time to Acknowledge Debian Has a Real Problem and This Problem Needs to be Solved
it would make sense to try to resolve conflicts and issues, not exacerbate these
Daniel Pocock elected on ANZAC Day and anniversary of Easter Rising (FSFE Fellowship)
Reprinted with permission from Daniel Pocock
Ulrike Uhlig & Debian, the $200,000 woman who quit
Reprinted with permission from disguised.work
Girlfriends, Sex, Prostitution & Debian at DebConf22, Prizren, Kosovo
Reprinted with permission from disguised.work
 
[Video] Debian's Newfound Love of Censorship Has Become a Threat to the Entire Internet
SPI/Debian might end up with rotten tomatoes in the face
Joerg (Ganneff) Jaspert, Dalbergschule Fulda & Debian Death threats
Reprinted with permission from disguised.work
Amber Heard, Junior Female Developers & Debian Embezzlement
Reprinted with permission from disguised.work
[Video] IBM's Poor Results Reinforce the Idea of Mass Layoffs on the Way (Just Like at Microsoft)
it seems likely Red Hat layoffs are in the making
IRC Proceedings: Wednesday, April 24, 2024
IRC logs for Wednesday, April 24, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Links 24/04/2024: Layoffs and Shutdowns at Microsoft, Apple Sales in China Have Collapsed
Links for the day
Sexism processing travel reimbursement
Reprinted with permission from disguised.work
Microsoft is Shutting Down Offices and Studios (Microsoft Layoffs Every Month This Year, Media Barely Mentions These)
Microsoft shutting down more offices (there have been layoffs every month this year)
Balkan women & Debian sexism, WeBoob leaks
Reprinted with permission from disguised.work
Martina Ferrari & Debian, DebConf room list: who sleeps with who?
Reprinted with permission from Daniel Pocock
Links 24/04/2024: Advances in TikTok Ban, Microsoft Lacks Security Incentives (It Profits From Breaches)
Links for the day
Gemini Links 24/04/2024: People Returning to Gemlogs, Stateless Workstations
Links for the day
Meike Reichle & Debian Dating
Reprinted with permission from disguised.work
Europe Won't be Safe From Russia Until the Last Windows PC is Turned Off (or Switched to BSDs and GNU/Linux)
Lives are at stake
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 23, 2024
IRC logs for Tuesday, April 23, 2024
[Meme] EPO: Breaking the Law as a Business Model
Total disregard for the EPO to sell more monopolies in Europe (to companies that are seldom European and in need of monopoly)
The EPO's Central Staff Committee (CSC) on New Ways of Working (NWoW) and “Bringing Teams Together” (BTT)
The latest publication from the Central Staff Committee (CSC)
Volunteers wanted: Unknown Suspects team
Reprinted with permission from Daniel Pocock
Debian trademark: where does the value come from?
Reprinted with permission from Daniel Pocock
Detecting suspicious transactions in the Wikimedia grants process
Reprinted with permission from Daniel Pocock
Links 23/04/2024: US Doubles Down on Patent Obviousness, North Korea Practices Nuclear Conflict
Links for the day
Stardust Nightclub Tragedy, Unlawful killing, Censorship & Debian Scapegoating
Reprinted with permission from Daniel Pocock
Gunnar Wolf & Debian Modern Slavery punishments
Reprinted with permission from Daniel Pocock
On DebConf and Debian 'Bedroom Nepotism' (Connected to Canonical, Red Hat, and Google)
Why the public must know suppressed facts (which women themselves are voicing concerns about; some men muzzle them to save face)
Several Years After Vista 11 Came Out Few People in Africa Use It, Its Relative Share Declines (People Delete It and Move to BSD/GNU/Linux?)
These trends are worth discussing
Canonical, Ubuntu & Debian DebConf19 Diversity Girls email
Reprinted with permission from disguised.work
Links 23/04/2024: Escalations Around Poland, Microsoft Shares Dumped
Links for the day
Gemini Links 23/04/2024: Offline PSP Media Player and OpenBSD on ThinkPad
Links for the day
Amaya Rodrigo Sastre, Holger Levsen & Debian DebConf6 fight
Reprinted with permission from disguised.work
DebConf8: who slept with who? Rooming list leaked
Reprinted with permission from disguised.work
Bruce Perens & Debian: swiping the Open Source trademark
Reprinted with permission from disguised.work
Ean Schuessler & Debian SPI OSI trademark disputes
Reprinted with permission from disguised.work
Windows in Sudan: From 99.15% to 2.12%
With conflict in Sudan, plus the occasional escalation/s, buying a laptop with Vista 11 isn't a high priority
Anatomy of a Cancel Mob Campaign
how they go about
[Meme] The 'Cancel Culture' and Its 'Hit List'
organisers are being contacted by the 'cancel mob'
Richard Stallman's Next Public Talk is on Friday, 17:30 in Córdoba (Spain), FSF Cannot Mention It
Any attempt to marginalise founders isn't unprecedented as a strategy
IRC Proceedings: Monday, April 22, 2024
IRC logs for Monday, April 22, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Don't trust me. Trust the voters.
Reprinted with permission from Daniel Pocock
Chris Lamb & Debian demanded Ubuntu censor my blog
Reprinted with permission from disguised.work
Ean Schuessler, Branden Robinson & Debian SPI accounting crisis
Reprinted with permission from disguised.work
William Lee Irwin III, Michael Schultheiss & Debian, Oracle, Russian kernel scandal
Reprinted with permission from disguised.work