System76 Launch keyboard ships with alternatives keycaps with different colors, a key puller, and USB cables to connect to the host device. The four USB ports allow you to connect devices like thumb drives or USB SSD’s to the computer/phone/board via the keyboard.
The QMK firmware running on the USB keyboard is also compatible with some other keyboards, and you can also access the KiCAD hardware design files, and CAD files for the chassis on Launch’s Github repo, while the Keyboard Configurator is part of pop-os repo.
We are almost half of the year 2021, we thought it right to share with Linux enthusiasts out there the most popular distributions of the year so far. In this post, we will review the top 10 most popular Linux distributions based on the usage statistics and market share.
DistroWatch has been the most reliable source of information about open-source operating systems, with a particular focus on Linux distributions and flavors of BSD. It collects and presents a wealth of information about Linux distributions consistently to make them easier to access.
Although it is not a good indicator of a distribution’s popularity or usage, DistroWatch remains the most accepted measure of popularity within the Linux community. It uses Page Hit Ranking (PHR) statistics to measure the popularity of Linux distributions among the visitors of the website.
Many of us own old computers, and old computers need low resources-constrained GUI’s to be used on them. In this article, we are going to talk about lightweight linux desktop environments to install on your old computer to revive it again.
There are many other window managers.. however, you can install any window manager you want besides some useful desktop tools like Tint2 (a nice panel which shows the current opened windows and time), Screenlets ( the famous desktop gadgets program ), Conky ( a nice system monitor gadget for your desktop ) beside any other tools that you may like.
Do you own an old computer? What software did you install on it? And what do you think about creating your own customizable desktop with 3rd party programs?
For those wondering how GCC and LLVM Clang are competing when running on Intel's latest Rocket Lake processors, here are some GCC 11 vs. LLVM Clang 12 compiler benchmarks with the Core i9 11900K running from the newly-released Fedora Workstation 34 featuring these very latest compilers. The compiler benchmarks were carried out at multiple optimization levels on each compiler.
As part of our ongoing benchmarks of GCC 11 vs. LLVM Clang 12 given these fresh open-source compiler releases, today's comparison is looking at the Core i9 11900K "Rocket Lake" performance. With both GCC and LLVM Clang, the benchmarks were carried out three times with varying CFLAGS/CXXFLAGS. Those flags included...
procs is a modern replacement for ps written in Rust. Compared to ps, it comes with colored and human-readable output, additional information like TCP/UDP port, read/write throughput, more memory information and Docker container name, and more.
The tool runs on Linux, and there's also experimental support for macOS and Windows, although some information is not available on these. Also, the pager is not supported on Windows.
In this article, we are going to review some of the best hex editors for Linux. But before we start, let’s look at what a hex editor really is.
For the traditionalists, emails remains a fundamental part of the operating system. Fortunately, there is a wide selection of free email software available on the Linux platform which is stable, feature laden, and ideal for personal and business environments.
The vast majority of Linux users would never be satisfied without access to a graphical user interface. However, even in 2021 there remain many reasons why console based applications can be extremely desirable.
Although console applications are very useful for updating, configuring, and repairing a system, their benefits are not only confined to system administration. Console based applications are light on system resources (very useful on low spec machines), can be faster and more efficient than their graphical counterparts, they do not stop working when X/Wayland needs to be restarted, and they are great for scripting purposes.
The app entered beta last year but is now considered stable enough for everyday use by Linux users, regardless of their preferred Linux distro or desktop environment.
Better yet, the app boasts tight integration with Linux systems,
“We believe that native apps with deep integration create a better experience, so 1Password for Linux will feel right at home on your desktop, whichever flavor of Linux you choose,” the company says of its app.
grep is a powerful command-line tool that is used to search one or more input files for lines that match a regular expression and writes each matching line to standard output.
In this article, we’re going to show you how to exclude one or multiple words, patterns, or directories when searching with grep.
Archiving is the process of combining multiple files and directories (same or different sizes) into one file. in the second place compression is the process of reducing the size of a file or directory.
Hope you understand the difference between archiving and compression.So now let’s get into the topic.
Asciinema (pronounced as-kee-nuh-muh) is an open-source lightweight command-line program created exclusively for recording terminal sessions and sharing them with other Linux users through the web using an embedded code or the source file as required. It aims to be a “go-to” place for each terminal user who wants to share their expertise with others. Or putting it differently, it’s a place to show off your skills.
In this article, we are going to discuss the dd command. The dd command stands for data duplicator. It is mainly used for converting and copying files. In this section, we are going to learn about backing up and erasing a media file.
In this article, we are going to learn how to make presentations and how to create graphics on the CLI. For this, we are going to use a tool named dialog.dialog is a Linux command-line tool used for taking input from users and to create message boxes.
In this article, we are going to learn how to check the integrity of a file and how to check for tampering by writing a simple shell script. Why do we need to check integrity? The answer is simple: administrators check integrity when there are passwords and libraries present on a server, as well as when files contain highly sensitive data.
In this article, we are going to learn how to capture traffic. We are going to capture network traffic with a packet sniffer tool called tcpdump. This tool is used to filter or capture TCP/IP packets that are transferred or received over a network.
In this article, we are going to check the executable. We will find out which string is present in it by using the string command.
In this article, we are going to learn about OpenSSL. In this section, we are going encrypt and decrypt messages and files using OpenSSL.
In this article, we are going to learn about the mount command. To mount a file system onto the file system tree, use the mount command. This command will instruct the kernel to mount the file system found on a particular device. There is a mount point in the tree for each partition that is mounted.
For most of my Linux-oriented career, the X protocol (TCP port 6000-60nn) that runs over the network has not been allowed. Most security policies ban the X protocol and have it silently blocked on network equipment. I guess I'm OK with that. I've mildly argued the point a few times but I generally accept the walls in which I must operate.
The lsof command in Linux displays in its output information about files that are opened by processes. In this article, we will discuss the Linux lsof tool using 15 easy-to-understand examples. Please note that all examples mentioned in this tutorial have been tested on Ubuntu 20.04 LTS, but they will work on other Linux distributions too like Debian, Fedora, and CentOS.
In this article, I will give you a short explanation of what the value null or the null device means in the computing world. The value null basically means that a variable has no value. Null is used in most computer programming languages and there is also a so-called null device (/dev/null) in Linux.
People are creatures of habit. That assertion has both good and bad connotations. The good is that we tend to do things the same way every time we do them. The bad part is that we don't tend to venture out from our routines. That routine keeps changes consistent and surprises to a minimum. The last thing any sysadmin wants to hear another sysadmin say is, "Whoops." But, that's a whole other story. Today's topic is unfamiliar commands. Six unfamiliar commands to be exact. I think you'll like these because they're useful and outside the peripheral vision of most sysadmins. They are presented in alphabetical order.
ReactOS is a relatively new open-source operating system that resembles the looks of Windows NT and aims to offer similar levels of functionality and application compatibility. Featuring a wine-based user mode, this system doesn't use any of the Unix architecture, but is a rewrite of the NT architecture from scratch, with its very own FAT32 implementation, and completely free of legal implications. That said, this is not yet another Linux distro, but a unique Windows-like system that is a part of the free software world. This quick guide aims at users who want an easy-to-use, open-source replacement for their Windows system.
Tripwire is a free and open-source Linux Intrusion Detection System. It is used to detect and report any unauthorized change in files and directories on Linux. It will also send you an alert on email on file/directory changes. Tripwire works by comparing the current filesystem state against a known baseline state and reports if detect any changes.
In this post, we will show you how to install and configure Tripwire on Debian 10.
Tainting a node means you don’t want any pods to be scheduled on that node by kube-scheduler.
Many people are confused about the concept of Hostname and Domain Name. A good understanding of the basics of DNS or Domain Name System is needed to properly distinguish the two. This will help network administrators to design and secure the network of their organization in the best manner.
In the following sections, we will explore the concept of Domain Name and Hostname.
The du Linux command is very popular for UNIX and Linux systems. This command is used to view the information about disk usage of all directory tree and files on a machine. This command has various parameter flags or options that helps to view the information of disk usage in many different formats. Using the du command, you can also display the files and directory size details in a repeated manner.
We will give a brief demo in this article on the different uses of Linux du command with examples.
The host file is a plain text file used by the operating systems to map Domain names to their corresponding IP addresses.
Although this tutorial focus on the host file in Linux, the host file is available in all operating systems, including Windows and Mac OS.
This tutorial will go over some quick methods and techniques you can use to diagnose various SSH connections, including when you cannot connect to SSH, Authentication errors, and such.
VNC or Virtual Network Computing is a protocol used to access the graphical desktop environment of your computer and control it from a remote computer. The Screen Sharing feature of the GNOME 3 desktop environment uses the VNC protocol to allow remote access to the GNOME 3 desktop environment of your computer.
This article will show you how to enable screen sharing on the GNOME 3 desktop environment of Debian 10 and access it from a remote computer. So, let’s get started.
Users, as well as groups, are usually classified by numbers rather than titles within the kernel level of the Linux OS. The kernel must be fast and reliable. In addition, the data structures must be minimal, otherwise passing strings around would be ineffective. As a result, each user, as well as group title, is translated to a specific unsigned integer value which is referred to as UserID and group ID, or “UID” and “GID” for easy reference.
Linux command cat short for ‘concatenate’, is a very useful command. Using the cat command, you can create a file, view file content, concatenate files, and file output redirection. We will discuss the different uses of the cat command with some examples in this article.
