The powerful Thelio Mira runs Ubuntu-based Pop!_OS (or Ubuntu 20.04 LTS, 64-bit) and includes a carefully engineered cooling system “to prevent throttling and allow your pro-grade components to perform to their maximum potential.”
Like other System76 offerings, the Thelio Mira also features handcrafted details, such as the solar system design of the exhaust vent and the stylized mountains on the powder-coated aluminum chassis.
Josh and Kurt talk to Loris Degioanni and Dan from Sysdig. Sysdig are the minds behind Falco, an amazing open source runtime security engine. We talk about where their technology came from, they huge code donation to the CNCF and what securing a modern infrastructure looks like today.
The crowdsourced Asahi Linux project has published its first detailed status report to summarize the progress, and challenges, of getting Linux to run natively on the Apple M1 Macs.
Porting an operating system as complex as Linux to a system-on-a-chip as closed as the Apple Silicon wasn’t going to be a walk in the park. The project’s first detailed progress report gives a glimpse of Apple’s unique boot process, and the challenges it presents to getting another operating system to run on the hardware.
“The way they [Apple Silicon Macs] work is more akin to embedded platforms (like Android phones, or, of course, iOS devices), but with quite a few bespoke mechanisms thrown in. However, Apple has taken a few steps to make this boot process feel closer to that of an Intel Mac, so there has been a lot of confusion around how things actually work,” wrote Asahi’s founder and lead developer, Hector Martin.
Added for Linux 5.11 was an independently-developed, reverse-engineered Corsair power supply driver for the company's desktop PSUs supporting their USB-based "LINK" interface for exposing voltage, temperature, current, and Wattage under Linux. This open-source "corsair-psu" driver has continued maturing as well since being mainlined.
The Corsair-PSU driver was added to Linux 5.11 and supports Corsair LINK-enabled power supplies such as the RMi / HXi / AXi power supply families. This driver is a conventional HWMON driver and allows for the sensors to be exposed through conventional sysfs interfaces for easy querying by user-space tools.
One of the great Linux hardware milestones of 2020 was Lenovo beginning to offer Linux pre-loads on their desktops/laptops with the likes of Fedora and Ubuntu. But it's been great just not for having another major OEM offering Linux pre-loads but because they have also been engaging directly on Linux support improvements both through their engineers and at partners like Red Hat. That upstream support work has continued nicely.
Since Lenovo began offering Linux pre-loads, their own engineers and Linux partners have worked on Lenovo hardware support improvements including the likes of palm sensor support, ACPI Platform Profile support, and various other improvements to benefit their devices under Linux.
We are pleased to announce the availability of a new mailing list service running under the new lists.linux.dev domain.
[...]
Linux development started in 1991 and has been ongoing for the past 30 years at an ever-increasing pace. Many popular code collaboration platforms have risen throughout these three decades -- and while some of them are still around, many others have shut down and disappeared without offering any way to preserve the history of the projects they used to host.
Development via mailed-in patches remains the only widely used mechanism for code collaboration that does not rely on centralized infrastructure maintained by any single entity. The Linux developer community sees transparency, independence and decentralization as core guiding principles behind Linux development, so it has deliberately chosen to continue using email for all its past and ongoing collaboration efforts.
This is a weekly blog looking at the Lenovo M93 Ultra Small Desktop PC running Linux.
For this week’s blog, we’ve run a variety of benchmarking tests on the Lenovo M93 together with four other systems to put the results into context.
All the tests use the Phoronix Test Suite, unless otherwise stated. For ease of reference, each system’s specifications are listed on every page. Together with the Lenovo M93 Ultra Small PC, we’ve run benchmarks on two Mini PCs from AWOW, the AK41 and the NYI3. We’ve also included a laptop from ASUS (UX305FA), and a Mini PC from Gigabyte (BXBT-1900). They are all low-power machines.
All the machines are running identical versions of software, and configured to ensure consistency between results. The Manjaro rolling distro is used.
Let’s kick off the benchmarks with some system tests.
It's been one and a half years already since the EPYC 7002 "Rome" processors launched. It's hard to think it's been that long due not only to the pandemic but the incredible performance of these Zen 2 server processors. The EPYC 7002 series continues to largely outperform Intel's Xeon Scalable processors and while Ice Lake is coming soon, for now AMD is expanding their lead with today's EPYC 7003 "Milan" processor launch. We have begun our testing of AMD EPYC Milan processors in recent weeks under Linux and have preliminary performance figures to share today as well as more information on these next-gen server/HPC processors.
This article will cover a list of useful task management applications available for Linux. These applications allow you to view resource consumptions of individual processes and allow you to set up alerts and manage their behaviour. The term “resource consumption” here mainly refers to CPU, memory and network usage.
Task management tools allow you to better control your system by providing useful information about resource consumption of individual processes. These tools are especially useful for system admins, application developers and gamers who routinely monitor process behavior.
The popular open-source file archiver 7-Zip is now officially available for Linux. The developer released 7-Zip 21.01 alpha build for Linux x86, x86-64, ARMv7, and ARM64 architectures.
Although Linux users could get support for the 7-Zip archive format through an unofficial program known as p7zip, the project was last updated in 2016.
With the arrival of an official 7-Zip program for Linux, users will be able to receive updated support on their Linux system, unless you’re already comfortable with PeaZip
Gparted is a popular and free tool for Managing disks on Linux. Using GParted, we can create and manage the disk partitions. It allows us to create the new partition tables, partitions, views the disk information, etc.
I am using Linux Mint 20 for executing the commands and preparing this post.
vmadm can also generate an SSH host certificate, an SSH host key signed with an SSH CA key. This allows me to log into a new VM without having to accept its host key - even if the host key has changed from the previous VM with the same name.
Drupal is a free and open-source Content Management System (CMS). It is released under GNU General Public License (GPL) terms, which is one of the most successful projects ever for open source. Almost 2.5 percent of the world’s website uses Drupal since it offers high standard features such as simple authoring of content, stable performance, and excellent security.
Flameshot is an open-source screenshot tool available for Linux, Mac, and Windows. It is created with C++ and QT5 language. Every popular Linux distribution comes with a screenshot tool but they lack few functionalities that flameshot offers.
Chromium is an open-source, multi-platform web browser that is launched and managed by Google. Chromium is a fast, stable, and secure web browser.
Many other browsers, such as Edge and Opera, are even based on Chromium code.
Chromium and Chrome sound similar, but there is a small difference between the two browsers. Chrome is not open-source and contains many proprietary features that belong exclusively to Google. If Chrome is known as the supreme leader of web browsers, Chromium holds the major parts of browsers together.
Your computer sets the time and date when it syncs with an online server. In some cases, the date and time may change when the computer is connected to a server with a different time zone. So, you may need to modify the time zone in this case.
Your system’s time zone is set automatically during the installation process of Ubuntu, but it can be modified. This article shows you how to set up or change the time zone of your Ubuntu 20.04 (LTS) or 20.10 system.
Putty SSH client is a free and open-source SSH client that you can use on a Linux system to connect your server, system, network storage, and other SSH clients remotely. Putty allows you to save your sessions on your local Linux directory. Despite having the Linux bash, you might wonder why you would need to install the Putty tool on your Linux system? Well, the answer would be, most servers are built on Linux, but clients might be using Windows, macOS, or other operating systems. It is hassle-free to have the same remote client tool for both ends.
Ntopng is free, open-source software that provides a web interface for real-time network traffic monitoring. It is the next-generation version of the original ntop which shows the network usage, statistics, and analytic. It supports different operating systems like Linux, Mac OS, BSD, and Windows. There are professional and enterprise editions of Ntopng which have licensing requirements, and the free community edition.
In this tutorial, we will learn how to install ntopng tool on Ubuntu 20.04 and use it to monitor the local network.
Ansible AWX is a free and opensource front-end web application that provides a user interface to manage Ansible playbooks and inventories, as well as a REST API for Ansible. It is an open source version of Red Hat Ansible Tower. In this guide, we are going to install Ansible AWX on Ubuntu 20.04 LTS system. We have previously penned down a guide on how to install Ansible AWX on CentOS 8.
