There are 179 supercomputers on the Top500 list that use one or another form of accelerator to do the bulk of their calculations, and of these, there are 84 machines that use Nvidia’s “Volta” V100 GPUs, 64 that use Nvidia’s “Ampere” A100 GPUs. There is a single machine using Nvidia’s “Hopper” H100 GPUs, and that is the “Henri” system at the Flatiron Institute in New York City. The Henri machine is built by Lenovo using its ThinkSystem SR670 V2 servers with a pair of 32-core Ice Lake Xeon SP-8362 Platinum processors and a quad of H100 GPUs with 80 GB of HBM3 memory. The Henri nodes are linked by 200 Gb/sec HDR InfiniBand from Nvidia, and the machine has a total of 5,920 CPUs and SMs and a peak performance of 5.42 petaflops and a sustained performance of 2.04 petaflops. That is only a 37.6 percent computation efficiency, which is raising our eyebrows a bit, but the machine only used 31.3 kilowatts and thus delivers 65.1 gigaflops per watt. That’s a smidgen better than the Frontier development system (which has lower Slingshot overhead than the actual Frontier machine) and quite a bit better than Frontier itself.
[...]
For years and years, we have been complaining that the middle and some of the bottom of the Top500 list is dominated by telcos, service providers, and clouds who run Linpack tests on portions of their infrastructure to give their OEMs and nationalities a boost on the list. We do not expect this to change, and it warps the list in ways that distort the true HPC market.
Today we cover a broad range of the features in LibreOffice. Personally I use this for my books, but it has full features for using the application as a full replacement for Microsoft Office.
Some great discoveries including traffic shaping, USB over IP, speech to text, and a funny Firefox extension. Plus Graham talks to Ken VanDine, the engineering manager for Ubuntu Desktop.
Much like Y2K, the 2038 problem is another one of those bizarre issues that will finally catch up to us and this time it's effecting every Unix system, whether we're talking about Linux, BSD variants, MacOS or game consoles because of a simple number storing time.
In this video, we are looking at how to install the Opera browser on Linux Mint 21.
Here are five real Notepad++ replacement(s) for Ubuntu and other Linux distros.
The most common application which you could find in Linux is notepad or text editor. There are so many notepad, note-taking and basic editors out there, that its difficult to choose from.
That being said, if you are a Windows user/developer and recently migrated to Linux, you might be looking for a replacement for the popular text editor – Notepad++. Since this application officially provides only Windows setup (exe), here in this article, we give you its real alternatives.
These five apps are the latest worthy alternatives to Notepad++ in Linux distributions.
If you’re starting out in video editing, you may be wondering what software to use. There are many paid professional options like Avid and Adobe Premier. However, if you only need an editor for common uses like YouTube videos, there’s no need to spend money on these programs. Instead, there are quite a few free and open source video editors that will fit your needs, such as Kdenlive, Pitivi, Flowblade, OpenShot, and much more. In this article, we’ll focus on the OpenShot video editor.
I like to dabble around in playing instruments, I am, by no means, a musician but doing a little noodling around from time to time can be quite gratifying. In my younger years, I did enjoy playing more than one instrument, today, I am taking on some new challenges, nothing crazy, I just happen to want to play the bass guitar. There is something almost indescribably satisfying when you can actually play the notes in the sequence and tempo that you intend.
In order to be able to play the bass guitar, I had to tune the thing. I am sure that there are countless apps for any of the major mobile platforms but mobile platforms are not exactly my favorite to use. I much, much prefer the warm comforts of openSUSE Linux and the application that really caught my eye was Lingot. Unfortunately it wasn’t available in a Snap, Flatpak or AppImage but was available in the openSUSE repositories.
Amusingly, Lingot is another one of those infamous open source application “backronyms” names, Lingot Is Not a Guitar-Only Tuner. One of the fun things about open source applications is the lighthearted nature in software development. Open Source, never stop being you!
