Bonum Certa Men Certa

Links 10/7/2021: IBM Buying Another Company, More European Patents Perish



  • GNU/Linux

    • Server

      • Best CentOS Alternatives for Large Companies

        The system of most of the top companies is based on CentOS distribution, which includes Verizon, Toyota, Disney, etc. Other major technology companies utilize this Linux distribution for creating various products. What can these and other companies that use CentOS daily do? They try to find out different Linux distributions. But, you don’t have to roam around cause you are at the right place. This post is all about the Best CentOS alternatives for larges companies. So, let’s this journey started:

    • Audiocasts/Shows

    • Kernel Space

      • AMD VanGogh APUs Get New Audio Driver For Linux - Phoronix

        Since last year AMD has been working on VanGogh APU support for Linux initially with their graphics driver support and that has spread to other areas. It also turns out now that with VanGogh APUs will be a new Linux audio driver.

      • Graphics Stack

        • Mike Blumenkrantz: At Last

          Zink(-wip) now fully supports GL_KHR_blend_equation_advanced, which means ES 3.2 is a go (once my local CI clears me to push today’s snapshot).

        • Zink Now Supports OpenGL ES 3.2 Over Vulkan - Phoronix

          The latest achievement for Mesa's generic OpenGL implementation atop Vulkan is being able to handle OpenGL ES 3.2.

          Within the "zink-wip" development code, today's work now allows for OpenGL ES 3.2 to be exposed with KHR_blend_equation_advanced being the last extension necessary for this embedded OpenGL version. On the desktop side Zink has supported OpenGL 4.6 while for those making use of GLES there is now v3.2 support. OpenGL ES 3.2 mandates KHR_debug, KHR_robustness, OES_geometry_shader, OES_gpu_shader5, OES_texture_buffer, OES_tessellation_shader, and other extensions.

        • Intel's Linux Compute Stack Now Boasts Production-Ready OpenCL 3.0, Integrates IGSC FU - Phoronix

          Shortly after OpenCL 3.0 was finalized last year it was enabled for Intel's open-source Compute Runtime stack (and even earlier with their Tiger Lake enablement). But since last year that OpenCL 3.0 support was marked as "beta" while last week was quietly promoted to being "production" grade.

          With last week's Intel Compute-Runtime 21.26.20194 build and carried forward with today's 21.27.20266 build, the OpenCL 3.0 support is marked as production ready. This is a subtle change in noticing the difference from the version tables and just seems to reflect the good state of Intel's open-source OpenCL support. Even in the months of the "beta" support, OpenCL 3.0 with the Intel Compute-Runtime has been working well for me from Gen9 Skylake graphics through Gen12 Tiger Lake.

    • Applications

      • [Older] Audacity 'Spyware' Claims Follow Privacy Policy Changes By New Owner

        Popular open-source audio editing software Audacity is facing "spyware" allegations from users for recent privacy policy changes that suggest the desktop app is collecting user data and sharing it with third parties, including state regulators where applicable.

        Two months ago, Audacity was acquired by Muse Group, which owns other audio-related projects including the Ultimate Guitar website and the MuseScore app. According to Fosspost, changes to the privacy policy section on the Audacity website indicate that several personal data collection mechanisms have since been added by the parent company.

        The type of data collected now includes the computer's processor, operating system and version, the user's IP address, and any crash reports, fatal error codes and messages generated by their machine. More concerning perhaps is the inclusion of a vague section listing data that must be collected "for legal enforcement, litigation, and authorities' requests (if any)."

      • The Audacity! How to wreck an open-source project and anger a community

        Audacity. Surely, you've heard of it. It's one of the most widely used apps by podcasters everywhere. It's one open-source project that has managed to strike the perfect balance between feature list and usability. It has everything you could possibly need to record podcasts, music and just about any type of audio, and it does this while maintaining a level of user-friendliness that few software titles can touch. It's as easy to use as it is feature-rich.

