Links 1/12/2021: Tux Paint 0.9.27 and WordPress 5.9 Beta

Posted in News Roundup at 8:48 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Taking Stock of Librem 14 – Purism

        Like many hardware companies, Purism has taken a “Just In Time” manufacturing approach for our products including the Librem laptop line. That means that we make a bit more of a product than we think we need, and schedule the next manufacturing run so that the product arrives in our warehouse “just in time” for us to deplete the previous manufacturing run. In an ideal world that means we never run out of stock, but also never have massive inventories taking up space in our warehouse.

        Also like many hardware companies the supply chain woes of the last two years have caused us to rethink this approach. Each time it seemed like we had made enough Librem 14s to catch up to current and projected orders, delays of one kind or another created a new backlog as new orders continued to come in. We’ve decided to scrap “Just in Time” in favor of manufacturing far more Librem 14s than we currently need, and will have our shelves full of Librem 14 stock by the end of the year.

      • HPi95LX Puts Linux In Your Palm | Hackaday

        A few decades ago, palmtop computers were mostly based on MS-DOS, and while many users tried to mimic the UNIX experience, the results were mixed. Fast forward to the present and business-card-sized Linux computers modules abound. Canadian tinkerer [Rune Kyndal] decided to make his own Linux palmtop by sacrificing an old HP-95LX and replacing the guts with a Raspberry Pi Zero and a color LCD screen. We’re impressed with the rich set of features he has crammed into the limited volume of the case:

      • Linux Fu: The Ultimate Dual Boot Laptop? | Hackaday

        I must confess, that I try not to run Windows any more than absolutely necessary. But for many reasons, it is occasionally necessary. In particular, I have had several laptops that are finicky with Linux. I still usually dual boot them, but I often leave Windows on them for one reason or another. I recently bought a new Dell Inspiron and the process of dual booting it turned out to be unusually effective but did bring up a few challenges.

        If you ever wanted a proper dual-booting laptop, you’ll be interested in how this setup works. Sure, you can always repartition the drive, but the laptop has a relatively small drive and is set up very specifically to work with the BIOS diagnostics and recovery so it is always a pain to redo the drive without upsetting the factory tools.

        Since the laptop came with a 512 GB NVMe drive, I wanted to upgrade the drive anyway. So one option would have been to put a bigger drive in and then go the normal route. That was actually my intention, but I wound up going a different way.

      • LXer: Laptop Dual Boot Project Part 2

        I know some of you are wondering why go through all of this when I could just install a Linux distro along side of windows and be done with it? One reason was I had to pay it off. A financed $550 laptop takes a little while to pay off. I didn’t want to change the machine any while I owed money on it. And the idea of messing with a bone stock laptop using Linux sounded fun. The good thing now is that I have paid it off so it’s all mine to do whatever I want with.

        So, for me it came down to PCLOS, Mint, SUSE or Ubuntu to install to my laptop. I tried them all ‘live’ from USB drives and a couple of them using VirtualBox. They are all good distros and there are many articles on why one or the other is good or better for you but for me, it came down to PCLinuxOS or Mint. Having come from Windows originally I am most comfortable with a “Windows like” environment. I think both PCLOS and Mint are two versions of that I like best. I like Mint mire but what has drawn me to PCLOS is that it is the only Linux I have tried in that the backlight on my keyboard works. It may sound dumb but it makes it easier for me being able to see the keys no matter the lighting situation I’m in.

        I tried to install PCLinuxOS onto my laptop and I got a “can’t call method on first_usable_sector unblessed reference” error at the very beginning of the install process. I couldn’t get around it and aborted the install. Time to do some research. Come to find out I have a AHCI-RAID problem. I got into the BIOS and changed the SATA configuration from RAID to AHCI but in rebooting, it wouldn’t boot.

        So I went back into my BIOS and wrote down the configuration in the SATA settings. It says I am running the “Intel RST Premium with Intel Optane System Acceleration”. I have been looking that up but haven’t found much…much I understand that is. More Googling is required.

        I got back into the boot menu and changed the SATA config back to Intel’s RAID setting and it re-booted just fine. It seems that for the moment I am able to run Linux from USB ‘live’ and under VirtualBox but I am unable to install it to the HD. For those who don’t know the big difference AHCI and Raid , it is how they store the data to the hard drive.

        I’ll use a sink with water filling it for the metaphor. RAID 1 offers redundancy through mirroring, i.e., data is written identically to two drives. Think of two sinks with the same water in them. RAID 0 offers no redundancy and instead uses striping, i.e., data is split across all the drives. think of two sinks with the water split between them. Half of the data goes into one drive and the other half into another drive. This means RAID 0 offers no fault tolerance; if the drives fails, the RAID unit fails.

      • Apple car will arrive at the same time as Linux on the desktop [Ed: Nick Farrell is trolling or click-baiting GNU/Linux users, as usual]

        Years after big reveal, Tame Apple Press predicts

        Apple is unlikely to get its car vapourware on the road for at least another 20 years even if it has a “big reveal” in five years, the Tame Apple Press finally admits.

        For years the TAPs has been running stories insisting that an Apple car was a few years away, even while its Project Titan was downsized and talent left to go to real carmakers.

      • Zoom boosts security with automatic updates for Windows and macOS — but Linux users miss out [Ed: Microsoft's loyal propagandist By Sofia Wyciślik-Wilson is trolling GNU/Linux users again... Zoom itself is antithetical to security]
    • ChromeOS

      • First Look: Chromebook “extra container management” in Chrome OS 98

        Earlier this month, I covered down a new feature that’s in the works for Chrome OS that will give users a native user interface for managing Linux containers. While still a work in progress, the “extra container” management has finally made an appearance in the Canary channel of Chrome OS and we have our first look at how the feature is going to play out. Getting the feature up and running does require you to be in the very experimental Canary channel, which I do not recommend visiting unless you know what you’re doing and aren’t afraid of possibly bricking your device.
        In the Canary channel, the #crostini-multi-container flag for the container management must first be enabled, and then, the feature will appear in the Developer section of the Chrome OS settings menu. By default, users can see the “penguin” container inside the Termina VM. This houses the standard Debian framework that runs on Chrome OS when you enable Linux applications. From the menu, you can stop the default container and shut it down but you can’t delete the container. To do this, you would need to remove Linux from your system entirely via the main Developer menu.

      • Chrome OS 98 adds management of multiple Chromebook Linux containers

        Earlier this month I reported that Chrome OS was adding multiple container management to Chromebook. The last Dev Channel update has finally brought the first iteration of that feature and I do have it working. At the moment, however, I’ve only been able to add a second Linux container for Debian. Regardless, here’s how Chrome OS 98 adds management of multiple Chromebook Linux containers.

        For starters, I had to enable the following experimental flag in Chrome OS 98: chrome://flags#crostini-multi-container and restart my browser. After that, I saw the new “manage extra containers” option in my Linux settings:

        Chrome OS 98 multiple Chromebook Linux containers management
        Choosing this option brought me to the following screen, which initially had a single container, as expected. Here I could change the color of each one. I clicked the Create button, added a second Debian container, and left it the default color. The three-dot option offers ways to stop or delete a container.

    • Audiocasts/Shows

    • Kernel Space

      • IO_uring Network Zero-Copy Send Is Boasting Mighty Speed-Ups – Phoronix

        Early patches providing for IO_uring zero-copy send support for the Linux kernel’s networking subsystem is looking extremely promising for greater throughput.

        Developer Pavel Begunkov posted the set of twelve patches today working on this zero-copy send support for IO_uring with the networking subsystem. These initial patches are marked as a “request for comments” as some items are still being sorted out with the code.

      • AMD-Pstate Driver Updated A 5th Time For Improving Ryzen Power Efficiency On Linux – Phoronix

        Sent out today was the fifth revision to AMD’s new “amd-pstate” kernel driver focused on providing enhanced CPU frequency controls for Linux systems.

        AMD’s P-State driver remains under active development for improving the Linux power efficiency for Ryzen (and EPYC) processors. AMD P-State makes use of ACPI CPPC for more informed and finer-grained frequency controls on modern (Zen 2 and newer) processors compared to what is afforded by the existing ACPI CPUFreq frequency scaling driver currently used by AMD Linux systems.

      • Intel Posts Linux Patches Bringing Up Alder Lake N Graphics – Phoronix

        With the graphics driver support for Alder Lake S-series in good shape with Linux 5.16 and the Alder Lake P-series support also coming together for upcoming ADL-based laptops, next up is the Alder Lake N enablement happening for Linux.

        Alder Lake N for low-end, low-power hardware is now coming together. Though over the existing ADL-S and ADL-P Linux support, it’s basically adding in new PCI IDs for ADL-N.

      •  Analog Devices Expands Linux Distribution with Over 1000 Device Drivers to Support the Development of High-Performance Solutions | Business Wire

        As the Linux open-source operating system marks its 30th anniversary, Analog Devices, Inc. (ADI) announces the expansion of its Linux distribution by recognizing over 1000 ADI peripherals supported by in kernel Linux device drivers. Designed to enable the rapid development of embedded solutions, these open-source device drivers streamline the software development process for ADI’s customers, providing access to tested, high-quality software to create innovative solutions across a range of industries, including telecom, industrial, military, aerospace, medical, automotive, security, Internet of Things (IoT), consumer, and more. This portfolio includes products from Maxim Integrated Products, Inc., now part of Analog Devices.

      • Graphics/Zink

        • Zink Is Ending 2021 In Fantastic Shape For OpenGL Over Vulkan

          For those wondering about the state today for Zink with mainline Mesa, here are some fresh benchmarks. My last time testing Zink was in August and since then Blumenkrantz has worked on fixes for the various games reported to have issues and even more performance optimizations, making this round of testing now quite interesting.

          Using Mesa 22.0-devel as of 26 November (using the Oibaf PPA for easy reproducibility), I ran benchmarks of various OpenGL Linux games using the native OpenGL driver (RadeonSI in this case) and then again when using Zink running atop the RADV Vulkan driver. This testing was done on an AMD Ryzen 9 5950X system with AMD Radeon RX 6700 XT graphics card. The focus is on seeing how Zink compares to using RadeonSI OpenGL across a variety of Linux games.

        • Haiku OS Managing To Run Zink OpenGL Atop Radeon Vulkan Driver For 3D Acceleration – Phoronix

          Last month we reported on progress for porting the Mesa Radeon Vulkan driver to Haiku, the BeOS-inspired open-source operating system. Now in ending out November they not only have RADV running but also working with Gallium3D’s Zink for offering OpenGL acceleration over Vulkan.

          Haiku developer “X512″ has been the one devoted to this recent effort for getting the open-source AMD Radeon Vulkan driver running on this platform. With some modifications he has been successful in enabling the RADV driver to work on Haiku for 3D hardware acceleration.

    • Applications

      • Announcing Tux Paint version 0.9.27

        The Tux Paint development team is proud to announce version 0.9.27 of Tux Paint, which adds many new features to the popular children’s drawing program.

      • Tux Paint 0.9.27 Release Adds New Magic Tools to Make Drawing Easier Than Ever – It’s FOSS News

        Known for its simplicity and ease of use, Tux Paint is a drawing app primarily aimed at kids.

        Tux Paint has come a long way since its initial release in 2002 on Linux and is now available on many other platforms.

        The latest release of Tux Paint 0.9.27 comes just after four months of its previous release. Just like the previous one, this release is feature-rich but includes new additions and improvements.

      • OpenPrinting Releases CUPS 2.4 With AirPrint, OAuth 2.0 Support – Phoronix

        Earlier this year OpenPrinting took over development of the CUPS print server with Apple no longer interested in handling the future development of this open-source Linux/macOS/Unix/Solaris print server. Out this week is CUPS 2.4 as the first major release under the guidance of OpenPrinting.

        Apple’s work on CUPS ceased pretty much when CUPS founder Michael Sweet left Apple originally acquiring it back in 2007. Apple is no longer actively developing CUPS but has even contracted Sweet to backport important OpenPrinting CUPS fixes back to Apple’s CUPS code-base.

      • CUPS 2.4.0 Printing System Released, Check Out What’s New

        OpenPrinting project has just released CUPS 2.4.0 formed without Apple’s participation, which has since 2007.

        The Common UNIX Printing System (CUPS) is a cross-platform printing solution used on many different Linux distros. Its use is very widespread, as it has become the standard print manager on the majority of popular Linux distros.

        CUPS acts as a print spooler, scheduler, print job manager, and can store information for numerous local or network printers. It is based on the Internet Printing Protocol and provides complete printing services to most PostScript and raster printers.

        At the end of 2019, Michael Sweet, the lead developer of CUPS left Apple after he joined Apple and the company purchased the source code a decade prior for this long-standing open-source printing system. As a result, Apple’s public CUPS development effectively ended and Apple now is basically interested in just maintaining CUPS 2.3 and not really developing it further.

        Therefore, OpenPrinting now controls the CUPS project moving forward with Michael Sweet being involved in the effort, and the results were not late.
        Now CUPS 2.4.0 is finally here in its production-ready state, bringing numerous security and performance improvements to make the widely used printing system more reliable and stable than ever.

      • Best Torrent Client For Linux Based Operating Systems | Itsubuntu.com

        The term “torrent” refers to file sharing through a decentralized, peer-to-peer (P2P) sharing network. Torrents are an excellent source to download large files. P2P file-sharing protocols allow users to exchange files without uploading them to the server. They transform your PC into part of a host where files are shared as it’s downloaded, so while you’re downloading files from another host, you’re likewise helping other people as they download the part of the files that you have downloaded from another host.

        In this article, we are going to discuss or list out the best torrent client for Linux-based operating systems. So, if you are a Linux user and looking for the best torrent client then you are at the right place.

    • Instructionals/Technical

      • Collaborate on a file using Linux diff and patch

        I edit a lot of text files. Sometimes it’s code. Other times it’s the written word for role-playing games (RPGs), programming books, or general correspondence. Sometimes it’s nice to make a change, but for my collaborator to compare my change with what they originally had written. Many people default to office suites, like LibreOffice, using comments or change tracking features. Sometimes a simpler tool makes more sense, though, and for that, you can look at programming history for tools like diff and patch, which provide standardized formatting for tracking and applying changes to shared files.

      • Best ways to destroy Microsoft Windows – blackMORE Ops

        OK, like seriously don’t do it unless you’re doing it in a practice Virtual machine or have permission to do so.. I take no responsibility for these collection of best ways to destroy Microsoft Windows!

      • Quickemu- Run Windows 11 on Ubuntu 20.04 LTS Linux in few clicks

        o you want to install Windows 10 or 11 on your Ubuntu 20.04 or 22.04 LTS Linux using QEMU-KVM virtual machine? Then here is a tutorial to do that using the command terminal and Quickemu + Quickgui.

        Although we all have a simple solution that is a virtual box to run Windows 11 virtual machine, what about KVM? Some will say it is not easy to operate because of the command line but no there are few open-source GUI programs to give KVM an easy interface. However, another thing is downloading ISO images of various operating systems including Windows 10 or 11 to use with Virtualbox can be a headache. Hence, to solve all of this, there is a project called QuickEMU with a GUI interface known as QuickGUI. QickEMU uses QEMU_KVM on Linux operating system to run a virtual machine and can easily download all popular operating system Images to install including macOS. Whereas it can be operated via CLI but for ease of usage users can install QuickGUI to download, create, and manage operating systems virtual machines.

      • Steinar H. Gunderson: Commitcoin

        How do you get a git commit with an interesting commit ID (or “SHA”)? Of course, interesting is in the eye of the beholder, but let’s define it as having many repeated hex nibbles, e.g. “000” in the commit would be somewhat interesting and “8888888888888888888888888” would be very interesting. This is pretty similar to the dreaded cryptocoin mining; we have no simple way of forcing a given SHA-1 hash unless someone manages a complete second-preimage break, so we must brute-force. (And hopefully without boiling the planet in the process; we’d have to settle for a bit shorter runs than in the example above.)

        Git commit IDs are SHA-1 checksums of what they contain; the tree object (“what does the commit contain”), the parents, the commit message and some dates. Of those, let’s use the author date as the nonce (I chose to keep the committer date truthful, so as to not be accused of forging history too much). We can set up a shell script to commit with –amend, sweeping GIT_AUTHOR_DATE over the course of a day or so and having EDITOR=true in order not to have to close the editor all the time.

      • How to Install Kuma on Ubuntu 20.04 | LinuxHostSupport

        Kuma is an open source monitoring tool like “Uptime Robot” written in Nodejs. In this article, we’ll learn how to install it on Ubuntu 20.04 so we can self-host our Uptime Bot. We’ll also set up a reverse proxy on Apache with a Let’s Encrypt SSL to secure our website.

        Kuma is easy to use and upgrade, and is powerful for traffic control, observability, service discovery, etc.

      • How to Install SuiteCRM with Apache and free Let’s Encrypt SSL on Debian 11

        SuiteCTM is an open-source Customer Relationship Management solution written in PHP. It is a fully-featured and highly-extensible CRM application that runs on any operating system. It became popular when SugarCRM decided to stop the development of its community edition. It is used for creating business strategies, actions, and decisions. It is an alternate CRM solution for other commercial CRM such as SugarCRM, Salesforce, and Microsoft.

        In this post, we will show you how to install SuiteCRM with Apache and Let’s Encrypt SSL on Debian 11.

      • How to Install Rudder System Configuration and Auditing Tool on Ubuntu 20.04 – VITUX

        Rudder is an open-source and user-friendly web-based system configuration and audit tool. It helps you to manage your IT infrastructure by automating system configurations while ensuring visibility and control of your infrastructure. Two main components of Rudder are: Root server and node. Root server defines the configurations for the systems it manages. The systems managed by Rudder are known as nodes. Rudder manages the nodes using the Rudder agent which is installed on these systems.

        In today’s post, we will install the Rudder root server and agent on Ubuntu 20.04 LTS. We will use two Ubuntu machines: one as the Rudder root server and the other one as the Rudder node.

        Note: You must be a root user or have sudo privileges on both machines in order to install the Rudder server and agent.

      • How to check if packages in RHEL-based Linux distributions have been patched for specific CVEs – TechRepublic

        CVEs (Common Vulnerabilities and Exposures) are constantly being discovered and patched. When discovered, it means a new security flaw exists in either an operating system or a piece of software and should be patched as soon as possible. Fixing the vulnerabilities, of course, is up to the developers. Patching those vulnerabilities, however, is up to the admin (or user). Thing is, you might not know if you’re using a piece of software that includes one or more CVEs.

        How do you uncover this information? Do you have to spend hours researching? Not really. In fact, all you need to know is the CVE you’re looking for and the piece of software it affects. With those two bits of information in hand, you can quickly discover if what’s installed on your Red Hat Enterprise Linux-based distribution contains that vulnerability.

        I’m going to show you how to do just that.

      • How to Install and Configure Nginx on Ubuntu

        Web applications have gained wide popularity over the past few years as a means of providing services to different clients. With a web application, you can reach out to a wider audience regardless of the device or operating system they are using.

        Being able to install and configure a web server is a valuable skill to have both as a web developer and software engineer. A web server is a program responsible for delivering your web content to clients over the internet or a network.

        Let’s take a look at how to install and configure the Nginx web server on Ubuntu.

      • How to install Sublime Merge on a Chromebook

        Today we are looking at how to install Sublime Merge on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to Install OpenEMR on Ubuntu 20.04 With LAMP Stack

        OpenEMR is a popular open-source software for the healthcare industry. It offers electronic health records and medical practice management solutions. OpenEMR provides a fully integrated Workflow Management inside healthcare facilities. Any healthcare facility would be able to capture and control patient data using the following features in OpenEMR.

      • Add current user to all groups on the system except “nobody/nogroup”
      • How To Install Hyperbola KDE on a Virtual Machine

        This tutorial explains how to install Hyperbola computer operating system with KDE Plasma Desktop on a virtual machine. Let’s start!

      • How To Install Java on Fedora 35 – idroot

        In this tutorial, we will show you how to install Java on Fedora 35. For those of you who didn’t know, Java is a secure, stable, and well-known, general-purpose programming language and computing technology platform with many interconnected capabilities. If you want to use a Java-based tool or program in Java, you’ll need to have Java on your system.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of Java on a Fedora 35.

      • How To Install Nginx with Let’s Encrypt SSL on Fedora 35 – idroot

        In this tutorial, we will show you how to install Nginx with Let’s Encrypt SSL on Fedora 35. For those of you who didn’t know, Let’s Encrypt is a non-profit Certificate Authority (CA) managed by the Internet Security Research Group. It provides free SSL certificates for your domains to secure data on the transport layer. The certificate is valid for 90 days, during which renewal can take place at any time. The offer is accompanied by an automated process designed to overcome manual creation, validation, signing, installation, and renewal of certificates for secure websites.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Nginx with Let’s Encrypt SSL on a Fedora 35.

      • How to Check Supported TLS and SSL Ciphers (version) on Linux

        OpenSSL is a toolkit and a cryptography library that support the Secure Sockets Layer (SSL)) and Transport Layer Security (TLS) protocol on Linux.

        It provides cryptographic protocols to varies applications running on Linux such as ssh, Apache (httpd), Nginx, etc.

        TLS is a cryptographic protocol used to secure network communications between the devices.

        OpenSSL configuration file is located at /etc/pki/tls/openssl.cnf, referred to as the master configuration file, which is read by the OpenSSL library.

        In this guide, we will show you how to check supported TLS and SSL ciphers (version) on opneSUSE system. The same procedure is applicable for other distribution as well.

      • How to Compile and Run your First Java Program

        Java is one of the most powerful and popular programming languages. Even with several niche languages available now, Java has retained its leading position among developers.

        If you have decided to learn Java, it’s definitely a good choice to enter the world of programming, but the question is, how to create your first piece of code?

        Let’s go through six steps of creating a Java program. We’ve also prepared bonus advice on where you can learn and practice Java.

      • How to Enable SSH on Debian 11 Bullseye Linux – Linux Shout

        Tutorial to learn the steps to install and enable SSH server in Debian 11 Bullseye Linux using command line terminal. SSH is a network protocol originally developed in 1995 by Finn Tatu Ylönen for encrypted access to other computers in an IP network.


        SSH is the abbreviation for Secure Shell. With the help of this protocol, the user can securely establish connections with other devices, for example from a PC to a web server. SSH enables mutual authentication and encrypted data transmission so that sensitive data such as passwords or user names cannot be hacked or seen by unauthorized persons. Secure Shell offers a high level of security. It provides functions for logging in, transmitting and executing text-based commands, and for copying data. In addition to encryption, SSH offers reliable mutual authentication using certificates and public and private key procedures. A popular area of ​​application for Secure Shell is the remote maintenance of servers.

      • How to Install Brew on Ubuntu and Other Linux

        Homebrew, also known as Brew, is a command line package manager primarily created for macOS.

        Homebrew grew quite popular among macOS users as more developers created command line tools that could be easily installed with Homebrew.

        This popularity resulted in the creation of Linuxbrew, a Linux port for Homebrew. Since it is primarily Git and Ruby, and Linux and macOS are both Unix-like systems, Brew works good on both kind of operating systems.

        Linuxbrew project eventually merged with Homebrew project and now you just have one Brew project called Homebrew.

        Why am I calling it brew, instead of Homebrew? Because the command starts with brew. You’ll see it in detail in a later section.

      • How to Install Lazarus IDE in Ubuntu 20.04, 18.04, 21.10 | UbuntuHandbook

        This is a step by step guide shows how to install the Lazarus IDE in Ubuntu 18.04, Ubuntu 20.04, Ubuntu 21.10 and their derivatives, e.g., Linux Mint, Elementary OS and more.

        Lazarus is a free Delphi compatible cross-platform IDE for rapid application development using the Free Pascal compiler. User may install the project either from Ubuntu repository or by using the official DEB packages.

      • How to Install Lazarus IDE in Ubuntu 20.04, 18.04, 21.10 | UbuntuHandbook

        The most popular Javascript runtime is Node.js, which uses the V8 engine to perform useful tasks such as interacting with local storage. Node.js has boosted the popularity of Javascript, which was already well-known. Previously, Javascript was only used in web browsers to create interactive web applications; however, with Node.js, we can now use Javascript to create command-line applications, as well as web applications that are designed and even backed by Javascript.

        In this article, we will not go into greater detail about Node.js and its functionality. In this article, we will learn how to install Node.js on Ubuntu Linux.

      • How to Install PuTTY on Debian 11 Bullseye – Linux Shout

        Here we learn the steps to install PuTTy on Debian 11 Bullseye using the command terminal to establish an SSH connection using the graphical user interface.

        Using PuTTY free Telnet and SSH client application on Windows, Linux, and macOS – the user can establish a connection with remote computers and systems in the network via SSH. Encrypted or unencrypted protocols can be used. Although this is a common application to use in Windows, yet still it somebody is interested the can be easily installed on Linux as well for remote system administration.

        Apart from the SSH client, PuTTy comes with a few additional command-line tools such as Plink, PSFTP, and PSCP. With the help of Plink, PuTTY can be controlled via the shell. Shell scripts can also be used. The SCP client PSCP can also be used to transfer encrypted data – PSFTP, on the other hand, is an SFTP client and thus an encrypted FTP alternative.

      • How to list all running & stopped Docker containers – Linux Shout

        Docker is the popular platform to run container virtual machines using the pre-built app images. The installation and its usage are pretty simple, yet, if you are new to it and want to know how to list all the created or stopped Docker containers to delete or manage them easily. Then here are the commands to follow.

      • How to modify the Proxmox repositories – Unixcop the Unix / Linux the admins deams

        Hello friends. When we refresh the Proxmox repositories we get an error stating that our IP address is not authorized to access a repository. Well, this repository gives us access to enterprise packages and to use it you must have a valid license. In this post, I will show you how to modify the Proxmox repositories to avoid this annoying error. We will also add another free one and have more tools available.

        So let’s get to work.

      • How to play Dead Cells on Linux

        Dead Cells is a roguelike video game inspired by Metroid and Castlevania. It was developed and published by Motion Twin. Here’s how you can play Dead Cells on your Linux PC.

      • How to reset Ubuntu password – LinuxH2O

        In this article, you will learn how to reset your Ubuntu password if you have forgotten it. The guide work on various Ubuntu versions such as Ubuntu 18.04, 20.04, 21.04, and the newer versions.

        There are times when you forget the password for your Ubuntu system, maybe not you, it could be your family member, friend, or colleague. Not just password, people sometimes also forget the username of their system. In any of these cases, you have to show off your Linux skills and resolve the issue. So in this guide, you will basically learn all the steps to reset the Ubuntu password and also identify the username.

        So let’s start.

    • Wine or Emulation

      • CrossOver 21.1.0 Release Adds GTA V Support on Linux Among Other Enhancements – It’s FOSS News

        CrossOver is a paid tool that lets you run Microsoft Windows software on Linux and Mac. In case you did not know, it is built on top of Wine and other open-source software along with their proprietary tools that make it easy to run Windows-only software.

        With the latest release, i.e., CrossOver 21.1.0, there are some significant additions for Linux and macOS users.

        Here, let me highlight the key changes in this release.

    • Games

      • Valve Posts Updated Steam Deck FAQs To Address More Community Questions – Phoronix

        Valve has provided an updated developer-focused “frequently asked questions” area stemming from community questions during the recent Steam Deck developer event.

        While the Steam Deck shipping date slipped into Q1 due to hardware supply chain issues, Valve continues making great progress on the software front and readying the ecosystem and developer partners for their much anticipated Arch Linux powered gaming handheld console.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • More about those zero-dot users – Adventures in Linux and KDE

          Yesterday’s article about KDE’s target users generated some interesting discussions about the zero-dot users. One of the most insightful comments I read was that nobody can really target zero-dot users because they operate based on memorization and habit, learning a series of cause-effect relationships: “I click/touch this picture/button, then something useful happens”–even with their smartphones! So even if GNOME and ElementaryOS might be simpler, that doesn’t really matter because it’s not much harder to memorize a random-seeming sequence of clicks or taps in a poor user interface than it is in a good one.

          I think there’s a lot of truth to this perspective. We have all known zero-dot users who became quite proficient at specific tasks; maybe they learned how to to everything they needed in MS Office, Outlook, or even Photoshop.

          The key detail is that these folks rely on the visual appearance and structure of the software remaining the same. When the software’s user interface changes–even for the better–they lose critical visual cues and reference points and they can’t find anything anymore.

        • KDE Plasma Desktop Update » PCLinuxOS

          The KDE Plasma Desktop packages have been updated to 5.23.4. This is a service release update.

        • TSDgeos’ blog: Okular PDF digital signature improvements coming “soon” thanks to NLnet

          Starting on January I will be working on a project named “Improve Okular digital signature support” that has received a grant from the NLnet foundation as part of the NGI Assure fund.

          This will allow me to work part time on Okular (in case it’s not clear I work on Okular on a “when I have time-hobby” basis right now), the planned improvements are:

          1. Support for signing unsigned signatures. I know it sounds confusing, think about it like something like the old “sign here” boxes on printed paper forms.

    • Distributions

      • 2021 hardcore list of linux distributions without elogind and other systemd parts

        This list is going to be short and there may be a sublist of distros with a medium strict standard. We shall explain what the object is, below the short list (which we hope the community will assist in making longer as we have not been able to currently review the work of every distro and fork.

      • BSD

        • What Is OpenBSD? Everything You Need to Know

          OpenBSD is no doubt one of the most secure operating systems on the internet. Here’s what you need to know about it.

          Linux fans love to tout their system’s security, but for one group of BSD developers, it doesn’t go far enough. One version of BSD, OpenBSD, claims to be one of the most secure operating systems around. Does it live up to the hype? Let’s find out.

      • IBM/Red Hat/Fedora

        • Fugaku Retains Official #1 Spot on TOP500

          Summit, which is an IBM-built system installed at the Oak Ridge National Laboratory (ORNL) in Tennessee, remains the fastest system in the United States.

        • Modernizing Enterprise Java: A cloud native guide for developers

          Looking for a quick guide to migrating and modernizing your organization’s Java-based applications? Modernizing Enterprise Java walks you through the journey. Download the free e-book today.

          Java has been one of the most popular programming language choices for developers since its release 25 years ago. It is backed by an open source ecosystem of contributors and a growing number of companies who rely on Java for their core business workloads.

        • Build lightweight and secure container images using RHEL UBI

          Deploying applications in lightweight container images has practical benefits because container images pack all of the dependencies required for your application to function properly. However, you could lose the benefits of containerization if the container images are too large, and thus take several minutes to boot up the application. In this article, I guide you through how to use Red Hat Universal Base Images (UBI) as the foundation to build lightweight and secure container images for your applications.

        • Automate dependency analytics with GitHub Actions [Ed: IBM's Red Hat boosting Microsoft's proprietary software and vendor lock-in]
        • 20 Years of Red Hat Product Security: From inception to customer experience (Part 1)

          From its inception in 2001, the Product Security team has been focused on providing Red Hat’s customers value in the form of hardened and streamlined security updates and testing across the entire product line, including managed services and, most recently, our own open source software supply chain.

          But more than that, they’ve also been essential members of the wider open source security community, helping ensure the openness and transparency of security vulnerability information, aiding in the fight against open source fear, uncertainty, and doubt (FUD), and being key contributors in the response to a wide array of high profile security incidents and vulnerabilities.

          So, let’s take a look at how Product Security has evolved at Red Hat over the past 20 years, and at what the future might look like.

        • Skills gap proves a growing barrier for digital transformation initiatives

          In this year’s Red Hat 2022 Global Tech Outlook report, skill-set or talent gaps emerged as the top barrier organizations believe will prevent them from achieving their digital transformation goals. This was also reflected in organizations’ non-IT funding priorities for the next 12 months.

          Red Hat develops a Global Tech Outlook report every year, and from June through August 2021, we surveyed 1,341 information technology (IT) leaders and decision makers to learn about their digital transformation journeys, their IT and non-IT funding priorities for the coming year, and the types of infrastructure they’re using to run their applications.

        • U.S. Government issues directive to prioritize fixing exploited CVEs: How Red Hat Insights can help

          In November 2021, the U.S. federal government published a Cybersecurity and Infrastructure Security Agency’s Binding Operational Directive. This Department of Homeland Security (DHS) directive mandates federal agencies within the U.S. act to protect themselves from “…increasingly sophisticated malicious cyber campaigns that threaten the public sector, private sector, and ultimately the American people’s security and privacy.”

          The directive requires United States federal agencies to patch known, “publicly exploited” vulnerabilities. The list of these vulnerabilities is cataloged and updated by the Cybersecurity & Infrastructure Security Agency (CISA) (on their website) periodically.

        • Digital transformation: How to beat the challenges of a federated organization | The Enterprisers Project

          In early 2019, I started my role as business transformation executive for the Federal Reserve System, responsible for leading the digital transformation of finance, human resources, and procurement.

          As the central bank of the United States, the Federal Reserve is a federated organization made up of 22,000 employees across the 12 Reserve banks. Each bank is its own separate legal entity with its own board of directors, CEO, CFO, CIO, and senior HR and procurement officers.

          Over the years, technology was consolidated while processes and capabilities remained disparate, and it became increasingly challenging to deliver even basic capabilities. With over 40 disjointed, mostly homegrown legacy applications and a high degree of customization supporting proprietary business processes, the system was costly and challenging to maintain. New employees were frustrated by the poor user experience and difficulty accessing data, and collaboration and innovation were hampered.

        • Digital transformation: 4 questions CIOs should ask now | The Enterprisers Project

          One of the things CIOs have learned during the past eighteen months is that when you have the business behind you, the momentum for transformation is turbocharged. Top CIOs are capitalizing on this lesson to further integrate technology strategy with business strategy. And the first place they’re starting is with the people.

          How well are you doing on the people front of digital transformation? Here are four questions to ask yourself, based on my recent conversations with the CIOs of CarMax, Dow, and Johnson & Johnson.

        • Virtual Machine Secure Boot Database Updates Made Easy with Oracle Linux
        • IBM applauds Knative’s application to join the Cloud Native Computing Foundation

          Today, Knative applied to become an incubating project at the Cloud Native Computing Foundation. Today’s news is a major step in the right direction for the future of Knative.

          Knative adds the necessary components that enable Kubernetes users to more quickly deploy and manage their workloads on Kubernetes — but without the need to become Kubernetes experts. Additionally, Knative adds “serverless” runtime semantics, allowing users to reap the benefit of features such as quick load-based scaling and scaling to zero when idle.

        • 3 ways to optimize Ansible Automation Platform for scale and performance | Enable Sysadmin

          Try these settings to optimize performance with Ansible Automation Platform on a massive scale.

        • Introduction to Ansible prompts and runtime variables

          This tutorial is part of a series we dedicated to Ansible. Previously we talked about the Ansible basics, then we focused on some Ansible modules we can use to perform some very common administration tasks, and we also talked about Ansible loops. In this article, instead, we learn how to create interactive prompts we can use to ask for user input and how to pass variables at runtime.

        • MIXAL on Fedora | Adam Young’s Web Log

          The examples in The Art of Computer Programming (TAOCP) are in the MIXAL programming language. In order to see these examples run, I want to install the tools on my Fedora box. They are packaged as RPMS, so this is trivial. Here are the steps to run and debug a sample program in MIXAL.

        • Fedora Contributor Annual Survey Data Set Available – Fedora Community Blog

          Over the summer of 2021, the Fedora Council held the first annual Contributor Survey. The survey received 800 complete responses, which exceeded the goal of 500. We have processed the data, which are available for download.

          Coordination of the survey was a wonderful community effort. Fedora Council member Aleksandra Fedorova proposed and led the survey effort with support from Marie Nordin (FCAIC). Many teams across the Fedora Project contributed, including: the Mindshare Committee, the Outreach Revamp Team, the Design Team, the Websites & Apps Team, and the Community Platform Engineering Team. Aleksandra and Marie presented a session at Nest with Fedora which goes further into the process and outcomes.

          Over the last couple months, the work of cleaning up the dataset has been underway. This has been a slow process as there are just a couple of people working on that regularly. An example of “cleaning” would be folks who chose “Other”, filled in “idk”, when the option “I don’t know” existed. Those answers need to be integrated in order to have a more accurate dataset. We removed fill-in answers due to the fact that some people identified themselves, intentionally or not. As we process the data, we are noting feedback to improve the survey for 2022.

      • Canonical/Ubuntu Family

        • Linux Mint Monthly News – November 2021

          Many thanks to all the people who support our project. Thank you very much to all of you for your help and your generous donations.

          All of our focus is on the BETA for Linux Mint 20.3. We’re planning to release it early this December. We’re finalizing translations, artwork and still making fixes and adjustments but for the most part it’s almost ready to enter QA.

          Some of the new features in 20.3 haven’t been revealed yet, but we’re so close to release, I’m not sure there’s much point in giving you a preview

          MATE 1.26 and Flatpak 1.12 were backported.

          In the XApps, the PDF reader received proper manga support (hitting the left arrow key in manga mode now goes forward in the document), the image viewer received the ability to quickly fit to the width or the height of the displayed picture, and many of the apps received improvements for small display resolutions (hiding the menubar, not showing the toolbar in fullscreen…etc), and dark-mode support.

        • Compact edge AI boxes offer choice of Jetson Nano, TX2 NX, and Xavier NX

          All three systems ship with the Ubuntu 18.04 with Nvidia JetPack 4.5.1. They also support Advantech’s Edge AI Suite and FaceView applications, which are available on its earlier AIR systems.

        • Ubuntu Blog: Embedded systems: the advent of the Internet of Things – Part II

          This is the second part of the two-part blog series covering embedded Linux systems and the challenges brought about by the proliferation of Internet of Things (IoT) devices. In Part I, we surveyed the embedded ecosystem and the role Linux plays within that space. This blog takes you on the next step in the journey, where we explore the most demanding challenges facing manufacturers of tightly embedded IoT devices.

        • CyberDog: a four legged robot revolution with Ubuntu

          Late this year, Chinese tech giant Xiaomi unveiled CyberDog: a quadrupedal, experimental, open-source robot that the firm claims will improve the robot development environment and promote the development of the robot industry. Today, Canonical dives into the specifications of this four legged robot and discover how Ubuntu is helping the device become an open source technological platform.

          Xiaomi has a clear vision for its product. As Huang Changjiang, PM at Xiaomi, explains, “CyberDog is developers’ technological partner from the future. It equips inhouse-made high-performance servo motors, high computing ability, with built-in AI for visual detection system and voice interaction system, supporting a variety of bionic motion gestures.”

        • ZeroDown® Software Targets Open Source with New Canonical Partnership

          As businesses around the world and in every major industry define and accelerate their cloud strategies, the lack of open, flexible and complete high availability has become a major concern. The ZeroDown platform, built upon Canonical’s industry-leading operating system, Ubuntu, aims at integrating into Canonical’s broader Charmed OpenStack platform with its ZeroDown Ultra High-Availability TM Software, eliminating downtime and data loss for its customers, running seamlessly through planned or unplanned downtime events.

        • Data centre networking: what is OVS? | Ubuntu

          In one of our preceding blogs, we spoke about Software-Defined Networking (SDN) and the key drivers behind it. Virtualisation is one of the fundamental aspects that characterises SDN, and has influenced the architecture of network switching in the data centre. OVS (Open vSwitch) is a fundamental component of modern and open data centre SDNs, where it aggregates all the virtual machines at the server hypervisor layer. It represents the ingress point for all the traffic exiting VMs, and can be used to forward traffic between multiple virtual network functions in the form of service chains. Let’s take a closer look in order to understand what OVS is.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Best 3 Open-source, privacy-aware, ads-free Diabetes Managers for Android

        Diabetes is a long-lasting (chronic) health condition, that occurs when blood sugar is too high. It is a life-altering disease, as it changes eating habits and exercises routine.

        Diabetes management apps are many, and they come as web-based services, standalone mobile apps, and desktop apps. However, most of them are not free, open-source, or respect patient privacy much. Therefore, we write this article.

        Diabetes management and assistant apps are classified under a PHR “Personal Health Records” apps, where the patient logs and keeps all of his private records for future analysis and use.

      • Penpot: an open-source Prototyping and design platform for teams

        Penpot is a free, open-source web-based design and prototyping application for teams. It works with open web standards as it uses SVG (Scalable Vector Graphics) format.

        Penpot can be installed on a remote server or the local machine with help of Docker and Docker Compose.

        With Penpot, you can quickly design a web or mobile prototype in no time.

      • FreeScout is an open-source helpdesk for teams

        FreeScout is a free, open-source web-based support and ticketing system. It is written in PHP using the Laravel framework.

        FreeScout features a responsive user interface that works on small mobile screens and tablets.

        It is an ideal solution for team, technical support, and customer support for small and medium-sized companies as well as enterprise.

        FreeScout is battle tested with hundreds of satisfied companies, it is also supported with a large community of advanced users and professionals.


        FreeScout is released under GNU Affero General Public License v3.0.

        The GNU Affero General Public License v3.0 permits commercial use, system modification, distribution, patent use, and private use. However, it comes with a limitation for liability and warranty, and several conditions.

      • UMLet: Open-source multi-platform UML tool

        UMLet is a free, open-source UML modeling tool for developers that allows them to draw UML diagrams quickly and export them to many formats.

        The program is released as an open-source under GPL-3.0 License.

      • JetUML: Open-source UML diagramming tool for Windows, Linux, and macOS

        JetUML is a free, lightweight desktop app for building and editing UML diagrams.

        JetUML is built with Java which comes also in a small .jar package.

      • The OpenNMS Group Releases OpenNMS Minion Appliance – the Next Evolution of Distributed Monitoring
      • Monica is your own persona CRM/ Assistant solution

        Monica is a free, open-source self-hosted personal CRM solution to help you keep tracking all of your social events, activities, work information and strengthen your interaction with your family members.


        Monica is released under Affero General Public License (AGPL) v3.0.

      • Watch Blender Plugin Make Animated PCB Traces (and More) | Hackaday

        The idea is that one begins with an image texture with a structure showing a bunch of paths (like a maze, or traces on a PCB), and that gets used as an input. The plugin then uses a path finding algorithm to determine how these paths could grow from an origin point, and stores the relevant data in the color channels of an output image. That output is further used within Blender as the parameters with which to generate the actual animation, resulting in the neat self-creating PCB seen above. That PCB isn’t just for show, by the way. It’s the PCB for [Staacks]’s smart doorbell project.

        Blender is an amazingly comprehensive tool for modeling and animation, and while we’ve covered using it to create high-quality KiCad renders, this kind of animation is really something else.

      • Weekly-ish recap — 30 November 2021

        This is more of a monthly recap, for my sins! Highlights: new releases of BlenderBIM and IfcOpenShell, Natron, LibrePCB, Shotcut, VCV Rack, Blender 3.0 is coming later this week, Krita and darktable are prepping up for a major update.


        The most recent release of Shotcut arrived with support for markers (at long, long last). Dan has been expanding this feature ever since. There’s now a Markers dock where you can add, edit/rename, and remove markers. UX for marker color selection has been improved too, and you can now seek to previous and next markers. Also, you can now export markers as chapters. You can expect all that (and more) in the next release.

      • Web Browsers

        • Mozilla

          • Mozilla Performance Blog: Updates to Warm Page Load Tests

            We have recently begun the process of updating our warm page load tests to be more representative of real user behavior.

            Cold page load is defined as the first page load, just after the initial startup of the browser. Warm page load is any load of a page after the first page load, and the cache has been populated with some data for the page, i.e. the cache is “warmed up”.

      • SaaS/Back End/Databases

        • PostgreSQL: PGConf NYC 2021 starts Thursday!

          That means registration is closing since the conference will be starting!

          The first community PostgreSQL conference in North America in many months is in New York City this Thursday and Friday! PGConf NYC is a non-profit, community-run and PostgreSQL community recognized conference being run by the United States PostgreSQL Association (PgUS).

          Don’t wait any longer to register for this great event happening right in downtown New York City!

          PGConf NYC delivers two days packed with presentations about PostgreSQL and related technologies, as well as the usual hallway and social track. PGConf NYC is being held December 2nd and 3rd, 2021 in New York City.

        • Publication of the “Transition guide to PostgreSQL”

          We’re pleased to announce an English version of the “Transition guide to PostgreSQL”. This aims to answer questions from project owners and management about implementing PostgreSQL in place of a commercial solution.

      • Content Management Systems (CMS)

        • WordPress 5.9 Beta 1

          WordPress 5.9 Beta 1 is now available for testing!

          This version of the WordPress software is under development. You don’t want to run this version on a production site. Instead, it is recommended that you run this on a test site. This will allow you to test out the new version.

        • People of WordPress: Devin Maeztri

          In this series, we share some of the inspiring stories of how WordPress and its global network of contributors can change people’s lives for the better. This month we feature a translator and campaigner who uses WordPress to highlight good causes and helps people in her area benefit from the open source platform.

      • FSF

        • Help the FSF tech team maintain email services in freedom

          The Free Software Foundation’s (FSF) tech team is a small but dedicated team of three staff. With your support, and with the help of volunteers and interns, we run hundreds of services on a few dozen physical machines in four data centers.

          We are very excited about some of the initiatives we are working on, like deploying our upcoming forge site and other new systems, expanding our physical server deployments, and a further refresh of fsf.org. In parallel, the tech team is always working to better maintain, understand, and document our existing systems. Mastering those keeps vital systems running smoothly and lays the groundwork for future improvements.

          Email is a key service we provide. Besides it being one of the FSF campaigns and licensing teams’ most important ways of communicating, we also support thousands of mailing lists for other free software projects, which send millions of emails per year. Free software is extremely capable in all aspects of email, and there continue to be innovative advancements in free software email programs that we are excited to explore and adopt.

        • Licensing/Legal

          • First Update on the Vizio lawsuit – Conservancy Blog – Software Freedom Conservancy

            Yesterday, we received from Vizio their first official response in our pending litigation against Vizio for their copyleft license violations. So, what was their response?

            Did Vizio release the source code — as the GPL and LGPL require — for the modified versions of Linux, alsa-utils, GNU bash, GNU awk, BusyBox, dmesg, findutils, dmsetup, GNU tar, mount and selinux found in their TV’s firmwares? No.

            Did Vizio propose a CCS candidate for us to review, provide them with additional feedback, so that we could help them get consumers who bought their TVs the source code they deserve? Nope.

            Did Vizio argue that we had erred, and in fact, none of those programs we list above appear in their firmware? Not that either. (Unlikely though — after all, they surely know those programs are in their firmware!)

      • Public Services/Government

        • German coalition treaty endorses “Public Money, Public Code” principle – The Document Foundation Blog

          A quick news update from Germany: the upcoming coalition government endorses free and open source software. In the coalition agreement (German), there are some key sentences on this topic, for instance…

        • Nextcloud Forms European Coalition — Begins Antitrust Actions Against Microsoft

          A European coalition formed by Nextcloud is taking antitrust action against Microsoft like it’s 1999.

          The Germany-based company behind the on-premises content collaboration platform that shares its name, has put together a coalition of 30 organizations to fight Microsoft on antitrust grounds.

          “The 90s have just called and they see that nothing has changed,” Stefane Fermigier, founder and CEO of open source software vendor Abilian — a part of the coalition — said in a statement. “Microsoft’s anti-competitive practices remain a major concern for the competitiveness of the European software and cloud industry. As it has done in the past in similar cases, the European Commission must put an end to these practices.”

      • Programming/Development

        • Daniel Aleksandersen: Closing the open redirect in the Libravatar ecosystem

          Libravatar is a decentralized open-source alternative to Gravatar – the avatar image service. Last week, I noticed an URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability (CWE-601) in the Libravatar application programming interface (API) specification.


          An attacker can use the redirect to leech off the reputation of a Libravatar server’s domain. An open redirect can be used to obscure a link’s true destination, or help a spam or phishing message to sneak past filters.

          An open redirect is a common vulnerability, but the security community tries to shut them down whenever they’re discovered. What’s making this one noteworthy is that you can auto-discover Libravatar servers using DNS service discovery (DNS-SD) by querying domains for the DNS SRV records.

          I DNS-SD queried the web’s top 5,1 million domains (Tranco list #44KX) to see how many Libravatar instances and open redirects I could find. In total, I discovered 18 instances (unique IP addresses) on 23 distinct domain names. 11 instances were vulnerable (13 domain names).

          Notably, the servers operated by academic institutions were not vulnerable. These institutions are likely running custom software solutions on top of their staff and student databases to generate the avatars.

        • Hacks Decoded: Seyi Akiwowo, Founder of Glitch

          I’m not, I don’t think I want to “keep going” anymore. I grew my organization by 50% in terms of income and more in terms of staff and diversified our income streams before we hit the two-year mark — during a pandemic! I’m ready to rest, I’m ready to sleep more, I’m ready to do work that is still great with minimum viable effort. That’s the sweet spot I’m looking for.

        • A Super Speedy Lightweight Lossless Compression Algorithm | Hackaday

          [Dominic Szablewski] was tinkering around with compressing RGB images, when he stumbled upon idea of how to make a simple lossless compression algorithm, resulting in the Quite OK Image Format, which seems to offer comparable file sizes to the PNG format but is so simple it runs up to 50 times faster for compression and up to four times faster for decompression. Implementation can be achieved with a miniscule 300 lines of C. Need a bit more detail on the real-world performance? Well [Dominic] has that covered too, with a complete set of benchmarks for your perusal.

        • HLK-W801 board features Alibaba Xuantie XT804 based MCU with WiFi 4, Bluetooth LE 4.2 – CNX Software

          But the company has a nearly identical WinnerMicro W801 microcontroller that bumps the internal flash to 2MB, and more importantly adds a 2.4 GHz radio with WiFi 4 and Bluetooth LE 4.2 connectivity, and HiLink also released the HLK-W801 board that’s nearly identical to HLK-W806, except for some extra LEDs, a USB-C port instead of a Micro USB port, and a longer form factor to make space for the PCB antenna.

        • Running the MIXAL Insertion Sort | Adam Young’s Web Log

          With the information gained in last posts investigations, I now know how to turn the smaple code of the insertion sort out of TAOCP into runnable code.

          The key insight I had was that the Accumulator was operating on the whole value it would fetch or store, and the I# registers were just used for counters. Thus, the buffer needed to be of word length elements. For MIX that means 5 characters long.

        • Russell Coker: Your Device Has Been Improved

          By “stability improved” they mean “fixed some bugs that made it unstable” and no technical person would imagine that after a certain number of such updates the number of bugs will ever reach zero and the tablet will be perfectly reliable. In fact if you should consider yourself lucky if they fix more bugs than they add. It’s not THAT uncommon for phones and tablets to be bricked (rendered unusable by software) by an update. In the past I got a Huawei Mate9 as a warranty replacement for a Nexus 6P because an update caused so many Nexus 6P phones to fail that they couldn’t be replaced with an identical phone [1].

          By “security improved” they usually mean “fixed some security flaws that were recently discovered to make it almost as secure as it was designed to be”. Note that I deliberately say “almost as secure” because it’s sometimes impossible to fix a security flaw without making significant changes to interfaces which requires more work than desired for an old product and also gives a higher probability of things going wrong. So it’s sometimes better to aim for almost as secure or alternatively just as secure but with some features disabled.

        • All change at JetBrains: Remote development, new IDE preview • The Register

          JetBrains has introduced remote development for its range of IDEs as well as previewing a new IDE called Fleet, which will form the basis for fresh tools covering all major programming languages.

          JetBrains has a core IDE used for the IntelliJ IDEA Java tool as well other IDEs such as Android Studio, the official programming environment for Google Android, PyCharm for Python, Rider for C#, and so on. The IDEs run on the Java virtual machine (JVM) and are coded using Java and Kotlin, the latter being primarily a JVM language but with options for compiling to JavaScript or native code.

        • PHP Foundation Looks to Fund Open Source Language Development

          The PHP Foundation is gearing up as a new organization to help fund and support the continued development of the open source PHP programming language.

        • Perl/Raku

          • MONKEY-SEE-NO-CROSSPRODUCT | Playing Perl 6␛b6xA Raku

            The challenge of the week is screaming: “Nest all the loops!”. I don’t like being yelled at, so I refuse to use any nested for/while/loop. The rules don’t require to put the two sub-challenges into separate files, so I won’t.

          • Excellent Free Tutorials to Learn Raku – LinuxLinks

            Raku is a member of the Perl family of programming languages. Formerly known as Perl 6, it was renamed in October 2019. Raku introduces elements of many modern and historical languages. Compatibility with Perl was not a goal, though a compatibility mode is part of the specification.

          • It’s that time of the year… again – Raku Advent Calendar

            And we’re still around and kicking new advent posts with the best, the nicest and the merely possible in the Raku realm.