My note-taking app of choice for the last three years has been Joplin, an open-source note-taker for Android, Linux, MacOS, and Windows. As I discussed in my app review, the desktop app is good, but the Android app has some issues. In the last year, updates to the app have brought along more issues. I can no longer rely on it, and the time has come for me to migrate away from the Joplin app.
I do remember, back in the early 2000s, that finding sufficient apps on Linux was a bit of a challenge. Sure, there were some equivalents, but they were so early on in development that they sometimes couldn't help me get to where I needed to be without considerable work.
Consider this: I worked in an organization that was pretty much all MS Office.
In fact, I was the only person there who was not using MS Office. Needless to say, using Star Office was problematic. I had to bend and twist formatting and templates to make it work, and it barely did at that. I was told if I didn't start using MS Office, there would be penalties.
Fortunately, that was a metaphorical lifetime ago. Today, things are quite different and there are plenty of apps available to the Linux operating system, apps that are 100% capable of helping you be productive, creative, and effective, no matter what it is you are doing.
Let's take a look at some of those app equivalents that you might not be aware of (and some that you may).
Monit is an open-source utility program that manages and monitors resources and services on Linux systems such as Ubuntu. Some services and resources managed by Monit are CPU usage, memory usage, server uptime, network connections, and server application services. The monitoring manager ensures that all running services are always healthy by restarting services that stop or encounter operating errors. These errors can be caused by many things, such as a power outage or a service crash Monit can help prevent downtime and keep your system running smoothly by monitoring and managing these resources.
In the following tutorial, you will learn how to install Monit on Ubuntu 22.10, 22.04, and 20.04 using the version direct from Ubuntu’s repository and how to configure Monit to be accessible from your browser using the command line terminal.
In today’s installment of things you already know, unless you don’t, this is how you look up a TXT domain record with drill(1) on FreeBSD:
$ drill $DOMAIN txt
You’d think that I’d get that order right one of these days.
This isn’t anything particularly earth shattering here, the point here is to make a kind of “CubicleNate bookmark” for me and to be openly criticized by those that know more than me on this subject. The problem I had was pausing and resuming properly using OctoPrint on my Ender3 Printer. I messed up more than one print by trying to do it and I really think this should be the default behavior but here we are.
Learn how to install and configure Ansible on Ubuntu 20.04 LTS Linux to automate administrator tasks for a group of servers from a single system.
If you have to manage multiple Linux servers then manually configuring and installing software on each of them is not only a time-consuming but also a labor-intensive task. Thus, Automation or orchestration is used in such environments.
Apache Kafka is greatly enhanced by the Knative broker, which reduces overhead for message delivery. Red Hat OpenShift has its own Knative implementation, introduced as a Tech Preview earlier this year. Our Knative implementation has reached General Availability now with the 1.25 release of Red Hat Openshift Serverless.
The Network Time Protocol (NTP) is a protocol used to synchronize computer system clocks automatically over a network. The machine can have the system clock use Coordinated Universal Time (UTC) rather than local time.
Maintaining accurate time on Linux systems, especially servers is an important task for many reasons. For example, in a networked environment, accurate timekeeping is required for accurate timestamps in packets and system logs for root-cause analysis, determining when problems occurred, and finding correlations.
Is your internet browsing experience slow on your Linux device, or are the websites you’re visiting outdated or the wrong website altogether?
The ac command can provide very useful summaries of how much time users spend logged into a Linux system. It gets its data from the wtmp file.
If you want to create some basic 2D plans, Libre Office draw does a pretty good job and is quite easy to pick up and use. I use LibreOffice Draw myself to plan out some of my own small woodworking projects.
The kernel has two ways to build these swap extents for a swap file. First, a filesystem may support an explicit way of obtaining these swap mappings through a swap_activate method it provides. How these functions work depends; the ext4 one uses a generic 'iomap' system with an ext4-specific callback (cf fs/ext4/inode.c), while the NFS code basically pretends that the NFS swap file is a block device, creating a single file-wide direct mapping (see nfs_swap_activate() in fs/nfs/file.c).
