Huawei’s struggles with the US government is still far from over, with the company currently only 30 days into a 90-day reprieve from the US Commerce Department’s ban which prevents US companies from trading with the Chinese giant.
While there is a possibility that this ban will be extended again and again, there is also the possibility that come December Huawei will no longer have access to Google’s Android and Microsoft’s Windows operating systems.
On smartphones, Huawei is working on Harmony OS to replace Android. While this operating system could run on the desktop it would need a lot more development.
There is however a readymade free OS for the desktop already, Linux, and today Betanews reports that Huawei has started selling their MateBook 13, MateBook 14, and MateBook X Pro running the OS in China.
The mid-May sanction has forced the Chinese tech giant to look for alternatives, and while everybody knew Linux was the first option, Huawei has been working hard on its very own operating system as well.
Called HongMeng, this project eventually turned to be a platform for IoT devices, but it can easily convert to mobile and desktop if needed.
However, Linux appears to be Huawei’s choice in the short term, and the company thus launched the very first devices running this operating system in its home market.
I have always had a bit of a soft spot for the TWiT team and more specifically Leo Laporte. Years ago I used to co-host FLOSS Weekly on their network and occasionally I pop over to the studio for a natter with Leo.
With ‘People Powered: How communities can supercharge your business, brand, and teams‘ coming out, I thought it would be fun to hop over there. Leo graciously agreed and we recorded an episode of their show, Triangulation.
Speed is the big story around GNOME 3.34, two new major Firefox security features start to roll out, and we explain the CentOS 8 delay.
Plus our thoughts on the PineTime, and more.
Linus Torvalds has just announced the release of Linux 5.3: So we’ve had a fairly quiet last week, but I think it was good that we ended up having that extra week and the final rc8.
After 8 release candidates, Linus Torvalds has finally released Linux Kernel 5.3. It is a major upgrade that brings many new features in terms of better hardware support, changes specific to Arm architecture and a couple of bug fixes.
The extra release candidate RC8, as Torvalds says, was because of his busy travel schedule. Nonetheless, RC8 has allowed developers to bring in some essential bug fixes.
Now that the first beta of Qt 5.14 is getting closer, it is time to start talking about one of the big new features. We cannot possibly cover all the details around the graphics stack improvements and the road to Qt 6 in one post, so in part 1 and 2 we will describe the background and take a closer look at what 5.14 will ship with, and then dive into the technical details and future directions in another set of posts later on.
A Linux patch reveals that AMD is actively working on two APU series, Dali and Renoir. If chatter is correct then Renoir is to focus on the mobile and the desktop market whereas Dali will be targeted at budget-friendly small form factor builds and mobile systems.
Renoir likely will be making use of Vega architecture (not NAVI). However, the processor cores would be likely be based on Zen 2 at a 7nm fabrication process.
The default image viewer in most Linux distros is a fine option for many users, but if you want a distraction free alternative, Feh is a good option.
Feh's interface is as barebones as it gets as it does not have any toolbars or buttons but is a command line interface application; because of that, it is very light on resources and still easy enough to use even for users who shy away from using the command line whenever possible.
There are many reasons you might need to find out details about your computer hardware. For example, if you need help fixing something and post a plea in an online forum, people will immediately ask you for specifics about your computer. Or, if you want to upgrade your computer, you'll need to know what you have and what you can have. You need to interrogate your computer to discover its specifications.
Alternatively, you could open up the box and read the labels on the disks, memory, and other devices. Or you could enter the boot-time panels—the so-called UEFI or BIOS panels. Just hit the proper program function key during the boot process to access them. These two methods give you hardware details but omit software information.
Or, you could issue a Linux line command. Wait a minute… that sounds difficult. Why would you do this?
EndlessOS is a distribution of Linux I have been watching from afar and almost dabbled with several times. Unfortunately for me and my biases, I didn’t take the time to get to know this distribution sooner. This is an incredibly interesting project that has been given a lot of time and care with plenty of thought. In no way should Endless ever be confused with a casual passion project. This is a serious, well designed and well thought out distribution of Linux that should be part of any Linux user’s growth in an open source enthusiastenthusiest.