            Also the 13th year in a row for this calendar, and also 6th year since what was then called Perl 6 was released. Raku is now faster, it’s already in production in a number of places, and it’s got a healthy ecosystem with lots of useful modules. Who would wish for more? Well, we wish for a dozen and a again (possibly) baker’s dozen of articles for everyone to enjoy.

        • Shell/Bash/Zsh/Ksh

          • Combinations from 2 lists: speed trials

            This post was inspired by a recently published scientific paper describing how Python was used to build a list of a million scientific names. Each name was composed of parts taken from a list, and combinations of those parts were generated.

            The result was something like a Cartesian product, about which I’ve blogged before. This time I was interested in performance: how does the time required to get a result vary with the number of combinations to be built?

        • Rust

          • 1.57.0 pre-release testing

            The 1.57.0 pre-release is ready for testing. The release is scheduled for this Thursday, December 2nd. Release notes can be found here.

  • Leftovers

    • Recycled Parts Round Out Soap Shaped Electric Car

      Hong Kong based [Handy Geng] has a knack for fitting his creations with a large percentage of recycled material. And as is exemplified by the video below the break, he also loves to mix the practical with the whimsical.

      Using parts salvaged from motor scooters, trash heaps, and likely many other sources, [Handy] has put together a small vehicle that he himself describes as looking like a bar of soap as it slips across the floor. You’ll agree when you see the independent front and rear steering at work, allowing the car’s front and rear to be driven and steered on their own. Crabbing sideways, driving diagonally, and we’re guessing spinning in place are possible.

    • Hardware

      • Two-Stage Dust Collector Recycles Blasting Media | Hackaday

        A critical element of a good blasting cabinet setup is a vacuum system that can suck out the dust, blasting media, and bits of removed material faster than it collects inside the chamber. A cyclone separator can get the job done, but since it dumps all the waste from the cabinet into one bucket, it can make reusing the blasting material a dirty job. But as [Daniel Bauen] explains in the latest Engineerable video, his two-stage dust collector is able to keep the cabinet clear while separating the used blasting material into its own container.

      • Giving Flip Dots The Oil Treatment To Shut Them Up | Hackaday

        Flip dot displays are awesome — too bad it’s so hard to find large panels to play around with, but that’s for another article. [Pierre Muth] has been working to find different and interesting things to do with these flip dots, and he recently explored how you can flip them very very gently.

        Now you likely remember [Pierre’s] work from earlier this year where he was pushing the speed of the displays as high as possible. Using a capacitor discharge trick he made it to 30 fps, which absolutely stunning work. This time around he attempted to do something equally impressive by micro-stepping the dots. It’s a bonkers idea and unfortunately didn’t work. It seems the dots are engineered for two steady states and you just can’t get very good performance with the in-between states.

      • Amazon Announces C7g AWS Instances Coming Powered By Graviton3 – Phoronix

        Amazon Web Services today shared that C7g instances are coming powered by Graviton3, their next-gen in-house AArch64 processors.

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • New Linux Foundation Project Accelerates Collaboration on Container Systems Between Enterprise and HPC Environments

                The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced it will host the Apptainer project. Formerly the Singularity project, Apptainer is the most widely used container system for High-Performance (HPC) computing and is one of the container systems uniquely suited for both enterprise and HPC use cases. It is designed to execute applications at bare-metal performance while being secure, portable and completely reproducible.

              • New Linux Foundation Project Accelerates Collaboration on Container Systems Between Enterprise and High-Performance Computing Environments

                The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced it will host the Apptainer project. Formerly the Singularity project, Apptainer is the most widely used container system for High-Performance (HPC) computing and is one of the container systems uniquely suited for both enterprise and HPC use cases. It is designed to execute applications at bare-metal performance while being secure, portable and completely reproducible.

                “The Apptainer project has had massive growth and needs a neutral home with proven open source governance to support its next development and adoption phase,” said Gregory Kurtzer, CEO of CIQ and Founder and Project Lead of Singularity/Apptainer. “The Linux Foundation is the natural host for Apptainer, where it can also collaborate with the Cloud Native Computing Foundation, Open Container Initiative, OpenHPC and other projects to expand its ecosystem.”

              • New Quantum Intermediate Representation Alliance Serves as Common Interface for Quantum Computing Development [Ed: 'Linux' 'Foundation' letting Microsoft become its forefront speaker]

                he Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the new QIR Alliance, a joint effort to establish an intermediate representation with the goal to facilitate interoperability within the quantum ecosystem and provide a representation suitable for current and future heterogenous quantum processors. Founding members include Honeywell, Microsoft, Oak Ridge National Laboratory, Quantum Circuits Inc. and Rigetti Computing.

              • Linux Foundation launches quantum computing alliance to drive interoperability [Ed: Microsoft employees speak for the ‘Linux’ Foundation now; it’s sold, it is compromised]

                The Linux Foundation has announced a new joint effort to help facilitate interoperability within the quantum computing ecosystem.

                Dubbed Quantum Intermediate Representation (QIR), the alliance is part of the Linux Foundation’s efforts to promote the development and use of open standards.

              • Linux Foundation: Defending the Global Software Supply Chain from Cyberattacks in 2021 [Ed: With partners like these, as show, it can be presumed also a selective back doors alliance with NSA ties]

                Attackers are increasingly targeting software supply chains (the processes, repositories, and toolchains used for developing and delivering software). The European Union Agency for Cybersecurity, ENISA, estimated in “Threat Landscape for Supply Chain Attacks” that there would be four times as many software supply chain attacks in 2021 as compared to 2020. The report states due to “…more robust security protection that [many] organizations have put in place [today], attackers successfully shifted towards suppliers.”

                Governments around the world have noted and responded to this growing risk to the software supply chain. In May 2021, the US released an Executive Order on Improving the Nation’s Cybersecurity to enhance software supply chain security, including providing software purchasers with a Software Bill of Materials (SBOM). Similar efforts are underway around the world.

                In 2021, our communities rose to the challenge of providing tools and best practices for the security hardening of the global software supply chains. Our efforts included launching Open Source Security Foundation (OpenSSF) as a funded project, expanding Let’s Encrypt — the world’s largest certificate authority, ensuring the ISO standardization of SPDX as the SBOM standard, directing funds to identify and fix vulnerabilities in critical open source software, and building new training curriculum to improve secure coding practices.

              • Linux Foundation Launches New Quantum Intermediate Representation Alliance [Ed: In Spamnil's site (LF-funded fluff)]

                The Linux Foundation has announced the new QIR Alliance, a joint effort to establish an intermediate representation with the goal to facilitate interoperability within the quantum ecosystem and provide a representation suitable for current and future heterogenous quantum processors.

        • Security

          • New HP MFP vulnerabilities show why you should update and isolate printers | CSO Online

            Security researchers have published details about two serious vulnerabilities that impact over 150 different HP multifunction printer models with FutureSmart firmware going back at least nine years. The attack vectors associated with the flaws and their impact serve as a reminder that printers can pose significant security risks to enterprise networks if not properly secured, updated and segmented.

            “For one, the vulnerabilities date back to at least 2013 and affect a large number of HP products released,” researchers from security firm F-Secure, who found the flaws, said in their report. “HP is a large company that sells products all over the world. Many companies are likely using these vulnerable devices. To make matters worse, many organizations don’t treat printers like other types of endpoints. That means IT and security teams forget about these devices’ basic security hygiene, such as installing updates.”

            Exploiting one of the vulnerabilities requires physical access and can be done through physical ports that are exposed on its communications board. A skilled attacker with physical access to a vulnerable MFP would need around five minutes to perform the attack and deploy a stealthy implant that could take full control of the device and exfiltrate potentially sensitive information.

            The second vulnerability is even more dangerous because it’s located in the firmware’s font parsing code and essentially allows anyone who can print a specifically crafted file to execute malicious code on the vulnerable MFPs. The vulnerability is wormable and exploitation can be achieved in seconds through multiple remote attack vectors, including by users visiting malicious websites.

          • Security updates for Tuesday [LWN.net]

            Security updates have been issued by Debian (samba), Fedora (kernel), openSUSE (netcdf and tor), SUSE (netcdf and python-Pygments), and Ubuntu (imagemagick).

          • Nasty Windows 10 vulnerability gets a patch, but not from Microsoft

            Cybersecurity researchers have released an unofficial patch for a bug in Windows 10, originally reported to Microsoft in October 2020, which later research revealed could take the form of a local privilege vulnerability as well.

          • RedHat: RHSA-2021-4848:07 Moderate: Migration Toolkit for Containers (MTC)
          • Inside Intel’s Secret Warehouse in Costa Rica

            Chip maker is stockpiling legacy technology for security research, plans to expand facility to house 6,000 pieces of equipment

    • Civil Rights/Policing

      • Over 100 civil society groups call for changes to EU AI Act

        A total of 114 civil society organisations have signed an open letter calling on European institutions to amend the forthcoming Artificial Intelligence Act (AIA) so that it properly protects fundamental human rights and addresses the structural impacts of artificial intelligence (AI).

        The European Commission’s proposed AIA was published in April 2021 and sought to create a risk-based, market-led approach to regulating AI by establishing self-assessments, transparency procedures and various technical standards.

        Digital civil rights experts and organisations have previously told Computer Weekly that although the regulation is a step in the right direction, it will ultimately fail to protect people’s fundamental rights and mitigate the technology’s worst abuses because it does not address the fundamental power imbalances between tech firms and those who are subject to their systems.

      • The EU needs an Artificial Intelligence Act that protects fundamental rights

        Access Now and over 110 civil society organisations have laid out proposals to make sure the European Union’s Artificial Intelligence Act addresses the real-world impacts of the use of artificial intelligence (AI), places fundamental rights protection front-and-centre, and maintains a broad definition of AI systems.

        “Access Now’s priority is not to have an EU law on AI, but to have one that is an effective instrument to protect people’s rights,” said Fanny Hidvégi, Europe Policy Manager at Access Now. “We’ve laid out the steps needed to boost the proposed regulation’s human rights standards, and are looking forward to working with the Council and Parliament to guarantee they are achieved.”

        Access Now and AlgorithmWatch rang the alarm bell last week when information leaked suggesting the European Council is planning on drastically narrowing the definition of AI systems, potentially excluding many technologies that impact human rights. The AI Act needs to be amended, but those amendments must increase protections for fundamental rights, not water them down.

    • Monopolies

Links 30/11/2021: KDE Plasma 5.23.4, 4MLinux 38.0, Long GitHub Downtime, and Microsoft’s CEO Selling Away Shares

Posted in News Roundup at 12:30 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Applications

      • Best Torrent Client For Linux Based Operating Systems

        The term “torrent” refers to file sharing through a decentralized, peer-to-peer (P2P) sharing network. Torrents are an excellent source to download large files. P2P file-sharing protocols allow users to exchange files without uploading them to the server. They transform your PC into part of a host where files are shared as it’s downloaded, so while you’re downloading files from another host, you’re likewise helping other people as they download the part of the files that you have downloaded from another host.

        In this article, we are going to discuss or list out the best torrent client for Linux-based operating systems. So, if you are a Linux user and looking for the best torrent client then you are at the right place.

      • What is Apache Cassandra | Introduction To Cassandra

        In this article, we are going to learn about NoSQL concepts in high level as it’s family plays vital role in the BigData market. We will also discuss what is Cassandra which is the market leading NoSQL DB, Cassandra architecture, key components and and its use cases in detail.

        In this article, we have gone through the overview of NoSQL database concepts and basic architecture of Cassandra. We will walk through the installation of Cassandra in upcoming articles.

    • Instructionals/Technical

      • How to install Extreme Tuxracer on a Chromebook

        Today we are looking at how to install Extreme Tuxracer on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How To Install Google Cloud SDK on Linux Mint 20 – idroot

        In this tutorial, we will show you how to install Google Cloud SDK on Linux Mint 20. For those of you who didn’t know, Google Cloud SDK (Software Development Kit) provides a set of tools that are used to manage resources hosted on Google Cloud Platform (GCP). Good Cloud SDK presents a number of important command-line tools such as gcloud, gsutil and bq that enable effective management of applications and other resources in the Google Cloud

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a Google Cloud SDK on a Linux Mint 20 (Ulyana).

      • Shortcuts for adding multiple lines of text to files on Linux | Network World

        There are a number of ways to add text to files on Linux systems without having to open an editor, such as the echo and printf commands. On the other hand, when you need to add A LOT of text, the technique you use can make the job tedious or a piece of cake.

        This post describes some of the commands you can use and the problems and benefits you can expect.

    • Games

      • Party-based RPG Black Geyser: Couriers of Darkness sees a huge update

        After entering Early Access in August, and then releasing a Linux native version in October, Black Geyser: Couriers of Darkness just got a nice big upgrade for all players.

        “Explore a land plagued by war, pestilence and mysterious abductions, and uncover the hidden legacy of your birth. Recruit powerful allies to your cause; achieve your goals through sorcery, stealth, a silver tongue or brute force; and discover the truth of the Black Geyser.

        Developed by a small indie team and inspired by cRPG classics like Baldur’s Gate and Icewind Dale, Black Geyser features challenging real time tactical combat with pause, deep lore and memorable companions, all set in a sprawling, unique fantasy world.”

      • Valve puts up official developer FAQ for the Steam Deck | GamingOnLinux

        With the Steamworks Virtual Conference: Steam Deck over now, Valve has put up their own official set of answers to various common questions.

        Plenty of it we’ve already covered and explained in previous articles like native versus Proton, and expanded details on what we learned from the conference. Still, it’s always good to have a few reminders for people that missed it.

      • Developing A Game Engine with Perl | Shawn [blogs.perl.org]

        To most in the know, coding a game engine with Perl would be a surprise. I’ve certainly been asked, “Why Perl?”. You see, unlike C++, C#, Java and others, which are well established languages in game engine design, Perl is not (well) known for it’s role in the development of games. Especially not as a game engine language. You are much more likely to see Perl managing the network infrastructure for the gaming industry then you are to see it powering your favourite video games.

      • NordicTrack Patches Out ‘God Mode’ In Treadmills That Allowed Users To Watch Anything On Its Display

        If you are a console gamer of a certain age, you will remember the bullshit Sony pulled when it patched its PS3 systems to remove useful features it had used as selling points for the console to begin with. Essentially, the PS3 had a feature that allowed you to install another operating system on it. This was used by hobbyists, companies, and the US Military alike to creatively use PS3s for purposes other than that for which they were built, such as research supercomputers and creating homebrew PS3 games. Sony later decided that those features could also be used for piracy or other nefarious actions and so patched it out. Sell the console with a feature, remove it later after the purchase… and then get sued in a class action, as it turned out.

      • GOG to go through some reorganization after suffering losses | GamingOnLinux

        While Steam continues to do well with it being the most popular games store, it seems CD PROJEKT Group’s store GOG is really starting to struggle.

        CD PROJEKT recently released their latest financial results, along with a call with investors that went over how the whole business is doing. It’s not all bad news for them, since they saw overall 38% more sales revenue compared to the third quarter of last year. On the GOG side though, it posted increasing losses and so it’s going to be restructured.

      • GOverlay for editing MangoHud gets a new Steam Deck friendly UI | GamingOnLinux

        GOverlay is an application that helps to manage Linux gaming tools like the MangoHud performance overlay, the Vulkan post-processing layer vkBasalt and the video capture tool ReplaySorcery.

        Over time GOverlay has supported an increasing amount of options, and the UI ended up pretty cluttered and confusing – not to mention it needing a lot of monitor space. GOverlay release 0.7 goes a long way towards fixing that, with a new tabbed interface to spread things out a bit.

      • Ubisoft suggest posting on their forum for Proton support in Rainbow Six Siege | GamingOnLinux

        Now that getting games that use BattlEye for anti-cheat working on Linux (either native or through Proton) is much easier, an Ubisoft rep suggests people post in their forum to show demand for it.

        In response to a post on their official forum asking about Ubisoft hooking it all up, the rep mentioned they can pass the feedback onto developers and that hopefully “other players will reply here in favor of Proton support and the development team may then look to implement it”. It’s not exactly much and a pretty bog-standard response but it’s a reply nonetheless and isn’t being ignored.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE developer suggests Plasma needs to be simpler by default

          KDE developer Nate Graham, the same person who recently said they may become the “Windows or Android” of the FOSS world is back again with more thoughts – this time about keeping it simple.

          The Plasma desktop is pretty darn powerful, that’s for sure and it has a massive amount of customization options for practically every little thing. For many people this is great, however it can also have a detrimental affect on the experience by new users and users less comfortable with computing. So what’s the answer? Graham thinks they need to keep things simpler out of the box.

        • Who is the target user?

          As a teenager, I played a lot of Vampire the Masquerade (VtM)–a tabletop role-playing game. One of the skills in which your character could become experienced was Computers, with ability measured from 0 to 5 dots…

          This little table has stayed with me over time. As simple and crude as it is, I think it provides a reasonable measurement scale that can be used to guide software development: you need to decide how many dots in Computers a user must have before they can use your software, which helps you organize the user interface and prioritize features.

          My sense is that currently most Linux-based software targets people with three dots in Computers or more, but is often usable for people with two dots. My wife is a solidly two-dot user who is happily using KDE Neon as her distro.

        • A Call For KDE To Fully Embrace Simplicity By Default, Appeal To More Novice Users
        • KDE Plasma 5.23.4, Bugfix Release for November

          Tuesday, 30 November 2021. Today KDE releases a bugfix update to KDE Plasma 5, versioned 5.23.4.

          Plasma 5.23 was released in October 2021 with many feature refinements and new modules to complete the desktop experience.

          This release adds three weeks’ worth of new translations and fixes from KDE’s contributors. The bugfixes are typically small but important and include…

        • KDE Plasma 5.23.4 Update Brings Back the Touchpad Applet, Fixes More Bugs

          KDE Plasma 5.23.4 is here three weeks after the KDE Plasma 5.23.3 update and it restores the Touchpad applet that was previously available in the Plasma 5.22 series. The applet is now available as a read-only status notifier that only shows when your laptop’s touchpad has been disabled.

          This point release also improves the Plasma Wayland session to allow users to run XWayland apps as a different user, improves the Media Frame applet to display images from folders that contain unusual characters like backticks in their names, and improves the notification about critical battery level to automatically disappear when you connect your laptop to its charger.

    • Distributions

      • elementary OS 6 Intros a Simpler Alt Tab Experience

        A recent update replaced the distro’s flashy (in both senses of the word) alt + tab experience with a simpler version. The new approach is more akin to the sort of switchers found in other Linux desktop environments and other desktop operating systems.

        To better illustrate the change here’s a gif that shows what window switching looked like in elementary OS 6 previously…

      • New Releases

        • OSMC’s November update is here with Kodi 19.3 – OSMC

          At the end of the Summer, we released our largest update ever delivering a new version of Kodi, an improved video stack, support for new Raspberry Pi models and a large number of improvements and fixes.

          Since then, we’ve been working hard to deliver another significant update. This update also features Kodi v19.3 which has a number of bug fixes. One of the more significant changes in Kodi v19.3 includes a fix which improves the playback of videos which have high-bitrate TrueHD tracks. This would previously result in drop-outs when playing back some titles with HD audio passthrough enabled.

        • elementary OS 6 Updates for November, 2021 ⋅ elementary Blog

          This past week was Thanksgiving in the US, which for my family means decorating for the holidays is in full swing. In a similar vein, we’ve spent some extra time over the past month focusing on both visual and functional polish to make sure elementary OS 6 looks as good and works as well as it can—read on for the details!

        • 4MLinux 38.0 Released with New Apps, Basic Support for 32-bit Apps, and a Games Pack

          Coming four months after 4MLinux 37.0, the 4MLinux 38.0 release is here to introduce basic support for 32-bit apps, as well as a new downloadable extension called 4MLinux GamePack that includes a big collection of classic Linux games, which you can download from here.

          It also comes with several new pre-installed apps, including the Audacity audio editor, Musique audio player, GQmpeg music player, Minitube player for YouTube, wxCam webcam app, xmp CLI module player, as well as the GRUB2 bootloader.

        • 4MLinux Releases: 4MLinux 38.0 STABLE released.

          The status of the 4MLinux 38.0 series has been changed to STABLE. Edit your documents with LibreOffice and GNOME Office (AbiWord 3.0.5, GIMP 2.10.28, Gnumeric 1.12.50), share your files using DropBox 133.4.4089, surf the Internet with Firefox 94.02 and Chromium 93.0.4577.82, send emails via Thunderbird 91.3.2, enjoy your music collection with Audacious 4.1, watch your favorite videos with VLC 3.0.16 and mpv 0.33.1, play games powered by Mesa 21.1.6 and Wine 6.19. You can also setup the 4MLinux LAMP Server (Linux 5.10.79, Apache 2.4.51, MariaDB 10.6.4, PHP 5.6.40 and PHP 7.4.25). Perl 5.32.1, Python 2.7.18, and Python 3.9.4 are also available.

      • Debian Family

      • AWS

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Raspberry Pi 4 PLC Industrial controller targets IIoT applications

        I’ve just noticed Boot&Work Corp was now offering an “Industrial Shields” branded PLC industrial computer powered by Raspberry Pi 4 SBC. We previously covered the company in 2017 at a time when they provided Arduino-based PLC modules optionally controlled with 10.1-inch panel PCs based on ARM Linux SBCs such as Raspberry Pi or Banana Pi.

        The “Raspberry Pi PLC Industrial Controller” is offered with either optoisolated outputs or relay outputs, and optional GPRS connectivity. The Linux PLC is equipped with up to 36 digital inputs, 16 analog inputs, 8 analog outputs, and 6 interrupts, as well as communication interfaces such as CAN bus, up to 2x Ethernet ports, dual RS-485, WiFi, and Bluetooth.

      • Programming/Development

        • Responsively App Is A Browser For Fast Responsive Web Development (Free And Open Source)

          The application had its first public release back in March 2020, and is already quite popular, but I’ve only recently stumbled upon it and thought I’d share it with you.

          Main Responsively App features…

          The application also includes a live CSS editor, touch mode, design mode that allows users to edit HTML directly without dev tools, network speed emulation options, zoom, disable SSL validation, and support for various protocols (file://, ftp://, etc.), and much, much more.

          Using Responsively App, you also get network proxy support, light and dark themes and shortcut keys.

        • Musings on the OWASP Top 10

          The recently released OWASP Top 10 – a summary of the primary attack vectors used by ne’er-do-wells has taken a somewhat different approach than in previous years. As the report states, “This instalment of the Top 10 is more data-driven than ever but not blindly data-driven. We selected eight of the ten categories from contributed data and two categories from the Top 10 community survey at a high level. We do this for a fundamental reason, looking at the contributed data is looking into the past. AppSec researchers take time to find new vulnerabilities and new ways to test for them. It takes time to integrate these tests into tools and processes. By the time we can reliably test a weakness at scale, years have likely passed. To balance that view, we use an community survey to ask application security and development experts on the front lines what they see as essential weaknesses that the data may not show yet.”

        • Spatial AI And CV Hack Chat | Hackaday

          A lot of what we take for granted these days existed only in the realm of science fiction not all that long ago. And perhaps nowhere is this more true than in the field of machine vision. The little bounding box that pops up around everyone’s face when you go to take a picture with your cell phone is a perfect example; it seems so trivial now, but just think about what’s involved in putting that little yellow box on the screen, and how it would not have been plausible just 20 years ago.

  • Leftovers

    • Giving Josephine Baker a Hero’s Grave Won’t Bury the Truth…

      As a student in Paris in the fall of 1990, my lodgings were the envy of my peers—even if the means by which I came about them were not. While fellow language students from my university in Edinburgh were stuck in soulless suburbs, I was ensconced in Rue des Fossés Saint-Jacques, a short walk from the Jardin du Luxembourg and around the corner from the Panthéon.1

    • Hardware

      • Scrolling Name Badge Is Sure To Break The Ice | Hackaday

        The badge runs on an ATtiny45 and uses three 8×8 ultra-bright LED matrices for scrolling [Madison]’s name. It’s powered by a tiny LiPo battery that is boosted to 5 V. This build really shows off a number of skills, especially design. We love the look of this badge, from the pink silkscreen to the the typography. One of the hardest things about design is finding fonts that work well together, and we think [Madison] chose wisely. Be sure to check it out in action after the break.

    • Health/Nutrition/Agriculture

      • Opinion | Omicron Shows Corporate Media Critics of China’s Zero-Covid Strategy Are Way Off the Mark

        As the new Omicron variant of Covid-19 threatens to eviscerate the false sense of security that political elites in many rich countries have felt since vaccines were rolled out at the beginning of the year, critics of China’s zero-Covid strategy may want to carefully reflect on why they have been so quick to dismiss Beijing’s stringent containment measures.

      • Opinion | Omicron: Vaccine Nationalism Is Prolonging the Pandemic

        The United Kingdom and wealthy European nations are in a panic. Unsurprisingly, hoarding huge swaths of the global vaccine supply has enabled the emergence of dangerous new variants of COVID-19. And once again, rich countries are punishing the victims of global vaccine inequality by slamming shut the borders to anyone from southern African nations.

      • WHO Chief Urges Pandemic Treaty to Avoid Another ‘Crisis of Sharing and Solidarity’

        As the World Health Organization warned of a “very high” global risk posed by the Omicron variant of Covid-19, representatives from the body’s 194 member states gathered in Geneva to forge a treaty aimed at preparing the world for the next pandemic—with public health officials warning that the emergence of Omicron should push governments to embrace global solidarity to avoid another disastrous public health crisis.

        “Vaccine equity is not charity; it’s in every country’s best interests. No country can vaccinate its way out of the Covid-19 pandemic alone.”

      • Ireland’s two-tier health insurance system
      • Unnecessary and Complicated Transfers Are Spreading COVID in Federal Prisons
      • Capitalism Must Not Dictate Our Response to Omicron Variant
      • They Knew Industrial Pollution Was Ruining the Neighborhood’s Air. If Only Regulators Had Listened.

        The white ranch house in Pascagoula, Mississippi, was supposed to be Barbara Weckesser’s retirement plan. In 2010, it was getting harder for the real estate agent and her husband to climb the stairs of their home on Dauphin Island, Alabama. She imagined a quiet existence of gardening and puttering around her porch. The Cherokee Forest subdivision seemed like just the place to do it. Rabbits wandered the lawns among the dozens of modest homes built in the 1960s and ’70s; families stayed put for decades. The ranch was a fixer-upper, so the couple tackled it together, installing drywall and hanging up new doors and cabinets.

      • Health Justice Advocates Say Vaccine Equity, Not “Racist” Travel Bans, Will Stop the Omicron Variant

        We go to Cape Town, South Africa, to speak with a leading health justice advocate about how scientists in the country have identified a new Omicron coronavirus variant, and the World Health Organization warns it could be more transmissible than previous variants. Against the advice of the WHO, several countries have closed their borders to foreign travelers. South African President Cyril Ramaphosa criticized the travel bans and called on wealthy nations to help poorer nations gain greater access to COVID vaccines. The bans are “actually quite racist,” says Fatima Hassan, founder and director of Health Justice Initiative. “We need to urgently … vaccinate as many people in Africa as possible.”

      • India’s Farmers Win on Many Fronts, Media Fails on All
      • Leonard C. Goodman lays down antivax tropes to argue against vaccinating children

        I don’t know if I’ve mentioned this before, but I spent three years at the University of Chicago in the late 1990s, which is why I’m familiar with The Chicago Reader. It’s one of those free alternative weekly newspapers that most large cities have. (In Detroit it’s the Metro Times.) Of course, things change, and I haven’t lived in Chicago for over 20 years. I do, however, frequently visit because I have family there and Chicago is a popular site for medical meetings; so I have read the Reader from time to time, although not recently. (Thanks to the pandemic, I haven’t visited Chicago since the summer of 2019, and I don’t often read the Reader online.) Even so, I never would have expected what a reader sent me, an article by a criminal defense attorney named Leonard C. Goodman entitled Vaxxing our kids. Let’s just say that if Mr. Goodman claims not to be “antivax,” he sure does have a funny way of showing it, given that he credulously parrots a lot of COVID-19 antivaccine tropes, producing a very high density of antivaccine misinformation for a relatively short article.

      • Dental care too expensive for almost half of the population

        Triinu Võlli would see all medical bills presented to the Health Insurance Fund and not the patients. While the benefits scheme has brought some clients to visit the dentist, dentists have noticed that a “some for all” approach still leaves some people aside.

      • South Dakota’s Governor Succeeds in Blocking Voter-Approved Marijuana Legalization

        The court’s 4–1 decision does not affect Measure 26, which authorizes medical use of marijuana and passed with support from 70 percent of voters last November. But unless the state legislature independently implements the policy embodied in Amendment A, the ruling means supporters of broader legalization will have to try again next year with an initiative that addresses the court’s legal objections.

    • Integrity/Availability

      • Proprietary

        • Microsoft’s GitHub back online after two-hour outage

          Microsoft-owned open-source developer platform GitHub is back online after experiencing a more than two-hour-long outage, affecting thousands or potentially millions of developers that rely on its many services.

          GitHub started experiencing issues at around 3.45 p.m. ET on Saturday, with Git operations, API requests, GitHub actions, packages, pages, and pull requests all affected, reports The Verge.

        • Security

          • Privacy/Surveillance

            • Apple Sues NSO Group For Targeting IPhone Users With Powerful Exploits

              NSO Group’s year from hell continues. Apple is now suing the Israeli exploit hawker for hacking its customers’ iPhones — customers who include not only the supposed terrorists and dangerous criminals NSO claims its customers target with malware, but also journalists, activists, lawyers, ex-wives, religious leaders, US citizens, and government officials NSO claims its customers don’t target.

            • Yuval Noah Harari: Lessons from a year of Covid

              Both Israel and the UK have subsequently been in the forefront of rolling out the vaccines, but their early misjudgments cost them dearly. In Britain, the pandemic has claimed the lives of 120,000 people, placing it sixth in the world in average mortality rates. Meanwhile, Israel has the seventh highest average confirmed case rate, and to counter the disaster it resorted to a “vaccines for data” deal with the American corporation Pfizer. Pfizer agreed to provide Israel with enough vaccines for the entire population, in exchange for huge amounts of valuable data, raising concerns about privacy and data monopoly, and demonstrating that citizens’ data is now one of the most valuable state assets.

            • China’s Twitter-like Weibo plans $547 million Hong Kong listing

              US-listed Chinese microblogging platform Weibo is seeking to raise up to $547 million in a share offer in Hong Kong, documents showed Monday, the latest China tech company to list closer to home as tensions with the United States rise.

              Several US-listed Chinese tech firms such as Alibaba have held initial public offerings in Hong Kong over the past two years as the United States has stepped up scrutiny of Chinese companies.

            • Is “KAX17” performing de-anonymization Attacks against Tor Users?

              As middle and exit relays are frequently changed the likelihood to use KAX17′s relays increases with tor usage over time. We have no evidence, that they are actually performing de-anonymization attacks, but they are in a position to do so and the fact that someone runs such a large network fraction of relays “doing things” that ordinary relays can not do (intentionally vague), is enough to ring all kinds of alarm bells.

    • Defence/Aggression

      • The NRA Could be Winning its Long Game Even as it Appears to be in Dire Straits

        On the one hand, more states are allowing Americans to carry weapons in public without permits, and the gun-rights movement could be on the verge of a major Supreme Court victory. On the other, the National Rifle Association, which advocates on behalf of gun owners, faces an existential crisisthat’s mostly due to the NRA’s own missteps.

        As a political scientist who has studied gun politics and policy for over 30 years, I’m confident that there is no precedent for this contradictory situation. Moreover, there’s no reason to believe that the NRA’s problems will influence how the courts treat gun-rights cases.

      • ‘For the Sake of Peace,’ Anti-War Groups Demand Biden Return to Nuclear Deal With Iran

        As negotiations regarding Iran’s nuclear program convened in Vienna on Monday, more than three years after the U.S. walked away from an international agreement, anti-war groups called on the Biden administration “to choose the proven path of peace” and re-enter the pact for the benefit of Iranians, Americans, and the global population.

        “We’ve delayed long enough,” said Sara Haghdoosti, deputy director of the U.S.-based Win Without War. “For the sake of peace, for the sake of prosperity, for the security of people in Iran and the United States alike, it’s time to put differences aside and return to the Iran nuclear deal.”

      • Lying NYPD Officers Cost Prosecutors Sixty More Criminal Convictions

        Fighting crimes is easier when it’s not being done by criminals. A bunch of cases are being tossed in New York City because misbehaving NYPD officers left their dirty handprints all over them.

      • Iran Says US Must Lift ‘Tyrannical and Illegal’ Sanctions to Return to Nuclear Deal

        With Iran, China, European powers, and the U.S. set to resume nuclear talks in Vienna on Monday, Iranian negotiators made clear that the Biden administration must lift crippling economic sanctions if it hopes to return to the multilateral deal that former President Donald Trump abandoned in 2018.

        “The Islamic Republic of Iran has entered the talks with a strong will and elaborate preparations in order to ensure the removal of unlawful and cruel sanctions,” Ali Baqeri-Kani, Iranian deputy foreign minister for political affairs and the nation’s lead negotiator in Vienna, said Monday in an interview with the IRIB News Agency.

      • BLM Co-Founder Alicia Garza: Ahmaud Arbery Should Still Be With Us; Biden Must Condemn Vigilantes

        After a Georgia jury reached a verdict of “guilty” in the closely watched trial of three white men who chased and fatally shot 25-year-old unarmed Black man Ahmaud Arbery, many activists and racial justice advocates following the case have expressed some relief in hearing the conviction. We speak with Black Lives Matter co-founder Alicia Garza, who says while it might feel important that the murders were held accountable for their actions, “justice would be that Ahmaud Arbery would still be with us today.” Garza also discusses the broader context of other trials of white supremacists, like Kyle Rittenhouse, and the role the federal government can play. “Unfortunately, I think the Biden-Harris administration could have been a lot stronger in their condemnation of this kind of behavior and activity,” says Garza. “But what we saw was actually more of a milquetoast response, which is especially concerning in this political context of white nationalism and a rise in vigilantism.”

      • Placing “Guardrails” on the US-China Nuclear Competition

        With the United States and China both speeding up the acquisition of new nuclear weapons, some analysts predicted that Presidents Joe Biden and Xi Jinping would discuss limits on those munitions during their virtual summit on November 15. However, they barely touched on the matter, agreeing only that both sides should take steps to prevent the unintended escalation of future crises. As Biden told Xi during their three-hour exchange, the two sides need “commonsense guardrails to ensure that competition does not veer into conflict.” Yet no plans were made for negotiations leading to the adoption of such measures, so the US-China arms race will only gain further momentum.

      • Mosul, Destroyed by War, Waits to be Rebuilt While the Hunt for Hidden ISIS Treasure Goes On

        “A month ago, workers removing rubble from the ruins near my house found black plastic bags full of bank notes,” said Khalid, a 32-year-old resident of west Mosul, where the destruction is at its worst. “That is why reconstruction stopped temporarily.” The two workers who found the cash told him that the bags were splashed with mud and scorched by fire, but that the bank notes inside were undamaged.

        Khalid says that six months earlier $1.6m (£1.2m), along with gold and silver coins and ingots, were found by building workers excavating a bombed-out house. “Money and gold coins were found hidden in barrels and plastic bags buried three metres underground,” he said.

      • Democrats Push to Remove Boebert From Committees After Islamophobic Comments
      • Omar Hangs Up After Boebert Uses Call to Double Down on ‘Outright Bigotry and Hate’

        Congresswoman Ilhan Omar confirmed Monday that she promptly ended a call with Rep. Lauren Boebert because the Colorado Republican refused to publicly apologize for her recent remarks about the Minnesota Democrat and instead clung to her Islamophobic rhetoric.

        “Spewing this hate is as racist as it is dangerous.”

      • Where the Taliban Rule

        The Taliban’s own embrace of the media in recent years — placing opinion pieces in The New York Times and a cuddly representative in Doha during talks with the U.S. government — while no more self-serving than any other government’s, extends as far as it can benefit the group’s cause but not to independent outlets inside Afghanistan that threaten to challenge it.

      • British F-35 crashed into sea after failing to take off, leaked video reveals

        Given that the aircraft went down in about 1.24 miles of water, it is likely the search area on the sea bed will be a circle of about four miles in diameter. Royal Navy ships are remaining in the area to deter anyone else trying to recover the jet.

        However, defence sources said while the jet would have a locator device on board, the military would not want to activate this amid concerns it could alert rivals to its precise location.

      • With new Omicron variant looming, Republicans are now bribing people to avoid vaccination

        As Axios reported Monday morning, the concerted efforts to keep shots from going in arms have escalated in red states, with Republican politicians now openly bribing constituents not to get vaccinated. “Republican officials around the country are testing a creative mechanism to build loyalty with unvaccinated Americans while undermining Biden administration mandates: unemployment benefits,” the short piece explains. “Florida, Iowa, Kansas and Tennessee have changed their unemployment insurance rules to allow workers who are fired or quit over vaccine mandates to receive benefits.”

      • GOP courts anti-vaxxers with jobless aid

        The backdrop: On Sept. 8, President Biden announced a new rule requiring businesses with more than 100 employees to implement vaccine mandates, affecting roughly 80 million private-sector workers, as well as millions of federal workers and contractors.

      • Taliban and 9/11 Families Fight for Billions in Frozen Afghan Funds – The New York Times

        Nearly 20 years ago, about 150 family members of Sept. 11 victims sought a measure of justice for their losses by suing a list of targets like Al Qaeda and the Taliban. A decade later, a court found the defendants liable by default and ordered them to pay damages now worth about $7 billion.

        But with no way to collect it, the judgment seemed symbolic.

        Today, however, the Taliban are back in control of Afghanistan. The group’s leaders say their country’s central bank account at the Federal Reserve in New York, in which the former government accumulated about $7 billion from foreign aid and other sources, is rightfully theirs. And that in turn has raised a question: If the money is the Taliban’s, shouldn’t the plaintiffs in the Sept. 11 lawsuit be entitled to seize it?

        High-level officials in the Biden administration are now debating the answer to that question, which presents a complex knot of national security, legal, diplomatic and political problems — the latest example of how thorny issues stemming from the terrorist attacks remain unresolved more than two decades later.

    • Transparency/Investigative Reporting

    • Environment

      • At COP 26, A Bigger, Stronger Climate Movement Made Its Mark

        This column is part of Covering Climate Now, a global journalism collaboration cofounded by Columbia Journalism Review and The Nation to strengthen coverage of the climate story.

      • Opinion | Rich Nations’ COP26 Failures Are Modern Colonialism at Its Worst

        The refusal of the United States and fellow rich nations to compensate developing countries for the devastation wrought by air pollution and climate change smacks of a kind of modern colonialism at its worst.

      • Cyber Monday Report Reveals Climate-Wrecking Supply Chain of US Retail Giants

        As shoppers scoured the internet for holiday deals on Cyber Monday, a pair of environmental groups published a report that exposes the planet-heating maritime shipping practices of four major global retailers: Amazon, IKEA, Target, and Walmart.

        “Pandemic-fueled demand increases, record-breaking profits, and the supply chain crisis reveal the current maritime shipping system is ripe for transformation.”

      • New Research Finds Climate Emergency the ‘Overwhelming Factor’ Behind Australian Bushfires

        New research finds “a robust and multi-evidence link” between the climate crisis and Australia’s trend of worsening wildfires.

        “We need to be ready for more Black Summers—and worse.”

      • Shell Slammed for Plan to Blast South African Coastline for Oil and Gas During Whale Season

        Environmentalists responded with outrage to reports that oil giant Shell plans to spend the next several months conducting underwater explosions to search for deep-sea oil and gas reserves off South Africa’s coastline—a move that threatens to worsen the fossil fuel-driven climate crisis, undermine the livelihoods of fishers, and harm marine life.

        “Shell’s project has been allowed by our government, as if the threat of global heating from burning more and more fossil fuels doesn’t exist.”

      • Energy

        • Is the new crypto bill the end of the tunnel for crypto-trade in India?

          After a long-drawn debate regarding regulating cryptocurrency, the much-awaited “Banning of Cryptocurrency & Regulation of Official Digital Currency Bill, 2019″ draft was introduced in the Indian Parliament on 24th November, 2021.

          The legislation is a brief, a 17-pager draft with a slightly concerning title – with it being named “Banning of Cryptocurrency”, it, needless to say, dismayed many experts and crypto[currency]-enthusiasts.

          What does this draft Bill say?

        • Work set to begin on cross-border Finland to Sweden rail line

          The project will electrify the Laurila-Tornio-Haparanda section of the network, thereby opening up a cross-border rail connection between Finland and Sweden.

          Haparanda station reopened for passenger trains in March this year after a 29-year break, offering connections to long-distance trains in the south of Sweden.

      • Wildlife/Nature

        • Behind the Science: How Do We Know How Many Shark Species Are at Risk?
        • Sen. Tester’s Wilderness Act Doesn’t Go Far Enough

          Paid pollsters with their surveys tell us it is a good thing. Businessmen looking for government handouts tell us the same fairy tale.  Yard signs in the well-healed, “smart” parts of university towns – “donor-class” neighborhoods — reinforce this narrow-minded, virtue-signaling, herd mentality. Tester’s collaborators pontificate, regurgitate.  It must be so. But is it so?

          “Stakeholders” (vested financial interests) proclaim their alleged “…love our mountains, valleys, rivers, fish, wildlife, and everything else available on our public lands.”  The difference between “love” and “available” is the difference between loving one’s spouse infinitely and loving a young beauty rented from an escort service for a one-night stand. Or if it is love, it is the kind that sentimentalizes desire and calls it love, where love is reduced to pity and an unconscious desire for exploitation.

        • Scientists peered into an octopus’ brain — and were astonished at what they saw

          Among the smartest animals on Earth, octopuses are unique for being utterly weird in their evolutionary path to developing those smarts. Philosopher Peter Godfrey-Smith has called the octopus the closest thing to an alien that we might encounter on Earth, and their bizarre anatomy speaks to this: An octopus’ mind isn’t concentrated in its head but spread throughout its body. Their tentacles are packed with neurons that endow each one with a hyperaware sense of touch, as well as the ability to smell and taste. Marine biologists have remarked that each tentacle sometimes seems like it has a mind of its own. Every octopus is a tactile thinker, constantly manipulating its surroundings with a body so soft it almost seems liquid.

    • Finance

    • AstroTurf/Lobbying/Politics

      • The Political Marriage of Todd Gitlin and Bill Kristol
      • Opinion | These So-Called “Moderate Centrists” Are Nothing But Corporate Extremists

        Long ago, in a United States that now seems far, far away, the coming-to-America story of Saule Omarova would be hailed as a stirring endorsement of our nation as a beacon for democracy seekers. Born in 1966 under the Communist dictatorship of the USSR, and raised under her Kazakh grandmother who’d lost the rest of her family to Stalinist purges, she grew up with a passion for Pink Floyd and political dissent that caused her to stay here in the U.S. after the Soviet regime collapsed while she was a grad student in Wisconsin.

      • Paperwork Keeps People Poor

        Months of negotiations over the Democrats’ agenda in Congress keep boiling down to one thing: What will Joe Manchin agree to? Since his vote is necessary to pass the party’s Build Back Better package, which includes funding on climate change, health care, housing, and caregiving, the conservative West Virginia senator has been calling many of the shots.

      • ‘Triumph for Democracy’: Socialist Candidate Takes Commanding Lead in Honduran Election

        Leftist presidential candidate Xiomara Castro took a decisive lead in Honduras’ election on Sunday, setting her up to defeat the right-wing incumbent party’s candidate—though progressive observers stressed the need to remain vigilant as ballots continue to be counted and reactionary forces ramp up misinformation following an apparently unsuccessful attempt to suppress voting.

        “Xiomara Castro’s likely victory is a testament to the will of the Honduran people to have their voices heard and their votes counted.”

      • How Steve Bannon Has Exploited Google Ads to Monetize Extremism

        Almost a year ago, Google took a major step to ensure that its ubiquitous online ad network didn’t put money in the pocket of Steve Bannon, the indicted former adviser to Donald Trump. The company kicked Bannon off YouTube, which Google owns, after he called for the beheading of Anthony Fauci and urged Trump supporters to come to Washington on Jan. 6 to try to overturn the presidential election results.

        Google also confirmed to ProPublica that it has at times blocked ads from appearing on Bannon’s War Room website alongside individual articles that violate Google’s rules.

      • Matthew McConaughey Says He Won’t Run for Governor of Texas Next Year
      • Trump May Win in 2024 If Democrats Keep Derailing Their Own Agenda
      • Facebook (Again) Tells Law Enforcement That Setting Up Fake Accounts Violates Its Terms Of Use

        Law enforcement agencies routinely engage in surveillance of social media accounts. Some of this is accomplished with third-party tools that use keywords and geofences to give cops info that may be relevant to investigations. These tools also give cops a lot of garbage data that law enforcement is free to sift through for officers’ own entertainment or to bypass constitutional protections surrounding speech and warrantless searches.

      • The Republicans Have Become the Party of Organized Violence

        On November 12, while promoting his new book, Betrayal, ABC News reporter Jonathan Karl released an audio recording of a conversation with Donald Trump. Responding to a question about the Capitol rioters who’d chanted “Hang Mike Pence,” Trump said those words were just “common sense,” given the fraudulence of the 2020 election. Two days later, Wyoming Republican Senator John Barrasso, who ran as a moderate but has since swung to the right, was asked by ABC’s George Stephanopoulos about Trump’s comment. Despite repeated prodding, Barrasso kept dodging the issue, emphasizing the need to move on and suggesting that there had been voting irregularities in the 2020 election that merited further investigation.

      • Now He Tells Us: David Brooks Suggests That the Republican Party Has Embraced Fascism

        These US Rightist “intellectuals” have in fact manufactured a “Left” that they can hate. It has almost nothing to do with any historical Left but is a convenient label for their fascistic attacks. It seems tailored to take advantage of some of the more divisive ideas of the Democrats, especially their “identity politics.” (More on this below). David Brooks points none of this out.

        Brooks’ focus is on the fact that these current younger “conservatives” have abandoned any idea that political differences can or should be worked out with rational or practical assessment of policies. What once might have been seen in our two-party system as political disagreements about how best to serve the American people, have been turned into irreconcilable antagonisms that cannot be compromised. Brooks quotes their spokesperson, Rachel Bovard: “Woke elites – increasingly the mainstream left of this country – do not want what we want. What they want is to destroy us.” Who are these “woke elites”? They are a “totalitarian cult of billionaires and bureaucrats….” Thus, the Right’s target is constructed for broad appeal to a mass of generally poorly informed individuals. Anyone who is concerned with racism and police murder, and who might have considered the long history of these tools of rule is “woke.” Billionaires and bureaucrats – who doesn’t abhor these people? Yet there is no mention that their new leader, Donald Trump, is an authoritarian billionaire who fits this bill, and has constructed a cult around himself.

      • Microsoft CEO Nadella sells off nearly $300 million in shares of the company

        Nadella disclosed the sale in an SEC filing.

        “Satya sold approximately 840,000 shares of his holdings of Microsoft stock for personal financial planning and diversification reasons. He is committed to the continued success of the company and his holdings significantly exceed the holding requirements set by the Microsoft Board of Directors,” a Microsoft spokesman said in a written statement to the Journal.

      • Ex-Pentagon chief says Defence Department censoring ‘tumultuous’ details of Trump presidency

        The former head of the Pentagon has sued the Department of Defence, accusing the government of blocking the publication of a new book revealing the “tumultuous” consequences of Donald Trump’s presidency.

        Mark Esper filed a lawsuit against his former employer for allegedly blocking the release of large swathes in his upcoming memoir, A Sacred Oath.

      • Digital group says govt troll move will not decrease hate online

        The Australian arm of a global initiative working to counter digital threats to democracy says the Federal Government’s proposed new rules to expose online trolls will not solve the problem on online hate on social media.

      • Govt promises new rules to force online firms to unmask trolls

        The Federal Government will put in place new rules to force technology companies to identify anonymous online trolls, or be exposed to the risk of defamation payouts.

      • India-born Parag Agrawal replaces Jack Dorsey as Twitter CEO

        Agrawal, an IIT-Bombay and Stanford University alumnus, was the chief technology officer of Twitter before the elevation that caught investors by surprise. Twitter stock went up by as much as 10% with the news in opening trade. The two most powerful people at Twitter will now be India-born—the other being Vijaya Gadde, its policy and safety lead director.

      • Twitter’s Jack Dorsey Steps Down From C.E.O. Role

        Jack Dorsey is stepping down as chief executive of Twitter, the social media site he co-founded in 2006 and guided through the tumultuous years of the Trump administration.

        Twitter announced Mr. Dorsey’s departure on Monday. He is being replaced by Parag Agrawal, the company’s current chief technology officer. Mr. Dorsey’s plans were first reported by CNBC. A Twitter spokeswoman did not respond to a request for comment.

      • Twitter co-founder Jack Dorsey to leave social media company

        Twitter co-founder Jack Dorsey is going to leave the company and is stepping down as chief executive office (CEO) of the social media platform, he announced on Monday. He will be succeeded by Twitter’s current chief technology officer (CTO), Parag Agrawal.

      • New Twitter CEO Parag Agrawal is central to Jack Dorsey’s plans to revamp social media

        Agrawal has been Jack Dorsey’s closest partner in thinking about the future of the Twitter platform and decentralizing social media, a former company executive told CNBC.

      • The dangers of anarchy in space

        I can’t think of a more dramatic illustration of how reckless actions in space put all at grave risk than Russia’s recent anti-satellite (ASAT) test blowing up one of its own defunct satellites and creating a cloud of more than 1,500 pieces of space debris.

        Even small pieces of debris, when traveling at some 17,000 miles per hour, can cause horrific damage to satellites, disrupting the space infrastructure that is the nervous system of modern life. Moscow’s test forced astronauts (including its own cosmonauts) on board the International Space Station (ISS) to take emergency safety measures for fear of collision. Moscow’s test followed a similarly dangerous Chinese ASAT test in 2007, and a U.S. ASAT test (though designed to minimize debris) in 2008.

    • Censorship/Free Speech

      • Frances Haugen will testify before Congress again this week

        House Democrats announced that Facebook whistleblower Frances Haugen will testify before Congress a second time on Wednesday to discuss possible legislative changes to tech’s controversial legal liability shield, Section 230.

        The House Energy and Commerce subcommittee on communications and technology will hold the upcoming hearing to discuss what Democrats are referring to as “targeted reforms” to Section 230. Several committee members have already introduced bills that would create carve-outs in the law that would make big tech companies like Facebook and Google legally liable for algorithms that amplify content that leads to offline violence.

      • Communist Party cancel culture targets internet celebrities

        There appear to be two targets. The first is a business model with 4.9trn ($767bn) of annual revenues, the fan economy, that has sprung up around internet celebrities, fan groups and streaming platforms. In the most recent set of rules, issued in late November, the Cyberspace Administration of China (CAC) said that brand campaigns featuring celebrities will be allowed to show advertisements only in designated ad spaces. And from now on, China’s huge fan groups, often with millions of fans apiece, are to come under close monitoring by the authorities.

      • An introduction to Parag Agrawal, Twitter’s new CEO

        Agrawal isn’t the most well-known of names either inside or outside of Twitter. He’s been with the company for over a decade, though, working his way up from an engineer to become its top executive (and a close friend of Dorsey’s). Agrawal first started at Twitter back in October 2011 with a focus on ad products, and he became the first recipient of the company’s “Distinguished Engineer” title. He was later appointed chief technology officer in October 2017, during which time he’s jumped in to address high-profile problems (like a large-scale password security issue) and take on some of the company’s bolder initiatives (like decentralization). But despite that long tenure, Agrawal, who is 37, hasn’t spent much time in the public eye — something that will immediately change with his new role.

      • ‘Could offend students’: Canada school board cancels book club event with Yazidi Nobel laureate

        The event was supposed to carry discussion on two books in presence of their authors — Marie Henein’s ‘Nothing But the Truth: A Memoir‘ and Nadia Murad’s ‘The Last Girl: My Story of Captivity, and My Fight Against the Islamic State‘.

        The board said it has withdrawn support to hold the October event with Henein, the daughter of Egyptian immigrants and one of Canada’s most prominent lawyers, because her book was “problematic” as she “defended” former CBC host Jian Ghomeshi when he was accused of sexual assault.

        For Murad’s event, which was to be held in February 2022, the board said the book written by her could “promote Islamophobia” and “offend” their Muslim students.

        Murad, a Yazidi human rights activist, was 19 when she was taken as a sex slave in 2014 by the Islamic State militants who invaded her village in northern Iraq.

      • Disney+ appears to censor episode of The Simpsons in Hong Kong referencing Tiananmen Massacre

        Online video streaming service Disney+ appears to have censored an episode of The Simpsons in Hong Kong which references the 1989 Tiananmen Massacre.