Second, for filesystems that don't have specific support, the kernel will go through every block in the file and attempt to map it to a disk block, then identify contiguous runs of blocks and merge them together in a single extent (see bmap() in fs/inode.c and generic_swapfile_activate() in mm/page_io.c). This only works if the filesystem can map file blocks to disk blocks for you, which not all filesystems can. Presumably it's potentially rather slow, especially for large swap files. I believe that most filesystems that expect (and want) to be used for swap have their own fast swap_activate function because of this.
Linux Mint is an excellent Linux distribution, especially for beginners.
I like that it stays on the familiar Ubuntu/Debian front and yet it does several things better than Ubuntu. One of them is that it doesn’t push Snaps down my throat.
However, I am not a fan of the Cinnamon desktop as I never really liked the Windows XP or 7’s default setup either.
Jami is a powerful and secure peer-to-peer communication solution that offers voice, video, and chat capabilities. It is being developed by Savoir-faire Linux, a Canadian company specializing in free software. The ancestor of Jami is SFLphone, a portable SIP/AIX software phone also developed by Savoir-faire Linux. Jami retains most of the audio and SIP capabilities of SFLphone but adds many new features and improvements. For example, Jami introduces a decentralized network that allows users to communicate directly with each other without the need for central servers. This provides more secure and private communication, as there is no centralized point of failure or control. In addition, Jami includes support for multiple platforms and devices, making it accessible to everyone.
The following tutorial will teach you how to install Jami on Ubuntu 22.10, 22.04, 20.04 Linux desktops with APT, Snap, or Flatpak method using the command line terminal and instructions on how to update and remove the software in the future if required.
With the quick install option for WordPress, you get the latest WordPress Version installed and configured. All without sacrificing server security thanks to the quick firewall configuration. Plus, can add another layer of security with Two-Factor Authentication for secure CloudPanel login.
Moreover, you can install Let’s Encrypt SSL certificates in one click for free. So, this setup makes it easy.
One of the best features of CloudPanel is that it i
Telegram is one of the most popular chat services out there. You’re in luck if you own a Chromebook and want to use the native Telegram app rather than the web interface. You can get the Telegram app working on your Chromebook in several ways. This guide will show you how to set up the Android Telegram and native Linux Telegram apps.
WhatsApp is a free messaging application used by over a billion people worldwide. WhatsApp provides secure, reliable voice and video calls that can be made locally or internationally with a Wi-Fi or cellular data connection. WhatsApp is available for multiple devices, like computers, tablets, and phones.
Though there doesn’t exist a download link for Linux on the WhatsApp website, it’s still possible to install WhatsApp on Ubuntu. In this tutorial, you’ll learn two methods of installing WhatsApp on Ubuntu.
AnyDesk is a cross-platform software that provides secure remote access for file transfer or VPN features. It also works well as another tool in professionals’ arsenal when they need more control over what’s going on in their machine than what is available through other means.
Plex Media Server is a widely used software to store all your digital media content and access it via various client applications. It is popular among users for its ability to store TV Shows and Movie Libraries and share content with friends and family members. Plex Media Server has continuously grown in popularity and now supports many platforms. Some of the most popular client applications for accessing content from a Plex Media Server include NVIDIA Shield, Roku, Mobile App, and many more. The software organizes your files and content into categories, making it easy to find and use. In addition, the Plex Media Server provides security and privacy features that allow you to control who can access your content and when. The Plex Media Server is a great way to store and share digital media content.
In the following tutorial, you will learn how to install Plex Media Server on Ubuntu 22.10, 22.04, and 20.04 Linux LTS by securely importing the GPG key and official Plex repository and some tips on basic sets creating a reverse proxy with Nginx for users that wish to access Nginx remotely, this is not required for internal home networks.