Bottom line up front: Endless OS is a very interesting Linux distribution that has a specific target. I am not that target that I can appreciate. To refer to Endless as a Linux distribution does not do it justice as this is so much more. This is a Linux product. The “offline internet” and especially the Cooking application with the loads and loads of recipes built into it. There has obviously been a lot of thought that went into the user interface as this is incredibly polished. The presentation and holistic thoughtfulness in the user interface is not lost on me at all. The interface and the design intent is quite clear but is clearly not for me. I will stick with my more customizable KDE Plasma with my comfortable, leading-edge base that openSUSE Tumbleweed provides.@endlessglobalBottom line up front: Endless OS is a very interesting Linux distribution that has a specific target. I am not that target that I can appreciate. To refer to Endless as a Linux distribution does not do it justice as this is so much more. This is a Linux product. The “offline internet” and especially the Cooking application with the loads and loads of recipes built into it. There has obviously been a lot of thought that went into the user interface as this is incredibly polished. The presentation and holistic thoughtfulness in the user interface is not lost on me at all. The interface and the design intent is quite clear but is clearly not for me. I will stick with my more customizable KDE Plasma with my comfortable, leading-edge base that openSUSE Tumbleweed provides.
BlackWeb is a penetration and security testing distribution based on Debian. The project's website presents the distribution's features as follows:
BlackWeb is a Linux distribution aimed at advanced penetration testing and security auditing. BlackWeb contains several hundred tools which are geared towards various information security tasks, such as penetration testing, security research, computer forensics and reverse engineering. Starting from an appropriately configured LXDE desktop manager it offers stability and speed. BlackWeb has been designed with the aim of achieving the maximum performance and minimum consumption of resources.
There are 32-bit (x86) and 64-bit (x86_64) builds of BlackWeb available on the distribution's website. I downloaded the 64-bit build which is 2.6GB in size. Booting from the media brings up a menu asking if we would like to try BlackWeb's live desktop, run the installer or run the graphical installer. Taking the live desktop options presents us with a graphical login screen where we can sign in with the username "root" and the password "blackweb".
In this video, we are looking at KaOS 19.09.
Recently, we’ve been having some discussion around the use of non-free software and services in doing our Debian work. In judging consensus surrounding a discussion of Git packaging, I said that we do not have a consensus to forbid the use of non-free services like Github. I stand behind that consensus call. Ian Jackson, who initially thought that I misread the consensus later agreed with my call.
I have been debating whether it would be wise for me as project leader to say more on the issue. Ultimately I have decided to share my thoughts. Yes, some of this is my personal opinion. Yet I think my thoughts resonate with things said on the mailing list; by sharing my thoughts I may help facilitate the discussion.
We are bound together by the Social Contract. Anyone is welcome to contribute to Debian so long as they follow the Social Contract, the DFSG, and the rest of our community standards. The Social Contract talks about what we will build (a free operating system called Debian). Besides SC #3 (we will not hide problems), the contract says very little about how we will build Debian.
What matters is what you do, not what you believe. You don’t even need to believe in free software to be part of Debian, so long as you’re busy writing or contributing to free software. Whether it’s because you believe in user freedom or because your large company has chosen Debian for entirely pragmatic reasons, your free software contributions are welcome.
I think that is one of our core strengths. We’re an incredibly diverse community. When we try to tie something else to what it means to be Debian beyond the quality of that free operating system we produce, judged by how it meets the needs of our users, we risk diminishing Debian. Our diversity serves the free software community well. We have always balanced pragmatic concerns against freedom. We didn’t ignore binary blobs and non-free firmware in the kernel, but we took the time to make sure we balanced our users’ needs for functional systems against their needs for freedom. By being so diverse, we have helped build a product that is useful both to people who care about freedom and other issues. Debian has been pragmatic enough that our product is wildly popular. We care enough about freedom and do the hard work of finding workable solutions that many issues of software freedom have become mainstream concerns with viable solutions.
Those who are frequent followers of Linux know that the open-source OS-based smartphones are trying to make a stand in a world where Android and iOS are the current dominants. With Librem 5’s release and PinePhone soon to make its official entry, we have news that a Linux smartphone will soon get a companion in the form of a Linux smartwatch.
As announced by Pine64 via a tweet, it will be adding a Linux-based smartwatch to its portfolio in addition to the PinePhone and the Pinebook Pro. The upcoming Linux smartwatch will be Pine64’s side-project as declared by the company itself.