        The 12th episode of the 16th season was first broadcast in 2005 and sees the family visit China, where the cartoon family visits the mummified body of ex-leader Mao Zedong. The newly-launched Disney+ platform skips from episode 11 to 13.

      • Disney+ Drops ‘Simpsons’ Episode in Hong Kong Because of Tiananmen Square Joke

        The 16th season of the iconic Fox animated show jumps from episode 11 to 13 when viewers in the city browse the flagship Disney streaming service. The missing episode 12, first broadcast in 2005, happens to be the one where Homer takes his family to China, where they visit Tiananmen Square and come across a placard that reads: “On this site, in 1989, nothing happened.”

        It appears the episode has suffered precisely the kind of the censorship it was written to ridicule.

      • Disney+ Omits ‘The Simpsons’ Tiananmen Episode in Hong Kong

        In the missing episode, “Goo Goo Gai Pan,” the cartoon family visits the Beijing square where a character confronts a line of tanks — a reference to the famous Tank Man photograph — and a sign reads “Tien An Men Square: on this site, in 1989, nothing happened.”

    • Freedom of Information/Freedom of the Press

      • When The FBI Shows Up At Your Door About Your Reporting, That’s Intimidation

        Having the government show up at your door to ask some questions about your reporting can be extremely unnerving. Zack Whittaker, the top notch cybersecurity reporter for TechCrunch got to experience the fun of that when the FBI showed up at his door over a year after he had published a story about a hacker dumping thousands of Mexican embassy documents from Guatemala after the Mexican embassy left the data exposed online.

      • China surveillance of journalists to use ‘traffic-light’ system

        Documents seen by BBC News describe a system that classifies journalists into a “traffic-light” system – green, amber and red.

        Journalists in the “red” category would be “dealt with accordingly”, they say.

        The Henan Public Security Bureau has not responded to a request for comment.

        The documents, discovered by the surveillance analyst firm IPVM, also outline plans to surveil other “people of concern”, including foreign students and migrant women.

        Human Rights Watch said: “This is not a government that needs more power to track more people… especially those who might be trying to peacefully hold it accountable.”

    • Civil Rights/Policing

      • Calls Grow to Drop Murder Charges Against Black Teen Chrystul Kizer in Kenosha
      • Off to the Solomon Islands: Australia’s Civilizers Get Busy

        In the Solomon Islands, Australian interventionism was originally cloaked in shining dress, justified as humanitarian and utterly noble.  By the time some 2,000 troops, police officers and support personnel, mostly Australian, were deployed in 2003, the country had already mounted regional interventions in Bougainville in Papua New Guinea (1997) and East Timor, the latter as part of a UN-mandated mission.

        The Regional Assistance Mission to Solomon Islands (RAMSI) was given a rhetorical flourish of preventing a “failed state” while easing Australian anxieties in a region marked by a supposed “arc of instability”.  In a conscious nod to making sure the mission would be seen benevolently, the PR pen pushers came up with the pidgin named Operation Helpem Fren.

      • A Place of Freedom

        Upon its publication in 1975, Gayl Jones’s literary debut, Corregidora, was met with great acclaim. Jones’s mentor and teacher, the poet Michael Harper, had introduced her work to his friend, the editor and novelist Toni Morrison, who published Corregidora and also Jones’s second novel, Eva’s Man, the following year. Still in her mid-20s, Jones was immediately heralded for her genius by readers as diverse as James Baldwin and the New York Times critic Raymond Sokolov. Part of what drew them was what Sokolov referred to as her “nonchalance” and “ease” of style, which served as her fiction’s “consummate deception.” Writing with a clarity and matter-of-factness that quietly understated her work’s difficulty, Jones often relayed moments of intense brutality with a kind of quotidian ordinariness.

      • In An Even Marginally Healthy Society

        He understood perfectly! All forms of encompassing, emphatic, and egalitarian justice certainly are the most reasonable things of all. And, as such, they always have within themselves the possibility of being understood and lived by people in just this way. Yet, there are so many deeply sedimented socio-historical, socio-economic, and socio-existential structures that keep some people from the exclamation of my nephew that day. A realized egalitarian and equitable social formation that has maximized justice and goodness to the fullest extent possible by our very imperfect species that will always be entwined with social antagonisms, would truly be the most reasonable social formation of all—civilizationally, historically, and anthropologically.

        I have, subsequent to the moment when my nephew made his exclamation, taken pleasure in narrating this episode because there was something special in what he said and how he said it and it immediately linked his statement with another extremely resonant statement, the one in which Kwame Ture in his book, Ready For Revolution: The Life And Struggles Of Stokely Carmichael, described the Freedom Rides of l961 (at 19 years of age Ture—Stokely Carmichael at the time—was the youngest of the Freedom Riders): “The plan, however, was simplicity itself. In any sane, even half-civilized society it would have been completely innocuous, hardly worth a second thought or meriting any comment at all. CORE would be sending an integrated team–black and white together–from the nation’s capital to New Orleans on public transportation. That’s all. Except, of course, that they would sit randomly on the buses in integrated pairs and in the stations they would use waiting room facilities casually, ignoring the white/colored signs. What could be less harmless…in any even marginally healthy society?”

      • Europe’s War on Woke

        Paris—On my 32nd birthday, I agreed to appear on Répliques, a popular show on the France Culture radio channel hosted by the illustrious Alain Finkielkraut. Now 72 and a household name in France, Finkielkraut is a public intellectual of the variety that exists only on the Left Bank: a child of 1968 who now wears Loro Piana blazers and rails against “la cancel culture.” The other guest that day—January 9, less than 72 hours after the US Capitol insurrection—was Pascal Bruckner, 72, another well-known French writer who’d just published “The Almost Perfect Culprit: The Construction of the White Scapegoat,” his latest of many essays on this theme. Happy birthday to me.1

      • Self-Defense? After Rittenhouse, Calls to Drop Murder Charges Against Black Teen Chrystul Kizer

        Since Kyle Rittenhouse was acquitted under claims of self-defense for fatally shooting two people and wounding a third during racial justice protests last year in Kenosha, Wisconsin, another case in the city is drawing new national attention. Human rights advocates are calling for charges to be dropped in the case of Chrystul Kizer, who faces homicide and other charges for killing her white sex trafficker in 2018 after he drugged her and tried to rape her when she was just 17-years-old. Court records show police knew Randall Volar had a history of sexually abusing underage Black girls. Although the court initially ruled Kizer could not use a self-defense argument, an appellate court reversed the decision and the Wisconsin Supreme Court will now consider the ruling. “It has huge ramifications for her, but it also has a huge potential impact for other victims of trafficking,” says reporter Anne Branigin. “We have a very clear case where we are not receiving the same support, the same outcry from folks who got behind Kyle Rittenhouse to defend this young Black woman,” says Wisconsin state representative David Bowen. “She was trying to defend herself to get out of the sex trafficking she was being abused with.”

      • Cornel West Moments of Interruption
      • Digital ID expert says reducing cyber crime will need new thinking

        H. Daniel Elbaum, chairman and joint chief executive of VeroGuard, said the Joint Policing Cybercrime Co-ordination Centre, announced by the Federal Government on Monday, was a welcome initiative.

        But, he added, PwC modelling had estimated the direct costs to business from cyber incidents to be about $10.1 billion annually, with projections of a total GDP loss of $114.9 billion by 2031.

      • He stole a rug and a car. Why did he spend 25 years bouncing between prison and parole?

        In America, a person under supervision – either as an alternative to prison (probation) or a condition of their release from one (parole) – can face as many as 30 rules that range from vague to “bizarrely specific”, according to a 2017 law-review article by a lawyer at the American Civil Liberties Union (ACLU). These provisions include observing a curfew, refraining from being around guns or anything that looks like a gun, disclosing monthly bank-account statements, avoiding other people with criminal records (including family members), not having more than $100 cash in your wallet, keeping a job, supporting one’s family, getting approval to use knives at work from a parole agent and carrying those knives only while at work or travelling to and from work.

        The net effect of these rules is a “nearly impossible burden”, the ACLU lawyer wrote. People have to navigate the narrow strait between “the Scylla of failure to check in and the Charybdis of unemployment”. More pointedly, as civil-rights scholar Michelle Alexander wrote: “Today a criminal freed from prison has scarcely more rights, and arguably less respect, than a freed slave or a black person living ‘free’ in Mississippi at the height of Jim Crow.”

    • Internet Policy/Net Neutrality

    • Monopolies

      • What’s at Stake at WTO

        One would think that every global institution, and particularly one whose rules govern trade in vaccines, medicines, and other medical products necessary to end COVID-19, would be doing everything in its power to contribute towards ending this horrendous pandemic.

        Unfortunately, we are talking about the WTO, where the protection of billionaires’ intellectual property monopolies, intended to reduce supply and increase prices, are sacrosanct. Developing countries introduced a proposal to waive certain provisions of the WTO’s Agreement on Trade-Related Intellectual Property Rights (TRIPS) in order to ensure vaccines, treatments, diagnostics, and medical products necessary for the treatment and containment of the COVID-19 pandemic are accessible to all. More than a year after its introduction, members have still not agreed to start negotiations on the waiver.

      • Patents

        • Africa: patenting against the clock [Ed: This fluff from Inventa International mentions the PACE program of EPO, which is likely illegal; after it was exposed in the media the EPO engaged in creative revisionism to make it seem acceptable, but it’s just more of the usual corruption]

          Considering this background, several patent offices offer to the applicant legal provisions that are configurated to provide a faster prosecution of a patent application. There are several embodiments of accelerated examination procedures, wherein the simplest ones comprise a mere request by an applicant for an accelerated examination for a specific patent application, as the PACE programme, established by the European Patent Office (EPO).

        • EPO voted best for patent quality once more [Ed: IAM will continue to receive bribes from the EPO as long as it helps perpetuate lies like these; it is a propaganda mill/PR industry]
        • Strategic patent countries: evidence from EPO oppositions [Ed: Bad metrics which want us to assume litigation is the goal, not science]

          IP-savvy organisations not only file their own patents but also keep close tabs on the competition. Tony Afram and Gianluca Tarasconi at ipQuants reveal exclusive statistics on EPO oppositions, which provide invaluable insight into which countries are making the most of this data

          Companies that file the the highest number of patent applications are often singled out as being exceptionally innovative. In fact, even rankings that purport to classify countries based on their innovation power usually include the patent filing activity of applicants originating from each country as a proxy for innovative activity.

          However, filing activity alone fails to tell the full story. A true corporate patent strategy needs not only to align with business objectives, but also to monitor patent activity and occasionally take action against third-party patents.

        • Patents: key updates and developments for in-house teams [Ed: Unable to make money, Lexology increasing experiments with paywalls; EPO is now shamelessly extending an illegal practice, which it rigged courts to approve]

          The German Patent Court rejects inventorship for machines, the UK updates it guidance on UK-China Cooperation on IP, and Brazil and Japan renew the Patent Protection Highway – plus other key updates.


          On 24 November 2021, the European Patent Office (EPO) announced that its pilot project for conducting oral proceedings in opposition by…

        • EPO: Enlarged Board endorses video hearings in appeal proceedings [Ed: Convenient revisionism “Sponsored by By Jakob Pade Frederiksen”; this was an astounding act of EPO corruption and court-rigging]

          On October 28 2021, the Enlarged Board of Appeal (EBA) issued its reasons for decision G 1/21 on the legality of the conduct of oral proceedings in the form of a videoconference (ViCo). The decision lays down that during a general emergency impairing the parties’ possibilities to attend in-person oral proceedings at the EPO premises, the conduct of oral proceedings before the boards of appeal by way of ViCo is compatible with the European Patent Convention even without the consent of all parties to the proceedings. The decision is specifically concerned with oral proceedings at the appeal stage only and is therefore not immediately applicable to oral proceedings at the first instance.

        • EPO revokes key Intellectual Ventures mobile phone patent [Ed: EPO admits it was granting fake patents to Microsoft patent trolls]

          After three days of hearings, the EPO Opposition Division around chairman Thomas Pieper revoked a patent owned by Intellectual Ventures. At least one ground for opposition was held as the company prejudicing the maintenance of European patent EP 21 46 439, after Art. 101(2) EPC.

          Specifically, the patent specification contained further elements not included in the original application. In the past, the EPO has applied this strictly as grounds for revocation. Now this approach has brought down the 20-year-old Intellectual Ventures patent. The parties did not discuss novelty and inventive step during the hearing.

        • Benchmarking the IP5 [Ed: IAM, bribed by the EPO, once again spreads propaganda about EPO patent “quality”]

          Once again, the EPO has taken the crown as the patent office with the best reputation for quality among IAM readers. More than a quarter of respondents describe its output as ‘excellent’ placing it well ahead of the pack (the JPO comes closest with just 14%). Only a miniscule percentage of survey takers told us that EPO quality was ‘poor or adequate’.

        • Benefits and Considerations for Patent Prosecution under Patent Prosecution Highway in the U.S., Europe, China, and Singapore [Ed: When litigation zealots' agenda matters more than actual due process or examination of patents]

          Patent Prosecution Highway or PPH is a set of initiatives promulgated by participating patent offices around the world to accelerate patent prosecution in countries of the participating patent offices. PPH allows the participating patent offices to share information and to benefit from work performed by other participating patent offices, and thereby reducing examination workload and improving quality of patents.

          Under PPH, prosecution of a patent application previously filed with a participating patent office can be fast-tracked in another participating patent office if the patent application meets certain requirements. This article provides a brief overview of benefits of filing patent applications under PPH and requirements by which the patent applications must satisfy in order to participate in PPH.

        • 2.5 Million Nurses Demand UN Probe Into Rich Countries Blocking Patent Waivers
        • ‘That’s for Them to Decide’: UK Secretary Rebuked for Claiming Vaccine Patent Waiver Won’t Be ‘Helpful’ to Global Poor

          As 200 million workers on Monday demanded rich nations drop their continued opposition to a proposed waiver of intellectual property protections on coronavirus vaccines at the World Trade Organization, U.K. Health Secretary Sajid Javid faced sharp criticism for asserting that lifting such rules would not “be helpful” because it would disincentivize the industry from creating life-saving medicines in the future.

          “The health secretary can side with Big Pharma billionaires or he can put public health first, he can’t do both.”

        • 2.5 Million Nurses Demand UN Probe Into ‘Covid-19 Criminals’ Blocking Patent Waiver

          More than two million nurses from 28 countries across the globe filed a complaint Monday calling on the United Nations to investigate the rich countries that are blocking a proposed patent waiver for coronavirus vaccines, an appeal that came as public health experts raced to understand the newly detected Omicron variant.

          “Continued opposition to the TRIPS waiver is resulting in the violation of human rights of peoples across the world.”

        • Our Patent Review System is Ten Years Old. It’s Time to Make It Stronger.

          Thousands of patents get issued each year that never should have been issued in the first place. This is a particular problem in software, which is a bad fit for the patent system. That’s why it’s so critical that we have a robust patent review system. It gives companies that get threatened over patents the opportunity to get a second, more in-depth review of a patent—without spending the millions of dollars that a jury trial can cost. 

          Our patent review system is ten years old now, and unfortunately patent trolls and other aggressive patent holders have learned to game the system. Unfortunately, the USPTO has let them get away with it. A recently introduced bill, the Restoring the America Invents Act (S. 2891) will close some of the loopholes that patent owners have used to dodge or weaken reviews. 

          Congress recognized the need for such a system when it passed the 2011 America Invents Act, and created a review system called “inter partes review,” or IPR. The IPR process lets a particular department of the patent office, the Patent Trial and Appeal Board (PTAB), hold a quasi-judicial process in which they take a second look to decide if a patent really should have been granted in the first place. 

        • Software Patents

          • Software Patent Eligibility Practice At The EPO [Ed: Software patents are not legal, but patent litigation companies are celebrating criminals who took over the EPO and now compel examiners to grant such illegal patents, giving them tips in how to dodge the law and get away with it]

            In common with many patent offices around the world, some inventions that are implemented in software may be patented before the EPO.

            In this chapter, we explore software patentability covering why only some software inventions are patentable before the EPO, the requirements for an invention to be patentable and how patent practice before the EPO with respect to software inventions may evolve in the future.


            EPO tests

            At the EPO, every patent application is also examined with respect to novelty and inventive step, among other requirements. The EPO’s inventive step requirement corresponds to the USPTO’s requirement for non-obviousness. However, the inventive step requirement differs in some aspects from the non-obviousness requirement.

            The first hurdle to overcome before the EPO is also a form of eligibility test, but one with a relatively low bar, only excluding subject matter that is entirely devoid of any technical character. A claim that includes any technical means is said to clear the first hurdle to be considered as an invention. This test is often referred to as the ‘any hardware’ or ‘any technical means’ approach. This determination is made without reference to the prior art. Therefore, a first step to considering whether a claim is likely to be patentable before the EPO is to assess whether the claim recites a technical entity, particularly hardware. In practice it can be surprising how many claims, particularly method claims, can be found at the initial prosecution stage, which on close inspection do not actually refer to any hardware whatsoever. One relatively easy way of ensuring that the first hurdle is cleared can be to recite “a computer implemented method”. In other words, if any hardware (eg, a computer, storage or microprocessor, among other things) is mentioned in the claim, it will pass the first hurdle.

            At the second hurdle, the requirement for an inventive step over the prior art is examined. The examination for inventive step is simultaneously subject to a limitation that only aspects of the claimed invention that are technical can be considered. In other words, any matter in the claim that is not considered technical cannot give rise to an inventive step over the prior art. Therefore, at the EPO, the test whether the claimed subject matter fulfils the requirement of ‘technicality’ is assessed simultaneously with the evaluation of whether the subject matter of the patent application has an inventive step.

            Problem-solution approach

            The EPO has developed a special process for assessing inventive step, known as the ‘problem-solution approach. The problem-solution approach was modified by the EPO for assessing ‘computer implemented inventions’ (CIIs), which is the term used by the EPO for inventions that are usually realised by means of software and are colloquially called ‘software patents’.

            Under the modified problem-solution approach, features of the claim under examination are assessed as to whether they contribute to the solution of a technical problem. Only features of the claimed invention are considered that provide such a technical contribution. In some ‘mixed type’ inventions, being a mix of technical and non-technical claim elements, features can be considered that are non-technical, such as pure software steps, but only if they are said provide a contribution to the formulation of the technical problem solved by the invention.

            CII case law

            During its existence, the EPO has twice reviewed its case law relating to CIIs in the form of decisions of its Enlarged Board of Appeal. The first decision (G 03/08) from 2010 contains an overview of previous case law on CIIs, which confirmed the two-hurdle test and made no changes to the EPO’s approach going forward.

            The second decision of the Enlarged Board (G 01/19) was issued in 2021 and concerns the patenting of computer-aided simulations. On the one hand, the principles of the first decision were confirmed and, on the other hand, specific comments were made on the legal problems that arise when patenting computer-aided simulations.

            Computer-implemented simulations use a numerical model that is fed with input data and in turn produces data as an output indicative of the result of the simulation. Therefore, only data is processed without directly influencing the physical world. In this sense, a computer-implemented simulation could be considered a purely mathematical process. Mathematical methods as such are excluded from patentability and it could be concluded that computer-implemented simulations are, in principle, not patentable.

            In this decision, however, the Enlarged Board of Appeal came to a different conclusion and stated that computer-implemented simulations are not fundamentally excluded from patentability. Instead computer-implemented simulations can be patented if they relate to a technical invention according to the above principles.

      • Copyrights

        • MPA Seeks Person to Investigate Online Pirates & Their Technical Infrastructure

          Whether they supply content, technical infrastructure or even coding skills, those involved with the online distribution of pirated movies or TV shows can expect to get noticed by the Motion Picture Association. How the Hollywood group goes about its investigations isn’t public knowledge but for one talented individual, becoming a member of the team is now on the horizon.

        • Cheat Seller AimJunkies Accuses Destiny 2 Creator Bungie of “Sharp Practices”

          Earlier this year, game developer Bungie filed a copyright infringement lawsuit against AimJunkies.com, which offered a popular ‘Destiny 2 Hacks’ suite. Soon after, the parties began negotiating a potential settlement deal. To AimJunkies’ surprise, however, Bungie sneakily went ‘behind its back’ by requesting the court to enter a default.


Links 29/11/2021: NuTyX 21.10.5 and CrossOver 21.1.0

Posted in News Roundup at 6:01 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • It’s Time More Linux Distros and DEs Become ‘Linus-Proof’

        The past few weeks have rattled the desktop Linux community.

        Popular tech YouTuber Linus, not Torvalds but Sebastian, decided to use Linux on desktop for a month. Linus Sebastian wanted to see if Linux has gotten to the point where it is user friendly enough that any tech nerd can pick it up and run? His focus was also on gaming on Linux because PC gaming is an area Sebastian covers a lot.

        That’s an interesting concept and many in the Linux community got excited because it was free publicity for desktop Linux to a wider tech audience.

    • Audiocasts/Shows

    • Kernel Space

      • How a performance boost in Linux kernel for one family of Intel chips slowed its latest Alder Lake processors

        The mixture of performance and efficiency CPUs in Intel’s 12th-gen Core processors, code-named Alder Lake, hasn’t just been causing problems for some Windows gamers – it almost led to complications for Linux.

        Phoronix’s Michael Larabel noticed a performance hit in the kernel a fortnight ago – in a work-in-progress release candidate, we should stress – and a fix for the scheduling code landed a little later. It turned out the kernel suffered on Alder Lake chips due to a performance-enhancing tweak for another Intel processor family: the multiple-Atom-core-based Jacobsville.

        This year, Intel officially canned its Lakefield chips. These consisted of a performance core called Sunny Cove as well as Atom-class efficiency cores dubbed Tremont. Crucially, there are still multi-Tremont-core embedded processors out there, such as Snow Ridge. These are server and infrastructure-oriented components with up to 24 cores.

        The first proposed cut of kernel 5.16, specifically 5.16-rc1, contained a revision to the scheduler that makes it aware that some clusters of cores share a block of L2 cache – as seen in Snow Ridge and Jacobsville.

      • Testing the Linux Kernel CephFS Client with xfstests

        I do a lot of testing with the kernel cephfs client these days, and have had a number of people ask about how I test it. For now, I’ll gloss over the cluster setup since there are other tutorials for that.

      • Major Rewrite Of Linux’s FS-Cache / CacheFiles So It’s Smaller & Simpler – Phoronix

        As part of David Howells of Red Hat long-term work on improving the caching code used by network file-systems, he today posted a big patch series rewriting the fscache and cachefiles code as the latest significant step on that adventure.

        Howells posted a set of 64 patches for rewriting the kernel’s fscache and cachefiles code. Linux’s fsache is a general purpose cache used by network file-systems while cachefiles is for providing a caching back-end for mounted local file-systems. The Red Hat engineer has been working on this rewrite for more than the past year.

    • Applications

      • System Monitoring Center is an Ideal Task Manager & Resource Monitor for Linux

        Graphically monitoring the system resources may not be the best experience on Linux. The system monitoring tool that comes baked in with your desktop environment might limit the details.

        For instance, GNOME’s system monitor does not display the CPU frequency and temperatures.

        In addition, the default system monitor applications available for Linux usually aim for simplicity instead of providing detailed insights.

      • Best Open Source Gantt Chart Software for Linux

        Gantt chart is the simplest way to assign resources, manage timelines, and visualize dependencies.

        It helps you to avoid confusion and cut unproductive events.

        With a glance, you can have all activities, allocated assets, and the scheduled dates of each.

        While a Gantt chart is a must for any complex project, in general, you need this project management tool…

    • Instructionals/Technical

      • So this is why Deepin requires so much disk space for installation – LinuxBSDos.com

        Deepin is a desktop Linux distribution with roots in China. It is based on Debian, but ships with its own graphical interface called Deepin Desktop Environment and a set of Deepin-developed tools to go with it. The last version I installed was from 2015, so since I’m gradually coming back to writing for this blog, I decided to test drive the latest edition – Deepin 20.3, which was released on Nov. 25.

        For me that means installing it in a virtual environment using VirtualBox. For such installations I typically assign the virtual disk 20GB of disk space. And so it was with Deepin 20.3. But that didn’t end well because at some point the installation failed, with the message shown in Figure 2: “You need at least 64 GB of disk space to install Deepin. To get better performance, 128 GB.”

      • 13 exercises to boost your Linux skills | Enable Sysadmin

        Work through this Linux fundamentals checklist to make sure you’re ready for whatever comes your way at home, at work, or on certification exams.

      • BASH 01 – Script Basics | Linux.org

        This article is the first in a series of articles to cover Bash Scripting. More articles will follow which will build on each other, so make sure you look over each article. It is preferable to read the articles in order (which is why I will number them).

        Scripting is a very useful ability for someone using Linux. Making scripts is especially useful for Administrators. Everyone should benefit from Bash Scripting.

        Bash is the most common shell interpreter on Linux systems. When you open a Terminal, you are in an interactive shell environment. To verify that your system is using the Bash shell using the command: ‘echo “$SHELL”‘.

      • What’s the Difference Between Exposing and Publishing a Docker Port? – CloudSavvy IT

        Exposed and Published container ports are two different but related concepts in Docker. Exposed ports are defined in your Dockerfile as simple metadata. You must publish them when your container starts if you want to enable outside access.

      • How to set up high-refresh rate monitors on Linux

        Do you have a high refresh rate monitor? Are you running Linux? Can’t quite figure out how to change the refresh rate? We can help! Follow along with this guide as we go over how to change the refresh rate on popular Linux desktop environments!

      • How to Install pgAdmin 4 on CentOS 8 – NextGenTips

        In this tutorial guide, I will be taking through the installation of pgAdmin 4 version 6.2 on CentOS 8

        pgAdmin 4 is a free and open-source management tool for Postgres. Its desktop runtime written in NWjs allows it to run standalone for individual users, or the web applications code may be directly deployed on a web server for use by the web browser.

        pgAdmin 4 is a complete rewrite of pgAdmin, built using Python and Java.

      • How to Update to MATE Desktop 1.26 on Ubuntu 21.04

        Ubuntu MATE is a more retrospective version of Ubuntu, one that largely lets you continue using Ubuntu in the way it functioned over a decade ago. But despite how things may look, updates do continue to roll out for the MATE desktop environment that is Ubuntu MATE’s namesake.

        The latest iteration is MATE 1.26. Here’s how you can update the MATE desktop in Ubuntu 21.04 to the latest version.

      • How to Change a Users Shell in Linux – Unixcop the Unix / Linux the admins deams

        In this tutorial, we will show you how to change the shell of a user in Linux.

        The shell is a program that accepts and interprets commands. there are several shells such as bash, sh, ksh, zsh, fish and many other lesser known shells available on Linux.

        Bash is a Unix shell and command language for the GNU Project as a free software replacement for the Bourne shell. First released in 1989,it has been used as the default login shell for most Linux distributions.

      • How to use shutdown command with examples – Unixcop the Unix / Linux the admins deams

        “Shutdown” refers to the process of stopping and shutting down a computer or server. This involves cutting the power to the main components of the system using a controlled process. Applications are closed, active processes and protocols are saved to the hard drive, device drivers are removed, and user settings are saved in the process.

        There are several options to do so, including scheduling a shutdown at a specific time, shutting down immediately, broadcasting a unique message, and so on.

      • How to Install MySQL Database on Ubuntu 20.04 | RoseHosting

        MySQL is an open-source relational database management system (RDBMS), it’s widely used and part of the popular LAMP/LEMP stacks. The data is organized in one or more tables in which the data types may be related to each other and MySQL uses SQL Structured Query Language to manage its data.

        Considering its part of the LAMP/LEMP stack it is used by many database-driven web applications such as WordPress, Magento, Drupal, and Joomla.

        Today we will install MySQL on our server and create a database and user with chosen permissions on this database, let’s get started!

      • How to install deepin 20.3 – Invidious

        In this video, I am going to show how to install deepin 20.3

    • Games

      • The Trials And Tribulations Of SLA Printing A Portable Wii Handheld | Hackaday

        The G-Boy kit revolutionized the subculture around building portable home consoles, allowing an entire Wii to be crammed into a form factor the size of a original Game Boy. [Chris Downing] is no stranger to the field, and sourced a G-Boy kit of his own to build it to the best of his abilities. (Video embedded after the break.)

        However, he wanted to step up above the FDM-printed parts of the original kit. Thus, he contacted the kit developer Gman, who provided him with the 3D model files so he could attempt a higher-quality SLA print himself. [Downing] had some experience with SLA printing in the past with the Form 2, but found some unique challenges on this build with the Form 3.

      • Announcing CrossOver 21.1.0

        Hi folks,

        I’m thrilled to announce that we have released CrossOver 21.1 for macOS, Linux and Chrome OS!

        In addition to a suite of fixes for a variety of applications, CrossOver 21.1 also includes some pretty cool enhancements. We’re very excited about them, and we hope you will be too.

        Our big reveal for this release is much-awaited support for Grand Theft Auto V (including GTA Online) on both macOS and Linux. Starting with CrossOver 21.1, you can now run Grand Theft Auto V via either the standalone Rockstar Games Launcher or Steam.

      • CrossOver 21.1 Released With GTA V Support, Restores Outlook 2016 & 365 Support – Phoronix

        CodeWeavers is kicking off the new week by releasing CrossOver 21.1 for Linux, macOS, and Chrome OS users wanting to enjoy Windows games and applications.

        CrossOver 21.1 finally has working Grand Theft Auto V support (GTA Online is working as well) for both Linux and macOS. GTA V could already work with Steam Play’s Proton but hadn’t worked with CrossOver or upstream Wine. This CrossOver support works both via Steam or the standalone Rockstar Games launcher.

        CrossOver 21.1 also has a number of macOS-specific improvements, including support for macOS 12 “Monterey” and getting more Windows games working nicely on macOS.

      • Ubisoft encourages fans to show interest in ‘Rainbow Six Siege’ Steam Deck support

        On November 20, a Rainbow Six Siege fan shared a post on the Ubisoft discussion board asking about the possibility of Proton support for the game when the Steam Deck releases, as it runs a Linux-based operating system.

        “Recently, Steam has announced that BattleEye will work with proton on an opt-in basis from game developers,” said Garlic_Kasparov. “R6: Siege is definitely a game I want to play, but unfortunately can’t as I use Linux. This thread is to express concern and voice support for enabling Proton support for R6 Siege as I would love to see it be done.”

        Proton is the compatibility layer that allows Windows games to be run on a Linux device, and as the Steam Deck is Linux-based, Siege and several other games won’t be able to run properly without Proton.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • Dockeye – New Graphical App to Manage Docker Containers / Images in Linux | UbuntuHandbook

          Running applications via Docker in Ubuntu Linux? Dockeye is a free open-source tool to manage your containers and images via a graphical user interface.

          Dockeye is written in Rust programming language. It provides a dark UI (light mode is also available) that list Docker containers and images in tabs. For each container, it provides options to control start, stop, pause, and remove operations.

          User may also check the detailed information about a container, including ID, image, maintainer, labels, environment, network info, CPU, Memory and other system resource usage. And, app running log is available in tab for debugging purpose.

    • Distributions

      • New Releases

        • NuTyX 21.10.5 available with cards 2.4.140

          The NuTyX team is happy to announce the new version of NuTyX 21.10.0 and cards 2.4.138.

          The xorg-server graphics server version 21.1.1, the Mesa 3D library in 21.2.5, Gtk4 4.4.0 and Qt 5.15.2.

          The python interpreters are en 3.10.0 et 2.7.18.

          The XFCE desktop environment is updated to version 4.16.

          The MATE desktop environment is a 1.26 version .

          The GNOME desktop environment is also updated to version 40.1.1

          The KDE desktop environment is available in Plasma 5.23.3, Framework 5.88.0 and applications in 21.08.3.

          Available browsers are: Firefox 94.0.2, Chromium 96.0.4664.45, Epiphany 40.3, etc

          Many desktop applications have been updated as well like Thunderbird 91.2.0, Scribus 1.5.7, Libreoffice, Gimp 2.10.28, etc.

      • SUSE/OpenSUSE

        • Adaro Energy optimizes business efficiency with SUSE Ed: SUSE is shilling SAP’s proprietary software as is typical]

          “The deployment of SAP S/4HANA on SLES for SAP Applications is an important step that provides real-time analytics for business insights throughout the enterprise, thereby aiding agile monitoring and decision making.” Eka Suharto Head of IT Adaro Energy.

        • SUSE joins the Graviton Launch | SUSE Communities

          AWS Graviton is an amazing technology. Custom built 64-bit Arm processors that helps to optimize price performance for a variety of cloud workloads running in Amazon EC2. Compared to general-purpose instances, Graviton delivers major cost savings for scale-out applications such as web servers, containerized microservices, data/log processing and much more.

      • IBM/Red Hat/Fedora

        • Workforce development – we’re leveling the playing field for good IT jobs

          I’m part of a grassroots team at Red Hat that came up with an idea to solve both problems at once. Introduced in August 2021, the Red Hat workforce development program allows colleges and universities to help non-degree seeking students, who may want to change careers, enter the IT industry via certification or get an IT certification.

        • How to build stronger teams in 2022: 10 must-read books | The Enterprisers Project

          The pandemic tested IT teams in entirely new ways and shed new light on the importance of taking care of employees’ very human needs in a difficult time. As former Best Buy CEO Hubert Joly recently wrote for the Harvard Business Review, that attention will shift to higher level needs like clarity, truth, connection, and growth.

          Leading and managing teams may take more nuance in this remade work environment, so we’re recommending ten books to help you build stronger teams for the days ahead, from better understanding (and even celebrating) the very human nature of teams to fostering high-performing teams in distributed environments to making the shift from team member to leader.

        • When the open source ecosystem thrives in the cloud: IT leader insights

          Software is eating the world and open source has become the default way to build software. Public cloud has accelerated the proliferation of open source technologies, and has led to an adjustment in both the enterprise procurement and monetization of software. After a few years of seismic realignment (the aftershocks are still reverberating through the ecosystem), we have reached a point where there are paths for software vendors to partner with or live in the marketplaces of the hyperscalers, says Jerry Chen, a venture capitalist at Greylock. Chen has a long history with open source – he was on the VMware team that made Cloud Foundry an open source project, and later funded Docker as a VC – and has written a series of articles called Castles in the Cloud. I recently spoke with him as part of Red Hat’s livestreaming show, In The Clouds.

        • Digital transformation: Are you working toward the right goals?

          For any digital transformation project to succeed, you need a well-laid-out road map, a clear objective, and bite-sized goals to mark the milestones. And it’s important to put those plans into action and measure their success against the pre-defined relevant metrics.

          The pandemic made the pace of digital transformation a key performance metric by making it urgent for enterprises to embrace and accelerate digital. Now it’s time to think beyond speed and measure the success of digital transformation against metrics that align with business goals.

          Here are five key digital transformation metrics that hold value for enterprises across industries.

        • Automating content management in Red Hat Satellite 6.9 with Red Hat Ansible Automation Platform: Planning the workflow

          There are hundreds of thousands of tasks required to administer a large fleet of servers. Automation can take some of the more mundane tasks off your plate. As an example, once you have built your Standard Operating Environment (SOE) and need to manage the care and feeding of it, you may want to run this through an automation pipeline to get the grunt work done while you are focused on more critical tasks.

          So let’s look at automating the initial publication of our monthly content in Red Hat Satellite.

        • Red Hat Developer roundup: Best of November 2021 | Red Hat Developer

          November brought a full plate of new features written by developers working at Red Hat, and we are here to share the harvest. Keep reading for some of our reader’s top picks and a few we really like, including updates for Red Hat Enterprise Linux 8.5 and Red Hat Enterprise Linux 9 Beta and developer guides to choosing your best Java garbage collector, building machine learning models in the cloud, bringing Kubernetes workloads to the edge, and so much more.

        • More Features Begin Lining Up For Fedora 36 – Phoronix

          With a few weeks having passed since the Fedora 35 debut, more feature work and planning around next spring’s Fedora 36 are underway.

          Already accepted for Fedora 36 are some of the usual package updates that come as little surprise for living on the bleeding-edge. Among those updates are the likes of Autoconf 2.71, Java OpenJDK 17 as the system JDK, PHP 8.1, OpenSSL 3.0, and others.

          Some of the planned changes for Fedora 36 include using DNS-over-TLS where supported, replacing FBDEV kernel drivers with SimpleDRM, DNF/RPM copy-on-write enablement for all variants when running on Btrfs, and more. This Wiki page continues tracking the Fedora 36 changes that have been approved by the Fedora Engineering and Steering Committee (FESCo).

      • Canonical/Ubuntu Family

        • Ubuntu Weekly Newsletter Issue 711

          Welcome to the Ubuntu Weekly Newsletter, Issue 711 for the week of November 21 – 27, 2021. The full version of this issue is available here.

        • Launch Ubuntu Desktop on Google Cloud

          This tutorial shows you how to set up a Ubuntu Desktop on Google Cloud. If you need a graphic interface to your virtual desktop on the cloud, this tutorial will teach you how to set up a desktop environment just like what you can get on your own computer.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Best 8 Open-source Email clients for Android

        An email client app is responsible for accessing your email messages on the server from your device.

        Mail clients are available for desktop, or can even come in a self-hosted web-based form, which the user can install and use on their own servers local or remote.

        We have covered self-hosted email client apps and open-source email servers in previous articles.

      • Create your own YouTube alike website with MediaCMS

        MediaCMS is released as an open-source project under AGPL-3.0 License.

      • The Apache Weekly News Round-up: week ending 26 November 2021

        We’re wrapping up another great week with the following activities from the Apache community…

      • Apache Month in Review: September 2021
      • SaaS/Back End/Databases

        • Top 13 Open-source SQLite Database clients and managers

          SQLite is an embedded lightweight database engine, first appeared 21 years ago and was released as an open-source project under the Public domain.

          It is widely used as a client-side database in the browser, for desktop applications, and mobile apps.

          Some web frameworks come with built-in support for SQLite, like Django (Python).

          SQLite is famously used by big enterprises like Adobe, Microsoft, Airbus, Apple, Google, and more.

          SQLite is part of Android and Google Chrome/ Chromium Web browsers.

        • PostgreSQL Weekly News – November 28, 2021

          Nordic PGDay 2022 will be held in Helsinki, Finland at the Hilton Helsinki Strand Hotel on March 22, 2022. The CfP is open through December 31, 2021 here

      • FSFE

        • Children‘s book published about software, skateboards, and raspberry ice cream

          Today, 29 November, O’Reilly Germany publishes the book “Ada & Zangemann – A fairy tale about software, skateboards and raspberry ice cream” written by FSFE President Matthias Kirschner and illustrated by Sandra Brandstätter, among other things, character designer for the series “Trudes Tier” from the show “Sendung mit der Maus”.

          The famous inventor Zangemann lives in a huge villa high above the city. Adults and children alike love his inventions and are desperate to have them. But then something happens: when Zangemann once again wants to take a close-up look at his inventions during a walk through the cityand with a loud thud, a child riding a skateboard hits him in the shin! Enraged, the inventor makes a momentous decision… The clever girl Ada sees through it all. Together with her friends, she forges a plan.

      • Programming/Development

        • Automating Mobile Games With A Robot Arm | Hackaday

          My Singing Monsters is one of those mobile titles that has users play simple games to earn coins and gems in the usual way. [Anykey] found that his son was a fan of the game, but that sometimes it felt a little rigged. Thus, rather than waste time playing themselves, he set up a robot to do the job for them.

        • Dima Kogan: GL_image_display

          I just spent an unspeakable number of days typing to produce something that sounds very un-impressive: an FLTK widget that can display an image. The docs and code live here. The big difference from the usual image-drawing widget is that this one uses OpenGL internally, so after the initial image load, the common operations (drawing, redrawing, panning and zooming) are very fast. I have high-resolution images in my projects, and this will make my tools much nicer.

        • Anyone can compile open source code in these three simple steps | Opensource.com

          There are many ways to install software, but you get an option not available elsewhere with open source:

        • Perl/Raku

          • Rakudo Weekly News: 2021.48 Raku at FOSDEM 2022

            Good news from the FOSDEM organizers: there will be an online Raku DevRoom at FOSDEM 2022. Please stay tuned for more information on how to make sure you can get a presentation in. And of course, this should not prevent you from submitting a presentation to any of the other tracks to spread the word of the Raku Programming Language. Such as the Declarative and Minimalistic Computing track to name but one example.

          • gfldex: Symmetric code

            While reading Arne`s solution for Challenge #140.2, I spotted a nested simple loop.

    • Standards/Consortia

      • But Think Of The (World Wide) Users! | Hackaday

        History is full of stories about technology that makes sense to the designer but doesn’t really fit the needs of the users. Take cake mixes. In 1929, a man named Duff realized that he could capitalize on surplus flour and molasses and created a cake mix. You simply added water to the dry mix and baked it to create a delicious cake. After World War II General Mills and Pillsbury also wanted to sell more flour so they started making cakes. But sales leveled out. A psychologist who was a pioneer in focus groups named Dichter had the answer: bakers didn’t feel like they were contributing to the creation of the cake. To get more emotional investment, the cake mixes would need to have real eggs added in. Actually, Duff had noticed the same thing in his 1933 patent.

        It is easy to imagine a bunch of food… scientists? Engineers? Designers?… whatever a person inventing flour mixes in the 1930s was called… sitting around thinking that making a mix that only requires water is a great thing. But the bakers didn’t like it. How often do we fail to account for users?

  • Leftovers

    • Hardware

      • Wireless LEDs Aren’t Really Magic | Hackaday

        [Atomic14] bought some wireless LEDs that receive power from a base station. They were very neatly packaged, but — we like it — he took one apart and made his own versions. They may not look as polished, but they work and they are undeniably cool.

        The LEDs work by receiving power from an induction coil. Once you have power, lighting up an LED is no big deal. Reverse engineering found the transmitter sends 217 kHz into a 2.2 mH inductor. A capacitor resonates the coil and drives the attached LED.

        Some experiments found that the circuit could supply about 2 mA -3 mA of current. [Atomic14] used two LEDs to get work out of each half of the AC waveform. He also dissects the transmitter, so you could roll your own there, too.

    • Integrity/Availability

      • Proprietary

        • How to Search DuckDuckGo From the Linux Terminal [Ed: MakeUseOf irresponsibly suggests to GNU/Linux users that they use surveillance site and Microsoft proxy to search things; as if it’s a geek’s tool; DuckDuckGo is an elaborate scam, a privacy fraud, an expensive ploy that poisons sites with bribes]
        • Security

          • The other victims of FluBot: How cybercriminals exploit WordPress to distribute malware

            Netcraft has to date identified nearly 10,000 websites used in the distribution of the FluBot family of Android malware. As detailed in our previous articles on FluBot, these sites are unwittingly hosting a PHP script that acts as a proxy to a further backend server, allowing otherwise legitimate sites to deliver Android malware to victims. When visited by the intended victim, a “lure” is displayed that implores them to download and install the FluBot malware.

            The most common lure themes are parcel delivery and voicemail messages, where the user is told to install the malicious app to track a parcel or listen to a voicemail message. One particularly interesting lure took advantage of FluBot’s infamy, by offering a fake “Android security update” that claimed to protect against the malware family. Users installing this “security update” would instead be infected with FluBot.

          • A masterclass in responding to vulnerability disclosure: The Buddi app and tracker | Pen Test Partners

            The Buddi tracker https://www.buddi.co.uk/ is used for tracking elderly and vulnerable people. It’s a GPS/GSM-based clip-on device that reports wearer position to an app via a platform. It means that the wearer can easily be found by their carer or the emergency services, should they become lost and unable to make their own way home. The device also features a panic button that automatically calls their carer and allows the wearer to speak to them.

            The device is popular in the care market, allowing the wearer a greater degree of independence and the ability to live independently for longer. The business behind Buddi has recently listed successfully on the UK AIM stock market (AIM:BIG), reflecting significant growth in the tracking markets in both UK and US.

          • Security updates for Monday

            Security updates have been issued by Debian (bluez, icu, libntlm, libvorbis, libvpx, opensc, roundcube, and tar), Fedora (kernel, kernel-headers, kernel-tools, puppet, slurm, stargz-snapshotter, and suricata), openSUSE (netcdf), Oracle (bluez, kernel, kernel-container, krb5, mailman:2.1, openssh, python3, and rpm), Red Hat (samba), and SUSE (xen).

          • Cyber Security Today, Nov. 29, 2021 – Ikea under phishing attack, evasive JavaScript loader discovered and malware found hiding in Linux calendars [Ed: Linux is a kernel, it does not do "calendars"]

            Ikea under phishing attack, evasive JavaScript loader discovered and malware found hiding in Linux calendars.

          • Awesome Linux Tools: Lynis from CISOfy – Invidious

            In this episode of Awesome Linux Tools, the spotlight is on Lynis – a really awesome utility you can use to get a better understanding of the overall security hygiene of your server. In this video, Jay will show you how to install it, and also how to run an audit.

          • CronRat Magecart malware uses 31st February date to remain undetected | IT PRO

            Security researchers have discovered a Linux-based remote access trojan (RAT) that uses an unusual stealth technique to remain out of sight from security products.

            The malware, dubbed CronRat, hides in the calendar subsystem of Linux servers (“cron”) on a non-existent day, 31 February, according to a blog post by security researchers at Sansec.

          • Privacy/Surveillance

            • Personal data bill not enough to protect citizens’ rights: Advocacy group | Business Standard News

              A proposed legislation does not prioritise the rights of Indians over their data in the public and has instead expanded to areas beyond its ambit and without sufficient consultation, senior executives at digital rights organisation Access Now have said.

              The Personal Data Protection (PDP) legislation–in the making since 2018—will be tabled in Parliament’s Winter Session beginning Monday. Reports and dissent notes filed by the members of the Joint Parliamentary Committee (JPC) deliberating the Bill suggest several changes from its initial draft in 2019. Social media seems to have been included in the legislation.

              “Based on the reports so far and the details shared by MPs involved in the process, it is clear that this is not currently the Privacy and Data Protection law that India needs. The current draft does not adequately protect people’s right to privacy and autonomy or enable strict accountability, particularly from the government,” said Raman Jit Singh Chima, Asia Pacific Policy Director and Senior International Counsel, and Namrata Maheshwari, Asia Pacific Policy Counsel, at Access Now.

    • Defence/Aggression

      • NSO blacklisting: It is time for the US to end its Cold War ways | Privacy | Al Jazeera

        On November 3, the United States Department of Commerce announced it was blacklisting the Israeli technology firm, NSO Group. The decision to add the company to a list of entities engaging in activities contrary to US national security or foreign policy interests was momentous.

        In its press release on the subject, the commerce department noted: “[there is] evidence that these entities developed and supplied spyware to foreign governments that used these tools to maliciously target government officials, journalists, businesspeople, activists, academics, and embassy workers. These tools have also enabled foreign governments to conduct transnational repression, which is the practice of authoritarian governments targeting dissidents, journalists and activists outside of their sovereign borders to silence dissent. Such practices threaten the rules-based international order.”

    • Misinformation/Disinformation

      • India’s parliamentary panel calls for a regulator for Facebook, Twitter, South Asia News & Top Stories – The Straits Times

        An Indian parliamentary panel has recommended setting up a regulator to oversee social media companies including Facebook (now known as Meta) and Twitter, and make them liable for posts by unverified accounts.

        The recommendation comes as Facebook is facing scrutiny over its role in the 2020 Delhi riots, even as new allegations emerge about the company’s troubles in its largest market.

        The high-level parliamentary committee made those recommendations on Monday, asking for tighter rules to treat them as publishers, and for personal data to come under better protection, Bloomberg reported.

    • Digital Restrictions (DRM)

      • Samsung Bricks Smart TVs

        Earlier this Fall, a Samsung warehouse in South Africa was robbed and the thieves got away with a quantity of smart televisions. Samsung proceeded to implement a little-known feature called “TV Block” which is installed on all of their TV products. The serial numbers of the stolen TV sets are flagged in their servers, and if one of these sets tries to connect the internet in the future, it will recognize that it is stolen and proceed to brick itself, disabling all television functionality.

        So while this real-life scenario makes sense, it is a bit alarming to realize the implication of such a feature — the manufacturer can reach into your TV and disable it from afar. One can assume that Samsung won’t abuse this capability, because acting otherwise would harm their reputation. In a press release, Samsung announced that any consumers whose sets were incorrectly bricked can have their sets un-bricked after demonstrating proper ownership.

Links 29/11/2021: FWUPD’s ‘Best Known Configuration’ and Glimpse at OpenZFS 3.0

Posted in News Roundup at 12:50 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • 9to5Linux Weekly Roundup: November 28th, 2021

      This week has been full of great releases, despite the fact that it was Thanksgiving week in the US. We managed to test drive the MX Linux 21 AHS edition, new Deepin Linux, Alpine Linux, Endless OS, IPFire, and Clonezilla Live versions, as well as to update our VirtualBox, LibreOffice, Tux Paint, and Proton installs.

      On top of that, this week brought us a new Linux laptop from TUXEDO Computers targeted at business users. You can enjoy these and much more in 9to5Linux’s Linux weekly roundup for November 28th, 2021, below! Don’t forget to also check out our YouTube channel for the latest reviews.

    • Audiocasts/Shows

    • Kernel Space

      • Kernel prepatch 5.16-rc3 [LWN.net]

        The 5.16-rc3 kernel prepatch is out for testing. “So rc3 is usually a bit larger than rc2 just because people had some time to start finding things. So too this time, although it’s not like this is a particularly big rc3.”

      • Bootlin contributions to Linux 5.14 and 5.15

        It’s been a while we haven’t posted about Bootlin contributions to the Linux kernel, and in fact missed both the Linux 5.14 and Linux 5.15 releases, which we will cover in this blog post.

        Linux 5.14 was released on August 29, 2021. The usual KernelNewbies.org page and the LWN articles on the merge window (part 1 and part 2) provide the best summaries of the new features and hardware support offered by this release.

      • Richard Hughes: Firmware “Best Known Configuration” in fwupd

        I’ve just deployed some new functionality to the LVFS adding support for component <tag>s. These are used by server vendors to identify a known-working (or commercially supported) set of firmware on the machine. This is currently opt-in for each vendor to avoid the UI clutter on the components view, and so if you’re a vendor reading this post and realize you want this feature, let me know and it’s two clicks on the admin panel.

      • FWUPD Linux Firmware Updater Prepares “Best Known Configuration” Feature – Phoronix

        The Linux Vendor Firmware Service (LVFS) and FWUPD on their great upward trajectory has in recent times been expanding beyond their initial focus of desktop/laptop hardware to supporting more server platforms for firmware updating. The latest feature driven by their growing server interests is “best known configuration” handling for where there are multiple independently-versioned firmware packages for a given system and may be support recommendations or potential version conflicts between the the different firmware packages.

      • OpenZFS 3.0 Introduced at Developer Summit

        The ninth annual OpenZFS Developer Summit took place November 8th and 9th online with iXsystems proudly returning as a Gold sponsor. The OpenZFS community remains vibrant and is continuing to develop features at a rapid pace. This blog summarizes some of the more interesting talks.

    • Benchmarks

      • Amazon Linux 2022 Benchmarks – Offers Competitive Performance Against Ubuntu, CentOS

        Last week Amazon Web Services released Amazon Linux 2022 in preview form and since then I’ve been trying out their new cloud-optimized Linux distribution. It’s been working out well on AWS (to no surprise) but also great was the level of performance provided by this now-Fedora-based distribution.

        Amazon Linux 2022 transitions to being a Fedora-based Linux distribution that AWS intends to support for at least the next five years. Amazon Linux to this point had been based on a combination of RHEL and Fedora packages. Besides shifting the package base to Fedora, AWS engineers have adjusted various defaults of the distribution, employed extra kernel hardening, other package updates/changes, forthcoming kernel live patching, and other alterations in the name of security and AWS performance.

    • Applications

      • Best Free and Open Source Alternatives to Apple Photos

        In 2020, Apple began the Apple silicon transition, using self-designed, 64-bit ARM-based Apple M1 processors on new Mac computers. Maybe it’s the perfect time to move away from the proprietary world of Apple, and embrace the open source Linux scene.

        Apple Photos is a photo management and editing application. It lets you organize your collection into albums, or keep your photos organized automatically with smart albums.

        What are the best free and open source alternatives?

    • Instructionals/Technical

      • How To Install Apache Server on Fedora 35 – idroot

        In this tutorial, we will show you how to install Apache Server on Fedora 35. For those of you who didn’t know, Apache HTTP is a popular web server for Linux servers. It is a free cross-platform web server that is supported on various operating systems. Developers prefer Apache for its speed, security, reliability, robustness, and ease of customization. In addition, Apache is able to meet the needs of many environments as it allows the installation of various extensions and modules.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Apache webserver on a Fedora 35.