Anyone who has used Ubuntu will know that it comes with a great screenshot tool called Flameshot. This tool is simple to use and offers a range of features that make taking screenshots easier and faster. For example, you can capture the entire screen or just a specific area, and you can also capture screenshots of windowed applications. In addition, Flameshot offers several editing features that can annotate or highlight portions of the screenshot. Overall, Flameshot is a valuable tool for anyone who needs to take screenshots regularly.
In the following tutorial, you will learn how to install Flameshot on Ubuntu 22.10, 22.04, and 20.04 Linux with cli commands using two methods, APT or Flatpak/Flathub, using the command line terminal. For most users, I would always recommend installing the version from Ubuntu’s repository first. For users that prefer Flatpaks and more frequently updated applications, use the Flathub source.
Once upon a time, Deepin Linux was heralded as the single most beautiful Linux distribution on the market. And it was. There was a certain polish the UI had that others couldn't match. The funny thing about competition is that it breeds innovation.
Recently, multi-cloud and hybrid cloud deployments have gained significant traction as they let you optimize costs, increase scalability, improve agility, and achieve greater operational resilience. However, with these deployment strategies, managing different Kubernetes clusters with multiple tools and dashboards can be a challenge; Rancher can help you seamlessly manage such deployments at scale.
This article will explore the features and capabilities of Rancher, an open source Cloud Native Computing Foundation (CNCF) certified Kubernetes distribution designed to make it easy to deploy, manage, and monitor multi-cluster environments from a centralized UI. Here, you’ll learn about Rancher and the different deployment options it provides, and understand the aspects that make it unique.
AWS re:Invent is a learning conference hosted by Amazon Web Services for the global cloud computing community. The in-person event features keynote announcements, training and certification opportunities, access to technical sessions, and so much more.
Also: Guides to updating u-boot and getting Waydroid running on the Librem 5, FOSDEM 2023 FOSS on mobile devices devroom CfP, the Juno Tablet on video, and improvements to Sailfish OS on the PinePhone Pro!
The main aim of this release was converting to Psycopg 3. Thanks to Daniele Varrazzo for his assistance. In addition, we have removed the depedency on pgdbconn and no longer support Python 2.x. Postgres releases from PG 10 to PG 15 are supported.
temBoard allows you to manage and monitor your PostgreSQL fleet.
Dalibo announce the immediate availability of temBoard 8.0. This new major release review authentication between interface and agents, brings new features, and renews the foundations of the project. Follow carefuly upgrade guide for a reliable migration.
As you’re no doubt aware, LibreOffice is free and open source software, which means that anyone can delve into the code behind it, study how it works, and adapt it for their needs. And we’ve seen many examples of this, with LibreOffice’s core engine being adapted by the ecosystem to work on mobile devices and in web browsers, for instance.
Meanwhile, blockchain is technology that provides a distributed ledger, made up of growing list of records (blocks), that are securely linked together using cryptography. The most famous (or sometimes infamous!) example of blockchain technology is cryptocurrencies (eg Bitcoin), but it can also be used in many other ways such as in smart contracts, authentication and games.
The first edition was published in 2016, and was downloaded over thirty-five thousand times. Michael Meeks, one of the co-founders of LibreOffice, described the first edition as “an outstanding contribution to help people bring the full power of LibreOffice into their document.” Similarly, free software author and journalist Carla Schroder wrote, “Designing With LibreOffice teaches everything you need to know about document production…. suitable for beginners to wizened old pros, who will probably discover things about LibreOffice that they didn’t know.”
This is a bugfix release for gnunet 0.18.0.
We are happy to announce that we have successfully aquired funding for further GNS development and polishing!
This is mostly a bugfix release for libgnunetchat 0.1.0. But it will also update the build process of libgnunetchat to use GNU Automake and it will ensure compatibility with latest changes in GNUnet 0.18.0.