While working on a Linux system, copying files and directories is an important task that is performed daily. All users need simple and easy utility through which they can copy all their files and directories. For this purpose, the most common cp command-line utility is used on UNIX and Linux systems.
“ls” is one of the most frequently used commands in Linux. It is used to list down the files and sub-directories within your current directory. This command is equally useful for normal users as well as for system administrators. Therefore, today we will share the five most practical use cases of the “ls” command in Linux Mint 20.
The rm and rmdir commands in Linux are used to remove files and directories. Both are powerful commands and have very few command-line options. The difference between these commands is that rmdir only removes “empty directories,” and it does not remove files. If you use rmdir to remove a directory that contains files, it will fail with the message “Directory not empty”. If you need to remove a non-empty directory, use the rm command.
Another point is that when you remove a file or directory using rm and rmdir, it is instantly removed instead of moving towards Trash. Therefore, you will need to be careful while using these commands as you will not recover the removed files and directories unless you have a backup.
This post will describe how to use the rmdir command to remove directories in Linux and some examples.
Logical Volume Management, or LVM, is a system used to manage logical volumes and filesystems. LVM has much more advanced features than the other volume management tools (like gparted) used to divide a disk into one or more partitions. In order to play around with LVM, we need to have concepts about the following terms.
In this video, we are looking at how to install the Vivaldi Browser on Deepin 20.2.
In this tutorial, we will show you how to install Caddy on Ubuntu 20.04 LTS. For those of you who didn’t know, The Caddy web server is an open-source web server written in Go. It is designed around simplicity and security that comes with a number of features that are useful for hosting websites. Caddy is both a flexible, efficient static file server and a powerful, scalable reverse proxy.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Caddy web server on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.
I often read the question above on forums and groups on Facebook that discuss Linux. This is an interesting discussion because there are so many lightweight Linux distributions that can be used smoothly. I've covered some lightweight Linux Distribution for older computers on this blog.
And this time our discussion will focus on Ubuntu and maybe it can be applied to other Linux distributions!.
To make Ubuntu or a Linux distribution run smoothly and lightly on a computer that has potato specifications, you can do a few things below!.
Even with my poor hearing I can hear how bad a 128 kb/s mp3 music track sounds, but when you get up to 320 kb/s it’s a different matter. In most cases I can’t hear the difference between 320 kb/s and a 16-bit 44.1 kHz Audio CD, and, as the tests in the above links demonstrate, most people struggle to tell the difference too (watch the video ‘Audiophile or Audio-Fooled? How Good Are Your Ears?‘). Regarding sampling theory, the video ‘Digital Audio: The Line Between Audiophiles and Audiofools‘ is quite good if someone does not understand why 16-bit 44.1 kHz was chosen for Audio CDs. As to finer quantisation and higher frequencies, ‘The Difference Between 24-bit & 16-bit Audio is Inaudible Noise‘.
Today we are looking at how to install RE:RUN by Dani on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!
GRUB2 is the latest version of GNU GRUB, the GRand Unified Bootloader. A bootloader is the first software program that runs when a computer starts. It is responsible for loading and transferring control to the operating system kernel. In Fedora, the kernel is Linux.in addition to The kernel then initializes the rest of the operating system.
GRUB2 is the follower of the previous version GRUB (version 0.9x). The original version is available under the name GRUB Legacy.
Since Fedora 16, GRUB2 has been the default bootloader on x86 BIOS systems. For upgrades of BIOS systems, the default is also to install GRUB2, but you can opt to skip bootloader configuration entirely.
The MySQL DENSE_RANK () function is a function that displays the rank of a row in its partition without gaps in the ranking values. This function is a window function, which means it has similarities to functions such as ROW_NUMBER() and RANK() functions.
This guide looks at the MySQL replace function that allows us to replace a string in a table column with a new string.
The replace function is simple and this guide will be a short one. Nonetheless, the replace function can come in handy when you need to update or change values in a table such as broken URL.
In most databases, you will often encounter duplicate values—except for unique primary keys. For example, a database can contain a film table with similar ratings, year of release, and other similar values. Hence, to get a list of unique values, such as the various types of movie ratings, we need to get only the unique values using the MySQL distinct keyword.
This tutorial will go over how to use the distinct keyword in MySQL queries to get unique results.
Before we begin, we assume you have MySQL installed on your system and can perform operations on the databases.
In the world of databases, queries are one of the constant things we all implement. Although SQL has ways and conventions for performing specific queries, sometimes it requires us to set custom conditions.
One of the popular and useful conditional operators in SQL is the IN operator. Using the IN operator, we can get a Boolean value if a specific value is in a list.
This tutorial will walk you through the IN operator and how to use it to create customized conditions for SQL queries. Before we begin, we assume that you have a MySQL server installed and configured on your system, and you have a sample database with which to work on.
This tutorial will discuss how to use the MySQL DELETE clause in a JOIN statement to delete data from multiple tables that meet the specified condition.
The purpose of this tutorial is to help you understand how to use the DELETE clause along with the JOIN clause to remove data at once. If you are new to MySQL, consider our other tutorials, such as JOINS and DROP tables tutorials.
MySQL is a relational dataset that stores data in tables that have rows and columns. However, the data stored in the database may contain duplicate values caused by errors in the applications or users.
In this tutorial, we shall learn how to remove duplicate rows in a MySQL database to reduce database size and help to increase the server’s performance.
If you have ever tried to get a list of users available in your MySQL server, you will notice there is no native command to do this. For example, to get a list of databases, you can simply query SHOW DATABASES. However, this is not the case for users.
This guide will show you how you can view the users available in your MySQL using simple and quick commands.
In MySQL, a view is a virtual table that does not store data but shows data stored in other tables. Views are nothing but SQL queries because they store SQL queries that return a result set. They are also known as virtual tables.
This tutorial goes over how to create and use MySQL views in your database to perform various actions. For instance, you can use views to hide specific data from users, thus allowing them to view the data stored in a table using a view. Views can also enable developers to create simple and abstract connections to a database.
According to space and time, Universal Unique Identifier, known as UUID, is a 128-bit long value that is unique across the globe. The UUID is specified by the RFC 4122. UUID values are incredibly fascinating because even if the values are generated from the same device, they can never be the same. However, I will not get into details about the technologies used to implement UUIDs.
In this tutorial, we shall focus on the advantages of using UUIDs instead of INT for primary keys, the disadvantages of UUIDs in a database, and how to implement UUIDs in MySQL.
Valve has bundled together a bunch of upgrades from recent Beta versions of the Steam client and push out a new stable release of Steam for everyone.
On the Linux side it now offers "better diagnostics when Steam Play tools cannot be removed due to dependencies and improved the "overall robustness". Along with that, Valve also updated fossilize layer to be compatible with recent Proton Experimental releases.
For Remote Play, things get better for AMD GPU users as of this release too. It now uses VA-API 0.2 on Linux for optional hardware decode, as long as you have up to date 32-bit libva packages installed and ready. Valve also solved a potential streaming client crash when starting the stream.
It seems like Twice Circled are preparing to continue expanding their aquarium building tycoon sim Megaquarium, as a new Beta is out now with some mighty changes.
Megaquarium was already an absolute gem, especially when you add in the excellent Freshwater Frenzy expansion. Now though? Prepare for it to be better than ever as a new Beta is up to serve as "a foundation upon which Megaquarium can continue to grow" as the developer saw after the expansion and Steam Workshop popularity that "it became clear to me that some parts of the game needed a significant overhaul if the game was going to be able to continue to grow".
As far as platforms go, a small portion of sales were to Linux users, but they were by far the most helpful. I love to chat with players in the Rocket Shipment Discord, and have found that most Linux players there are amazing in feedback and support."
Ready for more classic city-building? Caesar 3 is a wonderful game from the late 90s and thanks to Augustus (a fork of another project, Julius), you can get a more modern experience with it.
It's a game engine reimplementation, meaning it provides a new game engine for Caesar 3 that works across modern systems including Linux. Not only that, Augustus provides zoom controls, road blocks, a global labour pool, increased game limits and much more - whereas the Julius reimplementation aims to be accurate to the original.
Augustus 3.0.0 and 3.0.1 quickly after bring in some huge new features and changes to the project, making it possibly the best time to get into the classic Caesar 3.
Even more developers are giving farming-life sim a chance with A New Leaf: Memories from developer IronHeart Studios and publisher Crytivo. Like many others, they're inspired by the likes of Harvest Moon, Stardew Valley, Story of Seasons, and Animal Crossing but they want to put their own sweet spin on it.
Currently crowdfunding on Kickstarter, they've got 23 days to go and against their S$43,460 (Singapore Dollars) they've managed to hit over 100% in funding so clearly it's been quite a hit with potential players.
"You wake up on the beach of a foreign island, unable to recall anything. Alone and equipped with only basic farming tools provided by the town residents, you aim to recover your memories. Complete quests and explore Omoide Island as you unfold your story."
SPRAWL has me excited. A brand new upcoming hardcore first-person shooter, set in a huge cyberpunk megalopolis and it will be coming to Linux.
"SPRAWL is a hardcore retro FPS set in an endless cyberpunk megapolis. Escape the walled city and take on the militarized government of the sprawl. Fueled by the blood of your enemies and a mysterious voice in your head, make your way towards the spire to topple whatever lays within."
Plasma 5.22 is now in beta, which gives us one month of intense testing, bugfixing and polishing.
During this time we need as many hands on deck as possible to help with finding regressions, triaging incoming reports and generally being on top of as much as possible.