      • How To Easily Set Up Secure OTA Firmware Updates On ESP32 | Hackaday

        Fortunately, over-the-air (OTA) firmware updates are a thing, allowing embedded devices to be reprogrammed over their wireless data connection instead of with a physical hardware device. Security is of course a concern, and thankfully [Refik] explains how to set up a basic framework so that ESP32 OTA updates can happen securely, allowing one to deploy devices and still push OTA updates in confidence.

        [Refik] begins by setting up a web server using Ubuntu Linux, and sets up HTTPS using a free SSL certificate from Let’s Encrypt, but a self-signed SSL certificate is also an option. Once that is done, the necessary fundamentals are in place to support deploying OTA updates in a secure manner. A bit more configuration, and the rest is up to the IoT devices themselves. [Refik] explains how to set things up using the esp32FOTA library, but we’ve also seen other ways to make OTA simple to use.

      • How To Install UVdesk on Debian 11 – idroot

        In this tutorial, we will show you how to install UVdesk on Debian 11. For those of you who didn’t know, UVdesk is a free, open-source, and SaaS-based helpdesk solution for any business process to deliver the best customer service. It is a simple, flexible, user-friendly, and alternative to other popular support platforms. Uvdesk supports Enterprise service desk features like workflow, Email piping, knowledgebase, Mailbox, Ecommerce and Multichannel Integration.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the UVdesk helpdesk system on a Debian 11 (Bullseye).

      • How to Copy Files Between Kubernetes Pods and Your Machine – CloudSavvy IT

        Containers running in Kubernetes Pods are meant to be self-contained compute units that you don’t need to manually interact with. Sometimes you might have to copy files to or from a Pod’s filesystem though, perhaps because you’re debugging a problem and want to archive logs, config files, or caches stored in a container.

        Here’s how to move files between your machine and containers in a Pod, using Kubectl’s built-in transfer feature or a manual alternative.

      • How to Install Firefox Next (Beta) or Firefox Quantum (Nightly) on Linux Mint – LinuxCapable

        Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation. Firefox utilizes the Gecko rendering engine to display web pages, which implements current and future anticipated web formats and standards.

        For the most part, Firefox is often up to date with the latest stable release on Linux Mint and Ubuntu-based desktops, however non-stable builds such as beta or the more bleeding edge nightly builds can be installed tested the new features or test your websites before its hits the stable repository.

        For the most part, the beta build is what curious users should be installing, and the nightly build should never be used by anyone other than sysadmins or developers looking to test a particular feature.

        In the tutorial, you will learn how to add and install the beta and nightly build for Firefox using a PPA maintained by the Mozilla team.

      • How to Install Grafana 8 on Ubuntu 20.04

        Grafana is a tool for monitoring, analysis, and visualization of real-time system data. From a series of data collected, we will obtain a graphical panorama of the situation of a company or organization. It generates graphs and dashboards from a time-series database (Graphite, InfluxDB, or OpenTSDB). It also allows you to share them as snapshots with other users.

      • How to Repair File System Errors in Debian Based Systems

        In Linux, using heavy hardware components can be checked and recovered. Specifically, on Ubuntu and Debian systems, finding out the hard-disk bad sectors is easy. Once your hard disk or drive gets some bad sectors or gets corrupted, it gets spread day by day. On Ubuntu and other Debian Linux machines, you can use a few tools or commands to find out the file system errors and repair the errors. Not fixing errors or bad sectors might make your system boot slower and can also affect initialization.

      • How to Securely Transfer Files between Ubuntu Systems Using Croc – VITUX

        Croc is an open-source CLI-based tool that allows to securely transfer files between systems. During file transfer, a code is generated for the sender and the receiver systems to use for end-to-end encryption. Whether the sender and receiver are on the same network or the different networks, Croc can easily and quickly transfer files between them without the need for port forwarding. Croc can be installed and used on Linux, Windows, and MacOS, allowing you to share files between different operating systems.

        In today’s tutorial, we will install Croc to securely transfer files between Ubuntu systems. To install Croc on Ubuntu, you should have root or sudo privileges.

        Note: The procedure has been demonstrated on Ubuntu OS. You can use the same installation procedure for Debian OS.

      • How to Set or Change Hostname in Linux System

        Hostname is the label of a system or in other words it is a human readable name of a system, after setting up the hostname of the device then it becomes easy to manage and access based on their label or hostname.

      • How to Setup SSH Login Without Password

        In this article I will show you how to setup SSH login without passwords in a Linux operating system by using key-based authentication.

        SSH is used to remotely log into servers for running the commands and programs. However, sometimes you might want or even need to automatically log in to an SSH server without entering your username and password.

        The two most popular mechanisms to log into remote systems via SSH are password-based authentication and key-based authentication.

        Username and password combination is the most common authentication method for SSH and is a suitable method for most people. But if you regularly use SSH to connect to remote servers, the key-based authentication method is best for you.

        So, can you SSH without a password? In short, yes! Here’s how to do it.

      • How to create a VPC Peering between 2 VPCs on AWS

        A VPC peering connection is a connection between two VPCs that enables you to route traffic between them. We can create a VPC peering connection between our VPCs, or with a VPC in another AWS account. The VPCs can also be in different regions.

        We can peer the VPCs across accounts to create a network filesystem and we can also use a VPC peering connection to allow other VPCs to access resources we have in one of our VPCs.

      • How to install Travis CI on Ubuntu 20.04 – NextGenTips

        In this tutorial, I am going to take you through the installation of Travis CI on UIbuntu 20.04.

        Travis CI is a hosted continuous integration service used to build and test software projects hosted on Github and Bitbucket. Travis CI provided services to Open-source projects for free.

        Travis CI enables teams to test and ship apps with confidence. You can easily sync your projects with Travis CI. Travis CI automatically detects when a commit is made and pushed to the GitHub repository that is using Travis CI, and each time this happens, it will try to build the project and run tests.

      • How to list all running & stopped Docker containers – Linux Shout

        Docker is the popular platform to run container virtual machines using the pre-built app images. The installation and its usage are pretty simple, yet, if you are new to it and want to know how to list all the created or stopped Docker containers to delete or manage them easily. Then here are the commands to follow.

      • How to monitor domain expiry date using shell script in Linux

        The shell is an interface that helps users to operate the system through different commands, scripts, and utilities provided by Linux and Unix-based operating systems.

        For most of the Linux distros, Bash shell is the popular and default shell. You can identify your current shell using the following command.

      • Getting access to somebody else’s Ansible Galaxy namespace | die-welt.net

        TL;DR: adding features after the fact is hard, normalizing names is hard, it’s patched, carry on.

        I promise, the longer version is more interesting and fun to read!

        Recently, I was poking around Ansible Galaxy and almost accidentally got access to someone else’s namespace. I was actually looking for something completely different, but accidental finds are the best ones!

      • Fedora Magazine: Use Diffoscope in packager workflows

        In the role of a packager, updating packages is a recurring task. For some projects, a packager is involved in upstream maintenance, or well written release notes make it easy to figure out what changed between the releases. This isn’t always the case, for instance with some small project maintained by one or two people somewhere on github, and it can be useful to verify what exactly changed. Diffoscope can help determine the changes between package releases.

        Diffoscope is a “smart binary diff” tool that was born in the Reproducible Builds project in Debian, which is also available in Fedora. It “knows” about various types of text and binary formats, and will try to recursively unpack and compare two blobs. In particular it knows that some objects need to be decompressed before comparing, that archives need to be unpacked, and how to deconstruct binary objects like ELF programs and libraries, Java .jar files, Windows .cab files, etc.

      • A Step-By-Step Guide to Installing Xubuntu 20.04 Linux

        Xubuntu is a popular lightweight Linux distribution that is based on Ubuntu. It ships with an Xfce desktop environment which is light, stable, and highly configurable.

        Being a lightweight distribution, Xubuntu is a perfect choice for users who are running modern PCs with low RAM and CPU resources. It also works quite well on older hardware.

      • How to Install PostgreSQL 14 in Ubuntu 20.04

        There are specific database software attributes that make PostgreSQL stand out against other database platforms. The first and obvious attribute is its open-source nature.

        This PostgreSQL trait puts it on continuous developmental milestones. Both its community and developers seek to evolve PostgreSQL into an enterprise-class performing software.

        Existing PostgreSQL community platforms help users deal with emerging bugs, and also understand its various functionalities and use cases.

        Other PostgreSQL strengths are in its unique functions like Store Procedure, Diverse Indexing Techniques, Flexible Full-text search, Diversified Extension Functions, and Diverse kind of Replication.

      • How to upload an ISO image to the Proxmox Server – Unixcop the Unix / Linux the admins deams

        Hello, friends. We have already shown you how to install Proxmox and we noticed that the process is easier than you might think. Now I will show you how to upload an ISO image to the Proxmox server. To do this, I will use the graphical method or through the terminal.

        With Proxmox we will be able to virtualize systems professionally and to do many things more like cluster, backups, and others. However, to start with the virtualization we have to have an ISO image of the system.

        So, with a server that is far away from our location, how to do it? How to have the ISO image on the server so that Proxmox can manage it? Well, that’s what I will show you today.

        Let’s go for it.

      • How to install FreeOffice 2021 on Ubuntu 20.04 Linux – Linux Shout

        One of the best free alternatives to Microsoft Office is FreeOffice, developed by a German software company- SoftMaker. Recently, they have upgraded their Office suite to version 21. And here we learn the steps to install FreeOffice 2021 version on Ubuntu 20.04 Linux using the command terminal.

        This free office suite is a part of the commercial one from the same developers known as SoftMaker Office 21 (also available for Linux), of course, the premium will have more features but that doesn’t mean the free version- FreeOffice 2021 deprives to full fill all daily office documents (MS-Word alternative) related requirements. It offers a Microsoft office ribbon-like interface and three modules- TextMaker 21 to create documents; PlanMaker 21 to create sheets (Excel alternative) and Presentations 21 for making slides like MS-Powerpoint.

      • How to verify checksum on Linux | FOSS Linux

        A checksum is small-sized data obtained from a block of digital data used to detect errors. The checksum value uses a transmission message to represent bit numbers. Extensively, it has been used and still is in use by IT experts to detect high-level errors that might happen during data transmission. Before transmission, every bit of data is assigned a checksum value after running a cryptographic hash function.

        Checksum sometimes is termed as a hash sum or hash value. It is a long data string that contains various numbers and letters. They work by providing the receiving end information about the data transmission to deliver the full range of data. Checksum acts as a fingerprint for files since it contains a long string of numbers and letters. It aids in obtaining the number of bits included in a transmission.

        Suppose the checksum value calculated by the end-user is slightly different from the original checksum value of the file. In that case, it alerts all parties involved in the transmission that a third party corrupted the file. The receiver can then investigate what went wrong or try re-downloading the file. Standard protocols used to determine checksum numbers are the transmission control protocol (TCP) and the user diagram protocol (UDP). TCP is more reliable for tracking transmitted packets of data, but UDP may be beneficial to avoid slowing down transmission time.

      • How to create and extract cpio archives on Linux Examples

        Although the cpio archiving utility is nowadays used less than other archiving tools like tar, it is still good to know how it works, since it is still used, for example, to create initramfs images on Linux and for rpm packages, which are used mainly in the Red Hat family of distributions. In this tutorial we see how to create and extract cpio archives using the GNU cpio utility, and how to obtain a list of the files they contain.

      • How to hash passwords on Linux

        Passwords should never be stored as plain text. Whether we are talking about a web application or an operating system, they should always be in hash form (on Linux, for example, hashed passwords are stored in the /etc/shadow file). Hashing is the process through which, by the use of some complex algorithms, a password is turned into a different string. Such process is one-way: there is no way to revert an hashed password to its original, plain text form. Hashing often involves the use of random data as additional input for the hash algorithm, so that the same password, hashed two times, doesn’t produce the same result. This random data is called salt. In this tutorial we explore some methods we can use to hash passwords on Linux.

      • A Decade with Jekyll

        Today I’d like to look back on my experience with Jekyll, the static site generator (SSG) that I’m using to publish this site and my other blogs Meta Redux and Emacs Redux. Back in the day Jekyll was a trend-setter – it basically defined the SSG category and every subsequent tool in it was compared to Jekyll. A lot has happened since 2011: [...]

      • ZFS Storage pool layout: VDEVs

        The storage pool of ZFS constitutes one or more virtual devices that are, in general, called vdevs. A Vdev is either a single disk, or two or more disks which mirrors each other, or a group of disks that organizes together. The RAID layout sets on each vdev as opposed to the storage pool. Similarly, data that is present in the storage pool strips across all vdevs which also means that the loss of one vdev would result in pool failure.

      • [Old] The Basic Guide to Working with ZFS

        RAID-Z1 replaces RAID5 in a traditional setup. Performance is pretty equivalent, but the benefit is in some of the features. As mentioned before, you get healing or at least detection of bit rot or a bad sector, it’s a lot easier to set up with mixed drives, etc. RAID-Z2 (equivalent to RAID6) performs better from my experience than any traditional RAID6 setup I’ve used with equivalent drives on an equivalent machine.

    • Desktop Environments/WMs

      • Top 15 Window Managers for Linux

        A window manager is a software responsible for the placement and appearance of windows of various applications. It allows you to use any number of displays and utilize the screen to its full potential. The advantage is that it increases your productivity and improves your multitasking experience. But what exactly can one do with a window manager?

        The article describes some of the best floating and tiling window managers available for Linux.

      • K Desktop Environment/KDE SC/Qt

        • Kalendar Beta v0.3.0 Introduces a Windows Version Along With Essential Improvements

          Kalendar is KDE’s open-source calendar app that is still in development as of now. It could potentially replace the calendar that you get with KOrganizer.

          There have been a few beta releases already. But, with the 0.3.0 beta release, it looks like the Kalendar app might be gearing up to add essential features while heading to its v1.0 release.

          Furthermore, an exciting development follows—a Windows version is also available?

          Let us take a look at it.

    • Distributions

      • Reviews

        • Endless OS Review – Desktop Linux Done Right for the Masses

          We review the popular Endless OS as Linux Desktop with the new features and updates of the latest version 4.0. 

        • Review: LockBox 1.0

          LockBox is one of the most recent additions to the DistroWatch database. LockBox (sometimes referred to as LBX) is a Linux distribution derived from Ubuntu and elementary OS. It is especially intended for storing and managing cryptocurrencies. It includes several hardened configuration changes for security purposes, a highly restrictive firewall setup, several applications designed for data backups, a password manager, and the Brave Internet browser. LockBox is available for x86_64 machines exclusively and its install media is 3.4GB in size.

          In a curious case of life imitating art, the LockBox website currently describes the project using a quote from the DistroWatch information page about the distribution.

          One of the first things I discovered about the distribution is LockBox will not boot in Legacy BIOS mode. A boot menu will appear and begin a countdown from five seconds. When the countdown reaches zero, or when we select any of the boot options, the counter simply resets to five seconds again. The boot menu offers to let us “Try or install elementary OS” or “Check disks for defects” and both options simply reset the boot menu counter. When trying to launch the distribution in UEFI mode, only the Try/Install option is presented and choosing it boots the distribution’s live environment.

          When the live system boots we are shown a graphical window where we can choose our preferred language from a list. We are given the choice to try the live desktop, which loads the Pantheon desktop. Alternatively we can launch the system installer. I’ll talk about the Pantheon desktop later in this review.

      • Canonical/Ubuntu Family

        • How Ubuntu Boosts Developer Desktop Productivity | Ubuntu

          Seventeen years after its first release, Ubuntu is firmly established as the Linux developer desktop of choice around the world. From education through to enterprise, Ubuntu delivers the tools developers need to succeed across their careers. In this blog, we will cover the main aspects that contribute to this success.


          Developers start their careers with Ubuntu, and 69% of student developers reported that they prefer Ubuntu as an OS. It’s not surprising. With Ubuntu, they gain access to the best of open source, including AI/ML frameworks, such as Pytorch and TensorFlow, ROS for robotics and LXD and multipass for virtualisation. Open source technology is now a critical part of any enterprise, and familiarity with open source is a key consideration in hiring.

          As a result, getting new developers onboarded and productive quickly is easier with Ubuntu. It’s a system they’re familiar with. It’s flexible and customisable. And, as an operating system, it spans both the workstation and the cloud, providing a consistent development experience across your technology stack.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • Mozilla Privacy Blog: Mozilla files comments on UK Data Protection Consultation

            Mozilla recently submitted its comments to a public consultation on reforming the UK’s data protection regime launched by the UK Department for Digital, Culture, Media & Sport. With the public consultation, titled ‘Data: A New Direction’, the UK government set out to re-evaluate the UK’s approach to data protection after no longer being bound by the bloc’s General Data Protection Regulation (GDPR). We took this opportunity to share our thoughts on data stewardship and the role effective regulation can play in addressing the lopsided power dynamics between large data collectors and users.

            For Mozilla, privacy is not optional. It is an integral aspect of our Manifesto, which states that individuals’ security and privacy on the internet are fundamental and must not be treated as optional. This is why privacy is at the core of our product work and why we have long promoted robust data protection in our policy and advocacy work. Further, Mozilla’s Data Futures Lab is exploring alternative approaches to data governance and promoting data stewardship through original research and support to builders.

      • SaaS/Back End/Databases

        • 42 things I learned from building a production database

          In 2017, I went to Facebook on a sabbatical from my faculty position at Yale. I created a team to build a storage system called Delos at the bottom of the Facebook stack (think of it as Facebook’s version of Chubby). We hit production with a 3-person team in less than a year; and subsequently scaled the team to 30+ engineers spanning multiple sub-teams. In the four years that I led the team (until Spring 2021), we did not experience a single severe outage (nothing higher than a SEV3). The Delos design is well-documented in two academic papers (in OSDI 2020 and SOSP 2021). Delos is currently replacing all uses of ZooKeeper at Facebook.

          Here are some of the things I learned as the tech lead for Delos. My intent in publishing this is to help others in similar roles (leading teams that are building new infra at large companies); much of it may not generalize to different settings.

  • Leftovers

    • A Film for Our Time

      What hype? “We’re just doing our job.” What job? Terrorizing an old man because he lives in a NY tenement, and says no? They imagine lurid crimes occurring behind all the cheap slum doors with their many locks and sheet-steel façade reinforcements. It took the cops 40 minutes to break in, to finally invade the apartment of a low income retired black former Marine whose only need for attention was a heart condition. And shoot him to death.

      The name of the film is “The Killing of Kenneth Chamberlain” [Directed by David Midell, Produced by Morgan Freeman and Lori McCreary]. It is about an incident, correctly represented in the film’s title, which occurred in White Plains, NY, on November 19, 2011. You can watch it on YouTube. It has won many film festival awards.

    • YouTube Comments Discontinuation

      I have disabled the ability for people to comment on my YouTube videos directly on YouTube and the rest of this will explain why. If you want to contact me, please email me at [email protected] or any of the other contact methods listed at christine.website/contact.

    • Health/Nutrition/Agriculture

      • Pain Machine

        The American health care system is a notorious disaster. On the one hand, even “good” private employer-based insurance is often a nightmare to actually use, while tens of millions of people have much worse coverage or none at all. At the same time, our system is also incredibly expensive—eating up 17 percent of the US gross domestic product, or nearly twice what peer rich nations spend on average.

      • WHO, South Africa Urge Nations to Lift ‘Naive’ Omicron Travel Bans

        The World Health Organization on Sunday echoed calls by South Africa’s president for countries to eschew travel bans targeting southern Africans amid the spread of the heavily mutated Omicron variant of the coronavirus.

        “The cat’s already out of the bag, so to speak.”

      • Instead of Travel Bans, Let’s Defeat Omicron Variant With Global Vaccination
    • Integrity/Availability

      • Proprietary

        • Israel and Iran Broaden Cyberwar to Attack Civilian Targets

          The latest attacks are thought to be the first to do widespread harm to large numbers of civilians. Nondefense computer networks are generally less secure than those tied to state security assets.

          No one died in these attacks, but if their goal was to create chaos, anger, and emotional distress on a large scale, they succeeded wildly.

        • Security

          • Privacy/Surveillance

            • [Old] GDMR: this one simple regulation could end surveillance capitalism in the EU

              No, you didn’t misread it and, no, it’s not a typo. GDMR – the General Data Minimisation Regulation – can end surveillance capitalism in the EU.

              The problem is that no such regulation exists.

              So, let’s change that, starting now.

            • [Old] International coalition calls for action against surveillance-based advertising

              In a new report, the Norwegian Consumer Council (NCC) sheds light on the negative consequences that this commercial surveillance has on consumers and society. Together with 55 organizations and more than 20 experts, NCC is asking authorities on both sides of the Atlantic to consider a ban. In Europe, the upcoming Digital Services Act can lay the legal framework to do so. In the US, legislators should seize the opportunity to enact comprehensive privacy legislation that protects consumers.

            • One year of #ProjectPanoptic

              IFF’s Project Panoptic was launched on November 27, 2020 to track and raise public awareness around the rapid proliferation of facial recognition technology (FRT) in India. In this post, we take a look at what we have been able to achieve in the one year since as well as how we aim to take this project forward.

    • Defence/Aggression

      • Opinion | The US Military Does Not Truly Care About Civilian Casualties

        So far, the Democratic-led Senate Armed Services Committee has refused to open an investigation into the Baghuz attack or any other possible war crimes by U.S. forces in the war against ISIS.

      • The White Supremacy Lie: The Rittenhouse Trial and Rightwing Media Fabrication
      • EU Joins Rights Group in Condemning Israel’s ‘Day of Destruction’ of Palestinian Homes

        The European Union on Friday joined a prominent Israeli human rights group in condemning last week’s demolition of multiple homes in occupied East Jerusalem, an illegal action that displaced 22 Palestinians including 15 children.

        “We reiterate our call to halt demolitions and any other unlawful practices that coerce Palestinians out of their homes,” the European Union Delegation to the Palestinians (DPAL) tweeted.

      • Opinion | Death in Texas

        Texas once again demonstrates that it can show the rest of the country the way and is now doing so at considerable expense to itself, by arguing a death penalty case in the United States Supreme Court.

      • US Islamist Groups Call for ‘Lady al-Qaeda’ to Be Set Free

        The Council on American Islamic Relations (CAIR), American Muslims for Palestine (AMP), the Islamic Circle of North America (ICNA), and the Muslim American Society (MAS) all have their foundings linked inseparably with militant Islamic ideologies. For CAIR and AMP it was Hamas, ICNA, Jamaat-e-Islami, and MAS, the Muslim Brotherhood. This month, not unlike numerous occasions in the past, the four have come out in support of terror. This time, it is to call for the freedom of female al-Qaeda operative Aafia Siddiqui, who was convicted for attempted murder of US officers in Afghanistan. The agenda of these four groups could not be any clearer.

      • Over 137,000 People, 100 Security Agents Have Been Killed By Fulani Herdsmen In Benue—Governor Ortom

        It also decried its involvement in the arrest and incarceration of Yoruba Nation agitator, Sunday Igboho in Benin Republic, while failing to arrest bandits and herdsmen whom he said no longer wear masks when they kidnap and kill innocent Nigerians.

        The governor also lamented that about 137,000 residents and over 100 security personnel have been killed by ravaging bandits in Benue State.

        Ortom revealed this while briefing journalists in a video clip obtained by SaharaReporters on Wednesday.

    • Environment

      • Opinion | This Is How Amazon Is Fueling the Climate Crisis

        One benefit that Amazon has provided society with is a reduction in shopping-related violence. The once legendary fights over low-priced electrical items have moved online, and the fight is now between who has the fastest fingers and the fastest internet connection. Black Friday, however, continues to supercharge an already hyper-consumerist society and push us closer to climate breakdown. Extinction Rebellion (XR) decided to call out the major online retailer on its most profitable day by blocking fifteen fulfillment centers in the UK, Germany, and the Netherlands. The fulfillment centers blockaded account for 50% of Amazon deliveries in the UK. In all, more than thirty arrests were made as the environmental group brought attention to Amazon’s wasteful business practices, tax avoidance and worker exploitation.

      • Energy

    • Finance

    • AstroTurf/Lobbying/Politics

      • Trump Has Already Laid the Groundwork to Subvert the 2024 Election
      • Uber Survived the Spying Scandal. Their Careers Didn’t.

        The men who gathered intelligence for Uber were supposed to be ghosts. For years, they were un-Googleable sentries, quietly informing executives about the actions of competitors, opponents and disgruntled employees. But the secrecy of the tightknit team ended abruptly in 2017 when one of its members turned on the others, accusing them of stealing trade secrets, wiretapping and destroying evidence.

        They flouted the law while carrying out Uber’s dirtiest missions, their former co-worker, Richard Jacobs, claimed in an April 2017 email sent to top Uber executives. His lawyer followed up with a letter that said the team went so far as to hack foreign governments and wiretap Uber’s own employees.

      • Huge fines and a ban on default passwords in new UK law

        Recent research from consumer watchdog Which? suggested homes filled with smart devices could be exposed to more than 12,000 attacks in a single week.

        Default passwords for internet-connected devices will be banned, and firms which do not comply will face huge fines.

    • Misinformation/Disinformation

    • Civil Rights/Policing

      • Iran: Release arbitrarily detained rights activist at imminent risk of flogging

        Narges Mohammadi is the vice president of the Centre for Human Rights Defenders in Iran and worked with the Campaign for Step-by-Step Abolition of the Death Penalty (known as Legam, its Persian acronym). Following the November 2019 nationwide protests and unlawful killing of hundreds of protesters, Narges Mohammadi vocally supported bereaved family members seeking truth and justice for their loved ones’ killings.

        In May 2021, Branch 1188 of Criminal Court Two in Tehran sentenced Narges Mohammadi to two-and-a-half years in prison, 80 lashes and two separate fines for charges that include “spreading propaganda against the system.” Four months later, in September, Narges Mohammadi received a summons to begin serving this sentence, but she did not respond as she considered the conviction unjust.

      • Jailed Iranian Rights Defender At ‘Imminent Risk’ Of Flogging, Amnesty Warns

        Amnesty International is calling on the Iranian authorities to immediately release prominent human rights defender Narges Mohammadi, who it said is at imminent risk of receiving 80 lashes following her arrest earlier this week.

        The London-based human rights watchdog said on November 18 that Mohammadi was arbitrary arrested in the city of Karaj, west of Tehran, two days earlier while attending a memorial for a man killed by Iranian security forces during nationwide protests in November 2019.

      • [Old] EU condemns Iran sentence, lashes for rights campaigner

        The new charges against Mohammadi include “propaganda against the system,” defamation and rebellious conduct while incarcerated. She had issued a statement against the death penalty and alleged torture and harassment while in prison, which the Etemad newspaper reported.

    • Monopolies

      • EU Companies File Formal Complaint Against Microsoft, Fight For A Level Playing Field – TFiR

        In a repeat from earlier monopolistic actions, Microsoft is bundling its OneDrive, Teams and other services with Windows and aggressively pushing consumers to sign up and hand over their data to Microsoft. This limits consumer choice and creates a barrier for other companies offering competing services. Nextcloud, along with almost 30 other European companies, has formally complained to the European Commission (EC) about Microsoft‘s anti-competitive behavior in respect of its OneDrive (cloud) offering.

        The European Commission’s Directorate-General for Competition exists precisely for the purpose of preventing this kind of abusive behavior and keeping the market competitive and fair for all players. Nextcloud said that it has filed an official complaint with the European Commission’s Directorate-General for Competition about the abusive practices of Microsoft related to OneDrive.

      • Copyrights

        • “The Pirate Bay Can’t Be Stopped ,” Co-Founder Says

          The Pirate Bay quietly turned 18 this year. The site survived several shutdown attempts and remains online. Nonetheless, one of the lawyers who fought The Pirate Bay in court says that the lawsuits and raids were worth it. Pirate Bay co-founder Peter Sunde disagrees and believes that the torrent site can’t be stopped by rightsholders.


Links 29/11/2021: Linux 5.16 RC3 and Lots of Patent Catch-up

Posted in News Roundup at 7:20 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Linux Weekly Roundup #158

        Welcome to this week’s Linux Roundup. It was a full week of Linux releases with Endless OS 4.0.0 and Deepin 20.3.

        We hope that you had a good week and may the be a great one ahead!

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.16-rc3
        So rc3 is usually a bit larger than rc2 just because people had some
        time to start finding things.
        So too this time, although it's not like this is a particularly big
        rc3. Possibly partly due to the past week having been Thanksgiving
        week here in the US. But the size is well within the normal range, so
        if that's a factor, it's not been a big one.
        The diff for rc3 is mostly drivers, although part of that is just
        because of the removal of a left-over MIPS Netlogic driver which makes
        the stats look a bit wonky, and is over a third of the whole diff just
        in itself.
        If you ignore that part, the statistics look a bit more normal, but
        drivers still dominate (network drivers, sound and gpu are the big
        ones, but there is noise all over). Other than that there's once again
        a fair amount of selftest (mostly networking), along with core
        networking, some arch updates - the bulk of it from a single arm64
        uaccess patch, although that's mostly because it's all pretty small -
        and random other changes.
        Full shortlog below.
        Please test,
      • Linux 5.16-rc3 Released With Alder Lake ITMT Fix, Other Driver Fixes – Phoronix

        Linus Torvalds just released Linux 5.16-rc3 with plenty of fixes included. With it being US Thanksgiving week, he’s also having fun with this kernel by having adjusted the codename to “Gobble Gobble” in reference to turkeys.

      • Facebook/Meta Tackling Transparent Page Placement For Tiered-Memory Linux Systems – Phoronix

        Back during the Linux 5.15 cycle Intel contributed an improvement for tiered memory systems where less used memory pages could be demoted to slower tiers of memory storage. But once demoted that kernel infrastructure didn’t have a means of promoting those demoted pages back to the faster memory tiers should they become hot again, though now Facebook/Meta engineers have been working on such functionality.

        Prior to the Linux 5.15 kernel, during the memory reclaim process when the system RAM was under memory pressure was to simply toss out cold pages. However, with Linux 5.15 came the ability to shift those cold pages to any slower memory tiers. In particular, modern and forthcoming servers with Optane DC persistent memory or CXL-enabled memory, etc. Therefore the pages are still accessible if needed but not occupying precious system DRAM if they aren’t being used and to avoid just flushing them out or swapping to disk.

      • Linux 5.17 To Boast Latency Optimization For AF_UNIX Sockets – Phoronix

        Net-next has been queuing a number of enticing performance optimizations ahead of the Linux 5.17 merge window kicking off around the start of the new year. Covered already was a big TCP optimization and a big improvement for csum_partial() that is used in the network code for checksum computation. The latest optimization is improving the AF_UNIX code path for those using AF_UNIX sockets for local inter-process communication.

        A new patch series was queued up on Friday in net-next for improving the AF_UNIX code. That patch series by Kuniyuki Iwashima of Amazon Japan is ultimately about replacing AF_UNIX sockets’ single big lock with per-hash locks. The series replaces the AF_UNIX big lock and also as part of the series has a speed-up to the autobind behavior.

    • Benchmarks

      • PHP 8.1 Benchmarks – Continuing The Nice Performance Trajectory

        PHP 8.1 released on Thursday as the latest major feature release for this programming language. In this article are some benchmarks of PHP 8.1.0 on an AMD EPYC powered Linux server compared to prior releases going as far back as PHP 5.6.

        As previously covered, PHP 8.1 introduces many new language features like PHP “Fibers”, enums, read-only class properties, new fsync functions, and much more. PHP 8.1 is another great annual update to this server-side language. But as we’ve seen over the past number of years since the late PHP 5.x era, the performance has continued improving.

    • Applications

      • Best Free and Open Source Alternatives to Corel Painter

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

      • Best Free and Open Source Alternatives to Corel’s Products

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

        This series looks at the best free and open source alternatives to products offered by Corel.

      • 5 Best Free and Open Source Linux MAC/RBAC Tools

        One of the most difficult problems in managing a large network is the complexity of security administration. The deployment of individual security products such as firewalls, intrusion detection systems, network traffic analysis, log file analysis, or antivirus software is never going to provide adequate protection for computers that are connected to the internet. For example, a good network intrusion prevention and detection system (such as Snort) does an exemplary job at detecting attacks within traffic. However, this type of detection does not offer any sort of damage containment. Equally, a firewall offers an outstanding method at defining what type of traffic is allowed in a network, but does not offer any deep protocol analysis.

    • Instructionals/Technical

      • How To Install Snap on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Snap on Ubuntu 20.04 LTS. For those of you who didn’t know, Snap also known as Snappy is an alternative package management tool and program package format developed by Canonical, the company behind Ubuntu Linux. All the snaps are usually stored in a central repository called Snap Store from where snaps can be downloaded and installed using the snap command. Snaps work across a range of Linux distributions, which makes them a distro-agnostic upstream software deployment solution.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Snap Package Manager on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • How to install FreeOffice 2021 on Ubuntu 20.04 Linux

        One of the best free alternatives to Microsoft Office is FreeOffice, developed by a German software company- SoftMaker. Recently, they have upgraded their Office suite to version 21. And here we learn the steps to install FreeOffice 2021 version on Ubuntu 20.04 Linux using the command terminal.

        This free office suite is a part of the commercial one from the same developers known as SoftMaker Office 21 (also available for Linux), of course, the premium will have more features but that doesn’t mean the free version- FreeOffice 2021 deprives to full fill all daily office documents (MS-Word alternative) related requirements. It offers a Microsoft office ribbon-like interface and three modules- TextMaker 21 to create documents; PlanMaker 21 to create sheets (Excel alternative) and Presentations 21 for making slides like MS-Powerpoint.

      • Pin Custom Folders to Left Panel ‘Files’ Icon Context Menu in Ubuntu 20.04 | UbuntuHandbook

        In Windows 10, user may right-click on the ‘File Explorer’ icon on panel to access pinned folders (e.g., Desktop, Downloads and Documents) quickly.

        Ubuntu has first implemented this feature in Ubuntu 21.10, though it seems to be not working properly due to bug. Ubuntu 20.04 may manually add the context (right-click) menu options so user can right-click on the ‘Files’ icon to choose open favorite folders quickly.

      • How To Install Perl on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install Perl on AlmaLinux 8. For those of you who didn’t know, Perl (Practical Extraction and Reporting Language) is a general-purpose programming language originally developed for text manipulation and now used for a wide range of tasks including system administration, web development, network programming, GUI development, and more. The major features of Perl are easy to use, supports object-oriented and procedural programming languages, and has built-in support for processing text. The most impressive feature of Perl is that it supports a large collection of third-party modules.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Perl programming language on AlmaLinux 8. You can follow the same instructions for Rocky Linux.

      • How to play Total War: WARHAMMER on Linux

        Total War: Warhammer is a turn-based real-time tactics video game developed by Creative Assembly and published by Sega. It takes place in the War Hammer 40K universe. Here’s how you can play it on your Linux PC.

      • How to install Funkin’ Vs. Camellia on a Chromebook

        Today we are looking at how to install Funkin’ Vs. Camellia on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Fail2Ban


        After ensuring that Fail2ban was being used for all suitable modules on the server I saw the need to have a visual indication of the Fail2ban status in the Web Management to help detect any problems that are occurring.

        Patch Released

        The latest patch that has just been released now has an extra page for Fail2ban added to the system section of the Web Management. This page gives a visual status indication for each jail that has been configured for Fail2ban on the selected server.

      • How to Install Linux Kernel 5.15 on Pop!_OS 20.04

        Linux kernel 5.15 is out with many new features, support, and security. The Linux 5.15 kernel release further improves the support for AMD CPUs and GPUs, Intel’s 12th Gen CPUs, and brings new features like NTFS3, KSMBD (CIFS/SMB3), and further Apple M1 support, amongst many other changes and additions.

        In the following tutorial, you will learn how to install the latest 5.15 Linux Kernel on Pop!_OS 20.04 LTS.

      • How to use disown command in Linux – Unixcop the Unix / Linux the admins deams

        In the Unix shells ksh, bash, fish and zsh, the disown builtin command is used to remove jobs from the job table Like cd or pwd, it is a shell built-in command, and doesn’t require root privileges, or to mark jobs so that a SIGHUP signal is not sent to them if the parent shell receives it (e.g. if the user logs out).

        So, In this tutorial we will cover different ways you can use the disown command in Linux.

      • How to Manage Packages on RPM-Based Linux Distros With DNF

        One of the most attractive features of the Linux operating system is how easy it is to install or automate the installation of software packages from secure remote repositories.

        This guide will walk you through how to install and manage software packages on RPM-based Linux distros such as Fedora and Red Hat Enterprise Linux (RHEL) using DNF, the next-generation package manager for RPM-based Linux distros.

      • How to Install PHP 8.1 on AlmaLinux 8

        PHP 8.1 is a significant update of the PHP language that was “officially” released on November 25, 2021. This is a standard upgrade as we advance from the existing PHP 8.0 release. The new PHP 8.1 brings enums, fibers, never return type, final class constants, intersection types, read-only properties amongst the long list of new features and changes.

        In the following tutorial, you will learn how to import the REMI Module and install PHP 8.1 on AlmaLinux 8.

      • How To Find Top Running Processes by Memory and CPU Usage in Linux

        Most Linux users use the default system monitor tool that comes pre-installed with the distribution for checking memory, CPU usage, and CPU temperature. In Linux, many applications run in the system background as a daemon to keep another main tool active or live which consumes a bit more system resources. In Linux, you can use various small tools or terminal commands or use one single command that shows all the running processes by memory and CPU usage. After checking the RAM and CPU load, you can determine which application you want to kill.

    • Games

      • Nvidia Pascal GPU, DX12 and VKD3D: Slideshow time! – Boiling Steam

        So Horizon Zero Dawn had a sale recently on Fanatical, and I thought… OK I’ll grab it! It’s time. I first installed it on my workstation that only has a GTX1060 3GB GPU – not a workhorse but a decent card nonetheless for low-to-medium end gaming. I knew very well that Horizon Zero Dawn is a DX12 game and that Pascal architecture (Nvidia 10xx basically) and earlier versions do not play very well with DX12 games running through vkd3d-proton, the DX12 to Vulkan translation layer.

        Still, I could imagine getting somewhere around 30 FPS on low-to-medium settings, and use FSR if necessary to get to better framerates. Nothing prepared me for the performance I was about to experience.

    • Desktop Environments/WMs

    • Distributions

      • Screenshots/Screencasts

        • Endless OS 4.0.0 Run Through – Invidious

          In this video, we are looking at Endless OS 4.0.0. Enjoy!

        • Endless OS 4.0.0

          Today we are looking at Endless OS 4.0.0. It is based on Debian 11, Linux Kernel 5.11, Gnome 3.38, and uses about 1 to 1.5GB of ram when idling. Enjoy it and it looks great!

      • SUSE/OpenSUSE

        • Putting the Open back into Open Source

          Agility has never been more important than it is in today’s disrupted digital world. Leaders in every industry are trying to find a balance between the stability that allows them to plan for the future, while creating highly agile organisations that can quickly respond to new challenges and opportunities.

          This agility only comes from the ability to innovate at speed, which is why open source communities are as vital as ever. According to SUSE’s recently commissioned Insight Avenue report, Why Today’s IT Leaders are Choosing Open, 84% now see open source as a way to cost-effectively drive this innovation.

      • Debian Family

        • GR procedures and timelines

          A vote has been proposed in Debian to change the formal procedure in Debian by which General Resolutions (our name for “votes”) are proposed. The original proposal is based on a text by Russ Allberry, which changes a number of rules to be less ambiguous and, frankly, less weird.

          One thing Russ’ proposal does, however, which I am absolutely not in agreement with, is to add a absolutly hard time limit after three weeks. That is, in the proposed procedure, the discussion time will be two weeks initially (unless the Debian Project Leader chooses to reduce it, which they can do by up to one week), and it will be extended if more options are added to the ballot; but after three weeks, no matter where the discussion stands, the discussion period ends and Russ’ proposed procedure forces us to go to a vote, unless all proposers of ballot options agree to withdraw their option.

          I believe this is a big mistake. I think any procedure we come up with should allow for the possibility that we may end up with a situation where everyone agrees that extending the discussion time a short time is a good idea, without necessarily resetting the whole discussion time to another two weeks (modulo a decision by the DPL).

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • SaaS/Back End/Databases

        • SQLite 3.37 Lightweight Database Comes Packed with New Features

          SQLite 3.37 has just got better with added new features such as CLI enhancements and additional interfaces.

          SQLite is is an open source self-contained, lightweight serverless relational database management system. The lite in SQLite means lightweight in terms of setup, database administration, and required resources.

          Normally, an RDBMS such as MySQL, PostgreSQL, etc., requires a separate server process to operate, but SQLite does not work this way. It accesses its storage files directly.

          SQLite stores its data in a single cross-platform file. As there’s no dedicated server or specialized filesystem, deploying SQLite is as simple as creating a new regular file.

      • FSFE

        • Upcycling Android: Initiative for switching to free smartphone software – Market Research Telecast

          Everything always revolves around shopping – be it for Black Friday, Christmas or Easter. But why not just repair and reuse instead of always buying something new? This is what our series of articles “Repairing and Upcycling” is all about.

          With the “Upcycling Android” initiative, the Free Software Foundation Europe (FSFE) wants to encourage Android smartphone users to disconnect from the Google system and switch to free software. On the occasion of the current “European Waste Prevention Week”, the FSFE wants to help avoid electronic waste, save resources and enable cell phones to have a longer life. The Federal Environment Ministry and the Federal Environment Agency support the upcycling project financially.

          “Every year manufacturers worldwide produce 1.5 billion cell phones,” said the FSFE on Thursday. Unfortunately, almost as many would probably be “thrown away” after an often short period of use. This is more and more due to planned “software obsolescence”. Consumers are therefore faced with the dilemma of either buying new hardware or living with outdated programs. The environmental impact of this short hardware life could be devastating.

      • Programming/Development

        • PHP 8.1.0 and a new foundation

          Version 8.1.0 of the PHP language has been released. This release includes a number of new features, including enumerations, read-only properties, fibers, and more.

        • Nemiver debugger now in devx SFS

          Mike (mikewalsh) responded with a great link that lists lots of Linux debugger/trace tools. The EasyOS devx SFS already has the ‘gdb’ CLI utility, and I saw on that link, there are ‘ddd’ and ‘nemiver’ GUI frontends for gdb.
          I went for nemiver and compiled it. The project seems to be almost dead, but then, if it works, perhaps no need for more commits to the git repository. I chose version 0.8.2, not the latest, but it suited me to stay with a gtk+2 based app rather than gtk+3.
          Two dependencies, ‘gtkmm’ and ‘libgtop’, are compiled in OpenEmbedded. I compiled ‘libgtksourceviewmm’ and ‘nemiver’ in a running EasyOS and made them into PETs.

        • Perl/Raku

          • Perl Weekly Challenge 140: Multiplication Tables
          • Leaky Rakudo

            Yesterday the discord-bridge-bot refused to perform its 2nd job: EVAL All The Things! The EVALing is done via shell-out and requires a fair bit of RAM (Rakudo is equally slim then Santa). After about 3 weeks the fairly simple bot had grown from about halve a GB to one and a halve – while mostly waiting for the intertubes to deliver small pieces of text. I complained on IRC and was advised to take heap snapshots. Since I didn’t know how to make heaps of snapshots, I had to take timo’s directions towards use Telemetry. As snap(:heap) wasn’t willing to surrender the filename of the snapshot (I want to compress the file, it is going to get big over time) I had a look at the source. I also requested a change to Rakudo so I don’t have to hunt down the filename, which was fulfilled by lizmat 22 minutes later. Since you may not have a very recent Rakudo, the following snipped might be useful.

  • Leftovers

    • A rare look inside the Smithsonian’s secret storerooms

      As the Smithsonian Institution celebrates its 175th birthday this year, the sprawling museum-and-zoo complex counts just over 155 million items in its 20 museums and off-site storage facilities. Across more than 11 million square feet of exhibition and storage space—most of it located in Washington, D.C., suburban Maryland, and New York City—those artifacts range from slingshots to space shuttles, ants to elephants.

      It’s no surprise that only about one percent of the collection is on display at any given time. But that raises a question: What are we missing? As I discover when three Smithsonian museums kindly allow me to peek inside their back rooms, the answer is: lots of things that will absolutely blow your mind.

      In the maze of storage rooms at the National Museum of American History, for instance, it seems every cabinet I look into holds an iconic cultural touchstone. Behind one door lies Ray Bolger’s Scarecrow costume from The Wizard of Oz. A nearby drawer holds, side by side, Jerry Seinfeld’s puffy shirt and Mister Rogers’ red sweater. A small box contains the original stopwatch from the television news program 60 Minutes.

    • Hardware

      • It’s Nice Having Someone To Talk To | Hackaday

        We all get a bit lonely from time to time and talking to other humans can be a challenge. With social robots still finding their way these days, [Markus] decided to find a DIY solution he could make cheaply, resulting in the “Conversation Face.”

        The build is actually pretty simple, really. You have three different OLED displays, two for the eyes and one for the mouth, that have different graphic images programmed onto them depending on the expression being displayed. There’s also a small electret microphone that senses when you are speaking to the face. Finally, a simple face cutout covers the electronics and solidifies the aesthetic.

      • Scale Buildings With The Power Of Suction | Hackaday

        Walls can’t hold [Elijah Cirioli]. The would-be superhero has been busy scaling the sides of buildings using his self-contained vacuum climbers. (Video embedded after the break.)

        After being inspired by the winning project of an Air Force design challenge, our plain-clothed crusader got to work on a pair of prototype vacuum climbers. The wooden prototypes were an unexpected success, so work soon began on the models featured in the video after the break. The main improvements in this second version included using ¼ inch acrylic instead of plywood, as well as an improved gasket for a better seal against the imperfect exterior of many building walls.

    • Health/Nutrition/Agriculture

      • EU Plans Changes to Covid Travel Rules to Avoid ‘Fragmentation’

        The European Union is discussing this week how to update its digital Covid-19 certificates and its approach to travel within and outside the bloc as member nations take varying steps to counter the latest wave of the pandemic.

      • What’s The Wait? – Number Of MDR And IVDR Notified Bodies Remains Stubbornly Low

        We have previously written at length about the continuing regulatory bottlenecks caused by the low numbers of notified bodies for the EU’s Medical Device Regulation (MDR) and In Vitro Diagnostic Medical Devices Regulation (IVDR).

        A new set of slides from the European Commission sheds some light on where all the notified bodies have gone.

        The good news is that we do have 24 notified bodies for MDR. However, 29 applications for designation under MDR remain in progress. Of these, two notified bodies will be designated imminently (which should bring us to 26 by Christmas 2022). However, ten applicants haven’t even received preliminary assessment reports, especially when considering the relative speed and ease of this initial stage.

      • Indian farmers forced Modi to back down on new laws. So why aren’t they going home?

        Santosh Singh’s earliest memory is of tilling soil on his family’s farm. Now, the 70-year-old farmer’s eyes gleam with pride as he recalls watching his grandson do the same.

        But Singh hasn’t been home to Punjab for one year since he joined farmers at one of three protest sites in the Indian capital to campaign against new farming laws they claimed would leave them open to exploitation.

      • Festival of Hope crimped by higher costs

        The Community Foundation of the Adirondack Foothills delivered 2,600 free Thanksgiving meals to individuals and families in need on Thursday as part of the third Annual Festival of Hope event, about 606 fewer meals than in 2020, although the total cost was about $1,000 more.

    • Integrity/Availability

      • Proprietary

        • Security

          • Unboxing Busybox: Claroty and JFrog uncovers 14 vulnerabilities

            Embedded devices with limited memory and storage resources are likely to leverage a tool such as BusyBox, which is marketed as the Swiss Army Knife of embedded Linux. BusyBox is a software suite of Unix utilities, known as applets, that are packaged as a single executable file.

            Within BusyBox you can find a full-fledged shell, a DHCP client/server, and small utilities such as cp, ls, grep, and others. You’re also likely to find many OT and IoT devices running BusyBox, including popular programmable logic controllers (PLCs), human-machine interfaces (HMIs), and remote terminal units (RTUs)—many of which now run on Linux.

            As part of our commitment to improving open-source software security, Claroty’s Team82 and JFrog collaborated on a vulnerability research project examining BusyBox. Using static and dynamic techniques, Claroty’s Team82 and JFrog discovered 14 vulnerabilities affecting the latest version of BusyBox.

            In most cases, the expected impact of these issues is denial of service (DoS). However, in rarer cases, these issues can also lead to information leaks and possibly remote code execution.

          • Privacy/Surveillance

    • Defence/Aggression

      • Jurors saw through the preposterous defense by Ahmaud Arbery’s killers

        As Americans digest the guilty verdicts in the case of the three men charged with murdering Ahmaud Arbery, we can look to the powerful video evidence and the stellar work of prosecutor Linda Dunikoski and her team in managing that evidence as significant factors in an outcome 180 degrees different from the verdict in George Zimmerman’s killing of Trayvon Martin.

      • Prosecutors in the trial of Ahmaud Arbery’s killers explain why they had faith in the jury despite its racial makeup

        Prosecutors in the trial of three White men convicted in Ahmaud Arbery’s killing were not concerned about the racial makeup of the jury, attorneys told CNN Wednesday.

        Linda Dunikoski, Cobb County senior assistant district attorney, told CNN’s Jim Acosta that after jurors were selected, her team “realized that we had very, very smart, very intelligent, honest jurors who were going to do their job which is to seek the truth.”

        “We felt that putting up our case, it doesn’t matter whether they were Black or White, that putting up our case that this jury would hear the truth, they would see the evidence and that they would do the right thing and come back with the correct verdict which we felt they did today,” Dunikoski said.

    • Environment

      • Energy

        • Alabama Miners Are Still on Strike After 8 Months

          The courts have attacked their right to picket, and the company has engaged in a campaign of misinformation. But 1,000 union miners in Alabama are still on strike after eight months, fighting for decent compensation and humane work schedules.

    • Civil Rights/Policing

      • Superintendents’ group draft regulation on corporal punishment

        The Local Superintendents Advisory Council (LSAC) approved a draft regulation during its meeting on Nov. 23 on the use of corporal punishment in schools.

        The draft regulation will go before the Kentucky Board of Education (KBE) at its meeting on Dec. 1 for approval.

        A Kentucky state statute from 1982 permits the use of corporal punishment by teachers for classroom discipline, while a 2019 state statute requires the Kentucky Department of Education (KDE) to provide resources related to trauma-informed discipline and requires school districts to adopt trauma-informed discipline policies. Corporal punishment is not a trauma-informed discipline resolution.

    • Internet Policy/Net Neutrality

      • Joachim Breitner: Zero-downtime upgrades of Internet Computer canisters

        DFINITY’s Internet Computer provides a kind of serverless compute platform, where the services are WebAssemmbly programs called “canisters”. These services run without stopping (or at least that’s what it feels like from the service’s perspective; this is called “orthogonal persistence”), and process one message after another. Messages not only come from the outside (“ingress” calls), but are also exchanged between canisters.

        On top of these uni-directional messages, the system provides the concept of “inter-canister calls”, which associates a respondse message with the outgoing message, and guarantees that a response will come. This RPC-like interface allows canister developers to program in the popular async/await model, where these inter-canister calls look almost like normal function calls, and the subsequent code is suspended until the response comes back.

    • Digital Restrictions (DRM)

    • Monopolies

      • Book Review: Handbook of Intellectual Property Research [Part 1] [Ed: This is not "research" because "IP" isn't a real thing but a lie; if you claim to be doing research and then use these propaganda terms, then you're a lobbyist or corporate operative, not a researcher; "IP" in the #patent context is fictional; like "aura", it only exists in the minds of the faithful..]

        “What is the methodology behind your research?”. This is the question young IP researchers hear most during their first years in the academia. Conference after conference, one comes to realise that a robust research methodology may often be more important than any conclusions such research might yield. Yet, resources on how to design such methodology are scarce. This is why this Kat was pleased to see the “Handbook of Intellectual Property Research” (ed. by I. Calboli and M. Montagnani, OUP, 912 pp.), published recently in open access, with (all?) the right answers. The book consists of four parts, 52 chapters, and covers research methods in a variety of areas of law: privacy law, criminal law, popular culture research, or psychology, to name a few. In this post, this Kat will review the first two Parts, on intersections of IP with other areas of law and with the humanities. A follow-up review will cover the other two Parts of the book.


        George Nicholas and Catherine Bell follow in Chapter 20, with research concerns and considerations on IP and archaeology. IP issues become relevant at several stages of archaeological studies. Some of the many research venues, suggested by the authors, are 3D scanning or printing of artefacts, and the protection of information uncovered by archaeologists as traditional knowledge (TK). The views on the issue are complemented by Chapter 21, where Fiona Macmillan looks into interdisciplinary approaches to research on IP and cultural heritage.