This tutorial is going to show you how to use Clonezilla Live to back up your hard drive. Clonezilla is a free open-source and reliable tool for bare metal backup and recovery of disk drives.
Remmina is a remote desktop client for computer operating systems. It supports the Remote Desktop Protocol (RDP), VNC, NX, XDMCP, SPICE and SSH protocols.
Why use Remmina?
Remmina is an easy, extremely convenient and widely used client for access to remote machines. Undoubtedly, as administrators we have to constantly change our needs to connect to a Linux machine, a Windows server with a terminal with an emulator, SSH or whatever we can think of. That is why the flexibility of this application is exceptional and we recommend it to you.
KDE Plasma GUI Desktop installation on Kali Linux will allow users to easily change their Desktop environment from the default XFCE if they don’t like it…
Kali Linux is an open-source Debian-based security Linux distro that comes with various tools to perform hacking and penetration testing. Although the developers have made the XFCE interface very simple and easy to use, yet if someone is not comfortable with that then he or she free to change the Kali Linux desktop environment with some other available options such as KDE, GNOME, Cinnamon, Budgie, and more… However, here we will talk only about the KDE Plasma, developed and maintained by the huge community of KDE (K Desktop Environment) that also provides a large number of free and open-source software.
You can store your AWS keys securely in Jenkins credentials. If you want to interact with AWS from your Jenkins server, you can store your AWS IAM user keys securely in Jenkins rather than openly using the keys in your Jenkins Pipeline. "CloudBees AWS Credentials" Jenkins plugin allows storing AWS IAM user credentials within the Jenkins Credentials API. We can then use these credentials in our pipeline and inject them in the pipeline with the "withAWS" step. To use "withAWS" step, we need to install the "AWS Steps Plugin" plugin.
In this article, we will install the "CloudBees AWS Credentials" plugin and store the AWS IAM user's secret key and access key in Jenkins using this plugin. We will install the "AWS Steps Plugin" so that we could use "awsStep" to inject the credential we created. We will perform S3 Upload Object and Download Object operation from within the pipeline to test the credential we created.
In this tutorial, we will show you how to install ReactJS on Ubuntu 20.04 LTS. For those of you who didn’t know, React is an open-source JavaScript library for creating web frontend and UI components. It is developed and maintained by Facebook and a large community of developers. ReactJS can be used in the development of Web Applications or Mobile Apps.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the ReactJS on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.
This tutorial explains how to install Mageia 8 operating system to your computer. This will be a little bit different to installing Ubuntu as the installer requires two stages of installation separated with a restart (similar to Fedora's one). You can practice this to be normal, dualboot, or virtual machine as you wish for either 32 bit or 64 bit type of computers. Now let's go!
There are many tools and methods exists to display a system's details in Linux. You can use tools like ScreenFetch, Neofetch, Inxi to get the Linux system information. You can also use Python's import module to view the details of a Linux system. Today, we will see yet another similar tool. Let us give a warm welcome to a newcomer named Macchina to the club! Using Macchina, we can get the basic system information of a Linux machine in the Terminal.
Macchina is a basic system information fetcher. It is similar to Neofetch but with a focus on performance and minimalism. It is even faster than Neofetch tool. For those wondering, Macchina is an Italian word for Machine. Macchina is free and open source program written in Rust programming language. It supports Linux, BSD and the Windows support is coming soon.
Binary packages for various distributions will be available from: https://www.winehq.org/download
Summary since last release * Rebased to current wine 6.4 (686 patches are applied to wine vanilla)
Upstreamed (Either directly from staging or fixed with a similar patch). * kernel32: Implement K32GetMappedFileName. * wow64cpu: Add stub dll. * ntdll: Add a stub implementation of Wow64Transition. * aclui: Add basic ACE viewer. * ntdll: Implement RtlQueryRegistryValuesEx * setupapi/tests: Add more tests for SPFILENOTIFY_FILEINCABINET handler. * setupapi: Fix CabinetName passed to SPFILENOTIFY_CABINETINFO handler. * setupapi/tests: Add tests for cabinet name passed to SPFILENOTIFY_FILEEXTRACTED. * setupapi: Fix parameters of SPFILENOTIFY_FILEINCABINET handler. * ddraw: Create rendering targets in video memory if possible.
Added: * [50624] Waves Central 12.0.5 fails to start.
Updated: * ntdll-NtAlertThreadByThreadId * ntdll-Junction_Points
Where can you help * Run Steam/Battle.net/GOG/UPlay/Epic * Test your favorite game. * Test your favorite applications. * Improve staging patches and get them accepted upstream.
As always, if you find a bug, please report it via https://bugs.winehq.org
Best Regards Alistair.
Building off Friday's release of Wine 6.4 is now Wine-Staging 6.4 with an extra 686 patches atop this code-base for allowing Windows games and applications to run on Linux.
Wine-Staging 6.4 comes in at 686 patches in size, which is slightly fewer than the prior bi-weekly release candidate. Wine-Staging 6.4 upstreamed its WOW64CPU DLL stub, a basic ACE viewer added with ACLUI, NTDLL additions, K32GetMappedFileName support in Kernel32m and SETUPAPI fixes were all now accepted in mainline.
When Windows users start using Linux, the major problem that they face is the unavailability of certain software. But with the help of a compatibility layer like Wine, you can use Windows applications on Linux easily.
In this article, we are going to talk about what Wine is and how you can install it on your Ubuntu system.
[...]
Wine (originally an acronym of Wine Is Not an Emulator) supports Windows software and applications. The development of Wine has completely transformed gaming for Linux users. Similar compatibility layers such as Proton and CrossOver have also been developed to allow users to take full advantage of their Linux systems.
Created by developer Cheeseness, who also made the wonderful Hive Time and again using Godot Engine, it's currently in the Prototype stage but it's already very playable and shows off what a brilliant idea it is. You visit dig sites to excavate bones by digging around them like you would in Minesweeper but without the failure as wrong clicks only slow you down, then when you've got enough fossils between digs you can then assemble their skeletons.
Ever wanted to just fly high, be a cloud and rain all over everything? Well you will be able to on April 15 when Rain on Your Parade releases letting me be a total jerk cloud. A nice casual comedy game about causing chaos, what's not to love about this one?
"Travel the world as a cute cardboard cloud set to rain on everyone's parade! Help Cloudy the Cloud on its adventure to the mythical rain paradise: Seattle. Along the journey, you’ll face an array of unique settings, challenges, spoofs, and satire. Unlock new powers, meet quirky characters, draw custom cloud faces, collect cool hats, accessories, and so much more!"
Luck be a Landlord is a fresh game out in Early Access from TrampolineTales that claims it's a "roguelike deckbuilder about using a slot machine to earn rent money and defeat capitalism". I will admit, that kind of description suckered me right in, I had to give this one a go. Built with Godot Engine, it has great Linux support too and there's even a demo to try before you buy and try your luck.
The idea is that you've moved into a new place that came with a slot machine, you use this to acquire money to pay your rent. Over time you build up the symbols on it like you're creating a deck to increase your chances. There's plenty of luck involved of course since it uses slot machine mechanics but there's also plenty of strategy in how you build up the symbols and how they interact with each other.
Showing some big continued dedication to Neverwinter Nights: Enhanced Edition, Beamdog have put up another huge Beta version with some pretty major additions. Development Build 8193.21 is available to try out on Steam (other platforms when stable), and it can be used along with any servers for multiplayer with the .20.1 release as normal so it's easy to test out in your favourites.
[...]
Really great work from Beamdog all around here, especially the fractional scaling options enabling players to tweak the UI and text to their liking. I wish more games had that.
The second GOL Podcast episode of 2021 is here, come get it while it's hot and ranty as we cover a range of weird and wonderful topics in Linux, open source, gaming and more.