        [...]

        Here's what happened. A company acquired Audacity. Now, prior to this, you may or may not have heard that the Audacity developers were toying around with adding telemetry to collect data from users. After a public outcry, it seemed that idea was sent to /dev/null to die a timely death.

        [...]

        Then they continue that they might share data with anyone they classify as a "third-party" or even "potential buyers." The actual verbiage of the new privacy policy describes those entities they might share your data with as such (taken directly from the official privacy notice that was posted July 2...

      • Users suspected that the successful audio software was spying on them, so they created a new version of it. [Ed: Seems like automated mishmash]

        Over the years, Audacity has developed a large and loyal user base in line with successful open source software – which some would define as the “default” for sound editors and podcasts. But since the software has changed hands in recent months, it hasn’t stopped bothering users – and this time they’re no longer just protesting and moving on.

      • What’s The Deal with the New Audacity Privacy Policy?

        The popular audio editing platform has come under fire for new privacy policies, so what’s the fuss all about?

        Audacity sparked controversy this week amid claims that its new privacy policy essentially turns the platform into ‘spyware’.

        The allegations, first published by tech site Fosspot, have raged on social media and prompted the company to revise the new privacy Ts & Cs.

        Audacity is among the most popular audio editing software tools available, boasting at least 100 million users globally.

      • Audacity clarifies privacy policy over spyware allegations

        The first version of the privacy policy mentioned sharing data with potential buyers, governments and law enforcement Popular open-source audio-editing software Audacity has promised to revise its privacy policy, following allegations that it is being transformed into 'spyware'.

      • Audio Recording And Editing Software ‘Audacity’ Is Not Spyware, Reports Said

        Early July, numerous reports from tech websites said that the popular audio recording and editing software Audacity is now considered spyware as it claims to collect sensitive data from the users that installed it in their PCs. Since this information was released, many users have already said that they are uninstalling their software and use other alternative software instead.

        However, it is said that this case has already been addressed two months ago.

        According to a recent report, although the software is free and open-source, its new owner Muse Group can create "pretty damaging changes" especially on its telemetry features and privacy policy which many people think is too vague and overarching.

        The new privacy policy released on July 2 mentioned the five bullet points that are not really broad. It's actually just similar to the collected data that was mentioned in FOSSPost's own privacy policy which is the following: browser cookies you may provide, browser user-gent, IP address, and your geographical location, cookies for other websites you visited or any other information your browser can give about you. The last row covers the "data necessary for law enforcement, litigation and authorities' requests (if any)" that is actually broad and not well-defined for its users. The other one is the fact that Audacity is not allowed to be used for users age 13 and below, requesting them to not use the app in order to avoid the expense of dealing with laws related to collecting personal data from children.

    • Instructionals/Technical

      • rsync over SSH

        I’ve migrated a few rsync pages yesterday and realised there’s been something I’d wanted to document for some time: using rsync over ssh.

        rsync initially started as a tool for synchronising local folders, then expanded to also working with external drives, then progressed to working with networking folders and eventually started working with remote servers using its own native rsync protocol.

      • How to Install Libinput-gestures to Enable Multi-Touch Gestures in Ubuntu | UbuntuHandbook

        For laptop users, the built-in touchpad can do more magic by enabling multi-touch gestures. And libinput-gestures is a popular solution besides touchegg.

        Libinput-gestures is a free open-source utility that reads libinput gestures from your touchpad and maps them to user customized gestures. Each gesture can be configured to activate a keyboard key combination via xdotool utility.

      • IP Address Classes Explained – Linux Hint

        This tutorial explains IP address classes or classful networks, their classification and their use. An IP address is a 32 bits unique binary number used to identify networks and devices or hosts, the result of the conversion of the binary number to decimal is what we know as IP address.