To invite everyone to the process we are hosting a "beta review day". Come join us online and do QA with us together as a group.
Kdenlive 21.04.1, the first update for the 21.04 release is out. Here’s how to install it in Ubuntu 21.04, Ubuntu 20.10, Ubuntu 20.04 via PPA.
This year, like every year since its inception, Krita participates in the abbreviated version of the Google Summer of Code program. It’s shorter than it used to be, but let’s see what our students are going to do!
Here’s our second update on the state of Krita 5. We’re bringing you these updates to show what’s going on in Krita and why it’s a good idea to join the Krita development fund! There are already more than 100 members of the dev fund! But let’s have some excitement first. The new smudge brush engine landed in Krita’s master branch last week, the culmination of months of work by Dmitry Kazakov and Peter Schatz...
It is that time of the year again when we get to meet our new interns participating in both Outreachy and Google Summer of Code. This year the GNOME Project is proud to sponsor two Outreachy internships for the May-August season and to mentor 12 students in GSoC 2021!
Our Outreachy projects are listed here, and you can find our GSoC projects here.
systemd is a coup. It is a subversive interloper designed to destroy Linux as we know it, foisted upon us by the snarky we-know-better-than-you CamelCase crowd. They just don't get it down deep where it matters. systemd is not pointing in a direction that we should be going. It does not encourage freedom. It does not encourage choice. It does not display transparency. It does not embrace simplicity. It seizes control and forces you to cede it. It makes applications and major system components depend on it, and they cannot function without it. It's gaining speed by luring naive or lazy or just plain clueless developers into the fold with the promise of making their lives easier. Buying into this way of thinking ignores the greater dangers that systemd represents.
In this video, I am going to show how to install Bodhi Linux 6.0.0.
In an effort to help enterprises scale their data science and AI efforts, IBM today announced that the Python distribution platform Anaconda is now available for IBM Z and IBM LinuxONE customers.
IBM VP Barry Baker wrote in a blog post that the company believes the move will promote more open source AI capabilities by helping data scientists improve their record systems. Anaconda should also help create a more consistent experience for enterprises using a hybrid cloud strategy, he said.
By pairing Anaconda with IBM Z and LinuxONE platforms, Baker said data scientists can improve security while still having a choice in AI frameworks.
The hybrid work model, in which employees spend some time in the office and the rest working remotely, is emerging as a leading post-pandemic strategy. Employees want to keep the flexibility they’ve had over the past year or so while getting back those elements of the office that they have missed. Employers don’t want to lose their best employees to competitors – a very real risk if they’re inflexible.
Some roles, especially in technology, financial, and professional services, are well-suited to combine office and remote work. Many employers are trying to align their talent proposition to reflect this while also striving to boost agility and productivity and reduce real estate costs.
In a world where workload automation is easier than ever to develop and manual intervention is lessening by the day, are you getting tired of managing your Red Hat subscriptions day in and day out? Spending hours (if not days) managing contract renewals year in and year out? Are you scratching your head wondering why these menial tasks are even still a thing?
So why are they? Well, let’s look at these ever-advancing technologies first. You’re building a complex enterprise environment, deploying a number of products across your hybrid cloud, tying together a physical environment, mixed with a virtual environment combining some on-prem, and some hosted in <name your favorite public cloud vendor>.
With this comes the added complexity of elementary SKU logic that’s become increasingly complex with every new SKU variation created over the years. So now you have to be the logical one and say "this system wants this product, and this SKU provides said product." From there you map them together and (crossing fingers and toes and eyes) these systems can now consume the content they are hopefully entitled to. Hold on… why is this a you problem?
Ubuntu Touch, the community developed mobile version of Ubuntu, has just released a brand-new version of their OS. This time, they have been quite light on new features amid their transition to the Ubuntu 20.04 LTS base.
Here we will be looking at what it is, what new features are present, and what future releases may look like.
Interface for smartwatches added to postmarketOS: https://gitlab.com/postmarketOS/pmaports/-/merge_requests/2124
New Releases of GNUstep Components: https://www.mail-archive.com/info-gnu@gnu.org/msg02888.html
Armbian Distribution Release 21.05: https://forum.armbian.com/topic/18081-armbian-2105-jerboa/
SSH client PuTTY 0.75 released: https://lists.tartarus.org/pipermail/putty-announce/2021/000031.html
Ubuntu RescuePack 21.05 Antivirus Boot Disk Available: https://ualinux.com/ru/news/obnovlen-ubuntu-rescuepack-21-05
DragonFly BSD 6.0 released: https://www.dragonflydigest.com/2021/05/10/25731.html
VLC 3.0.14 media player update with vulnerability fixes: https://www.videolan.org/news.html#news-2021-05-10
Coreboot 4.14 Released: https://blogs.coreboot.org/blog/2021/05/10/announcing-coreboot-4-14/
Hubzilla 5.6 Released: https://hub.somaton.com/item/28fd7b30-7770-404f-995e-af97ad154187
IBM opens CodeNet for machine learning systems that translate and validate code: https://research.ibm.com/blog/codenet-ai-for-code
Credits: Full Circle Magazine @fullcirclemag Host: @bardictriad, @zaivala@hostux.social Bumper: Canonical Theme Music: From The Dust - Stardust
Welcome to the Ubuntu Weekly Newsletter, Issue 683 for the week of May 9 – 15, 2021.
Turkish company Forecr has launched DSBOX-NX2 NVIDIA Jetson Xavier NX based industrial fanless PC equipped with the company’s own DSBoard-NX2 carrier board and designed for “multi-stream deep learning edge analytics” and IIoT applications.
The compact embedded computer comes with 8GB RAM, up to 2TB SSD storage, as well as HDMI 2.0 output, Gigabit Ethernet, two USB 3.1 ports for high resolution cameras, serial ports, and some GPIOs among other features.
Last year, I wrote about using Cockpit to manage my Linux servers. It is a web-based tool that gives you a clean, powerful interface for managing multiple servers and their associated services and applications. It also eases regular day-to-day administrative tasks.
Plants certainly add a nice ambiance to the environment, but at the end of the day, you can’t really “connect” with them as you do with a pet. As a solution to this problem, Gediminas Kirdeikis decided to anthropomorphize his houseplant using an Arduino Nano, along with a moisture sensor and an OLED display.
When the Tamagotchi-like setup detects that the soil has been watered, a happy animation is played on the screen; conversely, a sad animation is shown when dry. Electronics are integrated into a custom pot, 3D-printed in two sections. This gives the project a nice clean look, with a USB cable implemented to provide power.
The Telecom Infra Project (TIP) is an association of companies, including Qualcomm Technologies, Inc. and other organizations who have come together to achieve a common goal: to quicken the pace of development and broaden the deployment of open, disaggregated, and standards-based connectivity solutions, including Wi-Fi.
Open-source Wi-Fi development, which Qualcomm Technologies has long supported, has been a driving force and an enabler of Wi-Fi research, performance enhancement, and new services for over a decade. For example, thanks to our open-source upstream Wi-Fi drivers – “Ath9k” (for Wi-Fi 4), “Ath10k” (for Wi-Fi 5) or “Ath11k” (most current version for Wi-Fi 6) – numerous ecosystem partners have successfully developed and delivered RF Sensing use cases around indoor positioning and tracking, home and office security monitoring, and medical-related vital signs detection and monitoring.
The Open Converged Wireless software project group is developing a converged indoor connectivity solution for Wi-Fi, SmallCells & PoE Switching, working on definition, design, development and testing of an open source system that includes white-box hardware, embedded software with enterprise/carrier features, a cloud native controller.
Back in 2007 Apple effectively acquired the open-source CUPS project and in 2017 then decided to no longer develop CUPS under the GPL but instead the Apache 2.0 license for this widely-used Unix/macOS/Linux print server. But then at the end of 2019 the CUPS lead developer left Apple and following that public development of CUPS seemingly halted. Fortunately, now there is a happy next chapter to the CUPS printing story.
Apple has decided not to pursue feature development further on CUPS and upstream feature development has been effectively transferred to the OpenPrinting project. CUPS founder and former Apple employee Michael Sweet presented on this change at this month's Open Printing Summit. Sweet acknowledged that Apple stopped actively developing CUPS when he left the company. But now he's been contracted by Apple to apply important bug fixes from the OpenPrinting fork of CUPS back to the Apple CUPS code-base for macOS. Apple CUPS will continue seeing these bug fixes pulled in from OpenPrinting CUPS but Apple is no longer interested in feature development on this print server.
Zabbix Team announced the availability of Zabbix 5.4.0. The new version comes with several significant improvements.
Zabbix is an open source, real-time application, and network monitoring tool. It offers monitoring of thousands of metrics collected from physical machines or virtual machines. Zabbix has a web-based management interface which is centralized through a database. With Zabbix, visualization of your data is available in the form of graphs, screens, maps and overviews.
Mailchimp is more and more expensive following the growth of your newsletter subscribers and you need to leave it. You can use Mailtrain, a web app running on your own server and use the AWS SES service to send emails in an efficient way, avoiding to be flagged as a spammer by the other SMTP servers (very very common, you can try but… you have been warned against ðŸËâ°
What if I could tell you that there was a data store you could be using that was redundant and distributed by design, allowed granular caching per record in your dataset, and is incredibly simple to set up and maintain. Snake oil this is not, this is DNS.
Now, storing data in DNS is not a new fad, in fact I spoke about this back in 2018. More recently there have been countless memes on social media about using Amazon’s Route53 DNS service as a data store, so I felt it was time to upgrade my URL shortener from using YAML to DNS as its storage medium.
