Links 19/1/2022: XWayland 22.1 RC1 and OnlyOffice 7.0 Release

Posted in News Roundup at 3:43 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Kubernetes

      • Kubernetes Blog: Securing Admission Controllers

        Admission control is a key part of Kubernetes security, alongside authentication and authorization. Webhook admission controllers are extensively used to help improve the security of Kubernetes clusters in a variety of ways including restricting the privileges of workloads and ensuring that images deployed to the cluster meet organization’s security requirements.

        However, as with any additional component added to a cluster, security risks can present themselves. A security risk example is if the deployment and management of the admission controller are not handled correctly. To help admission controller users and designers manage these risks appropriately, the security documentation subgroup of SIG Security has spent some time developing a threat model for admission controllers. This threat model looks at likely risks which may arise from the incorrect use of admission controllers, which could allow security policies to be bypassed, or even allow an attacker to get unauthorised access to the cluster.

        From the threat model, we developed a set of security best practices that should be adopted to ensure that cluster operators can get the security benefits of admission controllers whilst avoiding any risks from using them.

    • Audiocasts/Shows

    • Kernel Space

      • Overcoming vulnerabilities with live kernel patching in Red Hat Enterprise Linux 8.5

        IT operations folks strive to not only maximize uptime, but also keep systems patched. These might seem like competing goals, but we’re here to help with Live kernel patching in Red Hat Enterprise Linux (RHEL) and enjoy some improvements with live kernel patching in RHEL 8.5.

        You can use a built-in tool to get update the kernel on RHEL systems with no downtime. That tool is live kernel patching (kpatch). Kpatch has been a part of our operating system for some time now (since RHEL 8.1, 7.7). However, with RHEL 8.5 (and the 9.0 Beta), there are some significant enhancements.

      • Gentoo Linux: Building/rebuilding a kernel and Intel CPU microcode in an installation with initramfs | Fitzcarraldo’s Blog

        In a 2014 post I explained how to update the Intel CPU microcode in a Gentoo Linux installation with an initramfs (I use sys-kernel/genkernel to build the kernel in the installation on my Compal NBLB2 laptop, which is running the Testing Branch of Gentoo Linux although the branch is not important). The initscript method (Method 1 in that post) for updating the CPU microcode is no longer valid, and the behaviour of the tool sys-apps/iucode_tool for updating the CPU microcode (Method 2 in that post) has changed, hence this update.

        Although not essential I normally perform the microcode upgrade procedure when I either rebuild or upgrade the Linux kernel, therefore I explain both procedures contiguously here.

        These days the grub-mkconfig command edits the file /boot/grub/grub.cfg to add a line to the GRUB menu entries, to load the CPU microcode at boot, but nevertheless I prefer to follow a slightly different method that works reliably for me.

      • Intel Media Driver 22 Debuts With Alchemist / ATS-M Support, ADL-N – Phoronix

        Intel’s Media Driver 22.1.1 has been released as their firsr 22.x series open-source GPU video encode/decode software release. This quarterly update introduces new hardware support and a number of feature updates.

        Intel Media Driver 22.1.1 serves as Intel’s Media Driver “2021Q4″ release. New hardware support with Intel Media Driver 22.1.1 includes now supporting DG2/Alchemist also referred to as ATS-M (Arctic Sound Mainstream). These forthcoming Intel Arc discrete graphics have GPU-accelerated video decode now working with this driver and video processing functionality. This Intel Media Driver release also adds Alder Lake N (ADL-N) platform support.

      • Linux 5.17 RISC-V Allows Rebooting Without Needing Special Driver, HiFive Unmatched Improvements – Phoronix

        he RISC-V architecture updates for the in-development Linux 5.17 kernel have been successfully submitted.

        This cycle brings continued upstream work on SiFive’s HiFive Unmatched RISC-V development board, which is the best, broadly available RISC-V board so far for enthusiasts, developers, and those just wanting to dabble with this royalty-free CPU architecture.

      • Graphics Stack

        • Khronos and EMVA Issue Call for Participation for New Camera API Working Group – The Khronos Group Inc

          Today, The Khronos® Group, an open consortium of industry-leading companies creating advanced interoperability standards, together with the European Machine Vision Association (EMVA) announces the formation of a new Khronos Working Group to develop an open, royalty-free API standard for controlling camera system runtimes in embedded, mobile, industrial, XR, automotive, and scientific markets. Over 70 companies participated in an EMVA/Khronos-hosted Exploratory Group during 2021 to develop a Scope of Work document that will guide the direction of the API design. Design work is expected to start in February 2022, and any organization is invited to join Khronos to participate.

        • Khronos Establishing A Camera API Working Group – Phoronix

          In recent years The Khronos Group has been expanding a lot and forming a number of new open industry standards around 3D commerce, analytics rendering, and more. The latest is Khronos now establishing a Camera API working group.

        • AMDVLK 2022.Q1.1 Released With Radeon RX 6500 XT Support – Phoronix

          After ending out 2021 with an AMDVLK update to fix poor performance on Wayland, AMD today issued AMDVLK 2022.Q1.1 with their first set of changes for the new year.

          AMDVLK 2022.Q1.1 most notably introduces Navi 24 support, which is the entry-level RDNA2 GPU used by the Radeon RX 6500 XT graphics card launching today. AMDVLK support is ready to go for today’s Radeon RX 6500 series debut for that mainstream GPU offering.

        • VMware’s SVGA Gallium3D Driver Lands OpenGL 4.3 Support In Mesa 22.0 – Phoronix

          VMware has been preparing support for OpenGL 4.3 to be exposed within their VMware virtualization software so that guest VMs can enjoy newer OpenGL support that is accelerated by the host.

          With Linux 5.17 the VMware “VMWGFX” DRM kernel driver has the necessary kernel-side bits for OpenGL 4.3 to be exposed by VMware’s guest virtual machines. Now in Mesa 22.0-devel, the user-space portion for OpenGL 4.3 with VMware’s SVGA Gallium3D driver is now wired up. The remaining portion is updated VMware hypervisor software for exposing the updated virtual device.

        • 20 Intel ARC GPU IDs listed in upcoming Linux Mesa driver update

          We know Intel plans to release desktop and mobile lineups for its first wave of graphics cards, but 20 different device IDs sounds like a tall order. The list likely accounts for engineering samples, low-end variants, models that are not guaranteed to release, and of course the surefire mainstream gaming-tier entries such as the 512 execution unit model that’s rumored to challenge Nvdia’s RTX 3070 family.

          Seeing as Intel didn’t have anything substantial regarding ARC to show at CES 2022, it remains unclear if the graphics cards will still launch in Q1 this year. But Intel is at least sampling GPUs to laptop manufacturers which is a good sign of progress. Graphics cards are complex components to get right though, so it’s likely for the better if Intel decides to pace the launch and get things right on both the hardware and driver levels. Seeing as the company also plans to cater to Linux users, this sounds like a full scale endeavor by Intel to capture as many new users as possible and continue supporting them. Provided it has the supply to satiate demand.

    • XWayland

      • xwayland (aka Xwayland 22.1.0 rc1)
        As per the schedule, I am please to announce the first release candidate
        of the standalone Xwayland 22.1.0 release.
        Some notable changes since Xwayland 21.1 include:
          * DRM lease support
          * Enables sRGB fbconfigs in GLX
          * Requires libxcvt
          * Refactoring of the present code in Xwayland
          * Implements support for touchpad gestures
          * Support for xfixes's ClientDisconnectMode and optional terminate delay
        Testing of this release candidate would be greatly appreciated.
        Please report any issues at https://gitlab.freedesktop.org/xorg/xserver/-/issues
        The second release candidate is scheduled in two weeks from now.
      • XWayland 22.1 RC1 Released With DRM Leasing, Other Improvements – Phoronix

        The race is on for delivering XWayland 22.1 in time for the spring Linux distribution releases with at least Fedora Workstation 36 expected to carry this updated package for allowing X11 clients to work atop Wayland compositors.

        Plans were recently drawn up XWayland 22.1 in February with it having almost been a year since the last major feature release. This is for the standalone XWayland releases yanked out of the X.Org Server in no longer being bound to the xorg-server release cycle or releasing all those additional components.

    • Instructionals/Technical

      • Git Reset Hard – Example Walkthrough

        In this article I will walk through how to do a git reset hard. When working with git on a project with multiple developers there tends to be a lot of changes to the code repository. Branches are created, files are added and changed, and files are staged and committed. With this amount of activity sometimes changes are made to files in the project which do not have the desired result, leading to you needing to revert the changes and roll back to a previous version of the code.

        With Git being a version control system (specifically a distributed VCS), previous versions of files in the project are available. Read on to find out how to undo your changes in git using a git hard reset.

      • Advanced Git Concepts You Should Know
      • How to Manage Linux Processes With htop

        System monitoring allows you to measure the performance of your Linux applications and services. You can measure processes and services using default tools or ones that you install yourself. With these programs, you can optimize performance, spot problems, and identify their source.

        The htop command is an interactive system-monitoring tool for Linux and Unix-like systems. It’s an alternative to the default command-line tool, top, that comes pre-installed on all Linux distributions.

        This article explains how htop is different from the top utility. You’ll see how to install htop on various Linux distributions or build it from the source. And you’ll find out how to more around htop’s interface and perform system monitoring using shortcut keys or your mouse.

      • How to Install Vtiger CRM Open Source Edition on Rocky Linux 8

        vTiger is an enterprise CRM system based on the well-known SugarCRM. Also available in open source edition. And here we learn the steps and commands involved to install Vtiger on Rocky Linux 8 Linux.

        It is a web-based, platform-independent and modular Customer Relationship Management (CRM) software that is particularly characterized by good integration into existing systems and convinces with a clear process orientation. The professional and enterprise versions hosted by vTiger are paid, however, there is a free plan without some limitation, if some want to try out the CRM before going for the paid features. Whereas, if you have the expertise, or a team that can handle the CRM back-end, then go for the self-hosted open-source version of it.

        Vtiger’s open-source edition is 100% free and developers can modify the source code as needed. In order to be able to use the software, the software must be installed either on hardware or on a virtualized machine. Many companies fail at this step because the necessary know-how is not available. If you are of those, here we are with the Vtiger CRM installation tutorial, which certainly helps you.

      • How To Install MariaDB on CentOS 9 Stream – idroot

        In this tutorial, we will show you how to install MariaDB on CentOS 9 Stream. For those of you who didn’t know, MariaDB is a free and open-source database management system and acts as a drop replacement for the Oracle MySQL server. MariaDB is a development of MySQL which puts focus on stability and performance and make it free to users.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MariaDB on CentOS 9 Stream.

      • How To Create and use a Self-Signed SSL Certificate for Apache

        The Transport Layer Security(TLS) and its predecessor SSL(secure socket layer) are web protocols that are used to swap normal web traffic in a protected, encrypted wrapper.

        Signing your own SSL certificates is usually done as an easy alternative to certificate authorities for internal communications or non-user facing sites that need still encryption. Here’s how to set one up with Apache.

      • Install Vtiger CRM Open Source Edition on AlmaLinux 8 – Linux Shout

        vTiger is an enterprise CRM system based on the well-known SugarCRM. Also available in open source edition. And here we learn the steps and commands involved to install Vtiger CRM on Almalinux 8 Linux.

        It is a web-based, platform-independent and modular Customer Relationship Management (CRM) software that is particularly characterized by good integration into existing systems and convinces with a clear process orientation. The professional and enterprise versions hosted by vTiger are paid, however, there is a free plan without some limitation, if some want to try out the CRM before going for the paid features. Whereas, if you have the expertise, or a team that can handle the CRM back-end, then go for the self-hosted open-source version of it.

        Vtiger’s open-source edition is 100% free and developers can modify the source code as needed. In order to be able to use the software, the software must be installed either on hardware or on a virtualized machine. Many companies fail at this step because the necessary know-how is not available. If you are of those, here we are with the Vtiger CRM installation tutorial, which certainly helps you.

      • What Are UUIDs and Why Are They Useful? – CloudSavvy IT

        UUIDs are unique values which you can safely use for decentralized identity generation. Collisions are possible but should be so rare they can be discarded from consideration. If you generated one billion UUIDs a second for an entire century, the probability of encountering a duplicate would be around 50% assuming sufficient entropy was available.

        You can use UUIDs to establish identity independently of your database, before an insert occurs. This simplifies application-level code and prevents improperly identified objects from existing in your system. UUIDs also aid data replication by guaranteeing uniqueness irrespective of data store, device, or environment, unlike traditional integer keys that operate at the table level.

        While UUIDs are now ubiquitous in software development, they are not a perfect solution. Newcomers tend to fixate on the possibility of collisions but this should not be your prime consideration, unless your system is so sensitive that uniqueness must be guaranteed.

      • 8 essential Linux file navigation commands for new users | Enable Sysadmin

        The basics are, well, basic. Yet these fundamental commands and skills are critical for day-to-day work on Linux systems. Sometimes new users are overwhelmed by the details of managing Linux from the command line. What they need is a quick overview or reminder to get them going. The fancy options come later.

        To that end, this article gives you eight basic filesystem navigation concepts and commands integral to file management.

      • Manage your passwords in the Linux terminal | Opensource.com

        These days, we all have a few dozen passwords. Fortunately, the bulk of those passwords are probably for websites, and you probably access most websites through your internet browser, and most browsers have a built-in password manager. The most common internet browsers also have a synchronization feature to help you distribute your passwords between the browsers you run across all your devices, so you’re never without your login information when you need it. If that’s not enough for you, there are excellent open source projects like BitWarden that can host your encrypted passwords, ensuring that only you have the key to unlock them. These solutions help make maintaining unique passwords easy, and I use these convenient systems for a selection of passwords. But my main vault of password storage is a lot simpler than any of these methods. I primarily use pass, a classic UNIX-style password management system that uses GnuPG (GPG) for encryption, and the terminal as its primary interface.

    • Wine or Emulation

      • Wine 7.0 Released With New Features | Itsubuntu.com

        Wine 7.0 is now available for download. It is the major release from the Wine developer. If you don’t know what Wine is then Wine is a software for Linux that lets Linux users run Windows-based applications in Linux.

      • Version 7 of WINE is better than ever at running Windows apps where they shouldn’t

        Version 7 of the WINE compatibility tool for running Windows programs on various *nix operating systems is here, bringing notably improved 64-bit support.

        WINE has come a long way. It took 18 years to get to version 1.0 and another nine years to get to version 2, but since version 3 in 2018, it’s averaged roughly one major release per year. The project is now mature, stable, and quite functional. A lot of Windows programs work fine that formerly didn’t. It’s not limited to Linux – it also supports macOS and FreeBSD, and Linux relatives ChromeOS and Android.

        This may in part be due to its corporate backing. The project has had several business sponsors over the decades, including Corel, which invested substantial effort to help port WordPerfect Office, and later Google, which did the same so that the now-cancelled Picasa would work better on Linux.

        These days, its primary sponsor is Codeweavers, which sells a commercial version called CrossOver Office for Linux, macOS and ChromeOS, as well as tools and services to help with porting Windows apps.

    • Games

      • Gaming on Chromebook – Invidious

        Some of the models of Chromebook come with GOOD specs. However, they aren’t utilized properly and let me show you how I run BOTH rise of the tomb raider and rocket league on a chromebook.

      • Action-packed ‘combat-puzzle’ roguelite Red Tether is out now | GamingOnLinux

        It’s actually called —Red—Tether–> but that would look a bit odd in the headline. A new release from indie dev Sleeper Games, it’s a thoroughly unique looking shoot ‘em up with pretty fun looking gameplay.

        With the help of a tether harpoon, you will take down large space fleets using an indirect combat system. Instead of firing off your phasers, you’ll be hoping your harpoon is well placed to help you tear ships apart and throw them around the screen.

      • All Roads Lead to Arch: The Evolution of Linux Distros Used for Gaming Over Time – Boiling Steam

        ProtonDB is mostly used to track games, but there is another way to use it: to track the evolution of Linux distros used by gamers over time. Turns out we have now a great dataset since 2018 of what distributions were used to make reports of ProtonDB, and we can exploit that observe trends. The usual caveats apply (for the methodology, see at the end of this article for more details): this may not be representative of the Linux Gaming market at large, there are variations month after month so we won’t care about a few percents ups and down, and so on. Enough said, you already know all that. Still, I would argue that people who contribute to ProtonDB are avid and active Linux Gamers, and probably at the forefront of larger trends. You can expect ProtonDB users to feature more tinkerers as well, so seeing Arch over-represented is not surprising. But the point is that the sample is probably consistent over time, and we are interested in how the choice of ProtonDB users is evolving since 2018.

      • Total War: WARHAMMER III gets a short hype-trailer for The Daemon Prince | GamingOnLinux

        Total War: WARHAMMER III is getting real close to the release now, and it’s getting exciting for strategy fans to see the conclusion of this epic. Launching officially on February 17, it will be “available as close to launch day as possible on macOS and Linux”.

        Seems Creative Assembly decided you need to get hyped and remember it’s coming, as they’ve released a short new trailer to show off the rather boringly named (compared with other Warhammer naming that is) Daemon Prince. The trailer may be short but it is pretty great at making me want it now.

      • Humble Choice drops Mac and Linux platforms – NotebookCheck.net News

        Humble Choice has suspended its support for Mac and Linux systems as the company develops a new launcher for its subscription. The launcher will only be available for Windows PCs on February 1. Subscribers on Mac and Linux have until the end of the month to download DRM-free games from the Trove collection that are still supported, as some of these indie games will no longer be available in Mac and Linux versions.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.24 Beta Review Day

          When a new Plasma release enters Beta Phase, there are three weeks of intense testing, bugfixing and polishing.

          During this time we need as many users and developers as possible to help with finding regressions, trying to reproduce incoming reports and generally being on top of as much as possible. The more users, workflows, use cases and hardware the tests are being run on greatly helps to cover a wide variety of the entire software stack.

        • digiKam Recipes 22.01.21 released

          New year, new revision of the digiKam Recipes book. It is a relatively modest update that features two new additions: how to upload photos to a remove machine via SSH directly from digiKam and how to access digiKam remotely via RDP. Oh, and there is a new colorful book cover.

          As always, all digiKam Recipes readers will receive the updated version of the book automatically and free of charge. The digiKam Recipes book is available from Google Play Store and Gumroad.

        • KDE Enjoys Improvement For Much Better NVIDIA Wayland GBM Experience – Phoronix

          A QtWayland module change has landed that should greatly improve the NVIDIA Wayland experience when running the KDE desktop on modern NVIDIA drivers offering GBM API support.

          The change to Qt Wayland is about moving the Wayland socket polling to a separate event thread. In turn this particularly benefits NVIDIA with their latest proprietary 495+ drivers supporting GBM as an alternative to the EGLStreams approach they previously pushed along for the years of supporting Wayland.

      • GNOME Desktop/GTK

        • This Extension Adds Transparent Clock & Date Desktop Widget in Ubuntu 20.04+ | UbuntuHandbook

          Want to display time and date on your Ubuntu Desktop as widget? Without Conky or any other app, there’s now Gnome extension can do the trick by adding a live clock on your wallpaper.

          It’s ‘Showtime’, an extension based on the Budgie Desktop widget. It displays transparent live digital lock, weekday, as well as date on the background wallpaper. And, it shows date and time in both vertical and horizontal styles.

    • Distributions

      • SUSE/OpenSUSE

        • SUSE Liberty Linux – Securing your Linux future without vendor lock in | SUSE Communities

          Running a mixed Linux environment is common in today’s IT world. That is, competitive businesses run a wide variety of workloads on a wide variety of Linux distributions, including production workloads running on different enterprise Linux distributions.

          In this scenario, you are no doubt getting support, maintenance updates and security patches from not only multiple vendors, but also the open source communities. In addition, it’s possible that you are using multiple management dashboards to keep track of the health of your disparate systems.

          Your mixed Linux environment is quite frankly a nightmare for your administrators. Support contracts with multiple vendors are costly and complicated to maintain. And getting community support takes time away from the innovative work that the business is asking of you.

          The question is: how do you keep your workloads running where they run best and simplify your IT management?

      • IBM/Red Hat/Fedora

        • Running Penpot locally, Docker-free, with Podman!

          Penpot is a new free & open source design tool I have been using a lot lately. It is a tool the Fedora Design Team has picked up (we have a team area on the public https://penpot.app server where we collaborate and share files) and that we have been using for the Fedora website redesign work.

          As I’ve used it over a longer length of time, I’ve noticed some performance issues (particularly around zooming and object selection / movement.) Now, there’s a number of factors on my side that might be causing it. For example, I have ongoing network issues (we spent part of Christmas break rewiring our house and wireless AP setup, which helped a bit, but now it seems my wireless card can’t switch APs if the laptop is moved between floors, lol.) In any case, I knew that Penpot can be run locally using containers, and I wanted to try that to see if it helped with the performance issues I was seeing.

        • Reduce data privacy issues with machine learning models

          As the use of AI becomes increasingly pervasive in business, industries are discovering that they can use machine learning models to make the most of existing data to improve business outcomes. However, machine learning models have a distinct drawback: traditionally, they need huge amounts of data to make accurate forecasts. That data often includes extensive personal and private information, the use of which is governed by modern data privacy guidelines, such as the EU’s General Data Protection Regulation (GDPR). GDPR sets a specific requirement called data minimization, which means that organizations can collect only data that is necessary.

          It’s not only data privacy regulations that need to be considered when using AI in business: Collecting personal data for machine learning analysis also represents a big risk when it comes to security and privacy. According to the Cost of a Data Breach Report for 2021, the average data breach costs over $4 million overall for the enterprise, with an average cost of $180 per each record compromised.

        • 2022-01 CentOS board meeting

          Board members

          Thomas Oulevey
          Tru Huynh
          Brian Exelbierd
          Pat Riehecky
          Davide Cavalca
          Josh Boyer
          Mike McLean
          Johnny Hughes

        • Running Penpot locally, Docker-free, with Podman! – Máirín Duffy

          Penpot is a new free & open source design tool I have been using a lot lately. It is a tool the Fedora Design Team has picked up (we have a team area on the public https://penpot.app server where we collaborate and share files) and that we have been using for the Fedora website redesign work.

        • Red Hat and OS-Climate Data Commons: Helping financial services with data for informed decisions [Ed: IBM Red Hat is greenwashing again]

          Since joining OS-Climate (OS-C), Red Hat has been participating in an initiative to equip financial services institutions with the data they need to make informed decisions. At the 26th UN Climate Change Conference of the Parties (COP26), Red Hat speakers discussed ways financial institutions can more effectively use and share data to address climate change.

          Climate finance was a central talking point among delegates at COP26. How can banks help address these goals of COP26? We’ll share some highlights of our conference presentation in this post.

        • Keeping POWER relevant in the open source world

          I’m not a POWER (or recently: Power) expert, only an enthusiastic user and advocate. Still, in the past couple of weeks a number of people from around the world asked my opinion how the POWER architecture could be kept relevant. This blog is really just an opinion, as I do not have the financial means to go ahead. It is full of compromises some people are not willing to make. However, I think this is the safest and fastest way forward.


          IBM treats Power as an enterprise platform, just like mainframes. And as long as they run AIX and IBMi with a couple of proprietary commercial applications, they are right.

        • DevSecOps: 5 tenets to empower your workforce

          The DevSecOps movement promotes a “shift-left” approach where security scans begin at the first commit and continue throughout the pipeline and beyond. Automation is pervasive and threats need to be identified and mitigated early and often. Developers are now tasked to write, build, secure, deploy, and potentially operate their own code.

          Fueled by the two-year pandemic, today’s remote workforce has increased the need for heightened security awareness in all aspects of the business. This is particularly true for those who work in the technology sector. The use of new tools, coupled with decreased control over the remote working environment, adds extra layers of complexity. We need DevSecOps today more than ever.

          While we can solve some of these challenges through active automation, we cannot fully realize the benefits of DevSecOps without internalizing DevSecOps principles. DevSecOps is a way of thinking, of awareness, and certainly of behaving. DevSecOps requires a security mindset from developers, security professionals, site reliability engineers (SREs), and business staff.

        • IT talent strategy: 3 considerations for recruitment and retention in 2022
        • Connect IoT devices with Drogue IoT and OpenShift Streams for Apache Kafka

          Internet of Things (IoT) devices typically produce a lot of data, and Apache Kafka is a great tool for streaming that data. This article introduces Drogue IoT, a set of APIs and management tools that work with Kafka. You’ll learn how to set up a Drogue IoT application using Red Hat OpenShift Streams for Apache Kafka.

        • From monolith to microservices: How applications evolve

          This is the second article in a three-part series about designing a microservices-oriented application (MOA) and how to adopt microservices in your organization. The first part of the series laid out the five basic principles of microservices-oriented application design. Now we’ll talk about implementing microservices.

          To see how you can use microservices in your organization, it’s worth looking at why the architectural style came about and how a monolith tends to evolve into an MOA. You can use this historical understanding as a guide for designing an MOA moving forward. So let’s start by taking a short walk down IT’s Memory Lane.

      • Debian Family

        • How To Install osTicket on Debian 11

          In this tutorial, we will show you how to install osTicket on Debian 11. For those of you who didn’t know, osTicket offers free, open-source ticket management and customer care solutions for businesses of all sizes, especially small and medium-sized businesses. With osTicket, you can manage, organize, and archive your support requests. It integrates customer support requests received by email, web forms, and phone calls into a simple, easy-to-use, multi-user web-based platform.

          This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of osTicket on a Debian 11 (Bullseye).

        • Ayoyimika Ajibade: Nodejs 16 and Webpack 5 transition in Debian

          Transitioning is a concept in Debian about maintaining only one version of a library like webpack, nodejs. There is a bottleneck as other libraries and applications may not support the version we have in Debian. So we have to port that software which For example, node-mini-css-extract-plugin, node-mermaid and so many packages uses webpack. In buster we had webpack4 and in bullseye, we want to update it to webpack5. node-mini-css-extract-plugin already supports webpack5, but others like node-mermaid don’t support it yet. So either we wait or we help those projects to update their webpack version. Check out this chat between my mentor and a community member on transitioning of rails6

        • Caleb Adepitan: Everybody Struggles

          I often get intimidated by the brilliance of others by just looking at them from a distance seeing how radiantly they gleam in their knowledge. I often feel like I’m not doing enough or I’m just meant to be a mediocre and there’s nothing I can do to be more than that. I often feel like everyone except me is a genius, and are impeccable unlike me.

          But maybe I’m just at a point these people had previously been at, and have now gone past. Maybe it’s my time to steer the wheel they once steered, or maybe they aren’t even what they seem to me to be and it’s all just a misrepresentation cooked up by an imperfect mind. Hmm…it has to be that. A “perfect” portrait painted by an imperfect mind which when found out renders every stroke in the portrait imperfect. It has to be that or all.

        • Everyone Struggles

          As a software developer struggling to grasp both basic and advanced knowledge of a concept can seem daunting, much like learning anything new, you can be overwhelmed when you are surrounded and know there is a whole lot of other new concept, tools, process, languages you have to learn that are linked to what you are currently learning, as you are struggling to grasp the fundamental idea of what you are currently learning. imbued in any struggle to get a solution to the problem is where innovation and inventions lie in, and our learning becomes improved as we dive into fact-finding, getting your hypothesis after a series of tests and ultimately proffering a solution

          Some of my struggles as I intern with Debian has been lack of skill of the shell scripting language as that is one of the core languages to understand so as to navigate your way around maintaining packages for Debian, also funny enough having just an intermediate knowledge of the javascript programming language as arguably having a basic knowledge of javascript is necessary to building and testing javascript packages in Debian as I know only the basic of javascript since my core language is Python, that I struggle with. The good thing is that the more I keep at it the faster the chance of the struggles reducing

      • Canonical/Ubuntu Family

        • Linux Mint Edge Is Ready for the Newest Hardware

          Linux Mint 20.3 is now widely available and ships with kernel 5.4. For anyone that uses the latest-gen hardware, that older kernel could be problematic. So, for those Mint users who do have hardware unsupported by the 5.4 kernel, there’s now an option.

          Linux Mint 20.3 Edge is a version of the distribution that ships with kernel 5.13.0-25, which means you’ll find more new hardware supported. By employing this new kernel, Edge adds support for Apple M1 (initial support), preliminary Intel Alder Lake S graphics, AMD GPU Freesync/Adaptive-Sync HDMI, AMD Alderbaran accelerator, generic USB display, Loongson 2K1000, preparations for Intel discrete graphics, and Intel DG1 Platform Monitoring Technology.

        • Choose the best Docker image for the job at hand

          Docker images revolutionized the computing world, but not all images are created equal. Let’s look at how to choose the best Docker image for the job at hand. Because while there are many suitable images your organization could choose, the best option depends on its context.

          The difference in requirements between production-use and quick-and-dirty Docker images is vast. For personal use, a quick, disposable image works. For production images, official, stable and well-supported images work best. A single WordPress image is good for personal use, but not for a business. That said, WordPress is available as an official image.

          In production, it is better to build your own container images to ensure the quality of the Docker image.


          Ubuntu. This is one of the most downloaded Docker images in the industry. It is the official OS for Ubuntu and is used as a base image for nearly every type of server OS. It is a small, slim image designed to be built upon. This image is easy to expand and include what resources are needed for a given task.

          Alpine. For those who want something smaller, the Alpine Linux Docker image is the way to go. It is great to run on systems with constrained resources, but Alpine management requires a higher skill level and is not as user-friendly as Ubuntu. Unless there is an overriding reason to use Alpine, keep to the Ubuntu mainstream environment.

          Nginx. Nginx is the current hot web and proxy server. This image is designed to be tiny and respond to use out of the box via mount point for the files.

          MySQL. MySQL databases are a staple of the open source world. This container is easy to download, has a disposable SQL server for experimenting and can be deleted easily when finished. This is part of the benefits of Docker containers in general — build, use and throw away.

        • Hands-on: Comino Grando RM-S

          Three of the VMs get 16 cores of the 3975WX, 64GB of RAM and an RTX 3090 each. The fourth VM only receives 14 cores and 50GB of RAM and still possesses its own discrete RTX 3090. This discrepancy is due to some resources being dedicated to running Ubuntu LTS. This manages all of the VMs, and without it, none of these powerful VMs would be able to function at all.

          Ubuntu LTS

          Software and hardware is directly managed through Ubuntu LTS installed onto a 2TB drive. This is the beating heart of the Comino Grando RM-S, and you’re able to further manage the configuration from here, which is incredibly complex. The native Linux LTS package offers the opportunity to monitor each VM’s usage and resources individually for full control over maintenance and diagnostics, giving you easy access to resolve any issues.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Orion Browser: A Future Best Web Browser for the Mac?

          Today in Tedium: It’s often been suggested that the web browser is at real risk of becoming a monoculture, all thanks to the browser engine behind most of our clicks. Chromium and its forked-off predecessor WebKit are everywhere, defining the frame through which we access the internet. (Not helping is the fact that Firefox, the internet’s third rail, occasionally has a show-stopping problem, like the issue with HTTP/3 that made it briefly unusable last week.) The concerns about the market becoming driven by just one or two browsers is a key reason why the browser market appears to be evolving in a way probably not seen in quite some time; a lot of new browsers are in the works these days! Sure, there are some quite-good options that are fairly established at this point, like the power-user-focused Vivaldi, that appear to be focused on more specific niches, but the mainstream seems like something of a lost cause. So what makes someone want to reinvent the wheel and make a mainstream play on one of the most common things in all of tech? Well, I asked someone who’s working on a hot new browser. (Perhaps you’ve heard of it? It’s called Orion.) Today’s Tedium talks browsers, ad-tracking, and shifting paradigms



          The amount that Netscape charged for version 3.0 of its Navigator software, which at the time was competing against version 3.0 of Microsoft’s Internet Explorer, which was available for free. (It was, admittedly, something of a leaky-faucet business model, akin to shareware.) In a 1996 review in Fast Company, reviewer John R. Quain made the case that Netscape was a better deal despite the significant cost difference by saying this: “When did you hear of Bill Gates giving away for free something you’d want? Bottom line: cough up the $49 for Navigator.” Most people did not heed this advice, and within a few years, Netscape’s 80 percent market share was basically gone, in favor of a free (and dominant) Microsoft browser.

        • Mozilla

          • Firefox Nightly: These Weeks in Firefox: Issue 107

            Mozilla has a booth at FOSDEM with some talks scheduled. Come hear us talk about Firefox Development, Searchfox, Common Voice, SUMO and more!

          • Foxstuck: Firefox browser bug boots legions of users offline

            In a hard-to-beat demo of the perils of software telemetry, Mozilla accidentally kicked legions of users offline last week by an update to its telemetry servers that triggered an existing bug in Firefox. Internally, Mozilla is calling the bug “foxstuck”.

            Firefox periodically reports back some fairly innocuous info, including how long your session lasted, how many tabs and windows you had open, what extensions you have and so on. You can see a list by entering about:telemetry in the address bar.

      • Productivity Software/LibreOffice/Calligra

        • OnlyOffice 7.0 Released with Form Filling, Windowed Mode + More

          ONLYOFFICE 7.0 is now available to download for Windows, macOS and Linux.

          As the first major update to this free, open source office suite this year you won’t be surprised to hear it’s a fairly big one with a wide range of tweaks, features, and improvements included.

          ONLYOFFICE 7.0 (that’s how they stylise the name; it’s not me shouting) inherits all of the improvements in the cloud-side version the suite, such as the ability to create and edit forms (often distributed in the .docxf format). Filled-in forms can be saved as a PDF file to share elsewhere or the native .oform format.

        • ONLYOFFICE 7.0 released

          Version 7.0 of the ONLYOFFICE office suite is available.

        • ONLYOFFICE 7.0 Brings Online Forms and Big Updates for All Editors

          Fillable forms, password protection, and version history in spreadsheets are just some of the new features in this ONLYOFFICE 7.0 release.

          ONLYOFFICE is a free cross-platform business-class productivity platform designed for internal team collaboration. It’s unique in that it includes document, spreadsheet, and presentation editors in a single desktop app.

          This open-source Office alternative works with the most popular file formats including DOCX, ODT, XLSX, ODS, CSV, PPTX, and ODP, and is free to use on Linux, Windows, and Mac platforms. In addition, ONLYOFFICE can be integrated with popular sync and share apps, such as ownCloud, Nextcloud, and Seafile.

          Recently, a new version ONLYOFFICE 7.0 was announced by the team. With that said, let’s quickly take a look at what’s new.

        • LibreOffice Sees New Activity For Compiling To WebAssembly – Phoronix

          Last May there was some work on compiling LibreOffice to WebAssembly as another means of getting this open-source office suite executing within the web browser and other environments. It had been quiet since on the LibreOffice WASM front but a number of new commits were merged this morning.


          This activity comes with LibreOffice 7.3 already being branched ahead of its release in February, so we’ll see how much more WebAssembly development activity and interest there is for the office suite’s cycle ahead to see what sort of shape it will be in come August. Outside of safe browser execution, there is growing interest among many for WebAssembly to be a portable format for software on the desktop with various run-times / implementations for sandboxed execution in a performant manner.

      • Public Services/Government

        • Help Chile write free software values, privacy, and digital sovereignty into their constitution

          For those out of the loop, a group which included myself up until recently, Chile is in the midst of a revolution. They’re fighting against the increased cost of living, privatization of essential services, and worsening inequality — problems facing everyone who lives under capitalism around the world — but in Chile’s case, the people actually seem to be winning. The Chilean people voted overwhelmingly in favor (80% with a 50% turnout) of rewriting the constitution, a constitutional convention has been assembled, and a call has been made for the Chilean people to re-define their country’s values.

          One of the answers to this call arrived in my inbox courtesy of Felix Freeman, a Chilean hacker and activist for free software, free culture, and free knowledge, who asked me to signal boost Propuestas constitucionales para Chile en la era de la información, three proposals to establish the following principles in the foundations of Chilean law…

    • Standards/Consortia

      • Font-independent pixel-perfect negative CSS text-indents

        The CSS text-indent property is used to offset the first line of text in a text block from the parent element’s inner box (the content area). It behaves like the padding-inline-start property, but only for a paragraph’s first line of text. It’s meant to allow your design to e.g. indent the first line to designate the start of a new paragraph (a more compact alternative to separating paragraphs by empty lines).

        The text-indent property has some additional uses with negative values. In this article, I’ll explore how the property can be used to implement hanging punctuation and list item markers. I’ll also discuss how difficult it is to know how many pixels to subtract for the desired effect, and how you should implement it instead. Some familiarity with CSS syntax, layout concepts, and common properties is assumed.

        The CSS Text Module includes a hanging-punctuation: first property. It’s meant to let leading paragraph punctuation, such as opening quotation marks in a blockquote, be hung adjacent to the first paragraph but be outside the content area. This effect lets the text itself maintain a rigid line against the left-side gutter.

  • Leftovers

    • Hardware

      • Giving Vintage Synths New Life In A Potentiometer Cleaning Showdown | Hackaday

        As anyone who has ever owned a piece of older equipment that has a potentiometer in it can attest to, these mechanical components do need their regular cleaning ritual. Whether it’s volume knobs on a receiver or faders on a mixer, over time they get crackly, scratchy and generally imprecise due to the oxidation and gunk that tends to gather inside them.

    • Integrity/Availability

      • How CTAP2.0 made UserVerification even more confusing — Firstyear’s blog-a-log

        I have previously written about how Webauthn introduces a false sense of security with how it manages UserVerification (UV) by default. To summarise, when you request “preferred” which means “perform UV if possible”, it can be bypassed since relying parties’s (RP) do not check if UV was actually performed, and Webauthn makes no recommendations on how to store credentials in a manner that allows future checking to ensure UV is requested or validated correctly.

        From this, in Webauthn-RS we made the recommendation that you use either “required” to enforce all credentials have performed UV, or “discouraged” to request that no UV is performed by credentials during authentication or registration.

        At the same time, in the Webauthn-RS project we begun to store two important pieces of credential metadata beyond the Webauthn specification – the result of UV from registration, and the policy that was requested at the time of registration. We did this because we had noticed there were classes of credentials, that even in “discouraged” would always verify themself at registration and authentication. Because of this property, we would enforce that since UV was performed at registration, we could continue to enforce UV on a per credential basis to detect possible credential compromise, and to further strengthen the security of credentials used with Webauthn-RS.

      • Proprietary

        • Pseudo-Open Source

        • Security

          • Sysjoker: The Malware Hiding In Plain Sight – Invidious

            Modern malware is boring but by being boring it can hide in plain sight, this is Sysjoker the malware that hides as a system update and runs on all 3 major updates

          • Security updates for Wednesday [LWN.net]

            Security updates have been issued by CentOS (firefox, gegl, kernel, and thunderbird), Debian (nvidia-graphics-drivers), Fedora (btrbk and thefuck), Mageia (clamav, kernel, kernel-linus, vim, and wpa_supplicant), openSUSE (java-1_8_0-ibm, jawn, nodejs12, nodejs14, SDL2, and virglrenderer), Red Hat (gegl, gegl04, java-17-openjdk, and kernel-rt), Scientific Linux (gegl and httpd), SUSE (apache2, firefox, java-1_7_1-ibm, java-1_8_0-ibm, libvirt, nodejs12, nodejs14, openstack-monasca-agent, spark, spark-kit, zookeeper, python-Django, python-Django1, python-numpy, SDL2, and virglrenderer), and Ubuntu (byobu, clamav, and ruby2.3, ruby2.5, ruby2.7).

          • Identifying Malware By Sniffing Its EM Signature | Hackaday

            The phrase “extraordinary claims require extraordinary evidence” is most often attributed to Carl Sagan, specifically from his television series Cosmos. Sagan was probably not the first person to put forward such a hypothesis, and the show certainly didn’t claim he was. But that’s the power of TV for you; the term has since come to be known as the “Sagan Standard” and is a handy aphorism that nicely encapsulates the importance of skepticism and critical thinking when dealing with unproven theories.

            It also happens to be the first phrase that came to mind when we heard about Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification, a paper presented during the 2021 Annual Computer Security Applications Conference (ACSAC). As described in the mainstream press, the paper detailed a method by which researchers were able to detect viruses and malware running on an Internet of Things (IoT) device simply by listening to the electromagnetic waves being emanated from it. One needed only to pass a probe over a troubled gadget, and the technique could identify what ailed it with near 100% accuracy.

          • The Linux Foundation Announces SupplyChainSecurityCon will be Featured Under the Open Source Summit North America 2022 Conference Umbrella
          • The Linux Foundation Announces SupplyChainSecurityCon will be Featured Under the Open Source Summit North America 2022 Conference Umbrella
          • Linux admins urged to patch full-disk encryption bug that allows decryption without a password [Ed: Requires physical access]

            Linux admins have been urged to patch a high-risk, full-disk encryption (FDE) vulnerability impacting Linux Unified Key Setup (LUKS) encryption software and its crytpsetup programme, which could allow an attacker with physical access to a system to decrypt data on the machine without using a password.

            The issue, indexed as CVE-2021-4122, impacts LUKS 2.2.0 and later, according to Milan Broz, a cryptsetup administrator, who was credited for discovering the bug.

          • Reproducible Builds: Debian and the case of the missing version string

            If you’ve been following my twitter recently you probably noticed there’s now a rebuilderd based Debian rebuilder run by the Purdue Trustworthy Software Ecosystems Lab. The rebuilder backend – the code that’s actually re-creating the build environment and running the build – is debrebuild.py, written by Frédéric Pierret from the QubesOS project. The setup as a whole automatically monitors packages in Debian unstable, then downloads the source code, build-dependencies and attempts to compile a bit-for-bit identical binary package. If this succeeds, the package is marked as “reproducible”.

            The 62.89% reproducible number is currently significantly lower than the 94.6% reproducible number reported at tests.reproducible-builds.org/debian/. This blogpost is diving into why that is and why there are different challenges in “rebuilding” done in this setup vs “build environment fuzzing”2 done by tests.reproducible-builds.org.

          • Protect your PHP website from bots with this open source tool | Opensource.com

            PHP is a widely-used programming language on the web, and it’s estimated that nearly 80% of all websites use it. My team at CrowdSec decided that we needed to provide server admins with a PHP bouncer to help ward away bots and bad actors who may attempt to interact with PHP files.

            CrowdSec bouncers can be set up at various levels of an applicative stack: web server, firewall, CDN, and so on. This article looks at one more layer: setting up remediation directly at the application level.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

          • Privacy/Surveillance

            • Australia’s privacy laws: recommendations for legal changes

              Australians’ privacy hangs in the balance as the government reviews the Privacy Act 1988 and updates the law. Here are the key legal changes Australians should fight for.

              The future of privacy in Australia is taking shape, and now is the time to take a stand. The government review of the Privacy Act is crucial to protect Australians’ right to privacy and ensure people’s control of their information in the digital environment. The resulting law will determine how Australia will enforce data protection, which is key for its success. While the government’s Discussion Paper has some good proposals, they’re not sufficient. We must push for additional improvements to the law.

              Access Now has submitted comments on the Privacy Act review, and you can read them in full here. We encourage fellow civil society organisations and human rights advocates to take advantage of all opportunities to push for changes that will shape the law for the better.

              Here are some of the most important changes we are calling for. We hope you join us to demand a privacy law fit for today’s digital world.

    • Finance

      • ‘Silicon Savannah’ Kenya targets loan apps abusing customer data

        Digital lenders have boosted access to credit in Kenya but some are using ‘predatory’ practices to profit from the poor, consumers and authorities say

        The 14 days given to John Bigingi to repay a loan of 8,200 Kenyan Shillings ($72) had barely lapsed when he started receiving text messages threatening to call the contacts on his phone and expose him as a defaulter.

        “Silence means you don’t want to pay your loan which is already due,” said an SMS message sent by digital lender iPesa to Bigingi and shown to the Thomson Reuters Foundation.

        “Take it serious. Your 50 contacts and emergency contacts will start receiving 20 calls and 15 messages (at) exactly 6 p.m. Pay now to avoid embarrassment!!!” read the message, which was written in capital letters.

        The 42-year-old Kenyan taxi driver was horrified.

        “I didn’t understand how they got my contacts but soon after they called my closest relatives, including my brother and my wife, who didn’t know about the loan,” he said.