        In decimal format this address consists of 4 numbers ranging from 0 to 255 separated by a dot. For example: 240.34.87.22 is an IP address (in binary format: 11110000.00100010.01010111.00010110).

        Each one of those numbers separated by dots is called octet. In the previous example 240 is an octet, 34 is another octet, 87 the third octet and 22 the fourth octet. Each octet consists of 8 bits. Some bits are used to identify a network, while the rest are used to identify hosts within a network.

      • How to install Nitrux 1.5.0

        In this video, I am going to show how to install Nitrux 1.5.0.

      • Bash Cut Command with Examples – Linux Hint

        The cut command is used to extract the specific portion of text in a file. Many options can be added to the command to exclude unwanted items. It is mandatory to specify an option in the command otherwise it shows an error. In this article, we will throw light on each option of the cut command.

      • UEFI Shell Scripting Tutorial

        UEFI (Unified EFI – Extensible Firmware Interface) is a software specification used to interface between the operating system and the firmware of your computer’s hardware.

        UEFI has a built-in shell program called UEFI Shell or EFI Shell. You can use it to run EFI Shell commands and run your own EFI scripts.

        This article will show you how to write UEFI/EFI Shell scripts and run them from the UEFI/EFI Shell. So, let’s get started.

      • How to Map a Host Port to a Container Port? – Linux Hint

        The Docker open-source platform has completely changed how we build, deploy, and handle containerized apps. You will need to construct a Dockerfile to containerize an application, which contains the instructions Docker needs to generate and run images. To allow seamless communication among containers in multi-container applications and making your Docker ports available by services with the outside world, you may have to set certain networking rules.

        When you start a container with Docker, all of the applications in the container run on specific ports. If you wish to use a port number to access a specific application, you must first map the container’s port number to the docker host’s port number. Containers can use port mappings to send and receive traffic through ports on the host container instance. The container’s port mappings are defined as part of the container definition. The port number on the container that is connected to the host port was either chosen by the user or allocated automatically.

        Containers in Docker can have their applications running on ports. When running a container, you must map the container’s port number to the Docker host’s port number if you would like to connect the container’s application via a port number. In this tutorial, we will explain you about mapping a host port to a container port in docker.

      • Sort Command in Linux with Examples – Linux Hint

        SORT command in Linux is used to arrange the record in a specific order according to the option used. It helps in sorting the data in the file line by line. SORT command has different features that it follows in the resultant of commands. First is that the lines having numbers will come before the alphabetic lines. Those lines having lower case letters will be displayed earlier than the lines having the same character in uppercase.

      • Linux Tail Command with Examples – Linux Hint

        As the name implies, the tail command is used to display the last values of the content of the file. By default, the last 10 lines are selected. Whereas, we can customize the number of lines by providing the number in the command.

      • Linux Head Command with Examples – Linux Hint

        As the name shows, the head command displays the first N lines of data. By default, it is a 10 number but can be customized. It is opposite to the tail command because the tail command helps in displaying the last N lines from the file.

      • How to Run Virtual Machines Using GNOME Boxes in Linux – Linux Hint

        This article will cover a guide on installing and using “GNOME Boxes” application in Linux. You can use it to create and manage local or remote virtual machines. You can run many supported operating systems in these virtual machines by saving content in virtual hard drives.

        [...]

        Developed by the GNOME team, GNOME Boxes is a part of the official GNOME software suite. It is a graphical frontend for creating and managing QEMU virtual machines. QEMU is a command line tool that can emulate hardware components and run virtual machines containing full installation of various operating systems available out there. A graphical utility called, “virt-manager” is available that can be used to manage QEMU virtual machines. However, its user interface can be a bit overwhelming with its numerous built-in configuration options. GNOME Boxes aims to simplify the interface by only exposing necessary features to end users. It is more oriented towards casual desktop users who want to manage virtual machines for day to day tasks and want to run virtual machines quickly without much hassle. Advanced users, specially those who manage QEMU virtual machines for businesses and organizations, can always use the virt-manager graphical frontend.