As usual, it's a very casual and frank chat between two friends (myself) and GOL contributor / Linux livestreamer Samsai about many different Linux-related topics. Apologies for my audio on this one, sadly the gain on my microphone amp was up far too high without me realising and so it's definitely not as clear as previous episodes.
I love buying new hardware. Apart from the obvious joy of having a new toy, there's an almost certainty that I'm going to face some fresh problems, related to this or that operating system. Karma definitely did not disappoint when I recently got meself a Lenovo IdeaPad 3, which I loaded with three operating systems, Kubuntu 20.10 included.
In this Plasma-powered Groovy instance, I also set the HD scaling to 1.25, in order to be able to use the system comfortably on the 14-inch FHD screen. If you've followed my adventures with Plasma, specifically the good, the bad and the ugly of desktop scaling on my Slimbook, and then the fine results in Plasma 5.20, then you know things have improved massively, and there should be no issues. And yet there were. Some. Small ones. Weird ones. In Konsole specifically. I noticed white - or black - lines showing in the terminal output, whenever I'd move the cursor up and down. An issue that my sweet OCD demons cannot abide.
There is not a single decent screen recording software for Linux that supports Wayland display server.
GNOME’s built-in screen recorder is probably the rare (and lone) one that works if you are using Wayland. But that screen recorder has no visible interface and features you expect in a standard screen recording software.
Thankfully, there is a new application in development that provides a bit more feature than GNOME screen recorder and works okay-ish on Wayland.
Epiphany Browser or known more popularly as GNOME Web, the default browser of the GNOME desktop environment is getting a major overhaul to one of it’s most used section, the tab bar.
It was pretty simple, but now it is shaping up as a modern experience to compete with the likes of other popular browsers available for Linux.
The new tab bar is a complete rewrite and now features two distinct widgets called HdyTabView and HdyTabBar that can be now used to implement the updated tab and will replace the existing widget called GtkNotebook.
Ignore the technical jargon, overall, the old widget had many usability issues and was overall very tacky and outdated. So, the new widgets offer a host of usability improvements and have a very modern feel to it.
In 2015, the University of Haifa embarked on a journey of digital transformation focused on improving its student experience, and reducing costs, but would go on to achieve even more than this with its SUSE-based, modern data center.
Video games are not commonly known for being open source--either themselves or in their development. Red Hat would like to see that change, and this year we launched Red Hat Arcade, where you can play open source games built by Red Hatters using open source tools, assets, and engines.
While a lot has changed over the last year, one thing that hasn’t -- the Red Hat Summit mainstage will be packed with powerful stories about the role enterprise open source tools play and the innovations that are changing the industry. This year, we’ll be bringing together speakers from around the world and across sectors to share how they are building better solutions for their customers and for themselves.
Now in its 17th year, Red Hat Summit is the premiere open source technology event that brings together thousands of IT professionals for a high-energy event focused on innovation, education and collaboration.
Red Hat Summit 2021 will be a three-part event that will kick off with a free, immersive multi-day virtual experience on April 27-28, 2021. And you won’t have to miss a moment, if you’re unable to attend or just want to rewatch, we’ll be recording much of our content including the keynotes and special guests, and it will be available for up to one year after the event.
There’s no question about the benefits of containers, including faster application delivery, resilience, and scalability. And with Red Hat OpenShift, there has never been a better time to take advantage of a cloud-native platform to containerize your applications.
Transforming your application delivery cycle and shifting from traditional infrastructure to cloud-native can be daunting, however. As with any path toward a solution, it helps to break down the process into segments to better understand how to get from point A to point B. This article provides a framework for approaching the conversation with your application team to ensure that your application is containerized and hosted on OpenShift as quickly and easily as possible.
Figure 1 is an overview of how to structure an effective containerization conversation. We’ll go over each step in the next sections.
For the most part, you want your release blockers to be defined by specific criteria. It’s even better if automated testing can use the criteria, but that’s not always possible. The point is that you want the process to be predictable.
A predictable blocker process provides value and clarity throughout the process. Developers know what the rules are so they can take care to fix (or avoid!) potential blockers early. Testers know what tests to prioritize. Users know that, while the software might do something annoying, it won’t turn the hard drive into a pile of melted metal, for example. And everyone knows that the release won’t be delayed indefinitely.
Having a predictable blocker process means not only developing the criteria, but sticking to the criteria. If a bug doesn’t violate a criterion, you can’t call it a blocker. Of course, it’s impossible to come up with every possible reason why you might want to block a release, so sometimes you have to add a new criterion.
[...]
This came up in last week’s Go/No-Go meeting for Fedora Linux 34 Beta. We were considering a bug that caused a delay of up to two minutes before gnome-initial-setup started. I argued that this should be a blocker because of the negative reputational impact, despite the fact that it does not break any specific release criterion. I didn’t want first time users (or worse: reviewers) to turn away from Fedora Linux because of this bug.
QA wizard Adam Williamson argued against calling it a blocker without developing a specific criterion it violates. To do otherwise, he said, makes a mockery of the process. I understand his position, but I disagree. While there are a variety of reasons to have release blockers, I see the preservation of reputation as the most important. In other words, the point of the process is to prevent the release of software so bad that it drives away current and potential users.
Please join us at the next regular Open NeuroFedora team meeting on Monday 15 March at 1300UTC in #fedora-neuro on IRC (Freenode). The meeting is a public meeting, and open for everyone to attend.
Looking to modernize your existing Enterprise Java applications and move them to the Microsoft Azure Cloud? Deciding on the approach to develop and deploy your next generation cloud-native application on Azure? Through an ongoing collaboration between IBM and Microsoft around the WebSphere product family, we have created simple guides to help you achieve your business goals.
In this video, I am going to show an overview of SparkyLinux 2021.03 "LXQt and some of the applications pre-installed.
Shortly after introducing a new Linux-based operating system for tablets and phones called JingOS, Chinese company Jingling has unveiled the first tablet that will ship with the operating system pre-installed.
The JingPad A1 is an 11 inch tablet with support for optional pen and detachable keyboard accessories. It’ll also support 4G and 5G cellular networks.
But the main thing setting this tablet apart from others is the software. It’s powered by Jingling’s custom Linux distribution that’s been optimized to offer a touch-friendly user interface inspired by iOS and Android. Underneath the pretty UI though, it’s basically a Linux distro which means you should be able to run desktop programs as well as mobile apps.
Arduino Day isn’t just Arduino’s birthday. It’s a celebration of the Arduino Community and its achievements. Creativity is the fuel that motivates our users to experiment, build amazing projects, push the boundaries of open-source hardware and software and have a positive impact on people’s lives.
The library that you use for your Arduino project depends on the demands of the project. At first, you may prefer simplicity for your small experiments; later, you may need more speed, special hardware, and better control of your microcontroller. You can make basic tasks work correctly with the simple scripts that you learn as a beginner. When you build a system, you will need many tasks and several input/output devices.
For a robotics project, there are various requirements of IoT projects. An IoT project will need to communicate with other systems, such as a server that collects data or even a web server. For media, you need to find the source of the files and how to decode for playing the files.
There’s limited information about software support on the product page. But since it’s just an evolution of NORVI IIoT (even the dimensions are the same), with Ethernet replacing RS-485, NORVI ENET should be programmable with the Arduino IDE as the company provides Arduino libraries and sample sketches for inputs, outputs, RTC, temperature sensor, and the I2C display.
Compare latest Raspberry Pi 400 vs Raspberry Pi 4. The both has almost the same specifications. Find out which is best for you.
The Raspberry Pi 4 Model B was released in June 2019 with a 1.5 GHz 64-bit quad core ARM Cortex-A72 processor, on-board 802.11ac Wi-Fi, Bluetooth 5, full gigabit Ethernet, two USB 2.0 ports, two USB 3.0 ports, and dual-monitor support via a pair of micro HDMI ports for up to 4K resolution.