    • Internet Policy/Net Neutrality

      • How to use the new dislike-less Youtube

        You may have also heard that there’s a whole bunch of new browser extensions out there, which restore the Dislike count functionality. While this is a noble effort, it is also totally misplaced. Like any solution that tries to fix a fatal flaw in the original product, it actually helps perpetuate the flaw by hiding it.

        We’re all guilty of doing this. For instance, I am using Open-shell in Windows 8 and Windows 11 (which I only use for testing, mind). The real solution is, if you don’t like something, don’t use it. If you keep using it, the original creator or owner of the flawed product has no incentive to change it (unless materially affected). And so, if you keep using Youtube even though you HATE the change – you’re doing exactly zero. It’s a very simple formula. Youtube makes a change to their UI, people continue using the product, end of story. No dilemma. Nothing. Simple maffs!

        And so, I think the extensions don’t actually help. They allow more people antagonistic to the change to keep using Youtube despite the change, they hide the change, and help perpetuate its status, regardless of everything else. If people still go by the Like/Dislike ratio as their gauge for the video clip quality, well all right then, be my guest. But since I think the whole metric is pointless, removing one half of it doesn’t make any difference. Half of pointless is still pointless. And there are better ways. I just showed you.

Links 19/1/2022: ArchLabs 2022.01.18 and KDE’s 15-Minute Bug Initiative

Posted in News Roundup at 10:05 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Istio / ISTIO-SECURITY-2022-002

        Istio version 1.12.0 and 1.12.1 are vulnerable to a privilege escalation attack. Users who have CREATE permission for gateways.gateway.networking.k8s.io objects can escalate this privilege to create other resources that they may not have access to, such as Pod.

    • Kernel Space

      • Linux 5.16 released: Bootlin contributions

        Linux 5.16 has been released on January 9. As usual, our recommended reading to learn more about this release is the corresponding Kernelnewbies.org page and the two articles from LWN covering the 5.16 merge window: part 1 and part 2.

      • Graphics Stack

        • Announcing Kopper – Mike Blumenkrantz – Super. Good. Code.

          The last thing I remember Thursday was trying to get the truth out about Jason Ekstrand’s new role. Days have now passed, and I can’t remember what I was about to say or what I did over the extended weekend.

          But Big Triangle sure has been busy. It’s clear I was on to something, because otherwise they wouldn’t have taken such drastic measures. Look at this: jekstrand is claiming Collabora has hired him. This is clearly part of a larger coverup, and the graphics news media are eating it up.

          Congratulations to him, sure, but it’s obvious this is just another attempt to throw us off the trail. We may never find out what Jason’s real new job is, but that doesn’t mean we’re going to stop following the hints and clues as they accumulate. Sooner or later, Big Triangle is going to slip up, and then we’ll all know the truth.

    • Instructionals/Technical

      • Configure Pi-Hole with Ubuntu 20.04 Headless Server

        Today we will discuss Pi-hole configurations and their usability. Though it was not planned, for the last few days, I was writing on firewalls only. Going through different Linux platforms got encountered the server. The service is really interesting. Ads are good for revenue generations, but sometimes it is annoying when considering the production environment. Usually, users have adblockers on their browsers, such add-ons are not so effective sometimes. Either they are required to keep updating all the time or are not able to detect ads in some cases. Here, is the answer Pi-Hole can do all for you. This gateway will get installed on the Network and will start detecting ads and pop-ups across the network and will block them automatically.

      • List All Installed Packages in RHEL and CentOS

        Hi guys, In this small article, we will show you how to list all installed rpm packages on CentOS and RHEL.

      • How to use Cloudformation to create SQS Queues on AWS

        AWS Simple Queue Service (SQS) is a fully managed message queuing service that enables us to decouple and scale microservices, serverless applications, and distributed systems. Using SQS, we can send, store, and receive messages between software components without losing them. AWS SQS offers two types of message queues, Standard queues and FIFO Queues. To understand more about SQS Queues, search for “How to create an SQS Queue on AWS?” article.

        AWS CloudFormation allows us to use programming languages (yaml/json) or a simple text file to model and provision all the resources needed for our applications. This gives us a single source of truth for our AWS resources.

        In this article, we will see the steps to create a Standard and FIFO Queue using Cloudformation Stack.

      • How to schedule system updates in CentOS 8 / RockyLinux 8 and keep the system secure

        Hello, friends. In this post, you will learn how to schedule system updates in CentOS / RockyLinux. Thanks to this, you will have an improved way to perform this system task.

        Upgrading the operating system is a basic task to make it a little more secure and stable. Because this process installs the necessary updates to fix bugs and increase the reliability of the system.

        Although it is a quick process to do, it can often be forgotten in the hustle and bustle of work and/or study. So we can always have some tools to help us automate the process.

        If you use CentOS 7 / 8 or any distribution of the RHEL family you may notice that if you go many days without updating the system, it suggests you install dnf-cron or yum-cron according to the version of the system.

        So, I will show you how to use these tools to schedule system updates.

      • How to install PlayOnLinux on a Chromebook in 2022

        Today we are looking at how to install PlayOnLinux on a Chromebook in 2022. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Bash Write to File – ByteXD

        Reading and writing to files are common tasks among Linux command-line users. There are two ways in bash you can use to write to files including the redirection operator (>) and the tee command. You need to have write permission in order to input any data into a file, otherwise, you will end up with a permission denied error.

        In this article, we will discuss the bash write to file operation using the redirection operator and tee command for example.

    • Wine or Emulation

      • Wine 7.0 is officially out now bringing better compatibility

        Just over a year since the last major version bump, Alexandre Julliard has announced the final release of Wine 7.0. This is the compatibility layer that allows you to run Windows applications and games on Linux, macOS and other systems.

        For those who have been running the biweekly development releases, the feature list of what has changed won’t be new. As the main releases are just all the work in the development releases, plus a little extra time spent on bug fixing during the Release Candidate stage.

      • Wine 7.0 is a Massive Upgrade with Improved Windows App Support, New Theme, and More Improvements

        Wine is the ultimate tool for Linux users relying on Windows-specific applications and games.

        With every release, we find better support for games and applications. And, anything that uses Wine as its backbone (like Lutris and others) benefits as well.

        And, it gets more exciting with Wine’s first release for 2022!

        Wine 7.0 stable release is here with massive upgrades! Here, I shall mention the key highlights and how to install it.

    • Games

      • dbrand are cooking up something big for the Steam Deck | GamingOnLinux

        It’s not entirely clear what dbrand has planned, however their team are clearly cooking up something with a teaser being posted on Twitter.

        Who are dbrand? They’re a company that specialises in creating custom skins, cases, screen protectors and plenty more for various hardware from phones to consoles and stuff in between – they even make face masks. They’re really popular so it’s not surprising to see plenty of excitement around their plans for the Steam Deck.

      • One of the most challenging VR rhythm games releases February 10 | GamingOnLinux

        VR rhythm game Groove Gunner from BitCutter Studios Inc will be leaving Early Access on February 10. If you own a VR kit, this is one you need to try. It will make you sweat – probably a lot.

        Much like other rhythm games, it’s all about speed and accuracy. Instead of cutting through blocks like you do in Beat Saber, you have two coloured guns which you use to shoot and each arm also has a shield that you need to block incoming projectiles with. It’s very different to any other rhythm game and easily stands above some other attempts to make a VR game.

      • RetroArch need your feedback on their Open-Hardware planned for 2022 | GamingOnLinux

        RetroArch announced back in February 2021 their plans for the Open-Hardware project. This was to bring an easy way for you to play your legally owned physical games directly in emulators and they have an update on their plans.

        The idea is a sound one. Giving you open source hardware to plug in various cartridges from retro consoles, with great integration with RetroArch directly. You would no longer need to rely on various hard to come by proprietary solutions. In the new blog post though, plans have changed – and sounds like it’s for the better.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • The 15-Minute Bug Initiative

          In my 2022 roadmap, I mentioned something called the “15-Minute Bug Initiative.” Today I’d like to flesh it out and request participation! This blog post is not only informational, but I really hope any developers reading along will get excited and decide to participate.

          KDE software has historically been accused of being resource-intensive, ugly, and buggy. Over the years we’ve largely resolved the first two, but the issue of bugginess persists.

          Have you ever had that experience where you’re introducing someone to a KDE Plasma system and to your horror, they run into multiple bugs within moments? These are the issues we need to fix first: those that can be easily encountered within 15 minutes of basic usage. They leave a bad taste in people’s mouths and provide the impression that the system is a house of cards. It’s time to remedy this final strategic weakness of KDE, starting with Plasma itself.

        • KDE begin the 15-Minute Bug Initiative to make Plasma great | GamingOnLinux

          KDE Plasma is a pretty frelling great desktop environment – but couldn’t it be better? The KDE team have begun the previously announced 15-Minute Bug Initiative.

          The idea is to clean up issues in Plasma that affect the user experience within the first 15 minutes of booting. Encountering bugs quickly will put people off and gives a bad impression of not just Plasma, but of Linux as a whole. So this is their time to shine, especially with the Steam Deck coming that uses Plasma for the normal desktop mode.

        • KDE’s 15-Minute Bug Initiative Gets Underway – Phoronix

          KDE developer Nate Graham has sorted through plans for the 15-minute bug initiative for focusing on correcting many low-hanging bugs affecting the KDE desktop that should be able to be quickly discovered by users.

          In recent months KDE developer Nate Graham, who is also known for his wonderful KDE weekly development summaries, has been figuring out how to improve KDE’s reliability and one of the main drivers is working on bugs that should take only “15 minutes” or less to be something normal users would encounter.

          Per the now-published list of 15-minute bug criteria, these are bugs that affect KDE’s default setup, are 100% reproducible, something basic that doesn’t work or looks visually broken, may cause a crash, requires a reboot or terminal command to fix, there is no workaround, a recent regression, or a bug report with more than five duplicates.

    • Distributions

      • New Releases

        • ArchLabs 2022.01.18 Release

          Welcome to 2022, along with the arrival New Year there is a new ArchLabs release.

          This is one of the more exciting releases we have put out in quite some time because with the new additions we also have three new team members to join Nate, Dima and myself. So before I get into the changes please welcome, Doug, Will and Piotr.

          It’s been amazing to have these guys with us and they have had a huge impact as you will soon read.

          In brief, we have added Nate’s much loved Window Manager dk, this has been a often requested addition and we are really happy to bring it to you. Any questions surrounding dk can be posted at the forum

          Piotr has brought with him his most excellent additions for the Sway Window Manager, known as nwg-shell. This brings a nice preset panel and other goodies to Sway. You can read more here at the README.md. Again, any issues or questions you may face can be posted at the forum.

          You can grab the latest release here. For any support please post your question or issue in the relevant category at the ArchLabs Forum.

      • Canonical/Ubuntu Family

        • What is the ’Ubuntu Pro’ Banner in Software Sources About?

          The banner isn’t a nag screen; you have to open the Software & Updates tool (which is often referred to as the ‘software sources’ utility) and click on the Livepatch tab to see it…

          Livepatch is Ubuntu’s LTS-only reboot-free kernel update mechanism which is especially handy in situations where rebooting a system (or a fleet of systems) to apply a security update is …unideal. Chances are those looking to enable Livepatch are the kinds of people who might want to make use of Ubuntu Pro for desktop too.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Best Free and Open Source Alternatives to IBM SPSS

        International Business Machines Corporation (IBM) is an American multinational technology corporation headquartered in Armonk, New York. They sell computer hardware, middleware and software employing over 370,000 people.

        IBM acquired Red Hat in 2019. But you can trace IBM’s history of open source far further back. They were one of the earliest champions of open source, backing influential communities like Linux, Apache, and Eclipse, advocating open licenses, open governance, and open standards.

      • Apache Hop Hops To Top-Level Project Status – Phoronix

        After starting off in development more than two decades ago as Kettle, Apache Hop in its current form has now made it to being an Apache Software Foundation top-level project.

        Apache Hop is an orchestration platform for facilitating both data and metadata orchestration. Apache Hop supports visual development, is lightweight in nature, metadata driven, offers hundreds of plug-ins, and has built-in lifecycle management. Apache Hop originally started out more than two decades ago as Extract-Transform-Load (ETL) platform Kettle.

      • Programming/Development

        • Loose Coupling with Signals & Slots – KDAB

          Here at KDAB, we recently published a library called KDBindings, which aims to reimplement both Qt signals and slots and data binding in pure C++17.

          To get an introduction to the KDBindings implementation of signals and slots, I recommend that you take a look at the KDBindings Getting Started Guide. It will give you an overview of what signals and slots are, as well as how our implementation of them is used. Alternatively, take a look at our introductory blog post.

        • Qt Creator 6.0.2 released

          We are happy to announce the release of Qt Creator 6.0.2!

          We fixed a performance regression of code completion on Windows and macOS, and that commercial plugins on Linux linked against the non-standard GLX and OpenGL libraries. Check our change log for more improvements.

        • What is the ‘range’ of a number type?

          In programming, we often represent numbers using types that have specific ranges. For example, 64-bit signed integer types can represent all integers between -9223372036854775808 and 9223372036854775807, inclusively. All integers inside this range are valid, all integers outside are “out of range”. It is simple.

        • One of the First Steps to Become a Data Scientist

          One of the First Steps to Become a Data Scientist, You’re not alone in your desire to become a data scientist.

          Many people aspire to work in this sector since it is such an exciting and innovative field in which you can truly leave your mark on the world as a data specialist who can solve problems and inform decision-making processes.

          Before you take that first step, though, here are some important things to keep in mind.

        • Python

          • How to Initialize a Dictionary in Python

            Dictionaries are quite diverse when it comes to their creation in python code. There are a lot of methods one can find to initialize the dictionary and make use of other data structures in those methods. This article will discuss how to initialize a dictionary data structure in Python language. We have been using Spyder3 for implementations. Let’s start.

          • How to Make an HTTP Client Program in Python

            The HTTP protocol sends a client request to the webserver, retrieving specific data and information if the transaction is legitimate. Using many methods provided in the python request package, you could examine the server’s answer. Therefore, within this guide today, we will discuss some HTTP client’s programs in python. The implemented python scripts execute mostly on the client-side and show the results of the server’s reply in this guide. So, let’s get started with our first example in Spyder 3.

        • Rust

          • Rust Compiler January 2022 Steering Cycle

            On Friday, January 14th, the Rust Compiler team had a planning meeting for the January steering cycle.

            Every fourth Friday, the Rust compiler team decides how it is going to use its scheduled steering and design meeting time over the next three Fridays.

  • Leftovers

    • Opinion | No Good Comes From the Valorization of Parenthood and the Denigration of Adopting Animals

      On January 5, 2022, Pope Francis spoke in Rome and described people who have pets instead of children as selfish. He went on to say that pet keeping was “a denial of fatherhood and motherhood and diminishes us, takes away our humanity.”

    • Democrats in Name Only
    • The Radical Vision of Silme Domingo and Gene Viernes

      The cost of labor rights in the United States has always been paid in workers’ blood. Many of the labor movement’s most critical moments are scented with gunpowder and dynamite and punctuated by funerals. Many of the movement’s greatest heroes have been beaten or imprisoned, and cops and assassins have murdered rank-and-file leaders like IWW organizer Frank Little, strike balladeer Ella May Wiggins, Laborers head Joseph Caleb, United Farmworkers strike leader Nagi Daifullah, and United Mineworkers reformer Jock Yablonski. But even against that backdrop, the story of Silme Domingo and Gene Viernes sounds more like a 1980s action movie than the real, horrific tragedy that it was. In 1981, a foreign despot organized the gangland execution of two young Filipino union organizers, with guns furnished by their own union president.

    • Ominous History in Real Time: Where We Are Now in the USA

      Dollar figures can look abstract on a screen, but they indicate the extent of the mania. Biden had asked for “only” $12 billion more than President Trump’s bloated military budget of the previous year — but that wasn’t enough for the bipartisan hawkery in the House and Senate, which provided a boost of $37 billion instead.

      Overall, military spending accounts for about half of the federal government’s total discretionary spending — while programs for helping instead of killing are on short rations at many local, state, and national government agencies. It’s a nonstop trend of reinforcing the warfare state in sync with warped neoliberal priorities. While outsized profits keep benefiting the upper class and enriching the already obscenely rich, the cascading effects of extreme income inequality are drowning the hopes of the many.

    • Toward Bakersfield

      Because the road comes without calling it, head low like it doesn’t want trouble but really does,

    • Court Says That Travel Company Can’t Tell Others How Much Southwest Flights Cost

      A few months back, we wrote about Southwest Airlines’ ridiculously antagonistic legal strategy against aggregators that would scrape information on flights and prices from Southwest.com and help people find flights and prices. The case we covered was the one against Skiplagged, but it was related to a separate case against Kiwi.com. Skiplagged had argued that it didn’t violate Southwest’s terms of service since it wasn’t scraping info from Southwest… but rather had scraped it from a different site, Kiwi.com, which in turn had scraped it from Southwest.com.

    • Thoughts for the End of Days: a Morning Star, Insatiability, DishBrain, Xenobots
    • Columbia University Has Lost Its Way

      When Columbia University celebrated its 250th anniversary in 2003, President Lee Bollinger honored Columbia’s history and special place in society as “one of the leading institutions of higher learning in the world.” He noted that a university’s purpose in cultivating “democratic personalities” in our students and the wider society is grounded in “a spirited curiosity coupled with a caring about others (the essence of what we call humanism).” A great university, he observed, serves as a humanistic counterpoint to “more often cited interests in property and power, around which we organize the economic and political systems.”     

    • Trans activists will not be charged for sharing J.K. Rowling’s address on Twitter

      On the eve of Transgender Day of Remembrance in November, comedian Holly Stars, actor Georgia Frost and drag star Richard Energy staged a demonstration in front of Rowling’s home near Edinburgh, Scotland, to protest her views on the trans community.

      The trio were criticized for posting a now-deleted photo on Twitter with Rowling’s home address visible in the background.

    • Why do American airlines say 5G networks will ground their planes?

      The airlines are worried about supposed interference between 5G transmitters near airports and radar altimeters, instruments on planes that use radio waves to determine an aircraft’s altitude. The Federal Communications Commission (FCC), which regulates commercial use of the radio spectrum in America, studied the question in 2020 and concluded the two systems could work together. The Federal Aviation Administration (FAA), which is responsible for air travel, disagreed, and said that flying could be unsafe. After months of arguments the two agencies hammered out a compromise this month, in which mobile networks would implement “exclusion zones” around certain airports while more studies were carried out. The airlines’ last-minute announcement suggests that deal is now off, though on January 18th Verizon and AT&T, two telecoms companies, agreed to pause turning on some wireless towers. On the same day several international airlines—including Air India, Emirates, and Air Japan—cancelled flights to several American cities, citing concerns about 5G.

    • YouTube will stop making most original shows

      YouTube will scale back a significant portion of YouTube Originals, which produced original content including scripted series, educational videos, and music and celebrity programming. Chief business officer for YouTube Robert Kyncl announced the changes today in a statement on Twitter.

      Going forward, the company will only fund originals in the YouTube Kids Fund and the Black Voices Fund, a program created in 2020 that committed $100 million to “amplify” Black creators on the platform.

    • Education

    • Health/Nutrition/Agriculture

      • Broken Healthcare Promises Could Spell Midterm Disaster: Jayapal

        Rep. Pramila Jayapal warned Monday that the upcoming midterm elections could be painful for Democrats if they fail to substantively deliver on their healthcare-related campaign promises, which ranged from tackling sky-high drug prices to lowering the Medicare eligibility age.

        “It has been a concern for us,” Jayapal (D-Wash.), chair of the Congressional Progressive Caucus and lead sponsor of the Medicare for All Act of 2021, told the Washington Post. “You can see it with the number of Democrats in vulnerable districts across the country who want to be able to go back and tell people that we’ve lowered their costs for child care, for pre-K, for elder care, for drug pricing, for healthcare.”

      • Pennsylvania Says Legal Medical Marijuana Means Cops Can’t Just Sniff Their Way Into Warrantless Searches

        The legalization of marijuana is changing the probable cause equation all over the nation. What used to be an easy bust and/or a great way to engage in warrantless searches is no longer guaranteed. Probable cause on four legs — police drug dogs — can’t automatically justify further intrusion by police officers. A drug dog trained to detect the odor of now-legal drugs is now more a hindrance than an enabler of warrantless searches.

      • How the Pandemic Threw Fuel on a Growing Housing Movement

        As you drive onto a college campus in the up-and-coming Midtown neighborhood in Santa Fe, N.M., you run into a security gate where you might expect to be asked for some identification. But no one is manning the gate under the wide, wan blue sky of a mid-November day. The College of Santa Fe, which relocated to the Midtown property in 1947, closed in 2009, succumbing to the financial pressures of the last big recession. What’s left is a city-owned plot of 64 acres that’s almost entirely empty, save for some space leased by the Santa Fe Art Institute’s artist residency program and a few other businesses.1

      • How a Powerful Company Convinced Georgia to Let It Bury Toxic Waste in Groundwater

        For the past several years, Georgia Power has gone to great lengths to skirt the federal rule requiring coal-fired power plants to safely dispose of massive amounts of toxic waste they produced.

        But previously unreported documents obtained by ProPublica show that the company’s efforts were more extensive than publicly known. Thousands of pages of internal government correspondence and corporate filings show how Georgia Power made an elaborate argument as to why it should be allowed to store waste produced before 2020 in a way that wouldn’t fully protect surrounding communities’ water supplies from contamination — and that would save the company potentially billions of dollars in cleanup costs.

      • Nursing Unions Say For-Profit Health Care Is Driving Omicron Staffing Crisis
      • People Are Hiding That Their Unvaccinated Loved Ones Died of COVID

        Now the majority of COVID deaths are occurring among the unvaccinated, and many deaths are likely preventable. The compassion extended to the virus’s victims is no longer universal. Sometimes, in place of condolences, loved ones receive scorn.

      • A fourth vaccine dose doesn’t seem to fully stop omicron, study finds

        Hence, two weeks ago, a group of Israeli scientists studied whether the existing Pfizer-BioNTech vaccine can protect against omicron infections if patients are given four doses of vaccine, meaning a two-shot vaccine and two boosters.

        Now, they have an early answer: The booster shot helps somewhat, but not enough to prevent infections. The findings speak to the unique and squirrelly nature of the omicron variant.

    • Integrity/Availability

      • DNS records of 1% .fi domains exposed through Zone Transfers

        DNS Zone Transfer is a mechanism for administrators to replicate DNS datasets across DNS servers. If it is enabled for a DNS nameserver, the nameserver will gladly give all DNS data regarding a domain to anyone who asks. Enabling Zone Transfers will cause an information disclosure and can thus be considered misconfiguration.

        I decided to investigate how common this nameserver misconfiguration is by doing a zone transfer query on all .fi domains I know of (in total 330k domains). This post describes the experiment.

      • DHL displaces Microsoft from top of Check Point’s brand phishing list

        A statement from the company said Microsoft was the second most imitated (20% of emails tracked), while WhatsApp was a distant third (11%). Microsoft has been at the top of this list for quite some time.

        The other companies in the top 10 were Google, LinkedIn, Amazon, FedEx, Roblox, Paypal and Apple.

        Check Point said in a brand phishing attack attackers attempted to imitate the official website of a well-known brand by using a similar domain name or URL and web-page design to the genuine site.

      • Proprietary

        • Microsoft addresses last week’s buggy Windows Updates that broke VPNs and rebooted servers [Ed: Windows is unmaintainable, so no wonder users are fleeing]

          Microsoft released an out-of-band (OOB) update yesterday to fix some Windows issues caused by last week’s monthly patching cycle on Patch Tuesday.

          The January 2022 updates that shipped last week included security patches and a fix for Japanese text appearance issues in Windows 11 (KB5009566) and Windows 10 (KB5009543) — along with a secret payload of issues, including unexpected restarting of Domain Controllers and VPN connections using L2TP failing.

          One of the major issues that came up during the week for IT admins included finding that Windows Server 2012 became stuck in a boot loop, while other versions suffered broken Windows VPN clients, and some hard drives appeared as RAW format (and unusable). Many IT Admins were forced to roll back the updates — leaving many servers vulnerable with none of last week’s security patches.

        • Cyberattacks surge amid accelerating pace of Covid-driven digitalisation: WEF study [iophk: Windows TCO]

          The World Economic Forum’s ‘Global Cybersecurity Outlook 2022′, released during its online Davos Agenda summit, further said that each successful cyber breach cost a company $3.6 million (nearly Rs 27 crore) last year, while the average share price of the hacked company underperformed NASDAQ by nearly 3% even six months after the event in case of the breach becoming public.

          The WEF said the global digital economy surged on the back of the Covid-19 pandemic, but so has cybercrime and nearly 80% of cyber leaders now consider ransomware a ‘danger’ and ‘threat’ to public safety.

        • US Windows ransomware attacks in 2021 little changed from 2020 [iophk: Windows TCO]

          The break-up was 77 state and municipal governments and agencies, 1043 schools and 1203 healthcare providers. During 2020, the total was 2354, with the break-up for the same categories being 113, 1681 and 560 respectively.

          At least 118 data breaches resulted from these attacks, with sensitive information posted online in one case.

          The Emsisoft report said in 2021, smaller municipalities and counties were hit, compared to earlier years when big cities like Baltimore and Atlanta were affected.

        • Ransomware isn’t always about gangs making money. Sometimes it’s about nations manufacturing mayhem. [iophk: Windows TCO]

          If the tactic spreads, it could lead to even more companies and other targets fending off ransomware in the line of nation-state cyberwarfare and cyber-espionage. Like any other malware, ransomware is built to break things.

        • Microsoft to acquire Activision Blizzard for $68.7 billion

          Microsoft doesn’t detail exactly how it will approach solving these issues, and the company says Bobby Kotick will continue to serve as CEO of Activision Blizzard for now. It looks like Kotick won’t remain once the deal is fully closed and after the transition period to Microsoft, though. Spencer, formerly head of gaming at Microsoft, is now CEO of Microsoft Gaming, and the company says the Activision Blizzard business will report directly to Spencer.

        • Five Reasons Microsoft Is Making Activision Blizzard Its Biggest Deal Ever [Ed: Microsoft's booster Dina Bass is still covering Microsoft at Bloomberg; it's more like media operatives of companies nowadays call themselves "journalists"...]
        • Microsoft to buy video game maker Activision Blizzard for $68.7B

          In a buyout that dwarfs others, Microsoft announced plans today to purchase digital game development company Activision Blizzard in an all-cash [sic] deal worth $68.7 billion.

          If the acquisition goes through, it would significantly add to Microsoft’s already sizeable video game operation, which includes “Minecraft” and “Doom.” Activision’s stable of popular video games includes “Call of Duty,” “World of Warcraft,” and “Candy Crush” — all of which are already available through Microsoft’s Xbox console business.

          The deal would give Microsoft a solid foothold in the emerging metaverse industry, which blends the traditional online world with that of the virtual through augmented reality headsets.

        • Why Microsoft is splashing $69bn on video games

          In the short term, the deal gives Microsoft more of a foothold in the smartphone-gaming market, to which it has had little exposure. King, a mobile-focused subsidiary of Activision Blizzard, boasts around 245m monthly players of its smartphone games, most of whom tap away at “Candy Crush”. It is also a strike against Sony. If Microsoft controls the rights to “Call of Duty”, it can decide whether or not to allow the games to appear on Sony’s rival PlayStation machine. When Microsoft bought ZeniMax Media, another games developer, for $7.5bn in 2020, it said it would honour the terms of ZeniMax’s existing publishing agreements with Sony, but that Sony’s access to new games would be considered “on a case-by-case basis”.

        • Microsoft to Buy Activision Blizzard in Mega-Deal Worth $68.7 Billion

          Activision Blizzard, in addition to its core games development and publishing business, runs a global esports network through its Major League Gaming division. The company has nearly 10,000 employees worldwide.

        • Microsoft to acquire Activision Blizzard, publisher of Call of Duty, for $68.7 billion

          The announcement follows reports in November that Microsoft was evaluating its relationship with the video game publisher amid allegations Activision Blizzard CEO Bobby Kotick had known about sexual misconduct claims at the company for years.

        • Microsoft will buy Activision Blizzard, a bet on the next generation of the [Internet].

          The acquisition, Microsoft’s largest ever, would catapult the company into a leading spot in both the video game industry and could strengthen its hand in the nascent world of virtual and augmented reality.

          It is also a challenge to regulators in Washington, as Democrats and Republicans alike have pushed to limit the power of technology giants. Microsoft, which makes Xbox consoles and owns studios that produce hits like Minecraft, has expanded its gaming business to surpass $10 billion in annual revenue. In anticipation of a longer review, Microsoft said it did not expect the Activision deal to close until the next fiscal year, which ends in June 2023.

        • Vote on Digital Services Act: Civil Liberties Committee pushes for digital privacy and free speech online

          This Thursday (20 January, subject to change), Members of the European Parliament will vote on their position on the EU Digital Services Act. The Civil Liberties Committee (LIBE) will put a series of amendments to the vote that propose, among other things, to introduce a right to use digital services anonymously, to restrict government surveillance online, to better protect personal and media content against error-prone upload filters and removal orders, and to disable surveillance-based timeline algorithms by default. The amendments are expected to be voted on Thursday morning. However, the largest political groups seek to avoid amendments to the proposed bill.

        • Security

          • Privacy/Surveillance

            • Podcast Episode: How Private is Your Bank Account?
            • Pegasus Used Against Activist Women in Middle East

              DOZENS OF women journalists and human rights defenders in Bahrain and Jordan have had their phones hacked using NSO Group’s Pegasus spyware, according to a report by Front Line Defenders and Access Now.

              The report adds to a growing public record of Pegasus misuse globally, including against dissidents, reporters, diplomats, and members of the clergy. It also threatens to increase pressure on the Israel-based NSO Group, which in November was placed on a U.S. trade blacklist.

            • Israeli Police Used Pegasus Spyware Against Own Citizens: Report

              Digital privacy advocates were alarmed but not surprised Tuesday by a report alleging that police in Israel used NSO’s Pegasus spyware against Israeli citizens, including opponents of former right-wing Prime Minister Benjamin Netanyahu.

              “When it comes to [Netanyahu] and NSO’s business model, is any of this surprising?”

            • Fake COVID-19 Testing Sites Are Scamming Vulnerable Communities Across the US
            • Are Fake COVID Testing Sites Harvesting Data?

              Over the past few weeks, I’ve seen a bunch of writing about what seems to be fake COVID-19 testing sites. They take your name and info, and do a nose swab, but you never get test results. Speculation centered around data harvesting, but that didn’t make sense because it was far too labor intensive for that and — sorry to break it to you — your data isn’t worth all that much.

            • COVID-19 Testing Chain Opened Pop-Ups Across The US. Now, It’s Temporarily Closing Amid Federal Investigation And Mounting Complaints

              The Center for COVID Control is a management company to Doctors Clinical Laboratory. It provides tests and testing supplies, software, personal protective equipment and marketing services — online and printed — to testing sites, said a person who was formerly associated with the Center for COVID Control. Some of the sites are owned independently but operate in partnership with the chain under its name and with its guidance.


              Doctors Clinical Lab, the lab Center for COVID Control uses to process tests, makes money by billing patients’ insurance companies or seeking reimbursement from the federal government for testing. Insurance statements reviewed by Block Club show the lab has, in multiple instances, billed insurance companies $325 for a PCR test, $50 for a rapid test, $50 for collecting a person’s sample and $80 for a “supplemental fee.”

              In turn, the testing sites are paid for providing samples to the lab to be processed, said a person formerly associated with the Center for COVID Control.

              In a January video talking to testing site operators, Syed said the Center for COVID Control will no longer provide them with PCR tests, but it will continue supplying them with rapid tests at a cost of $5 per test. The companies will keep making money for the rapid tests they collect, he said.

              “You guys will continue making the $28.50 you’re making for the rapid test,” Syed said in the video.

            • India’s Supreme Court Opens Investigation Into Targeting Of Indian Citizens’ Phones By NSO Malware

              NSO Group’s terrible 2021 is flowing seamlessly into an equally terrible 2022. The leak of a list of alleged targets for its malware — a list that included journalists, activists, government critics, political officials, and religious leaders — led to an outpouring of discoveries linking the company to abusive deployments of malware by a number of questionable governments.

            • Akwasi Frimpong’s Struggle to Represent Africa at the Winter Olympics

              The International Olympic Committee is quick to tout its commitment to inclusion and diversity as “integral components” to creating “a better world through sport.” And yet the IOC is undermining these principles by denying Akwasi Frimpong, a Black skeleton athlete from Ghana, the opportunity to compete at the upcoming Beijing Winter Olympics. (Skeleton is a winter sport like luge, except athletes lie on their stomachs, face forward.) The incident spotlights the chasm between Olympic word and deed. But there is still time to change course and allow Frimpong to realize his Olympic dream.

            • Internet watchdog warns Olympic Games app has security, censorship flaws

              Internet watchdog Citizen Lab is sounding the alarm over security and censorship issues with a smartphone application mandated for use by all attendees of the 2022 Olympic Games in Beijing.

              The University of Toronto-based research laboratory published a report Tuesday, stating the MY2022 app contains numerous issues from a “simple but devastating flaw” permitting access to encrypted voice audio and file transfers to a keyword list that targets nearly 2,500 words for censorship.

            • Are you ready for the Data Protection Bill?

              “The major challenge, what we’re going to get, once we collect a lot of data for decision-making is going to be the erasure of that data. So, based on the guidelines, if the customer says, ‘The process is over, or the project is over, please erase my information’, that time, it’s going to be a major challenge,” Deshpande said.

            • #PrivacyofthePeople: Alexa, Google, Siri, we hear for you?

              Voice-enabled AI assistants like Alexa, Google Assistant and Siri reside not only on our smartphones but also in millions of bedrooms. The intimacy they enjoy presents a range of privacy risks that can be mitigated by a user-centric, rights focussed, data protection law. In this #PrivacyOfThePeople series, we discuss concerns on consent (when and how are such devices collecting data), data retention (storage of parts of audio recordings for undefined periods), cyber security audits (malicious attacks), and data sharing and surveillance (exposure of voice recordings to Voice Assistance training personnel and law enforcement).


              The first privacy concern is regarding data retention. All three VAs store a part of user data including audio recordings for an undefined period even when retention of data indefinitely is against the internationally accepted principle of storage limitation.


              The second privacy concern is the processing and storage of data without user knowledge and consent. VAs work based on users’ voices – it is their main feature. All the above-mentioned VAs activate upon hearing a particular activation keyword. Although some of the policies claim that the cloud servers do not store data/voice unless the activation word is detected, there is constant exchange of voice & related data between their cloud servers and the VA device. This is especially concerning in cases of false activation when data may be getting stored without actual knowledge.

            • Confidentiality

              • HTTPS is still optional, at least sort of

                I was recently reading this article (via). I have a number of reactions to it, but today’s reaction is to the small portion of its argument that the need for HTTPS certificate renewal (and HTTPS certificates) makes modern websites somewhat dynamic in practice in that you can’t just abandon them and necessarily have everything keep on working. My counterpoint is that HTTPS is still optional for certain sorts of sites, even here in early 2022.

    • Defence/Aggression

      • Untangling Ourselves From the Dark Side

        “You cannot simultaneously prevent and prepare for war.”

        The words are those of Albert Einstein, in a letter to a congressman 75 years ago. He adds, pointing out a truth that is still waiting to resonate culturally and politically: “The very prevention of war requires more faith, courage and resolution than are needed to prepare for war.”

      • From Aerial Strikes to Starvation, Afghanistan’s People Bear the Brunt of the West’s Failed Taliban Tactics

        At the last moment, this Isis suicide bomber detonated his device, killing 13 American soldiers and between 170 and 200 Afghans who were desperately trying to get a flight out of the country.

        Three days later the US fired its last missile in its 20-year-war in Afghanistan at what it said was a car near the airport into which it believed Isis members had loaded a bomb.

      • Civilians Reportedly Among 20 Yemenis Killed in Saudi Airstrike

        Human rights defenders on Tuesday decried Saudi-led airstrikes that killed at least 20 people in Yemen’s capital city of Sanaa, the U.S.-backed coalition’s deadliest attacks since 2019.

        “The increase in fighting in Yemen is having a deadly impact and once again it is civilians that are paying the price.”

      • Opinion | An Epochal Decline in American Global Power

        Throughout 2021, Americans were absorbed in arguments over mask mandates, school closings, and the meaning of the January 6th attack on the Capitol. Meanwhile, geopolitical hot spots were erupting across Eurasia, forming a veritable ring of fire around that vast land mass.

      • Opinion | In South Africa as in Palestine: Why We Must Protect the Legacy of Desmond Tutu

        Long before intersectionality became a prevailing concept which helped delineate the relationship between various marginalized and oppressed groups, late South Africa’s Archbishop Desmond Tutu said it all in a few words and in a most inimitable style. “My humanity is bound up in yours, for we can only be human together,” he said.

      • Seditious Conspiracy Charge Against Oath Keepers Founder and Others in J6 Riot Faces First Amendment Hurdle

        Many observers have noted the absence of “seditious conspiracy” charges in connection with prosecutions of those who took part in the Capitol riot. Participants in the riot have been charged with minor crimes such as trespassing or other lower-level offenses. Others have been charged with more serious offenses, such as obstructing a congressional proceeding or bringing a weapon inside the U.S. Capitol.

        But the seditious conspiracy charges announced on Jan. 13, 2022 by the Department of Justice raise the stakes and political temperature of the Jan. 6 investigation. As a First Amendment scholar, I believe they may also give rise to serious concerns about the rights of others protesting government actions down the road.

      • UN aviation agency releases fact-finding report on Ryanair incident in Belarus

        The UN’s civil aviation agency has released its fact-finding report on the May 2021 diversion of a Ryanair passenger plane to Belarus. The Athens to Vilnius flight was forced to make an emergency landing in Minsk after Belarusian dispatchers warned of an alleged bomb threat. Once the plane touched down, the Belarusian authorities promptly detained two of its passengers: Belarusian opposition journalist Roman Protasevich and Russian national Sofia Sapega, his girlfriend. The arrests prompted an international scandal that resulted in European countries banning airlines from traveling through Belarusian airspace. According to the independent Russian newspaper Novaya Gazeta, which obtained a copy of the fact-finding report, the investigation documents inconsistencies in the Belarusian authorities’ version of events, as well as their failure to comply with standard aviation procedures.

      • Texas Rabbi: Despite False Media Narratives, Synagogue Attack Brought Jewish & Muslim Communities Together

        On Saturday, an armed British man named Malik Faisal Akram took a rabbi and three congregants hostage at a synagogue outside of Fort Worth, Texas, resulting in an 11-hour standoff that ended once the rabbi threw a chair at Akram, who was later shot dead by the police. The standoff — which left all four hostages unharmed — has been identified by President Biden and federal authorities as an antisemitic act of terror. We speak with Rabbi Nancy Kasten, who says despite false media narratives painting the hostage crisis as an outgrowth of hostility between Muslims and Jews, the local Muslim community mobilized in support of the Jewish community this weekend. She also notes Muslim communities are less protected under federal and state law, which “creates a lot of opportunity for very misguided and false information to be perpetrated about the Muslim community.”

      • Aafia Siddiqui, Political Prisoner

        Pakistani-born Boston graduate student Aafia Siddiqui’s crime was to be caught in America’s post 9/11 anti-Muslim hysteria.  She had come to America in 1990 to study, earning a biology degree and then a Ph.D in neuroscience from MIT.  Her colleagues called her quiet and religious (but not a fundamentalist).  Her marriage to Mohammed Amjad Khan ended in divorce when he proved to be violent and more fundamentalist than Siddiqui.  She was mistakenly accused of anti-American Muslim activism initially (partially because of mistaken identity), but the accusations ballooned. In the early War On Terror days, “associations” became much more significant and damning.  Siddiqui ended up on Attorney General John Ashcroft’s “Watchlist.” As the Big Lies of government grew, soon the New York Post was calling her “Lady Al Queda.”

        Once the government labeled her a “terrorist,” she had no chance of escaping the Empire’s punishment. When her true story began to emerge, it was necessary to take action.  While visiting in Pakistan, helped by Pakistani American operatives, she was “disappeared.”  Her youngest child was killed when she was taken, and her other two children imprisoned separately for years. She was beaten, raped, tortured and kept in solitary in black site prisons of the American Empire, particularly in Afghanistan. Other prisoners have testified that they saw her at Bagram, a prison from which the Obama administration prevented prisoners’ court appearances because they might talk about the conditions of their imprisonment. Eventually Aafia Siddiqui would be set up for final punishment and disposal.

      • Who Is Aafia Siddiqui? Synagogue Attack Renews Focus on Pakistani Neuroscientist Imprisoned in Texas

        During Saturday’s synagogue attack in Colleyville, Texas, the gunman Malik Faisal Akram repeatedly called for the release of Pakistani neuroscientist Aafia Siddiqui, who is serving an 86-year sentence in a U.S. federal prison located just miles from the synagogue. Siddiqui was convicted in 2010 on charges that she intended to kill U.S. military officers while being detained in Afghanistan two years earlier. However, many questions remain unanswered about her time in U.S. custody, and her conviction was secured without physical evidence and on U.S. officials’ testimony alone, says Siddiqui’s lawyer, Marwa Elbially. Elbially says there’s a false impression of Siddiqui in the U.S. as a terrorist, even though terrorist charges were never brought against her, and Pakistan officials have voiced concern about her arrest and detention. We also speak with Mauri’ Saalakhan, director of operations for The Aafia Foundation, who calls Siddiqui’s case an unprecedented miscarriage of justice.

      • Enduring Stain: The Guantánamo Military Prison Turns Twenty

        On January 11, 2002, the first prisoners of the absurdly named “War on Terror”, declared with such confused understanding by US President George W. Bush, began arriving at the newly constructed Camp X-Ray prison at the US naval base in Guantánamo Bay.  Structurally crude, it was intended as a temporary facility, remote and out of sight.  Instead, it became a permanent and singular contribution of US political and legal practice, withering due process and civil liberties along the way.

        After two decades, 779 prisoners have spent time there, many of whom were low level operatives of minimal importance.  Prior to being sent to the camp, the detainees endured abductions, disappearances, and torture in US-operated centres in allied countries.  The previous director of the Central Intelligence Agency, Gina Aspel, had more than a nodding acquaintance with this process, having overseen operations at a black site in Thailand specialising in interrogating al-Qaeda suspects.

      • Opinion | Dr. King’s 1967 Anti-War Speech Was Unpopular, But Prophetic
      • 2014 vs. 2022 Ukraine’s improved but still longshot odds of withstanding a full-fledged Russian invasion

        After last week’s talks between Russia, the United States, and NATO led to no apparent breakthroughs on European security, speculation has resumed in the West that Moscow is preparing an expanded invasion of Ukraine that could begin at any time. The Kremlin denies any plans to attack Ukraine, but policymakers in Kyiv and Washington say the Russian military’s buildup near Ukraine’s borders suggests otherwise. Some experts in the West, including several former senior U.S. military personnel, now argue that the Ukrainian Army might be able to withstand a Russian onslaught, if it receives all feasible support from NATO. Hoping that is purely a thought experiment, Meduza reviews some of the theories about how a larger war between Russia and Ukraine could unfold.

      • Bill Clinton’s Role in the Crisis Over Ukraine

        Bill Clinton was initially responsible for the militarization.  He abolished the Arms Control and Disarmament Agency, and began the expansion of the North Atlantic Treaty Organization.  Barack Obama believed that war in Afghanistan was a “good war,” and reappointed Robert Gates as secretary of defense to appease the uniformed military.  President Joe Biden even appointed a retired four-star general to the position of secretary of defense, and has given diplomacy a back seat in the twin struggles with Russia and China.  The postwar presidents understood the need to divide Moscow and Beijing, but Biden has taken actions that have inspired Russia and China to grow closer.

        But it all started with Clinton, whose relations with the Pentagon were tenuous from the outset.  Clinton came into office with a reputation for manipulating the draft laws in 1969 to avoid service in Vietnam.  Clinton, moreover, alienated the military shortly after his inauguration when he suggested that he would allow homosexuals to serve openly in the military.  Of course, George W. Bush, Dick Cheney, and William Cohen avoided Vietnam, but Republicans typically get a pass from the Pentagon and the press when avoiding service.  Former senator John Kerry was a Vietnam War hero, but his ultimate criticism of the war was highlighted by the mainstream media and his Republican opposition.