Most of us who write C and C++ code intuitively understand why some programs might behave differently when compiled with different compilers or different compiler options, or when running under particular conditions. We're also aware of the dangers of undefined behavior and usually try to avoid it in our code. But not all of us appreciate the many useful (and often unavoidable) aspects of undefined behavior. This article explains the kinds of behavior the C standard uses to categorize programs and their subtle, sometimes unexpected, impacts on compilers, libraries, other standards, and programmers themselves.
Programmers are rarely familiar with the subtle nuances of undefined behavior. Nor do programmers pay as close attention to the other kinds of behavior that C programs are subject to, or when that behavior might occur. In our discussions, we often use terms like "valid code" or "correct program" without having a shared understanding of their meanings.
I'm sometimes surprised that not even expert programmers, including C committee members, always agree on what the terms mean. Some don't know why the basic categorizations of program behavior were introduced into C in the first place, or their purpose.
I've always found training models on code to be interesting – there's large amounts of structured data and text is a fairly simple input/output interface that can be automatically be checked for syntax correctness.
I have found a new bugbear. Something to be creatively annoyed about. I’m going to call it 80/20 refactoring, to express the idea that a refactoring is started, but then not finished. Probably because doing all of the edge cases in a refactoring is hard.
Let's assume that you are working on a code base and notice that it has some minor issue. For argument's sake we'll say that it has some self written functionality and that the language's standard library has added identical functionality recently. Let's further assume that that said implementation behaves exactly the same as the self written one. At this point you might decide to clean up the code base, make it use the stdlib implementation and delete the custom code. This seems like a nice cleanup so you then file merge request to get the thing changed.
[...]
Getting blocked like this is a bit unfortunate, but these things happen. The important thing, however, is that all these are solid technical reason for not doing the cleanup (or at least not do it immediately). Things get bad when you get blocked by some other reason, such by your reviewer asking "why are you even doing this at all". This is a reasonable question, so let's examine it in detail.
Suppose that instead of submitting a cleanup commit you are instead submitting a piece of completely new functionality. In this MR you have chosen to reimplement a piece of standard library code (for no actual gain, just because you were not aware of its existence). The review comment that you should get is "You are reimplementing stdlib functionality, delete that code here and use the standard library instead". This is a valid review comment and something that should be heeded.
The weird thing here is that this is in a way the exact same change, but it is either not acceptable or absolutely necessary depending on whether parts of the code are already inside your repo or not. This is weird and should not be the case, but human beings are strangely irrational and their "value functions" are highly asymmetric. This can lead to lots of review fighting if one person really wants to fix the issue whereas some other one does not see the value in it. The only real solution is to have a policy on this, specifically that submitting a change that fixes an issue that would be unacceptable in new code is, by itself, a sufficient reason to do the work but not to merge it without technical review. This shifts the discussion from "should this be done at all" to "what are the technical risks and merits of this change", which is the way reviews should be done.
awk is a great tool that can help with all sorts of parsing, processing and summarizing cleartext data.
Video content is here to stay. As a text-based person with a face for radio, I’ve come to grips with it. But that doesn’t mean video alone gets it done.
If you’re producing video content, please also share a transcript of the video. I realize some people love video, and that’s fine – but it’s not that much harder to include a transcript and it’s much more inclusive and potentially more effective.
[...]
Note that this isn’t limited to external content. If you’re doing internal comms? Provide a transcript too. If it’s worth doing any kind of video, it’s worth doing a transcript.
AMD has added two new low-cost, low-power members to its UltraScale+ family with the Artix UltraScale+ AU7P FPGA and the Zynq UltraScale+ ZU3T MPSoC.
Both devices are manufactured with the 16nm FinFET process and offer entry points to the transceiver-based UltraScale+ family with features such as high I/O-to-logic density, UltraRAM, DSP, and more.
Espressif Systems has just announced the Matter-compatible ESP-ZeroCode modules with Wi-Fi and/or Thread (802.15.4) wireless connectivity that are designed as plug-and-play solutions for LED lights, outlets, switches, dimmers, relays, fans, and other lighting and electrical devices.