      • How to Mount CD-ROM on CentOS 8 – Linux Hint

        CDs and DVDs are slowly becoming irrelevant, but they are still efficient data storage devices. They can store data in a large quantity for long periods of time. In this article, we will discuss the mounting process of CD-ROM on CentOS 8 step-by-step. The method we will perform in this article will also work if you want to mount an ISO file on CentOS 8 system.

      • How to Install and Use CentOS Web Panel on CentOS 8 – Linux Hint

        CentOS Web Panel (CWP) is a control panel for web hosting. It is a free alternative to cPanel. It has an easy-to-use interface and several other features for newbies who want to create and manage hosting servers. Using CWP is easy and convenient as you don’t have to access the server with SSH for every small task that needs to be completed.

        This article provides a detailed guide on installing and using the CentOS Web Panel on CentOS 8.

      • How to Install and Use Vagrant on CentOS 8 – Linux Hint

        A vagrant is an open-source tool that helps create, maintain and manage virtual environments. Vagrant has an easy-to-use workflow and focuses on automation. It decreases setup time and increases productivity. On Vagrant, it is straightforward to share setups between team members, enabling everyone to have the same setup.

        This article provides an extensive guide on how to install Vagrant on CentOS 8. We will also discuss how to create virtual development environments.

      • How to Delete Old Unused Kernels on CentOS 8 – Linux Hint

        The kernel is the bridge between software and hardware, and it is part of an operating system that interacts with the hardware.

        In normal circumstances, the number of installed kernels does not affect the system’s performance, but it is still recommended to remove old unused kernels as it frees up space. Before we start removing old unused kernels, it is essential to note that you should always have at least two kernels on your system at any time.

      • How to Pass Environment Variables to a Docker Container – Linux Hint

        Docker is an open-source program that executes server applications using containers rather than virtual machines. Docker is a development and hosting configuration that utilizes fewer resources, so it’s no surprise that it is sweeping the development world. Docker environment variables are significant to this procedure because they store data that is unique to each user account accessing the software.

        Using any modern JavaScript framework to create a container for a single app, you may discover that the configuration settings vary depending on where the container will execute. The basic URL for your API, for example, can vary based on whether you are testing or publishing the app. Environment variables are commonly used by developers to tackle this problem because code operates on the backend, environment variables are usually used there.

        During the image construction, we may need to pass environment information to the operating container. To do so, we employ both ENV and ARG commands. The ARG command creates a variable that can be provided during the build process. Once it’s defined in the Dockerfile, you can use the parameter —build-arg to provide it to the image builder. In the Dockerfile, we can have numerous ARG instructions. In the Dockerfile, the ARG command is the only one that can come before the FROM instruction.

        However, The ENV instruction sets the environment variable, which in turn specifies the environment for the construction instructions that follow. The ENV instruction is accessible during the construction process as well as when the container is started with the —env flag. However, we are unable to pass the ENV instruction while constructing the image. The ARG directive has the drawback of being unable to persist after the image has been built. To pass the environment data inline when creating the image, we will just utilize both ENV and ARG. In this guide, we will teach you how to pass an environment variable to a docker container.

      • How to download and extract a .deb package on Ubuntu or Debian Linux

        Sometimes you require a certain file from a Debian .deb package. For example, because you accidentally deleted a file. Or because the package's installation is faulty and it can't be restored without first adding the missing file. This FAQ explains how to extract the contents of a.deb file downloaded from the Debian or Ubuntu repository.

      • How to Enable SSH in Ubuntu 20.04 Step by Step Tutorial

        Do you know what is SSH? If yes then move to the next step how to enable ssh in ubuntu. If you don’t know, listen to my words.

        SSH (Secure Shell) is a cryptographic network protocol used to establish a secure connection between the client and a server, and both can communicate securely on an encrypted channel.