      • Stop the Stumble Toward War With Russia

        In the technical argot of diplomacy, what’s going on in the Ukraine crisis is nuts.

      • Opinion | Only Cold-War Fools Hit Replay on Doomsday

        In the early 1960s, at the height of America’s original Cold War with the Soviet Union, my old service branch, the Air Force, sought to build 10,000 land-based nuclear missiles. These were intended to augment the hundreds of nuclear bombers it already had, like the B-52s featured so memorably in the movie Dr. Strangelove. Predictably, massive future overkill was justified in the name of “deterrence,” though the nuclear war plan in force back then was more about obliteration. It featured a devastating attack on the Soviet Union and communist China that would kill an estimated 600 million people in six months (the equivalent of 100 Holocausts, notes Daniel Ellsberg in his book, The Doomsday Machine). Slightly saner heads finally prevailed—in the sense that the Air Force eventually got “only” 1,000 of those Minuteman nuclear missiles.

      • Vladimir Putin is Not the Neville Chamberlain the US/NATO is Looking For

        That’s the pot calling the kettle black. More than 30 years after the Warsaw Pact’s dissolution, 77 years after the end of World War Two, the US still keeps 40,000 troops in Germany.

        For 45 years, the justification was to defend Germany from the Soviet Union and the Warsaw Pact. As Germany moved toward reunification, US Secretary of State James Baker assured Soviet premier Mikhail Gorbachev that the North Atlantic Treaty Organization wouldn’t expand so much as “one inch eastward” into the former Soviet sphere of influence it was created to contain.

      • Republicans, Aided by Manchin and Sinema, Are Stonewalling Voting Rights Bill
      • Why voters don’t blame Republicans for the Capitol riot — no GOP leaders have been arrested yet

        The implicit and sometimes explicit support for the insurrection by Republicans is obvious to the politically aware. Not only does the Republican Party continue to cover up Donald Trump’s role in inciting the riot, but the party nationwide is acting on Trump’s demands to help him steal the 2024 election through voter suppression and election interference. Meanwhile, prominent Republican figures continue to promote political violence, while Trump is the strong favorite for the GOP nomination 2024, with an overtly insurrectionist campaign built around his Big Lie.

        The problem is that the voters who are swinging hard to the GOP know basically none of this. Instead, they assume that the Republicans are a normal political party. There are lots of people to blame for this, of course. Biden and Democrats didn’t do themselves any favors by spending the past year talking up “unity” and “bipartisanship,” instead of focusing like a laser on the fact that the GOP is actively conspiring with Trump to cover up for January 6 and perpetuate his war on democracy. The media also plays a role, exhibiting an unwillingness to challenge Republicans directly about their anti-democratic ideology.

        But, ultimately, the biggest problem is the utter lack of accountability for any of the prominent Republicans involved in Jan. 6. Neither Trump nor any Republican leader has been arrested for their efforts to steal the election that led up to the Capitol riot. So far, the only people who have been arrested for the Capitol insurrection have been the people who actually stormed the building or far-right militia types who coordinated their actions that day. So that ends up reinforcing the impression, especially with people who don’t follow the news very closely, that the riot was a result of a bunch of self-directed fringe characters, and has nothing to do with the mainstream Republican Party. Unless the cuffs start coming out for Trump and his fellow elite Republicans, it will be hard to convince these voters to see the insurrection as anything but an anomalous event, instead of part of a larger anti-democratic conspiracy.

      • What Does It Mean If Republicans Won’t Debate?

        The possibility, though, that the RNC tells its 2024 presidential candidate to boycott the official debates is still a remarkable prospect — perhaps no more striking than the RNC’s decision not to write a 2020 party platform. It seems like a significant norm violation since presidential debates have been a part of the general election campaign for more than 40 years. But then again, presidential debates never were one of the most consequential parts of the presidential campaign process. What should we think about this development?

      • R.N.C. Signals a Pullout From Presidential Debates

        Republican committee officials alerted the debate commission to their plans in a letter sent on Thursday, a copy of which was obtained by The New York Times. If the change goes forward, it would be one of the most substantial shifts in how presidential and vice-presidential debates have been conducted since the commission began organizing debates more than 30 years ago.

      • Yle: Russian civilian plane flies mystery route over Finland

        A civilian Russian cargo plane flying between Moscow and Leipzig, Germany, took a rather circuitous route through Finnish airspace Saturday evening, public broadcaster Yle reports, leading to the scrambling of Finnish air force jets in response and prompting speculation over the rationale behind the excursion.

    • Environment

      • Global Plastic Pollution Is a ‘Deadly Ticking Clock’: Report

        “There is a deadly ticking clock counting swiftly down.”

        So says Tom Gammage, an ocean campaigner at the Environmental Investigation Agency (EIA), a United Kingdom-based group whose new report warns that only a muscular global treaty can turn the tide against the life-threatening crisis of plastic pollution. 

      • Rising Chemical Pollution Crosses Crucial ‘Planetary Boundary’

        The level of chemical pollution on Earth has crossed a “planetary boundary” and now threatens global ecosystems that support all life, according to a new study on human-made substances whose production has rapidly increased in recent decades.

        Researchers at the Stockholm Resilience Center (SRC) examined the levels of 350,000 plastics, pesticides, industrial chemicals, and other chemicals and found that human activity is releasing so many of these substances each year that their production has altered “the remarkably stable state Earth has remained within for 10,000 years—since the dawn of civilization.”

      • The Civil War on Yellowstone’s Wolves
      • It’s Time to Stop Rolling the Dice on Chemical Disasters
      • Opinion | America’s Climate Forest Must be Protected Now and for Future Generations

        The snow builds up at this time of year in the far northern forests of the Tongass in Alaska, blanketing this often lush green landscape. The bears that travel across the ravines during summer are now resting, hibernating until spring. The buzzing that comes from a forest teeming with life is now a peaceful hush, save for the calls of a raven or the soft dampened steps of the elk and deer. Every season we see the Tongass in a new light, offering points of wisdom and ways of being that stretch back farther than humanity.  However, as we recognize the beauty of the season, we are also alarmed at how unpredictable the weather has become throughout the year as communities in Alaska are challenged with climate-related extreme weather events—from record breaking snowfall to wind and ice storms to unusually high temperatures.

      • Energy

        • How Exxon Is Leveraging Texas Courts to Silence Its Climate Critics
        • How Exxon Is Using an Unusual Law to Intimidate Critics Over its Climate Denial

          By Chris McGreal, The Guardian. This story was originally published by The Guardian, and is republished here as part of Covering Climate Now, a global journalism collaboration strengthening coverage of the climate crisis.

          xxonMobil is attempting to use an unusual Texas law to target and intimidate its critics, claiming that lawsuits against the company over its long history of downplaying and denying the climate crisis violate the US constitution’s guarantees of free speech.

        • Exxon Net-Zero Plan Called Greenwashing From ‘Climate Liar’

          Climate action campaigners on Tuesday were eager to explain why a net-zero carbon plan released by oil giant ExxonMobil is an example of “more greenwashing” from the company that’s expected to increase its emissions by 17% in the coming years.

          “I don’t give a damn if Exxon is changing the lightbulbs at their office: It’s the millions of barrels of oil they’re producing that are the problem.”

        • Rising US Renewables Expected to Spur Decline in Fracked Gas

          Over the next two years, renewable energy sources are projected to generate a growing share of electricity in the U.S., according to a forecast shared Tuesday by the federal government, which expects a related decrease in production at fossil fuel-fired power plants.

          “Most of the growth in U.S. electricity generation in 2022 and 2023 will come from new renewable energy sources.”

        • UK Oil Regulator Has ‘No Duty’ to Consider North Sea Tax Breaks or Indirect Emissions, Court Rules

          The UK government is not legally required to consider tax breaks to oil and gas companies or emissions from burning fossil fuels when regulating the North Sea sector, a court has ruled today, rejecting a complaint by climate campaigners. 

          At a judicial review hearing in December at the Royal Courts of Justice in London, campaigners argued that the Oil and Gas Authority (OGA) strategy was “unlawful” because it fails to take into account tax breaks for oil and gas companies when approving new projects.

      • Overpopulation

        • Scientists Decry Human Indifference to ‘Probable Sixth Mass Extinction’

          There’s a human-caused extinction crisis underway—probably the start of the Sixth Mass Extinction—and denial or indifference to this planetary crisis is “an abrogation of moral responsibility,” according to scientists behind a new study.

          “We cannot help but feel that humanity is allowing a probable Sixth Mass Extinction to unfold.”

    • Finance

      • Tax on Global Mega-Rich Could Help Lift 2.3 Billion Out of Poverty

        A new analysis released Tuesday estimates that an annual wealth tax targeting the world’s millionaires and billionaires would raise enough revenue to lift 2.3 billion people out of poverty, provide universal healthcare to the people of low- and middle-income nations, and produce enough coronavirus vaccines to meet global demand.

        “During 2021, we witnessed the epidemic of Covid-19 and wealth-hiding, and it’s time to reverse course.”

      • Where Greed is a Virtue and Poverty Your Own Damn Fault

        It’s amazing what having a personal shelter to go home to means to a person. Those who have always had one don’t understand. The instability of living in the rough—as the Brits say—creates a level of insecurity and fear even among the most weathered of us all. Soldiers who slept in the jungles of Vietnam, snakes in the trees, jungle rot, the uncertainty of being the invader in another’s land; even these men can feel uneasy when sleeping in the rough. Cops, vigilantes, teenage punks, criminals hiding among the houseless—it’s not easy or pretty. Those with homes have little to no knowledge of this and those who enlist the police to harass the houseless seem to actually hate the men and women without a roof over the head, a mortgage or a landlord. As someone who was houseless for a while in the 1970s and who until recently worked in public libraries where the houseless are most often welcome, the fact that housing is part of a market angers me as much as a cop beating an innocent person. My late and politically conservative father decried the circumstances that made homes investments instead of places to live. Unfortunately, he never understood how this reality was an essential part of capitalism.

        I have a friend I run into a couple of times a week. His name is Albert. He’s a retired RN who was in the air force for a brief time in 1969 or 1970 but was kicked out after a rapid political radicalization occurred. He attributes that radicalization to his attendance at a rally called by the Black Panthers. I believe it was soon after Fred Hampton was murdered by the police in Chicago. Within a couple of months, my friend was kicked out, in large part because of his political views and new outspokenness. Naturally, he was relieved and happy that the military was behind him. Most of us would be.

      • Student Debt Cancellation is a Racial Justice Issue

        In a recent House floor speech, Rep. Ayanna Pressley pointed out that the student debt crisis disproportionately impacts the Black community.

        “But for too long,” Pressley said, “the narrative has excluded us and the unique ways in which this debt is exacerbating racial and economic inequities, compounding our gender and racial wealth gap.”

      • Is Europe’s Inflation Joe Biden’s Fault?

        We got some interesting news on inflation elsewhere today in the Bureau of Labor Statistics (BLS) release of data on import prices. It turns out that the price of imports has been rising even faster than domestic prices, with inflation of 10.4 percent over the last year.

        A big part of this increase is higher energy prices, but the data do allow for an important comparison. BLS has a category for imports of manufactured goods from industrialized countries. This would be a wide range of items like cars, car parts, electronics, and other things we would import from Europe, Japan, Canada, and other wealthy countries. In other words, this is a cross-section of goods from countries we think of as similar to the United States.

      • Three More Starbucks Locations in Buffalo Will Soon Vote on Unionization
      • Chris Hedges: America’s New Class War

        There is one last hope for the United States. It does not lie in the ballot box. It lies in the union organizing and strikes by workers at Amazon, Starbucks, Uber, Lyft, John Deere, Kellogg, the Special Metals plant in Huntington, West Virginia, owned by Berkshire Hathaway, the Northwest Carpenters Union, Kroger, teachers in Chicago, West Virginia, Oklahoma and Arizona, fast-food workers, hundreds of nurses in Worcester, Massachusetts, and the members of the International Alliance of Theatrical Stage Employees.

    • AstroTurf/Lobbying/Politics

      • Dems Urged to Hold Senate Floor for ‘As Long As It Takes’

        As the U.S. Senate on Tuesday began debating voting rights legislation intended to combat GOP attacks on democracy, progressive groups urged Democratic senators to hold the floor however long it takes to send a House-approved package to President Joe Biden’s desk.

        “Tens of thousands of people have mobilized for voting rights this year,” Megan Hatcher-Mays, director of democracy policy for Indivisible, said in a statement. “They deserve to see Democratic senators fighting for them and for our democracy by taking to the floor and making the case.”

      • Saving Democracy

        It may come in last unless enough people care enough about one goal so that both moderate Democratic and Republican lawmakers could successfully create legislation that would pass both houses of Congress. The goal: Keeping our democracy intact.

        The Democrats appear to be giving up on changing or deleting the Senate’s filibuster rule because Democratic Sens. Joe Manchin III of West Virginia and Kyrsten Sinema of Arizona object to monkeying with the political tool that requires 60 votes instead of a majority to pass legislation, budget bills aside.

      • Lessons From Louise Glück

        “Who can speak of the future?” Louise Glück asks in her new book of poems, Winter Recipes From the Collective. “Nobody knows anything about the future.” In its apparent rebuke to both writer and reader, the line might seem exemplary of the stark, unsentimental lyric voice for which Glück is best known. The poem it appears in, less so: “A Children’s Story” imagines a royal family driving back to the city after a pastoral sojourn, “all the little princesses / rattling in the back of the car.” The tone suits the genre invoked by its title; the scene is at once mundane and surreal. (“Outside the car, the cows and pastures are drifting away.”) But unlike other children’s stories, this one is in no rush to console. “All hope is lost,” the poem concludes. “We must return to where it was lost / if we want to find it again.” Wavering between melancholy and resolve, “A Children’s Story” speaks to our national mood better than most overtly political poems of the past few years. It also speaks of somewhere else entirely. All of Winter Recipes walks this line between a shared social world and a parallel world of dreams, symbols, and obscure but profound instruction—a realm often ceded to the young and the old.

      • Eurasia’s Ring of Fire: the Epic Struggle Over the Epicenter of U.S. Global Power

        Let’s circle that continent to visit just a few of those flashpoints, each one suffused with significance for the future of U.S. global power.

        On the border with Ukraine, 100,000 Russian troops were massing with tanks and rocket launchers, ready for a possible invasion. Meanwhile, Beijing signed a $400 billion agreement with Tehran to swap infrastructure-building for Iranian oil. Such an exchange might help make that country the future rail hub of Central Asia, while projecting China’s military power into the Persian Gulf. Just across the Iranian border in Afghanistan, Taliban guerrillas swept into Kabul ending a 20-year American occupation in a frantic flurry of shuttle flights for more than 100,000 defeated Afghan allies.

      • Corresimo in Ecuador: An Interview with David Chavez

        Joe Emersberger: Could you please talk a bit about the political persecution that Correismo has been put through since 2017? What are the main cases people should know about?

        David Chavez: The case of [former Vice President] Jorge Glas is the most significant because Glas has been in prison for over 4 years now (he was convicted of illicit association) but it has not been possible to prove that he was involved in the Odebrecht case in which he was accused. But there are obviously more cases. Correa himself has about 48 court cases as far as I know. Several leaders of the movement are exiled in Mexico, some because of court cases against them, others because they were harassed by the previous government as a result of the October 2019 protests [against the elimination of fuel subsidies by decree of former President Lenin Moreno]. And there are other people who have also been sentenced in the last trial in which Correa was sentenced, the so-called “Bribery Case”, as is the case with María Duarte, the former Minister of Transportation and Public Works, who is living in the embassy of Argentina. The government has not given her safe passage to go to Argentina, whose government has granted her asylum.

      • Redistricting, Restrictions
      • Secure Our Right to Vote

        Did this new law further protect our elections when a more secure process of registering voters in person on Election Day is now banned? Why prevent Montanans from having the same access to voting rights as the previous 68,000 Montanans over the last 15 years who could register and vote on Election Day if it does not crack down on voter fraud or provide more election security?

        It is not too hard to predict who this new law will impact, like senior citizens, disabled veterans, and college students whose voter registration addresses were not updated when they moved to the assisted living centers or colleges and only learned of this error at the polling location on the day of the election. Or Montanans who are busy with work and family and forget to update their voter registration and get an hour off of work to vote on Election Day, only to find out their voter registration is not active. Do we really think having these Montanans not voting in our elections makes our elections more secure with less voter fraud?

      • Say It Ain’t So, Joe, Again

        The political system in the US is run by, and operates for, the economic elite here, just as it has since the founding of the nation in the late 18th century. Just as the founders allowed for a horrific system of slavery to become the bedrock of the economy, so does today’s racism and mass incarceration result from the same forces of the power elite. It is no cliché to say that they, the elite, run this nation for their interests as the military-industrial-financial monied class. Joe Biden is a figurehead for the elite and they, the elite, are tipping their hands more and more toward opening the door for complete corporate fascism here.

        When I wrote “Say It Ain’t So, Joe” (CounterPunch, March 20, 2019) many months before the 2020 election, I enumerated the really bad policies that Biden stood for, from kowtowing to the banking class in Delaware and beyond, to his support for immoral wars such as the war in Iraq that he wholeheartedly supported. His disgusting behavior toward Anita Hill during the Senate hearings to confirm Clarence Thomas speaks for itself.

      • “There Must Be a Moral Shift”: Bishop Barber Calls on Democrats to Pass Voting Rights, Protect Poor

        Senate Democratic leadership insists they will debate two critical voting rights bills even though Democratic Senators Joe Manchin and Kyrsten Sinema have publicly denounced their party’s plan to make changes to Senate filibuster rules that would give Democrats the votes needed to pass the landmark legislation. Meanwhile, thousands marched in support of the legislation and the necessary filibuster rule changes in Washington, D.C., on Monday, the federal holiday marking Martin Luther King Jr. Day. We speak with movement leader William Barber, co-chair of the Poor People’s Campaign, who criticizes the Democrats for bifurcating the Build Back Better economic legislation from voting rights and says movements must plan sustained, nonviolent direct action to ensure politicians pass legislation that benefits poor and low-wealth people.

      • On Eve of Key Fight, Sanders Asks: ‘Will Manchin and Sinema Vote With GOP?’

        Just hours ahead of a pivotal Senate showdown over voting rights and the legislative filibuster, Sen. Bernie Sanders on Monday focused his attention on the two primary internal obstacles to the Democratic Party’s success on both fronts: right-wing Sens. Joe Manchin and Kyrsten Sinema.

        “As the voting rights bill finally comes to the floor of the Senate, there is only one vote which will really matter,” Sanders (I-Vt.) argued in a Twitter post. “Will 50 Democrats vote to override the filibuster, protect American democracy, and pass the bill, or will Manchin and Sinema vote with the GOP and let the bill die?”

      • How Media Reports of Their Own Polls Can Mislead

        A new media poll last week by Investor’s Business Daily (1/10/22), conducted with the polling firm TIPP, announced that “Biden Approval Rating Relapses as Omicron Surges, Stock Market Slumps.”

      • Senate Dems Propose Talking Filibuster for Voting Rights

        U.S. Senate Majority Leader Chuck Schumer confirmed Tuesday evening that if Republicans continue to obstruct a long-delayed voting rights package, he will move to bring back the talking filibuster for just that legislation.

        “Now that they have found a way to open debate, under the current rules, Democrats can and must force a public debate that ends with a majority vote.”

      • WATCH LIVE: Senate Debates Voting Rights

        The U.S. Senate on Tuesday kicked off debate on voting rights legislation and moved closer to a potential floor battle over the filibuster rule, which Sens. Joe Manchin and Kyrsten Sinema have vowed to uphold despite the dire implications for U.S. democracy.

        Watch the Senate debate voting rights live:

      • If Dems Don’t Deliver on Health Care, They May Suffer in Midterms, Jayapal Warns
      • 94% of AZ Progressives Support Primary Challenge if Sinema Kills Voting Rights

        As U.S. Sen. Kyrsten Sinema continues to stymie voting rights legislation by refusing to support filibuster reform, an overwhelming majority of respondents to a Tuesday survey by Indivisible said they would back a 2024 primary challenger to the Arizona Democrat if she does not change course.

        “Since 2021, Arizonans have been calling on Sinema to eliminate the filibuster and pass democracy reform.”

      • MLK Family Blasts Manchin & Sinema for Protecting Filibuster Over Voting Rights
      • Voting Rights Cannot Be Separated From Economic Justice, Says William Barber
      • Activision Stock Gets Analyst Upgrade on “Win-Win” Microsoft Deal; Is Electronic Arts Next?

        This year is off to a quick and game-changing start for the video gaming sector. After all, it is now two weeks, two mega-deals in the space as technology giant Microsoft unveiled a $68.7 billion takeover of powerhouse Activision Blizzard on Tuesday, eight days after Take-Two Interactive’s $12.7 billion deal to acquire Zynga.

      • Federal Communications Commissioner Starks Seeks to Encourage Democratic Principles Online

        With increasing challenges to democracy around the world and citizen surveillance efforts by several international governments, as well as domestic concerns over privacy on social media platforms, Starks says private sector entities should work to set standards which promote democratic principles and privacy for citizens.

      • White House Meeting Puts Spotlight on OSS Sustainability

        A recent meeting between IT industry leaders and White House officials highlighted open source software sustainability concerns as high-profile breaches and zero-day attacks have many organizations reviewing their software supply chains.

        The White House published a statement describing, among other things, how participants had a “substantive and constructive” discussion on how to make a difference in the security of open source software while continuing to effectively engage and support the open source community.

    • Censorship/Free Speech

      • Remembering The Fight Against SOPA 10 Years Later… And What It Means For Today

        Register now for our online event featuring Rep. Zoe Lofgren »

      • Russian Artist Arrested For Giant Poop Snow Sculpture

        A Russian artist has been arrested for creating a snow sculpture in the form of a giant turd near a burial site in St. Petersburg.

        Police and local media on January 17 said that Ivan Volkov was criminally charged for desecrating the burial place of the dead when he created the 5-meter-long sculpture.

      • China’s App for Olympians Has Security Flaw, Censors Sensitive Words, Says Canadian Report

        An app mandated for use by all attendees of the Beijing 2022 Winter Olympics has a flaw that allows encryption of sensitive data to be sidestepped, a new study by Canadian researchers says. The app also censors words related to the Chinese authorities’ human rights abuses of ethnic and religious minority groups, according to the study.

        The Citizen Lab, a global security research institute at the University of Toronto’s Munk School of Global Affairs and Public Policy, published the study on Jan. 18, analyzing the app, called MY2022.

        All attendees of the Beijing Winter Olympics, including athletes, audience members, and journalists are required to install the app to attend the Games.

      • Mandatory Chinese Olympics app has ‘devastating’ encryption flaw: analyst

        WASHINGTON: An app all attendees of the upcoming Beijing Olympics must use has encryption flaws that could allow personal information to leak, a cyber security watchdog said Tuesday.

        The “simple but devastating flaw” in the encryption of the MY2022 app, which is used to monitor Covid and is mandatory for athletes, journalists and other attendees of the games in China’s capital, could allow health information, voice messages and other data to leak, warned Jeffrey Knockel, author of the report for Citizen Lab.

    • Freedom of Information/Freedom of the Press

      • Your Man in Saughton Jail Part 1

        In fact I was only half an hour in St Leonards before being put in a police car and taken to Saughton. This was pretty well unique – the police do not conduct people to prison in Scotland. At no stage was I manacled or handled and the police officers were very friendly. Reception at Saughton prison – where prisoners are not usually admitted on a Sunday – were also very polite, even courteous. None of this is what happens to an ordinary prisoner, and gives the lie to the Scottish government’s claim that I was treated as one.

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • Why U.S. Robocall Hell Seemingly Never Ends

        According to the YouMail Robocall Index, there were 3.6 billion U.S. robocalls placed last December, or 115 million robocalls placed every single day. That’s 4.8 million calls placed every hour. Despite the periodic grumble, it’s wholly bizarre that we’ve just come to accept the fact that essential communications platforms have been hijacked by conmen, salesmen, and debt collectors, and we’re somehow incapable of doing anything about it.

      • Tonga undersea cable needs ‘at least’ four weeks to repair: NZ

        A key undersea cable that was destroyed in a volcano eruption in Tonga may take at least four weeks to be repaired, said New Zealand’s foreign ministry.

    • Digital Restrictions (DRM)

      • Daniel Radcliffe to Play ‘Weird Al’ Yankovic in Roku’s First Original Biopic Movie

        Colin Davis, Roku’s Head of Original Scripted Programming, added, “There clearly aren’t enough biopic movies about famous musicians and we were excited to shine a light on the incredibly true, unexaggerated story of Weird Al. This is sincerely the ultimate combination of talent, creativity, and friends, coming together to make something genuinely funny and we could not be prouder to call this film a Roku Original.”

    • Monopolies

      • New Project Launched as ‘Direct Counterweight’ to Big Tech

        The Tech Oversight Project launched Tuesday in an effort to push back against major technology companies’ lobbying on Capitol Hill and advocate for greater regulation of the industry.

        The project is beginning with a focus on federal antitrust legislation, employing a “campaign-style” strategy to fight for passage of the American Innovation and Choice Online Act (H.R. 3816/S. 2992), which would outlaw certain anti-competitive conduct by major platforms.

      • Copyrights

        • Humane Society. For the recovery of persons apparently dead by drowning. : Instituted in the year 1774

          To bring the deceased back to life, especially those taken before their time, has long been a dream of legends and myth. In the case of the “apparently drowned”, however, it is possible to perform the seemingly miraculous and restore a limp body to full animation before lethal asphyxiation occurs. Yet despite the relatively simple techniques needed to perform this operation, they have taken millenia to develop. Early representations of resuscitation are shallow in information. Some scholars point to the Battle of Kadesh, as depicted at the Egyptian Ramesseum, where the drowned Hittite Emperor is held upside down by his men; others to the Hebrew Book of Kings, where Elisha revives a dead child with his “mouth upon his mouth” as an example of artificial ventilation. The idiom “over a barrel” may point to a practice, possibly medieval in origins, for rolling an unconscious body on a cask until they cough up water (or it might equally suggest flogging). The history of modern resuscitation in Europe conjures, though did not coin, another idiom: “to blow smoke up your”. . . well, we all know where that leads. Driven by an Enlightenment humanitarianism, social reformers and physicians began addressing a leading cause of preventable expiration that had rarely been treated on a national scale — death by water.

          In the 1730s, René Antoine Ferchault de Réaumur popularized a recent discovery: the seemingly lifeless could be revived with a wealth of strategies. This “Pliny of the Eighteenth Century” (Réaumur invented a precursor to the Celsius scale, influenced methods of silk production in China, and pioneered the process of metallic tinning still used today) wrote a pamphlet titled Avis pour donner du secours à ceux que l’on croit noyez (Advice to aid those believed drowned). After debating the pros and cons of tickling the nose with feathers and filling a drowning man’s mouth with warm urine, Réaumur reveals what he believes to be the best technique: using a pipe stem to blow stimulating tobacco smoke into the intestines through the rectum. Louis XV found the pamphlet dazzling and encouraged its wide distribution. Startlingly, as Anton Serdeczny discusses in his recent book on reanimation, soon riverbanks across Europe were lined with “resuscitation kits”, as close-by as a contemporary defibrillator, which contained all the necessary supplies for giving a nicotine enema (and later, thankfully, included bellows as a substitute for breath).

        • How The SOPA Blackout Happened

          “[Historical knowledge] gives understanding of how the present world came to be, and maybe more importantly, an appreciation that everything that is, never necessarily had to be” -from “History as Freedom” —Joe Costello, longtime political organizer, writer

        • The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic

          The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block “illegal” websites, including pirate sites.

        • ‘Criminal’ VPN Shut Down By Europol and International Law Enforcement

          Joint action by Europol and law enforcement authorities in ten countries has shut down VPNLab, a VPN service said to have been used to commit cybercrimes including malware distribution and ransomware campaigns. The service’s domain now displays a seizure banner claiming the service’s involvement in major international cyber attacks.

        • Adblocking Does Not Constitute Copyright Infringement, Court Rules

          Axel Springer has lost its copyright infringement lawsuit against Eyeo GmbH, the company behind Adblock Plus. The German publishing house, which owns the Bild and Die Welt brands, among others, claimed that adblockers interfere with the presentation of websites in browsers, thus breaching copyright. In a victory for Eyeo, the Hamburg District Court has dismissed the case.

        • Better Internet Series: Access to Information and Knowledge

          See our article introducing this series.

        • Copyright Shouldn’t Stand in the Way of Your Right to Repair

          If you bought it, you own it and you can do what you want with it. That should be the end of the story—whether we’re talking about a car, a tractor, a smartphone, a computer, or really anything you buy.

          Yet product manufacturers have chipped away for years at the very idea of ownership, using the growing presence of software on devices to make nonsense arguments about why your tinkering with the things you own violates their copyright. It’s gotten so bad that there’s a booming market for 40-year-old tractors that don’t rely on software. We’ve worked for years with advocates with the Repair Coalition, iFixit, U.S. PIRG, and countless others, to get lawmakers to make it crystal clear that people have the right to tinker with their own stuff.

          It’s working. The wind is at our backs right now. In just the past two years, the right to repair has won at the ballot box in Massachusetts, received a supportive directive from the Biden Administration, and made some gains at the Library of Congress to expand repair permissions.

Links 19/1/2022: Wine 7.x Era Begins and Istio 1.12.2 is Out

Posted in News Roundup at 2:06 am by Dr. Roy Schestowitz

  • GNU/Linux

    • A note for LWN subscribers [LWN.net]

      January 22, 2022 will be the 24th anniversary of the publication of the first LWN.net Weekly Edition. A lot has happened in the intervening years; the Linux community has grown immeasurably, and LWN has grown with it. Later this year will also be the 20th anniversary of the adoption of our subscription-based model, which has sustained LWN ever since. There is a change coming for our subscribers that will, with luck, help to set up LWN to thrive in the next coming years.

      The nominal price for an LWN subscription is $7 per month, a price that has remained unchanged since 2010. That $7 buys a lot less now than it did twelve years ago. Your editor is reliably informed by the Internet that inflation in the US has been just under 28% from 2010 until the middle of 2021; that rate doesn’t include the last few months. Prices for some things, most notably health insurance in the US, have increased by rather more than that.

    • Server

      • Istio / Announcing Istio 1.12.2

        This release fixes the security vulnerability described in our January 18th post, ISTIO-SECURITY-2022-001 as well as a few minor bug fixes to improve robustness. This release note describes what’s different between Istio 1.12.1 and Istio 1.12.2.

      • ISTIO-SECURITY-2022-001
    • Audiocasts/Shows

    • Applications

      • VirtualBox 6.1.32 Fixes Access to Some USB Devices on Linux Hosts, Improves Shared Clipboard

        VirtualBox 6.1.32 arrives almost two months after VirtualBox 6.1.30 to fix a bunch of bugs. For example, it fixes access to some USB devices on Linux hosts as the device class wasn’t handled correctly, fixes the wrong mouse position if guest is in text mode, fixes copying of folders from host to guest and vice versa, and fixes UNICODE handling.

        Also fixed in this release is the accidental creation of an empty debug log file when the OSS (Open Sound System) audio backend was configured, the loss of keyboard focus under rare circumstances when using the mini toolbar in full-screen mode, the link status reporting for certain Linux kernels, as well as packaging and installer regressions affecting Solaris hosts.

    • Instructionals/Technical

      • How To Install Ansible on Fedora 35 – idroot

        In this tutorial, we will show you how to install Ansible on Fedora 35. For those of you who didn’t know, Ansible is an open-source software provisioning, configuration management, and application-deployment tool enabling infrastructure as code. Ansible automates and simplifies repetitive, complex, and tedious operations. It’s a free tool written in Python.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Ansible automation tool on a Fedora 35.

      • Install PHP 8 on Ubuntu 22.04 – kifarunix.com

        In this tutorial, you will learn how to install PHP 8 on Ubuntu 22.04. PHP 8 is a major update of the PHP language. It contains many new features and optimizations including named arguments, union types, attributes, constructor property promotion, match expression, nullsafe operator, JIT, and improvements in the type system, error handling, and consistency.

      • How to keep your Debian updated

        A Linux OS is a collection of multiple packages interlinked in a very complex network. These packages offer all the necessary files and binaries that make up the operating system. These packages need regular updates. It may be security patches, bug fixes, or feature improvements. As such, it is critical to keep all the packages up-to-date.

      • How to install Debian 11

        Debian 11.0 was released on August 14th, 2021, with the codename Bullseye. After approximately two years of development, the Debian projects presented a stable version of Debian 11 which will be supported for the next five years. This new distribution whips with over 11294 new packages to count 59551 packages.

      • Allow/Deny SSH Access To a Particular User Or Group In Linux

        In this article we will be allowing or denying SSH access to a particular user or Group by making a few changes in SSH Configuration file.

        First, we will see how to allow or enable SSH access to a user and group. Please note that all commands given below should be run as root or sudo user.

      • 3 Linux commands to shut down the system and you will able to do it easily

        Hi Guys, In this guide, we will illustrate the difference between shutdown, poweroff, halt and reboot command in Linux.

      • Set Date and Time for Each Command You Execute in Bash History

        Hi guys, In this article, we will show you how you can configure time stamp information when each command in the history was executed to be displayed.

        All commands executed by Bash on the command line are stored in history or in a file called ~/.bash_history.

        Also you can list all of the commands executed by users on the system or a user can view the command history using the history command as shown below.

      • How to install Gitea on a fresh Ubuntu/Debian server

        Gitea an open source easy-to-use self hosted git server written in Go. It has many features like time tracking, repository branching, file logging, notifications, built-in wiki and much more. Gitea is an lightweight application meaning that it can be run on lower spec systems too. It is an great lightweight alternative to GitLab. It’s really easy to setup and you will find most of the features that you will find in typical source control platform. This tutorial will show you how to install Gitea on Ubuntu Or Debian Systems

      • How to Install and Configure Kibana on Ubuntu 20.04 – Citizix

        Kibana is a proprietary data visualization dashboard software for Elasticsearch, whose open source successor in OpenSearch is OpenSearch Dashboards. It is a data visualization and exploration tool used for log and time-series analytics, application monitoring, and operational intelligence use cases. It offers powerful and easy-to-use features such as histograms, line graphs, pie charts, heat maps, and built-in geospatial support. Kibana also acts as the user interface for monitoring, managing, and securing an Elastic Stack cluster — as well as the centralized hub for built-in solutions developed on the Elastic Stack.

      • How to install and Configure HAProxy load balancer on Ubuntu 20.04

        HAProxy is a free and open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers. It distributes the load among the web and application servers.

        Haproxy is popular for load balancing because of its efficiency, reliability, and low memory and CPU footprint. Load balancing is a common solution for distributing web applications horizontally across multiple hosts while providing the users with a single point of access to the service.

        It is available for install on major Linux distributions. In this guide we will learn how to install and configure HAProxy load balancer on Ubuntu 20.04.

      • How to Install an RPM File in Linux

        Did you download an RPM file, and you’re not sure what it is or what do with it? It’s one of the file types used to install applications in Red Hat Enterprise Linux-based distributions, and we’ll show you how to use them.

      • Install PHP 7.1/7.2/7.3/7.4 on Ubuntu 22.04 – kifarunix.com

        Did you download an RPM file, and you’re not sure what it is or what do with it? It’s one of the file types used to install applications in Red Hat Enterprise Linux-based distributions, and we’ll show you how to use them.

    • Wine or Emulation

      • Wine 7.0 Released with Tons of Improvements, Including a New Theme

        The new Wine 7.0 release features a year’s worth of development distilled from over 9,000 changes. The goal? To serve you a bold bouquet that’s rich in improvements, new features, and advanced capabilities.

        Now, the official release announcement is a little terse, but both the Wine mailing list announcement and the official release notes relay a lot more detail — like ‘best read with a glass of real wine and some nibbles’ detail.

      • Run Windows apps on Linux with Wine 7.0

        It used to be, people would scoff at the idea of switching to a Linux-based operating system due to a lack of software. While that is still true for some folks — especially business users — it is less of a concern these days. Why? Well, so many things are done through the web browser nowadays, lessening dependence on Windows software. For many consumers, just having the Google Chrome browser on, say, Ubuntu, is more than enough to accomplish their wants and needs. Not to mention, there are many quality Linux apps like GIMP and DaVinci Resolve.

        But OK, lets say you really want to use a Linux-based operating system, but there’s some Windows-only software that you absolutely cannot live without. Thankfully, you may still be able to ditch Windows and upgrade to something like Fedora or Linux Mint. How? Thanks to the excellent Wine! This compatibility layer (don’t you dare call it an emulator), can sometimes enable you to run Windows software on Linux. Today, version 7.0 is released.

      • Wine 7.0 Released with Support for New GPUs, Multiple Displays, and WoW64

        After a year of development, Wine 7.0 is here to introduce lots of goodies to satisfy your Windows application and gaming needs. First of all, it brings support for the WoW64 (64-bit Windows-on-Windows) architecture to allow you to run 32-bit Windows programs inside a 64-bit Unix host process.

        On top of that, Wine 7.0 adds support for multiple displays (multi-head) to its Direct3D implementation to allow you to choose which monitor a Direct3D program will use for full-screen mode, along with display gamma adjustment using the DXGI API, and support for new GPUs.

      • WINE 7.0 released [LWN.net]

        Version 7.0 of the WINE Windows API library has been released.

      • WineHQ – News – Wine 7.0 Released

        The Wine team is proud to announce that the stable release Wine 7.0 is now available.

        This release represents a year of development effort and over 9,100 individual changes. It contains a large number of improvements that are listed in the release notes below.

      • Wine 7.0 Released With Improved Theming, New WoW64 & Much More – Phoronix

        Wine 7.0 is now officially available for enjoying Windows games and applications on Linux, macOS, and other platforms.

        Wine 7.0 serves as the annual stable release for “Wine Is Not an Emulator” for running Windows applications/games on other platforms. Wine 7.0 is the culmination of all the bi-weekly Wine 6.x(x) point releases over the past year.

    • Distributions

      • What is Void Linux and How to Install It

        Void Linux is a Linux distribution that aims to provide a powerful, yet easy-to-approach, operating system. It is designed to be both simple and stable and achieves that through the use of runit and its own lightweight package manager.

        Similar to Arch Linux, Void Linux follows a “rolling release” model and a “user-centric” approach to operating system usage. This means Void Linux is constantly updated but is also bare-bones when installed. It makes Void Linux appealing for power users who want to have a flexible operating system that they can fully understand and tinker with.

      • New Releases

        • Debian-based deepin Linux 20.4 is here and you should switch from Windows 11 today!

          Debian is a great operating system in its own right, but also, it makes for an excellent base for other Linux distributions as well. For example, Ubuntu is probably the most well-known Linux distro and it is based on Debian. There are countless other operating systems, such as Netrunner, that stand on Debian’s figurative shoulders.

          The prettiest and most exciting Debian-based operating system, however, is deepin. This Chinese-developed Linux distribution is probably the most beautiful desktop operating system on the planet; it is arguably better than both macOS and Windows 11 in the style department.

          deepin has what many consider the most beautiful and intuitive user interfaces. Today, deepin 20.4 becomes available and it uses either LTS kernel 5.10.83 or stable kernel 5.15.6. If you are running Windows 11, you should definitely consider switching now!

      • SUSE/OpenSUSE

        • GeckoLinux ROLLING Now Ships with Linux 5.16, Improved PipeWire Configuration

          GeckoLinux ROLLING is derived from the openSUSE Tumbleweed and Packman repositories, which means that if follows a rolling release model where you install once and receive updates forever. But, from time to time, the developer of this distribution generates new installation images for better hardware compatibility.

          As such, the new GeckoLinux ROLLING update is here to further improve the Calamares graphical installer to no longer create a Btrfs subvolume for the /tmp directory.

    • Devices/Embedded

      • RK3566-based PineNote E-Ink tablet ships at $399

        Pine64 launched a $399 “PineNote” tablet with 10.1-inch, E-Ink touchscreen, 4GB LPDDR4, and 128GB eMMC that runs Linux on a Rockchip RK3566. The company also recently launched the $399 PinePhone Pro and a PinePhone Keyboard and a PineDIO USB LoRa adapter.

        Pine64 announced its PineNote E-ink reader in August and launched its first developer version of its second-gen PinePhone Pro Explorer Edition smartphone in October. The company has now launched the PineNote for developers only, and recently launched a less bleeding-edge version of PinePhone Pro, which is available for the same $399 price with shipments due in late February (see farther below).

        Earlier in the month, Pine64 launched its $50 PinePhone Keyboard case, which supports both the PinePhone and PinePhone Pro. There is also a new, $15 PineDio USB LoRa Adapter that works with any USB-connected device. A $20 case model packages the adapter for use with the PinePhone or PinePhone Pro (see farther below).

      • Pine64 should re-evaluate their community priorities

        Pine64 has a really interesting idea: make cheap hardware with low margins, get it into the hands of the FOSS community, and let them come up with the software. No one has ever done this before, at least not on this scale, and it’s a really neat idea! Pine64 is doing a lot to support the FOSS community bringing up its hardware, but I’m afraid that I have to ask them to do a bit more.


        Again, this is ordered from most to least important, but in practice, the ecosystem prioritizes them in reverse. Pine64 themselves contribute no labor to any of these focus areas, and though they provide some funding, they provide it from the bottom of this list up, putting most of it into distros and very little into the kernel, bootloaders, or telephony. This is nice, but… why fund the distros at all? Distros are not the ones getting results in these focus areas. Their job is to distribute the results of community efforts.

        Don’t get me wrong, the distros do an important job and they ought to get the funding they need, but this is just creating fragmentation in the ecosystem. As one example, we could be installing the Linux distribution of our choice on the Pinebook Pro using a standard aarch64 UEFI ISO installer, just like we do for any other laptop, if someone spent a couple of weeks upstreaming the last 6 patches to mainline Linux and put together a suitable u-Boot payload to flash on the SPI flash chip. But, instead of one working solution for everyone, we have 20+ Linux distros publishing Pine64-specific images to flash to microSD cards.

      • Open Hardware/Modding

        • Bryan Quigley: Small EInk Phone

          To be shipped with one of the main Linux phone OSes (Manjaro with KDE Plasma, etc).

        • A DIY CAD Mouse You Can Actually Build

          When you spend a lot of time on the computer doing certain more specialised tasks (no, we’re not talking about browsing cat memes on twitter) you start to think that your basic trackpad or mouse is, let’s say, lacking a certain something. We think that something may be called ‘usability’ or maybe ease-of-use? Any which way, lots of heavy CAD users gush over their favourite mouse stand-ins, and one particularly interesting class of input devices is the Space Mouse, which is essentially patented up-to-the-hilt and available only from 3DConnexion. But what about open source alternatives you can build yourselves? Enter stage left, the Orbion created by [FaqT0tum.] This simple little build combines an analog joystick with a rotary knob, with a rear button and OLED display on the front completing the user interface.

      • Mobile Systems/Mobile Applications

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • Firefox Gets AV1 VA-API Acceleration Sorted Out

            Thanks to Red Hat developer Martin Stránský, he has managed to get the Video Acceleration API (VA-API) working for AV1 content within the Firefox web browser.

            After working on it the past month, the necessary bits have come together for supporting AV1 VA-API playback within Firefox on Linux. See the Mozilla.org BugZilla for tracking the progress on the effort. The latest AV1 activity in general for Mozilla can be tracked via hg.mozilla.org.

          • Hacks.Mozilla.Org: Contributing to MDN: Meet the Contributors [Ed: Mozilla outsourced again to Microsoft and its proprietary software; Mozilla became worthless; it’ll be history in a few years due to bad leadership]

            If you’ve ever built anything with web technologies, you’re probably familiar with MDN Web Docs. With about 13,000 pages documenting how to use programming languages such as HTML, CSS and JavaScript, the site has about 8,000 people using it at any given moment.

            MDN relies on contributors to help maintain its ever-expanding and up to date documentation. Supported by companies such as Open Web Docs, Google, w3c, Microsoft, Samsung and Igalia (to name a few), contributions also come from community members. These contributions take many different forms, from fixing issues to contributing code to helping newcomers and localizing content.

            We reached out to 4 long-time community contributors to talk about how and why they started contributing, why they kept going, and ask what advice they have for new contributors.