I was only recently introduced to no-code programming in a recent post by Ninephon Kongangkab explaining how to use SenseCraft firmware for no-code programming on Wio Terminal. Basically, there’s no need to know Arduino, MicroPython, or any programming language, as the user just has to press a few buttons to configure an IoT device to meet his/her requirements. With the ESP-ZeroCode modules, Espressif offers something similar using several of their ESP32 chips.
After my recent restoration work for the Acorn Archimedes A3010 I thought I should try something in that range that is a little beefier. The RiscPC is one of the last machines in the Archimedes range and has some interesting features such as the capability of installing a 486 CPU co-processor to run DOS and Windows software.
[...]
As you can see, it looks like it has been kept in a garage or somewhere similar. The plastics are going to need quite a bit of cleaning and the keyboard is missing a key. I might clean the keyboard up and obtain the missing key, or replace the whole thing. The keyboard is essentially an Acorn branded standard PS/2 keyboard.
As Dave from the EEVBlog would say “Don’t plug it in, take it apart”. I dare not turn it on at this stage without seeing what is inside. RiscPCs have a battery inside them, so I’m expecting some leakage. The machine is incredibly easy to disassemble, the case has two long pegs plastic which you unlock and pull out, then the lid just lifts off.
An experiment involving a Fibonacci pattern of laser pulses apparently yielded a new state of matter.
If there is one bright spot in the Xeon SP server chip line from Intel, it is the version of the “Sapphire Rapids” Xeon SP processor that has HBM memory welded to it. These chips make a strong case for adding at least some HBM memory – or something that looks and feels like it – to compute complexes that are working on HPC and AI workloads that are memory bandwidth bound and therefore cannot – and do not – squeeze every bit of performance out of the CPUs they run on.
As we previously reported, this future Sapphire Rapids HBM processor will be sold by Intel under the Max Series brand, as will the “Ponte Vecchio” GPU formerly know by the Xe HPC brand. The way Intel sees it, and speaking very generally of course, HPC and AI workloads fall into roughly three buckets. About 50 percent of them are compute bound, about 30 percent are memory bandwidth bound, and the remaining 20 percent are a combination of the two. Workloads that are bound by memory bandwidth include weather modeling, seismic processing and reservoir modeling in the oil and gas industry, and AI training. Compute bound workloads include molecular dynamics, protein sequencing, and anything crunching dense linear algebra equations. Risk modeling in the financial services sector is in the middle of these two extremes, and both crash simulation and computational fluid dynamics, like risk modeling, like CPU frequency over CPU throughput and are either more or less sensitive to memory bandwidth (crash simulation less so than CFD).
Addressing these distinctions across workloads means having different kinds of compute and memory in different mixes to optimize for different workloads. And that, in a nutshell, is why Intel has to have GPUs with HBM, CPUs with DRAM, and CPUs with HBM in its lineup.
My spouse told me he didn’t feel well today, and started coughing, and was running a fever, so I ran a couple quick COVID tests that I had left over from when the feds were handing them out in the mail.
I ran an Abbott BinaxNow first, and when the double line showed up REALLY fast, I said “SHIT, uhhh….Bad test?” (hey, even I’m entitled to drift off into wishful thinking now and then), and grabbed an iHealth test and ran that, and that one showed double lines (positive) as well.
[...]
6 months later, we got “first booster” and about 5 weeks ago, got “Omicron booster”, and we still have COVID in our house, obviously, and my spouse is off work all week, and now I’m just waiting to see if I get it too.
So this is lovely, isn’t it?
It might have been worse without the vaccines, but Mom will just jump on this as “proof” that the vaccines “don’t work at all”, because “splitting” is a hallmark of the personality of both my parents.
The petition alleged that to ensure a higher profit margin, the company manufacturing Dolo tablets distributed freebies to doctors to prescribe the 650 mg drug.