The initiative was started under the Forestry Department of the Food and Agriculture Organization of the United Nations in 2018 and has been integrated by dozens of countries in their efforts to make forestry data collection and analysis more efficient and flexible. Data obtained and processed with these tools is crucial for decision making related to climate change. Governments, research institutions and NGOs can use this toolset for a wide range of applications, including forest inventories, climate change reporting, socio-economic surveys, biodiversity assessment, land use, deforestation and desertification monitoring and others.
The snippet is a saved template. It is a software system used to save us from needing to type out repetitive, and we can share them across our team company from day to day. You can think of it as the software responsible for managing the programmer code activities.
It is very useful to allow various units and sectors in companies and organizations to do their routinely teamwork; from managing teamwork to generating codes and tracking programmers… Everything is included in a snippet manager.
Open-source software has conquered many sectors in the IT industry, from the open-source healthcare domain and open-source appointment scheduler to open source Open-source data backup and open-source project management solutions… They are everywhere.
[...]
We have seen in this list many good open-source snippets managers that you may use in your daily life and organization. You can choose one of them depends on what type of features or scenarios your work needs.
Computers require unique languages to perform tasks, and these are the programming languages you learn when you study programming. We can thus define programming as the study of computer languages used by computers to perform tasks. They are JavaScript, Python, and C++. Programming has become even more lucrative as a career these days because it is used in various areas of life. This includes smart fridges and other household appliances that respond to command at the touch of a button or when operated from the phone.
Apache Camel has been a massively successful tool for integrating heterogeneous systems for more than a decade. You have probably dealt with a situation where you have two systems that were not designed to communicate with each other but still need to exchange data. That's exactly the kind of situation where Camel and its integration pipelines can help. This article shows how Quarkus uses Camel.
Figure 1 shows Camel's basic operation: Data from one system passes through a transport designed for that system to a transport designed for the recipient system.
Selenium is used to automate boring tasks; it automates browsers. From navigating the web to automatically logging into accounts to creating bots for various tasks can be achieved using Selenium.
WebSocket is a powerful technology that has found its way into many applications. Because of that, there are many libraries implemented in various languages to help programmers work with WebSocket protocol. In this tutorial, we will quickly discuss some of these libraries and what they offer. This makes it easier to choose a specific library for the language you wish to use.
If you need an introduction to WebSockets and how they work, consider one of our tutorials on the same.
This is the seventh in a series of articles about features that first appeared in a version of Python 3.x. Python 3.6 was first released in 2016, and even though it has been out for a while, many of the features it introduced are underused and pretty cool. Here are three of them.
AWK is a powerful, pattern-matching programming language that works in the command line to find various patterns in command outputs and files.
We can consider AWK an improvement over Sed since it offers more features, including arrays, variables, loops, and good old, regular expressions.
In this tutorial, we will quickly discuss how you can use multiple delimiters in an AWK command. Before we proceed, please note that this tutorial is not a beginner’s guide to AWK, nor did I intend it as such.
Certain cities in the United States have developed a claim to fame for representing some vital aspect of America. New York City has often been hailed as its financial and cultural capital. Chicago, the “big shoulders” of the nation, has been depicted as its boisterous center of industry. Berkeley, Calif., and Cambridge, Mass., serve as symbols of American liberalism, and Atlanta as the political and economic capital of Black America.
Remember ChatRoulette? Eleven years ago, the Web site that pairs random people together for webcam interactions was as hot as today's Clubhouse. A 2010 piece in New York Magazine has a perfect distillation of the ChatRoulette experience at the time:
At 7 am on Monday, February 8, Kaitlin McCann, a seventh- and eighth-grade history teacher at the General George A. McCall School in Philadelphia, arrived at work. The temperature was in the teens and snow covered the ground, but McCann didn’t go inside the building where she’s taught for a decade. Instead, decked out in snow pants, boots, and gloves with hand warmers nestled inside, she set up a portable power generator and a circle of socially distanced tables and chairs in the schoolyard.1
The report also found that tech companies failed to provide any evidence that the right to repair diminished a company's ability to innovate, threatened user security, or inhibited the companies' ability to make competitive products.
The FTC concluded, "There is scant evidence to support manufacturers' justifications for repair restrictions." It then encouraged state and federal legislators to consider right-to-repair bills and hopefully pass relevant legislation soon.
The American Families Plan will make the Affordable Care Act subsidies permanent—ensuring that millions of Americans can keep their care. And the top 1% of taxpayers will pay for it.
"Nurses follow the precautionary principle, which means that until we know for sure something is safe, we use the highest level of protections, not the lowest."
WHO Director-General Tedros Adhanom Ghebreyesus called on "high-income countries that have contracted much of the immediate global supply of vaccines to share them now."
This story involves mass death, religious zealots, and the worst case of government malpractice to facilitate what was deemed a business opportunity in the history of the United States, so I’ll choose the biblical opening:1Adapted from Chapter 1 of Nina Burleigh’s Virus, now available from Seven Stories Press.
CNBC, Biden Administration Supports Waiver of Patent Protections for Covid Vaccines
On May 5 the Biden administration did the truly unexpected. Bucking the gigantic pharmaceutical lobby in Washington, it sided with low- and middle-income countries (LMICs) by supporting a waiver provision to the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) that would set aside some intellectual property rights in order to expand the production of Covid-19 vaccines, which are now manufactured primarily by only a handful of companies in the world’s richest nations.
At some point in the pandemic, I don’t remember when, exactly, I noticed that the daily bar graph showing the steadily rising deaths had changed. Wherever it was—the New York Times?—it had started as a simple tally of Covid-19 fatalities, but now, the tally was split between the deaths of those in long-term care facilities and the deaths of “regular” civilians. The bar marking the former category was gray, as if meant to represent the people themselves who had perished: they were primarily old, and, if they were in a skilled nursing facility, they likely had physical and/or mental disabilities.
“These are among the most ‘other’ peoples,” Jack Kupferman, the director of the New York City chapter of the activist group the Gray Panthers, told me. “They’re literally behind walls. This is what we never want to be. To be in a long-term care facility, particularly a skilled nursing facility, is not on anyone’s bucket list.” It’s easy, in other words, to look away—actually, it might even feel imperative, because the sight is uncomfortable, painful, shocking, guilt-inducing. To actually regard the agonizing deaths-by-covid of the elderly would be a disruption of business as usual—this country has never treated the old, the differently-abled, the “other” of any kind with dignity, let alone attention.
Since Covid-19 exploded in India, the prime minister, Narendra Modi, seems more intent on controlling the news than the outbreak. On Wednesday, India recorded nearly 363,000 Covid cases and 4,120 deaths, about 30 percent of worldwide Covid deaths that day. But experts say India is vastly understating the true number. Ashish Jha, dean of Brown University’s School of Public Health, estimates that at least 25,000 Indians are dying from Covid each day.
The rights to produce the public sector vaccine, Covaxin, which has been developed by the Indian Council of Medical Research (ICMR) and National Institute of Virology (NIV), in collaboration with Bharat Biotech, have been given to the private company partner on an exclusive basis. The Indian government also believed that Serum Institute of India, another private sector company and the world’s largest vaccine manufacturer, which has tied up with AstraZeneca for producing Covishield, would make vaccines according to the country’s requirements without any prior orders or capital support. The government did not even see the necessity to intervene and prevent India’s new Quad ally, the U.S., from stopping sending India supplies of the required raw materials needed by India for manufacturing vaccines.
The sheer negligence by the government is further highlighted by the fact that even though India has about 20 licensed manufacturing facilities for vaccines and 30 biologic manufacturers, all of which could have been harnessed for vaccine manufacturing, only two companies are presently producing vaccines. That too is at a pace completely inadequate for India’s needs.
Months before emergency use authorizations (EUAs) were granted by the FDA for vaccines against COVID-19, starting with the Pfizer/BioNTech vaccine and then continuing with the Moderna and Johnson & Johnson (J&J) vaccines, those of us who’ve been following and trying to counter the antivaccine movement predicted that antivaxxers would publicize and weaponize reports of death and adverse events after COVID-19 vaccines to give the impression that the vaccines are dangerous. By the end of January, our predictions had come true even more blatantly than I had expected, as I€ discussed this technique three months ago and why it is deceptive. The first time I had noted this technique of antivaccine messaging was actually as far back as December, when antivaxxers were€ publicizing reports of Bell’s palsy and syncope€ within days after the Pfizer vaccine had been released under an EUA. It’s a technique that continued with€ claims based on€ VAERS€ that COVID-19 vaccines cause heart attacks and sudden cardiac deaths, with these sorts of claims being central to€ messaging by antivaccine activist Del Bigtree. None of these reports demonstrated causation, but that didn’t stop antivaxxers from publicizing them. Then, when the FDA issued a pause for the J&J vaccine based on (at the time) one-in-a-million reports to€ VAERS€ of a€ rare type of blood clot, reports that the€ FDA and CDC took very seriously, antivaxxers predictably went wild over it, even though the risk-benefit ratio of the vaccine was still deemed to be favorable.
All those issues feed bigger worries about the sustainability of the country's military, Frost notes. "In a generation or two, this is going to be a potential existential threat to our nation," he says.
Powerful forces like food insecurity and the ways cheap, high-calorie junk food is heavily marketed add to the challenge, says Jeffrey Snow, another retired major general who headed recruitment for the Army and Army Reserves until three years ago. In his military days, Snow says, he routinely talked about the significance of obesity prevention and mitigation, both inside and outside the Army.