        Chapters 22, 23 and 24 then address the research framework for IP and languages. In Chapter 22, Alan Durant and Jennifer Davis explain how linguistics may be applied in IP research: for instance, in judicial interpretation of certain legal terms, or in examining the distinctiveness of certain verbal signs. Law and literature in IP methodologies is the topic of Chapter 23, authored by Zahr K. Said. Said addresses how literature (such as Shakespeare’s Merchant of Venice) may be used in research, but also in the teaching of IP law. David Tan discusses, in Chapter 24, semiotic analysis in IP research. Semiotics being the study of signs, it can become a useful methodology for studying acquired distinctiveness of trade marks.

      • FOSS Patents: In Black Friday filing, Epic Games opposes Apple’s 9th Circuit motion to stay the injunction

        On November 16, Apple filed with the United States Court of Appeals for the Ninth Circuit a motion to stay the Epic Games v. Apple injunction, whih came down in September based on a finding of a violation of California Unfair Competition Law (UCL). Epic had ten days to respond, plus one extra day because the deadline would otherwise have been on Thanksgiving Day.

        I continue to believe that the Ninth Circuit is more likely than not to grant Apple’s motion. While I don’t agree with all of Apple’s arguments, and don’t disagree with all of Epic’s either, there simply are overwhelming reasons to order a stay. It’s the most logical and reasonable thing to do. Should the appeals court deny Apple’s motion, Apple asks for an additional administrative stay (30 more days) so it can seek Supreme Court review.

      • Covid And Counterfeits: How Brand Owners Are Fighting Back Against Pandemic Opportunists [Ed: “Pandemic Opportunists” sounds to me like all the largest vaccine makers that 'stole' from taxpayers and turned publicly-funded work into patent monopolies… now licensing patents they “STOLE” for billions or trillions]

        As has been widely noted, online trade grew significantly in 2020. Confined to their homes, consumers relied on the internet for buying food, household products, medical supplies, children’s toys and games, and electronic goods. In response to the increased demand, online marketplaces expanded their range of suppliers. Meanwhile, trying not to lose their traditional customers, offline businesses rapidly moved into the online space.

      • EU Lawmakers Pass Strict New Rules Affecting Big U.S. Tech

        The lead committee in the European Parliament writing new tech rules passed measures Tuesday that could impact major U.S. and European tech companies.

      • District Court In Turkey Rules On Preliminary Injunction Assessments [Ed: There is no "IP" and there's no "Right" associated with what she refers to; this is lawyers' propaganda showing up in "news" feeds...]

        Objectively, preliminary injunction decisions play a key role for the IP right holder particularly for patent holders to be dealt by Intellectual and Industrial Property Rights (IP courts) in an urgent matter due to the super technicality nature of such cases, commercial reasons, time pressure, etc.

        The preliminary injunction, which appears as a way out in cases where the definitive protection is not sufficient and a temporary legal protection is needed, can be requested before an action is filed as per Article 390 of the Code of Civil Procedure (CCP), or it can be requested after the action is filed.

      • Nextcloud Asks EU to Stop Microsoft From Bundling OneDrive With Windows | PCMag

        Nextcloud has asked the European Commission to stop Microsoft from pre-installing OneDrive and Teams on Windows to give competitive services a fair chance to appeal to PC users.

        “Microsoft is integrating 365 deeper and deeper in their service and software portfolio, including Windows,” Nextcloud says on a web page dedicated to its antitrust complaint against Microsoft. “OneDrive is pushed wherever users deal with file storage and Teams is a default part of Windows 11. This makes it nearly impossible to compete with their SaaS services.”

        Nextcloud CEO Frank Karlitschek said in a statement:

        This is quite similar to what Microsoft did when it killed competition in the browser market, stopping nearly all browser innovation for over a decade. Copy an innovators’ product, bundle it with your own dominant product and kill their business, then stop innovating. This kind of behavior is bad for the consumer, for the market and, of course, for local businesses in the EU. Together with the other members of the coalition, we are asking the antitrust authorities in Europe to enforce a level playing field, giving customers a free choice and to give competition a fair chance.

      • Patents

        • Patents can help Huawei weather sanctions storm: new IP chief [Ed: Complete garbage that does not make any sense (patents do not overcome embargoes), but this 'news' site became a megaphone of a lawyer working for "Chinese GAFAM", or a military arm of the CCP/CPC]

          In an exclusive interview, Huawei IP vice president Alan Fan tells Managing IP how the company’s IP strategy is adapting to US sanctions

        • G7 IP Offices Will Support Economic Recovery After the Pandemic [Ed: This is a shameful and villainous lie; granting monopolies to rich people won't help recovery and during the pandemic the patents contribute to the deaths of many millions of people]

          The G7 Heads of IP Office Conversation was held via video conference on November 19, 2021, bringing together leading officials from IP Offices in G7 member states (G7 IP Offices). During the Conversation, the participants shared their recognition of initiatives on IP intersections with public health; IP and future technologies including Artificial Intelligence (AI); best practices in IP enforcement; and increased cooperation between G7 IP Offices and other entities including WIPO. They also indicated that they would aim to establish a balanced and international IP environment wherein the benefits from innovation and creativity can be maximized, and said that they would support the global economic recovery after the pandemic. Consequently, the G7 IP Offices successfully adopted their Joint Statement for the first time.

        • UPC inches closer with Austrian parliament vote [Ed: Managing IP spreads the lie that “UPC inches closer” even though it’s not at all tenable; this publisher is participating in illegal action]

          The Unified Patent Court has moved one step closer to becoming operational after clearing the first stage of an Austrian parliament vote on Friday, November 19.

          When Austria formally ratifies the so-called ‘PAP Protocol’, it will trigger the beginning of the Provisional Application Period (PAP).

          The PAP will be the beginning of the final stage of preparations before the court becomes operational. During this period, a bespoke IT system will be implemented judges will be hired.

          Last Friday, November 19, Austria’s National Council approved the legislation allowing Austria to ratify the protocol.

          The bill is now in the hands of the Federal Council, the parliament’s upper house. Once approved by, it requires the signatures of the President and Chancellor before being published in the Federal Gazette.

          Austria will then be able to deposit its instrument of ratification, triggering the beginning of the PAP.

          The UPC Preparatory Committee has said it will need at least eight months from the start of the PAP to complete the necessary work before the UPC can become operational.

          Its initial target of mid-2022 now seems out of reach, with formal Austrian ratification not expected until next month.

          Managing IP exclusively reported in September that Slovenia had ratified the protocol, leaving just one more country to ratify.

        • Bayer v Teva: Drug formulation patent found “the result of standard and routine considerations” ([2021] EWHC 2690 (Pat))

          The recent decision of the English High Court in Bayer v Teva [2021] EWHC 2690 (Pat) is another example in which the UK courts have found a pharmaceutical invention to be the obvious outcome of routine drug development. In the Supreme Court decision Actavis v ICOS the court found a drug dose selection obvious in view of what was considered to be the obvious route that the skilled person would take through the drug development decision tree. The High Court in Bayer v Teva followed a similar reasoning to find the clinical formulation of Bayer’s cancer drug, sorafenib, obvious in view of the preliminary phase I clinical trial results for the drug.

          In Bayer v Teva, the patent in question EP (UK) 2305255 was directed to the salt form of sorafenib and its use in the treatment of cancer. The particular claim in contention related to sorafenib tosylate salt. Sorafenib tosylate (NEXAVAR) is approved in the US and EU for the treatment of various types of cancer. The SPCs for the basic patent covering sorafenib expired earlier this year. Teva brought revocation proceedings against Bayer’s sorafenib formulation patent (which had an expiry date of Dec 2022) across Europe, including the UK and Germany.

        • EU sticking by big pharma’s side over TRIPS waiver, say critics [Ed: Well, "say critics" or says common sense? Can you write like a proper journalist and check the facts instead of he says, she says?]

          Campaigners for the waiver and in-house pharma counsel both agree that the EU is likely to block the proposal at the WTO next week

        • The Story Patents Tell About Your Business [Ed: The patent troll Erich is telling tons of lies here, spreading myths etc. IBM and corrupt EPO made an alliance with that fraudster too]

          As a patent owner or a company driving innovation, you more than likely spend a bit of time researching or filling patents to protect ideas. Once granted, the value of a patent lies in the ability to generate a return for your work in contributing to the innovation cycle. Typically, these assets can be monetized by enforcing your rights through patent litigation, or by licensing or selling your patents to others. Other IP owners find themselves on the other side of the coin and feel there is no need for monetization – only the need for defensive IP protection (where return-on-invest is generated by securing their own products and services).

        • ARIPO chief on the tech revolution and playing catch-up [Ed: More silly buzzword salads with nonsense like “4IR”; starting to sound like the utterly clueless Mafia that runs the EPO]

          Engagement with protocols and the 4IR are among key priorities for ARIPO director general, Bemanya Twebaze, as he approaches one year in the job

        • FOSS Patents: O-RAN entails ‘medium to high’ security risks according to study released by German government agency: paradigm shift needed to avoid ‘security debacle’

          In a recent post on O-RAN I discussed European concerns over the contemplated standard for the modularization of mobile network infrastructure being driven by geopolitical objectives (America first, Chinese bogeyman) rather than technical merits. The situation appears to be a lot worse than that. Today one of the world’s most well-respected and independent IT security authorities, the German Bundesamt für Sicherheit in der Informationstechnik (BSI; official English title: Federal Office for Information Security) released an 86-page study (PDF; in German) that must give some people not only food for thought but possibly even pause.

          The government agency’s risk assessment–to be precise, the BSI commissioned and funded the study, and did not influence the researchers’ independent work–focused on the following objectives: confidentiality (of data), integrity, accountability, availability, and privacy. The study took three different stakeholer angles: that of a user of a 5G network, that of an operator of a 5G network, and that of the state (i.e., the public interest). In light of the lack of specificity of the current version of the O-RAN specs, the risk assessment relates to a “worst-case perspective” in which none of the optional security measures have been implemented and a “best-case perspective” based on the assumption of all optional security measures actually having been put in place.

          The renowned security experts took into consideration that the leverage of potential attackers varies greatly. Therefore, they evaluated how much damage could be done by a totally external attacker, a 5G user, an “insider”, a cloud operator, and a RAN operator.

        • FOSS Patents: Deutsche Telekomedy in Mannheim: court informally dismisses antitrust claims against IPCom but urges global settlement including infringement action against Sprint in Texas

          This Tuesday, the Mannheim Regional Court gave short shrift to Deutsche Telekom v. IPCom, an “antitrust case” in which the mobile network operator is seeking roughly $300 million in restitution (recovery of past royalty payments plus interest). The court’s public hearing list described the cause of action in case no. 2 O 130/20 as “anticompetitive discrimination involving standard-essential patents in connection with patent license agreement dated June 7, 2013.” Some other claim(s) had already been voluntarily dismissed by the plaintiff ahead of trial. The remainder was stayed at the end of the trial, but on a basis that allows either party anytime to ask the court to resume the proceedings, which would result in a swift ruling that could have only one outcome: a formal dismissal of the case as clearly meritless. As part of its hold-out strategy, Deutsche Telekom even stipulated to that kind of revocable stay, while IPCom would have preferred a decision. Typically, defendants are happy to just put a case against them on hold, but I’ll get to the parties’ motives later (here’s a shortcut to that part of the post)–and they have a lot do with an IPCom v. Sprint case pending before Judge Rodney Gilstrap in the Eastern District of Texas and slated to go to trial next spring.

          If I wanted to go into detail on everything that is deficient about Deutsche Telekom’s Mannheim complaint, I’d have to write an even longer post, every single paragraph of which would have to start with “Let that sink in” or “Lo and behold,” which would get a bit repetitive. Let’s focus on the forest rather than get lost in a multitude of trees–and please take any references to Deutsche Telekom’s outlandish theories and allegations as if “Let that sink in” had been put in front of a parenthetical expression in a mathematical formula.

          What Deutsche Telekom has been trying to do would–if it worked, which it never will–make it practically impossible for parties to enter into reliably stable settlement agreements that put standard-essential patent (SEP) cases to rest. The licensee could always come back later and relitigate settled issues. And even if–as here–a clause specifically and incontrovertibly ruled that behavior out, the licensee would argue–as Clifford Chance “of counsel” Dr. Joachim Schuetze (“Schütze” in German) did on Deutsche Telekom’s behalf–that parties cannot dispose of antitrust law no matter what they put into an agreement.

        • “Prior public use”: an effective ground for opposition against the grant of a European patent [Ed: Nowadays the EPO grants far too many fake patents, rendering any efforts to oppose or keep track of them futile; this needs to be corrected at an institutional level, not per patent basis]

          The opposition procedure for European patents, enables third parties, within nine months of the publication of the mention of the grant of the patent, to oppose that patent at the European Patent Office (EPO). This opposition procedure for European patents is particularly useful when the patent in question is hindering our commercial interests and we have adequate reasons to revoke its registration. One of the most effective ways of obtaining the revocation is to prove “prior public use”. We look at what this consists of below.

        • Irish hopes of winning new EU patent court will fail without fast action [Ed: There is no such patent court, it cannot exist for many reasons (including brexit), so this is the Irish media publish fake news for patent litigation fanatics without bothering to check the facts]

          Irish-based pharma firms are pleading with the Government to approve a new EU patent court before it is too late.

          While other European capitals are laying the legal ground for their local court divisions, firms say Ireland risks being left behind and losing out on new investment and jobs.

        • UK Government consultation on AI & copyright: text and data mining [Ed: The patent extremists and liars from Bristows lobby on nebulous buzzwords like “HEY HI” in the UK; do we know these fabricators and fraudsters shaping our policy?]

          On 29 October 2021, the UK Intellectual Property Office issued an open consultation to examine certain aspects of copyright and patent law in the context of AI. The consultation follows in light of views expressed in response to its Call for Views on AI and IP.

        • “Trust Me, I Am An Algorithm.” Is AI The Future Of Healthcare? [Ed: The patent extremists and liars from Bristows think every program is just “HEY HI” (they also promote patents on programs)]

          Following on from the success of our previous Bristows Life Sciences Summit on gene editing, we hosted a thought-provoking discussion on the moral, ethical, commercial and regulatory challenges posed by artificial intelligence in healthcare.

          Chaired by eminent journalist and broadcaster Joan Bakewell, and conducted by a panel of leading experts, the debate covered some of the most pressing issues related to the use of AI in the medical field:

        • Recoveries in Patent Suits [Ed: Dennis Crouch quotes nonsense; he is lying right from the first few words; patents aren't rights and not property either. But he's funded by patent litigation firms, tainted by their financial agenda]

          A patent right is the only property which can be trespassed upon without the owner’s knowledge, in every part of the country, by an innumerable number of trespassers at the same time. The owner can neither watch it, nor protect it by physical force, nor by the aid of the police or of the criminal law. He thus necessarily requires more efficient civil remedies than those do the protection of whose property does not depend upon civil remedies alone.

        • ToolGen Files Motion to Exclude Evidence, Broad Opposes, and ToolGen Replies in Interference No. 106,126 [Ed: Latest from the nuts and greedy patent profiteers who want patents on life and nature]

          On October 1st, Senior Party ToolGen Inc. filed its Motion to Exclude certain evidence presented by Junior Party the Broad Institute, Harvard University, and MIT (collectively, “Broad”) in Interference No. 106,126. Broad filed its Opposition to ToolGen’s motion on October 8th, and ToolGen filed its Reply on October 15th.

          ToolGen’s bases for excluding evidence including Broad’s purported “best proofs” on priority were that they have not been authenticated and are thus inadmissible under FRE 901. Specifically, ToolGen raised these objections against Broad Exhibits 2526, 2530, 2533, 2535, 2536, 2563, 2565, 2566, 2581, 2582, and 2599. Some of these objections involve the date of the exhibit (e.g., Exh. 2526) which is dated after the relevant time period concerning conception and reduction to practice of the claimed invention (i.e., CRISPR achieved in eukaryotic cells). Others relate to lack of “dates, labels, or other identifying marks” (e.g., Exh. 2530, which purports to be “an image of an electrophoresis gel that Broad alleges shows a dual-molecule RNA configuration that was ‘used to target, cleave, and edit an endogenous “NTF3″ genomic target in eukaryotic cells in October–November 2011′”). ToolGen raised objections on similar grounds against Exhs. 2535, 2536, and 2563, which ToolGen asserted “are unannotated images completely devoid of identifying features” that “could be generic images from anywhere; none contain labels, captions, or descriptions that would allow a person of ordinary skill in the art (‘POSA’) to understand the alleged experiment, let alone assess whether the exhibit is what Broad claims it to be” (which are “successful single and dual-molecule systems”). Finally, ToolGen asserted that none of these exhibits were authenticated by Broad’s expert witness, Dr. Seeger who “[did] not profess to have any knowledge of the aforementioned exhibits.”

        • ToolGen Files Motion to Exclude Evidence, CVC Opposes, and ToolGen Replies in Interference No. 106,127

          In its turn, on September 17th, Senior Party ToolGen Inc. filed its Motion to Exclude certain evidence presented by Junior Party the University of California/Berkeley, the University of Vienna, and Emmanuelle Charpentier (collectively, “CVC”) in Interference No. 106,127. CVC filed its Opposition to ToolGen’s motion on October 8th, and ToolGen filed its Reply on October 15th.

        • Innovation at the Latvian Patent Office: exclusive insights [Ed: EPO- and EUIPO-connected propaganda and whitewash sits does not want you to pay attention to what happened at the Latvian Patent Office]

          In an exclusive guest post, representatives from the Patent Office of Latvia reveal the agency’s recent developments of its digital tools and services for trademark users – and those planned for the future.

        • A Rose by Any Other Name: an Australian court rules that AI can be an inventor [Ed: Australia basically embarrassed itself, internationally, by making it seem incompetent enough to think bots are "inventors" or buzzwords like "HEY HI"]

          On 30 July 2021, the Federal Court of Australia ruled that a machine – that is, a mathematical equation that analysed and processed data – can be an inventor under Australian patent laws. A world-first decision, Thaler v Commissioner of Patents [2021] FCA 879 represents a sea change in how courts assess the requirements of a “patent inventor”, opening up the real possibility that other artificial intelligence (AI) systems may enjoy similar designations.

          Below, an overview of the Thaler decision is provided, as well as an assessment of its implications if upheld on appeal. A comparison of this decision to other decisions on the issue around the world is then provided with a final word on the issues that are in play and things for the AI industry to consider.

        • Benefits And Considerations For Patent Prosecution Under Patent Prosecution Highway In The U.S., Europe, China, And Singapore [Ed: Putting patent litigation and aggression ahead of actual justice would make it harder to sell the lie that patents exist to advance science and innovation]

          Patent Prosecution Highway or PPH is a set of initiatives promulgated by participating patent offices around the world to accelerate patent prosecution in countries of the participating patent offices. PPH allows the participating patent offices to share information and to benefit from work performed by other participating patent offices, and thereby reducing examination workload and improving quality of patents.

          Under PPH, prosecution of a patent application previously filed with a participating patent office can be fast-tracked in another participating patent office if the patent application meets certain requirements. This article provides a brief overview of benefits of filing patent applications under PPH and requirements by which the patent applications must satisfy in order to participate in PPH.

        • Adjournment mania must stop: Justice Prathiba Singh

          The Delhi High Court judge says counsel must stop seeking adjournments so that judges can speed up justice delivery, while ADR is the future

        • High-growth technology business forum: Build-to-sell [Ed: EPO colluding with patent trolls’ and litigation cartel instead of science and technology. This is vendor capture, where the vendor makes nothing but lawsuits. This means that EPO became a parasite feeding off the system.]

          On 18 November, the EPO’s European Patent Academy together with the Licensing Executive Society International (LESI) held their fourth High-growth technology business forum. The forum aims to bring leading experts together to share their knowledge and provide practical insights for innovation stakeholders such as technology start-ups, scale-ups and small and medium-sized enterprises (SMEs). This event was specially designed for business decision-makers who aim to grow and sell their high-tech businesses.

        • Latest news and updates on the Unified Patent Court [Ed: Amy Sandys still perpetuates lies and fake news for people who break the law, cheat, and deceive everybody; this publisher might need to be reported for its complicity in illegal agenda]

          The Austrian parliament has adopted the provisional protocol for UPC, with no votes against the motion. It is an important step for the application phase of the UPC to start. However, the next step is the second chamber of the Austrian parliament, the Bundesrat, also voting on the protocol.

        • Majority of patent community still in favour of UPC [Ed: There is no such thing as "patent community"; it's a litigation cartel and JUVE became a shameless megaphone for this cartel]

          Now that the launch of the Unified Patent Court is looking increasingly likely again, what do its future users think of the new court?

          In September 2021, JUVE Patent asked the heads of patent departments in selected technology companies across the world, as well as lawyers and patent attorneys at major law firms with patent expertise, for their opinion. Almost 1,300 stakeholders took part in the survey.

        • DTS opens Stuttgart office with Hoeger Stellrecht patent attorneys [Ed: Some years ago JUVE became a shameless spam site of patent litigation firms; with puff pieces like these it’s not even hiding that business model shift anymore. JUVE has become no better than Watchtroll.]

          Patent attorneys Egbert Engel (46) and Joachim Happold (42) join DTS in January 2022. Both were previously partners at Hoeger Stellrecht in Stuttgart, where they also began their training. Engel and Happold are physicists and were previously active for client DLR.

        • Expert Witness In Russian Court

          As in many other countries, in Russia at the preparation stage of a patent infringement lawsuit the patent owner seeks the opinion of a sufficiently skilled technical specialist regarding use of the patented invention by the assumed infringer. Such technical specialist, which is usually a patent attorney in the beginning of a long story of infringement litigation, is expected to establish, based on available evidence, whether each and every feature of an independent claim of the patent is present in a product or process marketed or otherwise commercially used by such assumed infringer. The opinion confirming the use of the invention normally accompanies the court claim as evidence of the fact of use of the plaintiff’s invention by the defendant.

        • Soho Forum Debate vs. Richard Epstein: Patent and Copyright Law Should Be Abolished

          This is my Soho Forum debate held Nov. 15, 2021, in Manhattan, against professor Richard Epstein, moderated by Gene Epstein. I defended the resolution “all patent and copyright law should be abolished” and Professor Epstein opposed it. Oxford debate rules applied which meant that whoever changed the most minds won. My side went from about 20 to 29 percentage points, gaining about 9; Richard went from about 44 to 55%, gaining about 11, so he won by 1.7 percentage points.

        • EPO extends pilot for oral proceedings in opposition by videoconference to 31 May 2022 [Ed: EPO extends illegal practices for another half a year, after corrupting the courts to say “OK”]

          In light of the ongoing coronavirus pandemic, travel restrictions and preventive health measures limiting the parties’ possibilities to attend oral proceedings on its premises, the EPO has decided to further extend its pilot project for conducting oral proceedings in opposition by videoconference (VICO) until 31 May 2022. Where there are serious reasons against holding the oral proceedings in opposition by VICO, oral proceedings will be postponed until after that date.

          The EPO is committed to improving the tools used for conducting oral proceedings by VICO. It will continue to raise awareness and provide additional training to parties so that VICO tools become as close an approximation as possible to direct human interaction.

        • Latest news on IP and coronavirus in Europe [Ed: Amy Sandys is still just parroting lies of EPO management and she promotes crimes, an illegal agenda, then pretends this is journalism. She does the same for Team UPC]

          The European Patent Office has announced an extension to its pilot project, whereby it will conduct opposition proceedings via video, until May 2022. The EPO cites its reasoning as “travel restrictions and preventive health measures limiting the parties’ possibilities to attend oral proceedings on its premises” due to the ongoing impact of the pandemic.

        • EPO launches major patent training initiative together with the national IP offices of Portugal and Brazil [Ed: The Portuguese EPO Mafia does a PR stunt with a Portuguese-speaking office in America]

          During an online ceremony on 23 November, EPO President António Campinos was joined by Ms Ana Margarida Bandeira, President of the Council of INPI Portugal, and Mr Cláudio Vilar Furtado, President of the Council of INPI Brazil, to launch an international patent training event addressing the needs of the Community of Portuguese Language Countries. The three-day event covered a broad range of patent-related topics and was attended by more than 130 participants from Angola, Cape Verde, Guinea Bissau, Equatorial Guinea, Mozambique and São Tomé and Príncipe. It drew on synergies with the African Regional Intellectual Property Organization (ARIPO) and Organisation Africaine de la Propriété Intellectuelle (OAPI), of which some of the participants’ countries are also members.

        • #SpaceWatchGL Column: Insight Report – Quantum technologies and space [Ed: Associating oneself with corruption and crimes by liaising with the EPO is a bad idea]

          The second study resulting from this partnership titled “Quantum technologies and space” has been published on 2 November 2021. This new study addresses space applications of quantum technologies. The first study of this series, exploiting patent filing statistics in the domain of Cosmonautics, was published in July 2021.

          The Patent Insight Report “Quantum technologies and space” notes that exploitation of Quantum technologies in the space environment is a very specific use case of the technology but one that is being increasingly explored, as evidenced by several recent satellite missions.

        • Recent Danish case law on acquiescence/passivity in patent infringement actions [Ed: A poor copy-paste job by Anders Valentin (Bugge Valentin), who could not even bother to realign the text and remove the hyphens]

          On September 30th, 2021, the Danish High Court (Eastern Division) rendered its decision in a long running patent infringement case. One important element of the case was the question of acquiescence, in particular, whether the patent proprietor is required to act on a possible patent infringement (and commence legal proceedings) when opposition proceedings are pending.
          Both the Danish Administration of Justice Act (article 345) and the Danish Pa-tent Act (article 53a) specify that the court may suspend a case, if there are other ongoing cases (such as opposition proceedings), which may impact the outcome of the case. The Danish courts have interpreted the provisions such that Danish (main) patent infringements action, as a general rule, will be suspended if opposition proceedings are pending. Thus, a patent proprietor is not able to enforce a patent by way of main proceedings in Danish courts as long as opposition proceedings are pending.

          In this particular case before the Danish High Court, the patent proprietor, Sangenic, a company that manufactures diaper pails with fitting diaper cassettes, was granted a European patent, which was published in Denmark in January 2009, which then became the primary point of contention in the dispute between the parties. The defendant (alleged patent infringer), Lamico, filed an opposition against the patent on the grounds of lack of novelty and inventive step. Lengthy proceedings followed first at the EPO Opposition Division and later at the Board of Appeal. The final decision in the opposition was rendered in December 2018, where the patent was upheld.

        • Managing IP Winter 2021 is now live [Ed: Managing IP is dying; it became a download because they don't have enough subscribers, perhaps as many realise that paying to be lied to isn't worth a dime]
        • Moderna CAFC appeal could affect who gets covid vaccine revenues [Ed: Taxpayers paid for this work and these patents, so Moderna should get nothing; this is outright plunder of the taxpayers and it serves to show the inherent criminality of this system]

          The Federal Circuit yesterday heard oral arguments in IPR appeals initiated by Moderna Therapeutics. The outcome could either prevent or tee up a battle over the company’s covid-19 vaccine revenues.

        • Phase II of Brazilian PPH hits its limit | IAM [Ed: Patent extremists and profiteers would rather set aside the rule of law, due process etc. for the sake of aggressive litigation agenda]

          On 5 November 2021, the Brazilian Patent and Trademark Office (INPI) reported the end of Phase II of the Patent Prosecution Highway (PPH) programme, which has now reached its limit of 600 applications. As a result, the INPI will not accept new PPH requests for the remainder of 2021. This is good news because it demonstrates the consistent success of Brazil’s involvement in PPH programmes.

          Further evidence of this can be found in changes to the application period of Phase II (implemented on 29 December 2020 by Ordinance 404/2020). Phase I of the PPH Programme was already considered a triumph as it had reached its limit of 400 applications in December 2020. At that time, the INPI decided to anticipate the implementation of Phase II, which was originally expected to begin in December 2022, by moving up the launch to 1 January 2021. It was then designed to run until 31 December 2024.

        • USPTO News Briefs [Ed: Office hijacked by the Microsoft religion, but delays implementation due to backlash]

          In a notice published in the Federal Register earlier today (86 Fed. Reg. 66192), the U.S. Patent and Trademark Office announced that it was delaying the effective date for assessment of the fee for filing patent applications that are not in the DOCX format. The new fee, which was announced by the Office on August 3, 2020, was set to take effect on January 1, 2022, but will now become effective on January 1, 2023. The fee is set forth in 37 C.F.R. § 1.16(u), which requires an additional charge of $400 for large entities, $200 for small entities, and $100 for micro entities, for any application filed under 35 U.S.C. § 111 for an original patent (except for design, plant, or provisional applications), where the specification, claims, and/or abstract does not conform to the USPTO requirements for submission in DOCX format.

        • Written Description: Four Points Are Not A Range

          IPR challenges are limited only to obviousness and anticipation arguments, and so a patent cannot be directly challenged via IPR for lack of enablement or written description. However, Section 112(a) issues do arise in situations where the challenged patent purports to claim priority back to a prior filing. The priority claim fails if the earlier filing fails to support the challenged claims, and this permits assertion of intervening prior art.


          Slip Op. Although the ranges were not supported, the court did find sufficient evidence to affirm the PTAB’s determination that the individual point of “about 48.2 wt %” was supported by the original specification: “given that claim 8 does not recite a range, but only a specific amount, which can be derived by selection and addition of the amounts of selected, but identified, components, we accept that there is substantial evidence to support the Board’s decision concerning claim 8.” Without that priority, the claims were clearly invalidated by prior art published between 2009 and 2015.

        • Zynerba Pharmaceuticals further boosts patent portfolio for its Zygel CBD gel [Ed: More fake 'journalism' or rewritten press release disguised as "report"; there's no such thing as "EU patent." The people who type this have no clue. It's also not "IP".]

          Zynerba Pharmaceuticals Inc (NASDAQ:ZYNE) Inc reported that it has further expanded its intellectual property (IP) portfolio covering its Zygel CBD skin gel, with the award of an EU patent.

        • Zynerba Pharma pops 4% after securing new European patent for Zygel CBD [Ed: EPO granting monopolies or patents on narcotics; it's all just a festival of patent-granting, no matter the impact of such patents. The EPO operates outside the rule of law for years. It's like a cartel or part of a cartel.]
        • Zynerba Pharmaceuticals Announces Issuance of New Patent in EU for Zygel [Ed: Someone needs to explain to Zynerba that its press release is fake news because it didn't get EU patents; EPO is not EU.]
        • Zynerba Pharmaceuticals Announces Issuance of New Patent in EU for Zygel™ [Ed: Zynerba does not even know what it is applying for. EPO and EU are not the same thing; last I checked, for instance, Turkey wasn't in EU.]
        • Software Patents

          • Dolby AV1/HEVC patent opposed in Japan [Ed: Well, it’s important because they’re attacking GNU/Linux distros [1, 2]]

            On November 18, 2021, Unified Patents filed a Japanese opposition against JP6875333, owned by Dolby International AB. JP’333 has been designated essential to the HEVC Advance pool and SISVEL’s AV1 pool. It is also related to patents that have been designated in those pools.

          • FOSS Patents: Computer-implemented inventions must make direct impact at execution time as opposed to organizational recommendations for design time: patent-eligibility

            In its weekly roundup, IAM (Intellectual Asset Management magazine) noted that “[p]atent suit numbers are falling in Dusseldorf and Mannheim but are on the rise in Munich as the city’s courts develop a strong pro-plaintiff reputation.” I’d like to comment on that, also because I reported on the premiere session of the Munich I Regional Court’s third patent litigation division (the 44th Civil Chamber under Presiding Judge Dr. Georg Werner) last week. If you wish to skip directly to the part on software patent-eligibility in light of Solas OLED v. Samsung, please click here.

            Munich is definitely an attractive venue for patent holders, and that is so for a variety of reasons not least including the one noted by IAM. The Munich court still does throw out or stay cases that don’t meet a certain standard, and that’s why the first case the 44th Civil Chamber heard appears, for now, unlikely to be the first in which it will grant an injunction. I’ll get to the fundamental weakness of the patent-in-suit in that Solas OLED v. Samsung case again in a moment–the headline of this post relates to it.

            If we assumed for discussion purposes that better-than-average chances of winning favorable rulings are a major factor in this, then Munich would simply be beating Dusseldorf at its own game. For many years–actually, a couple of decades–it was no other court than the one in Dusseldorf that consistently and shamelessly set a low bar, only to attract as many patent cases as possible to a city that is anything but a major center of technological innovation, as opposed to the Munich area with BMW, Siemens, Linde, and so many others. Comparing Munich to Dusseldorf is like Silicon Valley vs. Chicago at best, Pittsburgh at worst.

            By the time I got involved with patent policy (2004, the European legislative process on computer-implemented inventions aka software patents), Dusseldorf already had a reputation for disadvantaging defendants in different ways. I know this from discussions with patent litigators and patent attorneys in the mid-2000s, and I know there was at least one German media report at the time that discussed the issue.


            It’s really astounding that whoever examined that patent application at the German Patent & Trademark Office failed to see that there was no such thing as a technical effect. It’s about a coding style and mere probabilities of whether programmers will do a better job one way or the other. It’s not about a specific process implemented in software and yielding per se technical benefits.

            If the mere proposal to break up a complex software development problem into smaller building blocks because they’re easier to digest for the human mind and save the effort of reinventing the wheel was patent-eligible without specific execution-time benefits, we’d see a deluge of additional patent infringement cases against the entire technology industry.

          • $4,000 for Be-Labs prior art

            On November 8, 2021, Unified Patents added two separate PATROLL contests with an opportunity to collect up to $4,000 in cash for prior art on at least claim 1 of two patents, U.S. Patent 7,827,581 and U.S. Patent 9,344,183, owned by inventor-backed NPE, Be-Labs, Inc. Each patent relates to a wireless multimedia center (WMC) for reception from one or more signal sources and for distribution of segments of signals from signal sources through the wireless multimedia center to a plurality of end units, in which the signals include video signals and broadband data. Both patents have been and are currently being asserted in over 70 district court litigations against companies such as Verizon, Samsung, Technicolor, Cox Communications, Cisco, Fujitsu, Netgear, and others.

          • Gesture Tech patent likely invalid

            On November 22, 2021, the Patent Trial and Appeal Board (PTAB) instituted trial on all challenged claims of U.S. Patent 7,933,431, owned by Gesture Technology Partners, LLC. The ‘431 patent is generally related to using human motion as an input device for computers and mobile devices and has been asserted against Huawei, Samsung, Apple, Lenovo, and LG.

          • Another CommWorks Solutions patent challenged

            On November 22, 2021, Unified Patents filed an ex parte reexamination against U.S. Patent 6,832,249 owned and asserted by CommWorks Solutions, LLC, an NPE and subsidiary of IP Investments Group LLC. The ’249 patent is generally directed to multi-layered internet communication systems that allow for control over quality of service and priority of information delivery. It is being asserted against Comcast and RCN Telecom and is at issue in a declaratory judgment action brought by Altice USA. It was also previously asserted against Skybeam, Mediacom, AMG Technology Investment Group, Consolidated Communications Holdings, and Cable One, Inc.

          • IP Edge entity Invincible IP patent challenged

            On November 18, 2021, Unified filed a petition for inter partes review (IPR) against U.S. Patent 9,678,774, which is owned and has been asserted by Invincible IP LLC, an IP Edge entity. The ’774 patent relates to allowing or denying migration of virtual machines based on the geographic location of the target host. It has been asserted against Citrix Systems, Nutanix, Alibaba Cloud US, DigitalOcean, and NetApp in the District of Delaware.

          • Patent-Eligibility of Computer-Implemented Inventions – Appeals Court Says an ‘Advance in Computer Technology’ is Required [Ed: When you are a patent attorney you want to shoehorn illegal patents on software because you do not actually code but rip off actual coders]

            In a unanimous decision – Commissioner of Patents v Aristocrat Technologies Australia Pty Ltd [2021] FCAFC 202 – a Full Bench of three judges (Middleton, Perram and Nicholas JJ) of the Federal Court of Australia (‘Full Court’) has reversed last year’s ruling by Justice Burley that claims directed to a so-called ‘feature game’ implemented on an electronic gaming machine (EGM) constituted a patent-eligible ‘manner of manufacture’ under Australia law. (A ‘feature game’ is a secondary, or bonus, game triggered by the occurrence of a defined event in the ‘base’ game of spinning reels.) As I explained at the time, Justice Burley applied a two step test, asking firstly whether ‘the claimed invention is for a mere scheme or business method of the type that is not the proper subject matter of a grant of letters patent’ and then – if this question is answered in the affirmative – ‘whether the computer-implemented method is one where invention lay in the computerisation of the method’ as opposed to ‘merely plugging an unpatentable scheme into a computer’. He found the claims to be patentable at the first step, because they were directed to ‘a mechanism of a particular construction’, i.e. a gaming machine.


            There are positive and negative aspects to this decision. On the plus side, the approach taken by the majority brings some clarity to the approach to be taken in construing and assessing claims to computer-implemented inventions, which often comprise a physical apparatus defined in terms of (possibly conventional) hardware, configured via software for particular functionality. On the down side, however, the majority also relied upon the existence of ‘an advance in computer technology’ to confer patent-eligibility upon a computer-implemented invention, without providing clear guidance on what, exactly, is covered by this terminology. The decision also perpetuates an uncertainty that exists around the exact role to be played by prior art information in applying the ‘manner of manufacture’ test to assess patent-eligibility.

      • Trademarks

        • How ‘always-never’ rules can help brands battle counterfeits [Ed: Speaking to malicious companies' lawyers to write articles would result in malicious posts that are more like lobbying than journalism]

          Counsel at Coty, Starbucks and Otterbox explain how always taking down products with certain characteristics can help them and their vendors catch fakes

      • Copyrights

        • The UK Copyright (Rights and Remuneration of Musicians, Etc.) Bill

          Readers may have followed the IPKat reports on the UK DCMS Select Committee Streaming Inquiry [here], which took place in October 2020. After reviewing more than 300 pieces of evidence, the Select Committee published its recommendations in July 2021. The Government response, published in September 2021, acknowledged a concern that the UK regulatory framework has not kept pace with the changes brought about by streaming.

          At the same time, one of the DCMS Select Committee members, Kevin Brennan MP, sponsored a Private Members’ Bill, which proposes to introduce legislation giving effect to some of the recommendations made by the Committee, namely equitable remuneration for streaming, contract adjustment, right of revocation and transparency.

        • Google litigation chief speaks out on SCOTUS case and IP vision

          Renny Hwang, director of litigation at Google, tells Managing IP about the greatest challenges in Google v Oracle and what he wants from outside counsel

        • Book review: Performing Copyright: Law, Theatre and Authorship [Ed: Luke McDonagh did write some interesting things before the UPC died]

          This is the first academic monograph that solely considers the relationship between UK copyright law and historical and contemporary theatre. It focuses on authorship of the copyright in stage plays as dramatic works, texts that can be performed from a script (rather than musical theatre, dance, or performers rights). The book addresses questions of whom is the author and first owner of a dramatic work? Who receives the credit and the licensing rights? In what circumstances can a director or actor be granted joint-authorship with the writer? What happens when a copyright infringement claim is made against the playwright? And who poses moral rights in the work?

          The monograph is presented in six chapters. Chapter one, ‘Introduction to Copyright and Authorship on Stage’, sets out the rationale and theoretical approach of the research, highlighting that dramatic works are allographic, meaning that they attain their ideal expression in performance, whereas the printed text is, by contrast, often seen as secondary or not as authoritative as the performed text in action. McDonagh takes his primary inspiration for the theories of authorship and the work from Roland Barthes and Michel Foucault, to outline the multi-faceted, and even poly-vocal, nature of theatrical authorship. This chapter also describes the methodology for the qualitative empirical research that involved 20 interviews conducted during 2011-13 with participants from the theatre community including actors, playwrights, directors, and producers.

        • Case Report: BASF Corporation & Ors v Carpmaels and Ransford [Ed: When you pay patent lawyers who work against your own interests]]

          The claimants in this case claimed to have suffered US$1.2bn in lost profits from the defendant’s accepted failure to file an appeal in time against a patent revocation. In an interesting judgment dated 29 October, Mr Justice Adam Johnson held that the claimants failed to establish that a duty of care was owed to those entities who suffered the most substantial losses and failed to prove that their lost chance of securing some benefit from the patent, had an appeal been filed, was “real and substantial”. As such, the Judge held the claimants were only entitled to “nominal damages” because of the accepted breach of duty.

          This article provides a summary of the case and the decision which highlights the importance of ensuring that ‘all the boxes are ticked’ in relation to causation when pursuing a loss of chance claim.

        • New report suggests ‘upward trajectory’ for bioplastics and chemical recycling innovation [Ed: EPO bribery budget for PR puff pieces has not run out; the greenwasing campaign for a deeply corrupt institution carries on and on]

          On this note, Japan – along with Europe and South Korea – seems to be driving the current trend of rising patent filing activity. BASF, a German-based company, and Korea’s LG Chemical currently lead in patent activity outside of Japan. The European Patent Office’s recent report on plastic recycling and bioplastics similarly suggests that patent activity is focused in Europe, as well as the US.

        • Indian publishers call for overhaul of copyright fair use

          Academics and publishers demand lawmakers take a balanced approach when amending the fair use provision of India’s Copyright Act

        • ‘At least Google it!’ Counsel give pre-launch Christmas advert tips

          Basic due diligence is a must before launching a Christmas campaign, but publicity can sometimes be a factor in these disputes

Links 28/11/2021: Laravel 8.73 Released, GitHub Offline for Hours

Posted in News Roundup at 8:33 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Linux Is Everywhere: 5 Places Where You Didn’t Know It’s There

        Have you every wondered where is Linux? What key sectors does it power and in what areas is it commonly used?

        Many people, to this very day, think that Linux is nothing more than a server operating system for advanced users, and nothing more. But that’s not true.

        Linux can be found in unusual places that you may have not known before, and in today’s article we’ll be seeing some of these places.

    • Server

      • AuriStor breathes life into Andrew File System – Blocks and Files [Ed: Financial ripoff; AuriStorFS is also limited to an operating system with NSA back doors so it's money down the sewer.]

        Andrew File System developer AuriStor updated attendees at an IT Press Tour briefing about its work on the file system with an HPC and large enterprise customer base dating back 16 or more years.

        AuriStorFS (a modern, licensed version of AFS) is a networked file system providing local access to files in a global namespace that has claimed higher performance, security and data integrity than public cloud-based file-sharing offerings such as Nasuni and Panzura.

        AuriStor is a small and distributed organisation dedicated to expanding the popularity and cross-platform use of AuriStorFS.

    • Audiocasts/Shows

      • GNU World Order 436

        **Slacktrack** and **SCons** from the **d** software series.

      • This Week in Linux 177: Steam Autumn Sale, NVIDIA, carbonOS, Stargate, Arch Linux, Amazon Linux | TuxDigital

        On this episode of This Week in Linux, Steam Autumn Sale 2021 & Steam Awards, NVIDIA Image Scaling SDK 1.0, Godot Engine Plus AMD’s FSR, German State Switch To LibreOffice & Linux, carbonOS 2021.1 Alpha, Venus: Virtual Vulkan Driver On QEMU, Stargate Digital Audio Workstation, Wireshark 3.6, Archinstall 2.3, Amazon Linux Rebased on Fedora Linux, Alpine Linux 3.15, Endless OS 4.0, and Deepin Linux 20.3. All that and much more on Your Weekly Source for Linux GNews!

    • Linux Magazine

    • Applications

      • Wireshark 3.6.0

        Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable, just like a voltmeter is used by an electrician to examine what’s going on inside an electric cable (but at a higher level, of course). In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed. Wireshark is perhaps one of the best open source packet analyzers available today.

    • Instructionals/Technical

      • How to Install Asterisk VoIP Server on Debian 11 | 10 – Linux Shout

        In this tutorial, we will discuss some of the steps and commands to install the Asterisk VoIP server on Debian 11 Bullseye or 10 Buster using the terminal to call over Android or iPhone using a local network.

      • How to Install PyCharm on Debian 11 Bullseye

        PyCharm is a dedicated Python graphical IDE (Integrated Development Environment) popular amongst Python developers with its wide range of essential tools such as analyzing code, debugging, and integration. The IDE also comes with the command line, connects to a database, creates a virtual environment, and manages your version control system (Git).

        In the following tutorial, you will learn how to install PyCharm Community, Professional or Educational, with Flatpak or Snapcraft (Snap) on Debian 11 Bullseye.

      • Install apps on Linux with Flatpak | Opensource.com

        Computer applications consist of many small files that are linked together to perform a set of tasks. Because they get presented as “apps,” colorful icons in the menu or on a desktop, most of us think of applications as a single, almost tangible thing. And in a way, it’s comforting to think of them that way because they feel manageable that way. If an application is actually the amalgamation of hundreds of little library and asset files scattered throughout your computer, where’s the application? And existential crisis aside, what happens when one application needs one version of a library while another application demands a different version?

      • Easily Install PowerDNS Admin on Debian 11/Debian 10 – kifarunix.com

        In this tutorial, you will learn how to easily install PowerDNS Admin on Debian 11/Debian 10. PowerDNS Admin is a web administrative interface for PowerDNS. It enables you to easily create and manage DNS zones from a web browser.

      • See, Multi-Account Containers extension is not needed to use Containers in Firefox – LinuxBSDos.com

        That last bit about integration with Mozilla VPN is new and can be useful in some edge situations. But we won’t get into that in this article. Let’s just focus on Containers. Like I said earlier, I’ve always relied on the Firefox Multi-Account Containers extension because I thought that was the easiest method of managing Firefox containers. But what I didn’t know is that the features that the Firefox Multi-Account Containers bring to the table are already built into Firefox Core, so all that’s needed to make them shine is to just make 2 changes in the Firefox via about:config.

        Those 2 changes will give me the same functionalities as the Firefox Multi-Account Containers. So that’s what I’m going to show you show to do in this post. To begin, open a tab and type about:config in the address bar. After clicking through whatever prompt or warning it throws up, type privacy.user in the search bar. The two preferences you’re looking for are privacy.userContext.enabled and privacy.userContext.ui.enabled. Figure 2 shows both preferences in their default state – false. Notice that if you long left-click the new tab (+) button before installing the Firefox Multi-Account Containers extension and with both preferences in their default state, that noting happens.

      • [Old] Migrating Technical Docs from Jekyll to Hugo+Docsy

        Recently, I migrated Graphviz’technical documentation from the Jekyll static site generator to the Hugo static site generator, and specifically the Docsy Hugo theme for technical documentation.

        I thought it would be straightforward to move static site generators, but it turned out rather difficult, so perhaps it’s worth writing about. Good technical doc infra is underrated. I hope this will be useful to write about for anyone considering a move from Jekyll to Hugo, or anyone interested in an evaluation of Docsy.

      • Log backtraces at obfuscated Android methods

        If you have the source code to the app, and the app is in debug mode (not obfuscated by ProGuard), this is easy: open Android Studio, click in the left-margin of the source code to add a breakpoint, untick the “Suspend” checkbox and tick the “Logging Options – Stack trace” checkbox.

      • Simple network dashboard with vnstat

        Hi! If you run a server or a router, you may want to have a nice view of the bandwidth usage and statistics. This is easy and quick to achieve using vnstat software. It will gather data regularly from network interfaces and store it in rrd files, it’s very efficient and easy to use, and its companion program vnstati can generate pictures, perfect for easy visualization.

      • The Pagination Predicament

        Previously there were 10 posts to a page, then you had to click through to the next page to see more posts. I have nearly 250 posts on this site now; ain’t no-one got time to be wading through 25 pages of blog posts!

        So now, all my posts render on a single page. To help you further, posts can be filtered by category at the top of the main blog page.

        Since I don’t have any featured images being displayed in my posts feed, the page still loads really quickly. Even when rendering ~250 posts.

      • How we use the SLURM job scheduler system on our compute servers

        Our motivation for using SLURM at all is that we have a pool of compute servers of varying capacity, and some GPU servers as well. A few of these compute servers are general login servers, but the problem with these is that they’re a free for all; anyone can log in at any time and start using CPU (and perhaps memory, although that can’t be fair-share scheduled so it’s first come, first served). Traditionally people have wanted to reserve some dedicated amount of resources that are theirs for some amount of time. Well, SLURM does that.

      • Why region based memory allocation help with fragmentation

        Overall, I think we can say that region allocation reduces fragmentation by making the order of allocating and freeing memory less important. If you intermix allocating a bunch of different sized objects and then don’t free all of them (or delay freeing them for a long time), in a simple allocator you wind up with allocated holes in your free ranges. In a region allocator, those different sized allocations go to different regions, and failing to free all of the objects of one size (in one region) doesn’t cause problems for other regions of other sizes.

      • Computation that needs to be “secure” is everywhere in practice

        The problem is that we have wound up with a lot of things on our devices that we want to keep confidential, or in another perspective we’ve wound up in a world where a lot of untrusted things have an inordinate amount of access to our devices. Cryptographic keys are the tip of the iceberg; there are also access tokens in the form of cookies, JWTs, and all of the other forms they take, URLs that we visit, apps that we use, what we type on the keyboard, and on and on and on. We are barely keeping up with identifying what’s sensitive and needs to be kept confidential, never mind actually controlling snooping on it.

      • How to Install phpMyAdmin on Debian 11 Bullseye (Apache) – Linux Shout

        PhpMyAdmin is an open-source web-based application that offers a web interface to directly manage and access MySQL or MariaDB databases from anywhere/remotely using a web browser. The user can use the web graphical user interface provided by it to interact with databases without having extensive knowledge of the commands. Hence, even a newbie with some knowledge of computers can manage database tables for querying data and manipulating individual parameters.

      • How to reset or refresh Firefox

        Browsers can be customized; you can change the way they look by installing themes and you can add or extend features by installing add-ons. Firefox is no different. In fact, Firefox offers users access to more customization options than most other browsers.

      • Install and setup Steam on Manjaro Linux

        Steam is a digital game distribution platform for gamers developed by Valve (a well-known game developer). It provides cross-platform support and can be used to buy, play thousands of games. To use Steam, users have to create an account, and they can access the same games on various computers. Steam was initially launched in 2003; since then, they have focused on providing Linux-based systems support.

        Apart from providing games on Steam, users can also enjoy the voice/text chat feature. However, it is not necessary that these chats are related to the games only. The steam app is free to download, and along with paid games, it offers hundreds of free-to-play games as well. Many games now natively support Linux; in this guide, we will provide an installation process as well as the instructions to set up steam on Manjaro Linux.

      • How to fully disable the Firewall on Linux Mint

        A firewall is a network security system built into an operating system that monitors and manages network traffic according to preset rules. The firewall also aids in the monitoring of networks to determine whether they are trustworthy or not. They also protect your PC from hackers by filtering dangerous network traffic.

        The uncomplicated firewall (UFW) in Linux Mint provides a user-friendly interface for managing firewall rules. Its main goal is to make firewall rule management as simple as possible, as the name suggests. Although it is recommended that you keep the firewall turned on, there may be times when you need to disable it, such as when troubleshooting or testing. So this article will provide you the details on how you can disable a firewall on Linux Mint.

      • How to extract rar files on Manjaro

        RAR is a file format used to combine multiple files/folders in a single compressed file. The .rar file extension refers to the RAR files, and several applications can create these files. The RAR file format is practiced compressing files used for various purposes like you can keep various types of files inside one compressed file. These compressed files are then extracted to access the files contained by them.

        The rar files can be extracted by using the graphical interface and terminal support of Manjaro. In Linux-based systems, unrar command-line utility is required to extract .rar files.

        In this piece of writing, we have provided possible ways to extract rar file in Manjaro Linux. As the interaction with rar files is impossible without the unrar package. So, we will also provide the installation procedure of the unrar package as well.

      • How to enable remote access in Manjaro Linux

        Enabling remote access is crucial when you need to permit your office members to work from the branch office, home or when you want to hand over your system to the IT teams for troubleshooting purposes. However, when you want to access your own Linux-based system from anywhere, any time, without the hassle then the ideal way is to utilize remote desktop software or SSH.

        This post is all about how to enable remote access on Manjaro Linux. For this purpose, we will first use SSH and then show you the procedure of installing and configuring Chrome Remote Desktop to establish a remote connection between your Manjaro system and mac. This post will also discuss some other remote desktop software for a Linux system. So, let’s start!

      • How to enable SSH on Linux Mint

        Enabling SSH on Ubuntu is one of the first things you should do after installing the operating system as it provides an encrypted network protocol for safeguarding remote server and client logins. It allows you to access your machine remotely and execute operations securely. It encrypts all client-server traffic to prevent eavesdropping, connection hijacking, and other types of attacks.