Eli Lilly’s stock dipped Friday morning after someone paid $8 to verify a Twitter handle resembling that of the pharmaceutical giant and posted: “We are excited to announce insulin is free now.”
Insulin, of course, is not free. In the U.S., one study released this summer found that the high price of the lifesaving drug puts an extreme financial burden on about 14% of the 7 million Americans who need it regularly.
The prank appears to have served to highlight this harsh reality, prompting backlash from people who use Twitter. Other insulin manufacturers, Sanofi and Novo Nordisk, also saw their stocks take a dip.
The Eli Lilly imposter verified the handle @EliLillyandCo, taking advantage of Twitter’s new rules governing who gets to have a verified account. The company’s real handle is @LillyPad.
There are, like, a thousand interesting stories about Twitter under Elon Musk’s ownership, and this is just one. But there are several interesting angles to just this one story:
People in Andhra Pradesh’s West Godavari district, battling the proposed dumping of 50,000 litres of polluted water from a mega aqua food park into the Gonteru drain every day, find they are fighting the state as well
A dual Russian-Canadian national has been taken into custody in Canada, on suspicion of playing a role in the LockBit ransomware attacks that have targeted vital infrastructure and industrial groups across the world since 2020.
Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand coding concepts in order to correctly interpret the activity of malicious actors on their networks, and they must be able to write code to perform their own work more efficiently and effectively. While not every cybersecurity job explicitly includes coding skills as a job requirement, it's hard to imagine any cybersecurity career that wouldn't benefit from the ability to knock out at least a few lines of code every once in a while.
Linux developers are not so fortunate. According to developer Richard Hughes updating the firmware on Arc GPUs appears to be handled by the Intel Management Engine, a small microcontroller that is only included in PCs with Intel processors. Hughes ran into a problem with IBM's POWER CPU architecture, but it seems to make firmware updates impossible on any non-Intel platform, including those based on AMD or Arm CPUs.
Ransomware generally attacks only systems running Microsoft's Windows operating system.
CISA has added one new vulnerability to itsââ¬Â¯Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This type of vulnerability is a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the "Date Added to Catalog" column, which will sort by descending dates.
The local privilege escalation vulnerability in the Linux Kernel was reported by Redhat, and its CVE code is 2022-3977. The problem is that the most recent Linux kernel upstream contains a use-after-free vulnerability called mctp sk unhash that may be exploited to elevate privileges to root. When a program tries to utilize memory that has been released or no longer assigned to it after it has been given to another application, it is known as a use-after-free vulnerability. In cyber attack situations, this might result in arbitrary code execution or provide an attacker access to remote code execution capabilities. It can also cause crashes and unintentional data overwriting.
Internet giant Google has agreed to pay a record $391.5 million to settle with 40 states in the U.S. over charges the company misled users about the collection of personal location data.
"Google misled its users into thinking they had turned off location tracking in their account settings, when, in fact, Google continued to collect their location information," Oregon Attorney General Ellen Rosenblum said Monday.
"For years Google has prioritized profit over their users' privacy. They have been crafty and deceptive," Rosenblum stated.
The investigation was sparked by a 2018 report from the Associated Press that revealed Google was continuing to track users' locations on Android and iOS even when users turned off "location history" in their account settings, effectively undermining the privacy controls.
Twitter raider and Tesla founder Elon Musk might not be the world’s richest man for long. What’s the scam?
The scam is debt, or “leverage” as they call it in financial markets. Neither Tesla or Twitter make much of a profit. Both have enormous debt and Musk has to service that debt as interest rates rise while trying to work out how to monetise both companies.
The incredible success of Tesla meanwhile is about to be sorely tested. This is a company that has yet to face competition but the established car makers in Europe, Japan, Korea and China are about to hit the market for electric cars, with all their distribution, marketing and engineering expertise. In the words of Australia’s top auto journalist, John Cadogan, “Tesla is doomed“.