        It allows the client to transfer files securely and perform the administrative task on the server remotely by accessing the command line interface on the client machine. The client machine may have an operating system like Windows, Linux, MAC and other.

      • How to Use Maltego Kali Linux a Complete guide for beginners

        Welcome you, I am glad you are here and continue reading my notes on Penetration Testing Tutorial and this post is part of Information Gathering and This article will cover How to use Maltego Kali Linux tutorial is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.

      • Cain and Abel software for cracking hashes Guide for Beginners

        According to the official website http://www.oxid.it/cain.html , Cain and Abel software is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking hashes passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analysing routing protocols.

        The latest version is faster and contains a lot of new features like APR (ARP Poison Routing) which enables Sniffing on switched LANs and man in the middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

      • Maxim Burgerhout: Building a load balanced Ansible Tower cluster

        As you might know, I do a bit of YouTubing. One video request I got a couple of times, was to do a video about clustering Ansible Tower behind a load balancer.

        As I had never done that before myself, it sounded interesting, so I did it.

      • 7 steps: Learn how to migrate to Linux desktop - TechRepublic

        Many businesses depends on Linux and open source in the data center or any number of Linux-based virtual machines hosted on a third-party cloud service. So why are you continuing to ignore Linux on the desktop? Is it because Windows is simply the desktop operating system you’ve always used and can’t figure out a reason to make the switch? Or are you afraid your end-users won’t be able to accept that drastic change? Given that so much of what users do these days happens within a web browser, using a less-than-reliable and easily broken OS as Windows should be a no-brainer of a switch.

    • Distributions

      • IBM/Red Hat/Fedora

        • CentOS Stream: 'I was slow on the uptake, but I get what they are doing now,' says Rocky Linux founder

          Last December Red Hat announced that it would cease work on CentOS Linux, switch its focus to CentOS Stream, and sunset CentOS 8 in December 2021 instead of 2029. It was a change that shook the Linux community. CentOS is hugely popular: exact figures are difficult, but W3techs suggests that CentOS has 10.6 per cent of the websites running Linux, versus 0.9 per cent for Red Hat Enterprise Linux (RHEL). CentOS is a community build of RHEL whereas CentOS Stream is an upstream project, "a preview of upcoming Red Hat Enterprise Linux minor and major releases," as described by Red Hat.

          "The end of life of CentOS as we know it had a negative effect on my company and my company's customers as well as pretty much everybody in the industry," Kurtzer told The Register. "I felt it was important to take the lessons learned from CentOS and bring that into a new project... and I enjoy operating systems."

        • IBM Plans To Acquire Hybrid Cloud Consulting Firm BoxBoat

          IBM has announced plans to acquire BoxBoat Technologies, a DevOps consultancy and enterprise Kubernetes certified service provider. BoxBoat will extend IBM’s container strategy and implementation services portfolio to further advance IBM’s hybrid cloud strategy and accelerate Red Hat OpenShift adoption globally.

        • You asked, we acted: How Red Hat has acted on customer feedback [Ed: But Red Hat, you still killed CentOS (as it was) in spite of popular demand]

          At Red Hat, we take customer feedback seriously. At the end of projects with our clients, formal training, purchases of software or solutions, and even technical support, we regularly hold feedback sessions. In doing so, this feedback loop can help identify points of improvement in various aspects and areas of the company to provide an improved customer experience.

          In our Customer Portal, you will find a page dedicated to showing the actions we’ve implemented based on feedback we’ve received called "You Asked. We Acted."

          This is one of the ways that we show how Red Hat is taking action to implement changes based on feedback we’ve received.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Events

        • Linux Plumbers Conference: Testing and Fuzzing Microconference Accepted into 2021 Linux Plumbers Conference

          We are pleased to announce that the Testing and Fuzzing Microconference has been accepted into the 2021 Linux Plumbers Conference. In spite of the huge number of products shipping with the Linux kernel which are being thoroughly tested by OEMs and distribution providers, there is still no enforced quality standard upstream. How can we make best use of all the publicly available infrastructure and test frameworks in order to fill this gap? Testing and fuzzing upstream as well as gathering results from products is crucial to keeping a project that has over 5,000 commits every month stable for all to use.