So with all of these impressively credentialed experts, we should be getting better at this "information security" business, right? So, what is wrong?
The core problem is that "industry best practices" are not.
Not only are "industry best practices" not "best" practices, but they are also dangerous practices.
The European Union is pressing ahead with its Apple Inc. probes undistracted by allegations of anti-competitive behavior by the tech giant playing out in a Californian courtroom, according to the bloc’s antitrust chief.
The investigation into Apple Pay is “quite advanced” and European regulators need to “do our own thing” regardless of what happens in the U.S. suit against Epic Games Inc., Margrethe Vestager said in an interview with Bloomberg News.
We’ve gotten through the expert witnesses of Epic v. Apple, and as a reward, Phil Schiller — currently an “Apple Fellow,” whatever that is, and previously the senior vice president of worldwide marketing — took the stand like a twinkly App Store St. Nick. To hear him tell it, Apple is a wonderful partner to developers, selflessly improving dev tools and responding to their needs. At times the testimony feels like a prolonged ad for iOS.
Microsoft has published a Preliminary Post Incident Report on last week's events which broke Outlook on Windows for millions of users, making emails impossible to view or create.
It was on the evening of May 11th, UK time, and in the middle of the working day in North America (18:24 UTC, 19:24 BST, 11:24 Pacific), that many Office 365 customers using Outlook on Windows observed a frustrating problem: blank emails (or maybe showing just one line), even though a few lines of the email could be previewed in the list of messages. Attempts to create or reply to an email allowed a line of text to be typed, but when the user pressed enter, the text disappeared.
We use the internet to communicate, learn, teach, shop, sell and do many other activities. We are constantly connecting our devices to the internet to share and gather information. However, doing so comes with its benefits and dangers. One of the most prominent and ever-present dangers of connecting to the internet is a comprised system where attackers can use your devices to steal personal information and other sensitive information.
Although there are various methods someone can use to attack a system, rootkits are a popular choice among malicious hackers. The essence of this tutorial is to help you enhance the security of your Linux device by using the RKhunter or Rootkit hunter.
Security updates have been issued by Debian (chromium, curl, prosody, and ruby-rack-cors), Fedora (dotnet3.1 and dotnet5.0), openSUSE (ibsim and prosody), SUSE (kernel and python3), and Ubuntu (caribou and djvulibre).
"Smart" televisions have long been the poster child for the abysmal privacy and security standards inherent in the "internet of things" space. Such televisions have been routinely found to have the security and privacy standards of damp cardboard, making the data they collect delicious targets for hackers and intelligence agencies alike.
The Portuguese Presidency is calling for an EU-wide regulation on access to encrypted content by police and judiciary. This should also affect device manufacturers. Failure to comply could result in companies being banned from doing business in the EU.
As the U.S. Department of Homeland Security is soliciting proposals from vendors for how to put digital versions of drivers licenses and other ID credentials on smartphones, the ACLU has released a timely and insightful white paper, Identity Crisis: What Digital Driver’s Licenses Could Mean for Privacy, Equity, and Freedom, by Jay Stanley of the ACLU Speech, Privacy, and Technology Project, along with an executive summary in the form of a blog post, Digital IDs Might Sound Like a Good Idea, But They Could Be a Privacy Nightmare.
The ACLU white paper links to some of our research and reporting, and highlights many of our concerns with compelled identification, the REAL-ID Act, invisible virtual checkpoints, ID-based blacklists and controls on what we are and aren’t allowed to do, and the role of AAMVA and other “private” entities as outsourced, opaque, unaccountable, creators of ID “standards” that function as de facto laws and regulations that govern our movements and activities, but that are adopted in secret, exempt from the Freedom Of Information Act or other transparency laws, and lack basic privacy protections. or respect for rights recognized by the U.S. Constitution and international human rights treaties.
We encourage readers interested in these issues to read the ACLU white paper in full. But here’s an excerpt form the introduction to the white paper, framing the issue:
Metadata is data about data. Every single digital artifact has it. It describes the who, what, when, where, how, and sometimes even, why, for any document, video, photo, or sound clip. This information comes in handy sometimes, like when you’re flipping through old pictures by date, or by location. But in the wrong hands, this same information could be damaging.
The pandemic accelerated the adoption of digital by what would have otherwise taken 5 years. Digital payments are no longer an option, and digital payments business has never been more relevant than it is today. There have been substantial macro changes which Paypal believes to have a lasting and profoundly positive impact on its business. This is a robust cloud strategy that enables speed which matters for both operational efficiency and scale.
"The cruelty is the point. Abolish the death penalty," said Rep. Ayanna Pressley.
South€ Africans, along with international humanity, raise the battle cry€ Mayihlome€ in solidarity with the Palestinian people's just resistance—our anger rises for the battle. There€ can be no neutrality in the fight for freedom and justice.
"Approving more weapons to Israel would add fuel to the fire and would only embolden Israel to continue its bombardments on Gaza."
The fallacy of the colonial 'right to self-defense.'
After Turkey’s exclusion from the F35 programme, the fighter jets on the aircraft carrier ââ¬Å¾Anadolu“ could be replaced by armed drones.
Lamentations for the dead and dying in Gaza from the Biden administration are nothing more than crocodile tears.
"Deliberate attacks on civilians and civilian property and infrastructure are war crimes, as are disproportionate attacks," asserted one Amnesty official.
Matthias Schmale, director of UNRWA operations in Gaza, says civilians in the besieged territory are facing “terror from the skies” amid Israel’s bombardment, which has already killed nearly 200 people. “The price the civilian population is paying for this is unacceptable. This has to stop. This is terror on a civilian population.”
Israel’s assault on Gaza has entered its second week, as Israel killed at least 42 Palestinians in Gaza Sunday in the deadliest day so far when it bombarded the besieged area with airstrikes, artillery fire and gunboat shelling. Israel has killed nearly 200 Palestinians, including 58 children and 34 women, and destroyed over 500 homes in Gaza, leaving 40,000 Palestinians homeless. Israel also leveled a 12-story building housing the offices of the Associated Press and Al Jazeera. “This is a total destruction from the Israeli occupation against the native Palestinians in Gaza,” says Palestinian academic and activist Refaat Alareer, who lives in Gaza. “This is not new. This is a continuation of Israeli aggression against Palestinians that started in 1948, the Nakba.”
"I have not seen this level of destruction through my 14 years of work—not even in the 2014 war," said one emergency rescue official.€
U.S. policy has perpetuated the crisis and atrocities of the Israeli occupation by unconditionally supporting Israel in three distinct ways: militarily, diplomatically and politically.
Prime Minister Benjamin Netanyahu's political troubles—and an arms industry eager to battle test new wares on Gazans—may help explain the latest escalation of violence.
"It is illegal for U.S. aid to support human rights violations," said the Vermont senator.
More than half of the Senate Democratic caucus said a cease-fire is urgently needed "to prevent any further loss of civilian life."
Western media and politicians are now firmly coalesced around the Israeli government narrative. Israel is unwillingly fighting a war of self-defence in Gaza after hostilities were commenced by aggressive Hamas military attack. The storming of Al Aqsa mosque, the shooting at people in prayer, the right wing mobs attacking East Jerusalem, the Krystallnacht style destruction of Palestinian businesses and lynching of Arab Israelis, none of that ever happened at all. What happened was that Hamas launched a missile war and Israel was obliged, ever so reluctantly, to exercise its right of self defence, with enormous care not to hit civilians, except that, entirely accidentally, the IDF has killed a couple of hundred civilians including scores of children.
We Palestinians have lived decades of humiliation, injustices, and maltreatment. In 1948, we were expelled from our land; over 600 villages were fully destroyed; hundreds of thousands of us were killed or uprooted. Nearly eight hundred thousand ended up living as refugees in different places around the globe.
This happened under the eyes of the International Community, who have promised us, a sovereign State over about one fifth of our original homeland. That decision was only accepted in the 1990s by Palestinians believing in a two-state solution.
It was perhaps 6 or 7 years ago. I was part of a panel, debating on Israel and the Palestinians, that took place at a local (West Chester, Pa) Quaker Friends school. The school had such debates regularly until the administration caved-in to pressure from the Zionist parents of a number of Jewish students. One of these parents debated for the Israeli side.
This particular event came to mind upon my seeing the€ latest Human Rights Watch (HRW) report€ conclusively laying out the apartheid nature of Israel. Here is the connection: just before the debate was to begin the participating Zionist parent tried to make a command decision. No one was to use the term apartheid in reference to Israel. This was because the assertion was, according to him, obviously nonsense.
More than two years after Chicago police officers terrorized a naked 50-year-old social worker during the raid of a wrong address, the PD's independent oversight -- the Civilian Office of Police Accountability (COPA) -- has issued its report. How much of it will result in actual discipline remains to be seen, but there's a whole lot of misconduct to be had. (via FourthAmendment.com)
Parler returned to the Apple App Store on Monday after getting kicked off more than four months ago in the wake of the Jan. 6 insurrection.
The social media app popular with conservatives will look different on Apple devices now that the company has pledged to remove certain content labeled as “hate” that will still be available on other versions of the platform.
Parler, which presents itself as a free speech alternative to social media sites like Facebook and Twitter, faces a battle on two fronts as it navigates a return to mainstream app marketplaces.
The United States is taking new steps to make it more difficult for the Islamic State terror group to move money, including donations from international supporters, through Syria and Turkey.