Richard Stallman, a well-known MIT computer scientist who’s previously suggested that President Donald Trump stole the 2016 presidential election, has been accused of not only defending deceased billionaire pedophile Jeffrey Epstein’s alleged crimes but also smearing his victims.
MIT's Jeffrey Epstein awkwardness isn't going away yet. Days after the director of the MIT Media Lab resigned after being accused of accepting and covering up donations from Epstein, emails have surfaced that show a famed computer scientist excusing sexual assault. Richard Stallman wrote that it's likely that a woman who says she was recruited for sex at age 16 was "entirely willing," the Daily Beast reports, logic that would excuse the late Marvin Minsky, who founded MIT’s Artificial Intelligence Lab.
Remarkably, in order to make their allegations against Stallman, both Selam G. and Edward Ongweso Jr. must speak untruthfully about what Stallman wrote.
Selam G., for example, writes: "…and then [Stallman] says that an enslaved child could, somehow, be "entirely willing"." Yet, what Stallman actually wrote was that if the victim were being coerced by Epstein, he thinks it most likely that she would have been directed to conceal that coercion from Minsky and others. The two statements are very different. What Salem G. falsely attributes to Stallman would indeed be very damning -- but it is not what Stallman wrote at all.
Edward Ongweso Jr. offers this slander: "Early in the thread, Stallman insists that the "most plausible scenario" is that Epstein's underage victims were "entirely willing" while being trafficked." The truth, however, is that Stallman wrote: "We can imagine many scenarios, but the most plausible scenario is that she presented herself to him as entirely willing." Two two statements are, again, very different. Ongweso Jr.'s false paraphrase is about whether the young woman was willing. Stallman's is about how, under the circumstances, the young woman might have appeared to Minsky to be willing, for example if she were directed to conceal the coercion.
Accusations such as Salem G. and Ongweso Jr. make are made to cause harm to the accused. That is how they appear to be made in this context: with the aim of harming Stallman. Yet in order to accomplish this harm, both Salem G. and Ongweso Jr. must abandon the truth in favor of statements falsely attributed to Stallman.
It would be appropriate, in my opinion, for both writers to retract their critical misstatements of fact.
I want to respond to the misleading media coverage of messages I posted about Marvin Minsky's association with Jeffrey Epstein. The coverage totally mischaracterised my statements.
Headlines say that I defended Epstein. Nothing could be further from the truth. I've called him a "serial rapist", and said he deserved to be imprisoned. But many people now believe I defended him — and other inaccurate claims — and feel a real hurt because of what they believe I said.
I'm sorry for that hurt. I wish I could have prevented the misunderstanding.
On MIT's internal Computer Science and Artificial Intelligence Laboratory (CSAIL) listerv, Stallman had seen the description of a protest of Marvin Minsky which said Minsky was "accused of assaulting" one of Epstein's victims. Stallman argued that "the most plausible scenario" is that "she presented herself to him as entirely willing" -- even if she was coerced by Epstein into doing so -- whereas the phrase "assaulting" implies the use of force or violence, faciliating what he calls "accusation inflation... Whatever conduct you want to criticize, you should describe it with a specific term that avoids moral vagueness about the nature of the criticism."
An angry MIT alumni who was forwarded the email then "started emailing reporters -- local and national, news sites, newspapers, radio stations" -- and then not receiving quick enough responses, published it herself in a Medium essay titled "Remove Richard Stallman. And everyone else horrible in tech." And then leaked the whole thread to Vice.
Joi sought the gifts for general research purposes, such as supporting lab scientists and buying equipment. Because the members of my team involved believed it was important that Epstein not use gifts to MIT for publicity or to enhance his own reputation, they asked Joi to agree to make clear to Epstein that he could not put his name on them publicly. These guidelines were provided to and apparently followed by the Media Lab.
Information shared with us last night also indicates that Epstein gifts were discussed at at least one of MIT’s regular senior team meetings, and I was present.
I am aware that we could and should have asked more questions about Jeffrey Epstein and about his interactions with Joi. We did not see through the limited facts we had, and we did not take time to understand the gravity of Epstein’s offenses or the harm to his young victims. I take responsibility for those errors.
While the fact finding will continue, we have already identified flaws in our processes that need to be addressed.
I am confident that, once Goodwin Procter submits its final fact-finding to the Executive Committee and me, and the Provost’s internal review is complete, MIT will have the tools to improve our review and approval processes and turn back to the central work of the Institute.
There are many different ways to solve problems in computing. You might "brute force" your way to a solution by calculating as many possibilities as you can, or you might take a procedural approach and carefully establish the known factors that influence the correct answer. In constraint programming, a problem is viewed as a series of limitations on what could possibly be a valid solution. This paradigm can be applied to effectively solve a group of problems that can be translated to variables and constraints or represented as a mathematic equation. In this way, it is related to the Constraint Satisfaction Problem (CSP).
Using a declarative programming style, it describes a general model with certain properties. In contrast to the imperative style, it doesn't tell how to achieve something, but rather what to achieve. Instead of defining a set of instructions with only one obvious way to compute values, constraint programming declares relationships between variables within constraints. A final model makes it possible to compute the values of variables regardless of direction or changes. Thus, any change in the value of one variable affects the whole system (i.e., all other variables), and to satisfy defined constraints, it leads to recomputing the other values.
With the world stepping towards a new age of technology development, it isn’t hard to imagine a future that will be full of screens. And if so be the case then, demand for people with strong programming skills will definitely rise with more number of people required to develop and support the applications. Python Training is always a good idea for those wishes to be a part of this constantly developing industry. Python language is not only easy to grasp, but emphasizes less on syntax which is why a few mistakes here and there doesn’t give as much trouble as some other languages does.
Sen. Lindsey Graham (R-SC) threatens to "break the regime’s back"
We are now just one week away from the end of Julian Assange’s uniquely lengthy imprisonment for bail violation. He will receive parole from the rest of that sentence, but will continue to be imprisoned on remand awaiting his hearing on extradition to the USA – a process which could last several years.
In a North American context, it’s the greatest taboo of all to actually admit that there are going to be limits. You see that in the way Fox News has gone after the Green New Deal—they are coming after your hamburgers! It cuts to the heart of the American dream—every generation gets more than the last, there is always a new frontier to expand to, the whole idea of settler-colonial nations like ours. When somebody comes along and says, actually, there are limits, we’ve got some tough decisions, we need to figure out how to manage what’s left, we’ve got to share equitably—it is a psychic attack. And so the response [on the left] has been to avoid, and say no, no, we’re not coming to take away your stuff, there are going to be all kinds of benefits. And there are going to be benefits: We’ll have more livable cities, we’ll have less polluted air, we’ll spend less time stuck in traffic, we can design happier, richer lives in so many ways. But we are going to have to contract on the endless, disposable consumption side.
A study says Earth’s hot spots have already warmed by more than the safe limit for avoiding dangerous climate change.
Since then, we’ve been telling the stories overlooked by mainstream media: debunking early arguments of climate science deniers, exposing their funding sources and networks, and examining the questionable claims (and finances) of the “fracking revolution” that has contributed to the climate crisis, just to name a€ few.
“Freak yachting accidents do€ happen…”
The climate crisis has moved into everyday life and it can feel overwhelming.Hurricane Dorian, which left more than 70,000 people homeless, was an instance of this climate breakdown. A hotter ocean means stronger storms, a higher sea means worse flooding, a hotter atmosphere means more rain. Worsening wildfires in California and elsewhere...
Moreover, the attacks come at a sensitive time for the oil markets in general and for Aramco in particular, which is preparing to list a portion of its shares in what is expected to be the largest initial public offering ever. In preparation for its listing, Saudi Arabia has been keen to show both that it can support the oil price and that it can produce crude reliably, despite mounting security threats. Recent events reveal the limits of its ability to do either.
"Based on the attack on Saudi Arabia, which may have an impact on oil prices, I have authorized the release of oil from the Strategic Petroleum Reserve, if needed, in a to-be-determined amount sufficient to keep the markets well-supplied," Trump said in a series of tweets. "I have also informed all appropriate agencies to expedite approvals of the oil pipelines currently in the permitting process in Texas and various other States."
While there are documented cases of succulent poaching in dating back at least two decades, officials say it has recently increased in frequency and severity. Plant experts tell Salon poachers take these plants from private and public properties. And such poaching is destroying California’s coastal ecosystem, already compromised by invasive plants and human development.
[...]
Suba added that people don't need poachers to enjoy these plants, noting that they are easy to grow. A pinch of seeds, he said, can produce ten thousand plants.
It doesn’t matter who the Democratic nominee for president is next year, they will be attacked for being “socialist.”€ It will be relentless and merciless.€ The problem is that none of the current candidates know how to talk about socialism, so they always seem to be on the defensive.€ They’re always back on their heels, explaining, evading, apologizing.
I don’t know about you, but I take a teeny weeny bit of offense when a guy in a glass house lobs a great big stone and expects me not to notice the sound of shattering. Which brings me to National Public Radio.
[...]
This had me picking through the shards when they went on to explain that Lansing comes to NPR from the United States Agency for Global Media, a federally-funded organization whose express mission is to interfere in journalism by doing it, in such as way as to promote American policy values all across the world.
NPR’s new CEO story came with a picture of Lansing in his capacity as CEO of USAGM, testifying in Congress about the scourge of Russian media meddling. “The Russian government and other authoritarian regimes engage in far-reaching, malign influence campaigns,” he said.
The arc of American history reveals an unmistakable pattern. Whenever privilege and power conspire to pull us backward, we eventually rally and move forward.
The United Auto Workers union announced Sunday that its roughly 49,000 workers at General Motors plants in the U.S. would go on strike just before midnight because contentious talks on a new contract had broken down.
The State Department has warned Americans about China’s growing use of exit bans – stating in a Jan. 3 travel advisory that Chinese authorities have sometimes used exit bans to keep Americans in China for years.
“China uses exit bans coercively,” the State Department cautioned, “to compel U.S. citizens to participate in Chinese government investigations, to lure individuals back to China from abroad, and to aid Chinese authorities in resolving civil disputes in favor of Chinese parties.”
Israelis are getting ready to head to the polls for the second time in 2019. Israel’s last national elections were five months ago in April, ending in a razor-tight finish with Netanyahu’s Likud party winning 35 Knesset seats and the Blue and White party winning 35 Knesset seats.
At least three Democratic presidential candidates are calling for the impeachment of Supreme Court Justice Brett Kavanaugh in the face of a new, uninvestigated, allegation of sexual impropriety when he was in college.
Aside from the high level of intrusion this kind of tracking represents, there’s another worrying aspect. Judging by the 187,000 reviews of Maya on Google Play, almost nobody is aware of how their most personal information is being passed around. That’s not a surprise: Privacy International had to use some fairly sophisticated software tools in order to study the data flows from these period tracking apps. Few general users would be able to do that, even if it occurred to them to try. But the more sensitive the personal data that is being collected, the stronger should be the protections to keep it safe at all times, and the greater should be the transparency about how it used.
Indian authorities should immediately release detained Kashmiris who have not been charged with a recognizable offense.
Chinese authorities should immediately release to their families children held in “child welfare” institutions and boarding schools in Xinjiang, Human Rights Watch said today. The government should cease unnecessarily separating Uyghur and other Turkic Muslim children from their families.€
For years, the independent repair community has said that Apple has engaged in anticompetitive behavior by refusing to sell parts to repair shops who are not “authorized” by the company. The company has also lobbied heavily against so called right-to-repair legislation, which would require it and other electronics companies to sell parts and tools to the general public. It has sued independent repair companies for using aftermarket and refurbished parts and worked with the Department of Homeland Security to seize unauthorized repair parts from small businesses both at customs and from individual shops. And, as the committee's letter notes, Apple cut a deal with Amazon that restricted who is allowed to sell refurbished Apple devices on Amazon.
Apple has made small strides toward opening up the repair ecosystem. Earlier this month, the company said it would begin to sell repair parts to certain independent repair shops, though it has not said how much they will cost or what parts will be available.
The internal communications are due to the committee on October 14.
One of the prerequisites of beating piracy is that content is available legally for a fair price. In recent years, however, movies and music are increasingly becoming fragmented over a variety of paid subscription services. According to a UK Government report, this may be the reason why piracy is making a comeback.
TV viewers in the UK are blessed with a wealth of channels provided free-to-air, such as the world-famous BBC and ITV selections. Interestingly, however, the operator of a 'pirate' IPTV service says that people are increasingly turning to platforms like his to access the same channels due to a better viewing experience.