Meanwhile, Musk’s Twitter foray has already cost him billions after he forked out $US44bn to buy it with other people’s money then discovered just how fragile is the online ecosystem. He sacked thousands to get costs down and whacked an $8 charge on Twitter’s “blue tick” users which hilariously led to pranksters buying blue ticks, impersonating the likes of drug company Eli Lilly and weapons maker Lockheed Martin, wiping billions off their share prices.
At the end of July, Microsoft and Google’s parent company, Alphabet, presented their latest and relatively disappointing economic results blaming it on the macroeconomic distress. What may have gone unnoticed is that both companies referred to their clouds as the main engines of growth. The cloud was also responsible for Amazon’s better-than-expected quarterly results.
The cloud refers to computing services, including software, hardware, and platforms offered as services through the Internet instead of running locally on individual computers. By 2025, 45% of the world’s data storage will be on the cloud. We are constantly storing information and accessing online applications through the cloud.
As Bill C-18 heads to clause-by-clause review later this week, the prospect that Facebook could block news sharing on its platform in Canada in response has attracted the ire of politicians and concerns from media outlets that rely on social media as part of their business model. But is this a bluff or, having just laid off 11,000 employees, an accurate reflection of where the company stands on the value of news on its platform given current economic realities?
Axel Bruns is a Professor of Communication and Media Studies at QUT Digital Media Research Centre, Queensland University of Technology in Brisbane, Australia, who has written about the Australian News Media Bargaining Code and the effects of the Facebook news sharing blocking in 2021. He joins the Law Bytes podcast to discuss the Australian experience in an effort to answer the question of whether Facebook is bluffing or if news sharing on the platform in Canada is placed at risk should Bill C-18 become law.
Max did a funny thing where he verified his personal website. (He also official-ified it, as there appears to be a difference between the two — at least at the time of this writing, who knows that could change…)
"Oblique Strategies" is Brian Eno and Peter Schmidt's deck of 100+ cards, each with a sentence of gnomic advice. They inspired Roxy Music, David Bowie, Talking Heads and Devo. My favorite? "Be the first person to not do something that no one else has ever not done before."
Why that one? Because it challenges us to imagine how something that we perceive as unitary and indivisible might be decomposed into smaller units. It's a challenge to the notion that one must "take the bad with the good." What if we could just get rid of "the bad?"
Back in 1998, John Kelsey and Bruce Schneier proposed the "Street Performer Protocol" as a means of funding nonrivalrous, nonexcludable projects – that is, things that can be infinitely reproduced at effectively no cost, and whose reproduction can't be easily prevented: things like software and digital books, music, and videos.
[...]
How did we get rid of pop-ups? It wasn't by banning them – it was by blocking them. Browser vendors sought out competitive advantages by adding pop-up blocking to their offerings: first Opera, then Mozilla, and, finally, Internet Explorer.
I knew that dame was trouble as soon as she walked through the door. Probably because she broke the doorknob off when she came in off the sidewalk. Although, the maintenance problems at 734 Angler Street were not her fault. That I'll grant her.
"Ma'am. Ma'am, you'll need to climb up and around the edge of the Buddha," I told her, gesturing towards the large bronzed statue between us, which occupied most of the room. I knew about the 10-foot-wide Buddha in that office before I leased it. But the rent was low, and there was enough room for my desk in the corner. Round statues in rectangular rooms. That's just the way things worked in that hard-boiled town, back then.
Last week was the birthday of the final[1] Itanium chip released - the Poulson microarchitecture. I remember its release on 8 Nov 2012. I also remember reading the manual a few months prior and being underwhelmed. Some of the early materials released about the Poulson microarchitecture - and heavily boosted by a certain someone on RWT's forums, as well as by David Kanter himself - caused me to expect a significant boost in across-the-board performance that would finally propel IPF into competitiveness with Power, and earn its place at the top of Intel's product lineup while ensuring a long future.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.