        Secure Shell (SSH) protocol is used to manage or transmit data between computers through the internet. Old methods for accomplishing these actions, such as telnet do not have these capabilities. They are unsafe since they transmit the user’s password in plaintext. It offers a secure route over an unprotected network, connecting an SSH client program to an SSH server in a client-server architecture. It is mainly used to communicate to Unix-like operating systems, although it may also be used on Windows.

      • How to add a user on Linux Mint

        Linux is reliable and secure compared to other operating systems, yet granting complete permissions to an unskilled user might lead to severe difficulties. This is where the administrator took control, one of the most important aspects of being a system administrator is user management. Because there are so many critical components to administrate, even the tiniest error can result in the intruders taking over the entire system. The system administrator can create, add and give each user a separate set of permissions. When a user is added or created, the appropriate level of access is granted to that user. Adding a user on Linux Mint can be accomplished in two ways; through the terminal and through GUI.

      • How to Set Up a Synology Drive Server and Synology Drive Client

        Synology Drive is an alternative to OneDrive and Google Drive. You can upload files to your Synology Drive, share files, create documents, sync files between your computer and Synology Drive, and back up files from your computer to your Synology Drive.
        Each user of your Synology NAS can have their own Synology Drive and the files they create on their own Synology Drive are not accessible to other users by default. Each user can use Synology Drive from a web browser. Users can also sync and back up files using the Synology Drive Client desktop app.

        To use Synology Drive, you will have to install the Synology Drive Server package on your Synology NAS. Once installed, your NAS will become a productivity and collaboration powerhouse.

        In this article, I will show you how to set up and configure Synology Drive Server on your Synology NAS, install Synology Drive Client on Windows and Ubuntu operating systems, and use Synology Drive Client to sync and back up files. So, let’s get started.

      • How to Disable Comments on WordPress

        This brief tutorial explains how to disable comments on WordPress sites in different and simple ways.

        After reading this tutorial, you will get rid of comments on all your WordPress posts or on specific posts. All instructions explained in this article to remove comments from WordPress posts contain screenshots and can be followed by low and medium-level WordPress users.

      • What is a Tar File

        Tar is a powerful archiver that is frequently used for collecting files and archiving them. It was created to produce archives for data storage on tapes, thus the name “Tape Archive”. It was initially included in UNIX version 7 in 1979, and it is currently accessible on a variety of systems.

        Before we go into the situation’s specifics, let’s define Archive files so that no Linux newbies are left out. Archived file is a combination of multiple files with metadata information. By combining multiple files and their information into a single file, you may improve the storage and mobility of your data. The basic purpose of Tar is to combine the data but you can also compress the data using other utilities. These compressed files are referred to as Archive files, and they assist users to reduce file size and simplify data management. The tar is one of the must-have utilities for managing various files in Linux.

    • Games

      • Godot 4.0 Progressing On Its Multiplayer Capabilities

        In addition to Vulkan support and a lot of graphics renderer work happening for Godot 4.0, adding to the expansive feature list is improved multi-player capabilities.

        A prototype implementation of Godot multi-player scene replication support is ready and more functionality is being worked on as part of Godot 4.0. Godot to date has provided RPC-based messaging for multi-player games but hasn’t itself provided a common mechanism around scene/state replication. With this new code being worked on, there is now an out-of-the-box solution and should be extensible for use by different games while being easy to use on the part of the game developers.

    • Distributions

      • Cross-platform package building: Pkgsrc vs. Ravenports (1/2)

        This is the first of a two articles on cross-platform package management / package building. It covers the basics by discussing why it is actually surprisingly (to many people) difficult to do and what some of the problems are. It also takes a quick look at some strategies to solve the problem.

      • IBM/Red Hat/Fedora

        • Top 8 alternative desktops for Fedora and how to install them | FOSS Linux

          Are you looking for a way of giving your Fedora distro a new look and feel? If so, here is how to install a new Linux desktop environment on your Fedora and which ones are worth testing. Ideally, there are over 30 diverse desktop environments and window managers available for this distro. However, this article will break down the eight excellent desktop environments for you and cover how to install and switch between them in just a couple of minutes.

          Today, the most common desktop environment is probably GNOME and KDE Plasma. GNOME comes as the default desktop environment for Fedora, but that does not exempt you from installing the operating system with KDE plus a few other desktop environment alternatives by utilizing one of the many Fedora spins.


          Alternative window managers and desktop environments are readily available in this distro’s (Fedora) software repositories. Many may wonder what may be the difference between a desktop environment and a Windows manager. What distinguishes the two is the inclusion of apps and utilities. Windows manager is responsible for the placement of windows, how they interact with one another up to the point of their appearance.

          While, the desktop environment is responsible for the toolbars, panels, and all the little tools we do not take seriously on our desktops. Some tools include the clipboard manager and applets that permit us to control our network connections or maneuver between virtual desktops. For instance, GNOME and KDE come with their applications such as terminal programs, email clients, file explorers, and calculators. So, when you install one of these environments, you will also get all of the apps that ship with it.

          Below is a compiled list of the eight most popular desktop environments that you can opt for if you are a Fedora user. Along with them are the DNF commands to help you install the preferred one to your machine or instead remove them, which is entirely up to you, mate. Without further to-do, let us delve right into the list.

        • Fedora 35 Mini-Review On The Blackbird And TALOS II

          My conclusion is damning with faint praise: at least it wasn’t any worse. And with these tweaks it works fine. If you’re on F34 you have no reason not to upgrade, and if you’re on F33 you won’t have much longer until you have to (and you might as well just jump right to F35 at that point). But it’s still carrying an odd number of regressions (even though, or perhaps despite the fact, the workarounds for F35 are the same as F34) and the installation on the T2 was bumpier than the Blackbird for reasons that remain unclear to me. If you run KDE or Xfce or anything other than GNOME, you shouldn’t have any problems, but if you still use GNOME as your desktop environment you should be prepared to do more preparatory work to get it off the ground. I have higher hopes for F36 because we may finally get that float128 update that still wrecks a small but notable selection of packages like MAME, but I also hope that some of these regressions get dealt with as well because that would make these updates a bit more liveable. Any system upgrade of any OS will make you wonder what’s going to break this time, but the most recent Fedora updates have come off as more fraught with peril than they ought to be.

    • Devices/Embedded

      • Open Hardware/Modding

        • How I Built a Homelab on the Budget

          In my previous article, I discussed what is a Homelab and why you should (or should not) have one for yourself.

          Now, can anyone who wants or need, have a homelab? It depends on several things but money or resources can be worked around. In this article, I will explain how I have managed to have my own Homelab without investing a fortune in it. As a matter of fact, it costed me less than US $1,000 and it works good enough to manage my home’s infrastructure requirements.

          That being said, it is important to mention as a disclaimer: this article doesn’t describe the best way to do things. It just describes how I manage to make it work even knowing there are some issues and risks with it but for now, I am fine to live with these.

        • Want Octoprint But Lack A Raspberry Pi? Use An Old Android Phone | Hackaday

          3D printers and Octoprint have a long history together, and pre-built images for the Raspberry Pi make getting up and running pretty easy. But there’s also another easy way to get in on the Octoprint action, and that’s to run it on an Android phone with the octo4a project.

        • This Raspberry Pi Mini ITX Board Has Tons Of IO | Hackaday

          The Raspberry Pi now comes in a wide variety of versions. There are tiny little Zeros, and of course the mainstream-sized boards. Then, there’s the latest greatest Compute Module 4, ready to slot on to a carrier board to break out all its IO. The Seaberry is one such design, as demonstrated by [Jeff Geerling], giving the CM4 a Mini ITX formfactor and a ton of IO. (Video embedded after the break.)

          The Seaberry sports a full-sized x16 PCI-E port, with only 1x bandwidth but capable of holding full-sized cards. There’s also four mini-PCI-E slots along the top, with four M.2 E-key slots hiding underneath. The board then has a M.2 slot in the middle for NVME drives, and x1 PCI-E slot hanging off the side.

        • 2021 Open Source Pay-it-Forward Pi Giveaway

          To solve both problems, I’m doing a giveaway—to enter to win one of any of the pictured items below (and maybe a few others I can find lurking in my office), just donate or say thank you to any open source project or maintainer, then submit your entry.

        • Mini-ITX Seaberry adds 11 PCIe slots to a Raspberry Pi

          But it’s definitely a specialty board. People who need a low-power ARM-based development or experimentation platform could use this board like I do, to test more exotic configurations on the Pi. And it’s looking like it will be the first commercially-available (though not cheapest) ways to install a Pi into a standard desktop or rackmount PC case, since it’s mini ITX.

        • xa 2.3.12

          I’ve updated xa, André Fachat’s venerable 6502 cross-assembler, to version 2.3.12. This contains a bug fix for a regression in 65816 mode which I’d meant to release earlier but got sidetracked on (thanks Samuel Falvo for the nice test case, which is also incorporated into the suite). As with prior versions it is tested on pretty much all of my Un*x-alike systems here including AIX, Mac OS X (PowerPC, Intel and Apple Silicon), NetBSD/mac68k and Linux/ppc64le. I said this before for 2.3.11 but one more time for the record: this will probably be the last in the exceptionally long-lived 2.3 series before 2.4, which as I keep warning you will definitely have some minor compatibility breaks and jettison a couple long-deprecated options and syntaxes (but will have some new features to make up for it). Again, more to come on that.

    • Free, Libre, and Open Source Software

      • Trends That Defined Open Source This Year
      • Web Browsers

        • Mozilla

          • Waterfox G4.0.3.1 update released with fix for bootstrapped extensions, menu bar issues [Ed: It's irresponsible to promote Waterfox in any way. It's covertly owned by a surveillance company, System1.]

            Waterfox has been updated to version G4.0.3.1. This release fixes some issues that users had reported in the previous build.

            Version G.4.0.2 of the web browser, which shipped at the beginning of this month, had a bug that prevented the installation of bootstrap add-ons. Waterfox would throw out an “addon is corrupt” error message, when users tried to install the legacy extensions. Waterfox G4.0.3.1 update resolves the issue. The latest version also patches a bug that was preventing previously installed bootstrap add-ons, from loading upon the next restart, they were getting disabled by the application.

            You may have come across an issue in Waterfox G 4.0.2, that caused the menu bar to be displayed partially off the screen, in maximized mode. It also resulted in tabs listed on the menu bar. Both of these issues have been fixed in Waterfox G4.0.3.1. Users who wish to use bootstrap extensions, can find forked versions of some popular add-ons at this page. The update introduces a patch for a problem that was preventing the Copy Tab Link option from working. There is still no option to toggle the menu bar icons.

      • Productivity Software/LibreOffice/Calligra

      • Education

        • Computer Science was always supposed to be taught to everyone, and it wasn’t about getting a job: A historical perspective

          C.P. Snow’s chapter (with Norbert Wiener of Cybernetics as discussant) predicted a world where software would rule our lives, but the people who wrote the software would be outside the democratic process. He wrote, “A handful of people, having no relation to the will of society, having no communication with the rest of society, will be making decisions in secret which are going to affect our lives in the deepest sense.” He argued that everyone needed to learn about computer science, in order to have democratic control of these processes.


          I completely buy the necessity part and the basic skill part, and it’s true that CS can provide economic opportunity and social mobility. But that’s not what Perlis, Simon, Newell, Snow, and Forsythe were arguing for. They were proposing “CS for All” decades before Silicon Valley. There is value in learning computer science that is older and more broadly applicable than the economic benefits.

        • Open LMS Launches Pro-Bono Partnership With Pancare Foundation

          As part of the partnership, Open LMS will provide Pancare with its open-source learning platform for Pancare’s volunteer training program, helping the foundation enable, engage, and mobilize a growing volunteer workforce while providing additional support for those suffering from GI cancers.

      • Public Services/Government

        • A German State Is Saying Goodbye Windows – neritam

          Schleswig-Holstein, the northernmost state in Germany, has plans to move almost entirely open source. By the time the dust settles, the regional government will have all but dropped Windows, Microsoft Office, Zoom and other proprietary software for Linux, LibreOffice, OnlyOffice, and Jitzi. By the end of 2026, Microsoft Office is to be replaced by LibreOffice…

      • Programming/Development

        • CAPLin framework to build a SocketCAN node application in C

          The SocketCAN functionality, combined with the can-utils programs, enable you to view, interact and analyze the CAN bus traffic on Linux. However, these tools are no match for high-end tools such as Vector CANalyzer and CANoe under Windows. I especially miss CAPL scripts on Linux. For this reason I developed the CAPLin framework. With CAPLin you can quickly build a SocketCAN node application in the C programming language.

        • [Old] Thoughts on how to find remote work in Cameroon

          Remote work is the new norm there has never been a time like this, where as a SE you can make more than a decent living. This isn’t a know-it-all kind of post, I just wanted to write a bit about my experience, but it’s way too long (6 months+) so I will just share what worked and not for me. Before I forget, this is mainly for people like me doing computer science for the sake of doing it. Not because someone forced us or whatever. In short, geeks I guess. If you’re like me the perspective of spam applying and writing corresponding CVs is not very appealing. So, if CS is just a means to an end – not that there’s something wrong with that – but this might rub you off the wrong way (and you guessed right, no, I don’t look forward to enter management to “escape” coding). The job landscape in Cameroon is… saddening. While everywhere else the supply exceeds the demand, here it’s the exact opposite, which inevitably leads to abuse. Also, if you are still a student, this might not be for you directly, you can still read it to be prepared but there are many opportunities for students and I talk a bit about GSoC here. That being said, let’s get started.

        • Emacs is a Lifestyle

          I think that perfectly captures the spirit of Emacs and the nature of its (most devoted) users. I’d even go a bit farther and make the claim that (using) Emacs is essentially a lifestyle (choice).

        • Uninitialized Stack Variables

          Finally, as we observe here once more, writing C leaves us (necessarily) at the whims of the compiler: FreeBSD 13.0-RELEASE happens to use clang, and gcc(1) would have failed in either of our two scenarios. So one question that arises is whether compilers should perhaps auto-initialize stack variables.

          clang has a discussion around this, as does gcc, but there does not seem to be an agreed upon conclusion. Considering the possible security implications, it does seem to me that it would be a Good Thing™ to at least move away from having uninitialized variables by default and instead requiring explicit requests from the programmer (say, by way of an attribute?) that a given stack variable not be initialized. But I honestly don’t know what the performance impact of this would be.

          Either way, I’m going to make it a habit to memset(3) my structs going forward…

        • Testing

          I think about tests in terms of defense in depth, value-for-effort and debugging efficiency.

          Debugging efficiency is not something I see discussed often and it’s the only place where I disagree slightly with Aleksey’s post above. The more that happens between the cause of a bug and the actual test failure, the longer it takes to track down the bug. So I tend to write unit tests for code which is: [...]

        • Writing

          I have a file called ‘ideas’ where I write down potential projects or thoughts that might be worth writing about. Entries grow over time as I add more thoughts. The entry that eventually became Against SQL existed for over a year. Every time I encountered a new bizaare corner of the SQL I would make a quick note of it.

          Eventually one of the ideas will feel ready and I’ll try to write it up in full. This can take anywhere from a few hours to a few weeks depending on what the goal of writing it is and how much research is required. Against SQL took something like 60-80 hours to write because I was trying to make a strong argument about a complicated and contentious subject. Why isn’t differential dataflow more popular took maybe an hour or two because I just wanted to hear about other peoples experiences.

        • Property-Based Testing In Go

          Property-based testing can be a bit trickier to learn, and not every problem can be well tested in this manner, but it’s a powerful technique that’s well supported by the go std-lib (testing/quick) and that is under-utilized.

        • [Old] EP. #91: Open Source Security: with Dr. David A. Wheeler

          In episode 91 of The Secure Developer, Guy Podjarny speaks to Dr. David A. Wheeler, an expert in both open source and developing secure software. David is the Director of Open Source Supply Chain Security at the Linux Foundation and teaches a graduate course in developing secure software at George Mason University. Today’s discussion revolves around open source security (or OSS), in which David is an expert, not just from the perspective of consuming open source but also creating and even governing open source. Tuning in, you’ll learn about some of the primary security concerns in open source and the necessity to educate developers about secure software.

        • [Old] Managing Risks and Opportunities in Open Source with Frank Nagle & David A. Wheeler

          We start off on the topic of looking at metrics that are useful for identifying what’s going on in a Software Configuration Management system. David tells us what it is and if there’s a difference between building software and deploying it. Also, figuring out which components you’re going to bring in, to your overall system.

        • Toit open-source language claims to be 30x faster than MicroPython on ESP32 – CNX Software

          Developed by a team of former Google employees, Toit is a complete IoT platform with remote management, firmware updates for fleets of devices with features similar to the one offered by solutions such as balena, Microsoft Azure, or Particle edge-to-cloud platform.

          Toit currently works on ESP32 microcontrollers using lightweight containers, and after seeing existing high-level languages MicroPython and Javascript were not fast enough on low-end microcontrollers platforms, the team at Toit started to develop the Toit language in 2018, and has just made it open-source with the release of the compiler, virtual machine, and standard libraries on Github under an LGPL-2.1 license.

        • Laravel 8.73 Released | Laravel News

          The Laravel team released 8.73 with support for Countable objects in the string pluralizer, allowing closures for determining cache TTL, a lazyByIdDesc() query builder method, and the latest changes in the v8.x branch.

        • Medical Web Development: Top 10 Programming Languages Used in Health Tech
        • What are Container Classes C++?

          A container class as the name suggests is used to contain different values, objects, and variables, etc. in the memory or the external storage. A container class supports other classes present in the programs and it functions to hide the objects/variables used in the memory. It stores many items and all of these items are easily accessible by other members of the program.

          All container classes access the elements of the container efficiently through the iterators. This class is known to hold some similar and mixed objects in the memory. A container can be of a homogeneous or heterogeneous type. If the container holds mixed objects then it is heterogeneous, while in the case of similar items it is known as homogeneous container class.

          We are going to explain this concept on the Linux operating system, so you need to have Ubuntu installed and in the running form on your system. So you must install Virtual Box and after downloading and installation now configure it. Now add the Ubuntu file to it. You can access Ubuntu’s official website, and download the file according to your system requirement and operating system. It will take hours, then after installation, configure it on the virtual machine. In the configuration process, make sure you have created the user because it is essential for any operation on the Ubuntu terminal. Moreover, Ubuntu needs the authentication of the user before doing any installation.

          We have used the 20.04 version of Ubuntu; you may use the latest one. For the implementation, you need to have a text editor and must have access to the Linux terminal, because we will be able to see the output of the source codes on the terminal through the query. The user must have basic knowledge of C++ and object-oriented programming to make use of classes in the program.

        • Python

          • XOR Two Strings in Python

            You may have used many logical, arithmetic, and comparison operators within mathematics and programming while working. One of the frequently used logical operators is the XOR operator. It returns exactly the opposite of the result of the OR operator. Within this article, we will be using the XOR operator on two string-type variable values while working in a Python environment. Let’s have some examples in the Ubuntu 20.04 system.

          • Python String to a Dict

            In Python, the conversion of different data types is a common problem and it is very important to do it right. Dictionary is the data type that saves the information/elements in a pair form. It is important to convert the string data type to a dictionary data type during programming. However, before going to the methods of conversion, let me explain the strings and dictionaries.

            A string is a series of elements in Python. It is unchangeable. The elements or items are enclosed in single and double quotation marks. Since Python has no proper character data type. However, any character is also taken as a string in Python.

            In Python, a dictionary is essentially a collection of changeable data items. This collection is present in an unordered form. Dictionaries save the data in which every element is in the form of a pair. The elements inside the brackets are present in the form of pairs and each pair is segregated by the comma. But the elements are isolated by using a colon.

            The main attribute of the dictionary is that it does not accept polymorphism. We can get the data from the dictionary later by referencing the appropriate key name. Let’s discuss the techniques of converting the string to a dictionary.

          • Python String Decode Method

            The Python language is used to store the string in the form of Unicode. Within Unicode, a simple code point is utilized to represent a single character of a Unicode. We have to know two terms: encode and decode. The encoding would convert a simple string to a group of bytes while decoding will convert the group of bytes to a real string once again.

            So, within this article today, we will be decoding a string to an original one with the encode() and decode() function. Be sure to configure the python3 package on your Linux system. Let’s start today’s article by launching the terminal console using the Ctrl+Alt+T.

          • Python Removes Newline From a String

            In Python, the strings are a series of elements. These elements are surrounded by single and double quotation marks. Python has a newline symbol. It is represented by “/n”. It is utilized to track the climax of a line and the appearance of a new line. The newline character is utilized in f-strings. In addition, the print statement prints a newline character to the end.

            Newline character “/n” is a special character. It is helpful to make a new line. When we utilize the newline character (/n), a new line is created spontaneously.

        • Java

          • How to Convert Java to Kotlin and Kotlin to Java

            This article will cover a guide on converting code written in the Kotlin programming language to Java programming language and vice versa. Kotlin is a relatively new programming language being developed by JetBrains and it is fully interoperable with Java programming language. It offers some benefits over Java programming language like a more concise syntax, more built-in helper functions, stricter null type checking, data classes, and so on. Full list of differences between these two languages is available here. Kotlin is now the preferred language for developing Android apps and it has been fully integrated into Android Studio app development software suite.

            You can convert Kotlin to Java and Java to Kotlin using offline tools. Some of them are explained in this article. Do note that depending on the code being converted and the type of tool being used for the conversion purpose, the converted code may not be 100% accurate and you may have to make some manual edits. You should always review converted code before using it in an application.

    • Standards/Consortia

      • China: Smart tech enables users of braille book library

        It is three o’clock in the afternoon. The golden sunshine tumbles through the southern window of the main reading room of the Braille Library of China (BLC), yet there is not a single reader in sight.

        Make no mistake — that does not mean the custodians of this literary trove are doing nothing. On the contrary, the librarian on duty is quite busy.

        She simultaneously keeps one eye on WeChat, while checking the QQ app for new messages with the other, as well as standing ready to answer the phone that might ring at any time. All calls and messages come from visually impaired people or their families seeking that most essential of societal needs access to knowledge.

  • Leftovers

    • What Does It Mean to ‘Yassify’ Anything?

      It should be noted that YassifyBot is not actually a bot. Its tweets aren’t generated by software. The account is run by a 22-year-old college student in Omaha who makes art under the name Denver Adams and asked that The Times not reveal their legal name.

      The process for making each image is simple: Take a face, run it through FaceApp until it looks generically or grotesquely sexy, post, repeat. Mr. Adams said in a Zoom interview that each image takes only a few minutes to create

    • The Can That Always Can

      The year WD-40 was invented by the Rocket Chemical Company. Located in San Diego, CA, the goal of the product was to create something that would prevent rust and corrosion on aircraft. After forty attempts to create the formula, they famously came up with the right one on their 40th attempt. The name WD-40 stands for water displacement, formula 40. It’s first application came as a coating for the Atlas missiles made by Corvair in the 1950s.

    • Sinking after earthquakes | EurekAlert!

      During an earthquake, solid ground can loosen into something like quicksand.

      Under earthquake shaking some types of soil undergo liquefaction, a softening caused by groundwater pressure that becomes an evil twin to ground shaking. Liquefaction causes large ground deformations that have toppled buildings large and small, as well as crushed pipes below and taken out roads, rail, bridges, and levees.

      Such was the case for the 2010 Canterbury earthquake sequence, the most damaging being the magnitude 6.2 Christchurch earthquake. The sequence of earthquakes, 21 of which were greater than magnitude 5, caused $3 billion in damage to buildings and infrastructure on the South Island of New Zealand, particularly in the city of Christchurch, which would receive the brunt of the deadlier aftershocks a year later.

    • Science

      • SpaceX’s Starlink Will Make Life Hell for Astronomers Like Me. Telescopes on the Moon Could Help Fix That.

        While these satellite swarms are going to make life difficult for astronomers observing the universe in visible light, they are set to be even more problematic for astronomers who work with radio waves—one of the most important tools in an astronomer’s cosmic toolbox. They are emitted by all kinds of things in space, from organic molecules to dying stars. Jodie Foster in the film Contact (playing Ellie Arroway) was listening to the universe using radio waves, and to this day telescopes involved in SETI, the search for extraterrestrial life, use these waves to scan the sky for signs of cosmic intelligence.

        All of this work is in jeopardy. Satellite swarms have to communicate with humans on Earth, and they do so using radio waves. It won’t take long before the effect of all these satellites becomes overwhelming: In 10 years time we could have 100,000 radio beacons in the sky, blasting our planet with a wall of radio noise capable of deafening even the most sensitive radio telescope.

      • NASA Research Launches a New Generation of Indoor Farming | NASA
      • Can Synthetic Biology Save Us? This Scientist Thinks So. [Ed: It is not biology and it’s often just a disingenuous loophole for getting patents on life and nature as though they’re inventions meriting monopolies

        When the family house in Devon, Pa., caught fire, Drew Endy, then 12, carried out his most cherished possession — his personal computer.

        Years later, as a graduate student, Mr. Endy was accepted to Ph.D. programs in biotechnology and political science.

        The episodes seem to sum up Mr. Endy, a most unusual scientist: part engineer, part philosopher, whose conversation is laced with references to Descartes and Dylan, as well as DNA.

        He’s also an evangelist of sorts. Mr. Endy, a 51-year-old professor of bioengineering at Stanford University, is a star in the emerging field of synthetic biology. He is its most articulate enthusiast, inspiring others to see it as a path to a better world, a transformational technology to feed the planet, conquer disease and combat pollution.

    • Education

      • Are tenured professors more likely to speak freely?

        One of the justifications for tenure is that professors who have tenure can speak more freely. Thus, in theory, they can be critical of government or corporate policies.

        Do they? What would “speaking freely” entails?

      • Can Biden expose the ‘college is for everyone’ fantasy?

        So the big question we have to answer is: What messages are our kids getting about the value of a college education? Perhaps more importantly: What messages are we — parents, teachers and mentors — giving them when it comes to their future in the workforce?

    • Hardware

      • Magnus Effect Propels This Flettner Rotor Boat | Hackaday

        The Magnus effect is a interesting and useful phenomena. [James Whomsley] from [Project Air] decided to put it to work on a small radio-controlled boat, successfully harnessing the effect. (Video, embedded after the break.)

        The Magnus effect is an interesting thing, where fluid flowing over a rotating object generates an aerodynamic force at a right angle to the direction of the flow and the axis of rotation. (It’s why curveballs curve.) This can be used for propulsion on a boat, by spinning a tall cylinder called a Flettner rotor. This takes advantage of Magnus effect to generate thrust.

      • Another Way To Recycle Those Empty Beverage Cans | Hackaday

        Do you ever sit around thinking of ways to repurpose things in your house? Well [BevCanTech] found a way to recycle some of his empty beverage cans by turning them into homemade wire.

      • Replacement Motherboard Brings New Lease Of Life To Classic Thinkpads | Hackaday

        “They don’t make them like they used to.” It might be a cliché, it might not even be entirely true, but there’s something special about owning a piece of hardware that was built to a much higher standard than most of its contemporaries, whether it’s that bulletproof Benz from 1992 or that odd fridge from 1987 that just seems to last forever. For laptop aficionados, the Thinkpad series from IBM and Lenovo is the ne plus ultra: beloved for their sturdy construction and rich feature set, they have been used anywhere from the United Nations to the International Space Station. The T60 and T61 (introduced in 2006) are especially famous, being the last generation sporting IBM logos and such classic features as 4:3 displays and infrared ports.

    • Health/Nutrition/Agriculture

      • Trees and Crops Don’t Have to Compete. Climate Crisis Calls for Agroforestry.
      • Opinion | Indian Farmers Score a Victory Against Modi Government on Strike Anniversary

        India’s farmers have mobilized to create one of the world’s most vibrant protests in history, camping on the outskirts of New Delhi for one year now. Friday, November 26, 2021, marked the one-year anniversary of the day when these farmers faced water cannons and tear gas at the Delhi border as they tried to reach the Capital. On November 19, they got a big win, as Narendra Modi, the prime minister of India, announced that he has decided to repeal the three controversial farm laws.

      • Africans Should Be ‘Applauded, Not Punished,’ Say Advocates Amid Omicron Travel Ban

        As a leading World Health Organization official pleaded against “knee-jerk” reactions after the discovery in Botswana of the latest Covid-19 strain, South Africa’s government on Saturday joined public health advocates in criticizing wealthy nations for imposing travel bans on African countries while failing to address “the vaccine inequity that drives new variants.”

        “These travel bans are based in politics, and not in science. It is wrong… Why are we locking away Africa when this virus is already on three continents?”

      • Forensic Science Institute to study wastewater for drug use

        Wastewater samples for drug use monitoring are planned to be taken in Tallinn, Kohtla-Järve, Pärnu, Viljandi and Võru. The first samples will be taken in mid-January and the results will be available in February. In the future, wastewater samples will be analyzed for traces of drugs once every quarter.

      • ‘It’s scary’: Overdose deaths driven by fentanyl mixed with other drugs

        Although the trend has been identified, it’s not yet definitive what is causing it: Are drug users knowingly using fentanyl and other drugs, or does fentanyl enter the larger drug supply via dealers and distributors?

        “It really could be happening at any point and multiple points along the drug supply chain,” said Kelly Dougherty, Vermont’s deputy health commissioner for alcohol and drug abuse programs. “Some people want to use fentanyl, despite the dangers, and other people are using it without knowing — it’s scary. People are cutting it in, and it basically makes it more deadly.”

      • G.O.P. Fights Covid Mandates, Then Blames Biden as Cases Rise

        Over eight hours last Thursday night and into Friday morning, Representative Kevin McCarthy of California hit on many issues as he spoke on the House floor in an unsuccessful effort to thwart House passage of President Biden’s social safety net and climate change bill. But among his most audacious assertions was that Mr. Biden was to blame for the country’s failure to quell the pandemic.

        Mr. McCarthy used this line of attack even as members of his own Republican Party have spent months flouting mask ordinances and blocking the president’s vaccine mandates, and the party’s base has undermined vaccination drives while rallying around those who refuse the vaccine. Intensive care units and morgues have been strained to capacity by the unvaccinated, a demographic dominated by those who voted last year for President Donald J. Trump.

      • ‘False sense of security’ around COVID vaccines: WHO

        The chief of the World Health Organization has warned that the COVID-19 pandemic is not yet over and that some people were falling into a “false sense of security” after being vaccinated against the virus.

        In a news briefing in Geneva on Wednesday, Tedros Adhanom Ghebreyesus said many vaccinated people were thinking – wrongly – that receiving the COVID shot meant they no longer needed to take any other precautions.

      • Detect, Inc., Announces Major COVID Testing Innovation | Zip06.com

        A local entrepreneur is announcing another technological innovation that will be an important tool in combating the COVID-19 pandemic. Detect, Inc., of Guilford, founded by National Medal of Technology and Innovation recipient Dr. Jonathan Rothberg, has created an accurate, fast, and easy-to-use PCR-quality molecular COVID-19 test, according to the company.

      • Digital Health Accelerators Boosting Local Companies | Los Angeles Business Journal

        Business accelerators have long been a crucial link for taking startups from the research and prototype stage to marketing and selling their products and services to customers. But until about six years ago, there were only a couple of accelerators to serve L.A.’s medical device and health tech industries — including one exclusively focused on medical devices for pediatric care.

        Starting in 2015, a pair of life science accelerators came onto the L.A. County scene seeking to serve the burgeoning health tech sector: Cedars-Sinai Accelerator in West Hollywood and MedTech Innovator in Westwood. They were soon joined by KidsX in East Hollywood — affiliated with Children’s Hospital Los Angeles and USC — and a program from the South Park-based Larta Institute known as Heal.LA, along with one incubator for health tech startups, ScaleHealth in Palms.

    • Integrity/Availability

      • Proprietary

        • India says not to preorder Starlink until it obtains a license

          “Public is advised not to subscribe to Starlink services being advertised,” a tweet from India’s Department of Telecommunications (DoT) reads. The DoT also says it asked Starlink to refrain from “booking / rendering the satellite internet services in India.” In other words, Starlink will have to put preorders on hold until it can get approval from the Indian government.

        • India tells public to shun Musk-backed Starlink until it gets licence

          A government statement issued late on Friday said Starlink had been told to comply with regulations and refrain from “booking/rendering the satellite internet services in India with immediate effect”.

        • GitHub is back online after a two-hour outage

          Microsoft-owned GitHub experienced a more than two-hour long outage today, affecting thousands or potentially millions of developers that rely on its many services. GitHub started experiencing issues at around 3:45PM ET, with Git operations, API requests, GitHub actions, packages, pages, and pull requests all affected.

        • Insurers run from ransomware cover as losses mount

          Faced with increased demand, major European and U.S. insurers and syndicates operating in the Lloyd’s of London market have been able to charge higher premium rates to cover ransoms, the repair of hacked networks, business interruption losses and even PR fees to mend reputational damage.

          But the increase in ransomware attacks and the growing sophistication of attackers have made insurers wary. Insurers say some attackers may even check whether potential victims have policies that would make them more likely to pay out.

        • Apple Grants Repair Indulgence for iPhones

          Save your huzzahs and whatever you do, do not pop the champagne. Apple did not just ‘cave’ to the right to repair movement, and the fight for an actual, legal right to repair is more important now than ever.

          The occasion for this reminder is, of course, the little-‘m’ momentous announcement by Apple this morning that it would make “Apple parts, tools, and manuals” available to “individual consumers” for self repair — starting with the iPhone 12 and iPhone 13.”

        • Montana high school hit by ransomware

          From their listing, Avos Locker is clearly aware that this is a tiny school district with only a few hundred students and less than two dozen teachers. And yet they are trying to ransom them. Avos writes: “If they refuse to negotiate, we will leak all the data we’ve got.”

        • Apple alerts journalists, activists about state-sponsored [cracking] attempts after NSO Group suit

          On the same day Apple announced a lawsuit against Israeli spyware vendor NSO Group for developing [cracking] tools to help breach iOS technology, the company was notifying potential targets of those exploits.

          El Faro, a news organization in San Salvador, El Salvador, reported late Tuesday that 12 of its staff members received notices from the company, which warned that that “Apple believes you are being targeted by state-sponsored attackers who are trying to remotely compromise the iPhone associated with your Apple ID.” The company also sent notices to four others in San Salvador who are “leaders of Civil Society organizations and opposition political parties,” the news organization reported.

        • Run a website off a Google Sheets Database, with Hugo

          Here’s how I built a website, Profilerpedia, using a Google Sheet as the backing database.

          Profilerpedia aims to map the profiling ecosystem and connect software with profilers and profilers with great analysis UIs, so we can make code faster and more efficient. More on Profilerpedia in the announcement post.

          It’s interesting to explain the architecture, because it challenges some engineering dogmas, like “a spreadsheet isn’t a good database”. I think running your site from a spreadsheet is a very reasonable pattern for many sites.

          The resulting architecture is my third or fourth attempt at this; I learned a lot along the way, I’m pretty happy with the result, and I want to share what I learned.

        • Boeing Missteps on 737 MAX Went Beyond Deadly Crashes That Killed 346, new Book Reveals

          When the first Boeing 737 MAX plane came off the production line in December 2015, it was the beginning of a highly anticipated new line of aircraft for the storied company. It incorporated the latest technology and was billed by Boeing as “deliver[ing] the highest efficiency, reliability and passenger comfort in the single-aisle market.” Tragically, that promise came to a glaring halt with two back-to-back disasters in which flight control software known as the Maneuvering Characteristics Augmentation System (MCAS) incorrectly gauged the aircrafts’ angles of ascent and prevented the pilots from manually overriding it. In total, 346 people on board Lion Air flight 610 on October 28, 2018 and Ethiopian Air flight 302 on March 10, 2019 were killed after only about 13 minutes and 6 minutes in the air, respectively.

        • Security

          • New Side-Channel Vulnerability in the Linux Kernel Enabling DNS Cache Poisoning

            A recent research paper by a team at University of California, Riverside, shows the existence of previously overlooked side channels in the Linux kernels that can be exploited to attack DNS servers.

            According to the researchers, the issue with DNS roots in its design, that never really took security as a key concern and that made it extremely hard to retrofit strong security features into it.

          • Reproducible Builds (diffoscope): diffoscope 194 released

            The diffoscope maintainers are pleased to announce the release of diffoscope version 194. This version includes the following changes:

            [ Chris Lamb ]
            * Don't traceback when comparing nested directories with non-directories.
              (Closes: reproducible-builds/diffoscope#288)

          • Thousands of printers at risk of denial of service attacks

            Researchers have highlighted a trio of potential attacks against printers that could allow denial of service, information theft, or botnet compromise.

            The collection of attacks, labeled Printjack, appeared in a paper from researchers Giampaolo Bella and Pietro Biondi at the Universit`a di Catania and Istituto di Informatica e Telematica in Italy.

          • Privacy/Surveillance

            • Opinion | Police Aerial Surveillance Threatens Freedom to Protest

              The ACLU of Northern California has concluded a year-long Freedom of Information campaign by uncovering massive spying on Black Lives Matter protests from the air. The California Highway Patrol directed aerial surveillance, mostly done by helicopters, over protests in Berkeley, Oakland, Palo Alto, Placerville, Riverside, Sacramento, San Francisco, and San Luis Obispo. The footage, which you can watch online, includes police zooming in on individual protestors, die-ins, and vigils for victims of police violence.

            • WhatsApp wins approval to double payments offering to 40 mln users in India: Source

              WhatsApp has won regulatory approval to double the number of users on its payments service in India to 40 million, a source with direct knowledge told Reuters on Friday.

              The company had requested that there should be no cap on users of its payment service in India.

              Instead, the National Payments Corporation of India (NPCI)this week told the company it could double the user base to which it can offer its payment service – currently restricted to 20 million – the source said.

              WhatsApp is owned by Facebook, which recently changed its name to Meta.

            • Transparency lawsuit against secret EU surveillance research: Judgement on 15 December in Luxembourg.

              The EU supported trials of the use of “artificial intelligence” at its borders by testing a “video lie detector” on travellers. On 15 March 2019, MEP and civil liberties activist Dr Patrick Breyer (Pirate Party) filed a lawsuit for the release of secret documents on the ethical justifiability, legality and the results of the technology. The European Court of Justice will deliver its judgement publicly in Luxembourg on 15 December 2021 (Case T-158/19). A landmark ruling could generally shed light on EU-funded „security research“.

            • Chat control, biometric surveillance, data retention: Major changes of Germany’s positions on EU digital policies

              Yesterday afternoon, the new German government coalition of SPD, FDP and the Greens presented its coalition agreement to the public. MEP, civil rights activist and lawyer Dr Patrick Breyer of the Pirate Party hails the new positions Germany is taking on EU digital policies: [...]

            • Confidentiality

              • no u pnp

                UPnP has sort of a bad reputation, and it’s very common in online conversations to see people repeating “disable UPnP” as stock advice. There is some reason for this, although the concern is mostly misguided. It’s still amusing, though, as it relates to the one tiny corner of UPnP functionality which has ever really had any success.

                Before we dig into that, though, we need some history.

              • GoDaddy says information on 1.2 million customers exposed in data breach

                In a document filed to the Securities and Exchange Commission on Monday, GoDaddy noted that the company had discovered its Managed WordPress hosting environment had been compromised by an “unauthorized third party,” resulting in emails and customers numbers of 1.2 million Managed WordPress users being exposed.

    • Defence/Aggression

    • Transparency/Investigative Reporting

    • Environment

    • Finance

      • Diaper Banks Are Filling a Need for Low-Income Families Whom Federal Aid Fails
      • Opinion | Why a Small Business-Centered Economy Is Critical Right Now

        On Small Business Saturday, it’s a day not only to shop small and local but also to reflect on how we can better support small businesses and our local economy for the long term. 

      • No tax and chill: Netflix’s offshore network – TaxWatch

        Facebook, Amazon and Google, have all received a significant amount of scrutiny in recent years about their tax affairs, but the last of the FANG group of companies, Netflix, has not.

        One reason for this could be that that Netflix has historically not been as profitable as other digital companies, as it has spent large amounts of money building an international presence and buying film rights. However, recent years have seen the company’s profits rocket, from $123m in 2015, to $1.2bn in 2018.

        In this report, we provide an analysis of Netflix’s corporate structure which shows that the company has implemented a similar tax avoidance structure to many other multi-national companies operating in the digital space. Revenues are not collected in the country where they are made. Instead, customers are charged from an offshore company. Profits appear to then be moved from the hub company to a tax haven through the use of intra-company transactions.

        Netflix’s historically lower profit margins mean that the scale of any tax avoidance will be much lower than other well known companies that employ similar tactics.

        However, the structure that the company operates presents a significant risk factor for the tax base of many countries as the company expands its presence, increases market share and sees an increase in profits.

        In total, we estimate that the company moved between $327.8m to $430m in profits to low tax jurisdictions from its international operations.
        Netflix also presents another issue particular to the film and television world, which is the way in which it is able to attract tax credits. The company is now ramping up production of original content in the UK, and it is likely that this will attract substantial subsidies from the UK taxpayer. Indeed, recently the company said that it is spending over £400m making original content in the UK this year, which means that it is likely to be eligible for tens of millions of pounds in tax relief when it next reports its UK accounts.

        This demonstrates a significant loophole when it comes to the administration of tax credits for multinational companies, which can take advantage of credits by locating costs in the jurisdictions where they are on offer, whilst at the same time putting their revenues somewhere else entirely.

      • Food delivery drivers question gig platforms’ safety nets

        From leg amputations in Thailand to hijackings in Nigeria, millions of food delivery drivers around the world find themselves torn between the desperation to make a living and the fear that each ride may be their last.

        The gig economy has surged during the COVID-19 pandemic and brought with it a wave of concerns from drivers and researchers who say that dangerous roads and inadequate safety equipment and training are putting lives on the line daily.

        By 2020 there were at least 777 digital labour platforms – from food delivery to web design – around the world, up from about 140 a decade earlier, according to the International Labour Organization (ILO).

      • Nearly 30,000 borrowers awarded Public Service Loan Forgiveness so far under new rules

        Katherine Rickfelder, a Florida public school teacher, is one of nearly 30,000 people who have seen their student debt balance reduced to zero since the federal government announced significant changes to a popular loan forgiveness program last month.

        “I cried when I got the letter. I honestly feel like I can finally breathe again,” said Rickfelder, who had another five years of payments to make under the old rules of the Public Service Loan Forgiveness program. She started paying off her student debt about 16 years ago.

        The letter, which she received from the US Department of Education in October, said that she would get credit for 91 additional monthly payments she had made on her student loans. That meant that she had already made more than the 120 payments required for debt forgiveness under the PSLF program, which is aimed at borrowers working in government and nonprofit sectors.

      • Creating more climate change billionaires

        The reason why the Moderna billionaires might be especially upsetting is that so much of what they did was with government funding. The development of mRNA technology, beginning in the early 1980s, was accomplished almost entirely on the government’s dime.

    • AstroTurf/Lobbying/Politics

      • Incident reporting, ransomware payment legislation faces trouble in Senate

        Legislation requiring critical infrastructure owners to report major cyber incidents to the federal government, and mandating that ransomware victims disclose when they make payments, has hit a significant snag in the Senate.

        A bipartisan group of senators announced a proposal in November that would require critical infrastructure owners and operators to report within 72 hours to the Department of Homeland Security’s Cybersecurity and Infrastructure Agency when they suffer major cyber incidents, as defined by CISA. It also would require reporting of ransomware payments to CISA from a broader set of organizations, excluding only individuals and some smaller businesses, within 24 hours.

      • Imagine Not Living in Big Tech’s World

        I want to flash back to the rise and fall of a once popular storytelling website called Upworthy. It is one of a zillion examples of the power of Facebook and other technology superstars to make or break other companies’ dreams.

      • 193 countries adopt first-ever global agreement on the Ethics of Artificial Intelligence

        “The world needs rules for artificial intelligence to benefit humanity. The Recommendation on the ethics of AI is a major answer. It sets the first global normative framework while giving States the responsibility to apply it at their level. UNESCO will support its 193 Member states in its implementation and ask them to report regularly on their progress and practices”, said UNESCO chief Audrey Azoulay.

      • UNESCO member states adopt first global agreement on AI ethics

        Participants will consider how AI governance and innovation networks can be enhanced to direct AI towards the common good in education, and for humanity.

      • [Old] Open Source Software in Government: Challenges and Opportunities. August 2013

        This document identifies key challenges and opportunities in the government application of Open Source Software (OSS), as reported in interviews of experts, suppliers, and potential users. There are many challenges to the collaborative development and use of such software in the government. To maximize the use of limited resources, the U.S. government must address these challenges, which can be grouped into categories such as: inertia, fears about low quality and malware, concerns about commercial support, procurement issues, and certification and accreditation (C&A) issues. Interviewees reported a critical need for OSS guidance and education. Specific interviewee recommendations included requiring that software and C&A materials developed with government funding be developed collaboratively and widely shared, that the government receive full data rights for such material, and that the government release such software as OSS by default.

      • Christian nurses’ bail ‘kept secret’ in blasphemy case to protect women from radical Islamist attacks

        In April, Police in Punjab province arrested nurse Maryam Lal and third-year nursing student Navish Arooj on blasphemy charges after staff at Civil Hospital in Faisalabad city accused them of removing a sticker from a cupboard that had a verse from the Quran written on it. One of the nurses was allegedly attacked by a knife-wielding Muslim colleague.

      • Opinion | Nicholas Kristof: Celebrate the season by changing someone’s life – The Washington Post

        For years, as a columnist for the New York Times, I wrote an annual giving guide, which in 2019 and 2020 included Holiday Impact awards. I recently resigned from that job to run for governor in Oregon, but I wanted to continue the tradition.

    • Misinformation/Disinformation

      • Behind the Tweet That Became the Rallying Cry for the Insurrection – Mother Jones

        The city was a Democratic stronghold in a state Trump won to secure the presidency in 2016 and needed to win again to remain in the White House. It was also a city long dogged by Republican accusations of election fraud. Will Chamberlain had driven up from Washington, DC, to chase these allegations as a last-minute volunteer with the group Lawyers for Trump.

        But Chamberlain wasn’t merely a lawyer. Although he had briefly worked at a commercial litigation firm in Los Angeles after passing the bar, he left that job in the spring of 2016, moved to DC, and spent the Trump years running MAGA Meetups, relaunching a right-wing magazine, and generally reinventing himself as a pro-Trump social media figure. When the campaign realized he had roughly 150,000 followers on Twitter, his role changed. “They figured out I’d be more useful doing stuff that wasn’t just legal,” Chamberlain told me.

    • Censorship/Free Speech

      • What people miss in the conversation about banned books

        How should parents react to this news, and to the books their children are reading? NPR senior editor Barrie Hardymon and Traci Thomas, host of The Stacks podcast, joined guest host Ayesha Rascoe to talk about banned book lists.

        The three talk about why it’s important for kids to discover books freely, even if that means starting a hard conversation with them. They also discuss their favorite — and least favorite — books that often show up on banned book lists.

      • Internet disruption registered in Iran amid water protests

        The disruption registered in the southwestern city of Ahvaz comes amid protests against government water management policies which have centered around Isfahan, where outages have also been reported by users.

      • [Old] Renowned DJ Zedd “Permanently Banned” From China for Liking a ‘South Park’ Tweet

        Born Anton Zaslavski, the Russian-German DJ and music producer made the announcement via social media. He has 8.1 million followers on Twitter alone.

        “I just got permanently banned from China because I liked a @SouthPark tweet,” Zedd said via a tweet.

        His reps confirmed to CNBC Zedd was notified he was banned from the country.

      • [Old] Katy Perry Has Reportedly Been Banned from Entering China for Wearing This Dress

        Sources told the site that Perry, 33, had applied for a visa but was denied by Chinese officials. Page Sixreports that the singer was informed she’d be granted access, but that changed after the government became aware of a sunflower dress she had worn during a performance in Taipei, Taiwan, in 2015.

        The look had caused controversy because the sunflower was the key symbol of a 2014 movement that protested a Chinese trade agreement that was seen as unfair to Taiwan. At one point of the concert, Perry also draped a Taiwanese flag over her shoulders. Though it might not have been her intention, the outfit and the flag-waving was seen as a politically charged gesture and caused uproar in China, which has had long-running tensions with Taiwan regarding its independence.

      • The Taliban destroyed Afghanistan’s ancient Buddha statues. Now they’re welcoming tourists.

        For around $5, curious visitors can wander around and take photos of the giant holes in the cliff face where the ancient Buddha statues once stood.

      • Canadian school cancels ISIS survivor Nadia Murad over Islamophobia fears

        Murad advocates for survivors of genocide and sexual violence and is also a Nobel Peace Prize Laureate and UN Goodwill Ambassador.

        Murad’s book tells how she escaped the Islamic State after being taken from her home and sold into sexual slavery when she was just 14.

        Murad details how she was raped and tortured before finding her way to a refugee camp in Durhok, in northern Iraq, and then to Germany, where she lives today.

      • School pulls event with former Islamic State sex slave over fears it would ‘foster Islamophobia’

        Helen Fisher, the superintendent at the Toronto District School Board, voiced her concerns over Ms Murad’s ‘The Last Girl: My Story of Captivity, and My Fight Against the Islamic State’ and said that her students would not participate in a sit-down event with the author scheduled for February.

      • FATAH: The outrageous censorship of Nadia Murad

        For many of us who have followed the mass murder of the Yazidi people of Iraq and have marvelled at the courage of Murad, the TDSB decision came as a shock. It reeked of ignorance and subservience to an Islamist attitude that has infiltrated too many institutions of Canada, especially urban schools where cafeterias have been turned into prayer halls, with gender apartheid on full display.

        Shocked by the exchange with Helen Fisher, Tanya Lee says she then sent her an email containing detailed information on the Islamic organization, coming from the BBC and CNN.

      • School Cancels Former ‘ISIS Sex Slave’ Nadia Murad’s Event Over Fears of ‘Offending Muslims’

        Nadia was all set to discuss her book with the students of TDSB, however, the school board president Helen Fisher pulled the event, claiming that Nadia’s book might promote ‘Islamophobia’ amongst the students. Fisher issued an apology for the act as well.

      • School shuts down after cops get mad over student project about “V for Vendetta”

        Katey O’Connor, a teacher at Muncie Central High School, had her students read V for Vendetta, the classic graphic novel by Alan Moore and David Lloyd, and create some posters reflecting on how the ideological mission of the eponymous V from the book might relate to current real-life social conditions.

        In the book, V is a queer anarchist who openly admits that he’s doing terrorism as performance art in the name of anti-fascist liberation. He is fighting against a racist, sexist, homophobic authoritarian government.

    • Freedom of Information/Freedom of the Press

      • “A Lot of Mistakes”: The Guardian and Julian Assange

        In 1921, the Manchester Guardian’s editor, Charles Prestwich Scott, marked the newspaper’s centenary with an essay entitled “A Hundred Years.” In it, Scott declared that a newspaper’s “primary office is the gathering of news. …Comment is free, but facts are sacred.”

      • Stella Moris on fiancé Julian Assange: ‘This isn’t about him, it’s about press freedom’

        The result of Assange’s appeal should be known by Christmas (though he will not be immediately released unless America formally drops its case). In the meantime, Moris, 38, has been fighting a second battle. After our meeting, she is rushing straight off to meet her lawyer about their legal action against the deputy prime minister Dominic Raab and the Belmarsh prison governor, who she claims were blocking her and Assange from getting married inside the prison. Just hours later, the news she has been battling for comes through: after five years of trying, she and the Australian-born whistleblower have been granted permission to marry. Moris is relieved that “reason has prevailed” in her marriage battle, calling the delays a “completely outrageous and illegal interference in [their] private lives”.

    • Civil Rights/Policing

      • Starbucks Is Swarming Buffalo-Area Shops With Top Execs to Quash Union Drive
      • A Unionization Wave Is Reshaping Museums and Cultural Institutions Across the US
      • No Dogs Allowed? Iran Considers Nationwide Ban On ‘Dangerous, Harmful’ Pets

        The authorities have attempted to introduce similar restrictions against household animals in recent years as the ownership of dogs and other pets has become more popular despite the clerical establishment’s arguments that keeping them inside homes is unhygienic and un-Islamic. Instances of people being attacked by stray dogs have also fueled calls for restrictions.

        But while previous attempts to curtail pet ownership through local bans on dog walking and transportation have largely failed or met resistance, the latest proposal would be nationwide and comes as hard-liners increase their influence following the election of ultraconservative President Ebrahim Raisi in June.

      • Unions are finally fighting two-tier contracts

        What’s a two-tier contract? Just what it sounds like: management offers the union concessions on its key demands, but only for current workers. Future workers get a worse deal.