            Since the end of 2020, the translation of MDN articles happen on the new GitHub based platform.


            Our seasoned contributors suggest starting with reporting issues and trying to fix them, follow the issue trackers and getting familiarized with GitHub.

      • SaaS/Back End/Databases

        • Redis vs. MongoDB: What you need to know

          Databases are garnering a lot of popularity every day and are used by many organizations for a wide variety of use cases. Many organizations are employing innovative techniques to handle their Data storage. These companies often shift between Databases to optimize their storage and data mapping according to their business needs.

        • PostgreSQL: pgDay Paris 2022 — Schedule published

          The next edition of the popular PostgreSQL conference pgDay Paris, a PostgreSQL.Org Recognized Community Conference, will be held on March 24, 2022 in the French capital. All of the talks will be in English.

          Registration is open, and the EARLYBIRD discount is going fast so make sure you grab that while you can!

      • Content Management Systems (CMS)

        • WordPress 5.9 RC3

          The third Release Candidate (RC3) for WordPress 5.9 is here!

          Thank you to everyone who has contributed thus far toward testing and filing bugs to help make WordPress 5.9 a great release. WordPress 5.9 is slated to land in just one week—on January 25, 2022. You still have time to help! Since RC2 arrived last week, testers have found and fixed two bugs, 14 fixes from Gutenberg. There has been one additional Gutenberg fix today.

      • FSF

        • FSF expands process for associate members to nominate new members of the board

          The board of the Free Software Foundation (FSF) announced today that associate members of the FSF will be able to nominate and evaluate candidates for the nonprofit’s board of directors for the first time in the organization’s 37-year history. FSF currently has just over 5,000 associate members.

          Under new procedures adopted by the FSF board on January 17 and summarized here, the organization will proactively engage associate members with a sufficient history of association with the FSF in the recruiting process by inviting them to suggest board nominees and then research collectively those nominees’ suitability for a position on the board, including most importantly their record of commitment to free software ideals.

          The new community engagement process is a key result of a six-month consultant-led review designed to help make FSF governance and recruitment practices more transparent and participatory, while more systematically ensuring their commitment to the FSF’s values and principles.

      • Programming/Development

        • C: sigprocmask Function Usage

          You may have heard about socket programming in C. One of the socket functions is the “sigprocmask” function. This function has been usually utilized in the code to inspect or alter the signal mask of the calling function. The signal mask is a term used for a group of signals that are presently blocked and cannot be conveyed for the calling function. Such kind of signal is known as “Blocked Signals.” You can say that a process can still receive the blocked signals, but it will not be used until they are unblocked and released, i.e., raised. Until then, it will be pending. Therefore, within today’s guide, we will be discussing the use of the sigprocmask function in C programming. Let’s have a start.

          After the Ubuntu 20.04 successful login, you need to launch the shell of the Ubuntu 20.04 system first after the login. So, try out the “Ctrl+Alt+T” shortcut simply on the desktop screen. It will launch the terminal shell for you in some seconds. Make sure to update your system using the apt package of your system. After that, you have to execute the “touch” instruction along with the file name you want to generate, i.e., to create the C file via the shell. This newly created file can be found in the “home” folder of your system’s file explorer. You can try opening it with the “text” editor to create code in it. Another way to open it in the shell is using the “GNU Nano” editor using the “nano” keyword with a file name as demonstrated beneath.

        • C: sigaction function usage

          A sigaction() is a function that allows to call/observe or examine a specific action associated with a particular signal. It is thought to consider a signal and sigaction function on the same page. But in reality, it has not occurred. The signal() function does not block other signals when the current handler’s execution is under process. At the same time, the sigaction function can block other signals until the current handler has returned.

        • delegation of authority from the systems programming perspective – Ariadne’s Space

          As I have been griping on Twitter lately, about how I dislike the design of modern UNIX operating systems, an interesting conversation about object capabilities came up with the author of musl-libc. This conversation caused me to realize that systems programmers don’t really have a understanding of object capabilities, and how they can be used to achieve environments that are aligned with the principle of least authority.

          In general, I think this is largely because we’ve failed to effectively disseminate the research output in this area to the software engineering community at large — for various reasons, people complete their distributed systems degrees and go to work in decentralized finance, as unfortunately, Coinbase pays better. An unfortunate reality is that the security properties guaranteed by Web3 platforms are built around object capabilities, by necessity – the output of a transaction, which then gets consumed for another transaction, is a form of object capability. And while Web3 is largely a planet-incinerating Ponzi scheme run by grifters, object capabilities are a useful concept for building practical security into real-world systems.

          Most literature on this topic try to describe these concepts in the framing of, say, driving a car: by default, nobody has permission to drive a given car, so it is compliant with the principle of least authority, meanwhile the car’s key can interface with the ignition, and allow the car to be driven. In this example, the car’s key is an object capability: it is an opaque object, that can be used to acquire the right to drive the car. Afterwards, they usually go on to describe the various aspects of their system without actually discussing why anybody would want this.

        • Python

        • Shell/Bash/Zsh/Ksh

          • A dog-cat-horse-turtle problem

            Sometimes the text-processing problems posted on Stack Exchange have so many solutions, it’s hard to decide which is best.

            A problem like that was posted in the “Unix & Linux” section in December 2021…

  • Leftovers

    • Threeboard: Short On Keys, Long On Documentation | Hackaday

      As peripherals go, few are hacked on more than keyboards. The layouts, the shapes, the sizes, materials, and even the question of what a keyboard is are all on the table for tinkering. In that vein, [TaylorConor] released his simplified keyboard called the threeboard on GitHub, having only three keys and replicating a full keyboard.

      We’ve covered keyboards built with chording in mind, wrapped around coffee cups, and keyboards with joysticks for added speed. So why cover this one? What makes it different? The execution is superb and is a great example to look at next time you’re making a project you want to show off. The keyboard is just three mechanical switches, two 8-bit binary displays (16 LEDs total), three status LEDs, and three LEDs showing the current layer (four layers). The detailed user’s manual explains it all. There is a reliable Atmega32U4 microcontroller and two EEPROM chips at its heart.

    • Hardware

      • Woodworking, Blinkenlites, And FFT’s Dance To The Music | Hackaday

        We all have that one project on our minds that we’d love to build if we could just find the right combination of time, energy, and knowledge to dive right in. For [Jonathan], that project was a sound sculpture that’s finally made it from concept to complete. [Jonathan] describes the sound sculpture as the culmination of a decade of learning, and in a moment you’ll understand why.

        The sculpture itself is a beautiful display of woodwork mixed with what appear to be individually addressable LED’s. The varying length of the individual enclosures evokes the idea that the sculpture is somehow involved in the sound production, which is a nice touch.

      • Add 10 GbE to your system with an M.2 2280 module

        It’s now possible to add 10GbE through an M.2 socket thanks to Innodisk EGPL-T101 M.2 2280 module based on Marvell AQtion Ethernet controller offering support for 10Gbps, 5Gbps, 2.5Gbps, 1000M, and 100M/10M LAN speeds.

        The solution is comprised of three parts with the M.2 module equipped with a heatsink to cool the Ethernet controller, a flexible high-speed coaxial cable, and a daughter board with an RJ45 connector and two threads for mounting to a chassis.

      • Keebin’ With Kristina: The One With The Tri-lingual Typewriter | Hackaday

        Isn’t it just fantastic when a project finally does what you wanted it to do in the first place? [Simon Merrett] isn’t willing to compromise when it comes to the Aerodox. His original vision for the keyboard was a wireless, ergonomic split that could easily switch between a couple of PCs. Whereas some people are more into making layout after layout, [Simon] keeps pushing forward with this same design, which is sort of a mashup between the ErgoDox and the Redox, which is itself a wireless version of the ErgoDox.

      • KiCAD 6.0: What Made It And What Didn’t | Hackaday

        I’ve been following the development of KiCAD for a number of years now, and using it as my main electronics CAD package daily for a the last six years or thereabouts, so the release of KiCAD 6.0 is quite exciting to an electronics nerd like me. The release date had been pushed out a bit, as this is such a huge update, and has taken a little longer than anticipated. But, it was finally tagged and pushed out to distribution on Christmas day, with some much deserved fanfare in the usual places.

        So now is a good time to look at which features are new in KiCAD 6.0 — actually 6.0.1 is the current release at time of writing due to some bugfixes — and which features originally planned for 6.0 are now being postponed to the 7.0 roadmap and beyond.

      • Electronic Lead Screws – Not Just For Threading Anymore | Hackaday

        An electronic leadscrew is an increasingly popular project for small and mid-sized lathes. They do away with the need to swap gears in and out to achieve the proper ratio between spindle speed and tool carriage translation, and that makes threading a snap. But well-designed electronic leadscrews, like this one from [Hobby Machinist], offer so much more than just easy threading.

        The first thing that struck us about this build was the polished, professional look of it. The enclosure for the Nucleo-64 dev board sports a nice TFT display and an IP65-rated keyboard, as well as a beefy-looking jog wheel. The spindle speed is monitored by a 600 pulses-per-revolution optical encoder, and the lathe’s leadscrew is powered by a closed-loop NEMA 24 stepper. This combination allows for the basic threading operations, but the addition of a powered cross slide opens up a ton more functionality. Internal and external tapers are a few keypresses away, as are boring and turning and radius operations, both on the right and on the left. The video below shows radius-cutting operations combined to turn a sphere.

      • Ultra Cheap PCB Wrenches Make Perfect Kit Accessory | Hackaday

        Let’s make one thing abundantly clear. We do not, under any circumstances, recommend you replace your existing collection of wrenches with ones made out of PCBs. However, as creator [Ben Nyx] explains, they do make for an extremely cheap and lightweight temporary tool that would be perfect for distributing with DIY kits.

    • Integrity/Availability

      • Proprietary

        • Overcoming A Common Admin Black Hole: Linux Management [Ed: Shilling Microsoft's proprietary junk (AD) and then alleging Linux has a "black hole"]

          I’ll admit that we never “got there” from a governance standpoint with those Linux devices; a silo was predestined because we were built around Active Directory domain controllers that shunned Linux devices.

        • Security

          • White House Meeting Explores Ways to Secure Software Supply Chain

            The path forward will require collaboration from companies and organizations that consume and ship open source software, said Joe Brockmeier, Vice President Marketing & Publicity at Apache Software Foundation. “There’s no single “silver bullet” to get there, and it will take all of our organizations working together to improve the open source supply chain.”

          • CISA Adds 13 Known Exploited Vulnerabilities to Catalog | CISA

            CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

          • CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

            In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats.

          • Linux Lock Screen Policy Enables Consistent Device Governance

            Every operating system should have security controls deployed, and Linux is no exception. Having a lock screen policy is even more of a consideration with a remote workforce where team members could be using a local coffee shop or other unsecured locations as an “office,” which increases the odds that bad actors could obtain physical access to devices. JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet, providing consistent governance and a scalable method for a secure OS configuration.

          • Oracle Releases January 2022 Critical Patch Update

            Oracle has released its Critical Patch Update for January 2022 to address 497 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

    • Environment

    • Digital Restrictions (DRM)

      • SGX Deprecation Prevents PC Playback of 4K Blu-ray Discs

        This week Techspot reported that DRM-laden Ultra HD Blu-ray Discs won’t play anymore on computers using the latest Intel Core processors. You may have skimmed right past it, but the table on page 51 of the latest 12th Generation Intel Core Processor data sheet (184 page PDF) informs us that the Intel Software Guard Extensions (SGX) have been deprecated. These extensions are required for DRM processing on these discs, hence the problem. The SGX extensions were introduced with the sixth generation of Intel Core Skylake processors in 2015, the same year as Ultra HD Blu-ray, aka 4K Blu-ray. But there have been numerous vulnerabilities discovered in the intervening years. Not only Intel, but AMD has had similar issues as we wrote about in October.


Links 18/1/2022: Deepin 20.4 and Qubes OS 4.1.0 RC4

Posted in News Roundup at 2:21 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Kernel Space

      • LVFS Activity Going Wild Ahead Of New Security Disclosure Requiring Firmware Update – Phoronix

        The Linux Vendor Firmware Service (LVFS) that integrates with Fwupd for delivering firmware updates primarily to Linux users is surging with around three times the normal traffic volume. Unfortunately, this boost in traffic appears to be due to vendor(s) releasing new system firmware updates ahead of disclosing a presumptive security issue.

      • Folio Improvements For Linux 5.17, Large Folio Patches Posted – Phoronix

        Back in November memory folios were merged into Linux 5.16 as a fundamental change to the memory management code. Now for Linux 5.17 there are improvements for folios merged and then out likely for Linux 5.18 is introducing the notion of large folios.

        Linux’s memory folios is designed to let file-systems and the page cache manage memory in chunks larger than the default page size. With Linux 5.16 the core memory management and page cache changes landed for supporting folios. Most benchmarks of folios put the performance benefit in the 0~10% region.

      • Some Older AMD Systems Can Boot Faster On Linux 5.17+ – Phoronix

        A change merged overnight with the libata subsystem updates for Linux 5.17 means that some older AMD hardware will be able to boot quicker by avoiding an otherwise mandated sleep period.

        Merged this morning were the ATA subsystem updates for Linux 5.17. Usually the ATA changes don’t amount to many noteworthy changes but “Add support for AMD A85 FCH (Hudson D4) AHCI adapters” got my attention… Yeah, the chipset from the early AMD “Fusion” APU days.

      • Graphics Stack

        • AMD Radeon Open-Source OpenGL Driver Expands Its Sparse Texture Capabilities – Phoronix

          At the end of last year AMD introduced OpenGL sparse texture support into its RadeonSI Gallium3D driver. This functionality for Vega GPUs and newer flipped on ARB_sparse_texture support while now with the very latest Mesa 22.0-devel code ARB_sparse_texture2 is now flipped on too.

          ARB_sparse_texture2 updates OpenGL’s sparse texture support with further additions by NVIDIA. ARB_sparse_texture2 adds new built-in GLSL texture lookup functions, changes the behavior around reads from uncommitted texture memory, specifies standard virtual page sizes for internal formats used by sparse textures, and support for creating sparse multi-sample and multi-sample array textures.

        • NVIDIA CUDA 11.6 Brings Convenient “-arch=native”, Defaults To New “GSP” Driver Mode – Phoronix

          NVIDIA has released CUDA 11.6 as the latest version of their widely used but proprietary GPU compute stack. With CUDA 11.6 there are some good improvements and new features in store.

          CUDA 11.6 has numerous changes for advancing the NVIDIA compute stack including the convenient “-arch=native” compiler option (similar to “-march=native” with classic system code compilers), beginning to make use of the GPU System Processor driver code path by default on capable hardware, various performance optimizations, and other updates.

    • Applications

      • This Indicator Shows Laptop’s Battery Health in Ubuntu 20.04, 21.10 | UbuntuHandbook

        Want to check your laptop battery status in Ubuntu or other Linux? There’s a small indicator applet that can do the job in GNOME desktop.

        “Battery Status” is the free and open-source indicator applet developed by Lorenzo Carbonell, a software developer behind touchpad-indicator and my weather indicator.

        It displays an icon on GNOME top bar in system tray area, along with the battery remaining time. By clicking on the applet, it shows battery percentage based on both current and original maximum capacities.

    • Instructionals/Technical

      • Record your terminal with script and scriptreplay

        A fascinating thing about humans is that we each have a particular learning style. Some people prefer to read about how something’s done. Some people prefer to follow instructions from the start, while others prefer to get an overview before engaging. Other people like to listen to instructions from an instructor or a podcast. And yet another group wants instructions in the form of a video.

        The trouble with video is that it can be difficult to produce and compress, and it is a lot of work to change once it’s done. And besides that, viewers can’t copy and paste Linux commands out of a video into their terminal.


        The script and scriptreplay commands allow you to record a terminal session and then play it back later. There’s no video involved. Instead, plain text files called typescripts are used, so the files are small and users can copy commands during playback.

      • How To Install Neos CMS on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install Neos CMS on AlmaLinux 8. For those of you who didn’t know, Neos CMS is a free and open-source Content Management System (CMS). Neos offers a rich set of features such as inline editing, supports multiple websites on a single installation, built-in SEO tools, human-readable URLs, plugin manager, device preview, and supports multiple templates.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Neos Open Source Content Application Framework on an AlmaLinux 8. You can follow the same instructions for Fedora, RHEL, CentOS, and Rocky Linux distributions.

      • How to Install and use PHP Composer on AlmaLinux 8

        Composer is a dependency manager for PHP that allows you to download and install all the required PHP packages needed for your project. It is a command-line tool that installs all libraries and dependencies for your project from the packagist.org repository. It is used in modern PHP frameworks such as Laravel, Symfony, Drupal, and Magento 2.
        In this post, we will show you how to install and use Composer on Alma Linux 8.

      • LINUX Basics: How to Move Files in Linux Using mv Command

        One of the most basic operations you’ll need to conduct on a Linux system is moving files and folders. You can move or transfer files using the given GUI in any system, but you might be curious if the terminal has a command that allows you to swiftly move files to different directories.

        The mv command is what you’re looking for, and it’s simple to use because of its short and straightforward syntax. In this tutorial, you’ll learn how to move files with the mv command.

      • Getting Started with GNU PSPP with Practical Examples

        This tutorial is a basic guide for GNU PSPP. Divided into three exercises, we hope this will be sufficient for beginners to understand the basics. Now let’s start PSPP!

      • How to install FirewallD GUI on Rocky Linux 8 | Almalinux 8 – Linux Shout

        Here in this article, we learned the simple steps and commands to install a graphical user interface (GUI) to manage FirewallD on either Alamlinux or Rocky Linux 8. However, the steps are the same for CentOS, Redhat, Oracle Linux, and other RPM-based distros.

        FirewallD is a command-line tool to provide a system firewall feature to protect Linux unwanted access by disabling and enabling ports and services access to outside or local networks. However, if you are using a Graphical interface user then the command line may seem a little bit difficult to use. Therefore, to make things easy we can use GUI tools available to manage FirewallD such as one from firewall-config or Plasma firewall

      • How to migrate from CentOS 8 to Rocky Linux.

        Rocky Linux is a Linux distribution that is intended to be a downstream, complete binary-compatible release using the Red Hat Enterprise Linux operating system source code. The project’s aim is to provide a community-supported, production-grade enterprise operating system.

      • How to migrate from CentOS 8 to CentOS Stream Server:

        Before 2021, CentOS was regarded as an enterprise-stable, production-ready operating system that had been cloned from Red Hat Enterprise Linux. It had a few tweaks to set it apart from RHEL, but essentially, it was RHEL without the cost of a subscription.

        That was the “old” CentOS. The “new” CentOS, aptly called CentOS Stream, will take a similar approach to Fedora, which acts as an upstream source for RHEL. This means that new features will be introduced into CentOS Stream, where the bugs are worked out, and ultimately the new updates trickle down to RHEL.

      • How to install build-essential on openSUSE – PragmaticLinux

        Coming from Debian or Ubuntu and interested in building C or C++ software programs on openSUSE? You’ll probably frantically search for a way to install package build-essential on openSUSE. Only to realize that this package does not exist on openSUSE. No worries though, because openSUSE offers an alternative and equivalent approach to installing package build-essential. This tutorial shows you how.

      • How to Install MySQL Workbench in Ubuntu 20.04

        There are two approaches to achieving your MySQL database administration goals. One is through a command-line client and the other one is via a graphical user interface. Both of these two approaches are evident with MySQL.

        Most users rely on phpMyAdmin to administer and manage their MySQL databases. However, the GUI spectrum of phpMyAdmin does not match the graphical tools MySQL Workbench has to offer.

        The MySQL Workbench database management tool is unmatched in its execution of database visual designs. Also, MySQL workbench has a dynamic user platform from database administrators, database architects, to database developers.

      • How to create an IAM Role in AWS using Terraform

        In this article we will see how to create an IAM Role. Before proceeding, I assume that you are familiar with the basics of Terraform and AWS IAM Roles. If you want to learn more about IAM Roles then click here. In this article we will create a role and assign it administrator’s permissions.

      • How to Create Sudo User on Ubuntu / Debian Linux

        Hello Techies, as we know that root is the admin user in Linux who has all rights on all commands and files. It is not recommended to use root user to perform administrative tasks but assign administrative privileges to a local user via sudo. An ordinary user who has admin rights is known as ‘sudo user’.

        In this post, we will learn how to create a new sudo user on Ubuntu and Debian Linux. Let’s assume we want to create user with name ‘sysops’ name.

      • Install Rclone In Linux And Unix – OSTechNix

        In this post, we will learn how to create a new sudo user on Ubuntu and Debian Linux. A sudo user is an ordinary user which can perform administrative tasks.

    • Games

      • Counter-Strike: Global Offensive updated, more tweaking for Steam Deck + Vulkan | GamingOnLinux

        Valve continues to tweak more of their games ahead of the Steam Deck release in February and their focus now appears to be on CS:GO with a fresh update out.

        A few more Steam Input improvements came for controllers, with their newer “FlickStick” mode enabled in the game options instead of the Steam Input Configurator and there’s also refinements to the behaviour. For those not aware, FlickStick created by Jibb Smart is in essence a quick way to turn to face any direction in a game, allowing you to be more accurate and speedy with gamepad sticks. Valve added support for it to Steam Input directly in 2021, now it has better native support in CS:GO.

      • Penguin Heist game hits 25,000 sales with 5% on Linux | GamingOnLinux

        The Greatest Penguin Heist of All Time developers That Fish / That Other Fish have announced their Early Access game seems to be doing reasonably well. Released back in July 2021, it’s recently hit over 25,000 sales.

        “The Greatest Penguin Heist of All Time is the one and only 4 player CO-OP physics-based heist game featuring a bunch of kleptomanic penguins. You’ll experience a blend of physics-based platforming with stealth, strategy, and action. You have full freedom to achieve the missions in your own way.”

      • Mad Experiments 2: Escape Room releases on March 8 | GamingOnLinux

        March 8 will bring more puzzle / escape room antics with Mad Experiments 2: Escape Room from PlayTogether Studio.

        “Trapped in Professor Cheshire’s mysterious mansion, players will have to explore and cooperate to get out of the rooms in the allotted time. Each room has its own secrets, puzzles… and story bits on Hildegarde and Professor Cheshire Learn more about Hildegarde’s journey at the Cheshire Institute. From the library to the secret room to the dormitory, meet new characters, secrets, challenges, and strange events. Will Hildegarde find a way to escape? And will you?”

      • We’ll always have Paris is a narrative adventure about loving someone with dementia | GamingOnLinux

        Cowleyfornia Studios, developer of Sarawak have recently announced their next story-based adventure game with We’ll always have Paris. This will be an emotional one about loving someone with dementia. Much like the previous game, it will support Linux as the engine was developed on Linux.

        “This is the story of Simon Smith, a retired chef who lives with Claire, his wife of fifty years. Claire is slowly losing her memory, and Simon must balance his love for her with his desire to maintain normality and autonomy over the confusion that is infiltrating both their lives.”

      • Raspberry Pi Changes Games By Scanning Barcodes | Tom’s Hardware

        Creating a custom interface is one of the most exciting aspects of creating a retro gaming system with the Raspberry Pi. Tons of themes and original UIs have emerged over the years, but Neil, from YouTube channel RMC – The Cave, has taken things to the next level by creating a retro game shop replica as part of his retro games museum that functions as a front end for his emulation platform.

        Instead of selecting a game from a menu on the screen, users choose a game from the physical store shelves and scan it using a barcode scanner. Once a game is selected, it will automatically load for the user to play. The glue that makes all of this work, is a Raspberry Pi 3B and a little Linux magic.

      • Ys IX: Monstrum Nox gets improvements ready for the Steam Deck | GamingOnLinux

        Ys IX: Monstrum Nox from developers Nihon Falcom, PH3 GmbH, Engine Software and publisher NIS America, Inc. has released an update to get the game ready for the Steam Deck. There’s no native port here though, it continues to rely on the Steam Play Proton compatibility layer.

        Released on Steam back in July 2021, the latest update version 1.1.2 brings with it local co-op and some improvements to the aspect ratio support.

      • Valve continues tweaking their new Store Hubs for tags | GamingOnLinux

        With Valve’s latest store updates experiment that’s ongoing, they gave a new look to Store Hubs for all the various tags and they just release an update with plenty of tweaks.

        Steam Labs Experiment 13 that was announced back in December gave the same refresh that other parts of Steam had seen, to upgrade the browsing experience with more information and to better make use of all the data they have. More personalization, items from your wishlist and more.

      • Humble Bundle Drops Linux and macOS, Gives Customers Mere Weeks to Save Their Games
      • Mac and Linux Support for Humble Choice Subscription Service Ending Soon | Windows-Only Launcher
      • Humble Bundle Will Be Moving To A Subscription Service
      • New Steam Games with Native Linux Clients – 2022-01-18 Edition – Boiling Steam

        Between 2022-01-11 and 2022-01-18 there were 22 new games released on Steam with Linux clients. For reference, during the same time, there were 235 games released for Windows on Steam, so the Linux versions represent about 9.4 % of total released titles.

      • Acid-Damaged Game Boy Restored | Hackaday

        The original Game Boy was the greatest selling handheld video game system of all time, only to be surpassed by one of its successors. It still retains the #2 position by a wide margin, but even so, they’re getting along in years now and finding one in perfect working condition might be harder than you think. What’s more likely is you find one that’s missing components, has a malfunctioning screen, or has had its electronics corroded by the battery acid from a decades-old set of AAs.

        That latter situation is where [Taylor] found himself and decided on performing a full restoration on this classic. To get started, he removed all of the components from the damaged area so he could see the paths of the traces. After doing some cleaning of the damage and removing the solder mask, he used 30 gauge wire to bridge the damaged parts of the PCB before repopulating all of the parts back to their rightful locations. A few needed to be replaced, but in the end the Game Boy was restored to its former 90s glory.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • GNOME 42 Alpha is Out – And Includes a Lot of GTK4 Apps

          Now, this isn’t a fully detailed, commit-by-commit or blow-by-blow rundown of everything that’s been updated, upgraded, or even just tickled lightly under its hin. Nor is this a fancy showcase of the best new features in GNOME 42 — it’s way too early for that.

          What this post is, is a quick overview of the most visible user-facing changes.

    • Distributions

      • New Releases

        • Deepin 20.4 Becomes Even More Beautiful with the New UI Improvements

          There are a bunch of changes and visual improvements that make Deepin 20.4 a wonderful Linux distribution. Here’s what’s new!

          Deepin is a Chinese-made Linux distribution that caters to the average desktop user. It is a popular choice among users who want a beautiful Linux while being stable. The distro is so polished and has so many in-house developed apps that one forgets this is a Debian-based Linux distribution.

          The Deepin Desktop Environment, or DDE for short, is one of the best-looking Linux desktop environments out there. In fact, Deepin is now a fashion in computing ready to compete with Windows 11 and macOS. DDE is just gorgeous and without exaggeration, we can say that it is a work of art.

          Now with version 20.4 out it is time to have a fresh look and see how it matured.

        • Deepin 20.4 Released with Updated Kernels, Installer Improvements, and More

          Deepin 20.4 is here almost two months after Deepin 20.3 and brings updated kernels and various other improvements, as well as bug and security fixes.

          The distribution now ships with both Linux 5.10.83 LTS and Linux 5.15.6 LTS kernels, but the former is used by default for new installations, though you can easily select the latter from the advanced options of the boot menu.

        • Deepin 20.4 Released [Ed: Ripoff artist]

          Deepin 20.4 is now available for download. Deepin 20.4 is here with tons of new improvements and features like updated kernels. Deepin 20.4 is the fourth maintenance update to the latest Deepin 20 series.

        • 深度操作系统20.4发布 – 深度科技社区



        • Qubes OS 4.1.0-rc4 has been released! | Qubes OS

          The fourth release candidate for Qubes 4.1.0 is here! There are no major changes to report. We’ve just focused on fixing bugs that were discovered and reported in the third release candidate.

          If you’re currently using any Qubes 4.1.0 release candidate, a regular update is sufficient to upgrade to the latest one. Otherwise, read on for more about how to get started with testing Qubes 4.1.0-rc4.

        • Parted Magic 2022_01_18 News

          This version of Parted Magic updates to Linux 5.16.1 and fixes a few minor problems with the Secure Erase and NVME Secure Erase programs.

          Manufacturers are starting to get a bit carried away with the length of names given to drives. The names are now limited to 15 characters, so the Secure Erase GUI should now fit well on everybody’s screen. If there is still any doubt to what drive is what, do a mouse over and the entire name will be shown in the tool tip.

      • SUSE/OpenSUSE

        • Announcing the D-Installer Project | YaST

          As you may know, YaST is not only a control center for (open)SUSE Linux distributions, but it is also the installer. And, in that regard, we think it is a competent installer. However, time goes by, and YaST shows its age in a few aspects.

          During summer 2021, the team discussed how YaST should look in the near future.

        • Call for Papers Opens for openSUSE Conference 2022 – openSUSE News

          The call for papers for openSUSE Conference 2022 is open!

          The call for papers is open until April 14. This leaves a less than 90 days to submit a proposal. The dates of the conference are scheduled for June 2 – 4. The organizing team is preparing for a hybrid conference involving both virtual talks and live talks from the Z-Bau in Nuremberg, Germany. Registration for the conference has also begun.

        • SUSE releases NeuVector, the industry’s first open source container security platform | SUSE Communities

          Since the close of the NeuVector acquisition three months ago, SUSE worked through the technical and legal considerations involved in open sourcing our eponymous cloud-native container security platform. NeuVector is an industry-leading security and compliance solution adopted by leading companies around the world. Open sourcing the NeuVector codebase not only makes NeuVector the technology of choice for the open source community, it also provides an even greater level of assurance to customers in highly regulated industries including government and federal customers, which is critical for proving a product they can trust and rely on.

        • Open source powers Indonesia’s ongoing fight against COVID-19

          The eventual solution, which comprised a 7-region national scale cloud, is primarily being used for disaster detection and prevention and has all workloads orchestrated via Kubernetes, using SUSE Rancher.
          The solution was deployed seamlessly, on-time, and under budget as a result of open source components working together. Most importantly, the end result is the solid infrastructure backbone enabling the Indonesian Government to tackle the crisis effectively.

      • Slackware Family

        • Absolute64-20220117 released

          Based on Slackware64-current.

          After the 3rd release candidate by Slackware, Absoute has ditched spacefm/udevil — switching to qtfm/udisks2 (still no gvfs). Spacefm seems to have been abandoned and I was beginning to have issues with devil.

      • IBM/Red Hat/Fedora

        • Red Hat Insights Resource Optimization is released

          Last summer we released the public beta of the Resource Optimization service. During public beta, we received a lot of feedback from customers, which we used to enhance Resource Optimization in several areas. We are now announcing that this service is generally available for our Red Hat Enterprise Linux (RHEL) customers.

        • Automating DNS based GSLB with Infoblox DTC and Red Hat Ansible Automation Platform

          Companies are pushing data closer and closer to the edge to meet the demands of users who are increasingly sensitive to delays in application responsiveness. These changes to the way data is delivered and consumed presents challenges to IT organizations. In this post we’ll talk about how an organization can provide optimum uptime while also delivering data as quickly as possible.

          An Application Delivery Controller (ADC) is one solution, but it often relies on expensive software and hardware to direct network traffic to available resources across datacenters. In addition to the traditional DNS infrastructure, an ADC solution often employs Global Server Load Balancing (GSLB) to dynamically reply to a Domain Name System (DNS) query with the IP address of the closest, or healthiest, server.

          Beyond the monetary cost of maintaining two separate DNS solutions, an ADC introduces another layer of complexity to a network.

        • Perform unit tests using GoogleTest and CTest [Ed: Several times in recent days Stephan Avenwedde promotes Microsoft vendor lock-in for developers]
        • Artificial Intelligence (AI): 7 trends to watch for in 2022

          Of the many technologies with the potential to deliver significant value in the near future, Artificial Intelligence (AI) seems firmly planted atop the list for CIOs. Indeed, nearly all (95 percent) of the CIOs, CTOs, and technology leaders surveyed by IEEE agreed that AI will drive the majority of innovation across almost every industry sector in the next one to five years.

          “In 2022, expect AI engagements to become larger, more strategically significant, and more mission-critical – with a focus on long-term scalability.”

        • Future of work: A case for the 3-day weekend

          Since around 2010, the “future of work” has been a leading topic for business leaders, entrepreneurs, and employees. A key question has been how emerging technologies such as AI, robotics, and smart machines will affect humans in the workforce.

          Then COVID-19 struck.

          Seemingly overnight, orderly debates about the future of work morphed into chaotic discussions about the “present of work:” Specifically, could employees work securely using mature technologies like video conferencing, mobile telephony, and cloud computing services?

          Forced to shut down their physical offices, corporations resorted to work models predicated on what futurist Carmen Alfonso Rica called a “massive, forced adoption of remote working.”

        • Fedora Community Blog: Mindshare Committee Quarterly Report – Q4 2021

          The Mindshare Committee is establishing a Quarterly Report, with this post being our first edition. It covers activities from the Mindshare Committee and related teams for the months of October, November, and December of 2021. As we kick off these reports, we welcome feedback on how we can improve in the related Mindshare ticket.

      • Canonical/Ubuntu Family

        • Linux Mint’s Brand New Edge ISO is Available to Download!

          Linux Mint 20.3 release brings in several improvements. However, it is powered by Linux Kernel 5.4 LTS.

          So, users with newer hardware may find it troublesome to boot or run into other incompatibility issues with an older Linux Kernel.

          Fortunately, Linux Mint 20.3 now has an Edge ISO featuring Linux Kernel 5.13.0-25.

    • Devices/Embedded

      • The PinePhone Pro could be the first Linux-based smartphone worth a look

        Pine64 is now accepting preorders for the PinePhone Pro, billed as the “fastest mainline Linux smartphone on the market”.

        Successor to the original PinePhone from 2019, the PinePhone Pro is designed to fill a gap in the market for a Linux-based smartphone with sufficient raw power to compete with iOS and Android alternatives.

        The device is also set apart by its swappable backplate, under which is found a removable battery, SD card slot and privacy switches that let the user cut access to the cameras, microphone, Wi-Fi and more.

      • Jetson powered system offers a choice between PoE and MIPI SerDes cam links

        Nexcom’s IP67 protected “ATC 3530” in-vehicle and V2X computer runs Nexcom Aided Linux (NAL) on an up to 21-TOPS Jetson Xavier NX and offers a choice of 4x GbE with PoE or 4x MIPI-CSI-2 SerDes camera connections with V-By-One support.

        Nexcom announced a compact, rugged, AI-enabled edge AI system designed primarily for in-vehicle and vehicle-related applications including vehicle-to-everything (V2X). The ATC 3530 also supports M-to-M, X2X, ANPR (automatic number-plate recognition), car recognition, AIoT gateways and nodes, industrial systems, and “cloud-edge AI over mesh wireless” applications. The ATC 3530, which updates an earlier, Jetson TX2 based ATC 3200 system for ADAS, supplies an in-house, Ubuntu 18.04 based Nexcom Aided Linux (NAL) stack with Nvidia Jetpack 4.5 integrations that runs on Nvidia’s Jetson Xavier NX module.

      • Raspberry Pi RP2040 is now available in quantities for 70 cents and up

        Raspberry Pi RP2040 microcontroller has been available for one dollar in single quantities for about half a year, with at the time, 500- and 3400-pieces reel pricing to be determined.

        But Raspberry Pi Trading has now started to sell the chip in bulk with reels of 3,400 and 500 pieces directly to businesses for a unit price of respectively 70 and 80 cents via the new Raspberry Pi Direct website. Distributors have been selling reels for a while, but closer to 85 cents to 95 cents per unit.

      • Open Hardware/Modding

        • AutoStrap is a self-tightening strap that’s like something out of Back to the Future | Arduino Blog

          For wearable devices, attaching them to an arm or leg can be an annoying process since the straps used often have complicated tightening/locking mechanisms. This is what inspired one Instructables user who goes by The Puma to create the AutoStrap, a self-tightening strap system for wearable electronics similar to Marty McFly’s power-lacing shoes in Back to the Future.

        • Arduino Week 2022: Call for speakers | Arduino Blog

          This year, Arduino Day is becoming Arduino Week. Taking place on 21-26 March, 2022, we’ll have more talks, events and presentations than ever before.

          Naturally you can expect the usual excitement from the annual Arduino festival. From makers to education and industry, we’ll be bringing you the biggest and the best Arduino has to offer. But there’s also a strong focus on community for the first week-long event. And that means we want to hear from you.

        • Plot designs onto cups with CylinDraw | Arduino Blog

          Most plotters are planar, meaning they move in a single plane — though they often have the ability to move the tool up and down in the third axis. But if you convert one axis of the drawing plane into rotation, you get cylindrical plotting. That is how the rotary axis on a CNC machine works. If the tool moves in a third axis, you can even do conical plots. That’s exactly how CylinDraw makes it possible to plot directly onto cups and glasses.

          CylinDraw is an open source “cup-specific” plotter and engraver. It is a 2.5 axis machine with a rotary axis, similar to the famous EggBot egg plotter. Except instead of drawing onto the elliptical (in cross section) surface of an egg, CylinDraw plots onto the straight or sloped surface of cups, bottles, and similar objects. By equipping a Dremel or other rotary tool, you can also engrave onto a surface instead of drawing. If you do draw, the software also lets you swap pens to get a full color palette.

        • I2C To The Max With ATtiny | Hackaday

          The Arudino is a powerful platform for interfacing with the real world, but it isn’t without limits. One of those hard limits, even for the Arduino MEGA, is a finite number of pins that the microcontroller can use to interface with the real world. If you’re looking to extend the platform’s reach in one of your own projects, though, there are a couple of options available. This project from [Bill] shows us one of those options by using the ATtiny85 to offload some of an Arduino’s tasks using I2C.

      • Mobile Systems/Mobile Applications

    • Free, Libre, and Open Source Software

      • Padloc, The Open-source Password manager for teams and enterprise that works everywhere

        Padloc is a dead-simple password manager app for users who want to get the job done without any distractions and clutter.

        Padloc is a free, open-source solution but also offers a web service that helps the user to sync and store their passwords and keys in an encrypted web vault for a fee.

        Users also can download and install the app on their machine and sync up to 50 passwords, credit cards info, and login credentials, with up to 2 connected devices.

        However, the project itself is an open-source project that is licensed under GPL-3.0 License, which means you can install its component and run your server.

      • The Apache Software Foundation Announces Open Source data orchestration platform Apache® Hop™ as a Top-Level Project

        The Apache Software Foundation (ASF), the all-volunteer developers, stewards, and incubators of more than 350 Open Source projects and initiatives, announced today Apache® Hop™ as a Top-Level Project (TLP).

        Apache Hop —the Hop Orchestration Platform— is a flexible, metadata-infused data orchestration, engineering, and integration platform. The project originated more than two decades ago as the Extract-Transform-Load (ETL) platform Kettle (Pentaho Data Integration), was refactored over several years, and entered the Apache Incubator in September 2020.

        “We are pleased to successfully adopt ‘the Apache Way’ and graduate from the Apache Incubator,” said Bart Maertens, Vice President of Apache Hop. “Apache Hop enables people of all skill levels to build powerful and scalable data solutions without the need to write code. As an Apache Top-Level Project, Hop is developed and used by people across the globe. Hop’s full project life cycle support helps these data teams to successfully build, test and run their projects in ways that would otherwise be hard or impossible to do.”

      • QtPass is a free, open-source multiplatform Password manager

        QtPass is an open-source, free password manager GUI for the standard Unix password manager “pass” application.

        The “pass” password manager is a command-line open-source feature-rich application that follows Unix’s philosophy.

      • Entrepreneurship for Engineers: Side Business or Full Time?

        Around this time of year people often wonder about their career trajectories and think about goals for the new year. If you’re the creator and/or maintainer of an open source project, you might also be wondering if now is the time to make your part-time open source project a full-time job or continue working on it in your spare time.

        Hearing from other entrepreneurs can be useful in making this kind of decision, but when asked how to determine if something is ripe to go from side hustle to business, the entrepreneurs I spoke with often responded with a version of, “I wish I knew.”

        That’s because whether or not an open source project might be monetizable is one question, whereas whether or not a particular person is going to be able to pull off that shift — and whether that is the best career move at the time, for that person — is another entirely.

      • Another use for the syslog-ng elasticsearch-http destination: Zinc

        There is a new drop-in replacement for Elasticsearch, at least if you don’t mind the limitations and the alpha status. However, it definitely lives up to the promise that it provides an Elasticsearch-compatible API for data ingestion. I tested it with the elasticsearch-http() destination of syslog-ng, and it worked perfectly after I modified the URL in the configuration example I found.
        So, what is Zinc? It is a search engine written in Go that provides an Elasticsearch-compatible API for data ingestion. You cannot use Kibana with it, only its own web interface. If you are not into graphs and dashboards, and want to search text messages, then it is perfect. The application itself is a single binary and it does not have any external dependencies. It is lightweight and easy to configure, as practically there are no configuration options at all.
        Note: Zinc is still in alpha state. There are no guarantees that later versions will be compatible at any level. Error messages can sometimes be cryptic and you might run into unexpected behavior.

      • Productivity Software/LibreOffice/Calligra

        • LibreOffice 7.3 RC2 is available for testing

          The LibreOffice Quality Assurance ( QA ) Team is happy to announce LibreOffice 7.3 RC2 is available for testing!

          LibreOffice 7.3 will be released as final at the beginning of February, 2022 ( Check the Release Plan for more information ) being LibreOffice 7.3 RC2 the forth and last pre-release since the development of version 7.3 started in mid June, 2021. Since the previous release, LibreOffice 7.3 RC1, 117 commits have been submitted to the code repository and 65 issues got fixed. Check the release notes to find the new features included in this version of LibreOffice.

        • OpenOffice users: Getting messages about documents being made in a newer version? – The Document Foundation Blog

          Many OpenOffice users are seeing warnings when trying to access files in the OpenDocument Format (eg .odt, .ods).

      • Programming/Development

        • Notes on packaging Krita with G’MIC

          Krita 3 and later are compatible with G’MIC, an open-source digital image processing framework. This support is provided by G’MIC-Qt, a Qt-based frontend for G’MIC. Since its inception, G’MIC-Qt was shipped as a standalone, externally built executable that is an optional, runtime dependency of Krita.

          Krita 5 changes the way G’MIC-Qt is consumed. In order to support CentOS and macOS, G’MIC-Qt has been converted into a dynamically loadable library that is a dependent of Krita.

          This file reviews these changes, and how to package Krita accordingly.

        • Qt WebAssembly clipboard

          Clipboard use on desktop platforms is ubiquitous. Most people use it without thinking. Copy, Paste, and Cut keyboard strokes are in-grained into muscle memory.
          On the web, it can present security issues as someone could read or write to your clipboard without you knowing.

          Up until now, Qt for WebAssembly’s clipboard was text-only and only within the app itself. Qt 6.3 will have better clipboard support between host and app but also adds copy/pasting of images.

        • Attempting to compile Shotcut video editor
        • The Numbers: Performance benefits of the new Qt Quick Compiler

          In my previous post, the history and general architecture of the new Qt Quick Compiler technology was explained. As promised there, the performance numbers are presented in this post.

        • Monetizing cross-platform use cases faster and easier with Qt Digital Advertising Platform

          Many of you have been raising the question: when will Qt provide a full framework to monetize my Qt-based cross-platform application, implementing an advertising campaign directly on my user interface?

          Now all the community and Qt users in general can start in no time implementing and managing advertising campaigns targeting cross-platform use cases. We are excited to announce that Qt Digital Advertising 1.0 has been released!

        • Ads may be coming to KDE, the popular Linux desktop [Ed: Misleading clickbait. KDE and #Qt are not the same thing]
        • Qt Launches Digital Advertising Platform To Integrate Ads Into App UIs

          The Qt Company this morning announced Qt Digital Advertising 1.0 as its new ad platform that allows for developers to easily integrate advertising campaigns into Qt-based, cross-platform applications.

          The Qt Company devised Qt Digital Advertising as a way for the community and Qt users to integrate and manage advertising campaigns within Qt-powered programs. This is a new plug-in for the Qt toolkit for managing and monetizing campaigns for any Qt-based application.