Since the launch of Raspberry Pi CM4 and CM4Lite systems-on-module last October, we’ve seen carrier boards bring their own set of features including industrial communication interfaces, a stereoscopic camera, four SATA ports to build a NAS, a DIN-rail based industrial controller, and more.
But so far, I have not seen a Raspberry Pi CM4 carrier board with dual Ethernet ports. Seeed Studio’s “Dual Gigabit Ethernet Carrier Board for Raspberry Pi Compute Module 4” was brought to our attention this morning, but there’s another one with 4G LTE connectivity, Fast+Gigabit Ethernet ports, and extra I/Os courtesy of MCUZone’s CM4-4G IO board. Let’s have a look at both of them.
Have you ever thought about having your own open source project? I bet you have — you’re reading this article.
Maybe you are thinking about it right now. Maybe you came here to learn what to expect, what challenges you’re going to face, and how to deal with them. Well, you’ve come to the right place.
The following guide is based on my personal experience in owning an open source project. And I do mean owning – not just contributing to – an open source project. There is a big difference, and we’re going to learn why.
Signal, the messaging app whose USP is secure messaging, now reportedly has an easier way to migrate chats over from old Android devices to new ones. The feature, however, is for now only available in the beta v5.5.0 version of the Signal. Signal gained popularity after a change in WhatsApp's privacy policy was announced earlier this year. Ever since, Signal has seen approximately more than 50 million downloads on Google Play Store. The new feature should make the app easier to use than before once a stable version is released to the general public.
In a report by TestingCatalog, Signal has now introduced an easier and safer way to migrate chats from your old Android device to your new one in the beta v5.5.0. To migrate contacts, head over to Settings > Chats > Transfer Account, where a new screen appears that guides the user with the migration process. The process of migrating from your old device to the new one can be done over a local Wi-Fi Direct connection.
The last event I went to before The Event was Linux Application Summit (LAS) in Barcelona, Spain back in November 2019! Time flies.
LAS is a community organised event, sponsored and supported by the GNOME and KDE projects. The conference is “designed to accelerate the growth of the Linux application ecosystem by bringing together everyone involved in creating a great Linux application user experience.”.
Most students today rely on information available online to complete their projects and assignments. Those who are using the Chrome browser by Google have a variety of Chrome extensions available for them that will help with research and completing schoolwork. This article looks at the best Chrome extensions that every student should install and use.
WebAssembly is a portable execution format that has drawn a lot of interest due to its ability to execute applications in the browser at near-native speed. By its nature, WebAssembly has some special properties and limitations. However, by combining it with other technologies, completely new possibilities arise, especially related to gaming in the browser.
This article describes the concepts, possibilities, and limitations of running WebAssembly on Firefox.
A few months ago I looked into the inner workings of DuckDuckGo Privacy Essentials, a popular browser extension meant to protect the privacy of its users. I found some of the typical issues (mostly resolved since) but also two actual security vulnerabilities. First of all, the extension used insecure communication channels for some internal communication, which, quite ironically, caused some data leakage across domain boundaries. The second vulnerability gave a DuckDuckGo server way more privileges than intended: a Cross-site Scripting (XSS) vulnerability in the extension allowed this server to execute arbitrary JavaScript code on any domain.
Both issues are resolved in DuckDuckGo Privacy Essentials 2021.2.3 and above. At the time of writing, this version is only available for Google Chrome however. Two releases have been skipped for Mozilla Firefox and Microsoft Edge for some reason, so that the latest version available here only fixes the first issue (insecure internal communication).
Window methods in PostgreSQL have been cast off to equate diverge data and are essential for analytical and other PostgreSQL use cases. The NTILE() method followed by the OVER clause in PostgreSQL is discarded to divide organized rows in somewhat like series of graded buckets. Buckets are not anything more than a set of ranked groups. Throughout this article, you’ll discover how to split sorted rows in a partition into a given figure of ranked buckets using the PostgreSQL NTILE() feature. The NTILE() method allocates a bucket number to every group beginning at 1 in a set, demonstrating the set to which the row has its place.
Whenever a defined change action (SQL INSERT, UPDATE, DELETE, or TRUNCATE declaration) is conducted on a defined table, a trigger is a series set of events that are executed automatically. Triggers can be used to impose business rules, authenticate input information, and maintain an audit trail. SQL triggers are implemented according to the SQL format. It includes structures used in several programming languages allowing you to declare local variables, monitor the flow of the process with declarations, allocate statement outcomes to variables, and handle errors. Furthermore, once you construct a trigger for something, like a table, the trigger is immediately removed as soon as the table is removed. We’ll look at how PostgreSQL Triggers function throughout this segment.
The ARRAY_AGG() aggregate method is one of the methods used in PostgreSQL, which takes several input values and concatenates them into an array, including NULL values. It returns an array with every value from the input group as a part. To sort the result set via the PostgreSQL ARRAY_AGG function, you will be using the ORDER BY phrase. You can also use the WHERE clause when required.
To understand the aggregate ARRAY_Agg() method, you have to perform several examples. For this purpose, open the PostgreSQL command-line shell. If you want to switch on the other Server, do so by providing its name. Otherwise, leave the space empty and hit the Enter button to jump on Database. If you want to use the default database, e.g., Postgres, then leave it as is and press Enter; otherwise, write the name of a database, e.g., “test”, as shown in the image below. If you want to use another port, write it out, otherwise just leave it as it is and tap Enter to continue. It will ask you to add the username if you want to switch to another username. Add the username if you want , otherwise, just press “Enter”. In the end, you have to provide your current user password, to start using the command-line using that particular user as below. After successful entries of all the required information, you are good to go.
WE REFUSE TO SUCCUMB TO THE BLACKMAIL BY WORDPRESS.COM and we will not write another article other than this notice and a note of where we have moved to in protest to the blackmail WORDPRESS.COM is using upon us. How is this for advertising?
For some months now wordpress introduced a very horrible way to edit, which I am using now, and made it really hard to start a document, then exit, then edit it with the traditional very functional editor they now call Classic.
Since not enough people I suppose adopted it or bought a subscription to the site, they now removed the classic editor and made it available as an “addon” feature to the paying subscribers. Decisions about “how to make money” are hardly challenged by logical/rational arguments, they are solely made by the money maker.
If hundreds and hundreds of readers every day of the year who visited this site, getting exposed to all this wordpress advertising, wasn’t enough of payment to provide us with “classic editing” then we must make out own decisions and somehow end this relationship before it turns more abusive and exploitative.
Knowledge-sharing and collaboration is in the essence of the open source culture. In Sweden, public entities have adopted this mindset in order to improve in the way they use and collaborate on open source software and data. In the newly formed Network Open Source and Data (NOSAD), public entities gather to share best practices and lessons learned through monthly workshops, but also collaborate on community initiatives such as a catalog of open source software used within the public services.
With today's AMD EPYC 7003 "Milan" launch there is also the public availability of AOCC 3.0 as their LLVM/Clang downstream now carrying patches for optimized Zen 3 support.
AOCC 3.0 is AMD's downstream of LLVM/Clang focused on offering leading AMD CPU support. With AOCC 3.0 they have re-based against the in-development LLVM 12 trunk code while have enablined additional tuning/optimizations around the EPYC 7003 series. AOCC 3.0 also continues to carry patches/configuration in tuning for AMD's Math Library (AMDLibM), FLANG is enabled for Fortran support, OpenMP is enabled by default, and other tweaks in aiming to deliver the fastest AMD Linux binaries.
I plan to commit some retuning of znver3 codegen that is based on real hardware benchmarks. It turns out that there are not too many changes necessary sinze Zen3 is quite smooth upgrade to Zen2.
GCC is in the process of seeing better support for AMD Zen 3 processors with its znver3 target.
Back in December the GCC 11 compiler picked up initial support for AMD Zen 3 (znver3). That support was just enabling the newly-supported CPU instructions found with this latest-generation Zen microarchitecture. Unfortunately missing at that time was any tuning for allowing the compiler to make more informed decisions over instruction scheduling with the instruction costs, etc. So it's been carrying the same data as Zen 2 that is also largely carried over from the original Zen compiler code.