        Management’s theory is that workers may have solidarity with one another, but not with workers who haven’t even been hired yet, and that a two-tier contract will lead to an ever-expanding cohort of workers who pay full union dues but don’t get full union benefits. Thus, over the span of years, the union will get weaker and weaker, and eventually it will be too weak to stand up for any of its workers – even the top-tier workers, who will see all those gains clawed back in future negotiations.

      • RCMP still clearing Indigenous lands for corporate interests

        Media couldn’t access the raw footage taken by filmmaker Michael Toledano until he and journalist Amber Bracken were released from prison days later. Even though the pair had identified themselves as journalists, the RCMP jailed them anyway. When they were released three days later, we then saw the dramatic arrest of unarmed land defenders at gunpoint.

      • Turkish police tear-gas women protesting over violence

        Turkish police on Thursday fired tear gas to break up a protest in Istanbul by women demanding the country’s return to a landmark international treaty, signed in the same city, that is meant to protect women from violence.

      • France: Muslim stabs his sister’s boyfriend for not being Muslim

        It was the eve of Valentine’s Day in 2020. Inès and Sébastien, two young people from Colombes in the middle of a love affair, were planning to celebrate the day of lovers. But Inès’ brother, who viewed his sister’s relationship with suspicion, would not allow it. On this February 13, he stabbed Sébastien with a knife and is now on trial before the jury court of the Hauts-de-Seine department.Le PArisien.

      • Suspected Boko Haram Terrorists Abduct 22 Girls For Marriage In Niger State

        The gunmen allegedly told the villagers that they were going to marry the girls. A community leader who spoke on condition of anonymity said they had earlier informed them that the girls should be withdrawn from the school because they would come to marry them, adding that they were surprised that the terrorists came yesterday (Thursday) to pick up the girls without any security check. He said the group leader, identified as Malam Sadiku led several operations in the area, preaching weird Islamic ideology unhindered for several months.

      • Outcry After Iran ‘Shocking’ Execution Of Young Murder Convict

        It described his sentencing in December 2015 as being the result of “a grossly unfair trial” by a court that “relied on torture-tainted ‘confessions’”.

        Mahmood Amiry Moghaddam, head of Oslo-based NGO Iran Human Rights (IHR) which monitors executions in Iran, described Abdolali’s execution as an “international crime”.

      • Iran: Execution of juvenile offender ‘deeply alarming and shocking’

        OHCHR expressed serious concern that his case follows the pattern of child offenders being convicted after a flawed trial and on the basis of forced confessions.

        “It is deeply alarming and shocking that his hanging went ahead, despite interventions by numerous parties on the case, including direct engagement by the UN Human Rights Office with the Government of Iran,” Spokesperson Liz Throssell said in a statement.

    • Internet Policy/Net Neutrality

      • Can a Free Internet Survive?

        Says John Arquilla, Distinguished Professor Emeritus of Defense Analysis at the U.S. Naval Postgraduate School, “There’s a growing emphasis among some governments to curtail political freedom by using the Internet and social media to control thought and action.”

        Out of Control

        Internet freedom is eroding on two fronts: the sheer number of efforts to block access to legitimate information, and the level of sophistication used. According to Access Now, an organization that says it “defends and extends the digital rights of users at risk around the world,” 850 intentional shutdowns have taken place over the last decade, with 768 of these events occurring over the last five years.

      • EU [Internet] regulation to push Facebook to sanitise Metaverse platforms

        The proposed DSA aims to keep users safe from illegal goods, content or services and protect their fundamental rights online, on the principle that what is illegal offline should also be illegal online.

    • Monopolies

      • EU companies issue formal complaint against Microsoft OneDrive Windows integration

        Remember how Microsoft spent years in hot water in the late ’90s and early ’00s by forcing Internet Explorer on its customers? European open-source cloud company Nextcloud does.

        Now, with a coalition of other European Union (EU) software and cloud organizations and companies called the “Coalition for a Level Playing Field,” Nextcloud has formally complained to the European Commission (EC) about Microsoft’s anti-competitive behavior by aggressively bundling its OneDrive cloud, Teams, and other services with Windows 10 and 11.

      • Microsoft Weekly: Defender for the win, trouble with Nextcloud, and ARM exclusivity

        Microsoft seems to have found itself in a bit of bother at the European Union (EU). This is due to a Nextcloud-led coalition that has filed a complaint against the Redmond tech firm for anti-competitive behavior. Other notable members of the coalition include Tutanota, OnlyOffice, Free Software Foundation Europe, The Document Foundation, and European Digital SME Alliance.

        Together, these parties claim that Microsoft is bundling its 365 services such as OneDrive and Teams natively into Windows and is shipping the OS with them installed by default. According to the group, this pushes users to Microsoft’s bundled software rather than third-party alternatives. As of now, the challenging party’s demands include Microsoft unbundling its software from Windows and adopting open standards that makes it easier for users to switch software. The issue is still evolving so do keep an eye out on our coverage.

        In related news, the German state of Schleswig-Holstein has announced that it is shifting 25,000 government machines running Windows to open-source alternatives like Linux by the end of 2026. This will be a multi-step process initially involving migrating to LibreOffice from Microsoft Office, and then switching to Linux entirely. One of the reasons being cited for this massive transition is licensing costs. It is important to note that Munich city attempted the same a few years ago but the experiment eventually failed, with the government going back to Windows in 2015.

      • Patents

        • Innovation from myFC approved by the European Patent Office – electrochemically operated valves optimize fuel cells [Ed: EPO grants loads of junk patents these days, so does this merit a press release?]

          The European Patent Office announces that myFC has one of its patents approved in several countries. With the help of the electrochemically operated valve that the patent protects, it is possible to distribute the hydrogen gas individually to the fuel cells.

        • UPC favourites: French and German judges dominate [Ed: Mathieu Klo publishes fake news for Team UPC to promote the illusion of UPC being inevitable; JUVE became “lying press”]

          The Unified Patent Court has already defied many a problem in its now more than 10-year development phase. Years of bitter wrangling over new procedural rules, Brexit and two constitutional complaints in Germany put extreme strain on the nerves of UPC officials and patent experts worldwide. Last Friday, the Austrian Parliament voted in favour of the ratification of the protocol on the provisional agreement (PAP) in its first reading.

        • Austria will most likely trigger start of preparatory phase Unified Patent Court [Ed: No, Kluwer, Austria is not in the UK. UPC can only even progress by breaking the law, which will cause a major lawsuit.]

          Austria will most likely become the member state which will trigger the start of the preparatory phase of the Unitary Patent project. Last Friday the National Council, one of the chambers of its parliament, unanimously approved draft legislation enabling Austria to ratify Protocol for Provisional Application (PPA) of the Unified Patent Court Agreement.

        • Software Patents

          • Peloton sues Lululemon in battle over patent infringement claims

            Peloton Interactive, Inc., is urging a court to say that its sportswear does not infringe on Lululemon’s patent designs by filing a lawsuit against the athletic wear brand earlier this week.

          • German Federal Patent Court confirms Zoe Life software patent [Ed: Well, software patents are not legal, but a corrupted and bribed system ceases to care about legality, it bends to lobbying]

            Until now, controversy has surrounded the enforceability of software patents. But a ruling by the German Federal Patent Court has fully upheld investor Zoe Life’s key patent on cloud computing. This marks a success for the software patent industry.

      • Copyrights

        • Virgin Media ‘Pirates’ Told They’re Also Liable For Other People’s Movie Piracy

          Virgin Media subscribers who responded to letters accusing them of piracy are now getting feedback from movie company lawyers in the UK. While initial feedback suggested that alleged pirates could be on the hook for potentially thousands in damages, it now appears the movie company is taking a broader view of the situation. Whether such claims will hold up in court remains to be seen.

        • The film industry effectively solved the problem of unauthorised downloads; now it is “unsolving” it…

          There’s no doubt that the introduction of good-value streaming services like Spotify has meant that many people have stopped turning to unauthorised sources. Separate research from 2012, 2013 and 2014 showed this unequivocally: unauthorised music downloads were cut by 20% to 50% when good legal alternatives were available in a country. What’s sad is that having effectively solved the piracy problem through fairly-priced, simple-to-use services offering nearly everything in one package, the film industry is now “unsolving” it by increasing prices unreasonably, and forcing people to subscribe to multiple, fragmented services in order to access the range of material they want.

        • Why Michael Moorcock’s Elric of Melniboné is getting a game after 60 years

          Hillborg said he inquired about the rights to Elric a couple of years ago after a chance conversation triggered the idea. He was told at the time that the ancillary rights to the video game were tied up in a movie license that failed to come through. But a year ago, he was contacted again by Moorcock’s agent, who said the rights to a game were now available.

          Over time, Elric has become a huge part of fantasy culture. The band Blue Oyster Cult made songs about Elric. The Finnish version of Dungeons in Dragons in the 1980s had Elric’s sword, Stormbringer, on its cover. Elric has also been drawn countless times. (Hillborg said he wasn’t yet ready to talk about the game’s art style, but he said the contributions of fans have been amazing.)

          Stockholm, Sweden-based Runatyr will work with development collective Aurora Punks and United Kingdom-based studio Upstream Arcade on the project. The independent-focused companies hope to ship a narrative action computer game in 2024.

        • Can Nigeria lead the way in modernising outdated copyright laws through expanded exceptions?

          The second paragraph above raises an important point. Nigeria’s new copyright law may well serve as a template for the MINT nations, and other rising economies, as they revise their old laws in this domain. If Nigeria brings in wide-ranging copyright exceptions, they could ripple through dozens of legal systems as governments follow suit. Indeed, if Statista’s prediction that Nigeria’s population will reach 400 million in 2050 is correct, it is possible that the country will emerge as one of the trendsetters in copyright law not just for those countries, but for the entire world. Getting it right now is therefore of critical importance.

        • In response to NFT debate

          At CC, we pride ourselves on raising issues thoughtfully and often share articles on our platforms about the digital space where we work. Many times CC staff will expand on these topics through our blog, to provide a perspective that reflects CC’s experiences around our work to support, steward and provide legal and technical assistance for the maximization of digital creativity, innovation and sharing. It is our hope that this open space of conversation will generate different viewpoints and promote civil debate. 


Links 27/11/2021: Nvidia’s DLSS Hype and Why GNU/Linux Matters

Posted in News Roundup at 4:35 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • What Is Linux and Why Is It Important?

        Linux is technically not a desktop operating system, but a kernel. The kernel is the part of your computer that enables physical hardware to communicate with what’s on-screen. The kernel is the reason text appears when you type, the cursor moves when you stroke the touchpad, and images appear on your monitor.

        In the early days of computing, programmers freely shared code and programs. This started to change when corporate entities like IBM, Apple, and Microsoft started to release copyrighted code that users couldn’t view and came with restrictions on use. In response, the GNU Project was formed as an effort to create a fully functional computer powered by software that was still freely shared and distributed.

    • Server

    • Audiocasts/Shows

    • Kernel Space

      • Futex2 Brings Linux Gaming To The Next Level – Invidious

        Futex2 has been a work in progress by Valve and collabora for a very long time and it seems like it’s finally going to make it’s way into the kernel.

      • Patch out for Alder Lake Linux bug that reminds of the Windows 11 Ryzen CPPC issue – Neowin

        Linux boss Linus Torvalds merged earlier today several important patches for Intel CPU generally related to performance states (P-states) on Linux.

      • Linux 5.16 Merges Fix For One Of The Intel Alder Lake Issues – Phoronix

        Merged this Friday afternoon into the Linux 5.16 development kernel is fixing a performance issue affecting some Intel Alder Lake motherboards.

        The fix merged a short time ago is the item previously covered within Linux ITMT Patch Fixes Intel “Alder Lake” Hybrid Handling For Some Systems.

        As explained in that prior article, TurboBoost Max 3.0 / ITMT (Turbo Boost Max Technology) code within the kernel isn’t being enabled for some systems, particularly if overclocking or even any memory XMP / optimal settings. The ASUS Z690 board I’ve been primarily using for the i9-12900K was affected as are numerous other boards. I’ve also heard reports of some motherboards running purely stock are even having this issue.

      • Intel Preparing USI Stylus Support For Linux – Phoronix

        Intel open-source driver engineers have been working on USI stylus support for the Linux kernel. The Universal Stylus Initiative (USI) aims to offer interoperability of active styluses across touchscreen devices.

        The Universal Stylus Initiative has a goal of allowing all styluses that comply with USI to work across devices. USI is backed by the likes of Google who wants to see USI working uniformally across Chromebooks, Dell and other hardware vendors, Intel is also involved and leading the upstream Linux support patches, and peripheral vendors like Logitech are also supporting the standard. Other big names like Wacom, Samsung, and many other players from desktop to laptops to mobile.

      • Graphics Stack

        • RenderDoc 1.17 Released For This Leading Open-Source Graphics Debugging Tool – Phoronix

          RenderDoc 1.17 released this week as the newest version of this leading cross-platform, cross-API graphics debugging utility.

          RendertDoc 1.17 continues to be a gem for developers working with Vulkan and OpenGL along with Direct3D 11/12. RenderDoc as the MIT-licensed frame-capture-based graphics debugger works extremely well for game/engine developers as well as GPU driver developers in working through different issues.

        • DMA-BUF Feedback Support For Wayland Lands In Mesa 22.0′s EGL Code – Phoronix

          Landing in Mesa on Black Friday was DMA-BUF Feedback support within the EGL code as another important step forward for Wayland.

          Introduced earlier this week was Wayland Protocols 1.24 and the primary addition to that collection of protocols is DMA-BUF feedback support. The DMA-BUF “feedback” support is important for Wayland multi-GPU systems where needing to know more information about the GPU device used by the compositor and for being able to efficiently exchange buffers between the secondary and primary GPUs.

        • RADV Vulkan Driver Finally Adds VK_KHR_synchronization2 Support – Phoronix

          The Mesa Radeon Vulkan driver “RADV” has added support for the prominent VK_KHR_synchronization2 extension introduced earlier this year.

          Added back in February with Vulkan 1.2.170 was VK_KHR_synchronization2 for simplifying the core synchronization APIs of this industry-standard graphics API. VK_KHR_synchronization2 makes Vulkan synchronization handling easier to deal with Those interested in the changes with the “synchronization2″ revision can see this Khronos blog post going over the Vulkan synchronization handling in detail along with the changes from this extension.

    • Applications

      • Best Free and Open Source Alternatives to Corel WinZip

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

      • Wireshark 3.6.0 Network Protocol Analysis Software Released

        Recently, Wireshark has released a new version of its free and open-source packet analyzer, Wireshark 3.6.0, with all new features and protocols.

        Originally known as Ethereal, Wireshark has developed a reputation as one of the most reliable network protocol analyzers available out there. It captures packets in real time and display them in human-readable format.

        Wireshark is absolutely safe to use. Government agencies, corporations, non-profits, and educational institutions use Wireshark for troubleshooting and teaching purposes. Probably, there isn’t a better way to learn networking than to look at the traffic under the Wireshark microscope.

        On the other side, there are questions about the legality of Wireshark since it is a powerful packet sniffer. It captures network traffic on the local network and stores that data for offline analysis. Therefore, you should only use Wireshark on networks where you have permission to inspect network packets.

    • Instructionals/Technical

      • How To Install AMD Radeon Driver on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install AMD Radeon Driver on Ubuntu 20.04 LTS. For those of you who didn’t know, Installing AMD Radeon drivers on the Ubuntu system is an easy task that can be done in less than a minute. Radeon driver is needed by your AMD Radeon Graphics GPU to function with better performance. Some Linux distributions offer the proprietary driver pre-packaged as part of its standard package repository making the entire AMD Radeon Linux Driver procedure extremely easy to follow.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FreeOffice on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • What you need to know about disks and disk partitions in Linux – LinuxBSDos.com

        This is an update to A beginner’s guide to disks and disk partitions in Linux, which itself was an update to Guide to disks and disk partitions in Linux. It is intended to be an absolute beginner’s guide to understanding how disks and disk partitions are handled in Linux. This update adds info on NVMe SSDs.

        If you are migrating from Windows to Linux and are attempting to install any Linux distribution alongside Windows 10/11 on your computer, this article should come in handy. You’ll read about hard drive naming convention in Linux, how they are partitioned, partition tables, file systems and mount points.

        By the time you are through reading this, you should have a pretty good idea of what you are doing when installing your next Linux distribution on your laptop or desktop computer. An understanding of all the aspects concerning how a disk is referenced and partitioned will put you in a better position to troubleshoot installation and disk-related problems. Most of the highly technical terms associated with this subject have been omitted, so this should be an easy read.

      • How To Install PrestaShop on Debian 11 – idroot

        In this tutorial, we will show you how to install PrestaShop on Debian 11. For those of you who didn’t know, PrestaShop is a freemium, open-source e-commerce software. It lets you start your own online store with secure payments, multiple shipping methods, custom themes, and more. PrestaShop written in PHP is highly customizable, supports all the major payment services, is translated in many languages and localized for many countries, has a fully responsive design (both front and back-office), etc.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of PrestaShop e-commerce software on a Debian 11 (Bullseye).

      • How to Install Asterisk VoIP Server on Debian 11 | 10 – Linux Shout

        In this tutorial, we will discuss some of the steps and commands to install the Asterisk VoIP server on Debian 11 Bullseye or 10 Buster using the terminal to call over Android or iPhone using a local network.

      • How to install Docker-ce on Ubuntu 21.10 – NextGenTips

        In this tutorial am going to show you how you can install Docker-ce on Ubuntu 21.10.

        Docker is a set of platform as a service product that uses OS-level virtualization to deliver software in packages called containers. Containers are usually isolated from one another and bundled their own software libraries and configuration files, they can communicate with each other through well-defined channels.

        Docker makes it possible to get more apps running on the same old servers and also makes it easy to package and ship programs.

      • How to Uninstall Software On Ubuntu

        Regardless of the operating system you are using; there are multiple reasons why you might want to uninstall software. Maybe the software has become corrupted, and it doesn’t function the same as before, or your application is now virus-ridden, so uninstalling it is safe. There are times when you don’t use the software anymore, so you uninstall it to make space.

        We all know that Ubuntu and other Linux distros are different from the commonly used Windows. Users migrating from Windows to Ubuntu can find it hard navigating even the basic stuff. Uninstalling software can be tricky, so this article will help you understand the different ways you can bin software in Ubuntu.

      • How to Mount USB Drive on Linux

        We live in the modern age of technology where there are multiple important variables to keep track of. But arguably, the biggest variable today is “data”. With some maturing and emerging technologies, everything is being centered around the quantity and quality of data. Thus, gathering and protecting data has become paramount.

        These days, it’s quite common to see people carrying their data around at all times. Different devices and technologies are used for this purpose, including a certain device called USB (Universal Serial Bus).

        A USB is an electronic communication protocol (ECP) most commonly used for computer accessories and other small-end electronic devices, either for data transfer or power transfer. Although USBs are being phased out slowly due to technologies such as “Cloud Computing”, there is a sense of privacy and security with using USBs that you don’t get with other methods.

        Accessing USBs is straightforward. It is a plug-and-use device, so the stick only needs to be connected to your computer via a USB port. Usually, USBs mount themselves automatically to your system regardless of the operating system, but there are instances where there is a problem, and the USB refuses to connect.

        For such times, if you are using a Linux distro, it is best to use the Terminal and execute your way to mount the USB in your computer. This article will be guiding you on how exactly you can achieve this task.

        Although it is time-consuming, once you know how to mount a USB in Linux, you will feel lightened, and it will be easier for you to perform it the next time when needed. So follow these instructions to get a proper hang of it.

      • How do I change my homepage in WordPress?

        This brief tutorial explains how to change the homepage in WordPress.
        After reading this tutorial, you’ll learn the two common ways to define your website homepage by editing WordPress settings. This article also includes instructions to create a new page to set as a homepage or a posts page if you have not created a home page.

        All steps described in this tutorial include real screenshots and can be followed by any WordPress level user.

      • How do I Rename a Column in MySQL?

        MySQL is a popular database management system that provides the backbone for a huge portion of today’s internet. Developed and maintained by Oracle, MySQL is an open-source RDBMS (relational database management system) with a client-server model. It offers secure database storage, fast performance, and powerful features.

        This guide will showcase how to rename a column in MySQL.

      • What Are Environment Variables in Linux? Everything You Need to Know

        If you’ve been using Linux for a while, you may be wondering how to set certain parameters from the command line that can keep your settings across programs. Environment variables are how you do this.

        By the end, you’ll have a deep understanding of what environment variables are, and how you can create such variables from the command line.

      • SysMonTask – SparkyLinux

        There is a new application available for Sparkers: SysMonTask

    • Games

      • Godot Engine – Multiplayer in Godot 4.0: Scene Replication (part 1)

        It’s finally time for the long-awaited post about the new multiplayer replication system that is being developed for Godot 4.0. Below, we will introduce the concepts around which it was designed, the currently implemented prototype, and planned changes to make it more powerful and user-friendly.

        Design goals

        Making multiplayer games has historically been a complex task, requiring ad-hoc optimizations and game-specific solutions. Still, two main concepts are almost ubiquitous in multiplayer games: some form of messaging, and some form of state replication (synchronization and reconciliation).

        While Godot does provide a system for messaging (i.e. RPC), it does not provide a common system for replication.

        In this sense, we had quite a few #networking meetings in August 2021 to design a replication API that could be used for the common cases, while being extensible via plugins or custom code.

      • Proton 6.3-8 supports DLSS via DirectX 11 and 12 – LinuxStoney

        Competition has forced NVIDIA to take better care of the Linux desktop, a market in which it has traditionally swept by idling due to its rivals failing to do better. Luckily, the appearance of FidelityFX Super Resolution and the proximity of dedicated graphics from Intel and XeSS forced the green giant to move forward to bring DLSS to Proton, adopt Wayland standards and even publish as its rescaling technology Open Source .

        Now, with the release of Proton 6.3-8 (the latest version of the stable branch), Linux users can officially run DLSS via DirectX 11 and 12 , whose instructions are translated into Vulkan via DXVK and VKD3D respectively. To make use of this support, in the launch parameters of the game you have to put PROTON_USE_WINED3D=1 %command%, while in the file ‘ dxvk.conf ‘ you have to set the option ‘dxgi.nvapiHack’ to False ( dxgi.nvapiHack = False).

        Regarding Windows games that use Vulkan natively, such as DOOM Eternal, No Man’s Sky and Wolfenstein: Youngblood, NVIDIA already said at the time that they can make use of DLSS , its well-known supersampling technology supported by Artificial Intelligence. which is responsible for reducing the performance impact caused by ray tracing and opening the door to consolidate 4K and 8K resolutions in PC video games.

      • Nvidia’s DLSS Has Come To Linux Gaming

        Years after its failed Steam Machines, Valve is slowly but surely improving the state of Linux gaming.

      • Nvidia’s DLSS has come to Linux gaming (but not the Steam Deck obviously)

        Years after its failed Steam Machines, Valve is slowly but surely improving the state of Linux gaming. The company’s upcoming Steam Deck handheld runs atop Linux, and its Proton compatibility layer lets it — and other computers — play Windows games as well. Now, Valve has officially added support for Nvidia’s DLSS machine learning temporal upscaling technique to Proton, potentially bringing big FPS boosts and less flicker in games that support the technology.

      • NVIDIA DLSS Landing On Proton Is A Win For Linux Gaming But There Are Caveats
      • Proton now officially supports Nvidia DLSS, but it won’t come to Valve’s Steam Deck | PCGamesN

        Valve is paving the way for us to ditch Windows and dive into Linux PC gaming, as the Steam Deck leads the charge with SteamOS and its Proton compatibility layer. Now, with the release of Proton 6.3-8 (via Videocardz), the company hopes to tempt even more players to jump ship with official support for Nvidia DLSS.

        The proprietary upscaling technology can help boost fps in games like Call of Duty: Vanguard or Back 4 Blood, without sacrificing much in the way of image quality. Unfortunately, team green’s upscaling technology won’t be supported on the Steam Deck as it uses an AMD Zen2-based SoC, and Nvidia DLSS requires an RTX chip.

      • Nvidia DLSS Upscaling Will Not Be Compatible With Steam Deck

        Upscaling is fast becoming the industry standard in modern AAA gaming, if it isn’t already. Nvidia and AMD have their own versions, with Intel working on one for its upcoming range of GPUs, though “team green’s” algorithm is probably the more popular one. The likes of Back 4 Blood use Nvidia’s DLSS, or Deep Learning Super Sampling, with the purpose to improve visual fidelity using machine learning. However, not every system is going to be compatible with it, as it turns out that Valve’s upcoming Steam Deck handheld PC won’t have this specific upscaling technology.

        According to a recent report, it won’t be possible for the Steam Deck to use DLSS, which may be a concern for some people. However, the reason why is quite simple. Nvidia’s technology requires one of its own graphics cards, specifically one from the RTX range, such as the RTX 3070 Ti for example. Given that the Deck uses an AMD product under the hood, it won’t be compatible with the rival upscaling algorithm. But that does mean it can run AMD’s own FidelityFX Super Resolution, or FSR, instead so it will still have upscaling, just not Nvidia’s. It’s also possible that it could be compatible with Intel’s upcoming Xe Super Sampling as well.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • October/November in KDE Itinerary

          Since the last summary KDE Itinerary has been moving with big steps towards the upcoming 21.12 release, with work on individual transport modes, more convenient ticket access, trip editing, a new health certificate UI, better transfer handling and many more improvements.

          New Features

          Current ticket access

          A small but very convenient new addition is the “Current ticket” action, which immediately navigates you to the details page of the most current element on the itinerary. That comes in handy when having to show or scan your ticket and avoids having to find the right entry in the list in a rush.

          This action is now also accessible from jump list actions in the taskbar on Linux, or app shortcuts on Android. Combined with the easily accessible barcode scanmode mentioned last time it’s now just two clicks or taps to get ready for a ticket check.

      • GNOME Desktop/GTK

    • Distributions

      • BSD

        • GhostBSD 21.11.24 Update Download – itsfoss.net

          The release of the desktop-oriented distribution kit GhostBSD 21.11.24 , built on the basis of FreeBSD 13-STABLE and offering a user environment MATE, has been published. By default, GhostBSD uses the ZFS file system. Both work in Live-mode and installation on a hard disk are supported (using its own installer ginstall, written in Python). Boot images are built for the x86_64 architecture (2.6 GB).

          The new version includes the ghostbsd-version utility to display the version of GhostBSD, the base FreeBSD version, the FreeBSD kernel used and the system environment. The repos package has been added to the repository with information about the current version of the repository. On the system, version information has been added to the / etc / version file updated by the ghostbsd-build toolkit and the update installation manager. In the dialog shown after the installation of updates is complete, the restart button is now displayed first on the right.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Libreboot 20211122 Released, a completely free Coreboot distribution – itsfoss.net

        Published release free firmware boot Libreboot 20,211,122 . This is the third release of the GNU Project and continues to be touted as a test release as it requires additional stabilization and testing. Libreboot develops a completely free project fork of the CoreBoot, providing a binary-stripped replacement for proprietary UEFI firmware and BIOS that are responsible for initializing CPU, memory, peripherals and other hardware components.

        Libreboot is aimed at creating a system environment that allows you to completely do without proprietary software, not only at the operating system level, but also firmware that provides loading. Libreboot not only removes non-free components from CoreBoot, but also enhances it with tools to make it easier for end users to use, creating a distribution that can be used by any user with no special skills.

      • FSF

        • GNU Projects

          • Loongson Posts Patch Series For Bringing Up LoongArch In GCC Compiler – Phoronix

            China’s Loongson continues bringing up LoongArch processor support for Linux with this MIPS64-based ISA now seeing the complete patch series for review to enable the GNU Compiler Collection (GCC).

            For months Loongson has been working on LoongArch support for the Linux kernel to varying extents from the new CPU ISA functionality to copying a lot of existing MIPS64 code and adding in new IDs. That Linux kernel support is still in the works.

      • Programming/Development

        • An Introduction to MATLAB: Structure and Application

          Programming is the core of a modern computer. You can not even think of an alive computer without programming. There are several languages to do computer programming, and each of them has its special field. Some are known for scientific computation, and some are specialized for making the building blocks of an operating system. MATLAB is also a very popular programming language. Today we are going to get an absolute introduction to MATLAB and its wide application in today’s world.

          Although there is a wide variety of programming languages available there in the virtual world, we have chosen MATLAB for several important reasons. It is a compact language for heavy-duty works. We are going to discover each and every detail of MATLAB in this journey. Stay with us to learn. The more you know, the more you grow.

        • Perl/Raku

        • Python

          • Convert a String to JSON Python

            In Python, strings are a series of elements or items. The strings are unchangeable objects. We cannot change the string after their declaration. “JavaScript Object Notation” is the full form of JSON. In Python, the ‘JSON files contain information that is readable for humans. The elements appear in the form of pairs.

            In web APIs, the information we send and receive is usually in the form of a dictionary string. To utilize this information, we extract consequential data. For this, we have to convert this information to dictionary format for more operations. JSON provides several techniques for serializing and deserializing “JSON”. The process of changing the string to “JSON” is called serializing. And the process of converting the JSON to a string is known as deserializing. Serialization is the opposite of deserialization. Several methods are used to convert strings to JSON.

          • How Do You Repeat a String n Times in Python?

            In Python, we utilize the asterisk operator to repeat a string. This operator is indicated by a “*” sign. This operator iterates the string n (number) of times. The “n” is an integer value. After repetition, a new string is created. The operation requires two arguments: a string and an integer value. We multiplied the string by a specific number for the repetition of string n times. Repeating the string merges the copy into an identical string. The asterisk operator repeats the string up to a definite length.

          • How Do I Check If a String Is Empty in Python?

            The strings are unchangeable. We cannot modify the string after defining it. Different operations are performed on strings. If we have a string that contains only whitespaces in it, that string is not considered empty. It contains the size of the non-zero value. So, if len() method and “not” operator is applied on this type of string, it considers whitespace as an element of the string. Sometimes in Python, we want to check whether the specified string is blank or not. To check the emptiness of the given string, use the “not” operator to utilize the variable of string instead of a condition, or utilize the equal operator to match an empty string. Now, we are going to explain numerous methods…

        • C++

          • Static Method C++

            A method in C++ is also known as a function, and using methods in C++ promotes the concept of modular programming and code reusability. It means the methods that are once written can be called repetitively for as many times as needed without having the necessity of writing them every time.

          • C++ Unsigned Integers

            The integer data type in C++ is further divided into many sub-types. One such sub-type is the unsigned integers. The unsigned integers are capable of storing only the positive whole numbers. The unsigned integers in C++ are preferred while manipulating bits in operating systems since you have limited storage space. Moreover, they can also be used for array indexing since the index of an array can never be negative. This article is devoted to the discussion of the unsigned integers in C++ in Ubuntu 20.04.

          • C++ Getline function

            Getline() is used to get the input string from the user in one or more lines until a special character comes (delimiter). It is a predefined function and uses a library in the program, as its definition is present inside the library’s header file.

          • C++ Pointer Arithmetic

            Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). How an exponent can be used for raising a number to a certain power in C++ is discussed in this article.

          • Exponents in C++ to Raise a Number in Power

            Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). So, within today’s article, we will see how an exponent can be used for raising a number to a certain power in C++. Make sure to have a G++ compiler already installed and configured on your Linux operating system. Let’s start implementing today’s article by opening the shell terminal using the shortcut “Ctrl+Alt+T”. As the terminal is opened now, we can start implementing our examples.

          • Bit masking in C++

            Bit masking is a process that is used to access a specific bit in the bytes of data. This phenomenon is used when you are performing the process of iteration. A bitmask is said to be a mask of a sequence of N –bits that are used to encode a part of our collection.

            These elements of the mask can be set or cannot be. There are bitwise operators to create or toggle the bits. These operators are used to turn on the off bit or vice-versa.
            To use the C++ programs in executing them on Linux, you need to have the Ubuntu file configured and in running state. Moreover, the user must have some knowledge of the C++ language. C++ source codes are written in the text editor. Whereas for the execution process, use the Ubuntu terminal.

            A bitmask is also said to be a simple mask that is a sequence of n bits. It encodes the subset of the collection. The element ‘I’ is present in the subset of the ‘ith’ bit is set in the mask. For the set of elements having nth bytes, there are chances of having a 2N mask corresponding to a subset.

          • Deep Copy C++

            The copy means the same to the same replica of an original object. Within programming, there are different methods to create copies of objects. The copy of objects, variables can be done with a copy constructor or using the default assignment operator “=”. Two types of copies can be made within the C++ code, i.e., shallow and deep copy. You can use one to copy any variable or object in the code. When our object has variables that are dynamically allocated throughout the program, we need to create a Deep copy of such type of object. This article will see how a Deep copy can be created in C++.

  • Leftovers

    • Hardware

      • Indoor Blimp Sails Through The Air Using Ultrasonic Transducers | Hackaday

        Quadcopter type drones can be flown indoors, but unless you have a lot of space, it usually just ends in a crash. The prospect of being hit in the face by the propellor blades, spinning at 10k RPM doesn’t bear thinking about, and then there’s the noise. So, as a solution for indoor photography, or operating in public spaces, they are not viable. Japanese mobile operator DOCOMO has a new take on an old idea; the blimp. But, surely even a helium filled vehicle needs blades to steer around the room, we hear you cry? Not so, if you use a pair of specialised ultrasonic transducer arrays to move the air instead! (Video, embedded below)


        Blimps are by no means scarce on these fine pages, here is a Blimpduino, an Arduino controlled 3D printed blimp, an illuminated blimp art installation by Japanese artist [Kensho Miyoshi] and if using helium is just too darn safe for you (or if you want to help prevent this allegedly precious resource from being lost into space) you could just build a remote controlled blimp using hydrogen instead. Just don’t light a match.

      • Impressive Off-Grid Hydroelectric Plant Showcases The Hacker Spirit | Hackaday

        We all know the story arc that so many projects take: Build. Fail. Improve. Fail. Repair. Improve. Fail. Rebuild. Success… Tweak! [Kris Harbour] is no stranger to the process, as his impressive YouTube channel testifies.

      • Finally, Tame The Si5351! | Hackaday

        The Si5351 is an extremely useful device, containing multiple clock generators with many versatile programming options that go well beyond its original purpose of providing a clock for digital circuitry. It has in particular found a spot in RF projects, where it provides a cheap and effective stand-in for a variable frequency oscillator in everything from receivers to VNAs. It’s fair to say that programming the Si5351 isn’t the easiest of tasks though, and joining the various attempts to make this simpler is [MR-DOS], who has created an Si5351 library for the STM32 range of ARM Cortex M processors. Fortunately for those afflicted by the semiconductor shortage there’s the advice that porting it to other architectures should only require the relatively manageable task of modifying the i2c function for the new hardware.

      • Perovskites Understood | Hackaday

        The usual solar cell is made of silicon. The better cells use the crystalline form of the element, but there are other methods to obtain electric energy from the sun using silicon. Forming silicon crystals, though, can be expensive so there is always interest in different solar technologies. Perovskite is one of the leading candidates for supplanting silicon. Since they use lead salts, they are cheap and simple to construct. The efficiency is good, too, even when the material is not particularly well ordered. The problem is every model science has on what should make a good solar cell predicted that orderly compounds would perform better, even though this is not true for perovskite. Now scientists at Cambridge think they know why these cells perform even in the face of structural defects.

      • Spiral Music Visualization | Hackaday

        LEDs display different pitches in a sunburst pattern
        Displaying notes live as they are being played can be a really powerful learning tool, but it’s usually used to learn how to play a specific instrument. This take on the topic is actually a neat way to learn more about music theory — how pitches work together to build the sounds that we hear. The visual tack chosen arranges each of 12 notes into a spiral. As you continue to go up the scale through more octaves, pitches that share the same name line up into a line like a ray projecting out from the sun. So there are 12 rays for the notes in the scale: C, C#/D♭, D, D#/E♭,F, etc.

        [mechatronicsguy] built it a few years back but just now got around to documenting it, and we’re sure glad he did. The layout of notes at first looks just like a colorful visualization. But as he mentions in his description, this assigns a shape to each different type of cord. A major cord will have the same shape whether it is played with C, G#, B♭, or any other note as the root. The shape simply rotates around the axis based on that root note. Higher octaves will be shown further out on the radius, but the chord shape will still be the same. Minor, augmented, even modal chords and those with added pitches all have their own unique shape on the display.

    • Integrity/Availability

      • Proprietary

        • Security

          • Vulnerability in firmware of MediaTek DSP chips used in many smartphones – itsfoss.net

            Researchers from Checkpoint have identified three vulnerabilities (CVE-2021-0661, CVE-2021-0662, CVE-2021-0663) in the firmware of MediaTek DSP chips, as well as a vulnerability in the MediaTek Audio HAL audio processing layer (CVE-2021- 0673). In case of successful exploitation of vulnerabilities, an attacker can organize eavesdropping on the user from an unprivileged application for the Android platform.

            In 2021, MediaTek accounts for approximately 37% of shipments of specialized chips for smartphones and SoCs (according to other data, in the second quarter of 2021, MediaTek’s share among manufacturers of DSP chips for smartphones was 43%). Among other things, MediaTek DSP chips are used in flagship smartphones by Xiaomi, Oppo, Realme and Vivo. MediaTek chips, based on the Tensilica Xtensa microprocessor, are used in smartphones to perform operations such as processing sound, images and video, in computing for augmented reality systems, computer vision and machine learning, as well as implementing fast charging.

          • CronRAT: A New Linux Malware That’s Scheduled to Run on February 31st [Ed: This is not about "Linux" and Linux isn't how or why this malware gets on systems in the first place]

            Researchers have unearthed a new remote access trojan (RAT) for Linux that employs a never-before-seen stealth technique that involves masking its malicious actions by scheduling them for execution on February 31st, a non-existent calendar day.

            Dubbed CronRAT, the sneaky malware “enables server-side Magecart data theft which bypasses browser-based security solutions,” Sansec Threat Research said. The Dutch cybersecurity firm said it found samples of the RAT on several online stores, including an unnamed country’s largest outlet.

          • Unexpected database server downtime, affecting bugs, forums, wiki

            Due to an unexpected breakage on our database servers, several Gentoo websites are currently down. In particular, this includes Forums, Wiki, and Bugzilla. Please visit our Infrastructure status page for real-time monitoring and eventual outage notices.

    • Internet Policy/Net Neutrality

      • FTP vs TFTP compared

        In today’s digital world, it is common to transfer files over the internet and it is crucial to choose a protocol that defines your organization’s needs. So, there are different protocols available that can do this job and two of the most important ones are the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP). In this article, we will focus on these two protocols and their significance along with some drawbacks so that you can choose accordingly as per your requirement.

    • Monopolies

      • Patents

        • Software Patents

          • You Can’t Patent Software, Right?! …Or Can You? [Ed: Loopholes for illegal patents, disgracing the patent system, which no longer seems to be about law or science, just enriching monopolists and law firms]

            Most jurisdictions place limits on patenting software inventions, and the guidance published by different patent offices around these limitations has not always been clear. Moreover, software patents are an area of patent law that is still in flux though eligibility requirements are becoming increasingly well-defined and harmonized. Many people also confuse the code, which cannot be protected by a patent, with the functional aspects of the software, which can be patentable.

Links 27/11/2021: Tux Paint 0.9.27 and SeaMonkey 1.1.19 in EasyOS

Posted in News Roundup at 10:03 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Is Linus Trolling The Linux Community? – Invidious

        Linus and Luke (from Linus Tech Tips) recently published video number two of their “Linux gaming challenge”. In this video, both men had some complaints about their Linux experience so far. Linus, in particular, had a lot of negative things to say. Here are some of my thoughts on their video.

    • Applications

      • Tux Paint 0.9.27 Open-Source Drawing App for Kids Adds New Ways to Draw, Other Updates

        Tux Paint 0.9.27 is here almost four months after the previous release, Tux Paint 0.9.26, and introduces new ways to draw to the popular children’s drawing program. These include no less than six new Magic tools, such as Panels for shrinking and duplicating drawings into a 2-by-2 grid like those used for four-panel comics.

        Other new Magic tools included in this release are Opposite for producing complementary colors, Lightning for interactiv drawing of a lightning bolt, Reflection for creating lake-like reflections on drawing, Stretch for stretching and squashing pictures, and Smooth Rainbow as a more gradual variation of the classic Rainbow tool.

      • 12 Best Free and Open Source OCR Tools – LinuxLinks

        Optical Character Recognition (OCR) is the conversion of scanned images of handwritten, typewritten or printed text into searchable, editable documents. OCR software is able to recognise the difference between characters and images, and between characters themselves.

        The use of paper has been displaced from some activities. For example, the vast majority of journeys on the London Underground are made using the Oyster card without a paper ticket being issued. We have witnessed talk of a paperless office for more than 40 years. However, the office environment has shown a resistance to remove the mountain of paper generated. Things have changed in the past few years, with a marked shift in the paperless office concept. Paper documents contain a wealth of important management data and information that would be better stored electronically. There is computer software that makes this conversion possible. The benefit of scanning documents is not purely for archival reasons. OCR technology is vital for gaining access to paper-based information, as well as integrating that information in digital workflows.

        The selection of the right OCR tool is dependent on specific needs. For some, online OCR services may be useful, but there are privacy concerns and file size limitations. This article focuses on desktop, open source OCR software that offer good recognition accuracy and file formats. We cover OCR engines as well as front-end tools.

        OCR software is not mainstream so open source alternatives to proprietary heavyweight software are fairly thin on the ground. Matters are also complicated by the fact that OCR computer software needs very sophisticated algorithms to translate the image of text into accurate actual text. The software also has to cope with images that contain a lot more than text, such as layouts, images, graphics, tables, in single or multi pages.

    • Instructionals/Technical

      • Setup C++/Qt SDK Programming Environment on Ubuntu 21.10 Impish Indri

        This tutorial explains how someone can setup C++ language and Qt Software Development Kit on Ubuntu 21.10 for doing software development that is world-class, full-featured, complete and crossplatform under free software licenses. For your information, Qt is the material that built professional computing software like Kubuntu, KDE and Telegram. With this tutorial you will get a full set of tools ready to use consisted of an advanced IDE Qt Creator, a GUI editor Qt Designer, a lot of code examples Qt Examples, an internationalization tool Qt Linguist and a documentation viewer Qt Assistant aside from the compiler G++ and the build tool QMake. Let’s start!

      • How to Install Apache Cassandra on Ubuntu and Other Linux – It’s FOSS

        Apache Cassandra is a free and open-source NoSQL database management system drawn to manipulate large amounts of information across many servers, providing high availability with no single point of failure.

        I am not going into the details of NoSQL database. I am going to so you how you can install Apache Cassandra on Ubuntu based Linux distributions.

      • SeaMonkey 1.1.19 compiled in EasyOS

        As I seem to have settled on Firefox as the main browser in EasyOS, I still want to keep a WYSIWYG HTML editor in the build, builtin. So, my mind turned to considering old versions of SeaMonkey…
        Looking at my old notes, the 1.1 series look good. Very old, version 1.1.19 was the last, released, I think, in 2010. The 1.1 series was the last, I think, that can be configured to build a standalone composer.
        But, then, with SM you get the browser and composer editor, both, for not much increase in size. So why not build the suite. The browser could be a substitute for the ‘surfer’ HTML viewer that I am currently using to view local help files in Easy.

      • How to install Proxmox? – Unixcop the Unix / Linux the admins deams

        Hello, friends. In this post, you will learn how to install Proxmox on a completely clean server. For this, then I will use a virtual machine but the procedure is simple and the same as on a real physical server.

        What is Proxmox?

        Proxmox VE “Virtual Environment” is a powerful enterprise-level virtualization platform 100% free and unlimited in its use.

        Of course, it has a license that allows us to obtain additional features that facilitate the administration of it. But in general, we can use it in many of our projects for free.

        Proxmox is essentially a Debian that adds KVM virtualization and Container-based Virtualization. Therefore the whole base is Free and this makes it possible for the final product to be free. How is it supported? The proxmox business model is based on training, certifications, and support and as I mentioned an enterprise license.

        One of the main advantages of Proxmox is that it has a JavaScript web interface. This has an intuitive design where all KVM clients, Linux containers, storage units, and clusters are displayed.

        So, let’s go for it.

      • Installing ArcoLinux on Windows 11
      • Removing ArcoLinux from Windows 11
      • Install ArcoLinux on Windows 11 on VirtualBox
      • Install ArcoLinux on Windows 11 on Vmware 16
      • How to dual boot Windows 11 and ArcoLinux
      • Dual booting Windows 11 encrypted and ArcoLinux on a laptop
    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • This week in KDE: Fixing a bunch of annoying bugs – Adventures in Linux and KDE

          This was a major bug squashing week, with quite a lot of annoying issues fixed–some recent regressions, and many longstanding issues as well.

          On the subject of bugs and recent regressions, I’m starting to think from a higher level about how we can prevent them. KDE has largely conquered our historical issues of excessive resource consumption and visual ugliness, and our next major challenge on the path towards world domination is reliability. One idea I’m toying with is starting an initiative to focus on the “15 minute bugs”–those embarrassing issues that can easily be found within just a few minutes of using the system normally. Here is a preliminary list of these issues in Plasma. I would encourage any experienced developers to try to focus on them! The impact will be very high.

        • KDE Squashes Many “Annoying” Bugs As It Works To Improve The Desktop’s Reliability.

          KDE developers are trying to ensure the reliability of their desktop environment and thus they have recently begun a renewed effort on bug fixing. There is also talk of starting a KDE initiative focused on “15 minute bugs” for “embarrassing” issues that can be easily found within minutes. In any event, this week saw a lot of bug fixing in the KDE world.

          KDE developer Nate Graham in his latest weekly development summary outlined many of the bugs that were fixed and some of his initial thinking about the possible “15 minute bugs” initiative. Fixed this week included:

          - Fixing support so archives can be created using Ark’s main user-interface.

          - Touch scrolling for the Konsole now works properly.

    • Distributions

      • IPFire Linux Firewall Now Supports exFAT, Boosts Intrusion Prevention System’s Performance

        IPFire 2.27 Core Update 161 introduces several new features, performance improvements, and some other important changes. For example, it brings support for the exFAT file system, support for the FriendlyARM NanoPI R2S open-source mini router, as well as Fast Flux Detection in the web proxy to proactively detect Fast Flux setups.

        Among the performance improvements included in this update, there’s a large increase of throughput for the Intrusion Prevention System (IPS), allowing it to decide if the traffic from a certain IP connection needs to be seen or not and tell the kernel to bypass it.

      • BSD

        • OpenBSD on the VIA Eden X2 powered HP t510 Thin Client

          Back in 2017, I bought two used HP thin clients on a local auction site, the t5570e and the t510, both of them powered by VIA x86-64 CPUs. In this article, I will focus on the t510, which is the more powerful of the two.

      • Debian Family

        • Bullseye

          I just upgraded my Debian GNU/Linux server to Bullseye, 11. Except for a shortage of disc space everything went smoothly. It was my fault. I created a bit too small a / partition when I moved to a newer computer… I looked around and found gigabytes of cruft I could clear out to make things fit: obsolete compilers, files I was never likely to use and I deleted a few packages I was never likely to use. Did that from my smartphone while watching old news on CNN. Went to the console for the real work which took about ten minutes.

    • Devices/Embedded

      • VisionFive V1 RISC-V Linux SBC resurrects BeagleV single board computer – CNX Software

        Last summer we reported that BeagleV StarFive RISC-V SBC would not be manufactured, but all was not lost as StarFive would collaborate with Radxa to make a new single board computer based on their JH7100 dual-core 64-bit RISC-V processor.

        But thanks to a report on Heise and extra photos acquired by CNX Software, we now have more details about the board that mostly comes with the same features as the BeagleV StarFive, but a completely different layout that brings all the main ports to one side of the board.

      • A masterclass in over-engineering

        Twitter went wild for the Robot Arm Clock featured in the new issue of The MagPi. At the last count our tweet had 1.8K retweets.

        We also showed you how to make Dune’s Gom Jabbar test, and we enjoyed a little Chopin as we watched a piano control LED lights.

      • Open Hardware/Modding

        • BeagleV RISC-V SBC reborn as VisionFive V1

          StarFive revealed details about a “VisionFive V1” SBC (formerly BeagleV) that runs Linux on a StarFive JH7100 SoC with dual 1.5GHz SiFive U74 cores and a 1-TOPS NPU based on RV64GC RISC-V. The Pico-ITX SBC has up to 8GB RAM and 40-pin GPIO.

          In January, BeagleBoard.org and Seeed launched an early access release of a BeagleV SBC (later referred to as the BeagleV – StarLight) that runs Linux on a RISC-V architecture StarFive JH7100 SoC with dual Cortex-A55 like SiFive U74 cores. BeagleBoard.org withdrew from the project over the summer, and StarFive is now prepping an updated version called the VisionFive V1.

        • Converting a Fat Cat cushion into a controller for Final Fantasy XIV | Arduino Blog

          Mounts in the video game Final Fantasy XIV act like how cars or horses do in our world since they allow players to travel around the map much faster than would otherwise be possible. But even better, mounts are ways to express personality and have some fun, which is especially evident with the infamous “Fatter Cat” mount, as it got so widely beloved that Square Enix, the game’s publisher, decided to start selling a plushie version of it in their store.

        • Unsurv offline open source, privacy friendly GNSS receiver with ESP32 & NFC

          “unsurv offline is a privacy friendly, small and lightweight PCB based on an ESP32 featuring a high quality GNSS receiver, accelerometer, and NFC capabilities. Using a combination of onboard features and OpenStreetMap (OSM) data, unsurv offline helps you collect and analyze location data in a privacy-friendly way. Originally conceived to better understand offline video surveillance, this fully open source project is here to help you find and develop a variety of custom use cases.”

    • Free, Libre, and Open Source Software

      • Open-Source Virtual Assistant Almond Renamed Genie

        Genie (and Almond) were designed as an alternative to Alexa, Google Assistant, and other common voice assistants. Stanford computer systems designer Dr. Monica Lam set up OVAL to create a decentralized virtual assistant that stored and shared information based on user preferences, without mandates from a company. Almond’s success led to discussions of a rebrand to go with making a commercial product out of the academic experiment. The group wanted to come up with a word that would be useful regardless of the language spoken, thus accommodating international users. The researchers considered other names, like Coco, Mario, and Nico, before settling on Genie as the best option, one unrelated to the Genie virtual assistant developed by Disney for its theme parks and resorts or Alibaba’s Tmall Genie voice assistant.

      • Programming/Development

        • [Old] Advantages of Functional Programming

          At present, functional programming is rather popular, and many imperative languages are adopting some FP concepts such as lambda functions, partial application (currying) and higher-order functions (map, filter, folding). Some of the adoptions blend seamlessly, but some make the syntax look rather weird and foreign. Nevertheless, a programming paradigm is an approach that exists in the programmer’s mind, and is generally not part of the language itself. To some extent, any language supports different paradigms, and its structures allow developing software in various styles. The question of whether it makes sense to develop software in the functional style can’t be answered easily, and each developer will answer it based on their preferences, capabilities of the language, and other considerations. We believe that using the functional style in imperative languages or, better still, the functional language, especially in combination with static typing, will help to improve many aspects of the code, namely: [...]

        • Shell/Bash/Zsh/Ksh

          • The fish shell is amazing

            I’ve been lurking the fish shell for a couple of years now (and the nushell but it is another story for another time). Not so long ago, I decided to try it, and it’s simply… amazing. If I had to state one feature that makes me like to use it, it’ll be the autocompletion, hands down. It’s the first time I just take a shell and without customization it’s pleasing to use.

  • Leftovers

    • Goodbye Shuffle

      These days a whole song let alone a whole album is hard to catch on. Songs often go viral based on ten-second TikTok clips. TikTok made me feel old for the first time. It was too fast for even a millennial like me. I heard an interesting critique of millennials from the left by some people from Gen Z which I thought was worth sharing. Millennials in their view were too focused on themselves. Millennials recognized the crisis we are in but ultimately longed for a capitalist life like their parents. The youngest people are always the most radical so it’s worth noting the continued evolution of revolutionary consciousness growing from anti-capitalist to collectivist as evidenced by the rise of mutual aid.

      Time itself is sped up these days. We have so much stimulus and little time for reflection. As time goes into hyper-speed it is space that is condensed amidst the stay-in-place nature of the lingering pandemic. At this point the pandemic is likely permanent for the poorest people in the world. For the rich space is condensed but for the poor space has spread out to chase capital as migration and delivery becomes key to a pandemic economy.

    • Who Is the University of Austin For?

      The University of Austin (UATX) was announced to great fanfare on Monday, November 8, on the popular Substack of former New York Times opinion editor Bari Weiss. “We got sick of complaining about how broken higher education is,” Weiss tweeted that morning, “So we decided to do something about it. Announcing a new university dedicated to the fearless pursuit of truth.” Headed by Pano Kanelos, the former president of St. John’s College in Annapolis, UATX boasted a roster of prominent academics and journalists known for pushing back against what they see as the hegemonic culture of “wokeness” that has supposedly undermined free expression and intellectual inquiry at America’s leading universities.

    • Reclaiming a Lost Sense of Community

      “It” amounted to this: It was Wednesday afternoon, I had finished my column early and walked out to my car, parked in the alley behind my house. I was on my way to an art show — very excited. I got in the car — hmmm, why is it so cold in here? — began backing out, what’s that? It looked like there was something on my rear window. I got out, walked around back. Oh my God! My rear window has been smashed in! What I saw was a fragment of broken glass dangling in a corner.

      Was this a robbery? I had two umbrellas in the back seat; they were still there. Nothing had been taken. Apparently it was plain old idiotic vandalism.

    • All Together Now

      This lack of authority to enforce global agreements necessary to human survival also sadly weakens the fragile international institutions that are intended to help us get beyond the scourge of war, especially nuclear war, and beyond our third great challenge, global pandemics. As the courageous Greta Thunberg bluntly put it, it’s mostly “blah blah blah,” rationalizing a status quo that isn’t working.

      With nuclear weapons, military force has reached a level of destruction which contradicts its own professed goals. Let alone that the arms race has become grossly irrelevant to our environmental and health crises, though it can still extinguish us even more rapidly than eco-degradation or plague. The deterrence system represents the utter opposite of the universal Golden Rule of interdependence found in all the world’s great religions: if you try to destroy me you will die trying.

    • Malcolm at the Audubon Ballroom

      Manhattan District Attorney Cyrus Vance, Jr., who ordered the belated reinvestigation, made a meaningless apology that might be the understatement of all time: “This points to the truth that law-enforcement over history has often failed to live up to its responsibilities. These men did not get the justice that they deserve.”

      Aziz and Islam spent a combined 42 years in prison, as the Times notes, “with years in solitary confinement… in some of New York’s worst maximum security prisons.” And knowing and maintaining all the while that they were innocent.

    • Cuba: Five Years After Fidel

      In five years, particularly in the last two years, incendiary slang has been unleashed on social media and international media networks, whose target is not only the Cuban government. They want to erase any trace of Fidel Castro. Since the news of the Cuban leader’s death, there have been hundreds of tributes for him from around the world; but simultaneously, a bombardment of calumnies have been launched against his memory to try to transform into ruins the sovereign, popular and democratic project of the revolution that he led.

      To present him as the symbol of defeat and failure, he is shown as a lonely idealist who led Cuba to ruin. They charge all his actions (real or invented) with negativity and perversity to villainize him and paint him as deserving of outrage. There are those who cynically excuse themselves in demystifying.

    • A Food for Thought Thanksgiving Weekend Side Dish

      Most whites are ignorant of all manner of massacres, lynchings and assassinations, let alone the countless other aggressions required to enforce the race/gender/economic hierarchy for more than 500 years. So that is one factor. Noting, however, for the record, that almost all of the ignorance is of the willful kind. The result, that is, of leaving out the bad stuff on purpose.

      What’s more impactful, however, is what happens when the engineered obliviousness doesn’t work properly and whites somehow do have access to information. This is where we can learn a lot about the resilience of the white supremacy way of thinking. Current resistance to the 1619 Project is a good example of how it works.

    • Death in Texas
    • Dennis Cooper’s Love Story of a Lifetime

      George Miles, when he first appears as a character in Dennis Cooper’s debut novel Closer (1989), is beautiful, nervous, and eerily vacant. A high school acidhead, George is plagued with a psychic pain that is only exacerbated by the way other people treat him; his cute looks and hyper-passivity make him a target for a range of obsession, lust, and cruelty. There is, for example, his friend John, who wants to be an artist and tries to paint him, but George “twitch[es] and tremble[s] so much” he makes John think of “a badly tuned hologram”; instead, he uses George’s body as a “prop,” to imitate the pornography he’s seen. Another man, Philippe, develops a drastically more debasing sexual routine with George that makes him (and others who witness it) puke. Tom, a murderer, mistakes George’s ambivalence about being alive for a death wish; he spares his life but badly maims his body. Only George’s friend Cliff (a stand-in for Cooper) shows him anything like tenderness. Unable to tell George how he feels about him (he can’t utter something as clichéd as the word “love”), Cliff can’t really console him either. Instead he reports on George, “Now there was nothing between him and ‘it,’ as he called what he currently felt…. I’d never grasp it…. Saying so wouldn’t help.”

    • Hardware

      • How WD-40 Became Rust’s Worst Enemy

        For a little more than a decade, I worked in a loud, dark room. Threading film through projectors, running movies, and repairing the mechanical components of the machines made the hours just fly by. Two of the most vital tools at my disposal were my trusty 7/16 wrench and a big can of WD-40. It’s been years since I worked around that equipment, but I still vividly remember that strange smell and how the substance seemed like a miracle cure for those crazy machines. These days, it seems like everyone has a can of the stuff on their workbench. But WD-40 is a veritable modern American institution and in this time of constant turmoil, it’s always nice to know it’s there on the workbench to help us solve some problems. In today’s Tedium, we’re looking at the unique story of America’s favorite all purpose product: WD-40…

    • Health/Nutrition/Agriculture

      • Not a Border Crisis: Harsha Walia on Why It’s Time for a New Political Project

        In today’s interview Harsha reframes the border and shows that bordering is not simply a wall but an expansive, omnipresent regime, one that is connected to capitalism and colonialism and that has racist roots. In this sense, she points out three things to keep an eye on with regard to the Joe Biden administration, and argues for the importance of a no borders political project. As she writes in Border and Rule, “Like the regime of private property, borders are not simply lines marking territory; they are the product of and produce social relations that we must emancipate ourselves from.”

        We owe Harsha a great deal of gratitude since she answered these questions under much duress, surrounded by floods and mudslides after torrential, record-breaking rains drenched her home in British Columbia, Canada.

      • The Right Is Hijacking Progressive Arguments to Undermine Public Health
      • Rich Countries Blamed as New COVID Variant Sparks Global Alarm
      • ‘It Was Entirely Avoidable’: Rich Countries Blamed as New Covid Variant Sparks Global Alarm

        The detection of a new, heavily mutated, and potentially vaccine-resistant coronavirus variant in Botswana and other nations is sending shockwaves worldwide as public health officials rush to understand the strain and its possible impact on the global pandemic response.

        “There have been countless warnings that super-variants could emerge if we do not remove artificial barriers to global vaccination.”

      • South African scientists detect new virus variant amid spike

        “Over the last four or five days, there has been more of an exponential rise,” he said, adding that the new variant appears to be driving the spike in cases. Scientists in South Africa are working to determine what percentage of the new cases have been caused by the new variant.

        Currently identified as B.1.1.529, the new variant has also been found in Botswana and Hong Kong in travelers from South Africa, he said.

      • Who’s a Hero? Some US States, Cities Still Debating COVID Hazard Pay

        When the U.S. government allowed so-called hero pay for front-line workers as a possible use of pandemic relief money, it suggested occupations that could be eligible, from farmworkers and child care staff to janitors and truck drivers.

        State and local governments have struggled to determine who among the many workers who braved the raging coronavirus pandemic before vaccines became available should qualify: only government workers, or private employees, too? Should it go to a small pool of essential workers such as nurses or be spread to others, including grocery store workers?

      • Instagram chief agrees to testify before Senate

        Adam Mosseri, the head of Instagram, will testify before the Senate early next month about the social media platform’s influence on children.

        The appearance in front of the Senate Consumer Protection Subcommittee is scheduled for the week of Dec. 6.

    • Integrity/Availability

      • Your Fingerprint Can Be Hacked For $5. Here’s How.

        To compromise your device or account, we don’t even need direct access to your fingerprint. A photo of a surface you’ve touched (from a table at the local library to the equipment at your nearest gym) will do.

      • Proprietary

        • Finnish authorities warn of new wave of malware text messages

          Clicking on the link does not immediately install the malware, though. Users are asked to allow the installation. The malware may also steal data from the device and send more malware-spreading scam messages.

        • [Old] So we could use a little help with systemd-shim…

          One of the unique features of MX has been the ability for the user to choose between systemd and sysVinit on installed systems. The magic sauce that made that work is a package called systemd-shim. However, development on systemd-shim stopped some time ago, and Debian recently dropped the package from the Buster repositories.

        • Security

          • Privacy/Surveillance

            • Caught in ‘porn wars’: backlash over [Internet] censor going on anti-porn podcast

              Emails obtained through a freedom of information request reveal the fallout from Inman Grant’s interview on the National Center on Sexual Exploitation (NCOSE)’s Ending Exploitation podcast to talk about her office’s initiatives.

              NCOSE is a not-for-profit that under its previous name, Morality in Media, was one of the main fighters in the religious right push to ban pornography or forms of obscenity. In 2015 it rebranded, but has stuck to claims that pornography is a “public health crisis” and has been criticised for making claims about the harms of pornography that go against peer-reviewed research.

            • Fears about real agenda behind Online Safety Bill after US podcast

              Inman Grant was given broad-ranging powers in an Online Safety Bill passed by the Federal Government in June, including the power to order the removal of material from the Internet within 24 hours, if said material was deemed to contravene provisions of the bill.

              But according to the report, Inman Grant appeared to have not carried out any background checks before she appeared on the National Centre on Sexual Exploitation’s (NCOSE’s) Ending Exploitation podcast to explain initiatives undertaken by the office she heads.

            • Apple gets hit by its second fine by Italian regulators in a week

              Apple and Google have each been fined €10 million (around $11.3 million) by Italy’s competition authority for not properly obtaining a user’s consent before using their data for commercial purposes, the AGCM has announced. Both are accused of not correctly informing users when their data will be used in this way, preventing customers from being able to give their informed consent.

            • Political advertising rules fail to stop personalised manipulation of elections and referendums

              „The Commission fails to heed the LIBE Committee‘s call for banning the personalised targeting of political messages. The personalised manipulation of elections and referendums by exploiting the user‘s individual preferences and fears is a special class of online threat because it influences the core mechanisms that enable the functioning of our democratic society. Has the Commission forgotten about Cambridge Analytica and the surprise election of Trump for President? The integrity of elections and referendums is of general interest and cannot be subject to individual choices. The targeting of individuals based on their personality, including their behaviour, needs to be banned!“

    • Defence/Aggression

      • Michael Moore: A Memorial to the Terrorists – When the Terrorists Are Us

        Information Clearing House — Eleven days ago on Veterans Day, while watching the cable news, I learned that our Congress, never missing a chance to ingratiate themselves with what they think Middle America wants — more money for the military, more flags flying everywhere, more fake patriotism and more pandering to the fake patriots — decided it was time to create a brand new national memorial on the already overcrowded National Mall in Washington, D.C., between the Lincoln Memorial and the U.S. Capitol building. The memorial will be called “The Global War on Terrorism Memorial.” I’m not making this up.

        And what patriotic politician or red-blooded American wouldn’t be in favor of that!

        Well, me. I’m not in favor of it. And I hope you won’t be, either.

        A memorial to the victims, the brave Americans who’ve died in The Global War on Terrorism. Is this an Onion prank? An Orwell novel? Because my first question is — the victims of whose terrorism? The scattered actions of a few crazed Muslims?

      • 5 Georgia officers are indicted on murder charges in death of 24-year-old man

        Arrest warrants were issued Monday for five Georgia police officers indicted on murder charges for the 2019 killing of a 24-year-old man. Fernando Rodriguez died of asphyxiation after being placed in a prone position while he was handcuffed and held down, allegedly in violation of state law.

        The indictment accuses Henry County Police Department officers Robert Butera and Quinton Phillips and former Hampton Police Department officers Mason Lewis, Marcus Stroud and Gregory Bowlden in Rodriguez’s death on September 20, 2019, following contact with police outside a concert at the Atlanta Motor Speedway.

      • Prosecutor drops charges against officer in rare case of restorative justice mediation

        Criminal charges against a St. Louis County police officer who shot a Black woman were dropped Monday after the victim requested a restorative justice mediation that focuses on repairing the harm caused by an offense.

        The St. Louis County Prosecuting Attorney’s Office said Ashley Fountain Hall asked that assault charges be dropped against former Ladue, Missouri, police officer Julia Crews, 39. The charges stemmed from a dispute that took place on April 23, 2019, outside a Schnucks grocery store.

        Crews mistakenly drew her firearm instead of using her Taser to restrain Hall and shot her in the torso, leading to critical injuries, the office said. Hall lost part of her spleen and suffers with post-traumatic stress disorder, prosecutors said.

      • Nashville DA Seeks to Vacate Claude Garrett Murder Conviction

        A reinvestigation of the case “dismantles every single piece of evidence previously believed to inculpate Garrett,” the director of the DA’s Conviction Review Unit wrote.

      • What Are The Prospects For Peace? An Interview with Finian Cunningham

        Finian Cunningham has written extensively on international affairs, with articles published in several languages. He is a Master’s graduate in Agricultural Chemistry and worked as a scientific editor for the Royal Society of Chemistry, Cambridge, England, before pursuing a career in newspaper journalism. He is also a musician and songwriter. For nearly 20 years, he worked as an editor and writer in major news media organisations, including The Mirror, Irish Times and Independent. Second-time recipient of the Serena Shim Award for Uncompromising Integrity in Journalism (December 2020). His prolific output of excellent political analysis and commentary can be accessed at Strategic Culture Foundation, Sputnik News, andRT. His responses below are exactly as he provided.

        The questions here are not philosophical or abstract. They focus on the realities of the international power struggle unfolding in real time. They directly address the role of the U.S. in the escalating tensions and its capacity to reduce them. We also probe the role of everyday citizens in affecting the relationship the U.S. now has and will have with the rest of the world community.

      • Ethiopia Conflict by US Design

        The impact of the year-long conflict is devastating. Perhaps as many as three million people are internally displaced, tens of thousands have been killed; women and girls raped, property trashed, land destroyed, livestock slaughtered by TPLF fighters. At this stage it is difficult to see how a peaceful resolution can be reached; the government has said it will not enter into negotiations until the TPLF withdraws to Tigray, and the TPLF, in no position to set any conditions, are demanding Prime-Minister Abiy Ahmed steps down.

        The conflict was initiated when the TPLF attacked the Ethiopian State on 4 November 2020 (perhaps with US approval): despite this, the US and her puppets (UK, EU etc) have, to the incredulity of many, stood behind the terrorists and not the government of Ethiopia, or the Ethiopian people. It is widely acknowledged that the Biden Administration is behind the movement to replace the Abiy government, and install the TPLF – a less independent (the US doesn’t tolerate independent governments), more malleable group that, in exchange for the freedom to do as they like, will once again provide the US with a foothold in the Horn of Africa.

      • The Delusional Commitment to the Doctrine of “Full Spectrum Dominance” is leading the U.S. and the World to Disaster

        For both classical liberals like Fukuyama and neoconservatives who would rise to power during the George W. Bush administration, it was asserted that the societies of the U.S. and Western Europe should be viewed as representative of the apex of collective human development that all should aspire to because history and objective rationalism had determined it so, and – “there is no alternative.”

        But human societies, even when they are claimed to be guided by objective scientific laws, have never emerged as a tabula rasa. What develops at any point in history is the outcome of the social and economic contradictions of the previous era with many of those unresolved contradictions still present in the new era.

      • Congress Forces Weapons Spending the Pentagon Wanted Cancelled

        These four committees have repeatedly kept hundreds of millions of tax dollars gushing into the coffers of the world’s biggest weapons contractors — for weapons declared unnecessary by the military. The committees can even refuse to reject the savings recommendations without saying why. Donnelly wrote, “None of the four defense panels provided CQ Roll Call an explanation for forcing the Pentagon to keep spending money on particular initiatives.”

        “The Pentagon had said it does not need the $500 million-plus that was appropriated for the fighter jets, helicopters, ships, vehicles, and bombs made by four of its top five contractors” (Lockheed Martin, General Dynamics, Boeing, and Northrop Grumman). But, Roll Call reports, “Congressional Appropriations and Armed Services committees, for reasons that none of them would divulge, insisted that the military spend the money anyway.”

      • From Anti-War Progressive to Pro-Drone Militarist: Tulsi Gabbard’s Odd Political Trajectory

        While many on the American left have denounced the acquittal of Kenosha shooter Kyle Rittenhouse as handing a get-out-of-jail-free card to racist militias, former Hawaii Representative Tulsi Gabbard openly celebrated the verdict. “The jury got it right — finding Rittenhouse not guilty on all charges,” said the 40-year-old lieutenant colonel, adding that the prosecution was so obviously politically motivated and his innocence so obvious that bringing charges against him should be considered “criminal” in itself.

      • Why Don’t We See Headlines Touting the Pentagon’s Hefty Price Tag?

        Compare this to President Joe Biden’s proposed military budget expenditure of $753 billion for the 2022 fiscal year. According to the Security Policy Reform Institute, “This amounts to an increase of well over $12 billion, meaning that Biden boosted Pentagon funding by an amount roughly equivalent to CDC’s entire annual budget.”

        Extrapolating this figure over 10 years while accounting for the projected yearly increases—a good assumption considering that the military budget almost never loses its annual raise—predicts that American taxpayers will be footing almost $8 trillion on the “defense” slice of our budgetary pie in the coming decade.

      • Meet Mansoor Adayfi: I Was Kidnapped as a Teen, Sold to the CIA & Jailed at Guantánamo for 14 Years

        We speak with Mansoor Adayfi, a former Guantánamo Bay detainee who was held at the military prison for 14 years without charge, an ordeal he details in his new memoir, “Don’t Forget Us Here: Lost and Found at Guantánamo.” Adayfi was 18 when he left his home in Yemen to do research in Afghanistan, where he was kidnapped by Afghan warlords, then sold to the CIA after the 9/11 attacks. Adayfi describes being brutally tortured in Afghanistan before he was transported to Guantánamo in 2002, where he became known as Detainee #441 and survived years of abuse. Adayfi was released against his will to Serbia in 2016 and now works as the Guantánamo Project coordinator at CAGE, an organization that advocates on behalf of victims of the war on terror. “The purpose of Guantánamo wasn’t about making Americans safe,” says Adayfi, who describes the facility as a “black hole” with no legal protections. “The system was designed to strip us of who we are. Even our names were taken.”

      • Roaming Charges: Fear is a (White) Man’s Best Friend

        Rittenhouse was there to help. But to help whom? From what? Rittenhouse came to the civil rights protests in Kenosha that night expecting to be needed. Expecting to be wanted. Expecting to be welcome. He also came expecting violence. What kind of violence? Perpetrated by whom? Not by the police. Rittenhouse felt safe where many others fear to tread–jaywalking down a street carrying a rifle in front of police, police who kill an average of three people a day for lesser offenses, safe enough to joke with them.  He was one of them. Sort of. A junior police cadet back in Grayslake, Illinois. He didn’t fear them, even though the police had fired thousands of rounds of plastic bullets into dense crowds of protesters. Rittenhouse didn’t fear the Kenosha Guard, a militia group also armed to the teeth that night, whose geared-up members pointed laser-sighted guns at the crowd, hoping to incite a panic.

        Fear was in the air that night in Kenosha. And some found it intoxicating, including the pudgy kid in the Army green t-shirt, combat boots and ballcap, who came to Kenosha with an assault rifle and medical kit to help. He’d use one, but not the other. Did he also come to spread fear? To instigate the carnage, he planned to treat? “If there’s somebody’s hurt,” he said. “I’m running into harm’s way.” It turns out: He was going to hurt somebody. He was harm’s way running.

      • Opinion | Congress Needs to Investigate the Pentagon’s Failure to Protect Civilians

        Pentagon leadership cannot — or will not — fix its civilian casualties problem. It’s long past time for Congress to step in.

      • Totalitarian Cyber-Creep: Mark Zuckerberg in the Metaverse

        Facebook, in particular, has been trying to push such a model using a tactic all companies in distress have sought to adopt: rebranding.  Be it the scandals disclosed by the Facebook papers, the scrutiny over the use of algorithms by the company, the inability to combat galloping misinformation on its platforms, or the stark amorality of the company’s founder, Mark Zuckerberg, the chance to seek the metaverse has presented itself.

        Enter, then, the world of Meta Platforms, aided by the virtual reality headset company Oculus, which was acquired by Facebook in 2014 for $2 billion.  Astute watchers then would have been the strategy afoot at the time; most, however, thought the decision misguided and destined to flop.

      • US History and its Ugly Truth

        Dunbar Ortiz, whose classic text An Indigenous People’s History of the United States details the history of that nation via the histories of the nations they encountered in North America and destroyed, begins her new book with a discussion of the Lin Miranda Broadway hit, Hamilton! The musical is based on the life of Alexander Hamilton, one of the founders of the United States, a slave trader and a proponent of continued expansion into indigenous lands by the new nation. The drama obfuscates the true nature of the United States by featuring Black and Latino actors playing white men and women and is scored to a hip hop soundtrack. By doing this, Miranda’s casting illustrates a key part of the immigrant myth dismantled in Not a Nation of Immigrants. That is, the US invites people from around the world into its borders, gives them opportunity and hope, and over time they become Americans, just like the English, German and other European settlers did in centuries past.

        Of course, this mythology is just that. In truth, there are other requirements to become a real American. Historically, foremost among those requirements was white skin. Despite the efforts of millions of US residents to end this (now) unmentionable requirement, the politics of our time prove almost daily that skin tone matters more than it should. The text describes the arrival of settlers and immigrants from different European nations—the Irish, Italians, Germans, and English—and the trajectory of each ethnicity as it traversed the path from non-white immigrant to white American. In discussing this social mechanism, Dunbar Ortiz describes the imaginary racial hierarchy based on skin tone and its concretization as fact by the most powerful (and in their minds, the whitest) men in the nation. It almost goes without saying that this whitewashing requires these migrants to dismiss the existence of those humans who lived on the continent before the first settler invasion. Likewise, each “new American” is also expected to forget the slave bodies that made up the wealth of so many of the families whose names are synonymous with their new country.

      • Carol Anderson on White Supremacy vs. Democracy

        This week on CounterSpin: What do we want? Multiracial democracy. When do we want it? Now. What stands in the way? White supremacy that has disregarded, derailed and violently defied that democracy at multiple turns.

      • Danish Navy kills four pirates in firefight in Gulf of Guinea

        Danish naval forces have killed four pirates during a firefight off the coast of Nigeria in the Gulf of Guinea.

        The Esbern Snare, a Danish frigate, came under fire in an incident yesterday, reports Forsvaret, the Danish armed forces.

        In returning fire, five of the assailants were hit – four fatally. No sailors on the Esbern Snare were injured.

      • American manufacturers race to relieve a pandemic-triggered ammo shortage

        Remington has been able to increase prices seven times. It has unfilled orders worth billions of dollars. Retailers of ammunition surveyed by the National Shooting Sports Foundation (NSSF), a trade group, said they could have sold three times more ammunition during the first half of 2021 had it been available. Vista, Remington’s new parent, has infused working capital and increased the size of its workforce. The unit’s operating profits this year are expected to be similar to the $81m that Vista paid for the business. As for Winchester Ammunition, its revenues for the third quarter nearly doubled year on year, to $400m, and its gross operating profits nearly quadrupled.

      • Migrant smuggler ‘butchers’ must be stopped, victim’s father tells France

        “I ask the French government to tighten their borders and stop those butchers. They are not smugglers, they are mafias. This is my only request.

        “Those boats that they are using are not made for that purpose. They treat those poor people like animals. Where were her human rights?

        “It is the role of the French government to have a strict procedure to stop those butchers to avoid further tragedies. And I hope our people stop even thinking about migrating using similar ways.”

    • Environment

      • Big Oil’s Big Lie About Who Caused the Climate Collapse

        The very problematic concept of one’s carbon footprint is the subject of Sami Grover’s new book, We’re All Climate Hypocrites Now. Who kicked the carbon-footprint-individual-responsibility-for-climate-change bandwagon into gear? None other than the guilty parties, the oil companies. BP to be exact. Fossil fuel companies love it when ordinary people blame themselves for the climate collapse, for an obvious reason: it gets them off the hook to keep raking in profits, receiving mega-subsidies from government and polluting the atmosphere with carbon without getting fined for it – as they would in any sane world.

        “BP’s championing of carbon footprints should be viewed not simply as a naïve and imperfect effort at corporate responsibility,” writes Grover, “but rather as a direct and calculated attempt to shape discussion of the problem in BP’s favor.” Oil companies, Grover notes “are actually all too happy to talk about the climate crisis. They just want you to know that it’s mostly your fault.” And they’ve succeeded remarkably with this subterfuge. Lots of people dither about eating a cup of yogurt when they could be joining Extinction Rebellion. Some benighted souls have even been hoodwinked into foreswearing children.

      • Tory MP Who Criticised Climate Action For Impact on World’s Poor Has Stakes in 18 Extractive Companies

        A Tory MP who suggested it is “morally wrong” to discourage poor countries from pursuing high-carbon growth on climate change grounds has a financial interest in numerous fossil fuel and mining companies.

        Among the 18 extractive companies listed under the MP’s entry in the parliamentary register of interests are Shell and the world’s largest oilfield services company, Schlumberger.

      • Climate tipping points: The Arctic is a bellwether for irreversible change

        Around the world, ecosystem tipping points loom as wildfire, human land use and biodiversity loss exponentially increase and magnify climate impacts. Expanding ocean dead zones, coral reef bleaching and rainforest loss are emblematic of system collapses — and are slowly combining to create global tipping points. There is very little time to alter the trajectory of Earth’s ecosystems, halting climate-driven collapse. To protect the Earth’s incredible diversity and stability, we must acknowledge that climate change is already permanently changing the planet — and we have little time to change course.

      • When Real Life Feels More Like Science Fiction

        Sadly enough, however, you can’t just blame Donald Trump and the Republicans for our increasingly endangered planet. After all, who needs giant Martians or monstrous human-destroying plants when carbon dioxide and methane will, in the long run, do the trick? Who needs aliens like Martians and Triffids, given the global fossil-fuel industry?

        Keep in mind that more representatives of that crew were accredited as delegates at the recent Glasgow climate-change talks than of any country on the planet. That industry’s CEOs have long been all too cognizant of climate change and how it could ravage this world of ours. They have also been all too willing to ignore it or even to put significant funds into climate-denial outfits. If, in 2200, there are still historians left to write about this world of ours, I have little doubt that they’ll view those CEOs as the greatest criminals in what has been a sordid tale of human history.

        Nor, sadly enough, when it comes to this country, can you leave the Democrats out of the picture of global destruction either. Consider this, for instance: After the recent talks in Glasgow, President Biden returned home reasonably triumphant, swearing that he would “lead by example” when it came to climate-change innovation. He was, of course, leaving behind in Scotland visions of a future world where, according to recent calculations, the temperature later in this century could hit 2.4 to 2.7 degrees Celsius (4.32 to 4.86 degrees Fahrenheit) above that of the preindustrial age. That, of course, would be a formula for destruction on a devastating scale.

      • Opinion | Why Big Oil’s Pivot to Carbon Capture and Storage—While It Keeps on Drilling—Isn’t a Climate Solution

        After decades of sowing doubt about climate change and its causes, the fossil fuel industry is now shifting to a new strategy: presenting itself as the source of solutions. This repositioning includes rebranding itself as a “carbon management industry.”

      • The Lesson Moby-Dick Has for a Warming World

        As an environmental historian and scholar of the 19th century, I spend a lot of time thinking about how the past can help us confront our current crises – especially climate change.

        And there’s a lot of help to be found in the 1800s, from the appreciation of wildness in Henry David Thoreau’s famous “Walden,” to the rise of ecology, the science of interdependence. “We may all be netted together,” Charles Darwin scribbled in his notebook.

      • Energy

        • The Big Industry That COP26 Failed to Tackle

          Lehner argues that most analyses exclude five unique sources of emissions from the farming sector: soil carbon (carbon released during the disturbance of soil), lost sequestration (carbon that would still be sequestered in the ground had that land not been converted into farmland), input footprints (carbon footprint for products used in agriculture, like the manufacturing of fertilizer), difficult measurements (it is harder to measure the carbon emissions of biological systems like agriculture than it is to measure the emissions of other industries that are not biological, like transportation), and potent gases (like methane and nitrous oxide).

          Regarding that last source: Focusing on carbon dioxide as the main greenhouse gas often ignores powerful planet-warming gases that are emitted by agriculture and that are even more potent than carbon dioxide. Methane, which is emitted by the burps and farts of ruminants like cows and sheep, has up to 86 times more global warming potential over a 20-year period than carbon dioxide (and also impacts public health, particularly in frontline communities). Nitrous oxide, a byproduct of fertilizer runoff, has 300 times more warming potential than carbon dioxide (and also harms plants and animals).

        • COP OUT 26
        • Opinion | California May Ban New Oil Wells Near Homes. Let’s Eliminate the Existing Problem While We’re At It

          A few months ago, the two of us joined California First Partner Jennifer Siebel Newsom at the Boys & Girls Club in Wilmington to show her places where oil wells are poisonously close to where children play, learn and live. Then late last month, Gov. Gavin Newsom heeded the demands of frontline residents when he stood at this same site and announced a plan to prevent new oil drilling operations within 3,200 feet of homes, schools, playgrounds and hospitals.

        • Black Friday is causing toxic traffic jams at US ports and warehouses

          As millions of Americans rush to take advantage of Black Friday deals this weekend, the shopping spree will add to a pollution crisis unfolding at America’s ports. For months, broken supply chains have saddled port-side neighborhoods with more pollution than they normally endure. The holiday season will make things even worse.

          The disaster is unfolding in spectacular fashion in Southern California, home to the busiest port complex in the western hemisphere (which includes the ports of Los Angeles and Long Beach). Here, cargo ships have piled up offshore as the pandemic wreaks havoc on global supply chains. The traffic jam extends to inland distribution hubs that attract trucks, trains, and planes shuttling goods from warehouses to consumers’ doorsteps.

        • Interior Dept. Report on Drilling Is Mostly Silent on Climate Change

          The department recommended higher fees for oil and gas leases, but there was no sign the government planned to take global warming into account when weighing new applications.

        • Biden Drilling Report Blasted as ‘Shocking Capitulation to the Needs of Corporate Polluters’

          Climate campaigners and other progressive critics on Friday called out the Biden administration for a new U.S. Interior Department report about leasing public lands and waters to oil and gas companies, slamming its proposals as far too weak given the need to keep fossil fuels in the ground.

          “These trivial changes are nearly meaningless in the midst of this climate emergency.”

        • With California’s OK, Chevron is selling oil from an illegal spill

          Chevron, the company responsible for the McPhee spill, appears to be violating a law prohibiting so-called surface expressions. But the California Geologic Energy Management Division (CalGEM), the regulating agency responsible for enforcing such rules, hasn’t issued penalties to Chevron, apart from a fine it levied against the company for a nearby spill that occurred in May 2019.

          More alarming, argue environmentalists, is that Chevron is selling the oil that it collects from the spill, even though it’s coming from a seep prohibited by regulations. CalGEM says it has yet to “assess” the amount of money Chevron has made off selling oil from this surface expression since November 2019.

        • Interior recommends imposing higher costs for public lands drilling

          The report, which was originally slated for an “early summer” release that didn’t materialize, is expected to inform the administration’s future oil and gas leasing policies.

          Specifically, the report calls on BLM, which governs public lands drilling, to raise minimum royalties paid for onshore oil and gas leases, increase minimum bids that companies can make on tracts of land and rental rates that companies pay before they begin producing oil and gas on the leased lands.

          It also calls for BLM to increase the surety bonds that companies pay the federal government as an assurance to make sure they are complying with their lease terms.

        • Biden administration approves second major offshore wind project, to provide power to N.Y.

          The approval from the Interior Department paves the way for the country’s second large-scale offshore wind farm after a similar project got underway in Massachusetts. The administration aims to put the U.S. on a path to generate 30 gigawatts of offshore wind energy by 2030, powering about 10 million homes.

        • Russian coal mine: Dozens killed in Siberia accident

          mong the dead were five rescue workers, although a sixth was found alive and taken to hospital in a serious condition.

          The blast happened at the Listvyazhnaya mine when coal dust caught fire in a ventilation shaft on Thursday.

      • Wildlife/Nature

      • Overpopulation

    • Finance

      • Raising the Standard of Living for Everyone Could Offset the Pains of Inflation
      • Opinion | Blowing Up a Few Myths About Inflation

        Inflation has been a bugaboo of right-wingers and even the political center since the 1970s. So it’s not surprising that with consumer prices rising, the national discourse has suddenly shifted from yesterday’s news to looming hyperinflation and fiscal ruin. But in order to understand what’s really going on, you need to understand what inflation is, what it isn’t, and where we actually are.

      • ‘They Do Not Tell Both Sides of the Inflation Story’
      • The Media’s War Against Biden on Inflation

        There, I said it in all caps so that everyone can see I recognize it as a problem. The question is how big a problem. After all, we have lots of problems, millions of children in poverty, a huge homeless population, parents without access to affordable childcare, among others.

        But none of these other problems has gotten anywhere near the same amount of attention from the media in recent months as inflation. These pieces have often been quite openly dishonest. The nonstop hype of “inflation, inflation, inflation” unsurprisingly leads many people to believe inflation is a really big problem, even if their own finances are pretty good, because they hear all those wise reporters at CNN, NPR, the NYT and elsewhere telling them it’s a really big problem.

      • Progressive US Lawmakers Mark Black Friday With Calls to Pass the PRO Act

        As workers worldwide took to the streets while shoppers flooded stores for Black Friday, progressive U.S. lawmakers used the event to pressure the Senate to pass sweeping, House-approved labor rights legislation.

        “The Senate should celebrate Black Friday by passing the PRO Act to protect the hardworking folks who are being underpaid and overworked this holiday season.”

      • DoorDash to pay $5.3 million to S.F. couriers over alleged violations of past benefits

        Restaurant-delivery company DoorDash will pay $5.3 million to settle allegations with San Francisco that it stiffed almost 4,500 delivery workers of the city’s mandated health care coverage and paid sick leave, The Chronicle has learned.

        The settlement being announced Monday represents substantial restitution for some couriers and marks another inflection point in the discord over whether gig workers should be classified as employees or independent contractors, although it does not set a precedent.

        DoorDash, which is headquartered in San Francisco, did not admit wrongdoing. Although the health care and sick leave requirements both apply to employees, DoorDash said that settling was not an acknowledgment that a judge could have found it to be an employer. DoorDash, like other gig companies, is adamant that its workers should be classified as independent contractors.

        But city officials involved in the case begged to differ.

      • Irving Wladawsky-Berger: The Evolution of Enterprise Architecture in an Increasingly Digital World

        “What does it take for traditional companies to create value with digital technology?,” asked a McKinsey article published in November of 2018. Based on its research, the article suggested that “successful digital reinventors – digital natives and digitally transformed incumbents – employ a range of approaches, such as investing boldly and adopting cutting-edge technologies at scale.” However, the article warned, such efforts can run into serious difficulties. “In our experience, a push to launch more digital applications can make a company’s technology landscape increasingly complex and difficult to manage, to the point that it impedes transformation programs.”

        A few months ago, I wrote about the evolving role of the CIO, based on a survey of over 500 CIOs and related technology leaders. Almost all of the surveyed CIOs agreed that their responsibilities will become more strategic in the coming years, uniting their company’s business and technology strategies and managing increasingly complex and difficult digital transformations.

        This strategic role of the CIO is in turn driving the evolution of their enterprise-architecture (EA) teams. Traditionally, enterprise architects have been responsible for translating business needs into IT requirements. A major part of their job is making sure that their company’s IT systems work together to enable and support the company’s overall digital strategy. And increasingly, EA teams have the primary responsibility for managing the technological complexity inherent in digital transformations.

    • AstroTurf/Lobbying/Politics

      • Everybody Knows: Corruption in America – A Book Review
      • Elitism is Not the Answer to Populism: On ‘Anti-Vaxxers’ and Mistrust in Government

        While it is true that populist, right-wing movements throughout Europe and elsewhere have actively exploited the anger, confusion and lack of trust in governments for years, it is still necessary to understand the roots of the mistrust, as opposed to readily contributing to the stifling division.

        A Gallup poll, published in 2013, revealed the extent of mistrust that Americans, for example, have in their own government, and the decline of that trust when compared to the previous year. According to the poll, only 10% of Americans trusted their elected Congress, only 19% trusted the country’s health system, 22% had trust in big business and 23% in news media.

      • Communications and Electronics Lobbying Skyrockets Amid Microchip Shortage
      • Opinion | Breaking News: AOC’s District Has Opinions

        The residents of New York Rep. Alexandria Ocasio-Cortez’s district, like all New Yorkers, love to argue. No one can agree which Colombian bakery has the best empanadas. Given that the district is in both the Bronx and Queens, it is home to both Mets and Yankees fans.The state’s 14th congressional district is well-known for its diversity. It’s the type of place where you might find a Bangladeshi woman in full body covering selling Korans next to a sex worker. Everyone has their differences, but for the most part people get along.

      • Opinion | Germany to Get Green Party Ministry of Economy, Energy, and Climate in Boost for President Biden

        Germany’s environmentalist Green Party, led by two popular politicians, nearly doubled its seats in parliament to become a swing party for the formation of a new government coalition. Their prospects were boosted when the center-left Social Democrats narrowly beat the conservative Christian Democrats in number of seats in the September 26 election.

      • Mystery Meat Congress; Clueless Mainstream Press

        A couple of decades ago, I complained to a Hill colleague, “It (Congress) can’t get any worse than this.”  How wrong I was.

        Based on my experience and outlook, I offer the following observations.

      • No Accounts
      • Jayapal’s Shrewd Gambit
      • Pramila Jayapal Has Made Her Case to Be Pelosi’s Successor

        The House’s passage of the infrastructure bill and the Build Back Better legislation was another example of Speaker Nancy Pelosi’s legendary ability to keep her caucus united. What made this time different, however, was the emergence of a new force in the House—the Congressional Progressive Caucus. The CPC and its chair, Representative Pramila Jayapal (D-Wash.), forced conservatives in the House caucus to pass the expansive BBB, and got the Senate’s prima donna—Democrat Joe Manchin III (W.Va.)—to embrace a framework that gives it some hope of surviving in the Senate. In doing so, the CPC and Jayapal displayed a new coherence, strategic sophistication, and collective discipline that bodes well for the future.

      • Georgia teens become unlikely warriors in redistricting fight

        Horton is one of the dozens of teenagers mobilizing and testifying in Georgia’s redistricting process this year, juggling finals and extracurriculars with special legislative sessions and injecting an unusual level of youth engagement into a typically wonky, insiders’ political routine.

        In the last few years, a surge of interest in redistricting has raised awareness about the effects of gerrymandering and propelled many states to revamp their map-drawing processes, prompting more young people to get involved around the country. Middle school students in New York created an algorithm for drawing maps, while North Carolina college students lobbied against the gerrymandering that split their campuses into multiple districts.

      • China steps up pressure on tech with draft online ad rules

        China’s market regulator proposed new rules on Friday that would increase online advertising oversight, including stipulating that adverts should not affect normal [Internet] use or mislead users.

        Authorities in China have tightened regulation across a range of industries this year, with an emphasis on technology.

      • AIT director lambastes China for destabilizing region

        The director pointed out that China’s provocative military operations near Taiwan destabilize the region and increases the risk of misjudgment. In addition, Beijing is attempting to minimize Taiwan’s international space by asserting pressure on Taiwan’s allies and interfering with Taiwan’s democratic system, CNA cited Oudkirk as saying.

    • Misinformation/Disinformation

      • Providing a European perspective…public service media allied to offer an innovative news sharing model across the continent

        In a world where audiences are overwhelmed by an avalanche of information that has no editorial or ethical guardrails, ‘A European Perspective’ will serve as a beacon of trust and integrity. Its content will be deeply rooted in core European values such as respect for human dignity, equality, inclusion and the rule of law.

        Through this initiative, EBU Members from Belgium (RTBF), Finland (YLE), France (France Télévisions), Germany (BR/ARD), Ireland (RTÉ), Italy (RAI), Portugal (RTP), Spain (RTVE) and Switzerland (SWI swissinfo.ch) as well as ARTE, the Franco-German broadcaster, are poised to reshape the European digital sphere by offering their online readers access to stories that explore the many facets of the European identity.

        The ten public media organizations are able to select and publish each other’s content through a bespoke digital news hub that uses AI technology to translate the reports into multiple languages. The service is underpinned by the EBU’s PEACH system for recommendations and the EuroVOX toolkit for automated language services.

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Murdoch and the IPA Politicise Freedom in Battlelines for Next Year’s Elections

        In addition to lording over a media empire known for making an art out of demonising enemies and panic-driven scapegoating, Rupert Murdoch has long been recognised as the kingmaker in federal elections. When a party leader visits Rupert Murdoch in the months before an election is announced, it is a predictable sign that he has bestowed his favour on the candidate. So when it emerged that Scott Morrison had dined with News Corp chief executive Robert Thomson in New York during his September trip to the US, political commentators took note.

        Election or not, Murdoch thrives on political instability. As Democrat Rahm Emanuel so infamously observed, one can never let a serious crisis go to waste. From the Tampa to terrorism, Murdoch’s process of turning ‘unwinnable elections’ into great victories follows the all-too-familiar pattern of the Scare Cycle, stirring up moral panic and overwhelming the public with fears of imminent existential threats.

      • ¡Basta! Sports Journalists in Spain Demand End to Abuse

        The article came out as a new law was going through the Spanish parliament that promises to tackle online sexual abuse for the first time.

        Due to come into effect next year, the legislation will class online abuse as sexual violence. Convicted offenders will face fines or even house arrest.

      • Cuban Journalists Say Facebook Curbs Ability to Work

        Facebook has been accused of blocking independent journalists in Cuba from sharing posts as opposition groups have called for protests to continue against the island’s communist government.

        The social media platform, whose parent company is now known as Meta, sends messages to journalists regularly, telling them that they cannot share messages, three different reporters told VOA. The journalists complain this prevents them from sharing information, which they say is crucial to their work.

    • Civil Rights/Policing

      • This Year I’m Thankful for the Revolt Against Two-Tier Hiring Practices
      • Social Theory in the Age of Catastrophes: Engaging Seyla Benhabib

        Benhabib informs us that she has not given up hoping. The famous slogan of the German student movement in the 1960s was “below the asphalt lies the beach.” She is still looking for it. The great theologian Paul Tillich wrote about the “courage to be” in the late 1950s. Today a new slogan is required: the “courage to critique” and “courage to keep on keeping on.”  Our age of catastrophe is knocking the stuffing out of us. It itself seems interminable, the challenges new, we’re tired. Are our conceptual resources (located in the Critical Theory tradition) up to the new-present-before-us?

        In a recent article, “Democracy, science and the state: reflections on the disaster(s) of our times, Philosophy and Social Criticism, vol. 47(4), 2021, the intrepid Benhabib ventures onto the terrain of a world radically disrupted by the global Covid-19 pandemic and damages inflicted upon by the Anthropocene on earth. She begins her meditative essay by asking whether humankind is facing a unique historical kairos moment when a monumental transformation is occurring within global civilization.

      • Malcolm at the Audubon Ballroom

        Manhattan District Attorney Cyrus Vance, Jr., who ordered the belated reinvestigation, made a meaningless apology that might be the understatement of all time: “This points to the truth that law-enforcement over history has often failed to live up to its responsibilities. These men did not get the justice that they deserve.”

        Aziz and Islam spent a combined 42 years in prison, as the Times notes, “with years in solitary confinement… in some of New York’s worst maximum security prisons.” And knowing and maintaining all the while that they were innocent.

      • ‘We Are Fighting Back’: Global Black Friday Strikes and Protests Seek to #MakeAmazonPay

        On Black Friday, more than 70 labor unions and progressive advocacy groups shut down workplaces and hit the streets in cities around the globe to demand—on Amazon’s most profitable day of the year—that the sprawling tech and logistics corporation pay a living wage to its employees and a fair share of taxes to compensate the societies in which it operates.

        “From oil refineries, to factories, to warehouses, to data centers, to corporate offices in countries across the world, workers and activists are rising up in strikes, protests, and actions to Make Amazon Pay,” reads the campaign’s website. While the international coalition held its first Black Friday day of action 12 months ago, opposition to Amazon’s abuses has only grown since then, and work stoppages and rallies targeting the e-commerce giant were expected in at least 20 countries on every inhabited continent this year.

      • Spotty Data and Media Bias Delay Justice for Missing and Murdered Indigenous People

        There are estimates. In 2019, 8,162 Indigenous youth and 2,285 Indigenous adults were reported missing to the National Crime Information Center, or NCIC, out of a total of 609,275 cases. But crimes against Native individuals often go unreported, and with American Indian and Alaskan Native cases, race is sometimes ignored or misclassified as white.

        The Centers for Disease Control and Prevention estimate that Native American women are murdered at a rate three times that of white American women.

      • Which Immigration Story Will Prevail?

        It’s a narrative as powerful as it is untrue, and it needs to be countered: not just for the sake of immigrants, but for the nation as a whole.

        On November 19, when House Democrats passed a $2.2 trillion social safety net and climate bill, they left out a signature Biden administration commitment: a path to citizenship for the 10.2 million undocumented immigrants living in the U.S. Instead, they included in the budget bill a provision for a temporary status called “parole,” a five-year protection from deportation along with eligibility for work permits. If the provision is passed in the Senate, it will also give immigrants an opportunity to renew the protected status for another five years. But even that development is iffy. Senate negotiations on the budget bill, particularly on immigration, may be more grueling than in the House.

      • The Indian Farmers Defend the Rights of Farmers Everywhere

        It seems likely that Modi will not give up on his policies to privatize agriculture, but rather will return to them with different packaging. “Our government has been working in the interest of the farmers and will continue to do so,” he insisted.

        Jubilation at the Victory

      • The Jury Selection Process Is Rigged in Favor of White Supremacy
      • Crossings to the UK: EU police to install hidden cameras on French and Belgian beaches

        With several police actions, the riparians of the English Channel want to prevent unwanted crossings of migrants. German authorities plan internet campaigns against the sale of inflatable boats and engines. After Brexit, the UK is taking part in these measures funded by the Council of the EU.

      • A Chink in My Privilege: When Being White and Jewish Isn’t Enough

        “I need a cell for a Jew,” the Israeli cops driving the jeep called into the jail. I was the Jew they were referring to and the jail was the infamous “Muskobia,” in the heart of West Jerusalem. This was the end of a long and tiring day that began with a protest in the village of Nabi Saleh in Palestine. I was covered in sweat, tear gas, dust, and quite a bit of the disgusting skunk liquid that the Israeli army sprays on protestors.

      • UNESCO Members Adopt First Global AI Ethics Agreement ‘To Benefit Humanity’

        Tech ethicists on Friday applauded after all 193 member states of the United Nations Educational, Scientific, and Cultural Organization adopted the first global framework agreement on the ethics of artificial intelligence, which acknowledges that “AI technologies can be of great service to humanity” and that “all countries can benefit from them,” while warning that “they also raise fundamental ethical concerns.”

        “It’s a good step, but there are a lot more steps that we need to take, like a ban on autonomous weapons, on killer robots.”

      • Facebook tells LA police to stop spying on users with fake accounts

        “Not only do LAPD instructional documents use Facebook as an explicit example in advising officers to set up fake social media accounts, but documents also indicate that LAPD policies simply allow officers to create fake accounts for ‘online investigative activity’,” wrote Facebook’s vice president and deputy general counsel for civil rights Roy Austin in a letter outlining Facebook’s policies.

        “While the legitimacy of such policies may be up to the LAPD, officers must abide by Facebook’s policies when creating accounts on our services. The Police Department should cease all activities on Facebook that involve the use of fake accounts, impersonation of others, and collection of data for surveillance purposes.”

      • China man claiming to know Peng Shuai says WTA head ignored her mail

        A man claiming to be an associate of Chinese tennis star Peng Shuai has accused the head of the Women’s Tennis Association of allegedly ignoring an email from her.

      • Tribes That Aren’t Federally Recognized Face Unique Challenges

        Being federally recognized means the U.S. government engages with a tribe in a government-to-government relationship, granting tribes sovereignty and access to resources such as federal funds. The Winnemem are not the only tribe who lack this status. In 2012, the Government Accountability Office counted around 400 unrecognized tribes in the U.S.

        Federal recognition may be an asset, but the process to acquire it is far from smooth. Ironically, the process means tribes must seek approval for recognition from the United States, a nation founded on Indigenous genocide. Tribes can gain federal recognition by taking their case to court, receiving a presidential executive order, petitioning the Bureau of Indian Affairs (BIA), or through an act of Congress.

      • Clashes as protesters demand end to violence against women

        The demonstration in Istanbul’s Taksim Square came just months after Turkey withdrew from an international treaty aimed at protecting women.

    • Internet Policy/Net Neutrality

      • The Internet is Held Together With Spit & Baling Wire

        Imagine being able to disconnect or redirect Internet traffic destined for some of the world’s biggest companies — just by spoofing an email. This is the nature of a threat vector recently removed by a Fortune 500 firm that operates one of the largest Internet backbones.

    • Digital Restrictions (DRM)

      • TV News’ Dangerous Bet: Hedging on a Streaming Future

        Does TV news have a future outside of the existing television ecosystem? The question is top of mind for news executives as the entertainment world dramatically shifts, with linear TV channels facing steady decline and streaming on the rise.

    • Monopolies

      • Nextcloud: Complaint to the Federal Cartel Office about Microsoft

        The German software company Nextcloud has applied to the Federal Cartel Office to check whether Microsoft has a dominant position. Company founder Frank Karlitschek announced this on Friday and confirmed a report by the news magazine “Der Spiegel”.

        Nextcloud competes with Microsoft products such as Office 365, OneDrive, Azure and Teams.

        The Stuttgart company’s complaint now states that the US group is using its power to sell package solutions for Microsoft Office. The Teams cooperation platform also has a significant market share, as does the OneDrive cloud solution. The complaint is primarily directed against the deep integration of the cloud solution. Nextcloud argues that the service is regularly displayed to users of the widespread Microsoft Windows operating system during relevant work steps.

      • Deutsche Softwarefirma beschwert sich beim Bundeskartellamt über Microsoft [Ed: A Bill Gates-bribed (repeatedly) 'news' site]
      • EU tech sector fights for a Level Playing Field with Microsoft

        Microsoft is integrating 365 deeper and deeper in their service and software portfolio, including Windows. OneDrive is pushed wherever users deal with file storage and Teams is a default part of Windows 11. This makes it nearly impossible to compete with their SaaS services. In the wider context, you see that over the last years, Microsoft, Google and Amazon have grown their market share to 66% of the total European market, with local providers contracting from 26% to 16%. Behavior like this is at the core of this growth of the tech giants and has to be stopped.

        This is a similar situation than in the late 90s when Microsoft bundled Internet Explorer with Windows to compete with Netscape. This is not an incident. Other Big Tech firms like Google and Amazon are doing the same thing and the EU should take a stand.

      • Copyrights

        • Pass the American Music Fairness Act, Says GRAMMY U

          To do that, artists and musicians like us need to be compensated fairly for the hard work that goes into our music — but unfortunately, that’s not how it is right now. Songwriters get paid for radio play, but performers do not. For decades, big corporations that own and control thousands of radio stations in the United States have refused to pay performers when they play their music on AM/FM radio. That’s right, they take our product and use it to make billions of dollars from advertising — and then don’t give us a single cent.

        • North Korean sentenced to death after students caught watching Squid Game

          North Korea has sentenced to death a man who smuggled and sold copies of the Netflix series “Squid Game” after authorities caught seven high school students watching the Korean-language global hit show, sources in the country told RFA.

          The smuggler is said to have brought a copy of Squid Game into North Korea back from China and sold USB flash drives containing the series. Sources said his sentence would be carried out by firing squad.

        • IFPI & MPA Oppose ‘New Safe Harbors’ in Digital Services Act

          The European Council’s adoption this week of the General Approach on the Digital Services Act has been met with disappointment by a coalition of rightsholders including IFPI and the MPA. Their concerns include the introduction of a “safe harbor” for search engines and the apparent detachment of due diligence obligations from liability for infringing content.

        • Dubious Outfit Uses Copyright Claims for Black Hat SEO Scheme

          A few days ago, we were accused of copyright infringement by a company that says it acts ‘on behalf’ of photographers whose work is shared without permission. To resolve the dispute, we only had to add a link to an entirely unrelated website. We denied this request but this black-hat SEO scheme is quite successful at other sites, including news outfits and even a university.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts