Hello and welcome to a very special edition of our Linux Weekly Roundup!
We reached our 100th edition! That means nearly 2 years of Linux Roundups. I can't believe it!
In this week Amarok Linux 2.1 and KDE Plasma 5.20 have been released.
I’ve noted before that in many cases you can actually use a Chromebook to get through a Computer Science degree. That’s mainly due to having full access to Linux where it’s easy to install and use your programming tools of choice.
Introduced here at 9to5Linux about four months ago, Fosshost is a not-for-profit hosting provider for FOSS (Free and Open Source Software) projects. They offer hosting services like virtualized infrastructure, mirrors, storage, collaboration, and domain name to open-source projects who meet their eligibility criteria.
Among the big names that Fosshost offers its services, there’s Debian GNU/Linux, GNOME, Xfce, The Tor Project, IPFire, Xubuntu, Armbian, Linux Lite, Manjaro Linux, Deepin Linux, FreeCAD, F-Droid, Qubes OS, Serpent OS, Ubuntu Unity, and many more.
I wanted to learn a bit more about this awesome initiative and their future endeavors, so I spoke with Thomas, the Founder of Fosshost.
Listener email and a look at GNU Nano from the **ap** package set of Slackware Linux.
Today we are looking at Amarok Linux 2.1. It is an XFCE distro based on Debian 10, Linux Kernel 5.4, and uses about 600-700 MB of ram when idling. It is beautiful also, just need to smooth out a light theme. Enjoy!
In this video, we are looking at Amarok Linux 2.1.
The new Plasma release makes a compelling argument for the workstation, why LibreOffice and OpenOffice can't seem to get along and a recently found bug in Linux that goes back to Kernel 2.6.
Plus, our thoughts on Apple's seeming abandoning of CUPS, the latest and greatest open source podcast player, and an important show update.
The Linux 5.10 kernel "staging" changes have the usual assortment of changes throughout this area where premature kernel code goes prior to proving itself and meeting kernel coding quality standards.
For Linux 5.10 there is the seemingly never-ending work on cleaning up Realtek network drivers, this cycle with more work on the rtl8188eu and rtl8723bs drivers. Other network candidates like WFX, which hit staging a year ago, continue to be cleaned up.
The staging area also saw more work on the HiKey / Kirin 900 series support with a new SPMI controller driver and PHY driver for the Kirin 970 SoC. Also on the staging front is a new character device interface driver for the five-year-old MOST subsystem.
RapidDisk is an advanced Linux RAM Disk which consists of a collection of modules and an administration tool. Features include: Dynamically allocate RAM as block device. Use them as stand alone disk drives or even map them as caching nodes to slower local disk drives.
MuseScore, free open-source sheet music player and editor, released version 3.5.2 with bug-fixes.
Graylog is not a system monitoring tool; it’s a system monitoring server. I am sure; previously, you have been using tools to monitor your Linux system. The concept of Graylog is mind-blowing; it’s enormous. Have you thought before that you can install an entire server to monitor your system or services? Graylog offers you to monitor your small, medium, and big all types of systems and services. As you are going through this post, you will learn a lot about the Graylog monitoring server. Graylog will provide you every single detail that you might have wanted to know about your system. Installing and configuring the Graylog monitoring server is not much complex on Ubuntu and other Linux distributions.
In this tutorial, we guide you through the process for how to install kernel headers, check the version of installed kernel headers, and switch between kernel header versions on Manjaro Linux.
Disk space monitoring is considered a very important task when working with any device, whether it is a mobile phone, laptop, desktop, or even a tablet. It is important to ensure the proper functioning of any device by keeping an eye on the disk space. This helps you in identifying the programs or the applications that are using a large amount of space and informs you if you are about to run out of disk space.
Like every other operating system, Linux also provides multiple ways to keep track of the disk space on your device, including both CLI-based and GUI-based methods. In Linux, however, most operations are performed via the command line. Therefore, Linux users are more likely to be interested in methods of checking disk space via the command line. This is why our discussion today will revolve solely around methods for checking disk space in Linux from the command line.
This tutorial shows how to find file creation time in Linux using debugfs. Inode number and partition where directory created is required.
Learn how to install OpenLiteSpeed web server on CentOS 8 and RHEL 8 system.
This video tutorial shows how to install GhostBSD 20.04.8 on VMware Workstation step by step.
Today we're checking out a new and interesting way to navigate through your Linux file system called z lua which learns how you navigate linux and provides you with neat shortcuts to do it quicker.
To cut or copy text in Nano editor, the Ctrl+K or Ctrl+6 shortcuts are used to cut and copy, respectively. These shortcuts do not copy the text to your GNOME clipboard. Instead, they copy the text only to a special cut buffer inside the Nano editor. You cannot paste the cut or copied text from the cut buffer to anywhere outside the Nano editor, including the shell.
We are familiar with different keyboard shortcuts that are used in the nano text editor. So, we will find how to move your cursor or navigate through nano. As we know, you can navigate within a file using the arrows keys or through the Home, Page Up, and Page Down, End keys. But, more specifically, here we will discuss above some shortcuts that we can use with the ^ symbol or Ctrl key for cursor navigation in Nano. If you have a problem with remembering these shortcuts, then, using Ctrl+G, you can display help where you can easily find all shortcuts for each specific action.
To move your cursor in the forward direction, you can use Ctrl+f and for backward movement, use Ctrl+b. These keys will move forward or backward your cursor one letter or character at a time. To move your cursor one word forward, then use Ctrl+Space and use Alt+Space to move one word backward.
Today we are looking at how to install Mine-Imator on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!
AO is an unofficial take on the Microsoft Todo app for Linux. It aims to give Linux users an elegant way of managing their tasks using the Microsoft tool.
Joplin is an open-source & free note-taking application, bundled with plenty of features. Joplin is extremely powerful and can easily handle the organization and management of large sets of notes categorized into multiple notebooks. Joplin further allows users to synchronize their accounts with cloud services. In this article, how to install and use Joplin note-taking app on Ubuntu 20.04 is explained.
Linux is one of the most sought-after operating systems in recent times. It is free and open-source and is highly customizable. Operating systems are often referred to as distributions. One such great alternative is the Peppermint OS distribution, an extremely lightweight Lubuntu based Linux distribution that makes use of the LXDE desktop environment. In this article, how one can install Peppermint OS on VirtualBox is explained.
If you’re using Raspberry Pi for your projects, you may face many wireless or Wi-Fi network connectivity issues once in a while. These issues may be difficult to solve for you. In this article, I am going to talk about different Wi-Fi network connectivity issues and show you how to solve them.
Following my recent article on Steam Machines, quite a few comments appeared on the interwebs. Among them, someone remarked that my final point about Linux Gaming being too reliant on Valve was missing the fact that Google Stadia exists. And therefore this would be akin to having several companies for which Linux gaming matters.
This is a valid point. I had to address it.
What is Stadia? Stadia is a solution designed by Google to stream games to any device with little latency, as long as such devices have a Google Stadia client, the Chrome web browser or a Chromecast. There is a free tier where you can use Stadia and purchase games as you go, and a Pro version which costs about 10 bucks per month after you buy the Premiere Edition with the controller (129 USD).
The long wait is finally over. KDE Plasma Desktop 5.20 is released and now available to the masses for download. The KDE team describes Plasma Desktop 5.20 release as an "absolutely massive one." Released on October 13, 2020, the KDE Plasma Desktop comes loaded with many features. That is quite expected considering the four months of development poured into these releases. For KDE Neon users, Plasma Desktop 5.20 is already available for download.
There's a lot of intense, opinionated debate on the current state of Plasma's Wayland session these days. This seems to be fueled by mainly two events, Fedora's announcement to flip to Wayland by default for version 34 of their KDE variant, and a a recent fork of KWin and a few other components of Plasma, KWinFT.
On the first, I think it's a great move. Concerns of a repeat of the "shipped before it's ready" situation of early KDE 4 releases aside (for now; more on this in a moment), it certainly feels like it makes sense for Fedora in particular - it's a bold, technology-focused early adopter move, something I think the Fedora user audience generally appreciates the distro for. Plus other Fedora variants default to Wayland already, so there's an appreciable desire to make the various offerings more consistent.
Distros should understand the user audiences they're trying to cater to, and if a distro believes there's a market for a particular flavor of desktop, it's certainly fine to challenge upstreams to provide the needed software. I think as far as Plasma on Wayland is concerned, the challenge is thoughtfully timed - it's coming after the KDE community voted to declare good Wayland support a community-wide goal, after all. I think there's every reason to believe this decision will lead to good things if the two (and overlapping) communities collaborate to make a good showing. Nice.
It's 2020, for crying out loud! Why is this taking so long?
A lot of us have some things in common. For example, if you're reading this, chances are you are the sort of person who is not indifferent to technological progress, even easily excited by it. Many of us also are also drawn to competition.
So people really care about how far down the road to Wayland adoption every of the competing projects is, and theories abound on what the comparison says about them. This is set against a backdrop of Wayland also still maturing as an upstream technology, driven forward by the same competing projects working together.
One particular claim that's been popping into the conversation lately is that Plasma not having the Wayland conversion safely in it's rear-view mirror yet is evidence of a project that's somehow fundamentally flawed, and unable to focus on what matters and make good long-term plans and roadmaps. If you didn't encounter this in one of the heated debates on social media yet it probably sounds a bit breathless to you, or maybe not really worth acknowledging - but it's actually my main reason to write this blog post, because it's an interesting excuse to talk about recent Plasma history!
It's been a while since the last blog post and it's been a while since 3.38.0 was released, and in fact there was already the stable on-schedule 3.38.1 release. On top of that a sneaky asynchronous programming bug showed up that in some circumstances such as high-latency connections, or fast typing can give out-of-sync search results I cut an extra 3.38.1.1 patch release.
But now to the summary of the 3.38 user-facing changes. I think all of this has been covered in previous posts, but I guess it's always nice with a bit of a summary.
On its 25th birthday, the OpenBSD project has released OpenBSD 6.8, the 49th release.
The new release comes with a large number of improvements and debuts a new architecture, OpenBSD/powerpc64, running on the POWER9 family of processors. The full list of changes can be found in the announcement and on the release page. Some highlights: [...]
It was in October 1995 that Theo de Raadt began the OpenBSD project as a fork of NetBSD 1.0 following his resignation from the NetBSD core development team. Now twenty-five years later OpenBSD 6.8 has been released for marking the 25th anniversary of this popular BSD distribution.
Besides being a commemorative release for the 25 year milestone, OpenBSD 6.8 has some interesting changes:
- POWER 64-bit is now supported including POWER8 and POWER9 CPUs. In particular, the Raptor Computing Systems' Talos II and Blackbird libre hardware now works with OpenBSD 6.8.
- Support for time-counting in userland to eliminate the need for context switching whenever a process needs the current time. This can yield a speed and responsiveness improvement for many real-world software packages. The userland timecounters are working in v6.8 for 64-bit x86, ARM64, POWERPC, OCTEON, and SPARC64 platforms.
This is a partial list of new features and systems included in OpenBSD 6.8. For a comprehensive list, see the changelog leading to 6.8.
opera-stable-71.0.3770.271-1pclos2020.x86_64.rpm google-chrome-stable-86.0.4240.75-1pclos2020.x86_64.rpm brave-1.15.75-1pclos2020.x86_64.rpm vivaldi-stable-3.4.2066.76-1pclos2020.x86_64.rpm
The Amnesic Incognito Live System (better known as Tails) is a Debian-based live DVD/USB with the goal of providing complete Internet anonymity for the user. The distribution ships with several Internet applications, including web browser, IRC client, mail client and instant messenger. The distribution transfers Internet traffic through the Tor network to hide its origin.
One of the project's latest releases was version 4.11. (At the time of writing 4.12 is about to be published, though without any significant new features.) Lately the project has mostly focused on bug fixes and minor tweaks, though Tails 4.11 introduces the option of persistent storage for some of the distribution's settings and data. Persistent storage is not enabled by default, but can be set up using tools included on the live media.
Tails is available for 64-bit (x86_64) computers and its live media is approximately 1.2GB in size. The live media can be written to a DVD or USB thumb drive. There are separate files provided depending on whether we want to write the distribution to DVD or USB media, however I tested and confirmed the DVD image can be written to, and run from, a USB thumb drive if need be.
Early impressions
Booting from the Tails media brings up a welcome screen. This graphical interface offers to either start the desktop session or shutdown the operating system. On this welcome screen we can click buttons to bring up settings options that allow us to select our keyboard layout, language, and locale formats. At the bottom of the welcome window is a button which opens additional settings. These extra settings are security related and allow us to assign a password to the administrator account, enable/disable MAC address spoofing, set whether to allow the "Unsafe Browser" to run, and how to connect to the Tor network or to disable networking entirely.
As you may have noticed, we didn't release an OSMC update for a while. After a lot of hard work, OSMC's October update is now here featuring Debian 10, codename "Buster" and Kodi 18.8. This yields a number of improvements and is one of our most significant OSMC updates yet. It featurues:
- Better performance - A larger number of software packages to choose from - More up to date software packages to choose from
We'd like to thank everyone involved with testing and developing this update.
We continue to work on our improved video stack for Vero 4K and Vero 4K + which brings HDR10+ and 3D MVC support. We also continue to work on Raspberry Pi 4 support and we will shortly make some kernel 5.x test builds available in our forums for currently supported Pi models so we can use a unified kernel code base for all models.
Features: – Cloud Storage – Notes in a cloud storage will be stored safely and accessible from other devices. – Multiple Platforms – Boost Note app is available in browsers, desktop app and mobile app. – Syntax Highlight – Boost Note can highlight more than 100 programming languages. – Math Equations – Boost Note supports math blocks. In the blocks, you can write math equations with LaTeX syntax. – Customizable Theme – You can customize style of the app UI, its editor and rendered markdown contents. – File System Based Storage – -You can have full control of your data. Share your notes with your favorite cloud storage service. – Extensible Markdown (Coming Soon) – You can introduce custom markdown syntax and configure how to render it.
If you read this site regularly you will know all there is to know about the upcoming Ubuntu 20.10 release. Goodies on offer include GNOME 3.38, Linux 5.8 kernel, a bespoke new-look for LibreOffice, and (of course) a gaudy new desktop graphic.
But does Groovy vibe with you? Is this gorilla more done-wrong than king-kong? Do you ape-riciate its changes, or is there little to go bananas for?
Whatever the answer to my terrible wordplay is do go ahead and file your intentions in the poll below.
Although the poll (and this post) is phrased around an “upgrade” this doesn’t have to mean a direct upgrade from Ubuntu 20.04; fresh installs count as an upgrade too.
Shared electric scooters can be found zooming many city streets, and while convenient, they can also be a nuisance when used on sidewalks instead of roadways. After receiving complaints about sidewalk riding, the city of Santa Monica, California approached the California Polytechnic State University’s Digital Transformation Hub (DxHub) about finding a solution beyond signage and outreach campaigns.
What they developed, with help from student employee Casey Johnson, is a system to throttle scooters when they are traveling on sidewalks via a solenoid. Initial detection experiments involved a dual-band GPS receiver chipset, but after that proved insufficient, accelerometer readings were then used to sense successive periodic bumps observed in sidewalk riding. A scooter prototype was implemented with an Arduino Nano and cheap IMU module, which provided a high degree of accuracy that could be further refined in the future.
There’s a lot going on on your Android screen. Maybe you’ve just scored a kill in PUBG mobile and want to share it with the world or perhaps want to record snippets of your screen for a video you’re making. In other words, there are plenty of reasons to want an Android screen recorder. And luckily, you’re not short of options. There are plenty of great Android screen recorders out there, including open-source options and a secret screen-recording option built right into Android 10. We’ve gathered them for you here.
People use a VPN — virtual private network — for a lot of reasons. However, for many people it is synonymous with hiding your network traffic, one thing that VPN can do. FreePN is a relatively new open source project that aims to build a free peer-to-peer VPN network. Like TOR, it is decentralized.
Right now, you can download for Ubuntu and Gentoo. There is a way to ask for early access for Debian, Fedora, and Arch. Windows, iOS, MacOS, and Android versions are promised for the future.
to equip future testers with practical tools and skills from the get go
As open source software, it is available under GPLv3 (GNU General Public License version 3). EspoCRM was written in PHP and JavaScript; it is designed to be used on multiple operating systems, as it is a cross-platform software.
One of AMD's compiler experts this week sent out a patch wiring up Zen 3 support in the important GNU Binutils collection for Linux systems.
The patch adds Znver3 to Binutils and was sent out at the start of the week. Unfortunately though the GNU Compiler Collection (GCC) patches for Znver3 have yet to be posted by AMD but hopefully will be done with enough time still for reaching the early next year GCC 11 compiler release.
In any case the public Binutils patch for Znver3 confirms that the forthcoming AMD Zen 3 processors support a number of new instructions.
On Friday, Oct. 16, 2020 around 5:00 p.m., an awful terrorist attack was perpetrated in my home-town of Conflans Sainte-Honorine in France (35,000 inhabitants), the city where I live and of which I am a city councilor. A secondary school teacher was beheaded by a crazy religious extremist who coudn’t accept that teacher’s defense of the freedom of speech. This is a terrible shock to all my fellow citizens, to the teachers and pupils of that school, and to my fellow members of the city council. Because of that, I did not have time to complete the second task of this challenge (although it was almost complete) and my blog post on the first task will be shorter than what I wanted to make. I actually considered not publishing a blog post this week, but I have written at least one blog post for every single Perl Weekly Challenge since the very beginning, I certainly do not want a madman to prevent me from continuing this uninterrupted series of blogs on PWC. And I also don’t want to leave my friend Mohammad S. Anwar alone in the cold.
Python offers a random number generation module. In the “random” module, we have a set of various functions that are used to create random numbers. Sometimes we need to generate random numbers while performing simulated experiments. In this article, the random number generation in Python using the various function of the “random” module is explained.
after reading this post I figured I might as well bite the bullet and improve on my CDPATH-related setup, especially because it does not work with Emacs. so i looked around for autojump-related alternatives that do.
[...]
Those are commandline tools that can be used from a shell, generally with built-in shell integration so that a shell alias will find the right directory magically, usually by keeping track of the directories visited with cd.
If you’re a prior reader of the blog, you probably know that when I have the opportunity to take a training class, I like to write a review of the course. It’s often hard to find public feedback on trainings, which feels frustrating when you’re spending thousands of dollars on that course.
Last week, I took the “Reverse Engineering with Ghidra” taught by Jeremy Blackthorne (0xJeremy) of the Boston Cybernetics Institute. It was ostensibly offered as part of the Infiltrate Conference, but 20202 being what it is, there was no conference and it was just an online training. Unfortunately for me, it was being run on East Coast time and I’m on the West Coast, so I got to enjoy some early mornings.
I won’t bury the lede here – on the whole, the course was a high-quality experience taught by an instructor who is clearly both passionate and experienced with technical instruction. I would highly recommend this course if you have little experience in reverse engineering and want to get bootstrapped on performing reversing with Ghidra. You absolutely do need to have some understanding of how programs work – memory sections, control flow, how data and code is represented in memory, etc., but you don’t need to have any meaningful RE experience. (At least, that’s my takeaway, see the course syllabus for more details.)
[...]
One key feature of Jeremy’s teaching approach is the extensive use of Jupyter notebooks for the lab exercises. This encourages students to produce a log of their work, as you can directly embed shell commands and python scripts (along with their output) as well as Markdown that can include images or other resources. A sort of a hidden gem of his approach was also an introduction to the Flameshot screenshot tool. This tool lets you add boxes, arrows, highlights, redactions, etc., to your screenshot directly in an on-screen overlay. I hadn’t seen it before, but I think it’ll be my goto screenshot tool in the future.
sphinxcontrib-spelling is a spelling checker for Sphinx-based documentation. It uses PyEnchant to produce a report showing misspelled words.
EuroPython 2020: Edited videos are online We’re happy to announce that all edited videos of this year’s conference are now available on our YouTube channel: EuroPython 2020 Playlist We have 131 videos...
“For” loops are very commonly used in all the programming languages. Similarly, Bash also has a dedicated syntax for making use of the “For” loop. The basic purpose of using this loop is to iterate through arrays which can also lead to other complex calculations. Therefore, in this article, we will be talking about the three different scenarios in which you can use the “For” loop for iterating through an array.
The “For” loop in Bash can be used with different variations for performing multiple tasks. One such variation is the “For each line in file” which is responsible for reading all the lines in a file. In this article, we will talk about the methods of using “for each line in file” in Bash.
Now in its seventh month, Covid-19 still snakes across America. It first attacked densely packed, blighted areas like New York City and Chicago, along with prisons, immigrant jails, meat slaughterhouses, and nursing homes. It then swerved south and west — again to heavily populated areas in Florida, Texas, and Arizona. In all these areas, frontline “essential” workers and those living with them were the hardest hit.
This July, a new study revealed that per- and polyfluoroalkyl substances (PFAS) — a family of potentially toxic chemicals with more than 4,700 known members — have become even more widespread in our environment than previously thought. The researchers behind the study, which was published in Environmental Science and Technology, detected 11 different PFAS compounds all the way up in the Arctic Ocean, including the first officially confirmed instance of certain relatively newer members of the PFAS family in such a remote body of seawater.
The convergence of the coronavirus pandemic and election season has complicated this year’s voting for residents of nursing homes, assisted living facilities and other long-term care centers.
The United States has the longest record of war-fighting in modern history. Why that is the case is not a question that has an easy answer; suffice to say, however, that militarism and violence run like a red thread throughout U.S. political history, with enormous costs both for the domestic economy and the world at large, as a recently published book by David Vine makes plainly clear. In fact, the militarist mentality is strongly reinforced by the Trump administration in spite of the fact that the current president claims to have an aversion to “endless wars.” In this exclusive Truthout interview, Vine, a professor of anthropology at American University in Washington, D.C., addresses critical questions about U.S. war culture and Trump’s own contribution to the violence that has always been foundational to U.S. culture.
The two-day deadline, which means by the end of day Tuesday, said the Democratic House Speaker, "relates to if we want to get it done before the election, which we do."
The mainstream media lapped up the disagreement narrative, but completely missed the fundamental problem with the declaration: its extremely dubious claims about herd immunity. This is central to the strategy, but the document badly fluffs the science.
After struggling to ramp up coronavirus testing, the U.S. can now screen several million people daily, thanks to a growing supply of rapid tests. But the boom comes with a new challenge: keeping track of the results.
All U.S. testing sites are legally required to report their results, positive and negative, to public health agencies. But state health officials say many rapid tests are going unreported, which means some new COVID-19 infections may not be counted.
And the situation could get worse, experts say. The federal government is shipping more than 100 million of the newest rapid tests to states for use in public schools, assisted living centers and other new testing sites.
“Schools certainly don’t have the capacity to report these tests,” said Dr. Jeffrey Engel of the Council of State and Territorial Epidemiologists. “If it’s done at all it’s likely going to be paper-based, very slow and incomplete.”
Cyber criminals who attacked the Germany-based global enterprise software company Software AG using the Windows Clop ransomware on 3 October have leaked a large amount of data, that was stolen during the attack, on the dark web.
An independent app developer has found that deleting cookies from the Chrome browser does not get rid of cookies from Google's own sites such as Search and YouTube.
The investigations stem from complaints that Instagram made contact information on business accounts publicly visible to anyone accessing the app.
"Trump held a Nazi rally in Michigan. There is no other way to describe it."
"It is very important that each and every one of us calmly wait for each and every vote to be counted," said Evo Morales, the nation's ousted democratically-elected leader, from exile in Argentina.
The right-wing have been in power in Bolivia since late last year, when a pro-U.S. movement, like a demonic force having been summoned, violently overthrew the democratically elected administration and the country’s first and only indigenous president, Evo Morales. Since the coup, the right-wing regime has continued to be complicit in major human rights violations, including the repression of Left-wing supporters of Morales and of his political party, MAS.
Similar to what has been occurring within the U.S., the right wing in Bolivia have sustained their rule by stitching together a coalition across segments of its middle classes, its business class, and among right-wing activists, bent on subjugating Bolivians, especially indigenous Bolivians, for the sake of Christendom. Similar to its counterparts within the U.S., this coalition shares an intense disgust of poor and working-class people and desire a social order in which a handful of economic elites and their loyal allies dominate over others for the sake of preserving such things as property rights and the right for businesses to “thrive”.
Support our evolving Subscriber Area and enjoy access to all Subscribers content. € Subscribe
The military has long complained that more than 70% of the nation’s youth aren't fit for military service because they are overweight, undereducated and have criminal records.
Now, with online schooling, fewer sports and no recess, all those issues have been exacerbated, said retired Maj. Gen. Mason Whitney, former head of the Colorado National Guard.
Whitney is a member of the Mission Readiness group that is pushing for better nutrition, more exercise and learning opportunities for children as a way to boost national security.
"Coronavirus has been a huge hit for everybody," said Whitney, who led Colorado's Guard for seven years before retiring in 2007.
A shorter work week could help create a more thriving society. But to work it must be equitable.
The most fundamental one is the nature of our market-based economy, which has created an extreme polarization of wealth and poverty. A new study by the RAND Corporation shows that over the past forty years the wealthiest one percent of Americans has taken $50 trillion from the bottom ninety percent.
Out of this inequality new corporate empires have emerged built on rental housing. One such corporation owns 70,000 units, another owns 500,000. This gives them unchecked power to increase rents and allows them to create financial instruments (derivatives) based on their properties, as was dramatized in the movie€ The Big Short.€ € They have little incentive to make housing affordable since they make money from the derivatives that are based upon your house or apartment even if you can’t make your monthly payment.
Support our evolving Subscriber Area and enjoy access to all Subscribers content. € Subscribe
The US Government has belatedly realised that it is aiming at the wrong target and is now frantically warning European countries not to use the cloud business of Chinese telecommunications equipment vendor Huawei Technologies, US economist David P. Goldman claims.
"Let's build an inclusive America," said Rep. Pramila Jayapal (D-Wa.).
Journals and Nobelists, usually cautious, cite unprecedented damage and incompetence in calls for a U.S. leadership change.
With President Donald Trump’s re-election very much in doubt, his administration is rushing to ram through regulatory rollbacks that could adversely affect millions of Americans, the environment, and the ability of Joe Biden — should he win — to pursue his agenda or even undo the damage done over the past four years.
"His presidency began with women marching and now it's going to end with women voting," said head of the Women's March.
Elections in Georgia have been a subject of controversy for years, ranging from actual data breaches at statewide election partner Kennesaw State University to false allegations of a political party attempting to hack the voter registration system. This summer, the state’s rushed and bumpy rollout of a new statewide voting system culminated in a chaotic June primary election marred by undelivered absentee ballots, long lines at polling places due to problems with electronic poll books, and innumerable human errors due to inadequate poll worker training.
As the judiciary heads further to the right it is evident it no longer serves the values of the majority of the people.
If the next four years besiege the country as did the last four, our problems will be immeasurably worse, for they will only fester, mutate, magnify, and multiply.
The incumbent prime minister's Labour Party received a higher share of the vote than at any time in more than half a century.€
Since Perdue is implicitly playing the American card by othering Kamala Harris, let us look at some very American Kamalas who are much more admirable people than David Perdue and who have achieved much more of lasting value for Americans than he has.
He now thinks one of the toughest challenges in trying to deradicalize a QAnon believer is that they view the opposition as "pure evil."
Nearly 2.5 million Australians are using the social media app TikTok, an app that the Americans want to ban but which Australia has no problem with, the research firm Roy Morgan says, adding that this number means the addition of more than 850,000 users in the first half of 2020.
TikTok has removed a number of videos after a BBC investigation showed creators were posting anti-Trump material without disclosing that they were paid for by a marketing company.
One big reason? Paper. An estimated 95 percent of voters will use either a mail-in paper ballot or a machine that produces a verifiable and auditable paper trail. Paper balloting has long been considered the gold standard among security experts, because it allows for auditable results.
It’s a full-circle moment for paper when it comes to voting. Twenty years ago, the presidential race between George W. Bush and Al Gore turned the phrase “hanging chad” into a hotly debated national discussion. The chads were the fragments of paper left over from punch-card ballots, and they led to a messy, politically charged recount in Florida, with poll workers left to determine voters’ intent.
Joe Biden is surging in the polls and his campaign is looking to run up the Democrat’s Electoral College numbers in unexpected places—like Omaha.
Facebook is facing its toughest challenge yet: an election complicated by a pandemic, a deeply divided nation lured by conspiracy theories and alternate versions of reality. Is it ready? Here are some of the biggest steps and missteps it's taken in the fight against misinformation since 2016.
Nov. 10, 2016: Days after the election of President Donald Trump, Facebook CEO Mark Zuckerberg calls the idea that “fake news” on Facebook had influenced the election “a pretty crazy idea." He later walks back the comment.
December 2016: Facebook says it will hire third-party fact-checkers to combat misinformation.
April 27, 2017: Facebook publicly acknowledges that governments or other malicious non-state actors are using its social network to influence national elections, in line with U.S. government findings of Russian interference.
October 2017: Facebook says ads linked to a Russian internet agency were seen by an estimated 10 million people before and after the 2016 election.
Michigan Gov. Gretchen Whitmer said Sunday that President Donald Trump is inciting “domestic terrorism” following “lock her up” chants at his rally in the state the night before.
Whitmer told NBC’s “Meet the Press” that the rhetoric is “incredibly disturbing” a little more than a week after authorities announced they had thwarted an alleged plot to kidnap the Democratic governor.
“The president is at it again and inspiring and incentivizing and inciting this kind of domestic terrorism,” Whitmer said. “It is wrong. It’s got to end. It is dangerous, not just for me and my family, but for public servants everywhere who are doing their jobs and trying to protect their fellow Americans. People of good will on both sides of the aisle need to step up and call this out and bring the heat down."
Witnesses described how the suspect, who has been named by French media as 18-year-old Abdullah Anzorov, wielded a large knife and shouted "Allahu Akbar" or "God is Great," as he attacked the teacher in the street in the town of Conflans-Sainte-Honorine, about 20 miles northwest of Paris on Friday afternoon.
Police have identified the victim as 47-year-old Samuel Paty, who taught history and geography.
When she came out of the office of Dr. Mahendra Amin, the gynecologist for the center, she was informed that he had removed her fallopian tube—without warning and without consent. Binam joined a growing number of women who have testified about unnecessary gynecological surgeries and sterilizations in the center. One immigrant woman at Irwin told lawyers she talked to five women who had undergone hysterectomies and none seemed to understand what had happened to them, much less why.
“When I met all these women who had had surgeries, I thought this was like an experimental concentration camp. It was like they’re experimenting with our bodies,” she said in a formal complaint filed by Project South.
Support our evolving Subscriber Area and enjoy access to all Subscribers content. € Subscribe
Yet they also insist that what a woman does with her own body or whether same-sex couples can marry should be decided by government.
GOP is now the the party of plutocrat neofascist Christian fundamentalism.
An investigation published last year by the Center for Investigative Reporting found that hundreds of active and retired law enforcement officers from across the United States were involved in extremist groups, including what it described as dozens of private hate groups that operate on Facebook.
After four days of confirmation hearings, Black leaders of five major civil rights organizations are lining up in opposition to the nomination of Amy Coney Barrett to the Supreme court and the “deeply flawed” process Senate Republicans are using to secure her confirmation just weeks ahead of a contentious presidential election.
For many, the pandemic has renewed our innate appreciation for and connection to nature. People have taken to growing food on windowsills and in backyard and community gardens. We’re cultivating yeasts to bake bread and getting outside more to walk, run, swim and cycle.
The women grappled with each other inside the vehicle. The driver jerked to ease the grip around her neck, then turned to elbow her attacker in the back seat. She flung the door open to make her escape, ending the simulated attack.
“This one is too strong for me," the attacker said, smiling and shaking her head. Then it was another woman's turn in the exercise to prepare drivers for Uganda's new all-female ride-hailing service, Diva Taxi.
The taxi service, dreamed up by a local woman who lost her logistics job at the start of the coronavirus outbreak, was launched in June and has recruited over 70 drivers. They range from college students to mothers hoping to make good use of their secondhand Toyotas.
According to the WSJ, some policy executives at Facebook voiced concerns in 2017 about pending changes to the news feed algorithm that they thought might have a larger impact on right-leaning news sites like the Daily Wire. So engineers made changes to the algorithm that would have a bigger impact on traffic to left-leaning sites.
Hydraulic fracturing is a controversial, yet invaluable, facet of the American energy industry. Among the myriad of environmental issues posed by hydraulic fracturing, the chemically treated fluids used in the fracturing process have engendered significant public concern, resulting in a growing push to mandate the disclosure of those fluid formulas. In response, the energy industry has resisted these efforts by treating the formulas as trade secrets.
Presently, the fight over fracking fluid disclosures is a stalemate between the public’s right to know the chemical contents injected into the earth and the energy industry’s right to protect its proprietary trade secrets. Indeed, while a growing number of state regulations require the disclosure of fracking fluid formulas, every one of these regulations includes an exception for trade secrets.
Given the unceasing doctrinal tension and lack of uniform regulation in this area, commentators have proposed that the proper balance between public disclosure and competitive incentives lies in the use of patents to protect fracking fluids. However, this Note argues that patents are untenable as a means of protecting fracking fluid formulas for many of the existing operators in the energy industry. Specifically, I contend that patentability issues like novelty and the public use bar, coupled with the practical problems of patent prosecution, eliminate patents as a viable alternative to trade secret protections for most fracking operators.
A patent consists of only one right: the right to exclude others from practicing the patented invention. However, one class of patents statutorily lacks the right to exclude direct infringers: surgical method patents are not enforceable against medical practitioners or health care facilities, which are the only realistic potential direct infringers of such patents. Despite this, inventors regularly file for (and receive) surgical method patents. Why would anyone incur the expense (more than $20,000 on average) of acquiring a patent on a surgical method if that patent cannot be used to keep people from using the patent?
The traditional answer is that although the patent statute forecloses enforcement of surgical method patents against doctors, it does allow for contributory liability of such patents by medical device manufacturers. However, this Article provides evidence of completely nonexcludable surgical method patents — patents in which direct infringers are statutorily protected from liability and contributory infringers do not exist. These nonexcludable patents challenge the widely held view that the only reason an inventor would incur the cost of patenting is to acquire the right to exclude.
To explain the existence and appeal of nonexcludable patents, this Article looks to patent-signaling theory and person-hood theory of real property. Essentially, some inventors patent because they want to signal others about some aspect of the invention or the inventor. While other inventors acquire these nonexcludable patents because the invention forms part of the inventor’s “public persona.”
There are doctrinal payoffs to this theoretical insight as well. For instance, inventors who approach the patent system from a person-hood angle bring with them a completely different set of costs and benefits than those traditionally assumed. To these inventors, the primary benefit of the patent system is the public disclosure that patenting provides. This contradicts almost all extant patent theories, which consider disclosure to be the primary cost that inventors seek to avoid. As such, this Article provides a novel understanding about the motivation to patent, an understanding that is much more concerned with knowledge dissemination and recognition for creation of that knowledge than with exclusive rights.
The amended patent law adds patent term extensions to compensate for the time spend in the review and approval of new drugs for marketing. Extensions are not automatic but must be requested by the patentee. The maximum extension is 5 years with total effective patent term not exceed 14 years after approval. The reports did not mention patent term extensions being available for medical devices undergoing regulatory approval.
Blockchain payments company Rocketfuel Blockchain is suing its co-founder for allegedly misrepresenting patent applications and defrauding the firm.
In a complaint filed with the Central District Court of California, Rocketfuel claimed its co-founder and former treasurer Joseph Page hid the fact that patents he transferred to the company had expired. The company is seeking damages of at least $5.1 million.
According to Rocketfuel, Page transferred patent applications to the company in March 2018, thereby relinquishing his rights to the patents. These patents were for several payment processes for Rocketfuel’s blockchain platform, including cryptocurrency user interface systems.
B4MC Gold Mines acquired Rocketfuel in June 2018. When B4MC took over the company, and started doing business as Rocketfuel, Page said the patents were being examined by the United States Patent and Trademark Office (PTO). Page and other shareholders sold their shares in Rocketfuel, and he received five million shares of the newly acquired firm worth approximately $45 million.
Anti-piracy coalition ACE has obtained a subpoena to compel the Tonic domain registry to hand over all information it has on the owner of S.to. With hundreds of thousands of registered users, S.to is the largest German-language pirate TV streaming community. These requests are a core part of the anti-piracy toolbox, a source informs us.
Users of pirate IPTV services in the UK and Ireland are most likely being monitored by one or more major ISPs. Secret traffic analysis, provided to the High Court in a recent blocking case involving UEFA, reveals that studies were carried out in connection with Sky which determined many subscribers were accessing pirate IPTV platforms via the ISP.