The U.S. Treasury Department announced sanctions on Monday against three people and one company, all of which played key roles in what officials described as the terror group's illicit financial network.
Germany, several countries have been complaining, has become a safe haven for dozens of former ISIS militants who fought in Syria and Iraq.
Morocco has warned the European country against the presence on its soil of former ISIS terrorists.
“As part of this approach, the ideological aspect of the crisis must be dealt with. The ability of the group to recruit is one of the biggest reasons for its expansion, and so a deeper understanding of its recruitment patterns and operating mechanisms is crucial,” ISS senior researcher Remadji Hoinathy warned in May 2019.
Often ISWAP exploits gaps in governance by trying to prove that it can provide essential services in the areas under its control.
It’s difficult to see how this plays out in the coming days, as no doubt “international diplomacy” will step in. But the misinformation we are hearing on the news that the latest flair-up occurred because “Israelis stormed the Mosque”, may convince the majority, but it’s not the main reason this violence broke out. Those behind it have carefully constructed a well-orchestrated move to turn public opinion against Israel and the Jewish communities supporting Israel, and so far, it is working.
Climate change, water shortage and pollution are worst for Asia’s cities, researchers say. The rest of us have a lucky escape.
The youth-led climate campaign called the former Ohio state senator a "champion for people everywhere on a myriad of issues impacting our communities."€
Seven miles up San Francisquito Canyon in far northern Los Angeles County, at an unmarked spot on an abandoned county road, there’s a pile of rubble. Obscured by the cottonwoods and willows that cluster along trickling San Francisquito Creek, the site is indistinguishable from the surrounding shale and sandstone until you’re standing nearly on top of it. Further west, ragged concrete blocks the size of shipping containers lie scattered across the canyon floor. These are the remnants of greater Los Angeles’s deadliest day, obscured from public view by time, neglect, and painstaking effort.
Authorities in Russia’s far-northern Komi Republic have declared an emergency over a 90-ton oil spill affecting local soil and waterways. The leak originated from a Lukoil pipeline located in the neighboring Nenets Autonomous Okrug. Reportedly, most of the oil products have pooled on the shore of the Kolva River, however the pollution is continuing to spread into larger waterways and is moving towards the Barents sea. Local environmental activists say the spill already constitutes an environmental disaster and has likely caused hundreds of millions of rubles in damage.
Three dozen Christian organisations and institutions from across the world — including dioceses from the Church of England — announced their divestment from fossil fuels today and urged leaders to take greater action on climate change ahead of major global summits this year.
Scheduled for June, leaders of the G7 nations will meet in the UK and environmentalists hope climate will be a priority. Meanwhile, Glasgow will host the annual UN climate conference, COP26, in November.€
WEST YELLOWSTONE, MONTANA— Following a challenge by multiple conservation groups, the U.S. Forest Service announced Thursdaythat it was halting a plan to clearcut more than 4,600 acres of native forests, log across an additional 9,000 acres and bulldoze up to 56 miles of road on lands just outside Yellowstone National Park in the Custer Gallatin National Forest.
In April, the Center for Biological Diversity, WildEarth Guardians, Alliance for the Wild Rockies and Native Ecosystems Council challenged€ the South Plateau project, saying it would destroy habitat for grizzly bears, lynx, pine martens and wolverines. The logging project would have destroyed the scenery and solitude for hikers using the Continental Divide National Scenic Trail, which crosses the proposed timber-sale area.
Jeanne D’Angelo, currently a freelance illustrator, had a job interview at the Comcast headquarters in Philadelphia 13 years ago. The manager who interviewed her, who was employed by Comcast, told her she got the job. Then she was sent to a temp agency to fill out her new-hire paperwork. Like so many other workers, D’Angelo had been a temp before, and many of those jobs had been “temp to hire,” in her experience. “I just figured they’d eventually hire me,” she said.
JPMorgan Chase CEO Jamie Dimon is urging shareholders to vote against a proposed review of the impact of bank policies and practices on racial inequality.
"Tax the Rich. Save America. Yes, it's really that simple."
Close this stepped-up basis loophole, and we help finance the programs the vast majority of Americans desperately need and deserve. We also end the explosion of dynastic wealth. It should be a no-brainer.
Even if everyone agreed that printing another trillion dollars to finance a basic income for the poor would boost neither inflation nor interest rates, the rich and powerful would still oppose it. After all, their most important interest is not to conserve economic potential, but to preserve the power of the few to compel the many.
On May 17, Moscow’s Tverskoy Court terminated the criminal case against Russia’s Accounts Chamber auditor, Mikhail Men, due to the expiration of the statute of limitations, reports the state news agency TASS.€
Video emerged late last week of bigoted Representative Marjorie Taylor Greene trying to intimidate Alexandria Ocasio-Cortez at her congressional office in Washington, D.C. The video, filmed in 2019, was taken as Greene went to Ocasio-Cortez’s office, uninvited, to laugh at and mock her while purposely mispronouncing her name and talking through the mail slot in her door. Greene was flanked by a small gang of thuggy guys, including one who some think participated in the Capitol insurrection. The video, which was initially streamed by Greene on Facebook Live but later deleted, resurfaced just days after Greene accosted Ocasio-Cortez on the House floor. There, Greene accused Ocasio-Cortez of backing “terrorists and antifa,” which is rich considering that Greene exists only to give aid and comfort to white domestic terrorists.
"Chile will be the grave of neoliberalism!"€
In recent years, Russia’s National Security Council (or Sovbez) has come increasingly to resemble the USSR’s Politburo (the Soviet Communist Party’s powerful executive committee). On May 11, Vladimir Putin made significant changes to the Sovbez’s Science Council, which provides “scientific-methodological and expert-analytical support,” assists with the development of Russia’s national security strategy and strategic planning documents, and helps define priorities, criteria, and metrics. One newcomer to the Science Council is a man named A. G. Starunsky, a deputy commander of Russia’s Military Unit 55111. Meduza has learned that intelligence agencies in Estonia and the United States suspect this person of involvement in online disinformation campaigns run by Russia’s Military Intelligence Directorate (GRU).€
In making the case for Powell, it is important to understand how much he has moved the Fed from where it has been in prior decades. I have long been in battles with the Fed over its willingness to raise interest rates, slowing growth and killing jobs, in order to head off the risk of higher inflation. It viewed its legal mandate for high employment as an afterthought, at best.
Powell has turned this around. He has quite explicitly said that he wants to have the economy run hot, pushing it as far he can without kicking off inflation. He has embraced the idea that many of us on the left had long maintained: low levels of unemployment disproportionately benefit those most disadvantaged in the labor market.
All of Haitian society is in revolt.
A mambo and hougan—the traditional voudou priestess and priest—lead ancestral ceremonies before rallies take the streets and block the central arteries of Port-au-Prince, Cap Haïtien, and other Haitian cities and towns. After one of their members was kidnapped, leaders of the Protestant Church directed its congregation to halt all activities at noon on Wednesday and bat tenèb. Bat tenèb, literally “beat the darkness,” is a call for all sectors of Haitian society to beat pots, pans, street lights and anything else as a general alert of an emergency. A Catholic church in Petionville held a mass with political undertones against the dictatorship. When marchers from outside took refuge from the police inside the church, the Haitian National Police tear gassed the entire congregation.
“Politics is often defined or understood as the art of making a deal. But I think, at its best, it’s the art of making possible tomorrow that which we can’t even imagine today,” says Chesa Boudin, the district attorney of San Francisco County. The son of two members of the Weather Underground sentenced to long spells in prison, Boudin was narrowly elected in 2019 under San Francisco’s ranked-choice voting system. He talks of the pain of growing up with imprisoned parents; of the collect calls he still receives every Saturday from his incarcerated father; and of his belief, inculcated in him from childhood, that simply locking people up is a failure of the political imagination. “My personal experience shapes me—my worldview, my fears and hopes, my dreams and aspirations,” he acknowledges.1
Boudin and three other district attorneys—Republican Tori Verber Salazar of San Joaquin County, in the Central Valley (whose office didn’t respond to requests for comment for this article), and Democrats George Gascón of Los Angeles and Diana Becton of Contra Costa County—joined the Prosecutors Alliance of California in September 2020. Although their offices serve only four of the 58 counties in California, they represent more than 30 percent of the state’s population. The organization was established as a progressive alternative to the more conservative California District Attorneys Association (CDAA), which, for decades, has helped shape criminal justice priorities in the Golden State. In 2022, when 56 of those counties hold elections for their DAs, the number of Californians served by self-identifying progressive prosecutors could well reach the 50 percent mark.2
A few observations, drawn from listening to NPR largely over the WAMC station in Albany, New€ York during a Covid-19 year, are in order.
1. I find the features and the collaboration with other investigative groups, such as€ Pro Publica,€ very enlightening. One piece about Amazon’s warehouses was especially memorable. Moreover,€ Scott Simon and David Brancaccio are so capable as to be considered under-challenged.
Notes: Veena Dubal€ is Professor of Law at the University of California’s Hastings College of Law. Meredith Whittaker€ is Research Professor at New York University, and co-founder of the AI Now Institute. Robin Andersen is Professor of Communication and Media Studies at Fordham University. Maximillian Alvarez is Editor-in-Chief at the Real News Network.
All this demonstrates that the Labour Party has consistently failed to offer any real solutions to the problems we face in modern-day Britain, focusing more on petty point scoring. For too long it has enjoyed the blind trust of its supporters. Not anymore. The party seems to have forgotten that it was hope, humility, compassion and progressiveness that attracted people from all backgrounds for years.