        • Parsing PNGs Differently | Hackaday

          There are millions of tiny bugs all around us, in everything from our desktop applications to the appliances in the kitchen. Hidden, arbitrary conditions that cause unintended outputs and behaviors. There are many ways to find these bugs, but one way we don’t hear about very often is finding a bug in your own code, only to realize someone else made the same mistake. For example, [David Buchanan] found a bug in his multi-threaded PNG decoder and realized that the Apple PNG decoder had the same bug.

          PNG (Portable Network Graphics) is an image format just like JPEG, WEBP, or TIFF designed to replace GIFs. After a header, the rest of the file is entirely chunks. Each chunk is prepended by a four-letter identifier, with a few chunks being critical chunks. The essential sections are IHDR (the header), IDAT (actual image data), PLTE (the palette information), and IEND (the last chunk in the file). Compression is via the DEFLATE method used in zlib, which is inherently serial. If you’re interested, there’s a convenient poster about the format from a great resource we covered a while back.

  • Leftovers

    • Video: BK and the early days of UNIX

      “The early days of Unix at Bell Labs” – Brian Kernighan (LCA 2022 Online) Enjoy!

    • Hardware

      • How curiosity helped me solve a hardware problem | Opensource.com

        I typically have a dozen computers up and running on my home network—yes, 12. And I am responsible for several more in other locations. With so many computers, there are always failures of various types, and I ultimately diagnose many of them as hardware problems. But it can be difficult to diagnose which hardware component is causing the issue.

        Just this week, I had a perplexing problem that I misdiagnosed the cause of on my primary workstation—twice. This article takes you through the process I followed. I show you where and why I went down the wrong path and how easy it can be to do so.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Tuesday [LWN.net]

            Security updates have been issued by Debian (slurm-llnl), openSUSE (apache2, ghostscript, and watchman), Red Hat (kernel and telnet), SUSE (apache2, ghostscript, and kernel), and Ubuntu (clamav).

          • Ubuntu introduces the Ubuntu Security Guide to ease DISA-STIG compliance

            Canonical, the company behind Ubuntu, the world’s most popular operating system across private and public clouds, now offers the Ubuntu Security Guide tooling for compliance with the DISA Security Technical Implementation Guide (STIG) in Ubuntu 20.04 LTS. The new automated tooling builds on Canonical’s track record of designing Ubuntu for high security and regulated workloads, powering U.S. government agencies, prime contractors, and service providers. The Ubuntu Security Guide enables agencies and organisations to comply with the most stringent security requirements by automation and at scale.

            “With the Ubuntu Security Guide, we extend the Ubuntu experience to ease compliance with DISA security requirements. It is now very easy for DevOps teams and administrators to follow these requirements,” says Nikos Mavrogiannopoulos, Product Manager for security.

          • CIS benchmark compliance: Introducing the Ubuntu Security Guide

            The CIS benchmark has hundreds of configuration recommendations, so hardening and auditing a Linux system manually can be very tedious. Every administrator of systems that need to comply with that benchmark would wish that this process is easily usable and automatable. Why is that? Manual configuration of such a large number of rules leads to mistakes – mistakes that cause not only functional problems, but may also cause security breaches. In fact, one of the top reasons for security breaches the last few years is due to misconfigurations, according to Verizon data breach investigations.

            Let us introduce the Ubuntu Security Guide (USG). The Ubuntu Security Guide is a new tool available on Ubuntu 20.04 LTS that makes automation easy and greatly improves the usability of hardening and auditing with CIS, while allowing for environment-specific customizations. In the rest of this blog, we go through the major use cases such as CIS compliance, audit, and customization.

          • Ubuntu Security Guide to simplify DISA-STIG compliance [Ed: Compliance with standards set by people who mandate and impose back doors universally]

            The new tool will help enterprises comply with the Defense Information System Agency’s (DISA’s) Security Technical Implementation Guide (STIG).

            A US Department of Defense security configuration standard, DISA-STIG contains guidelines for hardening systems’ security posture. The standard also doubles as a checklist for securing protocols, services, and servers to reduce attack surfaces.

            Currently available for Ubuntu 20.04 or later versions, the new Ubuntu Security Guide is an easy-to-use compliance and auditing tool.

          • Buttercup: a simple user-friendly Password manager for all platforms

            Buttercup is a lightweight password manager for desktop and mobile. It comes with a strong 256bit AES encrypted vault that keeps your passwords and credentials secure and safe.

            Buttercup is a completely free, open-source solution which means you can download and use it without worrying about lock-in or fees.

            The project is consistent with several open-source child projects that include desktop, mobile, and Buttercup Core repositories.

            Buttercup organizes all of your passwords, and key entries in collections or groups, which are organized under different accounts.

            The mobile app uses React Native, while the desktop app uses React and Electron.

          • UK Government to Launch PR Campaign Undermining End-to-End Encryption

            Rolling Stone is reporting that the UK government has hired the M&C Saatchi advertising agency to launch an anti-encryption advertising campaign. Presumably they’ll lean heavily on the “think of the children!” rhetoric we’re seeing in this current wave of the crypto wars. The technical eavesdropping mechanisms have shifted to client-side scanning, which won’t actually help — but since that’s not really the point, it’s not argued on its merits.

          • Revealed: UK Gov’t Plans Publicity Blitz to Undermine Chat Privacy – Rolling Stone

            The UK government is set to launch a multi-pronged publicity attack on end-to-end encryption, Rolling Stone has learned. One key objective: mobilizing public opinion against Facebook’s decision to encrypt its Messenger app.

            The Home Office has hired the M&C Saatchi advertising agency — a spin-off of Saatchi and Saatchi, which made the “Labour Isn’t Working” election posters, among the most famous in UK political history — to plan the campaign, using public funds.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • Why Linux Saw A Massive Rise In Malware Attacks Last Year [Ed: Microsoft-connected Crowdstrike spreading lots of anti-Linux FUD at the moment to sell its proprietary products and to help Microsoft]

              Crowdstrike actually expects…

            • Linux malware rises [Ed: Once again, Microsoft-connected firm smears "Linux" all over the media]

              The number of malware infections targeting Linux devices rose by 35 per cent in 2021, and it looks lie the writers want to recruit IoT devices for DDoS (distributed denial of service) attacks.

              According to a Crowdstrike report in 2021 XorDDoS, Mirai, and Mozi were the most prevalent families, accounting for 22 per cent of Linux-targeting malware attacks observed in 2021.

              Mozi saw an explosive growth in its activity, with ten times more samples circulating in the wild the year that passed compared to the previous one. XorDDoS use increased by123 per cent.

            • Linux Malware Sees 35% Growth During 2021 [Ed: Slashdot is giving a megaphone to Microsofters against Linux]

              The number of malware infections targeting Linux devices rose by 35% in 2021, most commonly to recruit IoT devices for DDoS (distributed denial of service) attacks

          • Privacy/Surveillance

            • The dangers of DigiYatra & facial recognition enabled paperless air travel #SaveOurPrivacy

              The Ministry of Civil Aviation’s DigiYatra scheme is scheduled to take flight this year. The scheme aims to make air travel paperless by using facial recognition to authenticate the identities of passengers. It presents privacy risks of profiling and data exploitation without any remedies or regulatory framework.

            • Ashling Murphy, Jill Meagher, can apps counter harassment of women?

              On 10 January, the British Government endorsed an app for women’s safety. The app allows women to broadcast their movements to somebody else. Similar apps already exist in Saudi Arabia, keeping husbands and fathers in control of womens’ lives.. Inside, the UK app could be the same binary code, sugar coated to look like a tool of empowerment.

              Two days later and a woman in Ireland, Ashling Murphy, was murdered in broad daylight. The Irish press was quick to compare this with the murder of Sarah Everard in London but the story that came to my mind was the 2012 murder of Jill Meagher. Jill emigrated from Ireland to Melbourne, much like my own mother. Jill was abducted in a main road and shopping district where I used to go almost every day.


              One of my female interns in the Outreachy program wrote about a sponsor, Google, stalking her. In response, all she received were threats and insults. Google set about discrediting my intern and I just as Facebook has tried to discredit Frances Haugen. The Google employees claim they are the victims of harassment and abuse: how can they equate themselves with the trauma experienced by women like Ashling, Jill and Brittany?

            • Dubmphones are smartphones, again

              Almost four years ago, I explained why and how “Dumbphone is the new Smartphone. Especially for traveling”. In that post, remembering how years ago what we called “smartphones” took a wrong turn, I summarized why and how you don’t want to cross a border with your main smartphone.

            • Facebook critics say its metaverse could quickly become a virtual hellscape | WIRED Middle East

              Only 6 percent of Arabic hate content is flagged as such when a user posts on Instagram, Politico reported in October. The Facebook algorithms used to identify terrorist content in Arabic wrongly take down posts 77 percent of the time, WIRED reported the same month. And Facebook employs just 766 Arabic-speaking moderators to check posts by 220 million Arabic-speaking users, French daily Le Monde revealed.

              Each piece of information, pulled from a dossier of internal documents provided by whistleblower Frances Haugen, seemed to be a damning new piece of evidence of how Facebook struggles to police content, not just in the Middle East but globally. So when Mark Zuckerberg announced that he was rechristening the company Meta, in tribute to growing ambitions to build tech for the metaverse, the online forum Reddit exploded with warnings. “Facebook has ruined our reality, now it’s coming for the metaverse too,” said one thread. “It’s another opportunity for Big Tech to colonize our lives in the name of profit,” said another. “We don’t have to stop it, we just don’t have to use it,” said one popular post on the thread, which received 4,500 upvotes.

            • The U.S.-Russia cyber relationship just got even more complicated

              Two Middle East women′s rights activists are the latest identified Pegasus victims, and the United Kingdom government is planning an ad blitz against end-to-end encryption.

    • Civil Rights/Policing

      • Cross-country Exposure: Analysis of the MY2022 Olympics app – The Citizen Lab

        The 2022 Winter Olympic Games in Beijing have generated significant controversy. As early as February 2021, over 180 human rights groups had called for governments to boycott the Olympics, arguing that holding the Games in Beijing will legitimize a regime currently engaging in genocide against Uyghur people in China. Some governments including Canada, the United Kingdom, and the United States have pledged to diplomatically boycott the Games, meaning that these countries will allow athletes to compete at the Games but will not send government delegates to attend the event.

        The International Olympic Committee (IOC), the organization responsible for organizing the Games, has been criticized for failing to uphold human rights. In December 2021, the United States House of Representatives voted unanimously to condemn the IOC and stated that the IOC had violated their own human rights commitments by cooperating with the Chinese government. Following professional tennis player Peng Shuai’s 2021 sexual assault accusation against Chinese Communist Party leader Zhang Gaoli and her subsequent disappearance, Human Rights Watch stated that “the IOC has vaulted itself from silence about Beijing’s abysmal human rights record to active collaboration with Chinese authorities in undermining freedom of speech and disregarding alleged sexual assault.” According to IOC documents, Zhang Gaoli headed the steering committee charged with securing and organizing the 2022 Games.

      • Concern activist’s phone infected with spyware during Dublin conference

        Ebtisam al-Saegh’s phone hacked by Pegasus software, human rights groups say

    • Monopolies

      • Patents

        • Open Invention Network Legitimising More Software Patents (Instead of Fighting Them)

          • Open Invention Network expands Linux patent protection [Ed: IBM- and Microsoft-funded front -- fronting for OIN and Linux Foundation agenda -- continues to promote software patents agenda]

            Today, everyone — yes, even Microsoft — use Linux and open-source. It’s been years since Linux was under attack by SCO for imaginary copyright violations, and then Microsoft CEO Steve Ballmer claimed that Linux violated over 200 of Microsoft’s patents. So over 15-years ago, the Open Invention Network (OIN) patent consortium was formed to defend Linux against intellectual property (IP) attacks. Even so, Linux and open-source software are still under attack from patent trolls and other attackers. That’s where the Open Invention Network (OIN) steps up by expanding its patent non-aggression coverage by updating its Linux System definition.

          • Open Invention Network Expands its Patent Non-Aggression

            Open Invention Network (OIN), the largest patent non-aggression community in history, announced today that it has increased its patent non-aggression coverage through an update to its definition of the Linux System. To keep pace with innovation Open Invention Network regularly revises and expands its Linux System coverage. This is the ninth expansion of the software packages and libraries protected under the Open Invention Network cross license.

          • Open Invention Network expands coverage

            The Open Invention Network has announced an expansion of its “Linux System Definition”, which is the set of software covered by its patent-protection umbrella.

      • Copyrights

        • Google v. Oracle: The End of an Era – Software Freedom Law Center

          The Supreme Court’s April 3rd decision of the long-running dispute between Oracle and Google brings to a last victorious conclusion the free software movement’s legal campaign, which began more than thirty years ago. Though the Justices have only now resolved the issue of API copyright, it was among the first of the legal problems with which FSF and I dealt.

          The heart of the free software movement’s long-term strategy was to harness the power of independent reinvention. Writing from scratch new programs that implemented both sides of all major software APIs was the technical pillar of our master plan. Licensing those programs on terms that protected the resulting commons—giving every user rights to study, copy, modify and share, with copyleft restriction on downstream licensing—was the legal pillar. The master plan of GNU was the independent reimplementation of both sides of all Unix APIs, thus allowing anything that could be done by general purpose computers to be done by software in which users had rights and free invention could flourish. When FSF and I started working together, in 1993, the Foundation—which was made possible by Richard Stallman’s 1990 MacArthur prize—was new, and the 1991 GPLv2 license brilliantly constructed for Stallman by Jerry Cohen was even newer. Gaining broad legal acceptance for GPLv2 and assessing the risk from the patenting of purely software inventions were immediate legal problems in need of my attention. But the threat posed by broad API copyright was the most urgent. The urgency arose because the issue was already headed for the US Supreme Court.

Links 18/1/2022: GNOME 42 Alpha and KStars 3.5.7

Posted in News Roundup at 7:45 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocast

      • Late Night Linux – Episode 160

        A theme of funding open source development runs throughout the news including npm sabotage, Mozilla accepting crypto donations, and Signal’s CEO standing down. Plus Wordle’s open web problem, the usual great stuff in KDE Korner, and more.

      • Destination Linux 261: KDE Roadmap Interview with Nate Graham

        This week’s episode of Destination Linux, we’re joined by Nate Graham from KDE to talk about Plasma and all things KDE. Then we’re going to discuss an exciting announcement from Pine64. All of this and so much more this week on Destination Linux. So whether you’re brand new to Linux and open source or a guru of sudo. This is the podcast for you.

    • DRM

      • The Beat of a Different DRM – Purism

        Canon made big news this past week when it started telling customers how to defeat the Digital Rights Management (DRM) in its toner cartridges because of supply chain issues with the chips they normally use to enforce it. That Canon explained how to bypass the DRM when it suited them, and that it didn’t negatively affect the operation of the printers or the customer, made it clear that DRM and the chips that enforce it offer little if any benefit to customers. Instead, DRM is only in place so the vendor can exert remote control over their product after the customer buys it. Computer vendors are marching to the beat of this DRM, and their ultimate goal is to exert the same sort of control printer and smartphone vendors enjoy into laptops and desktops.

      • You Don’t Own Your Movies, Music, Books, Games (DRM Is Evil!) – Invidious
    • Kernel Space

      • Linux Mint 20.3 Cinnamon (Edge) Edition now available for download

        When using a Linux-based operating system, you should always use the most recent kernel, right? Actually, no. While new kernels do add fixes and support for new hardware, they can also be less stable and cause bugs.

        Unfortunately, if you have extremely new hardware, sometimes you must use a newer kernel in order to boot, as older kernels do not yet support some of your devices. For instance, Linux Mint 20.3 “Una” was released recently and it comes with Linux kernel 5.4. If that older kernel does not support your computer, it may not boot.

        Thankfully, all is not lost. Today, the Linux Mint developers release an “Edge” version of the operating system. No, it doesn’t come with Microsoft’s Edge browser. The “Edge” moniker simply means it comes with a more modern kernel for those with very new hardware. You see, Linux Mint 20.3 Cinnamon (Edge) Edition comes with the much-newer kernel 5.13.

      • Platform Firmware Runtime Update & Telemetry Feature Submitted For Linux 5.17

        Last September I was the first to call attention to Intel working on a new feature to allow updating some system firmware components without needing to reboot such as for mission critical servers that try to avoid downtime at all costs. That Intel “Seamless Update” feature also known as Platform Firmware Runtime Update and Telemetry (PFRUT) has now been sent in for mainlining with Linux 5.17.

        Intel sent out the revised patches in December for implementing Platform Firmware Runtime Update and Telemetry for Linux systems as outlined by the ACPI specification. This provides a new “pfr_update” kernel driver behind the new “ACPI_PFRUT” kernel configuration build option. There is also a basic user-space tool for demonstrating how firmware updates are submitted to the kernel driver for run-time updating and also accessing the telemetry support.

      • Graphics Stack

        • Intel’s Former Vulkan Driver Lead Dev Lands Great Role For Improving Linux Graphics

          Jason Ekstrand who was the lead developer of Intel’s open-source “ANV” Vulkan Linux driver left Intel in December and has now revealed details about his new role.

          Ekstrand’s prolific work on the Intel ANV driver over the past number of years has made him one of the top five contributors to Mesa by commit count even with only being involved in the open-source Linux graphics scene since 2013. When he announced he was leaving Intel came as a bit of a surprise, but at least it turns out his new role will be still benefiting the upstream open-source Linux 3D graphics ecosystem.

    • Instructionals/Technical

      • What is POSIX? Why Does it Matter to Linux/UNIX Users?

        You’ll hear the acronym, or read about it: POSIX, on different online boards and articles. Programmers and system developers seem to worry about it the most. It can sound mysterious and, while there are many good sources on the subject, some discussion boards (brevity is part of their nature), don’t go into detail as to what it is and this can lead to confusion. What, then, is POSIX, really?

        POSIX isn’t actually a thing. It describes a thing – much like a label. Imagine a box labeled: POSIX, and inside the box is a standard. A standard consists of sets of rules and instructions that POSIX is concerned with. POSIX is shorthand for Portable Operating System Interface. It is an IEEE 1003.1 standard that defines the language interface between application programs (along with command line shells and utility interfaces) and the UNIX operating system.

      • [Old] Reasons to avoid Javascript CDNs

        Many javascript projects have install instructions recommending that people use a CDN like jsdelivr or unpkg to include the code on their website. This has the advantage that it’s quicker to get started with, and it’s often claimed to load faster. However, it also has downsides when it comes to privacy, security, and systemic risk, and it may actually be slower in some common cases. Here are some reasons not to use a javascript CDN, and some alternatives to consider instead.

        The big javascript CDNs are used by huge numbers of people — cdnjs brags that it’s on 12.5% of websites on the internet, and serves more that 200 billion requests per month, jsdelivr serves nearly 100 billion requests per month, and unpkg serves ~2.4 billion unique IP addresses per month. This means that one of these CDNs going down, or an attacker hacking one of them would have a huge impact all over society — we already see this category of problem with large swaths of the internet going down every time cloudflare or AWS has an outage.

        There’s a fundamental tradeoff here between efficiency and resiliency, and when 12.5% of the internet can have an outage because of one provider going down, I think we’ve swung way too far away from resiliency, as a society.

      • How to install Mattermost desktop client on Debian 11 / Ubuntu 20.04

        So, in this post, you will learn how to install Mattermost desktop client on Debian 11 / Ubuntu 20.04.

        Hello, friends. We recently explained to you how to install Mattermost on Debian 11. But the truth is that although it can be used through a web browser, it is also possible to use a desktop client.


        Welcome again! today will learn to build a Firewall with ClearOS. in the very last article I listed up the top five firewalls. The one potentially useful firewall, I was not able to cover in the article. So today we will cover a complete step-by-step installation guide for the same.

        The firewall comes in a form of a dedicated OS and can be downloaded from this link. The free-to-use license of ClearOS comes under community license. Yet the UTM is free having no official support. But, still have a good support community and documentation. Let’s go step by step. First, we will have a look into the features of the firewall followed by an installation guide. Finally, we will give the final verdict in form of a conclusion.

      • Zsh shell installation and configuration on Linux

        The Z-shell (zsh) is a modern and very powerful shell: it incorporates and extends many feature of other shells, like Bash. Although it can be used as a powerful scripting language, it is mainly aimed at interactive use, since one of its more prominent feature is the advanced tab completion system. In this tutorial we see how to install zsh in the most commonly used Linux distributions, see what are its startup and shutdown files and how to perform the basic configurations.

      • How to install and manage fonts on Linux

        Fonts are a really important part of the user experience. On the most commonly used Linux-based distributions, there are many packaged fonts which can be installed using the native package manager. Sometimes, however, we may want to install some fonts manually. In this tutorial we see how to perform such operation, and, more generally, how fonts are managed on Linux.

      • How to use LUKS with a detached header

        Linux Unified Key Setup (LUKS) is the de-facto standard block device encryption format used on Linux-based systems. We already discussed some of the features provided by it in a previous tutorial about using a file as a LUKS device key. When using LUKS, encryption metadata is stored on the header which is created at the beginning of the encrypted device (a copy of the header is created at end of the device for redundancy, when using LUKS2).If desired, it is possible to specify that the header should be detached from the device: in this tutorial we see how.

      • How to scrape web pages from the command line using htmlq

        Web scraping is the process of analyzing the structure of HTML pages, and programmatically extract data from them. In the past we saw how to scrape the web using the Python programming language and the “Beautilful Soup” library; in this tutorial, instead, we see how to perform the same operation using a command line tool written in Rust: htmlq.

      • Install Node.js 17 & NPM on Debian 11 Bullseye – LinuxCapable

        Node.js is an open-source, cross-platform, back-end JavaScript runtime environment built on Chrome’s V8 engine to build fast and scalable network applications and back-end APIs. Node.js uses an event-driven, non-blocking IO module that makes it very lightweight and practical. It is a fantastic choice for data-intensive real-time applications across distributed devices.

        NPM is a package manager for the JavaScript programming language maintained by NPM, Inc. NPM is the default package manager for the JavaScript runtime environment Node.js and is arguably the most available repository for Node.JS packages.

        In the following tutorial, you will learn how to install Node.JS 17 from the node source repository on Debian 11 Bullseye.

      • Install UNRAR on Debian 11 Bullseye – LinuxCapable

        UNRAR is widely known and used amongst Windows users. RAR files are much smaller archives and compress better than ZIP for most files by compressing files “together,” saving more space. UNRAR does not come pre-installed natively on Debian, but it is available to install from its repository.

        The following tutorial will show you how to install UNRAR on Debian 11 Bullseye and the basic commands to use it on either your Debian desktop or server.

      • How to Add Host in Zabbix Server to Monitor

        Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines and cloud services. Zabbix server is rich in template tools which contain lots of predefined templates which we can easily be used with your hosts.

      • How to install Flightgear on Elementary OS 6.0 – Invidious

        In this video, we are looking at how to install Flightgear on Elementary OS 6.0.

      • How to install and configure Squid Proxy on Rocky Linux/Alma Linux 8

        In this guide we will learn how to install and configure Squid Proxy server on a Rocky Linux 8 server. This guide also works on other RHEL 8 based distros like Alma Linux and Oracle Linux.

        Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems.

      • How to install Flashforge FlashPrint 5.2.1 on a Chromebook

        Today we are looking at how to install Flashforge FlashPrint 5.2.1 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

        This tutorial will only work on Chromebooks with an Intel or AMD CPU (with Linux Apps Support) and not those with an ARM64 architecture CPU.

      • Install PHP 8.1 on Linux Mint 20 – LinuxCapable

        PHP 8.1 is a significant update of the PHP language that was “officially” released on November 25, 2021. As we advance from the existing PHP 8.0 release, this is a standard upgrade. The new PHP 8.1 brings enums, fibers, never return type, final class constants, intersection types, read-only properties amongst the long list of new features and changes.

        Linux Mint is known to be a desktop distribution and not as a full-fledged web server. However, developers may require to install PHP on their Mint system for development purposes. In the following tutorial, you will learn how to import the Ondřej Surý PPA and install PHP 8.1 on your Linux Mint 20.

      • How to install and use Firewalld on Rocky Linux 8 – Linux Shout

        Firewalls are one of the most essential parts of security when we are going online. Here we learn the steps and command to install, configure, and how to use FirewallD on Rocky Linux 8 using CLI or GUI.

        Many of us who are not already Linux would already be familiar with the firewall feature on Windows, where it is very easy to turn On or Off ports or services using GUI. However, what about Linux such as CentOS, Rocky Linux, RedHat, AlmaLinux, and more… If you are using full Linux Desktop then a firewall would already be there but in most of the cases without a graphical interface. Nevertheless, Debian, RedHat, Ubuntu, and other Linux systems provide the appropriate firewall GUI software directly from their respective repository to manage things with the help of mouse clicks.

        But what if you just want a basic OS installation with no graphical interface? Because minimal versions of Linux would not even have the CLI version of Firewall by default. Well, this is a very small problem, if you have an active internet connection and due to an in-built package manager under Linux, we can install a firewall with just a single command.

      • Overview of the Wireshark User Interface (GUI)

        Wireshark is a Free and Open Source Software (FOSS) and it is developed by a community of enthusiastic developers. Wireshark (formerly Ethereal) is used for capturing and investigating the traffic going on a network. It is a very popular network protocol analyzer among network professionals, security analysts, and research scholars around the world. The good thing is that it is open source and freely available under the GNU General Public License version 2. It is available for major OSes like Windows, macOS, Linux, and UNIX.

        Wireshark has many features like profound inspection of network traffic, real-time capture, offline analysis, R/W support for different capture file types etc. It also organizes SharkFest, an annual educational conference, around the world for imparting knowledge of their product. These conferences are focused on the best practices of using Wireshark.

      • How to install DragonFly BSD 6.2.1 plus MATE desktop and some applications. – Invidious

        In this video, I am going to show how to Install DragonFly BSD 6.2.1 plus MATE and some applications.

      • Using the Linux look command to select lines from files | Network World

        The look command on Linux can be handy for selecting particular lines from text files with sorted contents. Let’s look into how it can be used and where you might run into some problems.

      • How to Change Domain Name on WordPress

        This tutorial explains how to change the domain name on WordPress.
        By reading this article you will learn how to edit your WordPress site URL both from the WordPress dashboard and from your server through phpMyAdmin.

        In case you do not have access to your dashboard through your new URL, you can achieve it from your server. This method includes the use of a plugin to update all the URLs in your site content.

        All steps explained in this article include screenshots making it easy to follow them.

      • Expanding Your Nextcloud Instance Using Linode’s NVMe-Backed Block Storage

        Nextcloud is a very popular self-hosted alternative to Dropbox, Google Drive, and other cloud hosting providers. It’s not only the go-to choice for individuals, either. Nextcloud has a number of enterprise-level deployments.

        Given the above, we decided to install Nextcloud on a Linode Dedicated CPU and see just what it would take to configure it to use Linode’s new NVMe-backed block storage. This article was the result.

      • Analyze Network Traffic Using Brim Security – kifarunix.com

        In this tutorial, you will learn how you can analyze network traffic using Brim security tool. Brim is an open source desktop application that can be used to analyze structured network traffic data like;

    • Games

      • Old Firewall Reborn As Retro PC | Hackaday

        In two follow-up videos (here and here), he builds an enclosure (instructions on Thingiverse) and tries out several other operating systems. He was able to get the Tiny Core Linux distribution running with the NetSurf browser, but failed to get Windows 2000 or XP to work. Returning to Windows 98, he tweaks drivers and settings and eventually has a respectable retro-gaming computer for his efforts. The next time you’re cleaning out your junk bins, have a peek inside those pizza-box gadgets first — you may find a similar gem.

      • Building a Retro Linux Gaming Computer – Part 9: Ancient Archaeology | GamingOnLinux

        After the demise of Loki Software, one of their former employees found himself forced to work behind a cash register for a living. Desperate to get back to porting games, he found the email address of an artist working for the Croatian developer Croteam, creators of the game Serious Sam. Croteam agreed to let him attempt to create a port of the game to Linux, the first of many games to come to the platform thanks to the work of Ryan “icculus” Gordon.

        The port of Serious Sam though would in the end never leave the beta stage. Croteam later released the source code to the game in 2016, with Ryan himself returning to craft his own source port, but his original effort languished for years with a number of unfortunate bugs. One of these left the game unbeatable as it prevented the player from inflicting any damage to the final boss. Unbeatable that is with the standard version of the game.

        Our friends at Global Star Software released Serious Sam: Limited Edition in 2002, a bizarre budget retail variant of Serious Sam: The First Encounter that only features seven out of the fifteen levels. It also happens to be the only version of the game that I possess on CD-ROM. I initially dismissed the idea of playing Serious Sam as I thought it would be too much for the hardware, but the jewel case insists that the Rage 128 Pro is compatible.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KStars v3.5.7 Released

          KStars v3.5.7 is released on January 18th for Windows, MacOS, and Linux. This release includes a number of new features and bug fixes.

          This feature is finally implemented in 3.5.7. Many assumed it existed before and were disappointed when they couldn’t drag the mosaic panels around for finer adjustments.

      • GNOME Desktop/GTK

        • ‘Burn My Windows’ GNOME Extension Adds 3 New Effects & Random Mode – OMG! Ubuntu!

          A couple of new Star Trek-esque effects have been added to the ‘Burn my Windows’ GNOME Shell extension.

          If you’ve not yet heard about this bling-tactic add-on, it animates closing windows (and optionally dialogs) in some spectacularly over the top ways — just like Compiz of old.

          Burn My Windows 8 is available from the GNOME Extensions website and it adds there new effects.

        • GNOME 42 Desktop Environment Is Now Available for Public Testing

          GNOME 42 alpha is now ready for public testing to give the Linux and Open Source community an early taste of what they can expect from the next major release of one of the most popular desktop environments for Linux-powered operating systems, used on desktop and mobile.

          The biggest changes in the GNOME 42 release around the GTK 4 and libadwaita components. Some of the default apps distributed as part of the GNOME stack have been ported to GTK 4 for a more modern look and extra functionality. Here’s a first look at some of them.

        • GNOME 42.alpha released
          GNOME 42.alpha is now available. This is the first unstable release
          leading to 42 stable series.
          While usually we don't highlight changes in the announcement, this is
          a big transitional cycle and here is what you can expect for GNOME 42.
          * Libadwaita is released and GNOME 42 will be hard depending on it.
          * A couple of apps and modules are migrating to GTK 4 and libadwaita,
          and this will continue in the next cycles as well.
          * Modules have ported to libsoup3.
          * The gnome-desktop module can be built against GTK 4 now and the internals
          were split in 3 libraries.
          * libgweather has been ported to GTK 4.
          In addition, for the 42 Flatpak runtime the following modules were removed.
          You can still bundle them in your applications, but they won't be part of the runtime.
          * cogl
          * clutter
          * librest
          If you want to compile GNOME 42.alpha, you can use the official
          BuildStream project snapshot. Thanks to BuildStream's build sandbox,
          it should build reliably for you regardless of the dependencies on
          your host system:
          The list of updated modules and changes is available here:
          The source packages are available here:
          This release is a snapshot of development code. Although it is
          buildable and usable, it is primarily intended for testing and hacking
          purposes. GNOME uses odd minor version numbers to indicate development
          For more information about 42 release, the full schedule, the official module
          lists and the proposed module lists, please see our 42 wiki page:
          Jordan Petridis,
          GNOME Release Team
        • GNOME 42 Alpha Released With A Lot Of GTK4 Porting, Other Improvements

          The alpha release of GNOME 42 is now available for testing.

          GNOME 42 is working up to its release in March while out today is the “42.alpha” milestone. GNOME 42 components have been seeing a lot of work porting from GTK3 to GTK4, beginning to make use of libadwaita, support for the dark mode / dark preference option, and a variety of other improvements.

          Some of the specific changes worth noting with GNOME 42 Alpha include:

          - The Baobab disk usage analyzer has been ported to GTK4 and libadwaita.

    • Distributions

      • Didiwiki personal wiki retired

        DidiWiki has been in the “Personal” menu category for …forever. EasyOS, Quirky, and the pups before, all had it. However, I just discovered that it is broken, cannot create new wiki pages.

      • SUSE/OpenSUSE

      • IBM/Red Hat/Fedora

        • Firefox 96 on Power

          Firefox 96 is out and after some usage of it I think I agree it’s definitely lessened the load on the main thread, which is one of the lead features in this release (and our heavily multicore POWER9 systems can pick up the slack for everything else). There are also multiple improvements to HTML and CSS. Some of you with Emacs muscle memory will want to read the Developer section of the Release Notes, though (I have the Command key mapped instead so I can still use Mac muscle memory: set ui.key.accelKey to 91). Fortunately it all builds out of the box using the PGO-LTO patch and .mozconfigs from Firefox 95.

        • How to renew your Red Hat Developer Subscription for Red Hat Enterprise Linux | Red Hat Developer

          Learn how to renew your no-cost Red Hat Developer Subscription to continue accessing support for Red Hat Enterprise Linux and other Red Hat products.

      • Debian Family

      • Canonical/Ubuntu Family

        • Canonical Kubernetes for Financial Services | Ubuntu

          Adopting a container-first approach represents an unrivalled opportunity for financial institutions to increase system efficiency and resource utilisation, improve security, introduce automation, and accelerate innovation.

          Containers offer a logical packaging tool in which applications can be decoupled from the underlying infrastructure on which they run. This allows container-based applications to be installed easily and consistently, regardless of whether the target environment is a private or public cloud. With containerisation, development teams move fast, deploy software efficiently, and operate at an unprecedented scale.

          Despite the advantages, containers can be hard to manage and to track individually, and across multiple cloud platforms. Container orchestration solves this issue by automating the management and tracking of containers. Kubernetes has established itself as the leading open source platform for managing containerised workloads and services.

        • Ubuntu Fridge | Ubuntu Weekly Newsletter Issue 718

          Welcome to the Ubuntu Weekly Newsletter, Issue 718 for the week of January 9 – 15, 2022.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Open source, closed wallets, big profits – nobody wins the OSS rock, paper, scissors game

        There’s much talk of the Open Source Sustainability Problem. From individual developers to Google’s White House lobbying, the issue seems simple but intractable. Is the willingness of volunteer coders a solid enough basis for the long-term health of essential infrastructure?

        This is, of course, balderdash. It’s not an open source problem, it’s a software problem. All software needs resources to adapt as the working environment changes, resources the changed environment may not provide. Look how many out-of-support versions of Windows still limp on like superannuated footy players in the Sunday leagues.

      • Productivity Software/LibreOffice/Calligra

        • ONLYOFFICE Docs v7.0 Adds Online Forms, Password Protection, and More Improvements – It’s FOSS News

          ONLYOFFICE is a popular open-source office suite available for Desktop platforms (including Linux) and web applications as well.

          If you have a Nextcloud or ownCloud instance, you may already have ONLYOFFICE installed to manage your documents.

          Now, for its first major release in 2022, ONLYOFFICE v7.0 has been announced with a range of improvements and much-needed feature editions.

        • ONLYOFFICE v7.0 released: fillable online forms, password protection in spreadsheets, collaboration and usability improvements and more

          The developers of ONLYOFFICE Docs have released version 7.0 of their open-source online office suite. The new version of the online editors comes with brand-new online forms, new editing features, improved collaboration and usability. Here is a brief overview of what’s new around the suite.

          The killer feature of ONLYOFFICE Docs v7.0 is the ability to create and edit fillable forms online. Based on the Microsoft Office content controls, ONLYOFFICE forms offer the same flexibility as Adobe forms but come with more advanced field properties allowing users to create model documents of various types, e.g. sales contracts, DNA agreements, questionnaires, etc.

          Users can create fillable forms from scratch, use an existing DOCX document or download a template from the official ONLYOFFICE library. You can share your form with others and collaboratively edit it together in real time. Once your form is ready, let other people fill out the required fields.

        • Community Member Monday: Baltasar García Perez-Schofield – The Document Foundation Blog

          Today we have a quick chat with Baltasar García Perez-Schofield, who recently became a Member of The Document Foundation, the non-profit entity behind LibreOffice…


          I think that the open standards for document formats are vital for any computer user, and therefore defend the TDF’s existence. In that sense, becoming a member was an honor for me, and I also perceived it as a recognition for the work I did.

      • Programming/Development

        • Sam Thursfield: Status update, 17/01/2022

          I am keeping busy at work integrating BuildStream with a rather large, tricky set of components, Makefiles and a custom dependency management system. I am appreciating how much flexibility BuildStream provides. As an example, some internal tools expect builds to happen at a certain path. BuildStream makes it easy to customize the build path by adding this stanza to the .bst file…

        • Entering the Job Market? Here Are the Most In-Demand Programming Languages for 2022 – Anto ./ Online

          As we enter 2022, you might be looking for a new job. The Great Resignation proves beneficial to job hunters or switchers, as employers are willing to provide higher pay and more benefits to stem labor shortages.

          Now is an excellent time for anyone wanting to launch, boost, and even future-proof their career. If you’re looking to snag a job that is and will stay in demand, the World Economic Forum recently listed their top 10 jobs of the future.

        • GCC 12 Moves On To Stage 4 Development With Many New Compiler Features – Phoronix

          GCC 12 as this year’s annual GNU Compiler Collection feature release has moved on to “stage four” development with likely releasing GCC 12.1 in April.

          This transition was known and marks the end of the stage 3 general bug fixing period now with just focusing exclusively on regression/documentation fixes. This is the final stage focused on getting the next GCC feature release ready for debut.

        • HTMLQ: Like JQ But To Parse & Query HTML – Invidious

          Parsing and querying HTML through pure Unix tools can be a massive pain and you’re much better off using specialized tools, one of those specialized tools in HTMLQ, which is much like JQ. Between recording and upload, the dev added the ability to remove nodes so ignore that point.

        • Python

          • The__repr__ in Python

            The __repr__() method of Python yields a textual or string depiction of an entity or an object. This process is termed whenever the entity’s repr() method is invoked. You can say that the “repr” method and “__repr__” can be used interchangeably for the same purpose. The text reverted must be a proper Python phrase that would be castoff to reassemble the entity if feasible. A “__str__” function of python does the same, but there is a slight difference between both the functions. The __str__ method is designed to produce a human-readable version, useful for tracking or displaying object information. The __repr__ method, on the other hand, is designed to provide an “official” textual image of the object that may be used to recreate it. We’ll focus on both key Python entity methods in our article today. Let’s have a fresh start.

          • The Python Sort List of Tuples

            In Python, we utilize tuples to store multiple elements in a variable. Tuple lists may be sorted similarly to any other list. However, tuples contain numerous elements, so we are free to rearrange the tuples based on item 1 or item i. In this guide, we will look at how to sort various lists of tuples using multiple examples. We will go over the various scenarios and the many strategies employed to accomplish this. We will mainly focus on some built-in methods and sorting procedures to achieve tuple sorting. The well-organized nature and invariant properties of tuples are dissimilar from those in regular lists.

          • How to Remove an Element From a Set in Python

            This article describes how to remove items from a set in Python. We utilize certain built-in features, several approaches to better understand this topic. Let’s take a look at a set of Python.
            Disordered records will have unindexed values. We cannot access the values of the set via the index number, such as we have done in a different list. The values of a set are unchallengeable. That is, we cannot change the value once it is created. The data in the set may remain of some type, such as integers, floating-point values, or integers.

          • How to Use Xrange in Python

            In Python, xrange is a commonly used function that gives a series of numbers from a given range. In Python 2, there is a function that returns an xrange object. When we need to iterate through a loop, we use the xrange function. As a result, the object created by xrange is mostly utilized for indexing and iteration. Keep in mind that the xrange method is only supported in Python 2 at this time. Because Python 2 is no longer supported, we recommend using Python 3 and the range() method instead of xrange(). The range() and xrange() methods can be used for loops to iterate a specified number of times, let’s say 10 times or 5 times. Although Python 3 does not provide an xrange function, the range function works identically to the xrange function in Python 2.

            If you want to develop programs that can be executed on both Python 2 and Python 3, you should utilize the range method. The range() returns a range object (a type of iterable), while xrange() returns a generator object that can only be used to loop through integers. The only specific range is presented on demand, leading to the term “lazy evaluation”. Both are used in various ways and have different qualities. The return type, memory, operation usage, and performance are all factors to consider. Let’s discuss each factor with a corresponding example for better understanding.

        • Shell/Bash/Zsh/Ksh

          • Eagle’s Path: DocKnot 7.00 (2022-01-17)

            The recent 6.01 release of my static web site generator was kind of a buggy mess, which uncovered a bunch of holes in my test suite and immediately turned up problems when I tried to use it to rebuild my actual web site. Most of the problems were Unicode-related; this release hopefully sorts out Unicode properly and handles it consistently.

            Other bugs fixed include processing of old-style pointers in a spin input tree, several rather obvious bugs in the new docknot release command, and a few long-standing issues with docknot dist that should make its results more consistent and reliable.

        • C

          • C: execve function usage

            Execve() function is used for the execution of the program that is referred to by pathname. The exec family is used mainly in the C programming language and has many functions. These functions execute a system command in a separate process from the main program and print the output. In this article, we will discuss some of the main functions of the exec family and mainly execve functions with some elementary examples.

            Now let’s look at the exec family in the image attached. This picture shows the syntax of all possible functions of the exec family.

          • C: inet_pton function example
          • C: Connect Function System Call

            We cannot emphasize enough socket programming and all its use-cases. However, since it is a pervasive topic, each of its components or the functions used while doing socket programming holds a crucial value and needs to be studied separately. The connect function or system call is also an essential function used while doing socket programming in the C programming language. In this article, we will see how we can use this function in the C programming language.

          • C: CHDIR Function Usage

            We have already talked about the “CHDIR” function of the C programming language briefly while discussing the “getcwd” function. However, this article will specifically revolve around the “CHDIR” function mainly used to alter the current working directory of a system. We will especially try to explore how the behavior of this function changes once it is used within a C script. To do that, we will first introduce you to the purpose of this function, followed by its syntax. Then, we will discuss the impact of this function on the current working directory of the shell in Linux. Finally, we will conclude our discussion by talking about some of the errors that can be returned from executing the “CHDIR” function of the C programming language.

          • C: Basename Function Usage

            While dealing with the files in Linux, you need to manipulate their paths. There are certain functions of the C programming language that can operate on the file paths; however, as far as the scope of this article is concerned, we will talk in detail about the usage of the Basename function of the C programming language.

  • Leftovers

    • “Martin”: Algeria, 2008

      On a 2008 visiting professorship in this unattractive but popular seaside city, having rented my own apartment, I had to deal with utility issues myself. My lodging was on Rue d’Hasan ……(a name I’ve since forgotten). But it was one of Algeria’s tens of thousands of streets, buildings and squares named for martyrs of its painful and costly, never-forgotten and never-recovered-from 1954-1962 war of independence.

      I’d placed my daybook on the desk between us as I offered my ID  to the woman. Until that remark—the whispered single word, “mahteen”– she hadn’t spoken to me.

    • Woodstock in 1969

      Lang was also much involved with the 25th Anniversary Woodstock Festival held at Winston Farm in Saugerties in 1994. The 1994 Festival drew about 350,000 people. The Woodstock Film Festival honored Lang with its “Spirit of Woodstock award” in 2011.

      In all the years running into Lang at public events in Woodstock, at the Post Office, or the supermarket, I never saw him frown. He always had an upbeat and positive expression on him. All Hail to Michael Lang.

    • Science

      • Machine Learning Detects Distracted Politicians | Hackaday

        [Dries Depoorter] has a knack for highly technical projects with a solid artistic bent to them, and this piece is no exception. The Flemish Scrollers is a software system that watches live streamed sessions of the Flemish government, and uses Python and machine learning to identify and highlight politicians who pull out phones and start scrolling. The results? Pushed out live on Twitter and Instagram, naturally. The project started back in July 2021, and has been dutifully running ever since, so by now we expect that holding one’s phone where the camera can see it is probably considered a rookie mistake.

      • AI Camera Knows Its S**t | Hackaday

        [Caleb] shares a problem with most dog owners. Dogs leave their… byproducts…all over your yard. Some people pick it up right away and some just leave it. But what if your dog has run of the yard? How do you know where these piles are hiding? A security camera and AI image detection is the answer, but probably not the way that you think.