Now today, a few weeks prior to the GCC 11 stable release, a new Zen 3 compiler patch has surfaced. Longtime GCC developer Jan Hubicka of SUSE has provided a "tuning part 1" patch for the GCC Znver3 code.
Classes are user-defined types. They allow us to represent the meaning of various entities. Defining an operator for a class gives us a better way to deal with objects.
So how can we define operators for our classes, and how should we use such operators? I will show you how in this article.
Now there is an evolved version of DevOps called GitOps: GitOps is the practice of using Git as the single source of truth.
Many enterprises are seeking to move to a GitOpos model because it provides a more standardized and governed system yet offers the flexibility and automation that today's companies desire.
[...]
But what does GitOps mean for the open source model? Git is an open source technology based on the GNU General Public License version 2. Because GitOps inherits most of its technologies from DevOps, you can enjoy the same variety of open source tool integrations such as Ansible, Terraform, Jenkins, and more.
If you want to learn input and output in C, start by looking at the stdio.h include file. As you might guess from the name, that file defines all the standard ("std") input and output ("io") functions.
The first stdio.h function that most people learn is the printf function to print formatted output. Or the puts function to print a simple string. Those are great functions to print information to the user, but if you want to do more than that, you'll need to explore other functions.
We have finished the first chapter on a long journey of resurrecting Fortran: forming an initial core community of developers and users with enough momentum around the new Fortran website and projects at fortran-lang.org. There is still have a long way to go to, but this was a necessary (although not sufficient) achievement and I feel this was a once in a life time event. The timing was right, we were ready, and we also got lucky. In this blog post I have tried to write up the details about the pivotal moments from my perspective. I have asked Milan Curcic who has been a co-founder of this effort to do the same (please see his blog post), more on that below. Brad Richardson has also written about his perspective.
This has been the most unusual experience for me, nothing like what I anticipated, but two years ago things seemed to fall into place and set up just right. I had to give it everything I had in order to give it a proper chance. I took the bull by the horns.
This blog post is long, but you might find it useful to get ideas how to form other such communities.
My goodness, it appears I’m writing my first Raku internals blog post in over two years. Of course, two years ago it wasn’t even called Raku. Anyway, without further ado, let’s get on with this shared brainache.
In panda’s python, the Pivot table comprises sums, counts, or aggregations functions derived from a data table. Aggregation functions can be used on different features or values. A pivot table allows us to summarize the table data as grouped by different values, including column categorical values.
Before using panda’s pivot table, make sure you understand your data and questions you are trying to solve through the pivot table. By using this method, you can produce powerful results. We will elaborate in this article, how to create a pivot table in pandas python.
Commonly there are 2 types of interfaces for desktops - command-line interface (CLI) where users interact with the system by writing commands, and a Graphical User Interface (GUI) where users interact with the system through visual widgets such as buttons, menus, windows etc. Python provides a lot of libraries to create cross-platform GUIs such as Tkinter, Pymsgbox, Pyqt, and much more. In this series of articles, we will study the Tkinter package.
The topic came up at a recent meeting about NASA’s James Webb space telescope, named for a former administrator of the space agency. Later this year, the telescope will travel by ship to a launch site in South America, passing through the Panama Canal to reach French Guiana. Webb, with a mirror as tall as a two-story building and a protective shield the size of a tennis court, is too large for a plane. Its departure date will be kept secret, someone said at the meeting, to protect against pirates who might want to capture the precious cargo and hold it for ransom. Christopher Conselice, an astrophysicist at the University of Manchester who attended the meeting, was at first baffled by the concern because, well, pirates, but it quickly clicked.
Both the lights and the Bluetooth run on small batteries and one die lasts around five hours on a charge. You can also turn off the LEDs to get in 20,000 rolls before the battery dies. Charging is wireless and uses an inductor hidden under one of its faces. The dice are sold separately or in kits containing D20, D12, D10, D8, D6, and D4 models.
Of course, they are still dice and must offer completely random rolls. Pixels’ creators have resorted to using internal counterweights so that they are perfectly balanced. The only downside to this is that the internal electronics are completely encapsulated in resin, so they are not repairable. That said, the Pixels will also be waterproof.
On Friday, the latest addition to the #homelab turned up. An Eaton EMA114-10 PDU. A PDU is a Power Distribution Unit. Think of it as a step up from a power strip.
Readers would never guess that people are being vaccinated in Texas at a slower rate than in any other state.
"There is no reason we have to prioritize the profits of pharmaceutical companies over the dignity of people in other countries," said U.S. Rep. Ro Khanna.
However anger at the imposition of the country's first curfew since World War II in January led to the worst riots the Netherlands has seen for decades.
The Netherlands has seen a string of anti-lockdown demonstrations, and populist parties have been calling for a relaxation of the rules, the strictest since the start of the pandemic.
"This is huge, removing a security researchers code from GitHub against their own product and which has already been patched. This is not good."
The comment referred to by Vess was this: "Why does GitHub remove this exploit because it is against the acceptable use policy – but tons of other proof of concept exploits and frameworks are OK?
"Is it because GitHub is owned by Microsoft?
pCloud is a quite popular cloud storage solution for Linux users. It already offers a native client to help you sync files and folders to the cloud.
Even though you already get the ability to automatically sync files/folders to the cloud using the sync client, there was no dedicated PC Backup feature that focuses on backing up your entire system and retain the old version for up to 1 year.
However, recently pCloud announced the introduction of ‘pCloud Backup‘ feature.
These 3 newly discovered vulnerabilities in Linux have been around since 2006 and it raises the uncomfortable question: is Linux getting too big to be sustainable?
Researchers have identified three major vulnerabilities in the Linux kernel that have existed for more than a decade.
According to cybersecurity firm GRIMM, these bugs could allow attackers to elevate their privileges from basic to root, opening the door to data theft, malware and ransomware distribution, escalation of privilege and DDoS attacks, Bleeping Computer reported.
The vulnerabilities (CVE-2021-27365, CVE-2021-27363 and CVE-2021-27364) have since been fixed and patches for the mainline Linux kernel became generally available on March 7. Linux users have been urged to patch their systems immediately.
Despite their relative severity, the vulnerabilities aren't particularly easy to exploit, requiring local access to the target device. This means attackers would either need to access the device physically or chain the Linux bugs with other vulnerabilities.
Cybersecurity company GRIMM found the vulnerabilities lurking in the kernel’s iSCSI (Small Computer System Interface) subsystem that can be exploited to gain root privileges on Linux machines.
[...]
Nichols believes the bugs were introduced during the early development of the iSCSI module over a decade and half ago. The module helped access shared data storage facilities.
As Nichols notes, while SCSI is still in use today its use isn’t as prevalent as it was back in the day. This is why the vulnerable module isn’t loaded by default on most desktop distros. Another saving grace of sorts is that the bugs exist in a piece of code that isn’t remotely accessible, which means the attackers need physical access to the device to exploit them.
However, this still makes them potentially dangerous because of how the kernel handles modules. “The Linux kernel loads modules either because new hardware is detected or because a kernel function detects that a module is missing. The latter implicit autoload case is more likely to be abused and is easily triggered by an attacker, enabling them to increase the attack surface of the kernel,” reasons Nichols.
Patches for all three vulnerabilities have been added to the mainline kernel last week, and have also been backported to other Long Term Support (LTS) kernel branches currently supported.
A lot of websites get hacked every day – however, it is always inconvenient for a product/service website to be taken down after a hacking attempt.
In some cases, the hackers push malicious files that a user downloads thinking it as an official package just like CCleaner potentially put millions of computers at risk after it was hacked.
Now, in a recent tweet by Blender, they’ve officially informed that their website (Blender.org) is currently undergoing maintenance after a hacking attempt.
Around half of all servers running Outlook Web Access (a service included with Microsoft Exchange Server) were rebooted in the five days after the emergency patch was released. Some of these have since been rebooted again, so will appear later in the above graph. Rebooted machines are likely to have been updated, but the absence of a reboot after 2 March does not necessarily indicate vulnerability. Anecdotally, most servers have requested a reboot after being updated, but some may only require services to be restarted – although administrators may have opted to reboot the servers anyway.
Microsoft’s original fixes can only be applied to servers that already have the latest cumulative updates of Exchange Server already installed; however, amidst mass exploitation of the vulnerabilities, Microsoft also released a set of security updates that can be applied to older and unsupported Exchange servers that do not—or cannot—have the latest cumulative updates installed.
[...]
On 6 March, four days after the original security updates were released, Netcraft found more than 99,000 Outlook Web Access servers were still running versions flagged as definitely vulnerable by Kevin Beaumont. However, applying Microsoft’s updates even in a timely fashion could have been like shutting the barn door after the horse had bolted, as more than 10% of all visited Outlook Web Access installations were already compromised with attackers’ web shells installed. These provide the criminal with continued administrative access to the compromised servers after the security updates had been applied.
The consumers who filed the case as a class action alleged that even when they turn off data collection in Chrome, other Google tools used by websites end up amassing their personal information. A federal judge on Friday denied the Alphabet Inc. unit’s initial request to throw out the case.
Washington DC congresswoman Suzan DelBene has introduced legislation that would create a national data privacy law in the US.
With no federal law currently in place to protect the data of US citizens, a number of states have enacted their own legislation to do so instead.
The California Consumer Privacy Act (CCPA) was enacted in 2018, for instance, while Massachusetts has its own Data Breach Notification Act.
Is WhatsApp reading along as you write messages and saving your chats? In an interview, company CEO Will Cathcart explains what happens with user data and why he is concerned about proposed changes to German surveillance laws.
Ideals Against Reality
The book’s readers are thus likely to experience dissonance. On the one side we have the realities, shortcomings, failures, and injustices that characterize the American system and model, and, on the other side the diametrically opposite promised America Obama paints. This dissonance is native to the text of A Promised Land, wherein Obama contradicts his propaganda for the American model with a constant (though generally moderate and shallow) criticism of the American system that did not allow him to implement the change he putatively espoused. Obama resolves this general dissonance through the false dichotomy between the reality of America and American ideals, America “that was promised,” or the American Dream.
The spirit of this deity, it is said, has transmogrified through every other deity known to humankind, and wound up, thanks to some superhuman (and therefore totally not self-serving) coincidence, manifest in the flesh as the founder of CPAC Japan. As another coincidence of mind-melting proportions, this deity is also deeply fiscally conservative and politically reactionary of a bent that views compassion as a weakness. If I didn’t know better, I would think Happy Science (as this ‘new religious movement’ is known) were pulling the entire thing out of their asses, like an even nastier L. Ron Hubbard.
This latter fact, in particular, must inevitably raise a few questions—principally, whether or not the GOP remains a gaggle of thieves willing to sell each other’s grandmothers out at a moment’s notice to save their own skin politically, an end-of-times spectacle of an increasingly unstable oligarchy too drunk on its own material excess to save itself from its own decadence and corruption? Another question that springs to mind is whether it’s now in fact degenerated even further into something even more horrible again—a raging collective psychosis of pathological entitlement, collective narcissism, hypernationalist tribalism and jingoism, and death-cult supremacism.
The U.S. moves against any country that dares to act on a belief that its resources should be for its own people’s benefits rather than maximizing profits of multinational corporations or prioritizes the welfare of its citizens over corporate profit or simply refuses to accept dictation in how it should organize its economy. The military is frequently put to use, as are manipulation of the United Nations and the strong arms of the World Bank and International Monetary Fund (IMF). But sanctions are a frequently used tool, enforced on countries, banks and corporations that have no presence in the U.S. and conduct business entirely outside the United States. The U.S. can impose its will on national governments around the world, using multilateral institutions to force governments to act in the interest of multinational capital, even when that is opposite the interests of the country itself or that country’s peoples. And when a country persists in refusing to bend to U.S. demands, sanctions imposing misery on the general population are unilaterally imposed and the rest of the world is forced to observe them.
In short, the U.S. government possesses a power that no country has ever held, not even Britain at the height of its empire. And that government, regardless of which party or what personality is in the White House or in control of Congress, is ruthless in using this power to impose its will.
The ICC is on Israel's target list.
We are asking a court for protection from Trump's sanctions against the International Criminal Court.
Indeed, what makes "treating" QAnon tricky is that it technically doesn't neatly fit into the idea of a cult. That's a conundrum for therapists. Indeed, while there is a well-defined routine for cult recovery, there isn't quite the same for something like QAnon, which is in a gray area.
Gunmen stormed the Federal College of Forestry Mechanisation in Mando at the outskirts of the state capital, Kaduna city, late Thursday and took 39 students away while the military rescued 180 after a fierce battle.
During the three years she spent with Boko Haram, Naomi refused to bow down to pressure to marry one of their fighters, or convert to Islam.
Instead she and another classmate wrote secret diaries in textbooks they were given to write Islamic verses. She kept them hidden in a makeshift pouch tied to her leg.
"We decided that we should write down our stories," she tells me, "so that if one of us got to escape, we could let people know what happened to us".
She shows me one of the diaries, a lined text book with a fraying cover. In it is a letter to her dad, written just before Christmas of the year they were kidnapped.
The M6 flagship program “Enquête Exclusive” showed how ISIS Jihadists managed to slip through the cracks by posing as asylum seekers, and how they ended up being greeted with open arms and offered a safe haven in Germany, because of the dangerous laxity of German authorities.
The wearing of burqas was temporarily banned in 2019 after the Easter Sunday bomb attacks on churches and hotels in Sri Lanka that killed more than 260 people. Two local Muslim groups that had pledged allegiance to the Islamic State group have been blamed for the attacks at six locations — two Roman Catholic churches, one Protestant church and three top hotels.
Weerasekara also said the government will ban more than 1,000 madrassas, saying they are not registered with the authorities and do not follow the national education policy.
What do you call it when people invest $2 trillion into an industry that is becoming worthless? That, my friend, is a bubble.
Austria, Belgium, Denmark, Greece, Ireland, Lithuania, Luxembourg and Malta also signed the letter. By 2030, the EU wants to cut back greenhouse gas emissions by 55 percent compared to 1990. The end goal is to achieve climate neutrality by 2050.
Mysterious miniature “chimneys” have emerged in wet meadows and moist lawns all across our county. They are gateways to the secret underground world of several species of crayfish, collectively known as Chimney Crayfish. Mudbugs and crawdads are two other frequently used common names for crayfish, a group of arthropods that look very much like miniature lobsters. I like to use the eye-catching title of Lawn Lobsters to describe them when writing about them, and that’s just what I did four years ago when creating text for an interpretive sign for Oakland County Parks that featured the chimney construction skills of Cambarus Diogenes, a local species commonly known as the Devil Crayfish. It is also one of the most widely spread crayfish of the United States.
That was the end of welfare as we knew it. As Clinton boasted in his State of the Union address to Congress that year, “the era of big government is over.”
"When the American people get those $1,400 checks, they're not going to be sitting around saying, 'Oh, my goodness, this is not good, we didn't have any Republican support.'"
A legislative fix is needed, said one observer, to prevent "a flood of new judgments from debt collectors to siphon stimulus funds out."
Internet payments software provider Stripe has raised $733 million (US$600m) with completion of a funding round, with the capital to be used for investment in its European operations and to expand its Global Payments and Treasury Network to support what it says is “surging demand” from enterprise heavyweights.
In other words - running at a sustained transaction throughput of over double the maximum throughput of the two largest chains combined, one could send a Nano transaction and have it confirmed in the other person's wallet faster than you could say "this is amazing". These 4.6 million transactions took less energy to process than a single Bitcoin transaction would, and while a single Bitcoin transaction would set you back about $13.72, these 4.6 million transaction cost exactly $0 in fees.
It isn't just voter suppression. State lawmakers from Arizona to Pennsylvania are trying to thwart any form of democracy that threatens their power.
"Using vaccine distribution as a tool to control local officials is despicable and a clear abuse of public trust."
The PRO Act will not pass unless we end the filibuster. Those two things are a package deal.
In June, the US Department of Justice recommended that a trans-Pacific undersea cable proposed by Google and Facebook bypass Hong Kong.
The cable, named the Pacific Light Cable Network, was originally intended to link the United States, Taiwan, Hong Kong and the Philippines.
The Hong Kong landing station “would expose US communications traffic to collection” by Beijing, the department said.
The FCC gave Google permission in April 2020 to operate the link between North America and Taiwan.
Rules designed to limit the spread of covid-19 have allowed police to crack down on protests. A nurse who organised a socially distanced protest against low pay in the NHS, for instance, was handed a €£10,000 ($14,000) fine earlier this month. Critics say that the criminal-justice bill is, in effect, extending draconian restrictions on liberty which the public have accepted as the price of suppressing the pandemic into the post-pandemic era. The government has a particular interest in giving the police extra powers this year. COP26, a high-profile international climate conference, is being held in Glasgow in November. Boris Johnson will not want to be upstaged by an angry mob in front of a global audience.
The bill, on which Parliament will vote on March 15th, is a rag-bag of measures designed to please social conservatives. As well as stiffening sentences for child murderers and sex offenders, it also proposes tougher laws against protests and mass gatherings by broadening the range of circumstances that allow police to block them or limit their size. At present the police can impose restrictions on protests only if they risk causing serious property damage or disruption to communities. If the bill is enacted, protests carried out by a single person may be subject to restrictions, and the noise that they produce will also be grounds for restricting them. Activists who deface war memorials and statues—which some BLM members have done—could face ten years in jail.
It is one of few international tech platforms to enjoy access to China, where all subjects considered politically sensitive are censored in the name of stability and internet giants are urged to block unwanted content online.
These proposals would have more insidious effects. Laws don't have to be called the Censorship Act of 2021 for those in power to use them to target people and ideas with which they disagree.
That's the likely outcome if states enact "anti-riot" bills with overly broad language that make it easy for authorities to shut down First Amendment activity and arrest protesters whose ideas they don't like. The proposals tap into legitimate concerns about real problems to justify policies that risk eroding civil liberties without enhancing public safety.
I agree with policymakers who want to address violence, which is never an acceptable method of political action by individuals. Rioting is not free speech. But what some state legislators are now proposing goes far beyond addressing violence.
My book on Dante Alighieri was due to come out in Chinese translation later this year, but first I had to consent to sizeable cuts. Even by the standards of other authoritarian states the Beijing censors struck me as overzealous. It seems odd that the medieval Italian poet could cause such unease among modern-day totalitarians. A sanitised Chinese communist version of my book did not sit well with the 700th anniversary of Dante’s death in 1321, and in the end I withheld permission.
The cuts were the work of Beijing’s blandly named Institute for World Religions. The institute undertakes ‘book cleansing’ operations on behalf of the state. No book can be published legally in China today without being vetted. In their solemn appraisal the censors insisted that all references to Islam be removed. Why?
Disha took to Twitter to post a four-page statement “to present a narrative that is my own”. It may be recalled that Disha remained behind bars for 10 days after being arrested by Delhi Police on February 13 in connection with the Toolkit case. The controversial Toolkit was tweeted by Swedish activist Greta Thunberg.
The day before, the U.S. Agency for Global Media (USAGM), which oversees RFE/RL and other U.S international broadcasters, called the "false charges" against Losik "unacceptable."
"Belarusian authorities should drop all charges against Ihar and immediately release him," acting USAGM Chief Executive Officer Kelu Chao said in a statement.
Belarusian video blogger Syarhey Tsikhanouski, who has been in pretrial detention since May, has been served with final charges that could see him imprisoned for up to 15 years after he expressed his willingness to take part in an August presidential election against authoritarian ruler Alyaksandr Lukashenka.
The Investigative Committee of Belarus said on March 11 that the investigations against Tsikhanouski, opposition politician Mikalay Statkevich, and their associates had been completed.
According to the final charges, Tsikhanouski is accused of organizing mass disorder, incitement of social hatred, impeding the Central Election Commission's activities, and organizing activities that disrupt social order.
Tehran Tokyo is quickly turning into the California-based Mankan’s biggest hit. Since being posted online, the Instagram teaser video now has over eighteen million views and has received a record-setting 4.5 million plays on Persian language music website Radio Javan within forty-eight hours. Iranian officials typically view Tehrangeles pop music like Mankan’s as part of a Western cultural invasion or “soft war” to subvert the Islamic Republic. However, in this particular case Iranian authorities and conservatives alike are expressing outrage at the “pornographic” content of the video—despite it having no pornography.
However, despite the encouragement to produce, Saudi films are subject to the strict censorship of the Kingdom, as well as its financing. According to a report by the British Council in Saudi Arabia, 43% of respondents said that lack of commercial funding is one of the biggest obstacles, with the film industry receiving financial and artistic support from three government-backed institutions — the King Abdulaziz Center for World Cultures, a new film commission overseen by the Saudi Culture Ministry and the Red Sea Film Festival.
The Chinese-language press in the former Portuguese colony which returned to China in 1999 has faced informal censorship for years, but the Portuguese-language press is “another world,” said a reporter working at a Chinese news outlet in the city. He has declined to give his name for fear of retribution.
“Foreign media in China is independent and supervises the behaviour of both the local government and the Chinese government,” she wrote.
“I think they act in good faith and play an active role as a supervisory agency of government actions, ensuring that people have access to accurate information, and protecting those who have no voice,” she added.
China’s departing ambassador to the UK Liu Xiaoming wrote over 170 articles for UK news publications in his 11 years at the post, including op-eds defending the controversial Huawei 5G network in the Telegraph. He quit last December and will be replaced by China’s Vice-Foreign Minister, Zheng Zeguang.
The day after the 2021 inauguration, Sen. Chris Murphy of Connecticut took to Twitter to declare: "Biden is making transparency cool again."€
This was a head-scratcher for many journalists and transparency advocates. Freedom of Information—the concept that government documents belong to and must be accessible to the people—has never not been cool. Using federal and local public records laws, a single individual can uncover everything from war crimes to health code violations at the local taqueria. How awesome is that? If you need more proof: there was an Australian comic book series called "Southern Squadron: Freedom of Information Act"; the classic anime Evangelion has a Freedom of Information Act cameo; and the Leeds-based post-punk Mush received 7.4 stars from Pitchfork for its latest album "Lines Redacted."€
OK, now that we've put that down in writing we realize that the line between "cool" and "nerdy" might be a little blurry. But you know what definitely is not cool? Denying the public's right to know. In fact, it suuucks.€
Not everyone who participates in the misogynistic parts of our society benefits from it, writes Gemma Clarke.
In one sense, I am delighted that the heavy-handed police action at the vigil for Sarah Everard has brought about public revulsion at the attack on free speech and the right of assembly, just as Priti Patel prepares to bring in the dreadful policing bill which represents the biggest single threat to freedom of assembly in the UK for 200 years. Its foundational principle is that the right of freedom of assembly is subordinate to the right to drive a SUV anywhere and any time you please, without having to detour around people taking part in democratic expression. It has a subsidiary principle that all public manifestations of political dissent will be intimidated by massive police presence, and that the cost of that massive intimidatory presence will in itself be reason to ban the demonstration. Which would be delightfully Kafkaesque were it only a joke.
The Federal Court of Justice recently addressed the scope of the so-called principle of concentration pursuant to sec. 145 Patent Act. If the patentee has filed an action, a second action based on a different patent against the same defendant is inadmissible in relation to the same or similar embodiments. The FCJ has now clarified that this does not apply to a second action based on the same patent.
If patent courts should hear issues of infringement and validity separately is creating debate among French litigators. It is custom in France for the patents courts to rule on findings of invalidity and infringement together. This is similar to the UK and Dutch court systems, which also hear both issues in one patent hearing. However, in Germany, courts rule on patent validity and infringement separately – the so-called bifurcation system.
Some recent cases have heightened worries among French patent litigators, that the courts may dilute the practice of hearing infringement and validity separately. However, a recent ruling between Cellulopack and Packbenefit shows the opposite.
The newly appointed judge at the England and Wales High Court says judicial authorities may need to show restraint to avoid running into a “total mess” in FRAND patent disputes.
Speaking exclusively to Managing IP, Mr Justice James Mellor says the rising trend of anti-anti suit injunctions is not sustainable.
“It does create a potentially very difficult situation. It is going to require some forbearance amongst judicial authorities across the world, otherwise we are just going to get into a total mess,” says Mellor.
Anti-anti-suit injunctions aim to get a court to stop the infringement proceedings of a company in an anti-suit injunction in another country. In each instance, one jurisdiction is pitted against another as standard essential patent owners and implementers go to war over fair, reasonable and non-discriminatory (FRAND) licensing terms.
China was the biggest source of applications for international patents in the world in 2020 for the second consecutive year and extended its lead over No. 2 filer the United States, the U.N. patent agency said on Tuesday.
[...]
“The trend is that innovation remains resilient and the sense is that the world needs more innovation ... during a crisis,” said Tang.
The biggest single filer under this system last year was China’s Huawei Technologies Co Ltd for the fourth consecutive year and second was South Korea’s Samsung Electronics Co Ltd, WIPO said.
Singapore’s Tang began his term in October and received strong support from Western countries including the United States in a highly politicised race against a Chinese candidate for the top job last year.
It has been rumored that Apple will eliminate the notch in the future iterations of the iPhone. So far, we have not heard any solid news pertaining to the subject. With that said, Apple has filed a new patent application in which it shares details on a technology that will detect light through the display. The technology can be used in future iPhone models for Face ID and Touch ID. Let's dive in to see some more details on the Apple patent and how the company aims to implement it.
The Supreme Court recently granted certiorari in United States v. Arthrex. In that case, the Court of Appeals for the Federal Circuit held that administrative patent judges are principal officers of the United States under the Appointments Clause, and therefore must be appointed by the President and confirmed by the Senate. This note provides a critique of the Federal Circuit’s opinion in Arthrex by arguing that the Federal Circuit misunderstood the substance of the three-part test articulated by the Supreme Court in Edmond v. United States.
In 1973, the European Patent Convention (EPC) was signed, creating the European Patent Office. The office was established as a single institution for prosecuting a patent application, from which was granted the European patent, itself a bundle of national patents. The convention entered into force in 1977 with seven contracting states; it now covers 38.
The EPC has brought a number of advantages. A single patent prosecution system for 38 states simplifies and considerably reduces the cost of prosecuting a patent in Europe. An opposition procedure allows for central revocation of the bundle of rights (albeit limited to a period of nine months after grant), which again can reduce time and cost. The harmonisation of the laws of validity also mean a certain amount of predictability.
[...]
Progress of the UPC has, however, been frustrated again. Shortly after the passing of the bill, two constitutional complaints were filed before the FCC. The complaints included an application for an interim injunction to prevent the ratification of the UPC by the German Federal President, Frank-Walter Steinmeier. We have now learned that the president will wait for the outcome of the complaints before ratifying it. This outcome is difficult to predict. The FCC may find the complaints unfounded or inadmissible, meaning that the delay will be limited. However, if admitted, the process could take years.
The Federal Circuit affirmed a decision by the U.S. Patent and Trademark Office Patent Trial and Appeal Board (PTAB) rejecting claims for failure to satisfy the subject matter eligibility standard under 35 U.S.C. ۤ 101, in ex parte examination of claims to methods and related computing systems for genetic haplotyping in In re Board of Trustees of the Leland Stanford Junior University.
[...]
Completing its Alice analysis, the Board concluded that the claims did not satisfy the requirements of step 2 either, insofar as they did not "include additional limitations that, when taken individually or as a whole, provide an inventive concept that transforms the abstract idea into patent eligible subject matter" (an analysis that illustrates one again the wisdom Congress demonstrated generations ago in substituting obviousness for "inventive concept"). The recited steps "did not go beyond the well-known, routine, and conventional" according to the Board. And in the philosophical coup de grace stemming from dicta in Justice Thomas's opinion in AMP v Myriad Genetics, the Board stated that the claimed invention was patent-ineligible "although the claims may provide a valuable contribution to science."
Certain other claims, which recited as an affirmative step "providing the drug for treatment" did not transform the genetic analysis claims to patent-eligible ones for failing to satisfy the "five specificities" recited by Judge Lourie in Vanda Pharmaceuticals Inc. v. West-Ward Pharmaceuticals International Ltd., 887 F.3d 1117 (Fed. Cir. 2018), because "they are not directed to a specific method of treatment, do not identify specific patients, do not recite a specific compound, do not prescribe particular doses, and do not identify the resulting outcome."
The Federal Circuit affirmed (not surprisingly, under the circumstances) in an opinion by Judge Reyna joined by Chief Judge Prost and Judge Lourie. The opinion recited the Court's familiar litany of purported obeisance to the Supreme Court's subject matter eligibility jurisprudence, down to Gottschalk v. Benson, 409 U.S. 63 (1972), and Parker v. Flook, 437 U.S. 584 (1978), with regard to claims relying on mathematical algorithms. After parsing claim 1 according to the context of its analytical steps, the Federal Circuit held that the Board was correct in finding this claim patent-ineligible because "Claim 1 recites no concrete application for the haplotype phase beyond storing it and providing it upon request." The Court's response to Stanford's argument that "the specific application of the steps is novel and enables scientists to ascertain more haplotype information than was previously possible" was that "we are not persuaded" even if they were to accept Stanford's argument, nor was this panel convinced even if the invention provides the claimed advance in genetic analysis that the process is "an improved technological process" (which raises the question of the wisdom of denying patent eligibility to an invention that provides an improvement in genetic analysis that does not require a concommittant improvement in the technological process).
There’s a lot to take in here, and of course, DC Comics absolutely owns Wonder Woman, Batman, and all its characters, and it has every right to want to hold dominion over that intellectual [sic] property [sic] in the NFT industry. The company would probably do the same with physical fan art of DC Comics characters, if it could think of any possible way of managing that on an ongoing basis.
A federal court in Texas has granted a default judgment against a local resident who sold pirate streaming boxes through Facebook. The man, who was identified following an undercover operation, has to pay $1.6 million in damages claim to the Philippine media giant ABS-CBN.
The incredible story behind the alleged state-sponsored killing of journalist Jamal Khashoggi is told by director Bryan Fogel in his new movie 'The Dissident'. Unusually, people connected to the documentary are reportedly uploading copies to torrent sites, to give it exposure in the Arab world. At the same time, however, an anti-piracy campaign is making copies harder to find.
Horton has probably heard that on March 2nd Dr. Seuss Enterprises decided to cease publication of six books that contain “portray[als of] people in ways that are hurtful and wrong.” This produced the cycle of controversy and performative contrarianism that has become as familiar as the list of places Sam won’t eat green eggs and ham. What separates this incident from more recent cancellations is that this time it has turned (at least in part) into a discussion of copyright terms and ownership of works written by those now long dead.
The problem of “disappearing works”, when those who hold the rights to something don’t reproduce it, is it falls down the memory hole, never to be seen again, is not a new one. Unlike trademarks, the Copyright Act does not have a use-it-or-lose-it clause. There is a universe like ours but (thankfully) not ours where Orson Welles’s The Other Side of the Wind was one work to suffer such a fate due to coordination issues among various rights holders. While Disney’s “vault” is more of a marketing strategy than a final resting place for older films, there are movies like Song of the South, which likely won’t be made available.