If Labour is to win back the trust of people, it will need a serious overhaul. The party must adhere to liberal principles, promote democratic values such as free speech, and engage people and political opponents in constructive discussions.
Russia’s censorship agency, Roskomnadzor (RKN), has decided against completely blocking Twitter, it announced in a statement on May 17.€
Moscow’s Tagansky Court has registered four more proceedings against Facebook over alleged administrative offenses, reports Interfax. If found guilty, the social network will face an additional 16 million rubles (about $216,000) in fines. The magistrate’s court has yet to schedule a date for the consideration of these latest protocols.
Belarus’s national broadcaster, Belteleradio (BT), will not air the 2021 Eurovision Song Contest because the country was refused admission to the competition, BT told RIA Novosti,
For the past couple of years, Devin Nunes has been suing Twitter users over obviously satirical accounts that use his name, the most famous of which is "Devin Nunes' Cow." He has yet to succeed, but he has managed to clutter the courts with a bunch of vexatious litigation that, so far, has only proved Devin's skin is mighty thin and that he should definitely make better choices when it comes to choosing legal representation.
Executive orders represent a somewhat ambiguous region in executive authority, and there remain unresolved legal issues regarding the scope of executive policies. All of that considered, it is not unprecedented for an incoming president to revoke in-force executive orders in the early days of his term.
The government study further found that hate speech and ill-natured online debate are having a knock on effect on democracy. Forty-two percent of municipal decision-makers who responded to the survey said their willingness to participate in public debate had diminished.
Many participants in the study also said that hate speech and harassment have led them to consider giving up politics.
Saresma said this is a "serious threat" to democracy, as it reduces people's willingness to participate in social debate. However, she added that studies show that only a relatively small number of people engage in hate speech, and this small group produces the largest part of it.
"If, for example, there is reprehensible hate speech on social media, accounts should be closed. There should be zero tolerance for committing crimes," Saresma said.
A survey commissioned by the government in 2019 found that 66 per cent or two-thirds of municipal councillors believe that hate speech in public debate has increased significantly and reported being at the receiving end of abusive behavior themselves.
The study also revealed that the toxic online culture represents a direct threat to democracy, as 42 per cent of respondents admitted that their willingness to participate in public debate had decreased.
According to reports, six Ukrainian models tried to recreate that scene when they posed in the birthday suits in Turkey, creating great indignation when they posed nude while on a yacht. The models were with two men as they tried to recreate the high-rise balcony debacle in Dubai.
Naser Khader, who stepped down from his duties as a Konservative MP to take stress leave in April, will today begin his defence in the Supreme Court against charges that he libelled the female imam Sherin Khankan.
Like she did with an unsuccessful lawsuit in the High Court last year, Khankan will contend that Khader defamed her with a character assassination and abuse of power when he sent an email on 13 September 2017 to a group of MPs (from Radikale, SF and Alternativet) airing concerns about Exit Circle, an organisation that helps victims of psychological violence, which she chairs.
We speak with Palestinian reporter Youmna al-Sayed, who was among the journalists who had to flee for their lives when Israel bombed and leveled a 12-story Gaza building that housed the offices of media organizations including the Associated Press and Al Jazeera. Israel has claimed, without evidence, that the building was being used by Hamas operatives, but al-Sayed says it’s part of a pattern of Israeli attacks on media. “This is no coincidence,” she says.
When it comes to the border and its many "crises," the absurdity runs deep.
"Instead, we urge the Biden administration to pursue humane and just immigration policies that aim to end mass incarceration, criminalization, and deportation of immigrants."
"Let's be explicit: Anti-abortion extremists made it clear that this was the goal all along. It's why they couldn't wait to rush Amy Coney Barrett onto the Supreme Court before the November election."
The materials in the case on designating Alexey Navalny’s Anti-Corruption Foundation (the FBK) and political movement as “extremist organizations” were classified because they contain the personal data of security officials, the newspaper Kommersant reported, citing a source in law enforcement. Allegedly, the security officials in question filed lawsuits over damages inflicted by protesters during opposition rallies.€
On a sunny afternoon in the summer of 2019, Natalie Dong stood outside the glass headquarters of the popular online dating platform Tinder, in downtown Los Angeles, with a poster board draped from her neck. It read: “MY RAPIST IS STILL ON TINDER.”
More than a year earlier, Dong, then a 21-year-old engineering student, said she had been raped in her home by a man she had met on a different dating website, Coffee Meets Bagel. He told Dong he was on other dating platforms, including Tinder. She reported the events to the police, which didn’t lead to criminal charges.
As a drug detection dog, Karma kept his nose down and treated every suspect the same. Public records show that from the time he arrived in Republic in January 2018 until his handler took a leave of absence to campaign for public office in 2020, Karma gave an "alert" indicating the presence of drugs 100 percent of the time during roadside sniffs outside vehicles.
Whether drivers actually possessed illegal narcotics made no difference. The government gained access to every vehicle that Karma ever sniffed. He essentially created automatic probable cause for searches and seizures, undercutting constitutional guarantees of due process.
Start with the most important bits. At present, one in six American children live in poverty by the government’s own measure. International comparisons, using a measure called relative poverty, suggest that the American rate is among the highest in the rich world. It is caused by flimsy supports for the youngest (as opposed to those for the elderly, who receive Social Security and Medicare). A generous child allowance is the main anti-poverty tool in most rich countries—and also one that America lacks. One such scheme was created this year as part of the covid-19 relief bill that the president signed in March. It will pay most families $3,000 per year per child ($3,600 for young children) and is expected to halve the poverty rate soon after its payments begin in July. A simultaneous boost to the earned-income tax credit, which tops up the wages of low-paid workers, would also reduce poverty among childless adults (while reducing disincentives to work).
Western feminists’ supposedly cherished principles are not compatible with Islam, yet they remain silent.
Facebook recently announced its decision to keep Donald Trump banned -- a decision supported by its new oversight board. That decision -- just like the original ban -- made certain people very angry and very sure a platform's decision to ban someone infringes on the First Amendment.
We've talked a bit about the UK's long-running process to basically blame internet companies for all of society's ills. What was originally called the "online harms" bill has now officially morphed into the Online Safety Bill, which was recently released in draft form.
It's better than nothing -- especially given that Biden has been so vocal against Section 230 -- but last week, Biden rescinded Trump's ridiculous executive order about Section 230. As you may recall, almost exactly a year ago, Trump issued an absolutely insane executive order demanding the FCC reinterpret Section 230. As we noted at the time, this made no sense, as 230 was written with the explicit admonition that the point was to keep the FCC out of the business of regulating the internet.
Apple notes: “Due to the large file sizes and bandwidth needed for Lossless and Hi-Res Lossless Audio, subscribers will need to opt in to the experience. Hi-Res Lossless also requires external equipment, such as a USB digital-to-analog converter (DAC).”
You're probably used to feeling like you own the software stored on your computer, phone, and other devices, but that's not always the case.
First and foremost, you typically don't own the software you've purchased. You've simply bought the right to use the software in accordance with a licensing agreement. That's rarely important when using Microsoft Office programs, but many kinds of software are controlled by Digital Rights Management (DRM). That can limit your ability to use the software in important ways.
In a nutshell, DRM is a way for publishers and distributors to control your access to software. If you think you might be dealing with a DRM situation, here's what you need to know before you get yourself in a bind.
DRM stands for digital rights management and anyone who's downloaded music before 2009 knows what a pain it can be. At its most basic level, DRM puts restrictions on how you can use a digital file that you own. In the heyday of Apple's iTunes Store, the company sold AAC audio files protected with its FairPlay DRM, which restricted playback to its iPod music players and iTunes. Along with limiting what you used to play them, the files couldn't easily be shared on P2P networks. In 2007, Apple started selling premium AAC music files without DRM, and by 2009 it had gone DRM-free. The only rub there was Apple tacked on a charge of 30 cents per song if you wanted to have the FairPlay DRM removed from tracks you'd already bought.
Of course, Apple wasn't alone here, with Sony BMG's rootkit fiasco likely the most notorious DRM overreach of the era. If you played certain CDs from the music label on your computer, it would secretly install copy-protection software stopping you from copying the music. The software was also difficult to remove, and even the uninstaller created security issues for users.
By 2008, Apple would be the largest music seller in the US, but streaming was still wide open. Streaming services and stations continued to multiply during this time, starting with the likes of Pandora (now owned by satellite radio and streaming service SiriusXM) and Last.fm, which is owned by CNET's parent company ViacomCBS and no longer streams music. 2008 also was the year Spotify launched in Europe and grew quickly, thanks to a free-music model for anyone willing to put up with some ads between songs. The service wouldn't be available in the US until 2011, but in no time it became the leader, while competitors like MOG and Rdio were gobbled up by other services. Spotify currently has more than 130 million subscribers.
The report on anti-competitive repair restrictions also criticizes Apple for tying components to the logic board, which can make repairs uneconomic.
"Software locks, digital rights management (‘DRM”) tools or technological protection measures (TPMs”) are access control technologies implemented by OEMs. While manufacturers argue that these measures are necessary to protect proprietary hardware and copyrighted technologies, repair advocates argue such tactics lock ISOs and consumers out of basic repairs. Embedded software may force consumers to have the maintenance and repair of their products performed by the manufacturers’ authorized service networks. Furthermore, according to iFixit, “if you replace the screen on your iPhone even if it’s with a brand new OEM screen off of another identical iPhone certain features like TrueTone won’t work correctly."