        You might think as we did that you could train the system to recognize the–um–piles. But instead, [Caleb] elected to have the AI do animal pose estimation to detect the dog’s posture while producing the target. This is probably easier than recognizing a nondescript pile and then it doesn’t matter if it is, say, covered with snow.

    • Education

      • A Library the Internet Can’t Get Enough Of

        Dr. Macksey’s book collection clocked in at 51,000 titles, according to his son, Alan, excluding magazines and other ephemera. A decade ago, the most valuable pieces — including first editions of “Moby Dick,” T.S. Eliot’s “Prufrock and Other Observations,” and works by Wordsworth, Keats and Shelley — were moved to a “special collections” room on the Hopkins campus. After Dr. Macksey’s death, a S.W.A.T. team-like group of librarians and conservationists spent three weeks combing through his book-filled, 7,400-square-foot house to select 35,000 volumes to add to the university’s libraries.

    • Health/Nutrition/Agriculture

      • Why Did Democratic AG Kill Flint Water RICO Case?

        Prosecutors investigating Flint’s contaminated water crisis were pursuing a racketeering case against public officials whose austerity-driven policies caused the health catastrophe, but after newly elected Michigan Attorney General Dana Nessel took over in 2019, those charges were dropped.

        “This adds a new tragedy for the people of Flint who deserve to know the root causes of their suffering and to hold any financial wrongdoing accountable.”

      • Lawmakers Seek to Weaken Ban on Surprise Medical Bills

        It’s been less than three weeks since a federal ban on most surprise medical bills went into effect, but Democratic and Republican members of Congress are already teaming up with the for-profit healthcare industry to weaken a key provision in the law, The Intercept reported Monday.

        The No Surprises Act is expected to protect millions of people in the U.S. from costly bills that private equity-owned providers foist upon patients who inadvertently receive out-of-network care during medical emergencies.

      • Where’s the Data? The Missing Link in the U.S. Response to Covid-19

        Thus, when this week’s guest–a leading researcher in molecular medicine had sharp words for the Biden administration’s failure to collect critical data on Covid cases, I paid attention.

        Appearing in a January 13 presentation, Eric Topol, editor-in-chief of Medscape and holder of an endowed chair at Scripps Research, said,

      • Hospitals Struggle With Sheer Volume of COVID Cases Amid Staff Shortages
      • Brazilian Senate Investigation into the Handling of COVID is Bad News for Bolsonaro’s Reelection Bid

        Bolsonaro might face charges for Violation of preventive health measures, Crime of epidemic with result of death, Charlatanism, Prevarication, Irregular use of public funds, incitement to crime, Falsification of private documents, Crime of responsibility, and crimes against humanity.

        The rapporteur, Senator Renan Calheiros, had originally included in the final report of the CPI the crime of genocide against Bolsonaro, for his treatment of indigenous populations and based on statements and actions of the president and his allies violating indigenous rights and ensuring support for loggers and land grabbers in indigenous lands.

    • Integrity/Availability

    • Defence/Aggression

      • From the airport to the courtroom Ukraine’s former president Poroshenko returns to the country, faces arrest on treason charges

        On the morning of Monday, January 17, Ukraine’s former president, lawmaker Petro Poroshenko, arrived in Kyiv after spending nearly a month abroad. An estimated 3,000–4,000 people met him at Kyiv’s Zhuliany Airport; some of his supporters carried Ukrainian flags and posters with pro-Poroshenko slogans. At passport control, Poroshenko was met by officials from Ukraine’s State Investigation Bureau. His passport was taken away for around 15 minutes, but then returned to him. The state investigators attempted to serve Poroshenko with a subpoena but he refused to take the document. Poroshenko then proceeded to hold an impromptu rally, addressing his supporters gathered outside the airport and urging them to support him in court. 

      • Why Xinjiang Has Been a Touchy Subject in China for Centuries

        Xinjiang’s largely flat terrain made it a primary part of the historical Silk Road route. The region’s geography and proximity to numerous Eurasian cultures and civilizations have also made it a contested land for centuries, with competing narratives over its history and cultural traits. The name Xinjiang, for example, translates to “New Frontier” or “New Dominion” in Chinese, while Uyghur nationalists refer to the region as East Turkestan. Chinese scholars posit that Uyghurs are descended from nomadic Uyghurs from modern-day Mongolia and settled in Xinjiang in the ninth century (joining other groups, including the Han Chinese). Uyghur historians, on the other hand, tend to stress their Central Asian Turkic origins, with East Turkestan their historical homeland.

        Regardless of the historical debate over the lineage of Uyghurs, a distinct Muslim and Turkic identity had emerged among portions of Xinjiang’s population in the 18th century when China’s Qing Dynasty reconquered the region. According to historical records, the Chinese campaign split the Uyghur population from the other Turkic groups of Central Asia, which later came under the control of the Russian Empire. Hostility toward Chinese rule in Xinjiang among Muslims from a variety of different cultural backgrounds culminated in the Dungan Revolt from 1862 to 1877, with rebels receiving support from both the Ottoman and British empires. Despite the successful Chinese suppression and pacification of Xinjiang afterward, nationalist sentiment grew within the Muslim-Turkic population, and the term Uyghur began to be used to describe much of the local Muslim-Turkic population around the Tarim Basin by the early 20th century.

      • Hollywood’s Pentagon Propaganda and News Abuse with Robin Andersen; and a New Book on Decolonizing Podcasters with Nicholas Baham III and Nolan Higdon – The Project Censored Show
      • Are Western Wealthy Countries Determined to Starve the People of Afghanistan?

        The figure of $10 billion is significant. A few days after the Taliban took power in Afghanistan in mid-August 2021, the U.S. government announced the seizure of $9.5 billion in Afghan assets that were being held in the U.S. banking system. Under pressure from the United States government, the International Monetary Fund also denied Afghanistan access to $455 million of its share of special drawing rights, the international reserve asset that the IMF provides to its member countries to supplement their original reserves. These two figures—which constitute Afghanistan’s monetary reserves—amount to around $10 billion, the exact number Griffiths said that the country would need if the United Nations does not immediately get an emergency disbursement for providing humanitarian relief to Afghanistan.

        A recent analysis by development economist Dr. William Byrd for the United States Institute of Peace, titled, “How to Mitigate Afghanistan’s Economic and Humanitarian Crises,” noted that the economic and humanitarian crises being faced by the country are a direct result of the cutoff of $8 billion in annual aid to Afghanistan and the freezing of $9.5 billion of the country’s “foreign exchange reserves” by the United States. The analysis further noted that the sanctions relief—given by the U.S. Treasury Department and the United Nations Security Council on December 22, 2021—to provide humanitarian assistance to Afghanistan should also be extended to “private business and commercial transactions.” Byrd also mentioned the need to find ways to pay salaries of health workers, teachers and other essential service providers to prevent an economic collapse in Afghanistan and suggested using “a combination of Afghan revenues and aid funding” for this purpose.

      • Corporate Seditionists are no Better than the Seditionists who Attacked the Capitol

        That’s why I took some comfort just after the attack on the Capitol when many big corporations solemnly pledged they’d no longer finance the campaigns of the 147 lawmakers who voted to overturn election results.

      • France: Man shouts “Allah Akbar” in the street and injures three police officers

        The police quickly spotted the driver. He first stopped and then got out of his vehicle. Enraged, he attacked the police officers with the car keys and punched them in the face. Finally he was overpowered and arrested. The 36-year-old offender, who was already known to the police, was taken into police custody. He was brought in for an investigation into his behaviour.

      • The long jihadist-extremist quest to free Aafia Siddiqui – analysis

        The precise details of how and why a man who attacked a synagogue in Texas and then demanded to have Siddiqui freed are not yet clear. However, the use of her name has conjured up past instances of attempts to swap her for people held by extremist groups.

    • Environment

      • Energy

        • Fossil Fuel, Fuels Doom

          Check out all installments in the OppArt series.

        • Protests at the Pump

          In October 1990, furious at the new liberal government for raising gas prices by 65 percent, taxi drivers in Hungary set up barricades and established roadblocks that brought transportation to a halt around the country. The price hike was partly in response to cutbacks in petroleum deliveries from the Soviet Union and supply problems related to Iraq’s invasion of Kuwait the previous August. For four days, Hungarian cities were paralyzed. Eventually, the government had to back down.

        • Youngkin’s Cabinet Has More Fossil Fuel Ties Beyond Trump’s EPA Chief
        • Earth’s Biosphere Absorbs the Heat Equivalent of 32 Hiroshima Nuclear Explosions Every Second

          In May 2020, I calculated that the entire biosphere (atmosphere, oceans, land surface) was being heated by 32 Hiroshima-equivalent heat bombs per second.

          While it is the atmosphere that initially captures the IR (infrared = heat radiation emitted upward from Earth’s surface) that produces global warming, soon enough about 20-30% of that captured heat is absorbed by the surface waters of the ocean — in a continuous process. One could then say that 6.4-9.6 [6-10, so ~7] of the continuous heat bomb output goes into the oceans and 22.4-25.6 [22-26, so ~25] into the atmosphere — and eventually into the oceans.

    • Finance

      • Members of Congress Shouldn’t Be Getting Rich From Trading Stocks

        In the chaotic early days of the pandemic, members of Congress sat in closed-door briefings on the emerging threat of the virus, before the public knew of its severity. In a unique position to act decisively, the impulse of many in attendance wasn’t to prepare or somehow mobilize the resources necessary to slow the spread of a deadly disease. Some Democratic lawmakers raised an alarm, of course. But their pleas for more funding were bogged down by Congress’s usual dysfunction. For other lawmakers, including top Republican and Democratic leaders, the impulse was to profit from the private information. So they did what any decent American would: They rushed to buy and sell stocks just weeks before the market crashed.

      • College Football Coaches Making $25,000 a Day? Let’s Sideline This Lunacy!
      • The Inflation Hawks on the Path to an Inflation War

        First, as fans of reality like to point out, the jump in inflation over the last year is largely a worldwide phenomenon, not something that can be attributed to bad policies in the United States. Our year-over-year (December 2020 to December 2021) inflation figure was 7.0 percent, which is definitely high. But the figure for the U.K. was 4.6 percent, for Canada 4.7 percent, for Germany 5.2 percent, and for Spain 5.5 percent. (These are all inflation numbers from November 2020 to November 2021, since December data are not yet available.)

        The jumps in inflation in these countries cannot be blamed on the American Recovery Act (ARA) that Biden pushed through Congress back in February or Federal Reserve Board policy. Obviously, the US inflation rate is higher than in these other countries, but the point is that we would have seen a substantial jump in inflation even if Biden has not moved aggressively to restart the economy.

      • Colleges Accused of Conspiring to Make Low-Income Students Pay More

        Is this the latest ‘admissions scandal’?

        Although it may be tempting to brand this case as the latest college admissions “scandal,” this lawsuit harks back to an investigation of 57 private, four-year universities conducted over 30 years ago by the Department of Justice on charges of “price fixing.” In this case, price fixing means limiting how the colleges compete for students by agreeing with one another to offer similar financial aid awards to admitted students.

      • With Billions in Fines, U.S. Chamber of Commerce’s Ranks Are ‘Packed With Rogues’
    • AstroTurf/Lobbying/Politics

      • Opinion | An All-Out War on Democracy Is Now Underway in the US

        The following is adapted from the new edition of Norman Solomon’s book “Made Love, Got War,” just published as a free e-book.

      • 5 Lessons From Hunter S. Thompson

        Fifty years ago, Rolling Stone asked Hunter S. Thompson to cover the 1972 presidential campaign. In some ways, the assignment made perfect sense. Already a seasoned journalist, Thompson was basking in the success of Fear and Loathing in Las Vegas, which the magazine had run the previous month. When Random House published the book version to enthusiastic reviews in 1972, Thompson consolidated his position as the magazine’s most popular writer.

      • Opinion | Another ‘Big Lie’ Corporatists Like to Tell: Bipartisanship Will Lead to Progress

        After the initial flush of optimism from the passage of the landmark infrastructure bill, the Biden Presidency is starting the year on a political down note. Both the “Build Back Better” and voting reform acts have stalled seemingly indefinitely. Just as troubling his approval rating and the public’s overall optimism about the nation’s direction have plummeted to near historic lows.

      • #FreeNavalny Supporters rally in cities around the world one year after Alexey Navalny was arrested upon returning to Russia

        On January 17, 2021, Russian opposition leader Alexey Navalny was arrested at Moscow’s Sheremetyevo Airport immediately upon returning to Russia from Germany, where he had spent months recovering from a near-fatal poisoning. Navalny would go on to spend the next year behind bars, first in Moscow’s Matrosskaya Tishina remand prison and then in a prison colony in the Vladimir region, where he is still in custody today. The Kremlin critic was incarcerated under a reinstated sentence after Russia’s Penitentiary Service accused him of parole violations. Navalny was sentenced to two and a half years in prison, but given the number of ongoing criminal cases against him, the opposition leader says he’s not counting the days until his release. To mark the anniversary of Alexey Navalny’s arrest, his supporters rallied in dozens of cities around the world to call for his freedom. Here’s what the rallies looked like from Moscow to Miami.

      • Yes, Mr. Debs, the Republican-Democratic Party is alive and well

        There’s just one problem with this line of thinking. It’s dead wrong.

        Just look at what the Democrats—who control both the executive and legislative branch of the federal government—have actually accomplished: They overwhelmingly voted for a bloated, wasteful $770 billion defense bill at a time when the USA is ostensibly in a rare moment of peace time.

      • Progressives Rail Against Sinema For Choosing Filibuster Over Voting Rights
      • Is Donald Trump the Antichrist?

        I passed on drawing a conclusion, but then the lines lit up with a steady stream of people over the next few hours offering their “proofs” that Trump was, in fact, the Evil One come to ravage the Earth. That first caller clearly hit a nerve.

        It’s a fascinating question, however, whether put literally or metaphorically.

      • Eight New Year’s Resolutions for NPR to Consider Now

        Resolution One: Apart from excellent features around the country and the world, NPR should give voice to what civic groups are doing to improve our country locally and nationally. NPR is heavy on entertainment and entertainers and needs to fill some of that airtime with news of the bedrock civic community in America. The imbalance is serious from the national to the local.

        Resolution Two: NPR features many reports and interviews on Race, but needs far more focus on Class. Class exploitation by the rich and powerful corporate supremacists feeds into racial discrimination. The euphemism used is “inequality,” but corporate-bred crime, fraud, and abuse affects all people indiscriminately, which often disproportionately harms minorities. A result of the gross imbalance of time devoted to race and not to class is that indiscriminate injustice is mostly ignored.

    • Misinformation/Disinformation

      • Substack: The new wretched hive of scum and quackery

        Over the nearly two years of the COVID-19 pandemic, we’ve been writing a lot about social media, particularly Facebook (excuse me, “Meta”), Twitter, YouTube, and Instagram (and now Tik Tok), as amplifiers of antivaccine misinformation. Part of the reason is that the pandemic finally—finally!—appears to have awakened public health authorities and government officials to how dangerous antivaccine misinformation and disinformation can be, after years and years of attempts by bloggers, as well as a relatively small number of academics, journalists, and health care professionals, to combat it without much support. As I said last week, everything old is new again, and, belated cries of, “Who could ever have seen this coming?” aside (the answer is: everyone who’s been paying attention), it’s important to assess the situation now, however we might have gotten here. This brings me to Substack. Remember how I used to refer to a certain antivaccine blog as a “wretched hive of scum and quackery” in homage to a line from Star Wars? Although there’s a lot of good writing on Substack, a byproduct of its freewheeling design and—shall we say?—lax attitude towards content guidelines, Substack has now become the new wretched hive of scum and quackery, something that is not entirely counterbalanced by the quality writing that’s there.

    • Civil Rights/Policing

      • UN Chief Urges Global Solidarity on Covid, Climate, and Debt Relief

        During a virtual event to open the notorious annual gathering of the World Economic Forum, United Nations Secretary-General António Guterres on Monday decried not only humanity’s poor handling of the coronavirus pandemic but also unequal economic recovery and inadequate climate action.

        “Stand with us as we shape a global financial system that works for all countries, not just the wealthy few.”

      • Interview With Shrishail Rana – Tweaking Technologies

        Shrishail Rana: Back in the days businesses were localized and used to serve a more stable population. However, with time the way individuals live their lives and use computers has advanced. No more system cleaners alone can do the needful. For complete system optimization and security, advanced tools with different options are the need of the hour. Having this idea in mind, Tweaking Technologies was, and the products it offers are designed. Each software offered by the company focuses on increasing productivity and offers system security and storage optimization. Our users know us for the quality and reliable apps we create and deliver.

      • Corporate Media Largely Ignore Labor Issues. Let’s Make Them Visible.
      • All Hail the Revolutionary King: Dr. Martin Luther King’s Challenge to the Democrats, as Biden Finally Speaks out on Voting Rights

        On January 11, 2022 President Joe Biden made an impassioned speech in support of the Voting Rights Act and against the right-wing fascist take-over. It was a critical speech in the fight between the center-right Democrats and the arch rights fascist Republicans and deserves our support.  But, once again we celebrate Dr. Martin Luther King’s birthday and fight to protect his revolutionary legacy from Democratic Party white washers, including their cover-up of their treachery against him when he was alive.

        The goal is to protect Dr. King’s historical legacy and explain Dr. King’s independence from the Democratic Party, his lifelong fight with the Democratic Party, and to call on “social justice groups” who have become adjuncts the Democratic Party to have the decency to look history squarely in the face. You don’t have to agree with Dr. King’s independence from the Democratic Party, his strong Black Liberation politics, his profound internationalism, anti-imperialist, and pro-communism, but please do not take the name of the Revolutionary Dr. King in vain or use him to advance the neo-liberal, anti-Black Democratic agenda.

      • Opinion | Martin Luther King’s Radicalism Would Not Be Celebrated Today

        As we mourn Martin Luther King Jr. and celebrate his life, we must remember that he was violently assassinated. His ideas were seen as radical and dangerous. He critiqued liberals and moderates and did not have the approval of most Americans. So what if we instead celebrate King as a leader who gave his life to a movement focused on Black people, on poor people, on labor activism and anti-war sentiments. What if we celebrate King as he was: a radical?

      • ‘No Celebration Without Legislation’: King Family Leads Voting Rights March

        With the Democratic Party on the verge of failure in Congress, the family of Martin Luther King Jr. on Monday joined with other civil rights advocates and faith leaders in Washington, D.C. to demand lawmakers pass national voting rights legislation.

        The MLK Day action comes amid a wave of voter suppression efforts advanced by Republican-controlled state legislatures and ongoing obstruction from right-wing Democratic Sens. Joe Manchin (D-W.Va.) and Kyrsten Sinema (D-Ariz.) to change the rules of the filibuster—the Senate’s 60-vote threshold rule that critics have dubbed a “Jim Crow relic” used to block key democracy reforms.

      • Martin Luther King Jr. and the Unfinished Work of Abolishing Poverty

        The Rev. Martin Luther King Jr. warned in an essay written shortly before his assassination on April 4, 1968, that turbulence and mounting anxiety in a profoundly unequal and deeply divided country could lead to a circumstance where “we’ll end up with a kind of rightwing take-over in the cities and a Fascist development, which will be terribly injurious to the whole nation.”

      • Opinion | What are the 25 Best Films About the Civil Rights Movement?

        Congress passed the Martin Luther King Day holiday to make sure that we remember the man and the movement. Both have been depicted in documentary films, but this list focuses on fictional movies about the civil rights movement and the Black experience, including some that describe people and events prior to the 1954 Supreme Court Brown v Board of Education ruling and the 1955 Montgomery bus boycott, which are often viewed as the key events that catalyzed the modern movement. Quite a few of these films, especially those made by independent producers outside the Hollywood system, are little-known, progressive, and deserve more recognition.

      • MLK Day Special: Dr. Martin Luther King Jr. in His Own Words

        Today is the federal holiday that honors Dr. Martin Luther King Jr. He was born January 15, 1929. He was assassinated April 4, 1968, at the Lorraine Motel in Memphis, Tennessee. He was just 39 years old. While Dr. King is primarily remembered as a civil rights leader, he also championed the cause of the poor and organized the Poor People’s Campaign to address issues of economic justice. Dr. King was also a fierce critic of U.S. foreign policy and the Vietnam War. We play his “Beyond Vietnam” speech, which he delivered at New York City’s Riverside Church on April 4, 1967, as well as his last speech, “I’ve Been to the Mountaintop,” that he gave on April 3, 1968, the night before he was assassinated.

      • MLK’s Poor People’s Campaign Isn’t Over. We’re Planning a Mass Protest for June.
      • Progressives Counter Cherry-Picked Quotes With MLK’s True Legacy

        As the FBI, right-wing political figures, and others came under fire Monday for engaging in the annual trend of dishonoring Martin Luther King Jr. by sanitizing his beliefs, progressives in Congress worked to honor his legacy of fighting for a more just society.

        “Let us not just celebrate the man, but remember the values and vision that motivated him.”

      • Opinion | As We Honor Dr. King, We Must Remember What He Truly Stood For

        The following is excerpted from an email Sen. Bernie Sanders (I-Vt.) sent to supporters on Martin Luther King Day, January 17, 2022.

      • Opinion | As Dr. King Understood, The Right to Vote Is Both a Moral and a Practical Imperative

        Voting rights and electoral fairness are currently the most contested issues in our extremely polarized political system. And the best way to advance these essential values is to make clear the inextricable link between the moral and the practical.

      • You Are Not One But Many

        Remembering Martin Luther King, Jr.

        Your deep voice still hangs in the air, Melting the cowardly silence. You are the one standing solidly there Looking straight in the face of violence.

      • Sinema’s MLK Day Tweet Sparks Online Fury

        Sen. Kyrsten Sinema set off a flurry of furious condemnation Monday with a tweet to commemorate Martin Luther King Jr. Day just days after she helped sink Democratic Party hopes to pass voting rights legislation.

        The tweet by the corporate Democrat from Arizona, stating that “today we remember the life and legacy of Dr. Martin Luther King, Jr.,” came as progressive lawmakers urged against remembrances of Dr. King that gloss over or ignore his radical legacy and vision.

      • The Time Is Now for the “Radical Revolution of Values” That MLK Called For
      • [Old] Mohamed Noor To Be Resentenced In Justine Ruszczyk Damond’s Shooting Death

        A former Minneapolis police officer who fatally shot an unarmed woman after she called 911 to report hearing a possible rape happening behind her home will be sentenced on a lesser charge Thursday after his murder conviction was overturned in a case that drew global attention and was fraught with the issue of race.

      • Billionaires ‘Had a Terrific Pandemic’ While Inequality Killed Millions: Oxfam

        Oxfam International’s latest report on global inequality finds that while the 10 richest individuals in the world more than doubled their collective wealth since Covid-19 hit in 2020, the related result of this billionaire surge has been a deadlier and more prolonged pandemic for the rest of the world in which the incomes of 99 percent of humanity fell, over 160 million people were forced into poverty, and billions of the poorest were denied access to life-saving vaccines. 

        “The predictability of it is sickening. The consequences of it kill.”

      • Wealth of richest 98 same as bottom 552 million, says Oxfam report

        India’s richest families saw their wealth reach a record high in 2021, even as 84 per cent of Indian households saw an income decline amid the pandemic, according to a report from non-profit Oxfam India titled ‘Inequality Kills’. It said the richest 98 Indians own the same wealth as the bottom 552 million people.

      • Wealth of world’s 10 richest men doubled in pandemic, Oxfam says

        Oxfam’s report, which was also based on data from the World Bank, said a lack of access to healthcare, hunger, gender-based violence and climate breakdown contributed to one death every four seconds.

        It said 160 million more people were living on less than $5.50 (£4.02) a day than would have been without the impact of the Covid pandemic.

        The World Bank uses $5.50 a day as a measure of poverty in upper-middle-income countries.

      • World’s 10 richest men doubled their wealth during pandemic, Oxfam reports

        The pandemic has plunged 160 million people into poverty, the charity added, with non-white ethnic minorities and women bearing the brunt of the impact as inequality soared.

        The report follows a December 2021 study by the group which found that the share of global wealth of the world’s richest people soared at a record pace during the pandemic.

      • Ten richest men double their fortunes in pandemic while incomes of 99 percent of humanity fall

        In a new briefing “Inequality Kills,” published today ahead of the World Economic Forum’s Davos Agenda, Oxfam says that inequality is contributing to the death of at least 21,000 people each day, or one person every four seconds. This is a conservative finding based on deaths globally from lack of access to healthcare, gender-based violence, hunger, and climate breakdown.

      • Palestinians remove Muslim from al-Aqsa after confusing him for a Jew

        Later on Friday afternoon, the guards at the site announced that they had been mistaken and that the man was actually a Muslim from abroad. The guards stated that they became suspicious due to the man’s failure to answer their questions. The guards referred to recent reports that a group of Jewish Israelis were disguising themselves as Muslims in order to freely enter the Temple Mount.

      • Indonesian woman flogged 100 times for adultery while her male partner receives just 15 lashes

        The man was sentenced to 30 lashes. But he appealed to the province’s Sharia court, which reduced his punishment to 15 lashes.

      • Christian woman accuses husband of detaining her in Islam theological centre

        The incident came to light when the woman complained to the Pothanikad police station against the husband Aslam, 33, of Kothamangalam, and his family members charging them with dowry harassment, wrongful confinement, and insulting modesty of a woman. The police registered a case on December 7, 2021, based on her complaint.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Copyrights

        • Copyright Law as the tool of choice for censorship and reputation management

          The purpose of copyright law is to induce and reward authors for their original work by extending property rights to the copyright holder and qualifying its reproduction. The two-fold rights this gives them includes primarily an economic right to derive financial reward for reproduction of their work, along with an ancillary moral right to prevent distorted reproductions of their work. Of late, however, there has been a shift in the use of copyright laws by copyright holders. Instead of fulfilment of economic objectives with the interest to protect original work, copyright holders weaponize copyright law as a tool to fulfil of non-economic objectives to vindicate non-copyright interests.This is often done to censor legitimate content, capitalizing on the fact that the copyright holders intellectual property was a part of the content itself, even though it may be insignificant to the final essence of the subject matter, or it may even qualify for fair use due to the purpose for which it was used. This article will discuss the motivation for individuals and business entities to shoehorn non-copyright claims within copyright law as opposed to any other speech regulation laws, share some examples of such copyright abuse for reputation management, and conclude by highlighting takedown transparency as a potentially useful next step in finding a way to rectify such complexities.

        • It’s Copyright Week 2022: Ten Years Later, How Has SOPA/PIPA Shaped Online Copyright Enforcement?

          Ten years ago, a diverse coalition of internet users, non-profit groups, and internet companies defeated the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA), bills that would have forced internet companies to blacklist and block websites accused of hosting copyright-infringing content. These were bills that would have made censorship very easy, all in the name of copyright enforcement. This collective action showed the world that the word of the few major companies who control film, music, and television can’t control internet policy for their own good.

          We celebrate Copyright Week every year on the anniversary of the internet blackout that finally got the message across: Team Internet will always stand up for itself.

          While SOPA and PIPA were ultimately defeated, their spirits live on. They live on in legislation like the CASE Act and the EU Copyright Directive. They live on in the use of copyright filters on major platforms, which exist because the largest entertainment companies insist on them. They live on every time you can’t fix a device you paid for and rightfully own. They live on in the licensing agreements that prevent us from owning digital goods.

        • Welcome to the Public Domain, Winnie-the-Pooh

          This year, the public domain opened up to include works from 1926 and a whopping 400,000 sound recordings. Of course, the real fun is that the third Hercule Poirot novel by Agatha Christie, Ernest Hemingway’s The Sun Also Rises, and the original books of Winnie-the-Pooh and Bambi are now free for anyone to use.

          In particular, the popular images of Winnie-the-Pooh and Bambi have been dominated by one rightsholder’s vision for a long time: Disney. And while Disney’s versions of those stories remain under copyright, their exclusive hold on two cornerstones of childhood has come to an end. This is a good thing—it lets those stories be reinterpreted and repurposed by people with different takes. We can all decide whether the Disney versions are the actual best ones or were simply the only ones.

          Public domain works can be used for such lofty goals. Or they can simply be used for fun, allowing anyone to participate in a worldwide sport of joy. With so many more uses suddenly available to so many more people, we get a flood of works and get to choose which ones we love most. And, of course, we can try our hand at joining in.

        • Assessing cultural heritage institutions’ needs related to CC’s public domain tools

          As part of our Open Culture / GLAM program’s celebration of Public Domain Day, we are reaching out to practitioners and experts working in galleries, libraries, archives and museums (GLAMs) to help create a clearer picture of the use of CCs’ public domain tools, CC0 and the Public Domain Mark (PDM). To do so, we are collecting information on understandings, issues, needs, wishes and expectations via a short survey in English, French and Spanish. 

        • Browser Extension Adds Sci-Hub Download Links to Publishers’ Websites

          As scientists and academics of all kinds turn to Sci-Hub to freely access scientific papers, a new browser tool aims to make access even more straightforward. Currently available from the Mozilla addon store but also compatible with Chrome, ‘Sci-Hub Injector’ embeds Sci-Hub download links into popular publishers’ websites.

        • VPN Provider Agrees to Block Torrent Traffic and The Pirate Bay on U.S. Servers

          VPN Unlimited has settled a copyright lawsuit filed by several movie companies. The VPN provider stood accused of failing to take action against subscribers who were pirating films. As part of the settlement, the company agreed to block BitTorrent traffic and prominent pirate sites including ‘Pirate Bay,’ ‘YTS’, and ‘RARBG’ on U.S. servers.


Links 17/1/2022: More Microsoft-Connected FUD Against Linux as Its Share Continues to Fall

Posted in News Roundup at 6:59 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • 6 Reasons to Pick Linux Over Windows

        Almost all students do their work on laptops and PCs that run on Windows. Of course, some of you are lucky enough to afford something that runs on Apple’s macOS. While Windows is a popular OS, it’s far from being perfect. Few students are even aware that their PCs and laptops can run on various operating systems.

        One of the alternatives students often overlook is Linux. Many believe that this OS is hard to manage. That’s why they prefer to either buy or, in some cases, pirate Microsoft’s creation unless it comes pre-installed on the device, of course.

        It’s true that Linux is harder to install than its counterpart. But it has a lot more to offer than meets the eye. So, what exactly sets it apart?

      • 2022 is not going to be the year of Linux on the desktop

        It has been the time of year again when Linux fanboys emerge from their dust-filled server rooms to declare that 2022 might be the year that their favourite operating system will replace Windows on the desktop.

        TechRepublic said that there was no “denying the continued dominance of Linux in the enterprise space and the very slow (and subtle) growth of Linux on the desktop. And in just about every space (minus the smartphone arena), Linux made some serious gains.”

        Developer Tim Wells insisted that the idea of the year of the Linux desktop is that there would come a year that the free and open source operating system would reach a stage that the average user could install and use it on their pc without running into problems.

    • Server

      • The Apache Weekly News Round-up: week ending 14 January 2022
      • January 2022 Web Server Survey [Ed: In Web servers, Microsoft down from 6.15% of top million domains to just 6.04% in one month]

        In the January 2022 survey we received responses from 1,167,715,133 sites across 269,835,071 unique domains and 11,700,892 web-facing computers. This reflects a loss of 1.15 million sites, but a gain of 1.51 million domains and 31,100 computers.

        nginx lost 7.33 million sites this month (-1.91%) but continues to be the most commonly used web server with 32.3% of all sites using it. Although nginx’s share has fallen, Apache is still more than eight percentage points behind after losing 3.70 million sites (-1.31%), which has taken its own market share down to 23.9%.

        nginx also leads in the domains metric, where it has a share of 26.6% compared with Apache’s 23.9%. This reflects a small reduction in nginx’s share – despite a modest gain of 25,400 domains – while Apache suffered the largest loss of 287,000 domains.

        The largest site and domain growth was seen by Pepyaka, which is a web server that has primarily been used by the Wix web development platform since it switched from using nginx in 2018. The number of sites using Pepyaka grew by 4.02 million to 7.30 million this month, while its domain count went up by 1.80 million to 3.30 million.

    • Audiocasts/Shows

      • LHS Episode #448: Grounding and Bonding Deep Dive

        Hello and welcome to the 448th installment of Linux in the Ham Shack. In this deep dive episode, the hosts invite guest Ward Silver, N0AX, who literally wrote the book on the subject to discuss every aspect of grounding and bonding. Topics range from household electrical safety to relative voltage, earth grounding, lighting mitigation and much more. Hope you find this episode interesting and informative as well as entertaining and also have a great week.

    • Kernel Space

      • Linux 5.17 Picks Up A Real-Time Analysis Tool – Phoronix

        A new tool added to the kernel source tree with Linux 5.17 is rtla to serve for real-time Linux performance and tracing analysis.

        Thanks to the work of kernel developer Daniel Bristot de Oliveira who is employed by Red Hat, the Real-Time Linux Analysis (RTLA) tool has been added to the kernel source tree.

        RTLA makes use of the Linux kernel’s tracing capabilities to help analyze performance and tracing data. In particular, the rtla command has sub-options for reading information from the kernel’s operating system noise “osnoise” and IRQ/thread timer latency “timerlat”tracers.

      • Some Tablets/Convertibles With Linux 5.17 Will Now Have Working Pen Support – Phoronix

        In addition to Linux 5.17 introducing Universal Stylus Initiative (USI) support for that new industry standard for styluses/pens that can work cross-device, the input subsystem updates for this kernel also add active pen support for a few more tablets.

        Moving forward hopefully we will see broad adoption of USI stylus support for nice cross-device compatibility and support. But for those with current tablets relying on Goodix or Silead drivers and have an active pen, the Linux 5.17 input subsystem updates present working pen support there with their respective devices.

      • Lenovo USB-C 7-in-1 Hub On Linux Review – Phoronix

        For those considering the Lenovo USB-C 7-in-1 Hub for connecting to your Lenovo laptop for enjoying USB-C power charging, HDMI output, and additional USB ports, it does work out on Linux. While there have been some users running into seemingly firmware-related issues, at least with my testing over the past month this $50~60 (USD) USB-C hub has been working out well under Linux.

      • Best of 2021 – Torvalds’ Bug Warning is a Lesson for Linux Users

        A recent, widely publicized case illustrated this point; Linux creator himself, Linus Torvalds, warned against the use of the Linux 5.12 release. He described a “nasty bug,” and wrote that the situation is a “mess,” due to the use of swap files when adding Linux updates. This nasty bug, in fact, had the potential to destroy entire root directories.

      • Epoch-alypse now: BBC iPlayer flaunts 2038 cutoff date • The Register

        Feeling old yet? Let the Reg ruin your day for you. We are now substantially closer to the 2038 problem (5,849 days) than it has been since the Year 2000 problem (yep, 8,049 days since Y2K).

        Why do we mention it? Well, thanks to keen-eyed Reg reader Calum Morrison, we’ve spotted a bit of the former, and a hint of what lies beneath the Beeb’s digital presence, when he sent in a snapshot that implies Old Auntie might be using a 32-bit Linux in iPlayer, and something with a kernel older than Linux 5.10, too.

      • Graphics Stack

        • Jason Ekstrand: Hello, Collabora!

          Ever since I announced that I was leaving Intel, there’s been a lot of speculation as to where I’d end up. I left it a bit quiet over the holidays but, now that we’re solidly in 2022, It’s time to let it spill. As of January 24, I’ll be at Collabora!

          For those of you that don’t know, Collabora is an open-source consultancy. They sell engineering services to companies who are making devices that run Linux and want to contribute to open-source technologies. They’ve worked on everything from automotive to gaming consoles to smart TVs to infotainment systems to VR platforms. I’m not an expert on what Collabora has done over the years so I’ll refer you to their brag sheet for that. Unlike some contract houses, Collabora doesn’t just do engineering for hire. They’re also an ideologically driven company that really believes in upstream and invests directly in upstream projects such as Mesa, Wayland, and others.

          My personal history with Collabora is as old as my history as an open-source software developer. My first real upstream work was on Wayland in early 2013. I jumped in with a cunning plan for running a graphics-enabled desktop Linux chroot on an Android device and absolutely no idea what I was getting myself into. Two of the people who not only helped me understand the underbelly of Linux window systems but also helped me learn to navigate the world of open-source software were Daniel Stone and Pekka Paalanen, both of whom were at Collabora then and still are today.

        • Collabora pulls in Jason Ekstrand to work on Linux graphics drivers | GamingOnLinux

          Jason Ekstrand, a name that many big Linux fans will know, who previously worked at Intel until very recently has announced today the move to open source consulting firm Collabora. Writing in a blog post, Ekstrand goes through some fun background on the decision to move and how it happened.

          Ekstrand has worked on a lot of different parts of Mesa, the set of open source graphics drivers that powers AMD GPUs, Intel, ARM and more.

    • Applications

      • Mumble 1.4 Released! New Plugin Framework, TalkingUI, PipeWire & Markdown Support | UbuntuHandbook

        The free open-source game chatting app Mumble released new major 1.4 version a day ago with exciting new features!

        Mumble is a high quality and low latency voice over IP (VoIP) app designed for gamers. By releasing v1.4.230, the first stable in v1.4, it now uses new versioning scheme of the form major.minor.build. The third component of version numbers may now much higher and discontinuous. Because there are snapshot (beta) builds in between stable versions.

        Mumber 1.4 introduced a new, general purpose plugin framework. Plugins are no longer restricted to positional data delivery and they can now be installed and updated at any time. See the documentation for more.

      • Mumble 1.4 Voice Chat App Released, Brings Many New Features

        For fans of the Mumble open-source VoIP communication program that is popular with gamers, Mumble 1.4 was released as their first major release in the last 2 years.

        Many multiplayer games offer text chat that gets in the way of gameplay by changing a player’s focus from playing the game to typing messages. Mumble is a powerful open-source client-server VoIP application that solves this problem. It’s available for all major platforms like Windows, Linux, and macOS.

        While it can be used for any kind of activity, it is primarily intended for gaming. It’s optimized for low-latency communications, making it perfect for intense game situations where every second counts. With Mumble, you can voice chat with your teammates, or anyone else, allowing you to stay focused on the game.

      • Open source voice-chat levels up with Mumble 1.4 out now | GamingOnLinux

        For those of you not wanting to use the likes of Discord for voice-chat, there’s also Mumble which is a free, open source, low latency, high quality voice chat application. It’s been around for a long time and it just had a big new stable release, the first of the Mumble 1.4.x series and it’s been over two years since the last. At least they didn’t leave us waiting ten years again like the 1.3 release huh?

        So what’s new? A lot! Of course there’s plenty of bug fixes, security updates and the usual assortment of smaller thing but a few bigger features were also added into this release.

      • Version 5.0 of the FFmpeg audio and video toolkit has been released.
      • FFmpeg 5.0 Aims To Be An LTS Release

        FFmpeg 5.0 has now been formally christened as for what is aiming to be a Long-Term Support (LTS) release for this widely-used, cross-platform and open-source multimedia library.

        FFmpeg 5.0 was tagged this weekend while out today is the formal announcement for this updated multimedia library that is widely depended upon throughout the industry.

      • Mini review – Annotator is a simple but powerful annotation tool for Linux – Real Linux User

        Some applications just need to be big and have to offer an extensive array of functionality to be of the right value for specific use cases, like LibreOffice, Krita. darktable and GIMP. But there are many situations that only require the right amount of functionality and nothing more. There are many very powerful mini apps available for Linux that only focus on a specific task and do that perfectly well. In this article you find a mini review for the application Annotator, a simple but powerful annotation tool for Linux.

        Annotator is a single task application originally developed by Trevor Williams for the elementary OS platform, but since it is available in Flatpak format it can be used on any other Linux distribution.

        Annotator is, as the name already suggests, an annotation tool. So the first question you probably have is what exactly annotation is and what do you need it for. It is actually very simple: an annotation is a note, an explanation, a side note, an indication, a clarification, or caption, which should ensure that the main text, screenshots, etc. or parts thereof are extra clarified, highlighted or brought under the required attention. The application Annotator is exactly doing that for image files (like screenshots, etc) in a simple and effective way. Annotator is not created for annotations on text files and documents.

      • The 8 Best Linux Download Managers for Faster Downloads

        No one likes to wait for slow downloads. Install these eight download managers to get lightning-fast download speed on Linux.

        But did you know that there are several open-source download managers for Linux currently in the market? As a Linux user, you must check out the following download managers that help extend the open-source ethic of Linux and rival premium alternatives in terms of efficiency and related features.

      • Best Free and Open Source Alternatives to Atlassian Jira – LinuxLinks

        Atlassian Corporation Plc is a software company founded in 2002 that develops products for software developers, project managers and other software development teams. It employs over 7,000 people and is headquartered in Sydney, Australia.

        Atlassian produces a range of proprietary software including software for collaboration, development, and issue tracking software for teams. Atlassian dominates several markets where it still has intense competition.

        Broadly speaking, they offer software in three large buckets: These are software development tools; help desk software, or IT service management; and workflow management software. When you think of Atlassian, think project management and collaboration tools.

        Many of their programs use a number of open source components. And their GitHub repositories hold lots of open source code. But their main range of software is proprietary. This series looks at free and open source alternatives to Atlassian’s products.

      • Micro: Modern and Intuitive Terminal-Based Text Editor

        Nano isn’t good as it should be, while vim seems quite complex for the beginner. There are many Text Editor for Linux users, and choosing the best one is quite debatable.

      • AuthPass is a KeePass compatible free Password manager for Windows, macOS, and Linux

        AuthPass is a multi-platform, free, and open-source password manager for all types of users.

        AuthPass is fully compatible with the popular open-source KeePass password manager, which many consider the father of open-source password managers.

        The app is written with Flutter which is gaining popularity among developers building for building mobile, desktop, and web apps.

    • Instructionals/Technical

      • Easily Understand Your Linux RAM Usage With Smem

        Linux memory usage can be difficult to interpret and hard to understand. With smem it’s easy to find out what memory a process is using, and which processes are using the most.

      • 5 scripts for getting started with the Nmap Scripting Engine | Enable Sysadmin

        Nmap is a popular tool for scanning and monitoring networks. There are many ways to find information using Nmap, from blogs and articles to formal training. Yet few of these learning tools discuss one of Nmap’s most powerful features: The Nmap Scripting Engine (NSE).

        What is the NSE? This tool does two things. First, it allows the nmap command to accept options that specify scripted procedures as part of a scan. Second, it enables Nmap users to author and share scripts, which provides a robust and ever-evolving library of preconfigured scans.

      • Bash 02 – Variables and Such | Linux.org

        Within BASH, you can use variables. Variables are names that can represent specific information. If you remember your days in math, specifically some stage of algebra, you may recall variables. There were all the letters of the alphabet, mainly X and Y. In BASH, we can use variable names, not just letters.

        We will cover other topics to help manipulate the variables and even perform math functions. These can help you make better BASH Scripts that will calculate and manipulate data.

      • Different types of Backups

        In my previous post, I explained how I recently set up backups for my home server to be synced using Amazon’s services. I received a (correct) comment on that by Iustin Pop which pointed out that while it is reasonably cheap to upload data into Amazon’s offering, the reverse — extracting data — is not as cheap.

        He is right, in that extracting data from S3 Glacier Deep Archive costs over an order of magnitude more than it costs to store it there on a monthly basis — in my case, I expect to have to pay somewhere in the vicinity of 300-400 USD for a full restore. However, I do not consider this to be a major problem, as these backups are only to fulfill the rarer of the two types of backups cases.

        There are two reasons why you should have backups.

        The first is the most common one: “oops, I shouldn’t have deleted that file”. This happens reasonably often; people will occasionally delete or edit a file that they did not mean to, and then they will want to recover their data. At my first job, a significant part of my job was to handle recovery requests from users who had accidentally deleted a file that they still needed.

      • Record your terminal session with Asciinema | Opensource.com

        Support calls are important and often satisfying in the end, but the act of clear communication can be arduous for everyone involved. If you’ve ever been on a support call, you’ve probably spent several minutes spelling out even the shortest commands and explaining in detail where the spaces and returns fall. While it’s often easier to just seize control of a user’s computer, that’s not really the best way to educate. What you might try instead is sending a user a screen recording, but one that they can copy commands from and paste into their own terminal.

        Asciinema is an open source terminal session recorder. Similar to the script and scriptreplay commands, Asciinema records exactly what your terminal displays. It saves your “movie” recording to a text file and then replays it on demand. You can upload your movie to Asciinema.org and share them just as you would any other video on the internet, and you can even embed your movie into a webpage.