        • Practical Open Source Needs You!

          This is the first such event we’ve planned, so to get the word out, we’ve been reaching out directly to a wide array of open source community members of all stripes -- strategists, activists, lawyers, developers -- to spread the word about our Call for Speakers, which closes on July 15th, 8:00 EDT. We want this event to be a place where folks can find an accessible entry point into open source practices, learning from community members about best practices, common mistakes, and answers to topics as deceptively simple as choosing the right license for a project, so if that’s something you know about, we want to hear from you!

        • Florence to host International FOSS4G Conference 2022

          The 16th annual congress of the Open Source Geospatial Foundation (OSGeo), the non-profit organisation that supports and promotes the collaborative development of free and open source geographic technologies and open geospatial data, will be held in Florence at the Palazzo dei Congressi, Palazzo degli Affari and the University of Florence, 22-27 August 2022.

  • Leftovers

    • Science

      • The evolution of POS (Point of Sale) Systems

        The first computer-driven cash register, which resembles what we have today, was developed by IBM in 1973 – and it marked the first commercial use of a computer-based system used by the restaurant industry.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Friday

            Security updates have been issued by Debian (apache2 and scilab), Fedora (chromium and perl-Mojolicious), Gentoo (inspircd, redis, and wireshark), and Mageia (fluidsynth, glib2.0, gnome-shell, grub2, gupnp, hivex, libupnp, redis, and zstd).

          • Linux kernel Livepatching

            Canonical livepatch is the service and the software that enables organizations to quickly patch vulnerabilities on the Ubuntu Linux kernels. Livepatch provides uninterrupted service while reducing fire drills during high and critical severity kernel vulnerabilities. It is a complex technology and the details can be confusing, so in this post we provide a high level introduction to Ubuntu Linux kernel livepatching and the processes around it.

          • Increased security: Open Policy Agent reaches version 0.30 [Ed: Automated translation]

            Designed as an open source general-purpose policy engine, the Open Policy Agent (OPA) is used to program, provision, enforce and monitor context-related policies. The team behind the open source project managed by the Cloud Native Computing Foundation (CNCF) has now presented OPA 0.30.0 – immediately followed by the bug fix release 0.30.1, which contains an error in the behavior of indexof fixes.

    • Internet Policy/Net Neutrality

      • Biden’s new executive order urges FCC to restore net neutrality

        President Joe Biden will urge the Federal Communications Commission (FCC) to reinstate net neutrality rules in an executive order he’s expected to sign Friday.

        Biden’s call will be part of a larger sweeping executive order attempting to promote competition in the country’s economy and combating corporate consolidation.

        Net neutrality rules were adopted by the FCC in 2015 and prevent internet service providers (ISPs) from blocking, throttling, or using paid prioritization on internet speeds. The rules also classified ISPs under Title II of the Communications Act, which gave the FCC authority over the providers.

        All of that was undone in 2017 by the Republican-led FCC, which repealed the rules.

    • Monopolies

      • Patents

        • News from Abroad: European CVC CRISPR Patent Revoked Because of Invalid Priority Claim [Ed: More fake patents, including patents on life]

          While many patiently await developments in the pending U.S. interference proceedings relating to the CRISPR patents in the U.S., matters are progressing in Europe. The Opposition Division (OD) of the European Patent Office (EPO) has just issued (on June 29, 2021) its written decision in the case of EP3241902, owned by the University of California/Berkeley, the University of Vienna, and Emmanuelle Charpentier (collectively termed "CVC"). While the headline decision of the OD to revoke the patent was delivered orally at the hearing on April 13, 2021, the OD has now provided its detailed reasoning behind the decision.

          Formally, EP3241902 was revoked for lack of inventive step. However, pivotal in this decision was the finding by the OD that the patent was not entitled to priority from at least the first priority claim of May 25, 2012 (US 61/652,086; "P1"). In view of this, the inventors' own landmark publication from June 28, 2012 ("Jinek 2012") became prior art.



Recent Techrights' Posts

'Dark Patterns' or a Trap at the European Patent Office (EPO)
insincere if not malicious E-mail from the EPO's dictators
There's an Abundance of Articles About the New Release of Kali Linux, But This One is a Fake
It can add nothing except casual misinformation (fed back into the model to reinforce lies)
IBM's Leadership Ruining Lives of People Who Thought Working for IBM Would be OK
Nobody gets fire-lined for buying IBM?
The United States' Authorities Ought to Become Enforcers of the General Public License (GPL) for National Security's Sake
US federal agencies ought to pursue availability of code and GPL compliance (copyleft), not bans
The Problem of Microsoft Security Problems is Microsoft (the Solution is to Quit Microsoft) and "Salt Typhoon" Coverage Must Name CALEA Back Doors
Name the holes, not those who exploit them.
A "Year of Efficiency"
No, we don't mean layoffs
 
Another Terrible Month for Microsoft in Web Servers
Consistent downward curve
LLM Slop Disguised as Journalism: The Latest Threat to the Web
A lot of it is to do with proprietary GitHub, i.e. Microsoft
Gemini Links 20/12/2024: Regulation and Implementing Graphics
Links for the day
Links 20/12/2024: Windows Breaks Itself, Mass Layoffs Coming to Google Again (Big Wave)
Links for the day
Microsoft: "Upgrade" to Vista 11 Today, We'll Brick Your Audio and You Cannot Prevent This
Windows Update is obligatory, so...
The Unspeakable National Security Threat: Plasticwares as the New Industrial Standard
Made to last or made to be as cheap as possible? Meritocracy or industrial rat races are everywhere now.
Microsoft's All-Time Lows in Macao and Hong Kong
Microsoft is having a hard time in China, not only for political reasons
[Meme] "It Was Like a Nuclear Winter"
This won't happen again, will it?
If You Know That Hey Hi (AI) is Hype, Then Stop Participating in It
bogus narrative of "Hey Hi (AI) arms race" and "era/age of Hey Hi" and "Hey Hi Revolution"
Bangladesh (Population Close to 200 Million) Sees Highest GNU/Linux Adoption Levels Ever
Microsoft barely has a grip on this country. It used to.
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, December 19, 2024
IRC logs for Thursday, December 19, 2024
Gemini Links 19/12/2024: Fast Year Passes and Advent of Code Ongoing
Links for the day
Twitter is Going to Fall Out of Top 100 Domains as Clownflare (DNS MitM) Sees It
evidence of Twitter's (X's) collapse
[Meme] Making Choices at the EPO
Decisions, decisions...
Large and Significant Error Correction in South America?
Windows now has less than half what Android achieved in terms of "market share"
Links 19/12/2024: Astronaut Record and Observer Absorbed
Links for the day
Links 19/12/2024: Seven Dirty Words and Isle Release v0.0.3 (Alpha)
Links for the day
Links 19/12/2024: Nurses Besieged by "Apps", More Harms of Social Control Media Illuminated
Links for the day
15 Countries Where Yandex is Already Seen to be Bigger Than Microsoft (in Search)
Georgia, Syrian Arab Republic, Cyprus, Moldova, Ukraine, Armenia, Azerbaijan, Kyrgyz Republic, Uzbekistan, Kazakhstan, Turkmenistan, Tajikistan, Belarus, Turkey, and Russia
Links 19/12/2024: Magnitude 7.3 Earthquake and Privacy Camp
Links for the day
Gemini Links 19/12/2024: Port Of Miami Explosion, TurboQOA, Gnus
Links for the day
Fake Articles About 'Linux'
Dated yesterday
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, December 18, 2024
IRC logs for Wednesday, December 18, 2024
FSF Has Made It Halfway to Its Target (Funding Goal) a Week Before Christmas Day
$400,000 definitely seems reachable now, especially if they extend the "deadline"
[Meme] The Master Churnalist
Speaking of press releases being passed off as "journalism"
Spamnil's TFiR: Still Pretending Press Releases Are 'Articles' (TFiR 'Originals' as Plagiarism or Fluff)
Same as last year
Links 18/12/2024: Zakir Hussain Dies, TuneIn Layoffs
Links for the day
Links 18/12/2024: Karate Love and Advent of Code
Links for the day
Windows (or Microsoft) Has Become the "One Percent" (Market Share) in Chad
How long before it falls below 1%?
Arvind Krishna, IBM's CEO, Will Eventually Suck Up to Donald Trump Like His Predecessor Did or the Watson Family Did With Adolf Hitler
Literally Hitler
Being a Geek Need Not Mean Being Sedentary
"In the past 18 months," Berkholz writes, "I’ve lost 75 pounds and gone from completely sedentary to fit, while minimizing the effort to do so (but needing a whole lot of persistence and grit)."
GAFAM Kissing the Ring of the Mafia Don
"resistance" to dictatorship and defenders of democracy?
Slop Spaghetti From the Chef, Second Time Today
Fresh slop ready out the oven!
IBM - Like Microsoft - Lies About the Number of People It's Laying Off (Several Tens of Thousands, Not Counting R.T.O. "Silent" Layoffs and Contractors/Perma-Temps)
How many waves of silent layoffs have we seen so far at IBM this year?
Links 18/12/2024: EU Launches Probe Into TikTok (At Last!)
Links for the day
Links 18/12/2024: Doha/Qatar Trafficking, Bloat Comfort Zone, and Advent of Code 2024
Links for the day
Saving What's Left of Decent and Independent Journalism on the Web
We increasingly (over time) try to make local copies (hosted on our server) of important documents; it's hard to rely on third parties
[Meme] Microsoft's Latest Marketing Pitch
"Stop Being Poor; buy a new PC with TPMs"
In South Africa, a Very Large Nation, Web Developers Can Already Ignore Microsoft Browsers (Edge Measured Below 3% in 55 Nations)
The dumb assumption you must naively test with Microsoft browsers is no longer applicable in a lot of places
Open Source Initiative (OSI) is the Voice of Bill Gates and Satya Nadella
Not hard to see what they've done with the money
Microsoft Boasts That Its (Microsoft-Sponsored) "Open Source AI" Propaganda Got Cited in Media (That's Just What the Money Did)
This is a grotesque openwashing campaign
In Many Places Around the World, Perhaps as Expected, Yandex is Nearly Bigger Than Microsoft (Like in Several African Countries)
Microsoft may soon fall to "third place" in search
Keeping Productive This Christmas
We've (pre)paid for hosting till almost January 2026 and fully back on the saddle
IBM and Canonical Leave Money on the Table Because Microsoft Pays Them Not to Compete and Instead Market Windows, WSL, Microsoft 'Clown Computing', and TPMs
Where are the regulators?
Other Editors Who Agree "Hey Hi" (AI) is Just Hype But Won't Say So Publicly as It Might Upset Key Sponsors
Some media would gladly participate in a scam to make money
Brian Fagioli's Latest "Linux" Article Appears to be Fake
Another form of plagiarism/ripoff using bots?
IBM (and Red Hat) is a Patent Troll, Still Leveraging Software Patents to Extract Money Out of Other Companies by Suing Them
Basically, when it comes to patents, IBM is demonstrably part of the problem, not the solution
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, December 17, 2024
IRC logs for Tuesday, December 17, 2024