"McDonough explained that Apple synchronizes some iPhone parts to the device’s logic board, making the part repairable only by Apple."
When you buy an e-book with DRM you don’t really own it but have purchased the permission to use it in a manner dictated to you by the seller. DRM limits what you can do with e-books you have “bought”. Often people who buy books with DRM are unaware of the extent of these restrictions. These restrictions prevent you from reformatting the e-book to your liking, including making stylistic changes like adjusting the font sizes, although there is software that empowers you to do such things for non DRM books. People are often surprised that an e-book they have bought in a particular format cannot be converted to another format if the e-book has DRM. So if you have an Amazon Kindle and buy a book sold by Barnes and Nobles, you should know that if that e-book has DRM you will not be able to read it on your Kindle. Notice that I am talking about a book you buy, not steal or pirate but BUY.
In this article, we consider patent applications to new drug formulations and combinations. Where a substance or composition is already known for a medical use, it may still be patentable for treating the same condition, provided the specific formulation or combination of active products is novel and inventive (Art. 54(5) EPC).
We set out details of how such claims are assessed by the European Patent Office (EPO) and some practical tips on how to maximise the chances of success. In particular, the complex relationship between the concepts of plausibility and inventive step are discussed, focussing on how data in the application are often important to support the patentability arguments at the EPO and how the prior art can be relied upon for plausibility if little or no data are available.
T1952/18 relates to an appeal against the decision to maintain European patent EP2512840 in its granted form. The appellant (opponent) requested that the patent be revoked while the respondent (patentee) requested that the patent be allowed in an amended form.
The invention in question relates to the bumper on a car. A bumper typically is made up from a bumper bar with a number of “crash boxes” that are designed to deform in the event of a crash. It is important that the crash boxes deform in a similar manner or their effectiveness can be inhibited. The invention is concerned with the inclusion of a towing eyelet. This can be achieved by the connection of a threaded sleeve into which the towing eyelet can be screwed. However, as a consequence of pulling the towing eyelet at an angle, the crash box can, if used, deform irregularly. The invention seeks to solve this problem by a particular arrangement of the sleeve in respect of the crash box.
[...]
The European Patent Office (EPO) noted that this evidence did not lie within the power and knowledge of the opponent because the patentee could have had similar access to the alleged prior art. The standard of proof required was therefore a “balance of probabilities” (as opposed to “up to the hilt”) and this threshold was met.
In this case, the abundance of evidence was clearly persuasive and the Board of Appeal decided that the prior use was legitimate prior art. However, the Board of Appeal’s view was that two features (s) and (t) were not known from this prior use:
With this confirmation from EPO, LED iBond has now decided to take the next steps to follow up on this opportunity to secure additional patent protection of its products.
Intellectual property services company CPA Global has been accused of substantial overcharging in a class action complaint brought by a medical device company on behalf of itself and around 100 other CPA clients.
In the complaint, filed at the US District Court for the Eastern District of Virginia, New York-based Brainchild Surgical Devices claimed CPA overcharged for renewals and issued “opaque invoices” to conceal this.
The complaint further alleges that CPA uses similar contracts and pricing structures for all, or nearly all, of its clients in a “deliberate and systematic scheme”.
A spokesperson for Clarivate, which acquired CPA Global in 2020, said it “categorically and emphatically denies any wrongdoing”.
CimetrA is designed to treat multiple ailments including viral infections with acute and chronic inflammation, COVID-19 and variants of influenza, autoimmune diseases, adverse events resulting from the various forms of cancer therapy, and the promotion of an immune response to bacterial, viral, fungal and parasitic infections.
Back in February, the Court of Appeal in IPCom v Vodafone [2021] EWCA Civ 205 overturned the first instance decision of Mr Recorder Douglas Campbell QC who held that Vodafone could benefit from what seems to be the somewhat mythical defence of Crown use. Although the decision is relatively dusty in the fast-paced age, the decision warrants further review. Brussels-based trainee patent attorney, Henry Yang, provides a summary for readers below.
When it comes to the judicial enforcement of pharmaceutical patents in Portugal, over the past few decades the general public has been driven to the misconception that the system protects pharmaceutical industry originators’ tactics to delay the market entry of generics.
The European Generic Medicines Association (EGA)’s “Patent-related Barriers to Market Entry for Generic Medicines in the European Union” report, published in May 2008, denounced allegedly originators abusive tactics, including that originators, in Portugal, tried “to force patent linkage upon regulatory authorities”, i.e. promoted a system where the approval of market authorizations (MAs) for generics depended on the status of patents protecting the originators’ medicines. The European Commission’s DG Comp was quick to fall in step behind EGA, peddling a similar narrative in the famous Preliminary Report of the Pharmaceutical Sector Inquiry published a few months later, in November 2008.
Although the Preliminary Report acknowledged (page 7) Portugal as a Member State with one of the highest generic market shares (second only to Poland) and that the Portuguese courts had not granted a single interim injunction requested by originators between 2000-2007 (page 194, Figure 77 and paragraph 522), it still depicted Portugal as a case study of originators’ tactics directed at delaying generics market entry.
Max Sills, general manager at the Cryptocurrency Open Patent Alliance and counsel for Square, sets out his ambitions for IP and cryptocurrencies
Using software often means you have to sign a contract as a condition for using the software. This "end user license agreement," called a EULA, will lay out the terms under which the software can be used. For example, the EULA you sign to play a video game might say: "The player of this video game cannot cheat while playing the game." What if you breach the EULA by playing the game using a commercially available cheating "bot"? Is this copyright infringement? Or is this just a breach of contract? This may seem obscure, but the question matters a lot. For one thing, in this example, if the video game publisher has a copyright claim against the cheater, not just a contract claim, this could mean very large statutory damages versus no damages at all.
This is just one of many scenarios in which copyright owners use contracts to control the conditions of use, and whose breach may, or may not, give rise to copyright infringement. In his new article, Against Copyright Customization, Guy Rub addresses this thorny question—copyright or contract?—along with many closely related questions. For example: when is a software user a mere licensee versus an owner? (Spoiler alert: almost always!) The article is forthcoming in Iowa Law Review and a draft can be downloaded on SSRN.
[...]
CAH: Ok, so the video game user is a very different situation, because all they are doing is playing using the bot. They are not making intentional copies. That is why we have essential step. But surely there are situations where it is not so easy. The CC license example is interesting to me. You can make copies but with attribution only. You make copies without attribution...
GUY RUB: I am fine with that being copyright infringement although it depends how exactly the license is drafted. Those copyleft contracts typically say this is a condition for the license. And in that case that is infringement, so long as it is not a fair use, and of course you need to be making additional copies. It can't just be "use."
It’s no secret that scammers are constantly trying to trick people into downloading malicious content from pirate sites. However, scammers are also targeting people who want to avoid copyright troubles. By sending fake infringement notices, bad actors hope to steal social media credentials and spread trojans.
Police in Italy say they have shut down a major IPTV network responsible for around 80 percent of illegal IPTV supply in the country. Operation Black Out was carried out by 200 specialists in 11 regions following an investigation into sellers on Telegram and other social networks. The network is believed to have generated around 15 million euros in revenue every month.
The secret menu reveals a business model that goes beyond a right-to-repair issue, O’Sullivan argues. It represents, as he describes it, nothing short of a milkshake shakedown: Sell franchisees a complicated and fragile machine. Prevent them from figuring out why it constantly breaks. Take a cut of the distributors’ profit from the repairs. “It’s a huge money maker to have a customer that’s purposefully, intentionally blind and unable to make very fundamental changes to their own equipment,” O’Sullivan says. And McDonald’s presides over all of it, he says, insisting on loyalty to its longtime supplier. (Resist the McDonald’s monarchy on decisions like equipment, and the corporation can end a restaurant’s lease on the literal ground beneath it, which McDonald's owns under its franchise agreement.)
So two years ago, after their own strange and painful travails with Taylor’s devices, 34-year-old O’Sullivan and his partner, 33-year-old Melissa Nelson, began selling a gadget about the size of a small paperback book, which they call Kytch. Install it inside your Taylor ice cream machine and connect it to your Wi-Fi, and it essentially hacks your hostile dairy extrusion appliance and offers access to its forbidden secrets. Kytch acts as a surveillance bug inside the machine, intercepting and eavesdropping on communications between its components and sending them to a far friendlier user interface than the one Taylor intended. The device not only displays all of the machine’s hidden internal data but logs it over time and even suggests troubleshooting solutions, all via the web or an app.
The result, once McDonald’s and Taylor became aware of Kytch’s early success, has been a two-year-long cold war—one that is only now turning hot. At one point, Kytch’s creators believe Taylor hired private detectives to obtain their devices. Taylor recently unveiled its own competing internet-connected monitoring product. And McDonald’s has gone so far as to send emails to McDonald’s franchisees, warning them that Kytch devices breach a Taylor machine’s “confidential information” and can even cause “serious human injury.”
After watching the efforts of McDonald’s and Taylor to decimate their business over the five months since those emails, O’Sullivan and his cofounder are now on the counterattack. The Kytch couple tells WIRED they’re planning to file a lawsuit against some McDonald’s franchisees who they believe are colluding with Taylor by handing over their Kytch devices to the ice cream machine giant and allowing them to be reverse-engineered—a violation of the franchisees' agreement with Kytch. (Taylor denies obtaining Kytch devices but doesn’t deny trying to gain possession of one or that a Taylor distributor did ultimately access it.) The lawsuit will likely be only the first salvo from Kytch in a mounting, messy legal battle against both Taylor and McDonald’s.