      • ​How to Upgrade Debian 10 Buster to Debian 11 Bullseye

        After more than two years of development, the new Debian stable version, Debian 11 codenamed “Bullseye”, was released on August 14, 2021, and it will be supported for five years.

        This release comes with a lot of new packages and major software upgrades. Debian 11 bullseye ships with Linux 5.10 LTS kernel with support for the exFAT filesystem and includes a newer version of desktop environments.
        This article shows how to upgrade your Debian 10 Buster system to Debian 11, Bullseye via command line.

      • How to Install and Setup MERN Stack with Nginx on Ubuntu 20.04

        Since this post shares cloud strategies with awesome people like you, naturally this post may contain affiliate links for products I use and love. If you click on those links and make a purchase, I’ll earn some coffee money which I promise to drink while creating more helpful content like this.

      • How to Install Zabbix Agent on Rocky Linux/Alma Linux 8

        A Zabbix agent is a program that runs on a remote machine that needs to be monitored through the Zabbix server. The agent collects the data on the remote server and send back to Zabbix server when requested. Zabbix agent must be installed on all the remote systems that need to be monitor through the Zabbix server.

      • How To Install and Configure Zabbix Agent on Ubuntu 20.04

        A Zabbix agent is a program that runs on a remote machine that needs to be monitored through the Zabbix server. The agent collects the data on the remote server and send back to Zabbix server when requested. Zabbix agent must be installed on all the remote systems that need to be monitor through the Zabbix server.

      • How to Install Lighttpd with PHP in Ubuntu 20.04

        The concept of web servers has crossed the minds of most, if not all, Linux enthusiasts; especially the ones interested in pursuing web-based projects and careers. Due to the numerous web servers offered to the Linux community, you might feel like tossing a coin or rolling a dice to find the one that ‘might’ suit your web-based needs.

        Lighttpd is best attributed as a compatible, very flexible, fast, and secure web server. It is therefore optimized for high performance on whichever operating system environment hosts it.

        Also, this web server is indeed light such that it needs very few resources to run or execute its functional objectives like handling AJAX applications. This web server is BSD licensed, open-source, with flawless compatibility on UNIX-like systems.

        This article seeks to walk you through the installation and configuration of Lighttpd as an ideal web server for your Ubuntu 20.04 operating system.

      • How to self-host a Python package index using Pulp | Red Hat Developer

        Find out how developer teams use Pulp to maintain and share their own Python package repositories. Examples are based on the Operate First deployment.

      • How To Install Kate Editor on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Kate Editor on Ubuntu 20.04 LTS. For those of you who didn’t know, The Kate Text Editor is an open-source and free text editor application that stands for KDE Advanced Text Editor. Kate lets you edit and view many files at the same time, both in tabs and split views, and comes with a wide variety of plugins, including an embedded terminal that lets you launch console commands directly from Kate. Kate editor is a cross-platform application available for Linux, MacOS & Microsoft Windows, It is available for both 32 bit and 64 bit operating systems.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of Kate Editor on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • How to Change Desktop Themes on Linux Mint

        Linux Mint is a great Linux distro for anyone starting out with Linux. It comes in three different flavors: Cinnamon, MATE, and Xfce, each catering to a different audience.

        Over the years, Linux Mint has undergone several changes, including a few cosmetic alterations that are a departure from its original visual appearance. As part of this change, Mint now lets you choose from a wide range of themes to customize your desktop to your preference.

        If you’re just getting started with Mint, here’s a guide demonstrating all the different ways to change themes.

      • How to install and use Firewalld on Almalinux 8 – Linux Shout

        Firewalls are one of the most essential parts of security when we are going online. Here we learn the steps and command to install, configure, and how to use FirewallD on AlmaLinux 8 using CLI or GUI.

        Many of us who are not already Linux would already be familiar with the firewall feature on Windows, where it is very easy to turn On or Off ports or services using GUI. However, what about Linux such as CentOS, Rocky Linux, RedHat, AlmaLinux, and more… If you are using full Linux Desktop then a firewall would already be there but in most of the cases without a graphical interface. Nevertheless, Debian, RedHat, Ubuntu, and other Linux systems provide the appropriate firewall GUI software directly from their respective repository to manage things with the help of mouse clicks.

        But what if you just want a basic OS installation with no graphical interface? Because minimal versions of Linux would not even have the CLI version of Firewall by default. Well, this is a very small problem, if you have an active internet connection and due to an in-built package manager under Linux, we can install a firewall with just a single command.

      • How to use Terraform Taint and Untaint – buildVirtual

        The Terraform taint and untaint commands are important to be aware of if you are a regular user of Terraform. The Terraform Taint command allows you to manually flag a resource as tainted, which means it will be destroyed and recreated on the next terraform apply. Terraform untaint allows you to remove that tainted condition from the resource.

        So, why is that useful? What are the use cases for terraform taint?

    • Games

      • Love cracking locks? Check out Museum of Mechanics: Lockpicking | GamingOnLinux

        Museum of Mechanics: Lockpicking is a wonderful little idea to bring together many different ways to crack locks from various styles in video games. Perhaps one of the greatest foes in gaming – the lock. Now it’s time to beat it in many different forms.

      • Humble decides to BETRAY Linux gamers… and the rest of their paying customers, too. – Invidious
      • GOG finally update their store browsing with new filters | GamingOnLinux

        Game store GOG.com has finally updated the browsing experience for those of you who prefer getting your games there.

        When you go to search for a game now, much like Steam, there’s plenty of new options to help sort through masses of games. It was a needed refresh too, since GOG has grown to have over 5,500 titles available across different platforms. When you go to the store pages you will now be able to filter across price range, genres, release date range, and a newly introduced tags system.

      • After 12 years development, business sim GearCity is officially out now | GamingOnLinux

        Built with FOSS tooling, GearCity is a complex and in-depth business simulator where you run your own car company. Developed by Visual Entertainment And Technologies, which is a solo outfit of just Eric Jones who outsourced some parts to contractors for artwork, translations, music and a few other bits.

        “GearCity is a realistic historically focused economic simulation of the global automobile industry. Unlike tycoon games, GearCity has not been simplified. It is a complex, realistic, in-depth management sim that will take several hours to grasp and hundreds of hours to master. Thousands of players across the globe and industry professionals from automotive engineers to economics professors have praised the game’s intricate details.”

      • Wii U emulator Cemu plans to go open source and support Linux | GamingOnLinux

        Most emulators nowadays have their source code nicely open, and the vast majority of them fully support Linux too but Cemu has been a bit of a holdout. Not for long though.

        On their official roadmap, which many people emailed in excitedly, they put up their plans and who can blame people for being excited on this? Scrolling down a bit, a Linux port is clearly mentioned. It has been an “ongoing side-project” already but quite slow as it was low-priority and it depended on other things being done. The good news is that they say it’s about “70%” of the way there already. Having Linux support of course will also be great for the Steam Deck, since it comes with SteamOS 3 (based on Arch Linux).

      • Popular Nintendo Video Game Emulator ‘Cemu’ Plans to Go Open-Source with Linux Support – It’s FOSS News

        If you’re into retro gaming, you may have come across retro console emulators. For those unaware, they are basically software or hardware that allow the host system to run games designed for another system.

        Lately, Cemu has managed to grab the attention of the open-source community. It is one of the many retro console emulators out there that lets you play games tailored for Nintendo Wii U. However, as of now, it distinguishes itself from most of them in one major aspect, its closed-source nature, but that’s about to change.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.24 Beta goes live with protection to stop Discover removing Plasma | GamingOnLinux

          The latest release of the KDE Plasma desktop is close with the Plasma 5.24 Beta going live now with plenty of new features and fixes for this customizable environment. A full release is planned for February 8.

          Along with a lot of bug fixes, there’s plenty of quality of life fixes across the whole desktop. The Breeze theme for example, will now properly respect your choice of accent colours for Folders, the Breeze colour scheme is now called “Breeze Classic” to distinguish from Breeze Light and Breeze Dark and more. The notification system also saw some updates. so that important notifications have a small orange strip to bring more attention to them, notifications about video files now display a thumbnail in the notification and when sending or receiving files via Bluetooth, a system notification is now always shown.

      • GNOME Desktop/GTK

        • GNOME Boxes review: no-frills and no-thrills desktop virtualization

          GNOME Boxes is an easy-to-use graphical virtual machine (VM) installer and launcher. It’s not a VM manager and offers practically no settings for micromanaging your VM. However, its easy-to-use design philosophy can also prevent its users from getting any use out of it.

          Boxes is built on top of Linux’s excellent KVM+QEMU/libvirt virtualization stack. The app is intended for users who’re overwhelmed by such alphabet-soups and just want to run a visualized operating system.

          KVM is a virtualization system from the Linux kernel project. You can expect high performance and a smoother upgrade experience compared to third-party alternatives like VirtualBox. QEMU and libvirt add management layers on top of KVM. Boxes sit on top of these tools.

          You’ll likely find references to Boxes being used to manage remote desktop sessions to remote machines. This functionality has been moved into the new Connections app. I believe it was a good decision to split the two use cases into separate apps. Connections looks and behaves almost identically to Boxes.

          The app is great for managing virtual machines with other recent versions of Linux. Everything works out of the box if you choose one of its presets for popular Linux distributions. You’re presumably already running Linux, so the end-users are maybe more likely to want to emulate Windows?

    • Distributions

      • Arch Family

        • 5 Great AUR Helpers for Arch Linux

          Arch Linux is the kind of Linux distro that gives you a scalpel and says, “have at it” without much of the hand-holding that other distros like Debian/Fedora provide. Its initial toolset, including the core/extra/community repositories provided by its signature package manager, may be limited, but that is intentional.

          It’s up to you to add what you want to it, and that is where the Arch User Repository (AUR) comes in useful. It is a repository that allows users to make their own PKGBUILD scripts and create packages that are not included in the official repositories. If you’ve ever wondered how you could get WhatsApp for Linux, Session, Slack, or other apps working on Arch, the AUR is where all of these are located.

      • IBM/Red Hat/Fedora

        • Using the no-cost Developer Subscription with the new Red Hat Enterprise Linux Image Builder hosted service

          We recently published “Introducing the hosted beta experience Red Hat Enterprise Linux Image Builder,” hosted service as part of the Insights application suite. As a followup to that exciting announcement, we are pleased to share that this new service can be used with the no-cost Developer Subscription for Individuals, providing the benefits of Red Hat Enterprise Linux, Insights, and simple OS image creation to everyone!

          More information about this subscription offering is on Red Hat Developer site, “No-cost Red Hat Enterprise Linux Individual Developer Subscription: FAQs.”

          Access to Image Builder requires a Red Hat account and at least one subscription of Red Hat Enterprise Linux. If you do not have either of these, you can easily request them at no cost.

        • Reduce the size of container images with DockerSlim | Red Hat Developer

          Containers are a great way to package your applications. Packaging your application codebase together with its dependencies creates a container image. The smaller the container image is, the faster your application will spin up for the first time, and the faster it will scale. But many container images are quite large, in the hundreds of megabytes—just search Docker Hub and prepare to be amazed at the image sizes.

          In this article, you’ll learn how to optimize Docker container images for size using a project called DockerSlim. DockerSlim, which is open sourced under the Apache 2.0 license, won’t change anything in your container image, but can still reduce its size—or minify it—by up to a factor of 30. For applications written in compiled languages, the size reduction can be even more dramatic. DockerSlim also makes your packages more secure by reducing the available attack surface.

        • 5 Kubernetes trends to watch in 2022 | The Enterprisers Project

          Kubernetes is growing up – and so are the teams that have been using it since its younger years.

          Those earlier adopters are coming into their own now, able to build on their experience and the growth of the cloud-native ecosystem to extend Kubernetes core capabilities in new ways.

          “We will continue to scale and expand our use of Kubernetes to address the hybrid, multi-cloud needs of our business,” says Eric ​​Drobisewski, senior architect at Liberty Mutual. “As we look ahead, the declarative API and strong reconciliation loop that Kubernetes provides will continue to be critical to unify and bring a more consistent approach to how we define, manage, and secure our digital capabilities across public and private cloud environments.”

          The Fortune 100 company’s accelerating Kubernetes usage as a platform for its broader hybrid cloud/multi-cloud infrastructure reflects one of the macro trends fueling soaring Kubernetes adoption across industries.

        • Linux Foundation, Red Hat Join Supply Chain Security Summit

          Last week the White House convened government and private sector stakeholders to discuss initiatives to improve the security of open source software and ways new collaboration could drive improvements.

        • Restarting and Offline Updates – Fedora Magazine

          A recurring question that goes around the internet is why Fedora Linux has to restart for updates. The truth is, Linux technically doesn’t need to restart for updates. But there is more than meets the eye. In this short guide we’ll look into why Fedora Linux asks you to restart for offline updates.

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Enforcing the pyramid of Open Source | daniel.haxx.se

        The well-known log4j security vulnerability of December 2021 triggered a lot of renewed discussions around software supply chain security, and sometimes it has also been said to be an Open Source related issue.

        This was not the first software component to have a serious security flaw, and it will not be the last.

        What can we do about it?

        This is the 10,000 dollar question that is really hard to answer. In this post I hope to help putting some light on to why it is such a hard problem. This comes from my view as an Open Source author and contributor since almost three decades now.

        In this post I’m going to talk about security as in how we make our products have less bugs in the code we write and land on purpose. There is also a lot to be said about infrastructure problems such as consumers not verifying dependencies so that when malicious actors purposely destroy a component, users of that don’t notice the problem or supply chain security issues that risk letting bad actors insert malicious code into components. But those are not covered in this blog post!

      • Content Management Systems (CMS)

      • Programming/Development

        • QuatBot released – Matrix Meeting Manager

          QuatBot is a Bot for use in text-chat. So there are no pretty screenshots of it in action, or what the UI looks like: pick your favorite Matrix client (I switch between nheko and neochat depending on which has a more recent release fixing bugs that annoy me).

        • AIfES releases exciting new version of TinyML library for Arduino

          Last July AIfES (Artificial Intelligence for Embedded Systems) from the Fraunhofer Institute for Microelectronic Circuits and Systems (IMS) was launched. This open source solution makes it possible to run, and even train, artificial neural networks (ANN) on almost any hardware, including the Arduino UNO.

          The team hasn’t stopped work on this exciting machine learning platform, and an update just landed that you’ll definitely want to check out.

        • Drew DeVault’s blog: Status update, January 2022

          I also implemented an efficient path manipulation module for the standard library (something I would really have liked to have in C!), and progress continues on date/time support. We also have a new MIME module (just for Media Types, not all of MIME) and I expect a patch implementing net::uri to arrive in my inbox soon. I also finished up cmsg support (for sendmsg and recvmsg), which is necessary for the Wayland implementation I’m working on (and was a major pain in the ass). I spent some time working with another collaborator, who is developing a RISC-V kernel in our language, implementing a serial driver for the SiFive UART, plus improving the device tree loader and UEFI support.

        • Project audit experiences | Will’s Blog

          Back in January 2020, I wrote How to pick up a project with an audit. I received some comments about it over the last couple of years, but I don’t think I really did anything with them. Then Sumana sent an email asking whether I’d blogged about my experiences auditing projects and estimating how long it takes and things like that.

        • Hack The Web Without A Browser | Hackaday

          It is a classic problem. You want data for use in your program but it is on a webpage. Some websites have an API, of course, but usually, you are on your own. You can load the whole page via HTTP and parse it. Or you can use some tools to “scrape” the site. One interesting way to do this is woob — web outside of browsers.

        • The new Qt Quick Compiler technology

          It’s been a while since we’ve heard about what goes on inside and around Qt QML, our engine to interpret the QML language (not counting the recent announcement, that is). The last post strictly about this topic was what Lars wrote in 2018.

          We’ve been so silent because we’ve been prototyping new ways to make your QML run faster, and some of them turned out to be dead ends. There is no tracing JIT after all. This isn’t cool, so we were somewhat silent. But now there is something to say. And, mind you, it’s not cool either. It’s hot. But let me take a step back first.

        • Perl/Raku

        • Shell/Bash/Zsh/Ksh

          • Bash scripting(III)

            This is the third article of a series focused in Gnu Bash scripting. On the first article we’ve just created a simple script with commands, one after another. We also saw some variables use.
            The second article covered some bash control structures. This one will cover redirections, pipes, and command substitution.

  • Leftovers

    • Hardware

      • A Dodgy Dial Gets A Teardown And Some Oil | Hackaday

        The pulse-dial telephone and its associated mechanical exchange represents the pinnacle of late-19th and early-20th century electromechanical technology, but its vestiges have disappeared from view with astonishing rapidity. [Matthew Harrold] is a telecoms enthusiast who’s been kind enough to share with us the teardown and refurbishment of that most signature of pulse-dial components, a telephone dial. In this case it’s on a rather unusual instrument, a British GPO outdoor phone that would have been seen in all kinds of industrial and safety installations back in the day and can probably still be found in the wild today if you know where to look.

      • 3D Printed Magnetic Switches Promise Truly Custom Keyboards | Hackaday

        While most people are happy to type away at whatever keyboard their machine came with, for the keyboard enthusiast, there’s no stone to be left unturned in the quest for the perfect key switch mechanism. Enter [Riskable], with an innovative design for a 3D printed mechanism that delivers near-infinite adjustment without the use of springs or metallic contacts.

        The switching itself is performed by a Hall effect sensor, the specifics of which are detailed in a second repository. The primary project simply represents the printed components and magnets which make up the switch mechanism. Each switch uses three 4 x 2 mm magnets, a static one mounted on the switch housing and two on the switch’s moving slider. One is mounted below the static magnet oriented to attract it, while the other is above and repels it.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Monday [LWN.net]

            Security updates have been issued by Debian (chromium, firefox-esr, ghostscript, libreswan, prosody, sphinxsearch, thunderbird, and uriparser), Fedora (cryptsetup, flatpak, kernel, mingw-uriparser, python-celery, python-kombu, and uriparser), Mageia (htmldoc, mbedtls, openexr, perl-CPAN, systemd, thunderbird, and vim), openSUSE (chromium and prosody), Red Hat (httpd, kernel, and samba), Scientific Linux (kernel), Slackware (expat), SUSE (ghostscript), and Ubuntu (pillow).

          • Domestic CCTV and audio recording | Pen Test Partners

            Last week, we had BBC Morning Live in to film a piece on the legalities and challenges of domestic CCTV systems. You can watch it on iPlayer here, starting at 10:30.

            It was sparked by a conversation we had with Radio 4 before Xmas, where a journalist had taken an interest in CCTV systems exposed on insecam.org.

            We had helped the journalist identify the homeowner with an exposed CCTV stream & they went to speak to them about it. Unsurprisingly, the homeowner had installed the system & left it exposed with default credentials. Whilst they could review their CCTV footage remotely on a mobile app, so could anyone else…

            It ended well though, as the homeowner took the system offline and secured it. One less exposed CCTV camera! The radio piece is here.

            As a reminder, if you don’t set a good, strong password for your CCTV system that you don’t use elsewhere, you run the risk of it being exposed and/or accessed remotely by nefarious parties.

          • Data & Society — Bounty Everything: Hackers and the Making of the Global Bug Marketplace

            In Bounty Everything: Hackers and the Making of the Global Bug Marketplace, researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs—programs that hire hackers to discover and report bugs or other vulnerabilities in their systems. This report illuminates the risks and insecurities for hackers as gig workers, and how bounty programs rely on vulnerable workers to fix their vulnerable systems.
            Ellis and Stevens’s research offers a historical overview of bounty programs and an analysis of contemporary bug bounty platforms​​—the new intermediaries that now structure the vast majority of bounty work. The report draws directly from interviews with hackers, who recount that bounty programs seem willing to integrate a diverse workforce in their practices, but only on terms that deny them the job security and access enjoyed by core security workforces. These inequities go far beyond the difference experienced by temporary and permanent employees at companies such as Google and Apple, contend the authors. The global bug bounty workforce is doing piecework—they are paid for each bug, and the conditions under which a bug is paid vary greatly from one company to the next.
            Bounty Everything offers to reimagine how bounty programs can better serve the interests of both computer security and the workers that protect our digital world. Ellis & Stevens argue that if bounty programs are not designed and implemented properly, “this model can ironically perpetuate a world full of bugs that uses a global pool of insecure workers to prop up a business model centered on rapid iteration and perpetual beta.”

          • An Examination of the Bug Bounty Marketplace
          • Freexian’s report about Debian Long Term Support, December 2021

            Every month we review the work funded by Freexian’s Debian LTS offering. Please find the report for December below.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

          • Privacy/Surveillance

    • Monopolies

      • Senators Should Avoid Making the Digital Economy More European – Disruptive Competition Project

        After years of calls from European leaders to introduce more industrial policy into competition enforcement, to promote the creation of national champions, and to assert European “digital sovereignty” (i.e. protectionism and increased barriers to trade), the European Commission introduced the Digital Markets Act (DMA) in December of 2020. The legislation is designed to create “contestability” for European digital rivals, and “fairness” for European business users of platform services, by imposing a series of obligations on companies designated as “gatekeepers”.

        European lawmakers have been quite explicit in their desire to target only U.S. platforms with the law’s obligations. These one-size-fits-all obligations are designed to make the designated “gatekeepers” less competitive, to open up their technology and infrastructure to rivals (sometimes for free), to share user data, and to redesign their products and services in ways that will make it easier for European businesses to compete. The DMA would prohibit a range of behaviour that is known to be pro-competitive and to create value for platform users, effectively giving rivals a leg-up competitively at gatekeepers’ expense. The allegedly pro-competitive effects of the DMA are built on questionable assumptions, at best.

Links 17/1/2022: digiKam 7.5.0 and GhostBSD 22.01.12 Released

Posted in News Roundup at 11:31 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • Install Linux Kernel 5.16 on Pop!_OS 20.04 – LinuxCapable

        Linux kernel 5.16 has many new features, support, and security. The Linux 5.16 kernel release has a great new feature, FUTEX2, or futex_watv(), which aims to improve the Linux gaming experience, growing considerably with better native Linux porting for Windows games utilizing Wine.

        Other improvements have seen write include improved write congestion management, task scheduler for CPU clusters sharing L2/L3 cache, amongst many other additions. More information can be found on the Linux 5.16 Kernel release changelog.

      • Rust For Linux Kernel Patches Revised With Upgraded Rust Toolchain, Build Improvements

        Miguel Ojeda has published his third iteration of the patches implementing the basic infrastructure for supporting the Rust programming language within the Linux kernel.

        Back in December were the v2 patches and now just over one month layer the version 3 patches are ready for testing.

        The updated Rust for Linux kernel code now moves to Rust 1.58 as the compiler version targeted, automatic detection whether a suitable Rust toolchain is available, other build system improvements, and improved documentation as well as other general code clean-ups and improvements.

      • Developer Steps Up Wanting To Maintain Linux’s FBDEV Subsystem – Phoronix

        The Linux kernel’s frame-buffer device “FBDEV” subsystem has thankfully been on the decline over the past number of years thanks to the success of the more useful DRM/KMS drivers and having FBDEV compatibility emulation support. While not actively maintained, the FBDEV subsystem and some drivers remain within the Linux kernel and are used with some interest primarily in some legacy/embedded environments. The subsystem was orphaned while now a Linux kernel developer has stepped up to serve as its maintainer.

      • Linux 5.16.1
        I'm announcing the release of the 5.16.1 kernel.
        All users of the 5.16 kernel series must upgrade.
        The updated 5.16.y git tree can be found at:
        	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.16.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • Linux 5.15.15
      • Linux 5.10.92
      • Linux 5.4.172
    • Applications

      • FFmpeg 5.0 “Lorentz”

        FFmpeg 5.0 “Lorentz”, a new major release, is now available! For this long-overdue release, a major effort underwent to remove the old encode/decode APIs and replace them with an N:M-based API, the entire libavresample library was removed, libswscale has a new, easier to use AVframe-based API, the Vulkan code was much improved, many new filters were added, including libplacebo integration, and finally, DoVi support was added, including tonemapping and remuxing. The default AAC encoder settings were also changed to improve quality. Some of the changelog highlights…

    • Instructionals/Technical

      • Do you need to manage your money properly? Install Akaunting on Debian 11!

        Hello, friends. In this post, you will learn how to install Akaunting on Debian 11. Thanks to it, you will be able to manage your money properly. Let’s go for

      • Install & Configure Gitlab on Ubuntu 20.04 LTS – LinuxCapable

        GitLab is a free and open-source web-based code repository for collaborative software development for DevOps, written in Ruby and Go programming languages. GitLab’s main motto is “Bring velocity with confidence, security without sacrifice, and visibility into DevOps success.” It is quite a popular alternative to GitHub providing wiki, issue-tracking, and continuous integration and deployment pipeline features, using an open-source license, developed by GitLab Inc.

        In the following tutorial, you will learn how to install and configure Gitlab on Ubuntu 20.04 LTS Focal Fossa Desktop or Server, along with how to get started by logging in with root so you can begin setting up GitLab to your liking or for your team’s requirements.

      • How to Install and Configure Zabbix Server 5 on Rocky Linux/Alma Linux 8

        Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption. Zabbix has a rich set of features to enable users to monitor more than just hosts, offering great flexibility to administrators when it comes to choosing the most suitable option for each situation.

        Zabbix uses XML based template which contains elements to monitor. The backend of Zabbix is written in C programming and PHP is used for the web frontend. Zabbix can send you alerts to notify the different events and issues based on metrics and thresholds defined for your IT environment. It supports agent-based and agentless monitoring. But Zabbix agents installation can help you to get detailed monitoring e.g. CPU load, network, disk space utilization.

        As of the writting of this article, the latest Zabbix version is 5.4. In this guide, we will learn how to install and configure Zabbix on Rocky Linux 8. This guide also works for other RHEL 8 based systems like Oracle Linux 8 and Alma Linux 8.

      • How to enable/disable wayland on Ubuntu 22.04 Desktop

        Wayland is a communication protocol that specifies the communication between a display server and its clients. By default the Ubuntu 22.04 Jammy Jellyfish desktop already uses Wayland but it’s also possible to load to Xorg display server instead.

        In this tutorial, you will see how to disable and enable Wayland in Ubuntu 22.04 Jammy Jellyfish.

      • How to install Gnome Shell Extensions on Ubuntu 22.04 Jammy Jellyfish Linux Desktop

        The functionalities of the GNOME desktop environment can be expanded by downloading GNOME shell extensions. These are plugins written and submitted by normal users and developers that seek to improve the desktop environment and want to share their extension with other users.

        In this tutorial, you will learn how to install Gnome Shell Extensions on Ubuntu 22.04 Jammy Jellyfish Desktop.

      • How to install, uninstall and update Firefox on Ubuntu 22.04 Jammy Jellyfish Linux

        Every Ubuntu user that uses a graphical interface will have to interact with Mozilla Firefox in some capacity, since it’s the default internet browser on Ubuntu 22.04 Jammy Jellyfish. Even if you just want to uninstall it and use a different browser, you’ll at least be dealing with it for a short time. In this guide, we’ll show you how you can install, update, and uninstall Firefox on Ubuntu 22.04.

      • Install Python 2 on Ubuntu 22.04 Jammy Jellyfish Linux

        This tutorial will show how to install Python 2 for Ubuntu 22.04 Jammy Jellyfish. Python 2 has not been the default installed version on Ubuntu versions for a few years, but it’s still possible to install Python 2 and to install Python 2.7 on Ubuntu 22.04.

        Follow the step by step instructions below to see how to install Python 2 and use it as the default Python interpreter on Ubuntu 22.04 Jammy Jellyfish.

      • How to customize dock panel on Ubuntu 22.04 Jammy Jellyfish Linux

        In this article, we will show you a few methods for customizing the dock panel in the default GNOME desktop environment on Ubuntu 22.04 Jammy Jellyfish Linux.

        GNOME is the default desktop environment for Ubuntu 22.04 Jammy Jellyfish, and one of the first things you’ll see on your desktop is the dock panel to the left of the screen. The dock panel is highly customizable, so it’s easy to tailor it to your liking.

      • Matthew Garrett: Boot Guard and PSB have user-hostile defaults

        Compromising an OS without it being detectable is hard. Modern operating systems support the imposition of a security policy or the launch of some sort of monitoring agent sufficient early in boot that even if you compromise the OS, you’re probably going to have left some sort of detectable trace[1]. You can avoid this by attacking the lower layers – if you compromise the bootloader then it can just hotpatch a backdoor into the kernel before executing it, for instance.

      • Ubuntu 22.04 GUI installation

        The purpose of this guide is to install a desktop environment on Ubuntu 22.04 Jammy Jellyfish, whether you already have a GUI installed and wish to use a different desktop environment, or if you are only using the command line and would like access to a GUI.

        You can also use these instructions to install a GUI on Ubuntu Server 22.04, which doesn’t have a desktop environment installed by default. Follow along with the step by step instructions below to install a GUI on Ubuntu 22.04 Jammy Jellyfish Server and Desktop.

      • How to install Discord on Ubuntu 22.04 Jammy Jellyfish Linux

        Discord is an application for text, image, video and audio communication, which was developed for video gaming communities. Discord runs on various Linux distributions of your choice and, in particular, on Ubuntu 22.04. The objective of this guide is to install Discord, the gamer’s chat platform, on Ubuntu 22.04 Jammy Jellyfish.

      • How to install Steam on Ubuntu 22.04 Jammy Jellyfish Linux

        Steam is easily the most popular PC gaming client, and with hundreds of titles available for Linux systems, it’s no wonder why Linux gamers would want to install Steam on Ubuntu 22.04 Jammy Jellyfish. Valve, the company behind Steam, officially targets Ubuntu and Debian with their Linux support, which is great news for Ubuntu users.

        In this tutorial, we will guide you through the instructions to install Steam for Ubuntu 22.04 Jammy Jellyfish using the standard Ubuntu repository as well as to perform a manual installation using the official Steam package.

      • Ubuntu 22.04: Connect to WiFi from command line

        The purpose of this tutorial is to connect to a WiFi network via the command line on Ubuntu 22.04 Jammy Jellyfish.

        This could be useful if you are running a headless Ubuntu 22.04 system such as server or Ubuntu 22.04 on Raspberry Pi. Connecting from command line is done through configuration of Netplan on Ubuntu. Follow the step by step instructions below to see how.

      • How to Install Adobe Acrobat Reader on Ubuntu 22.04 Jammy Jellyfish Linux

        The objective of this tutorial is to install Adobe Acrobat Reader on Ubuntu 22.04 Jammy Jellyfish.

        Since Ubuntu does not have a native way to open PDF documents by default, users will need to install Adobe Acrobat Reader for Linux, or some other program capable of opening the documents.

        The advantage of Acrobat Reader, of course, is that it’s the official program and recommended for reading PDF documents in the way they are intended.

      • How to Configure IP Networking with nmcli Command in Linux

        Nmcli (network manager command-line interface) is a command-line utility used to control the NetworkManager daemon which is used to configure network interfaces.

        With the nmcli utility, you can display, create, edit, enable and disable network interfaces or connections. It is especially handy for servers and headless systems which do not have a GUI.

        In this tutorial, we focus on how you can configure IP networking with the nmcli command in Linux.

      • Install Pantheon Desktop Environment on Fedora 35 – LinuxCapable

        The Pantheon Desktop Environment is a free, lightweight, fast, and elegant desktop environment that stands out amongst most of its competitors in this field. Pantheon is the default featured desktop environment for elementaryOS, taking inspiration from macOS and combining it with one of the most visually appealing desktops around and a bonus for any macOS users wanting to take the plunge into Linux.

        In the following tutorial, you will learn how to install the Pantheon Desktop Environment on Fedora 35 Workstation.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • digiKam – digiKam 7.5.0 is released

          Dear digiKam fans and users,

          After one month of active maintenance and a huge bug triage, the digiKam team is proud to present version 7.5.0 of its open source digital photo manager. This new version arrives with more than 700 files closed in bugzilla and main improvements about usability.

          See below the list of most important features coming with this release.

      • GNOME Desktop/GTK

        • GNOME Mulls ’Cleanup’ of Background Settings in Pursuit of New Features

          The plans are a work-in-progress and yet to be confirmed, but if approved they will involve “getting rid of a bunch of features” that are not currently exposed to users in the GNOME Settings app, and whose code is otherwise surplus to requirements.

          Plus, as is so often the case in situations like this, doing so will ease the maintainability burden.

    • Distributions

      • The best Linux distributions for 2022

        The year 2022 is upon us! That means it’s time to choose a new Linux distribution. Here’s a list of the best Linux distributions for 2022 that will help you not get lost in the variety of versions of your favorite operating system.

      • What Linux Distros And FOSS Projects Can Learn From Zorin OS

        I don’t envy any individual or small organization that has to market a Linux distribution (or a FOSS project, or an indie game). There are currently hundreds of Linux distros in active development. 72 of those employ the GNOME desktop environment, and 77 use KDE. There are 51 Linux distributions based on Ubuntu. And Searching Google with the phrase “Linux distro for beginners” returns an astounding 9 million results.

        If you think it’s challenging for new Linux users to make the right choice, imagine how challenging it is for Linux distro teams trying to be those chosen ones.

      • What Distribution and Version Pulled You into Linux?

        I recently watched a video posted by my good friend (and former Linux Journal colleague) Shawn Powers introducing viewers to Linux and Linux distributions. And it got me thinking about my own personal experience and when I first started to dabble in the world of open source operating systems.

      • Reviews

        • Review: instantOS Beta

          A project that has been sitting on the DistroWatch waiting list for several months is instantOS. The instantOS project is currently in its beta stage of development, but has been around long enough to review and it claims to offer a number of intriguing features. instantOS is based on Arch Linux and strives to be both light and fast. The distribution’s website reports instantOS requires less than 200MB of RAM.

          The project also ships with its own graphical environment. This custom environment is called instantWM and it reportedly offers both tiling and floating window management. This window manager seems to be the centre piece of the distribution.

          instantOS is available in a single edition for x86_64 computers and is provided through a 1.4GB download. Booting from the downloaded media brings up a menu which offers options for booting into “Arch Linux”.

          Booting into instantOS brings up a graphical environment. A thin panel is placed across the top of the screen. This panel provides access to an application menu, nine virtual desktops, a clock, and system tray. Shortly after the window manager loads we’re presented with a welcome application which looks just like a simple drop-down menu. This menu lists a handful of options, including Get Started, Install, Documentation, Settings, GitHub, Support, and Close.

      • BSD

        • GhostBSD 22.01.12 ISO is now available | GhostBSD

          This new ISO contains fixes, improvements, and software updates. Finally, the installer hanging at the cleaning stage for ZFS installation got fixed, and OpenRC and dhcpcd were removed from the base code. Furthermore, automation configuration for HD 7000 series and older GPUs has been added. I also added the support for os-release to show GhostBSD name and GhostBSD version in applications like mate-system-monitor, python distros, pfetch, and neofetch and added a new set of wallpapers for 2022 and removed p7zip from the default selection since it is vulnerable and unmaintained.

        • GhostBSD 22.01.12 Released With Automatic Detection For Old AMD GPUs

          For those wanting a desktop-friendly, easy-to-use BSD operating system to try out the GhostBSD project is one of the better bets in modern times. GhostBSD 22.01.12 is now available with a variety of fixes and improvements for this desktop-minded BSD.

          GhostBSD 22.01.12 can now auto-detect older AMD Radeon graphics cards that rely on the Radeon KMS/DRM driver rather than the newer AMDGPU driver. This helps the support for the Radeon HD 7000 series / GCN 1.0 (and should be GCN 1.1 too albeit not mentioned in the notes) with a better out-of-the-box experience on this BSD rather than needing to configure the driver manually.

        • LibreSSL update

          Undeadly reached out to Theo asking whether he would share with readers an explanation of the changes. He kindly responded: [...]

        • Early Days at Bell Labs

          It’s Brian Kernighan discussing the formation of Unix, starting from the back story of the creation of Bell Labs, including predecessors CTSS and Multics, and C predecessors BCPL which was modified to become B, and why Dennis Richie added types to B to make C.

          This video really hits its stride when Kernighan discusses piping and redirection, and the ease of creating wonderful things out of small parts that, and Kernighan used these words, “do one thing and do it well.”

      • Canonical/Ubuntu Family

        • Lubuntu 21.04 End of Life and Current Support Statuses – Lubuntu

          Lubuntu 21.04 (Hirsute Hippo) was released April 22, 2021 and will reach End of Life on Thursday, January 20, 2022. This means that after that date there will be no further security updates or bugfixes released. We highly recommend that you update to 21.10 as soon as possible if you are still running 21.04.

          After January 20th, the only supported releases of Lubuntu will be 20.04 and 21.10. All other releases of Lubuntu will be considered unsupported, and will no longer receive any further updates from the Lubuntu team.

        • Ubuntu 22.04 LTS “Jammy Jellyfish” – New Features and Release Details

          It’s time to unwrap the new features of Ubuntu 22.04 LTS “Jammy Jellyfish”. We give you all the relevant information, and you stay up to date until the final release.

        • Edge ISO available for Linux Mint 20.3

          This is a quick announcement to let you know an “Edge” ISO image is now available for Linux Mint 20.3.

          This image is made for people whose hardware is too new to boot the 5.4 LTS kernel included in Linux Mint 20.3. It ships with kernel 5.13.0-25 instead.

    • Devices/Embedded

  • Leftovers

    • Education

    • Health/Nutrition/Agriculture

      • Biden Urged to Fire Covid Response Chief Over ‘Damning’ Failures

        President Joe Biden is coming under growing pressure to fire White House Coronavirus Response Coordinator Jeff Zients—a former private equity executive with no public health background—as the administration continues to face criticism over its slow-moving and inadequate efforts to combat Covid-19.

        Watchdog groups have long warned that Zients is not qualified to take on the massive task of leading the federal government’s pandemic response given both his lack of scientific and medical experience as well as his record in the private sector, where his firm invested in a company accused of exploitative surprise billing.

    • Integrity/Availability

      • Proprietary

        • web3 is Centralized

          The funny thing is, web3, as it exists today and appears to be building towards, is actually more centralized than the web it seeks to replace.

        • YouTube temporarily suspends, demonetizes Dan Bongino’s channel

          YouTube took action against conservative commentator Dan Bongino’s channel Friday, suspending it for violating the platform’s COVID-19 misinformation policy and demonetizing it for at least 30 days.

          The weeklong posting suspension stems from a video where Bongino said that masks are “useless” in stopping the spread of the disease.

        • Security

          • Privacy/Surveillance

            • Even After Release, Guantánamo Survivors Live Under Surveillance and in Anguish
            • Walmart is getting serious about the metaverse

              The retail giant filed for several trademarks on December 30th, suggesting plans to start selling virtual goods, including electronics, toys, appliances, sporting equipment, apparel, home decor, and more, as noted by CNBC. There’s mention of offering customers a digital currency, as well as the opportunity to buy and sell NFTs. Meanwhile, another application details possible “physical fitness training services” and “classes in the field of health and nutrition” that could take place in augmented reality (AR) and virtual reality environments (VR) — the company made a separate filing for the use of its name and logo in VR and AR.

            • Walmart is quietly preparing to enter the metaverse

              The big-box retailer filed several new trademarks late last month that indicate its intent to make and sell virtual goods, including electronics, home decorations, toys, sporting goods and personal care products. In a separate filing, the company said it would offer users a virtual currency, as well as NFTs.

            • Safari 15 bug can leak your recent browsing activity and personal identifiers

              As explained by FingerprintJS, IndexedDB abides by the same-origin policy, which restricts one origin from interacting with data that was collected on other origins — essentially, only the website that generates data can access it. For example, if you open your email account in one tab and then open a malicious webpage in another, the same-origin policy prevents the malicious page from viewing and meddling with your email.

            • Why you might want a secure file-sharing service now that you’re working from home

              Probably the easiest way to share a file is to just attach a document to an email, or to a Slack or other instant message. But either way invites trouble on several fronts. If you rely too much on your email or messaging system, your poorly archived files could become available to prying hackers with phishing lures. If you’re sharing traditional documents that way, you could also quickly find yourself playing the “who has the most current version” game. It’s hard to keep track of updates when multiple people are working on the same document, spreadsheet, or presentation.

            • Women human rights defenders speak out about Pegasus attacks

              A new investigation led by Front Line Defenders reveals the hacking of two women human rights defenders (WHRDs) from Bahrain and Jordan using NSO Group’s notorious Pegasus spyware. The hacking discovery comes on the heels of the Pegasus Project revelations of governments in the MENA region and beyond using the spyware to perpetrate human rights abuses and repress activists and journalists.

              The impact of surveillance on women is particularly egregious and traumatizing given how governments have weaponized personal information extracted through spyware to intimidate, harass, and publicly smear the targets’ reputations. As a result, women targets of surveillance live in a perpetual state of fear, become socially isolated and restricted in their social lives, work, and activism. As expressed by one of the victims, Ebtisam Al-Saegh, “personal freedoms are over for me, they no longer exist. I am not safe at home, on the street, or anywhere.”

            • Unsafe anywhere: attacked by Pegasus, women activists speak out – Access Now

              Women human rights defenders and activists are under attack in Bahrain and Jordan — NSO Group’s notorious Pegasus spyware is the weapon. Read Front Line Defenders and Access Now’s new report, Unsafe anywhere: women human rights defenders speak out about Pegasus attacks, that unpacks the first-hand experiences of women navigating an increasingly hostile and dangerous environment.

              “When governments surveil women, they are working to destroy them,” said Marwa Fatafta, MENA Policy Manager at Access Now. “Surveillance is an act of violence. It is about exerting power over every aspect of a woman’s life through intimidation, harassment, and character assassination. The NSO Group and its government clients are all responsible, and must be publicly exposed and disgraced.”

              Led by Front Line Defenders, the new investigation reveals the true extent of the impact invasive surveillance has on targeted women, exploring the personal journeys of human rights defenders, Ebtisam Al-Saegh and Hala Ahed Deeb.

    • Defence/Aggression

    • Environment

      • Opinion | Tonga’s Volcanic Tsunami Foreshadows Effects of Glacier Melt From CO2

        A massive eruption in an undersea volcano, the Hunga Tonga-Hunga Ha’apai, 40 miles north of the South Pacific island of Tongatapu on Saturday caused a low-level tsunami and flooding on the island, the most populous in the Tonga archipelago. The tsunami spread out from there, causing one- to three-foot waves in Hawaii and some one-foot waves on the West Coast of the US and down to Chile. The waves created rip tides that endangered marinas and swimmers. Further eruptions cannot be ruled out.

      • Energy

        • [Cryptocurrency] Enthusiasts Meet Their Match: Angry Gamers

          But to some, the [cryptocurrency] craze has gone too far, too fast. Skeptics argue that cryptocurrencies and related assets like NFTs are digital Ponzi schemes, with prices artificially inflated beyond their true value. Some question whether cryptocurrencies and the blockchain, which are slippery concepts, have any long-term utility.

          Nowhere has there been more unhappiness than in the games community, where clashes over [cryptocurrency] have increasingly erupted between users and major game studios like Ubisoft, Square Enix and Zynga. In many of the encounters, the gamers have prevailed — at least for now.

    • Finance

    • AstroTurf/Lobbying/Politics

    • Misinformation/Disinformation

      • Cognitive cascades: How to model (and potentially counter) the spread of fake news

        Understanding the spread of false or dangerous beliefs—often called misinformation or disinformation—through a population has never seemed so urgent. Network science researchers have often taken a page from epidemiologists, and modeled the spread of false beliefs as similar to how a disease spreads through a social network. However, absent from those disease-inspired models is an internal model of an individual’s set of current beliefs, where cognitive science has increasingly documented how the interaction between mental models and incoming messages seems to be crucially important for their adoption or rejection. Some computational social science modelers analyze agent-based models where individuals do have simulated cognition, but they often lack the strengths of network science, namely in empirically-driven network structures. We introduce a cognitive cascade model that combines a network science belief cascade approach with an internal cognitive model of the individual agents as in opinion diffusion models as a public opinion diffusion (POD) model, adding media institutions as agents which begin opinion cascades. We show that the model, even with a very simplistic belief function to capture cognitive effects cited in disinformation study (dissonance and exposure), adds expressive power over existing cascade models. We conduct an analysis of the cognitive cascade model with our simple cognitive function across various graph topologies and institutional messaging patterns. We argue from our results that population-level aggregate outcomes of the model qualitatively match what has been reported in COVID-related public opinion polls, and that the model dynamics lend insights as to how to address the spread of problematic beliefs. The overall model sets up a framework with which social science misinformation researchers and computational opinion diffusion modelers can join forces to understand, and hopefully learn how to best counter, the spread of disinformation and “alternative facts.”

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Kashmiri Media Describe Toll of Legal Harassment

        Shah said that cases like the one against Gul, in which reporters or media outlets are accused of sharing or posting anti-national sentiment, are increasing in Kashmir, and that the threat of legal action is having an impact in a region where journalism plays a significant role.

        It’s not an isolated problem. Lawsuits against media are on the rise across India, with a growing trend of judicial harassment and intimidation against those who do not toe the line of the ruling Bharatiya Janata Party, said Daniel Bastard, the Asia-Pacific lead for media watchdog Reporters Without Borders.

    • Civil Rights/Policing

      • IFF writes to the Parliamentary Standing Committee on IT on the “Bulli Bai” and “Sulli Deals” Incidents

        The recent “Bulli Bai” and “Sulli Deals” incidents, a fake online auction of almost 100 Muslim women, was a blatant violation of their data security and privacy rights. It severely impacted their constitutional right to life and free speech by displaying sensitive information without consent. Hence, we have sent a letter to the Parliamentary Standing Committee on Information Technology requesting them to investigate the matter to understand the reasons behind the delayed response of the relevant authorities.

    • Monopolies

      • States appeal a judge’s decision to throw out their Facebook antitrust case.

        Nearly four dozen states on Friday asked a federal appeals court to reconsider an antitrust lawsuit against Facebook that a judge threw out last year.

        In June, Judge James E. Boasberg of the U.S. District Court of the District of Columbia said the states had waited too long after some of the deals under scrutiny were made to file their suit.

      • Download tool: Music industry is suing the host provider of Youtube DL

        Whether YouTube DL facilitates copyright infringement has been the subject of heated debate for years. The Association of the US Music Industry (RIAA) had the Python library initially blocked on GitHub in autumn 2020 on the basis of the Digital Millennium Copyright Act (DMCA). After loud protests, the platform operated by Microsoft restored the directory a little later. She justified this by saying that the software did not violate the DMCA according to the assessment of her own lawyers.

        Uberspace now apparently wants to fight the matter through. The value in dispute is 100,000 euros, which does not make the procedure cheap. The Youtube DL developers write on the controversial website: The hoster has already “spent thousands of euros on his legal defense”.

      • The New Separation of Powers Formalism and Administrative Adjudication [Ed: Enemies of patent quality still pursuing new angles for scuttling PTAB, for 'daring' to squash fake patents]

        The Supreme Court has entered a new era of separation of powers formalism. Others have addressed many of the potentially profound consequences of this return to formalism for administrative law. This paper focuses on an aspect of the new formalism that has received little attention—its implications for the constitutionality of administrative adjudication. The Court has not engaged in an extensive discussion or reformulation of its separation of powers jurisprudence concerning administrative adjudication since its highly functionalist decision in Commodity Futures Trading Commission v. Schor more than three decades ago, but recent opinions of individual Justices show signs that such a doctrinal restatement may be on the horizon.

        Despite the current lack of doctrinal clarity, administrative adjudication is generally valid either because Congress may vest the determination of so-called “public rights” in non-Article III tribunals or because administrative agencies adjudicate cases as adjunct factfinders for the courts. The foundation for the emergent Article III formalism, advanced most prominently by Justice Gorsuch in a pair of cases involving the legality of administrative adjudication of patent validity, is a categorical rule that Article III requires an independent judiciary to have decisional authority in adjudications that affect private property (and other protected rights), in much the same way that the unitary executive principle requires Presidential control over matters within the executive branch. Under this view, however, the judicial power is subject to a formalistic, historically defined exception for matters of public rights, which can be adjudicated without the involvement of the judiciary. This approach may be gaining traction as part of the broader resurgence of separation of powers formalism.

        We argue, however, that Justice Gorsuch’s approach is flawed because it does not account for the structural role of the Article III judiciary. Although the cases have long recognized that Article III has both structural and individual rights components, separation of powers is ordinarily understood primarily in structural terms. Article III analysis therefore must account for the structural role of the Article III courts and protect the structural interests of the federal judiciary. Focusing on the structural issues raised by non-Article III adjudication highlights two essential points. First, the status and character of the non-Article III tribunal is critical to the separation of powers analysis—a point that is typically ignored under current doctrine. Second, the structural interests of the federal courts may be implicated even when the adjudication of a matter does not implicate any individual right to an Article III court, especially in light of the courts’ role in protecting the rule of law. The rule of law applies even when executive action does not deprive anyone of a private right.

        Building on these points, our core argument is that, properly understood, most administrative adjudication is fully consistent with separation of powers formalism because it involves the execution of law by officials within the executive branch. In other words, the initial implementation of statutory provisions by agencies using quasi-judicial procedures is executive in character. This understanding brings coherence to the public rights doctrine that has long governed the constitutionality of administrative adjudication. It also reveals that the critical separation of powers question for administrative adjudication is the availability and scope of judicial review, rather than the propriety of initial administrative adjudication. It is the availability and scope of judicial review which determine the extent of any encroachment on the exercise of judicial power under Article III.

      • Inventing While a Black Woman: Passing and the Patent Archive [Ed: Patent as class and race warfare, using "law" as excuse for oppressing other people]

        This Article uses historical methodology to reframe persistent race and gender gaps in patent rates as archival silences. Gaps are absences, positioning the missing as failed non-participants. By centering Black women and letting the silences fill with whispered stories, this Article upends our understanding of the patent archive as an accurate record of US invention and reveals powerful truths about the creativity, accomplishments, and patent savviness of Black women and others excluded from the status of “inventor.” Exposing the patent system as raced and gendered terrain, it argues that marginalized inventors participated in invention and patenting by situational passing. It rewrites the legal history of the true inventor doctrine to include the unappreciated ways in which white men used false non-inventors to receive patents as a convenient form of assignment. It argues that marginalized inventors adopted this practice, risking the sanction of patent invalidity, to avoid bias and stigma in the patent office and the marketplace. The Article analyzes patent passing in the context of the legacy of slavery and coverture that constrained all marginalized inventors. Passing, while an act of creative adaptation, also entailed loss. Individual inventors gave up the public status of inventor and also, often, the full value of their inventions. Cumulatively, the practice amplified the patent gaps, systematically overrepresenting white men and thus reinforcing the biases marginalized inventors sought to avoid. The Article further argues that false inventors were used as a means of appropriating the inventions of marginalized inventors. This research provides needed context to the current effort to remedy patent gaps. Through its intersectional approach, it also brings patent law into broader conversations about how law has supported systemic racism and sexism and contributed to societal inequality.

      • Jamaica joins Madrid Protocol

        WIPO has announced that Jamaica deposited its instrument of accession to the Madrid Protocol on 27 December 2021, meaning that the Protocol will enter into force in the country on 27 March 2022.


        - in accordance with Article 8(7)(a) of the Madrid Protocol (1989), the Government of Jamaica, in connection with each international registration in which it is mentioned under Article 3ter of the said Protocol, and in connection with the renewal of any such international registration, wants to receive, instead of a share in the revenue produced by the supplementary and complementary fees, an individual fee.

      • [Guest Post] Mercado Libre’s second Transparency Report [Ed: Misuse of terms like IP (not Internet Protocol) and calling it a "right", which is also outright false]
      • What will property look like in the Metaverse? [Ed: It is not property and it's ludicrous hype like Second Life was]

        Amongst many other things, writer Neal Stephenson is famous for having coined the term “Metaverse” in his 1992 cyberpunk novel “Snow Crash”, but he has also written a lot about virtual worlds in some of his later work, particularly the novel “Reamde“, which is a techno-political thriller which introduces a popular virtual world called T’Rain. To me, T’Rain is one of the most interesting depictions of the Metaverse in fiction, it’s an open world MMO that has been designed with geologically-accurate terrain, it is vast, and has an in-game currency that is exchangeable with “real” fiat currencies. The game is designed with scarcity in mind, value is derived from the difficulty in getting things done, from transportation to gold mining, everything takes a some effort, which justifies the economic value of the currency.

      • A Look Back at India’s Top IP Developments of 2021 [Ed: The term "IP" is misleading]

        Here’s wishing all our readers a very happy, safe, and healthy new year!

        Continuing our annual tradition of recounting the significant developments that impacted the Indian IP landscape in the year that has been, we bring you a round-up of 2021’s developments.

      • Bulgaria: 7 Common Mistakes Businesses Make In The Field Of Intellectual Property And How To Avoid Them [Ed: There's no such thing as "Intellectual Property" and using this lie discredits the motivation of the messenger]

        Intellectual property rights are valuable assets to any business. A patent or utility model protects new technologies and methods and establishes a monopoly over them. Trademarks protect a brand and ensure that only the brand owner can use it. Industrial design rights, in turn protect the exterior appearance of a product and establish a monopoly over that particular design. Owning IP rights can lead to significant commercial advantages and in turn, higher revenues and profits.

        Unfortunately, many businesses do not fully take advantage of IP rights. In this article, we will list some of the most commonly encountered mistakes that businesses make in this field, and we will give some suggestions on how to avoid them.

      • Patents

        • Apple Accidentally Reveals iPhone Breakthrough Feature In New Patent [Ed: Breakthrough? Hardly. What a joker.]
        • Senate committee advances Biden’s USPTO, Federal Circuit picks [Ed: Biden is about to put a software patents booster from Microsoft’s team in charge of USPTO]

          Two of President Biden’s key nominations related to intellectual property law moved closer to confirmation on Thursday, when the U.S. Senate Judiciary Committee advanced them to the full Senate for a final vote.

          The committee voted 17-5 to advance Winston & Strawn partner Kathi Vidal to lead the U.S. Patent and Trademark Office, and voted 16-6 for District Judge Leonard Stark to serve on the U.S. Court of Appeals for the Federal Circuit, which hears patent appeals from around the country.

          During her career as a patent litigator, Vidal has represented companies including Microsoft, Tesla, and Intel. She led Fish & Richardson’s litigation group before joining Winston in 2017.

          Republican Senator John Kennedy of Louisiana voted against Vidal based on her ties to major tech companies, an issue he said he also had with the past three PTO directors.

        • ‘The system worked:’ Canadian CEO of Sonos hopes his takedown of Google inspires other upstarts

          The Canadian executive who won a David-and-Goliath fight over patent infringement with Alphabet Inc.’s Google last week said he hoped his victory would inspire more technology upstarts to invest in intellectual property.

          “To take on one of the world’s most powerful companies and be able to win just shows you that we were well prepared, we are the true inventor of the category and the system worked,” Patrick Spence, CEO of Santa Barbara, Calif.-based Sonos Inc., the company that introduced smart speakers to a mass audience, said in an interview.

        • SCOTUS okays Medtronic’s $112 million loss in patent contract case [Ed: Misleading title; they just declined an intervention or escalation]

          The U.S. Supreme Court on Monday declined a request by medical-device maker Medtronic Inc to review a case involving surgical-screw patents, letting stand a $112 million verdict against the company for breaching a royalty agreement.

          Medtronic had argued that the case, brought by a spinal surgeon in 2014, didn’t belong in state court because it arose under federal patent law, which is reserved exclusively for federal courts.

          The company argued the high court should hear the dispute because lower courts are divided on how to determine when an issue of patent law requires a case to be heard in federal court.

        • Nike sues Lululemon for patent infringement over Mirror home gym

          Nike Inc. has launched a lawsuit against Lululemon Athletica Inc. accusing the athletic apparel maker of patent infringement with its new Mirror home gym.

          The American fitness giant claims Vancouver-based Lululemon’s electronic device for streaming workout classes and its accompanying mobile applications violate Nike’s “robust portfolio of patents” protecting decades of digital sport innovations.


          It comes on the heels of Lululemon’s lawsuit against Peloton Interactive Inc. that accused the stationary bicycle maker of selling “knock-off” bras and pants.

          Lululemon acquired Mirror in 2020 as the pandemic catapulted the at-home fitness market to new heights.

        • PODA Granted US Patent for Closed Bottom Vaporizer Pod

          - PODA HOLDINGS, INC. (“Poda” or the “Company”) (CSE: PODA) (FSE: 99L) (OTCQB: PODAF) is pleased to announce that it has been granted a US Patent by the US Patent and Trademark Office concerning US Application 16/340,058 for Poda’s Closed Bottom Vaporizer Pod. US Patent 11,206,869 B2 was granted on December 28th, 2021.

        • U.S. Chief Justice Roberts pledges to review patent venue rules [Ed: US patent courts going rogue -- to the point where the Supreme Court steps in]

          In a year-end report on the federal judiciary, U.S. Chief Justice John Roberts said he would direct the Judicial Conference of the United States to address how venue is chosen for patent cases.

          Calling the issue “arcane but important,” Roberts acknowledged concerns that patent plaintiffs are funneling cases into a Waco, Texas federal court, and promised the Judicial Conference would work with Congress to make changes if needed.

          The ranking members of the Senate Judiciary Committee’s Subcommittee on Intellectual Property, Democratic Senator Patrick Leahy of Vermont and Republican Senator Thom Tillis of North Carolina, had asked Roberts in November to review potential patent forum shopping, citing the “extreme concentration of patent litigation” in U.S. District Judge Alan Albright’s court and the “unseemly and inappropriate conduct that has accompanied this phenomenon.”

          The senators said nearly 25% of all U.S. patent litigation is pending before Albright, and that he has solicited cases at lawyers’ meetings and “repeatedly ignored binding case law” in denying transfer motions, among other things.

          Critics say Albright’s patent-owner friendly policies attract alleged “patent trolls” to his court.

        • Covid sparks surge in innovation with 5,070 new patent applications [Ed: Patent lawyers' death cult, celebrating the deaths of millions for the sake of patent profits; innovation as in what? Death?]

          5,070 global patent applications* relating to Covid-19 have been published since the start of the pandemic, shows a new analysis by leading intellectual property law firm Mathys & Squire.
          The most common type of patent application relates to Covid testing and diagnosis, accounting for 1,668 patents (33% of the total). 325 patents related to face masks (6%), while just 55 related to sanitizer and 38 to ventilators/respirators.
          Mathys & Squire says a key reason why testing is the most common subcategory of Covid patents is the growing acceptance that the virus has become endemic and societies will have to learn to live with it. As a result, Covid testing has become a viable long-term business model.
          The law firm says many more Covid patent applications can be expected this year, as it can take up to 18 months for the patent publication process to be completed.

        • New Motorola phone with wrap around display receives patent [Ed: So much fascination with patents (could be vapourware) instead of actual products)]

          Motorola has recently applied for a patent for a wrap-around screen display designed for a smartphone device. The patent has been brought to life in new renders that show the screen seamlessly stretching around both sides and edges of the handset.
          Back in June 2020, Motorola applied for a patent with the United States Patent and Trademark Office (USPTO) for a device with a wrap-around display. The actual name of the patent filing reads “Unitary pre-formed fascia tension at least two sides of an electronic device housing and corresponding methods and devices.”
          The patent, published on December 23, 2021, describes in detail the manufacturing process of a smartphone that is completely wrapped with a flexible display screen.

        • The ‘loneliness’ of starting your own IP firm [Ed: There's no such thing as "IP" and these "professionals" likely claim to cover things they know nothing about, using this fictional, nebulous umbrella, much like "clown computing"]

          Managing IP speaks to five IP professionals about what they’ve learned from going out on their own

        • Opinion: France’s six-month IP plan is welcome but too ambitious [Ed: Max Walters speaks of “‘business-backed’ UPC”, but what business? Litigation business? American patent cartels that profit from letting COVID-19 spread and mutate?]

          France boldly throws its weight behind ‘business-backed’ UPC, but the next six months is unlikely to see the project come to life

        • Exclusive: IP5 joint meeting with TM5/ID5 scrapped

          The EPO will still host the next IP5 meeting in June, but trademarks and designs won’t be on the agenda as planned

        • UK: When Does A Disclosure Invalidate A Patent? [Ed: EPO violates confidentiality, discrediting the whole system]

          This brief article explains why and when a public disclosure invalidates a patent. Most inventors and designers do understand that new developments need to be kept confidential prior to making a decision as to whether to apply for legal patent protection or not.

          The confidentiality requirement in many territories around the world is required by law, and the UK is one of these.

          To be granted a valid patent, one of the requirements is that your invention must be novel. Disclosing your invention publicly in any form before the filing date of your patent application can prove fatal to your patent application (or granted patent).

          However, before taking the leap into patenting an idea, the designer will often want to first test their development. One or more prototypes are therefore often required.

        • Software Patents

          • [Older] UK: Drafting AI Patent Applications For Success At The EPO (1) – Patent Eligibility And Claim Drafting [Ed: k00ks and patent lawyers referring to patents on algorithms, which aren't permitted, as "AI inventions"]

            In this article, we take a practical look at the different types of AI inventions that might be encountered and how to formulate claims for each category in view of the European Patent Office’s patent eligibility requirements.


            At the far left of the figure sit the Applied-AI inventions. These are where the invention lies (as the name would suggest) in the manner in which a known AI algorithm is used. These correspond to the second of the EPO’s two dimensions – inventions that the EPO considers technical by means of “adaption to a field of technology”.

            The blue box represents inventions that amount to “a better classifier”. For these inventions, machine learning may be used to improve or automate known processes. Classifying medical images as containing lesions based on a corpus of annotated training images would be an example of this kind of invention.

            The green box represents inventions where AI is incidental to the invention, and merely one way that the invention might be realised. For example, the invention might involve a step of “predicting”, in which case the predictions may be made using a machine learning model (but might also be performed using other methods). For Inventions of this type, AI is an implementation detail, but not the main invention.

            The yellow box represents perhaps the most interesting inventions that, whilst not representing improvements to fundamental AI algorithms, are only possible because of the advent of AI. Real-time camera effects and interactive filters are a good example of inventions of this type. Others include models for performing robotic surgery or self-driving vehicles.

          • The Economic Case Against Licensing Negotiation Groups in the Internet of Things [Ed: Well, many of these are just bogus patents disguised as buzzwords because software patents would not pass muster]

            Competition policy generally prohibits coordination among buyers or sellers, especially coordination on price, price-related inputs, and output. In licensing markets for standard-essential patents (“SEPs”), it has been periodically proposed that this rule should be relaxed to permit the formation of licensing negotiation groups (“LNGs”), which is expected to reduce transaction costs and the purportedly “excessive” royalties paid to SEP licensors. Based on the economic structure of wireless technology markets, and empirical evidence from over three decades of SEP licensing, this policy intervention is likely to degrade, rather than enhance, competitive conditions in wireless communications and other 5G-enabled markets encompassed by the “Internet of Things.” In the short term, LNGs would most likely result in a redistributive (not an efficiency) effect that shifts economic value from innovators to implementers in the wireless technology supply chain without necessarily passing on cost-savings to consumers. In the medium to longer term, LNGs are liable to impose significant efficiency losses by endangering the viability of licensing-based monetization models that have funded continuous R&D investment, promoted broad dissemination of technology inputs, facilitated robust entry in device production, and enabled transformative business models across a wide range of industries. While LNGs may reduce the transaction costs of SEP licensing, pooling structures have a demonstrated record of having achieved the same objective in patent-intensive information technology markets at a substantially lower risk of competitive harm.

      • Trademarks

        • A day in the life of a trademark litigator: Brett Heavner [Ed: Finnegan pays this publisher and gets spammy ads/marketing in exchange, albeit it's disguised as "news" or "reporting"]

          The Finnegan partner tells Managing IP about TTAB challenges, fighting dangerous counterfeits and why he’s stayed at his firm for 25 years

        • Cyberspace and courts: where TM battles will be won or lost [Ed: Monopolies-loving trademark maximalists left in disarray as social control media is hard to police]

          Sources suggest more IP disputes will go viral in 2022. But what do brand owners need to consider before engaging in a social media war?

        • Fighting fire with fire: how to combat new-age counterfeiting [Ed: Trademark tackles copycats; stop saying "IP owners" and other such nonsense, as that short buzzword contains no less than 3 lies]

          Sources from China and India explain how counterfeiters are using technology to boost their business, and how IP owners can fight them

        • Denmark: No likelihood of confusion between trademarks based on the same fictional character

          On 5 November 2021, the Danish Maritime and Commercial High Court (the Court) issued a ruling between Kejser Sausage ApS (‘Kejser Sausage’) and Keyser KBH ApS among others (‘Keyser’).

          The case concerned Kejser Sausage’s gourmet hot dog stand in Copenhagen, which used the trademark ‘Kejser Sausage’. Elsewhere in Copenhagen, Keyser used the name ‘Keyser Social’ for its restaurant. The question at hand was whether ‘Keyser Social’ infringed Kejser Sausage’s trademark right.

          First, the Court concluded that the trademark ‘Kejser Sausage’, although the element “sausage” was descriptive (given that the hot dog stand sold sausages), in its entirety was distinctive and consequently protectable under the Danish Trademark Act and the Danish Marketing Practice Act. In this regard it should be noted that under Danish law, a trademark can be established either by registration or by commencement of use, provided that the extent of the use has more than mere local significance.

        • May The Attractive Force Be With You

          Unregistered rights are protected by the law of passing off in the UK. In the recent decision of the IPEC in Stone v Wenman, the court reiterated and applied some key principles in the law of passing off.

          The Claimant in the case, a spiritual author and holistic therapist, applied for and registered the mark ARCHANGEL ALCHEMY in 2019 in relation to training courses. She then brought a claim against the Defendant, active in the same field, for infringing her registered right. The Defendant filed a counterclaim in passing off, claiming that she had in fact been using the sign ARCHANGEL ALCHEMY since 2010 to offer her services.

          The first key issue was whether the Defendant had generated sufficient goodwill prior to the relevant date in the sign ARCHANGEL ALCHEMY to succeed in her counterclaim for passing off. The relevant date for the counterclaim was the date of first use by the Claimant of the mark, which the court found be in September 2019.

          The Claimant’s first argument was that the phrase ARCHANGEL ALCHEMIST was only an allusive or descriptive way for the Defendant to advertise a module of her training courses. However, the judge noted that the Claimant herself had advised the court that she chose the mark ARCHANGEL ALCHEMIST due to its originality. Although the sign had sometimes used to describe the Defendant herself as THE ARCHANGEL ALCHEMIST or her methods as ARCHANGEL ALCHEMY, this did not necessarily mean that use and other evidenced use of the phrase did not constitute use as a sign.


          The second key issue was whether the Claimant’s use therefore infringed under the law of passing off. In seeking to make out her trade mark infringement claim against the Defendant, the Claimant had admitted that she herself had used the mark in trade, that the services provided by both parties were identical, and that the customer base of both parties were one and the same. There was therefore no question of whether the Claimant’s use of ARCHANGEL ALCHEMY would mislead consumers under passing off.

          This case reminds us that goodwill, or the “attractive force that brings in custom”, does not need to be substantial, only more than trivial. The judge was particularly persuaded by testimonials from the Defendant’s customers who described knowing the Defendant by her brand. The detailed discussion of the evidence is a lesson for brand owners that keeping good records of brand use is essential for claiming reputation or goodwill. It also reminds us that when facing a counterclaim based on prior rights, a Claimant should carefully consider the pros and cons of making admissions in relation to the similarity of the marks, goods and services, and average consumer.

      • Copyrights

        • Copyright law and football matches: impossible to match? (Part II)

          These choices, which may distinguish the broadcasting and filming from the underlying unprocessed facts of the game, can be expressed in various creative stages, as noted in the CJEU’s Painer decision (C-145/10, par. 89): in the preparation phase, when filming the event and by making editorial choices after the filming phase.

          Choices and constraints: is originality hidden in the details?

          Both the filming and the broadcasting of the match consist of a complex combination of choices and decisions made at various levels, often in collaboration between several contributors.

          The sports director decides on the camera position and the coverage plan for each camera, the visual logic to be followed, what kinds of shots and camera movements to use during the production, and the development of animated wipes used for replays and transitions. They also instruct the technical director how to select the images coming from multiple cameras according to the “storytelling” opted for. Multiple camera operators “propose” shots for selection to the control room. The sports director or the technical director acting on the instructions of the sports director (and possibly in creative collaboration with them) will continuously select the images that will be broadcast live from the “gallery” of video monitors displaying all camera sources.

          Even though constraints regarding shot selection are imposed by the rules and the purpose of the game itself, the director’s choices create a specific viewer experience which has been designed by the director. For instance, the audiovisual representation of the game may be characterised by wide and barely interrupted filming, placing the emphasis on the fluidity of the game, the visibility of tactics, the animation of the system and collective movement without the ball; or the focus could, more individualistically, be on the player who carries the ball, where shots are multiplied so the fluidity of the game is more often interrupted, while the techniques and skills of the individual players are emphasised.

        • Copyright law and football matches: impossible to match? (Part I)

          At the same time, a global paradigm of online piracy enabling the retransmission of sports events on a worldwide basis has dynamically emerged. In this context, an important question is whether the classic copyright and related rights protection offers a solid legal basis for combatting online piracy, specifically regarding the broadcasting of live sports events, or whether the sports industry should be granted additional exclusivity through the establishment at EU level of specific protection, as is the case in certain Member States (currently Bulgaria, France, Greece, Hungary, Italy, Romania, Slovakia and Spain provide specific audiovisual rights, see: European Audiovisual Observatory, Mapping report on national remedies against online piracy of sports content, 17 December 2021).

          This post is divided in two parts. In the first part, the application of the EU concept of work in football matches is discussed (Part I). The second part explores the possible sources of originality in the filming and broadcasting of the match (Part II).

        • Around the IP Blogs

          The Kluwer Copyright Blog wrote about the EU concept of work in relation to football matches (see here) and the possible sources of originality in the filming and broadcasting of the match (see here).

        • Bombay HC Clarifies the Contours of Copyright Infringement and Confidentiality Law

          The Bombay High Court in Tarun Wadhwa v. Saregama India Ltd & Anr deliberated upon the intersection of copyright infringement and confidentiality law and held that ideas cannot be copyrighted but can be protected through the application of confidentiality law.


          A major portion of the judgment is spent on explaining the application of confidentiality law through contracts and in equity to hold that when seeking protection for information what is necessary is that such information should not be in the public domain and there must be precise identification of such proprietary information. Particularly, “precision, originality, and completeness of disclosure” was held to be essential to a case of confidentiality. The requirement in confidentiality law is the novelty of information.

          Elaborating further regarding this distinction, the judge noted the breach of confidentiality and infringement of copyright are closely connected. Claims that cannot be covered under copyright infringement are often brought under breach of confidentiality. Hence, it was noted that “an idea, in particular, cannot be the subject of a copyright infringement action; but it may be the subject of breach of confidentiality”.

        • Around the IP Blogs – The IPKat

          SpicyIP analysed a recent decision from the Bombay High Court, in which it was decided that ideas cannot be copyrighted but can be protected through the application of confidentiality law.

        • Columbia Pictures Targets “Spider-Man” Leak Coverage with DMCA Notice

          An anti-piracy outfit, acting on behalf of Columbia Pictures, asked Google to remove our news article on the “Spider-Man: No Way Home” leak. And that’s not the only error. The same notice targets several other news sites and even the website of competitor Sony Pictures is flagged as a pirate operation.


Links 17/1/2022: postmarketOS 21.12 Service Pack 1 and Mumble 1.4 Released

Posted in News Roundup at 7:48 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • 9to5Linux Weekly Roundup: January 16th, 2022

      This week has been really great for Linux news and releases. We kicked off with a new major Firefox release, pre-orders of the PinePhone Pro Linux smartphone for everyone, and a new GNU Linux-libre kernel for those who want to build a 100% free computer without any proprietary code or drivers.

      We also got a new major FFmpeg release with lots of goodies for all your multimedia creation, a new major NetworkManager release with great stuff for all your networking needs, and a new major release of the SystemRescue live Linux system for all your system rescue and recovery needs.

    • Linux Weekly Roundup #165

      I hope that you are doing well.

      We had a peaceful week in the world of Linux releases with the releases of Sparky Linux 5.16, Bluestar Linux 5.16.0, and Slackware 15.0-rc3.

    • Audiocasts/Shows

    • Kernel Space

      • Kernel Updates Available » PCLinuxOS

        The following Kernels are available for PCLinuxOS. Kernel 5.15.15, Kernel LTS 5.10.92 and Kernel LTS 5.4.172.

      • Linux To Adopt New Multi-generation LRU Page Reclaim Policy

        Based on observed behaviour on Android and Chrome OS, Google began working on a new page reclamation strategy for its Linux-based OSes aimed to improve how the virtual memory subsystem reclaims unused memory pages. More recent work shows the new MGLRU policy can benefit server environments, too.

    • Applications

      • ‘Rnote’ is an Impressive Freehand Note Taking App Built in Rust & GTK4 – OMG! Ubuntu!

        Rnote is a seriously impressive freehand note taking app written in Rust and GTK4.

        I came across it on Flathub this week and, within seconds of installing it, I knew I had to give it a bit of a spotlight. If you’ve got a laptop with a stylus or touch-enabled screen and you use GNOME Shell you have to try it out.

        Rnote is billed by its developer as a “simple note taking application written in Rust and GTK4”. I spent about 20 minutes playing around with it (albeit with a mouse as primary input) and it’s really quite polished considering that it’s likely far from feature complete.

      • Mumble 1.4.230 | Mumble

        We are proud to present you with the first stable release of the Mumble 1.4.x release series, which brings many new features, bug fixes and general improvements.

        You can download the new version from our Downloads page or the GitHub release page or from within your Windows client or software package management system.

      • Mumble 1.4 Released For Open-Source Voice Chat

        It’s been over two years since Mumble 1.3 was released for this open-source VoIP / voice chat program that is popular with gamers and open-source enthusiasts while today it’s been succeeded by Mumble 1.4.

        Mumble 1.4 has reached stable and comes with a new plug-in framework for extending this high quality voice chat software. This new framework can be used for extending the functionality offered by Mumble and can be used for a variety of general purpose use-cases. Mumble 1.4 also adds a full-featured search dialog, channel listeners, TalkingUI as a convenient non-gamer overlay for showing who is talking, various other UI improvements, stereo audio streams support, and support for Markdown in text messages.

      • Spectator is an open-source REST-API testing app for Linux

        Spectator is a free, open-source (Libre) REST-API testing program for Linux. It is written in Vala programming language and GTK.

        The app allows developers to make requests to test their web endpoints, create custom environments, and save everything within a collection.

    • Instructionals/Technical

      • How to Install and Configure Samba File Sharing on Rocky Linux/Alma Linux 8

        Samba is a suite of open source applications that implements the Server Message Block (SMB) protocol. Many operating systems, including Microsoft Windows, use the SMB protocol for client-server networking. Samba enables Linux / Unix machines to communicate with Windows machines in a network. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Microsoft Windows Server domain, either as a Domain Controller (DC) or as a domain member.

        Sharing files is an essential part of server administration. It allows sharing of resources across the network which are needed by users to carry out their tasks. Samba server is usually installed on central Linux server where information is stored in variety of media and accessed using windows client or Linux using Samba client.

      • How To Install FTP Server on Debian 11 – idroot

        In this tutorial, we will show you how to install FTP Server on Debian 11. For those of you who didn’t know, The vsftpd FTP Server is one of the most trusted applications among the Linux professionals. The official website of vsftpd FTP Server claims that the security, stability and performance is the key points due to which it has gained much popularity among the Linux users.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the FTP Server on a Debian 11 (Bullseye).

      • How to fix the issue “No authenticators available” with Mutt in Fedora
      • Install Pydio With Ubuntu 21.04s

        What can come among the top 5 open source firewalls? Yes, this I was thinking of! Of course, there are lots of services and ready use os available. Deciding

      • How to install Cpanel and WHM on Ubuntu 20.04 – NextGenTips

        In this tutorial, we are going to learn how to install Cpanel on Ubuntu 20.04. Also, I will show you the free alternatives to Cpanel. This will make a big impact while trying to choose which free web hosting to use without worrying about the licenses. Cpanel provides a way where you can send emails by providing email hosting services which makes it easy to communicate with your customers.

        Cpanel is a web hosting control panel. It provides a GUI interface where administrators key in the information they want to configure, this simplifies the process of hosting a web site to the website end-user.

      • How to install Steam on a Chromebook in 2022

        Today we are looking at how to install Steam on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • SFXR-Qt 1.4.0 is out! | agateau.com

          Last release of SFXR-Qt was in September 2019. I kept using it for Pixel Wheels, it had its quirks and bugs but I did not have the time and motivation to work on it, so the poor app was left on its own for more than two years.

          Fast forward to November 2021: SFXR-Qt was added to Debian! It always feels good to see an app getting more widespread, with the minor issue that I learned about it because tests did not pass on big-endian machines… Working on that bug was a bit frustrating because I do not own a big-endian machine and failed to setup a working big-endian VM to test my changes on, but after a few blind fixes I eventually got it fixed. Kudos to Alex Myczko, the bug reporter, for the responsiveness in testing my changes.

          Entering Debian probably gave a bit more exposure to the app, because I then received a bug report for that crash I had known for a long time but never got to fix… Now that someone else reported it, I finally fixed it.

    • Distributions

      • EasyOS: Rollback exceptions extended

        Currently only bringing up this erase-exceptions window when do a rollback to pristine first bootup, but perhaps should consider it for other rollback choices — such as rollback to an earlier version of EasyOS or a snapshot.

        Note, the “Web browser profile” checkbox will save all firefox, seamonkey, chrome and chromium profiles under /home, as well as all mozilla profiles running as root (/root/.mozilla).

    • Devices/Embedded

  • Leftovers

    • Aeroponic Cell Grows Garlic, Forwards CellSol Packets | Hackaday

      Certain pictures draw attention like no other, and that’s what happened when we stumbled upon a Twitter post about “resuscitating supermarket garlic” by [Robots Everywhere]. The more we looked at this photo, the more questions popped up, and we couldn’t resist contacting the author on Twitter – here’s what we’ve learned!

      This is an aeroponics cell – a contraption that creates suitable conditions for a plant to grow. The difference of aeroponics, when compared to soil or hydroponics methods, is that the plant isn’t being submerged in soil or water. Instead, its roots are held in the air and sprayed with water mist, providing both plenty of water but also an excess of oxygen, as well as a low-resistance space for accelerated root growth – all of these factors that dramatically accelerate nutrient absorption and development of the plant. This cell design only takes up a tiny bit of space on the kitchen countertop, and, in a week’s time, at least half of the cloves have sprouted!

    • Thirty Seconds At 100 Megakelvins | Hackaday

      Back in Dec 2020 we wrote about the Korea Superconducting Tokamak Advanced Research (KSTAR) magnetic fusion reactor’s record-breaking feat of heating hydrogen plasma up to 100 megakelvins for 20 seconds. Last month it broke its own record, extending that to 30 seconds. The target of the program is 300 seconds by 2026. There is a bit of competition going, as KSTAR’s Chinese partner in the International Thermonuclear Experimental Reactor (ITER), the Experimental Advanced Superconducting Tokamak (EAST) did a run a week later reaching 70 million degrees for 1056 seconds. It should be noted that KSTAR is reaching these temperatures by heating ions in the plasma, while EAST takes a different approach acting on the electrons.

    • Hardware

      • Printable Portable Mask Gives You The Numbers On Your Workout | Hackaday

        We’re currently in the midst of New Year’s Resolutions season, which means an abundance of spanking new treadmills and exercise bikes. And one thing becomes quickly obvious while using those machines: the instruments on them are, at best, only approximately useful for measuring things like your pulse rate, and in the case of estimating the calories burned by your workout, are sometimes wildly optimistic.

    • Integrity/Availability

      • Proprietary

        • Security

          • Josh Bressers: Episode 306 – Open source isn’t broken, it’s an experience

            Josh and Kurt talk about the faker and colors NPM events. There is a lot of discussion around open source being broken or somehow failing because of these events. The real answer is open source is an experience. How we interact with our dependencies determines what the experience looks like.

          • Top 5 opensource firewalls that secure your network

            What can come among the top 5 open source firewalls? Yes, this I was thinking of! Of course, there are lots of services and ready use os available. Deciding to deploy any firewall can be difficult. Why difficult? Well, the reason is simple, we never know what consequences will be there while not taking care of security. From the very beginning of the Linux era, things started with Squid, where Administrators were supposed to manage everything manually. I remember still, how we were supposed to get install service with RPM manually. How all ACLs, IP address ranges were supposed to take care of very precisely. Getting access to logs, reports was altogether a tedious job. Applying IPTable to provide extra layer security made Linux admins feel like some sort of saviors.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

    • Monopolies

      • 6 Tips For Ensuring Your Intellectual Property Works For You [Ed: False terminology; "Intellectual Property" is a misleading misnomer, it should say trademarks instead]

        IP rights are valuable assets to any business. Patents and utility models protect new technologies and give you a monopoly over them. Trademarks protect your brand and ensure that only you can use it. Industrial design rights protect the appearance of a given product and gives you exclusive rights over it. These rights provide significant commercial advantages which can lead to higher revenues and profits.

      • Patents

        • Official expresses concern that pandemic will drag on until the world is vaccinated

          How patent law and corporate profits keep variants crawling the globe

        • A review of railway innovation through patenting trends

          Turning first to Figure 1 below, which shows EU patenting trends across the aforementioned subsystems, the data indicates that the ENE and INF areas have remained relatively stable in terms of patent filings, but that CCS and RST have seen significant increases in patent filings since around 2010. Of note, the “High value inventions” referred to on the Y-axis of Figure 1 represents patent families “that include patent applications filed in more than one patent office”.

        • Deferred Subject Matter Eligibility Response (DSMER) Pilot Program

          Back in 2010, I wrote an article with Prof Rob Merges titled Operating Efficiently Post-Bilski by Ordering Patent Doctrine Decision-Making. We suggested that patent examiners often lack capacity to judge metaphysical questions centered around abstractness and laws of nature. In addition, we noted that many eligibility questions substantially overlap with bread-and-butter patent doctrines such as obviousness, enablement, and indefiniteness. What that means is that delaying eligibility decisions can often result in entirely avoiding eligibility decisions. In a 2019 article, Professor Chien provided more detailed guidance on how this could be accomplished.

        • Serstech files nine patent applications [Ed: Serstech acting as if patents, even software patents which are mostly bunk, are a substitute for actual products]

          Serstech has filed nine patent applications to the European patent office over the last two weeks. The patent applications are filed to protect the newly launched Serstech Arx products and the next generation product platform that is currently under development. Due to ongoing and expected sales opportunities in particularly the US market, Serstech recently decided to ramp up its IPR efforts to better protect its innovations.

        • UK: With News That The Austrian Parliament Has Ratified The Protocol On The Provisional Application Of The Agreement On A Unified [Ed: And yet more shameless fake news from Team UPC]

          With news that the Austrian parliament has ratified the Protocol on the provisional application of the Agreement on a Unified Patent Court on 2 December 2020, the #UPC opening in 2022 is becoming more likely.

        • IP in 2022 – What next and where? [Ed: Truly ridiculous propaganda item with the misnomer “IP”; it also promotes fake news about UPC along the way]
        • Mazda May Be Cooking Up a Rotary-Powered Sports Car After All [Ed: EPO patent valid though?]

          Rumors about Mazda building a new rotary-engined sports car have proliferated ever since Mazda pulled the RX-8 after 2012. Mazda stoked those rumors with their spectacular RX-Vision rotary sports car concept they unveiled in Tokyo in 2015, and the company has affirmed the desire to build such a rotary sports cars — if it becomes feasible. Now, however, we have some new evidence the brand has been working on one behind the scenes.

        • Mazda Patent App Shows Hybrid Rotary Engine That Powers the Rear Wheels

          Everyone’s been waiting for a new rotary-powered Mazda since the RX-8 bowed out in 2012. Mazda itself even built an RX-Vision Concept that many believed would preview an eventual RX-9; that was way back in 2015, though, and we still haven’t seen anything like it enter production. The car world had more or less accepted that rotaries would only have a future as EV range extenders—that is, until Friday when a patent application was unveiled showing what looks like a hybrid rotary engine that drives the rear wheels.

          Detailed patent drawings from Europe were published on a Japanese Hatena blog, which pointed out key details that hint this may be a three-rotor engine. Indeed, there are what look like three spark plug holes and three rotor housings, so it would likely be pretty potent. Factor in the electrification aspect and it’s doubtful anyone would call it underwhelming like they did with the naturally aspirated RX-8.

        • Is Amending the Description of a European Patent Application to be Consigned to History? [Ed: These EPO boards are stacked and besieged; this merits a mention all the time, but they leave that out]

          In a notable decision on an apparently mundane legal topic, a Technical Board of Appeal of the EPO recently decided (in T 1989/18) that requiring applicants to amend their description so that it is consistent with the claims has no basis in the EPC. This decision may help to consign this practice to history, streamlining the prosecution process at the EPO in a way that will be welcomed by applicants and attorneys alike.

          It is a historic feature of European practice that the description of a patent application must be amended so that it is consistent with the claims. The Guidelines for Examination at the EPO refer to a number of examples of inconsistencies that must be corrected. One example includes inconsistencies where a statement in the description suggests that the invention is limited to a particular feature, but the claims are not so limited. Another example is where it is stated or implied in the description that certain features are essential to the invention when those features are not present in the claims. A further example is where parts of the description give the impression that they disclose ways of carrying out the invention, when those examples are no longer within the scope of the claims. Examiners can be particularly enthusiastic in pursuing these objections. In order to overcome these objections it is often necessary to make amendments wherever the word “embodiment” or “invention” appears. It can also be necessary to delete passages or to indicate in the description that certain examples are not within the scope of the claims.

      • Trademarks

        • IP Court Clarifies What Constitutes Token Use For Trademarks Vulnerable To Non-Use

          Russian law stipulates that if an owner does not use a trademark within three years, it can be cancelled. To avoid this happening, some owners try to keep their marks alive by producing evidence of use, though in very small volumes. However, token use is generally insufficient to establish that a trademark is, in fact, being used. The IP Court of the Russian Federation often issues rulings to this effect, and has published some criteria for what it defines as ‘token use’.

        • Quality no longer affects assessment of trademark recognition in Polish courts [Ed: When trademark law becomes just a pipeline for rubber-stamping]

          Proving the reputation of a trademark is not an easy task. The owner must prove that the mark is recognised by a significant share of the population in a substantial part of the territory in which it is registered. In the European Union this is mainly assessed using quantitative criteria. However in Poland, one must also provide qualitative criteria to prove recognition.

          The reputation of a mark is not defined by the EU Trademark Regulation, nor by Polish industrial law. Pursuant to case law, a well-known mark must have sufficient recognition that the relevant public, when confronted by a similar mark, may possibly make an association between the two, even when they are used for non-similar products or services, consequently damaging the reputation of the established mark (14/09/1999, C-375/97, Chevy, EU:C:1999:408, § 22-23). There is no EU case law specifying that a qualitative threshold must be met in order to enjoy protection deriving from reputation.

      • Copyrights

        • Turkey: What Amendments Does Law No. 7346 On Amendment Of Certain Laws Envisage In Law No. 5846 On Intellectual And Artistic Works? [Ed: Treating people who share like criminals]

          Law No. 7346 aims to redraw the boundaries of criminal liability by expanding the scope of the acts stipulated in Article 72 of the Copyright Law.

        • Federal Supreme Court seeks clarification on visibility criterion in German design law

          ‘What you see is what you get’ is one of the vital principles of EU (and German) design law. Particularly in relation to designs for component parts of a complex product (ie, parts used in or incorporated into a complex product, eg, a car hood), EU design law ties availability of design protection to visibility of such parts during normal use. This ‘visibility criterion’ has massive practical relevance in design law. Still, the Court of Justice of the European Union (CJEU) – despite a few incidental remarks in the more recent Ferrari ruling (C-123/20) on unregistered EU designs – has not yet had the chance to give specific guidance on how ‘visibility’ is to be assessed. Upon a referral (I ZB 31/20) from the German Federal Supreme Court (BGH), an inconspicuous bicycle saddle might now write history in that it could trigger the CJEU to define the contours of the visibility criterion in more detail.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts