"Android and Chrome water down the Linux philosophy," the article argues, "but they are Linux..."
Does this make any long-time geeks feel vindicated? In the original submission wiredog (Slashdot reader #43,288) looks back to 1995, remembering that "my first Linux was RedHat 2.0 in the beige box, running the 0.95(?) kernel and the F Virtual Window Manager...
"It came with 2 books, a CD, and a boot floppy disk."
If you're looking for a secure laptop computer, you have several options. Thumb readers, facial recognition, and built-in encryption all offer considerable security. But these features – typically backed up by the operating system – are prone to failure, one way or another. For example, facial recognition can be bypassed using various techniques.
Purism is a company that assembles Linux computers, complete with a secure operating system and hardware kill switches. These features – while eschewing potential points of entry found on other laptops – make Purism laptops particularly attractive to any user concerned about online privacy and security.
One has to wonder how much longer the Linux kernel will keep around some very old and known to be borked hardware support but at least for now the DECpc AXP 150 "Jensen" platform support is sticking around and with Linux 5.15 is no longer marked as "broken" outright.
The past four years the Linux kernel Kconfig for the DEC Alpha Jensen platform has marked it as "BROKEN" since it was known to not even compile due to a build error... With Linux 5.15 that Jensen system code now has its four lines of moved around code so it can at least build correctly. So with a change merged on Saturday Linux 5.15 no longer calls Jensen as "BROKEN" outright.
Rufus for Linux, yes, everybody who has ever used this bootable USB creator tool which is only available for Windows, definitely wished to have it for Linux operating systems too. However, although it is not directly available for Linux, we can still use it with the help of Wine software. But again even after installing it using Wine on Ubuntu, in our case, it couldn’t recognize the attached USB drives, which again closed the door for normal users to use Rufus on Linux. Thus in such scenarios what do?
Don’t worry. The Rufus is not the only software for creating a bootable USB drives in the world. There are also few other best alternatives to Rufus that we can use easily on Linux operating systems. And here today we will discuss such opensource or free tools for creating bootable drives on Linux Distros.
Understanding YAML is essential as it is a popular markup language. In addition, you need to get familiar with the basics of the YAML syntax to master the art of writing playbooks in Ansible.
YAML is often called “Yet Another Markup Language” because it appeared in the era of other markup languages such as (HTML, XML, etc.). However, later its reference changed to “YAML Ain’t Markup Language” to emphasize its data-oriented purpose. Indeed, it is used for configuration files and other declarations. For example, in the case of Ansible, you may think of a playbook written in YAML as a declaration of configuration procedures and processes.
Wireless networks and hotspots aren’t just for Windows users. Linux-based projects are cropping up all over to make for inexpensive WLANs of all sorts.
This strange term is a relic of Unix history, but daemons are still in use today. The term is synonymous with the concept of a "service", a task that runs continuously, typically without user interaction.
There are several common examples of daemons, and even if you don’t need to know exactly how they work, it’s at least useful to be able to identify them.
Managing and viewing MySQL / MariaDB data using the terminal can be cumbersome. So we always have the help of various tools that allow us to do this process quickly and easily. Thanks to this tutorial, you will learn how to install MyWebSQL on Ubuntu 20.04, and with a modern graphical interface, you will be able to manage a database quickly.
Rust is an open-source systems programming language that focuses on speed, memory safety, and parallelism. Developers use Rust to create a wide range of new software applications, such as game engines, operating systems, file systems, browser components, and simulation engines for virtual reality.
Plex Media Server is a piece of software to store all your digital media content and access via a client application such as your TV, NVIDIA Shield, Roku, Mobile App, and many more platforms. Plex Media Server organizes your files and content into categories. It’s extremely popular with people storing TV Shows and Movie Libraries, and if your connection is good enough, share it with your friends and family. Over time Plex Media Server has grown much and now supports many platforms.
In the following tutorial, you will learn how to install Plex Media Server on Fedora.
For unpacking tar-archives through a command-line utility is used tar.
It is useful to know that archives tar have the file extension .tar Also in Linux, archives are widespread that have additional compression by other programs. For example, archives .tar.bz2 , .tar.gz and others. All of these archives can be unpacked using the utility tar.
Designed to provide safer, faster and more stable use for everyone, it is a Chromium browser, an open source browser project produced by Google. The software that aims to provide a secure web experience to the user; It can be used on Windows, GNU/Linux, macOS and many other systems. It is known that Google changes the Chromium source code almost daily. Therefore, it is recommended that the user always use the latest version. For this reason, it is considered more suitable primarily for developers, not end users. How to install Chromium browser on Debian 11 “Bullseye”? This is our topic today. As it is known, Debian 11, which got the code name “Bullseye” from the horse character in Pixar’s famous Toy Story series announcement of after the toys, the topics now turned to Bullseye. We continue from here. The Chromium browser created by Google is used by many users.
To install the Chromium browser on the system, first in the terminal suYou must be root with the command or constantly per commands. sudoYou will need to add In the meantime, this on what to do to gain sudo command privileges on Debian forum post can be viewed .
This tutorial will be helpful for fixing the issue – bash: ifconfig command not found
The Linux Kernel is the core component of a Linux operating system. The Linux kernel has a modular design that allows it to be extended in terms of functionality. Modules are small pieces of code that may be loaded and unloaded by the kernel without having to restart the computer. Kernel modules can be loaded/removed manually or automatically.
When a new device such USB or PCI is connected/removed, the kernel sends uevents. The uevents contain information about the device such as vendor and model details. Udev (device manager) is listening to this uevents and passes them to modprobe. Modprobe intelligently identifies the requested driver by searching under the module directory /lib/modules/uname -r and loads the module file into the kernel. Once the module is successfully loaded, it appears in the listing from lsmod command. Additionally, modprobe is used to manually add or remove a loadable module from the kernel.
Linux distributions are one of the best operating systems available. Users are very satisfied to use them. This is because of the full control that we get over it. We love to customize, installing different kinds of applications, its regular hustle free updates, looks, performance, easiness, and the list goes on and on. So in this quick guide, we are going to learn about how to install applications in Linux distributions.
The ‘work from home’ was existing for years but only a few people chose to work like this.
Covid-19 lockdowns made work from home a common scenario. Even the non-IT people had to resume their work activities from the confinement of home. Video conferencing tool become as common as emails.
Among all this, Zoom became the de facto online meeting tool. If you are using Linux and prefer open source video conferencing tools like Jitsi Meet, chances are that people at work use Zoom.
Hi everyone. In this video I am going to show you step by step how to customize Cinnamon Desktop Look Like macOS Big Sur. In this video, I use Linux Mint 20 with the Cinnamon desktop 4.6 series for implementing the theme look like macOS Big Sur.
This tutorial also works on Linux Distribution which using Cinnamon Desktop such as Linux Mint, Feren OS, OpenSUSE with Cinnamon, Debian Cinnamon flavor, Fedora Cinnamon Spin, Arch with Cinnamon Desktop, and Manjaro Cinnamon Edition.
This is a recommendation for new elementary OS users who just had version 6 codenamed Odin. It includes apps, settings, and some enhancements you would and might need. Enjoy elementary OS experience!
There are work apps not included in elementary OS which we need to install ourselves for example LibreOffice, multimedia tools like Kdenlive, and games like TuxMath and 0 A.D. Follow this guide to get what you need: Guide to Install 20 Standard Apps on elementary OS.
A quick guide on how to install the latest Java 17 in Ubuntu 20.04, 20.10 and Linux Mint 20.x.
The PS5 does support IPv6, and the Netflix app proves that IPv6 connectivity is available for use. Apart from Netflix, though, there is not much use of IPv6. That goes both for the system software and its bundled apps, as well as for third-party apps and games.
The recently released SDL 2.0.16 brought much-improved Wayland support but it's still not quite good enough yet to have it be the default over the SDL X11 path. However, developers continue working in that direction to eventually use it by default.
Well known Linux game porter Ethan Lee presented at this week's X.org Developers Conference (XDC2021) with the ongoing work to bring SDL's Wayland support up to parity with X11 that it can be the default.
Here’s another look at the survey conducted back in April 2021 – this time we will check the answers from all respondents regarding VR on Linux.
First, let’s have a look at how widespread is VR among the respondents...
As expected, the majority of users have actually never tried VR. However, the number of owners of PC VR equipment is much higher than I had anticipated. More than 13% is a huge number, relative to the usual market of VR as we know currently. As usual the same disclaimer apply as per the previous survey analysis (this sample is potentially not representative of Linux gamers at large, etc…) but there are still many things to learn from it.
[...]
It’s not very surprising that the large majority has no such intent. But still, about 15.8% say they would be somewhat likely or very likely to purchase such VR equipment. Even if only half of those actually pulls the trigger, that’s still something like a 8% growth year on year. Not very fast, but still healthy in terms of market development. It’s consistent with what we have been observing so far with VR: sales increase year after year, but there’s no explosion – nothing like how smartphones took off, if we were to take a benchmark.
I think this all says that VR is potentially great, but for numerous reasons, it’s not yet ready to go full mainstream. Half Life: Alyx may be the exception that proves the rule: pretty much everyone who played it considered it a game-changer, but there’s only one game like that, and this is from Valve after spending years experimenting with what VR could bring. Maybe every game, ten years from now, will be as good or better than Alyx in VR, but until more extraordinary titles come out, adoption will be on a slow pace.
Offensive Security has released Kali Linux 2021.3, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it.
Much like any other organization navigating the future during very uncertain times, the FreeBSD Foundation team spent the last year increasingly focused on how best to support its mission and goal – how best to support the FreeBSD Project. We held strategy sessions with the Foundation Board and FreeBSD Core team, reviewed the results of the FreeBSD core team’s user and developer surveys, and held conversations with developers, users and other members of the FreeBSD community to determine where to focus our efforts. The overall goal is to expand and enhance the efforts of the technology team.
The beginnings of this effort can be seen in the FreeBSD Quarterly Status Reports for the first half of the year. One example is the sponsored Linuxulator Compatibility Improvements project that included modernizing the code base to support popular client-facing and server related Linux applications. You can read more about his work at https://freebsdfoundation.org/project/targeted-linuxulator-compatibility-improvements/.
It's true that Ubuntu has a community of people who contribute to it despite Canonical not paying them for their time and work. But this community doesn't get to make real decisions on anything that Canonical cares about, any more than the CentOS (community) board gets to overrule IBM's views on how CentOS should operate. If and when Canonical says 'Ubuntu is doing X' (or 'not doing X'), that's what happens. In a way, there's nothing particularly nefarious about this in the case of Ubuntu; Canonical founded it and has always paid for it and run it, and we've just enjoyed the ride.
Attempts to restrict technology transfer to China could see the RISC-V architecture become more prominent, but also reduce the diversity of development around the platform.
So says analyst firm Counterpoint Research, which on Monday noted that Arm today owns more than a third of the market for semiconductor IP and is well placed as that market enjoys 11 per cent compound annual growth to reach $8.6bn per year by 2025.
But Arm won't have things entirely its own way.
"The rise of RISC-V cannot be ignored," Counterpoint stated. "In fact, RISC-V is now a rising star in the industry, largely due to its open-source advantage, better power consumption performance promise [and] reliable security functions."
The SweRVolf project, a fully open system-on-chip designed as a reference platform for Western Digital's RISC-V SweRV cores, has announced a major new release promising lower barriers to entry for those looking to experiment.
"Western Digital released the first of the SweRV cores, EH1, in 2018," Olof Kindgren, senior digital design engineer at Qamcom and director at the Free and Open Source Silicon (FOSSi) Foundation, told The Register.
"While it was an amazing core, and the fastest 32-bit RISC-V core at least at that time, they were new to the world of open-source silicon and asked me what they should do to make it easier for others to pick it up.
This is a list of GNU/Linux distributions designed to run on smartphones. While many support phones designed to run a mainline Linux kernel including the PinePhone and Librem 5, there are others that are able to run on phones that originally shipped with Android thanks to tools like Halium that allow them to use Linux kernels provided by makers of those Android phones.
Keep in mind that many of the operating systems listed below operating systems are a work in progress and may not be as stable or speedy as Android, may not support all of a phone’s hardware, and may not be able to run as many mobile-friendly applications. But most have at least a working web browser, which enables you to run web applications. Some allow you to run Android apps in a container thanks to tools like Anbox. And many will let you run desktop Linux applications, even if they don’t scale well to phone-sized screens. If you connect a keyboard, mouse, and display, you can even use your phone as a tiny desktop computer.
Jolla this week released Sailfish OS 4.2 "Verla" as the newest version of this Linux-based smartphone operating system that continues to be made commercially available for various devices.
Sailfish OS 4.2 brings with it a new sharing system that is much better designed, refinements to the App Grid, refining the Sailfish OS Calendar App, more polishing to its Mozilla Gecko based web browser, and an assortment of other changes.
GCompris is an educational software suite comprising of numerous activities for children aged 2 to 10. It is intended to become some sort of unified interface to integrate more educational games.
It offers activities dedicated to small children. It teaches letters, numbers, words, basic algebra training, reading time on an analog clock, vector drawing, science, geography and much more. Some of the activities are game orientated, but nonetheless still educational.
It is designed in a way that makes it easy to add new boards.
It takes a community of people with varying skill sets and expertise to build open source software. Leaderboards have become a way for open source communities to track progress and showcase and celebrate top-performing contributors. If leaderboards are done right, they can increase participation, motivate contributors with gamification, and enhance the community. But leaderboards can also have adverse outcomes—including discouraging participation.
The Community Health Analytics Open Source Software (CHAOSS) community, a Linux Foundation project, focuses on bringing standardization to open source project health and metrics. Leaderboards are a topic that keeps coming up during those conversations. Initially, this blog post was a presentation I made for Upstream 2021, the Tidelift event that kicked off Maintainer Week, a weeklong celebration of open source maintainers. This article will explore five best practices to help communities use leaderboards successfully and improve their project health through metrics.
HarmonyOS-based software replaces grab bag of Linux, Unix and Windows systems and promises greater efficiency and safety in mining
Now with nearly three-decades of maturity, the post-object relational database system PostgreSQL is particularly emblematic of an enterprise-wide trend: proven open source data technologies – in their pure open source versions – are increasingly replacing expensive and inflexible proprietary solutions.
Postgres offers some especially enticing advantages for enterprises looking to trim (if not downright slash) costs without impacting database performance. Here’s a half-dozen reasons enterprises should consider the fully open source version of Postgres as a more-than-capable Oracle replacement.
Bilikisu Aderinto, Founder/Organizer of the Abuja R User Group and R-Ladies Abuja, talks about the lack of R User groups in her area, and her desire to start one, leading to a large increase in members in Abuja. She talks about the issues with income disparity and how it affected lockdown attendance for the group. She also talks about training others to increase their knowledge base in the area.
GitLab Inc., which provides a cloud service to enable software developers to share code and collaborate on projects, today announced plans to go public with an initial offering of stock.
The San Francisco-based company, which counts among its competitors Microsoft Corp.-owned GitHub and Atlassian Corp. PLC’s BitBucket, didn’t reveal yet how much it plans to raise or precisely when it will do the IPO. It was last valued at $6 billion after a secondary share sale in January, and has raised a total of $400 million from investors such as Khosla Ventures, Altimeter Capital, TCV, Franklin Templeton and Coatue Management.
I’ve done a couple of posts on LLVM itself, mostly on things you can do with LLVM or how LLVM represents particular program features.
I’ve received some good feedback on these, but I’d like to focus a sub-series of posts on LLVM’s implementation itself: the file formats, parsing strategies, and algorithmic choices underlying LLVM’s public interfaces (APIs, CLIs, and consumable output files). I’ll be writing these posts as I work on a series of pure-Rust libraries for ingesting LLVM’s intermediate representation, with the end goal of being able to perform read-only analyses of programs compiled to LLVM IR in pure Rust.
For those who don’t know what LLVM is, this post has a broader background on LLVM’s components and intermediate representation.
In the last post, I performed a high-level overview of LLVM’s bitcode format (and underlying bitstream container representation). The end result of that post was a release announcement for llvm-bitcursor, which provides the critical first abstraction(s) for a pure-Rust bitcode parser.
This post will be a more concrete walkthrough of the process of parsing actual LLVM bitstreams, motivated by another release announcement: llvm-bitstream.
Put together, the llvm-bitcursor and llvm-bitstream crates get us two thirds-ish of the way to a pure-Rust parser for LLVM IR. The only remaining major component is a “mapper” from the block and record representations in the bitstream to actual IR-level representations (corresponding to llvm::Module, llvm::Function, &c in the official C++ API).
This post marks a turning point: now that we have reasonable abstractions for the bitstream container itself, we can focus on mapping it into a form that resembles LLVM’s IR. We’ll cover some of the critical steps in that process1 below, introducing a new crate (llvm-mapper) in the process.
Also, critically: this post is the first in the series where our approach to parsing and interpreting LLVM’s bitcode differs significantly from how LLVM’s own codebase does things. The details of the post should still be interesting to anyone who wants to learn the details of how an IR-level LLVM module is constructed, but will not reflect how LLVM itself does that construction2.
In this post, I want to look at the biggest strengths and weaknesses of Python, with more emphasis on the weaknesses, just because these problems have been there for years now and some of the rough edges bleed a lot.
The ASEAN economic and free trade bloc has agreed to develop a digital trade pact, and South Korea wants to play.
ASEAN has ten members that collectively have about the same economic heft as the UK or France, and negotiate as one on trade matters with other blocs like the European Union. Bloc members Indonesia, Vietnam, and the Philippines are seen as likely to grow very quickly in coming years, making ASEAN of considerable importance to global trade and diplomacy.
Even Sinclair’s so-called failures reveal an inventor who sought to solve everyday problems rather than amass a personal fortune. And many were prescient. Anticipating electrified personal transportation, Sinclair developed an electric car, then an electric bike – long before the vogue they both enjoy today.
These later inventions may have been a business failure, but they were a triumph of the will and the imagination. Sinclair long ago secured his legacy as the “father of the home computer”, but time is only now vindicating his other creations. Now, at least, we have the chance to catch up.
The “devious licks” challenge taking over TikTok is running rampant through Michigan schools, encouraging students to steal and angering administrators.
Students in middle and high schools across the nation are stealing everything from soap dispensers to bathroom stall doors to shelves of COVID-19 tests to entire toilets, and documenting the entire thing on TikTok.
Schools have become targets for mass abductions for ransom in northern Nigeria by armed groups. Such kidnappings in Nigeria were first carried out by jihadist group Boko Haram then later its offshoot Islamic State West Africa Province, but the tactic has now been adopted by criminal gangs.
Occupational diseases and accidents cause the death of 1.9 million people every year, and in more than a third of the cases the death is linked to long working hours, warns a joint study by the World Health Organization (WHO) and the International Labor Organization (ILO).
An investigation is under way to find the source of the infection and restrictions on the movement of cattle on the farm have been put in place.
In the youth mode, under-14 users can only access the app for up to 40 minutes a day, and only between 6am and 10pm, Douyin, owned by Beijing-based ByteDance, said in a statement.
The sources believe that the sanctions could be implemented as early as next week by the U.S. Treasury Department. The sanctions are expected to be imposed on “specific targets” rather than the entire cryptocurrency ecosystem. Additionally, the Treasury Department is reportedly preparing to release new guidance that will warn businesses they could face fines and other penalties over involvement in ransomware payments.
The Treasury Department plans to impose the sanctions as soon as next week, the people said, and will issue fresh guidance to businesses on the risks associated with facilitating ransomware payments, including fines and other penalties. Later this year, expected new anti-money-laundering and terror-finance rules will seek to limit the use of cryptocurrency as a payment mechanism in ransomware attacks and other illicit activities.
The actions collectively would represent the most significant attempt yet by the Biden administration to undercut the digital finance ecosystem of traders, exchanges and other elements that cybersecurity experts say has allowed debilitating ransomware attacks to flourish in recent years.
What makes the problem worse is that Windows is reporting different types of errors to each user, making it a bit harder to see what's going on. BleepingComputer said that one source is seeing a 4098 Warning in the application event logs, while another said that their printer port tabs were all blank. One source couldn't even get access to their network printers at all, seeing "access denied" errors instead.
An average Mexican professional has to work almost 50 days to afford the latest edition of Apple’s iPhone, an analysis by an international e-commerce platform found.
The source of at least some of these uploads is a company called Laserfiche, according to Edwards. Laserfiche is a government software provider that makes content management systems. The company has contracts with the Army, the Navy, the FBI, and more, according to public procurement records.
The flaws were reported Tuesday by cloud security vendor Wiz, which previously disclosed the ChaosDB Azure vulnerability last month. At the center is Open Management Infrastructure (OMI), an open source software sponsored by Microsoft that Wiz researcher Nir Ohfeld described in a blog post as essentially "Windows Management Infrastructure (WMI) for Unix/Linux systems."
It is worth noting that Wiz was able to dig a total of four security vulnerabilities in the OMI project of Microsoft. The security company dubbed these flaws as OMIGOD to give it a catchy nickname.
For its September Patch Tuesday, Microsoft churned out fixes for 66 vulnerabilities alongside 20 Chromium security bugs in Microsoft Edge.
As we’ve previously explained, the draft Bill includes provisions which will mandate age verification or age assurance processes onto all sites, services, or applications offering user-to-user content or communication which can be accessed in the UK. This will mean age checks on sites and services with user-to-user content or communication across the board, meaning all content, all sites, all services, and all users, all the time, regardless of scope, risk, or proportionality, excepting sites which are deemed ‘child safe’.
You will need to do this not to shield children from subjectively harmful content, but to achieve your compliance requirements; and as the Bill has been drafted, you will be compelled to do this at the risks of penalties, sanctions, and even the threat of personal arrests.
Changes Facebook instituted in 2018 to turn down the dial on contentious politics in people's feeds had the opposite effect, driving extreme views instead.
The pilot is in Brazil and they say the feedback they get will determine the next steps with the feature. I foresee the feature being popular enough to get a worldwide release before the end of 2022. That’s quick for WhatsApp.
WhatsApp is trying to help us sort the businesses that are on WhatsApp by category and alphabetically. Exactly like how the yellow pages were.
Making money on YouTube generally comes in two ways; Google AdSense revenue, or branded/sponsored content. “It’s algorithmic, or certain brands will sponsor you to make a video for them that you post on your channel,” Broski explains.
Chinese technology firms have been peddling “safe city” and “smart city” packages of technology in Africa for years. Suites of interconnected products and services include surveillance equipment, communications tools and digital municipal management systems.
Billed as public safety tools, the programs are increasingly used to control the population and crack down on dissent.
Beijing-based ByteDance reportedly intends to launch the music streaming app – tentatively called Feilo and referred to as Luna internally – in China sometime later this year, according to Google’s translation of a Mandarin-language report from 36Kr (NASDAQ: KRKR).
The concise report also notes that ByteDance’s streaming service will utilize a tried-and-proven algorithm from the outset in an effort to reach consumers, while the initially mentioned “invalidation of Tencent’s exclusive copyright may bring new opportunities” as ByteDance looks to “develop its domestic music business.”
The Smart Voting app was designed to identify candidates most likely to beat members of the government-backed party, United Russia, as part of a broader strategy organized by supporters of the imprisoned Russian activist Alexei Navalny to bring together voters who oppose Putin. In a bid to clamp down on the opposition effort, the Russian government told Google and Apple that the app was illegal, and reportedly threatened to arrest employees of both companies in the country.
Documents filed by the US Justice Department on Tuesday detail how the sale was facilitated by a group of American mercenaries working for Abu Dhabi, without legal permission from Washington to do so. But the case documents do not reveal who sold the powerful iPhone exploit to the Emiratis.
In this era of hacking, identity theft, data privacy violations, and Facebook watching your every move, the best browser for privacy can be your greatest weapon. The internet can be the place to be completely anonymous, but it’s also where you can be the most vulnerable.
Data is one of the most monetized assets right now. And where do you get most of the people’s data? On the internet— unguarded and sometimes given voluntarily. Google Chrome is one of the major tech companies that sell their user’s data, and it’s the most used browser in the world.
So, if you want to keep your data private and still want to continue your internet browsing, it’s time to make the move, and choose a secure browser. In this quick guide, we have compiled the best browsers for privacy that are perfect Google Chrome alternatives.
The Go standard library provides crypto/tls, a robust implementation of Transport Layer Security (TLS), the most important security protocol on the Internet, and the fundamental component of HTTPS. In Go 1.17 we made its configuration easier, more secure, and more efficient by automating the priority order of cipher suites.
In the dangerous Trump era, the Pentagon pronounced that "There is no higher priority for national defense" than to "replace [the country's] strategic nuclear triad and sustain the warheads it carries." The estimated cost for upgrading the entire U.S. nuclear arsenal and replacing all its nuclear warhead delivery systems—intercontinental ballistic missiles, submarines capable of launching ballistic missiles, and long-range bombers—was $1.7 billion. Trump's Nuclear Posture Review, the guidelines for nuclear war fighting, and maintenance and acquisition of the weapons required for genocidal or omnicidal war, reaffirmed the country's first-strike nuclear war fighting doctrine, and it increased U.S. reliance on nuclear weapons. This included their possible use in response to cyber and other high-tech attacks on U.S. infrastructure.
Under an executive order from President Joe Biden, the FBI declassified an FBI report on Saturday—the twentieth anniversary of the 9/11 terrorist attacks—showing that there were links between former representatives of the Saudi Arabian government and the hijackers.
On March 22, 2016 two suicide bombers blew themselves up in Brussels international airport and a third in a crowded Metro station in Brussels.
Investigators linked the gang that carried out the attacks in Belgium to the earlier attacks in Paris in November 2015, which killed 130 people.
The biggest trial in modern French history began on September 8, with 20 suspects charged in the November 2015 Paris attacks in which 130 people were killed and hundreds more injured. The court will hear from more than 300 witnesses over a period of nine months. Twenty individuals stand accused, including Salah Abdeslam, the only survivor of the commando team masterminded by the Islamic State group.
Peter Frisch, the former head of the German Bureau for the Protection of the Constitution (Germany's internal secret service), will say, “We didn't have the people to do surveillance, nor did we know we should.” Hamburg - and Germany as a whole - was a risk-free environment for Islamic terrorists. German officials, mindful of the Nazi past, will say they were reluctant to target mosques and risk accusations of racism and Islamophobia.
Increasing numbers of children are being killed or targeted for recruitment by armed groups in conflicts raging at Niger’s borders with Mali and Burkina Faso, Amnesty International said in a new report published today (13 September).
The 57-page report, ‘I Have Nothing Left Except Myself’: The Worsening Impact on Children of Conflict in the Tillabéri Region of Niger, documents the devastating impact on children of the conflict, involving armed groups Islamic State in the Greater Sahara (ISGS) and the al-Qaida-affiliated Jama’at Nusrat al-Islam wal-Muslimin (JNIM).
But everything went wrong when he denounced the spread of political Islam in the town a few weeks after the murder of Samuel Paty. The teacher who denounced a problem got into trouble himself […].
Le Point: Why did you want to return to this topic?
Didier Lemaire: I wanted to write a book of testimonies. I was a philosophy teacher in Trappes and gradually became aware of a rise in Islamism in my high school in connection with attacks. I noticed that my relationship with the students was changing, as was their relationship with the subject of philosophy. I found myself in a situation where it had become very difficult to teach philosophy in lessons.
ICNA or the Islamic Circle of North America is the American arm of South Asian Islamist group Jamaat-e-Islami (JI), a body openly sympathetic to the Taliban and al-Qaeda. For 30-plus years, ICNA has harbored JI death squad leader Ashrafuz Zaman Khan, placing him in ICNA’s top leadership. ICNA has collaborated with and has promoted Falah-e-Insaniat Foundation (FIF), a US and Pakistan-banned front for Lashkar-e-Taiba (LeT). In August 2006, ICNA was a partner and top donor to JI’s Al-Khidmat Foundation (AKF), at the same time AKF took a delegation to Syria to hand-deliver $100,000 to then-Hamas leader Khaled Mashal for violence against Israel.
The dive to the wreck site will last approximately 10 days. A total of 46 people will take part in the expedition, including 18 ship crew members and six media representatives.
Kurm has identified seven questions that the organizers want to get answers to during the expedition and subsequent analysis.
Materials gathered in the course of the investigation project will be analyzed by dr. Andrzej Jasionowski, who has previous experience with the disaster. In 2005-2008 he was a member of a scientific consortium that conducted studies for the Swedish government.
Scientific analysis should be ready by next spring.
A failure to slash global emissions is setting the world on a "catastrophic" path to 2.7 degrees Celsius heating, UN chief Antonio Guterres warned Friday just weeks before crunch climate talks.
The sixth report from the Intergovernmental Panel on Climate Change confirms yet again that we are rapidly destabilizing the climate and making the earth a more dangerous and biologically impoverished planet. No surprise; we've known this since the 1970s. The primary cause of the worsening situation, however, is not the combustion of fossil fuels, but the massive political dereliction that has allowed the bonfire to go on after we knew that it posed a potentially lethal threat to humankind. We have no precedent for malfeasance at this scale therefore we have no law, no accountability—and so far—no remedy.
IUU fishing costs West African nations $2.3 billion each year, according to the United Nations. The practice also destroys ecosystems and has been linked to other crimes such as piracy, kidnapping and drug trafficking. China is the world’s worst fishing offender, according to the IUU Fishing Index, and has targeted West Africa for years.
Despite the consequences of IUU fishing, many West African nations do not require that fishing vessels use an AIS, according to Peter Hammarstedt, director of campaigns for Sea Shepherd Global, which helps several West African countries combat illegal fishing.
Driving the news: For the report, 113 countries, including the United States, submitted new pledges that would add up to a 12% decline in emissions by 2030 compared with 2020 levels.
But dozens of countries, including China, India and Saudi Arabia, didn't make any new formal commitments.
France on Friday celebrated four decades of flying across the countryside on ultrafast TGV trains, while getting a glimpse of the next-generation locomotives set to hit the rails in 2024.
In Silverthorne, Colo., as her herd of goats graze along a bucolic hillside, Lani Malmberg wonders how much more the land can take. In 2020, Colorado experienced the largest three wildfires in its history.
The Bend area has experienced a population boom, putting more demands on the water supply. The illegal grows are making things worse.
In La Pine, south of Bend, Rodger Jincks watched a crew drill a new well on his property. The first sign that his existing well was failing came when the pressure dropped as he watered his tiny front lawn. Driller Shane Harris estimated the water table is dropping 6 inches (15 centimeters) per year.
The world economy faces serious risks going forward: for example, an estimated $2.3 trillion in income is projected to be lost in 2022–25 due to vaccine inequity—most of it in developing countries.
After high-profile Democrats expressed support for Canadian Prime Minister Justin Trudeau and his Liberal Party ahead of the country's federal election on Monday, U.S. Sen. Bernie Sanders and Rep. Rashida Tlaib endorsed the New Democratic Party, led by Jagmeet Singh.
"There's one party that stood up for working people in the pandemic. One leader who has the courage to make the wealthy pay their fair share so everyone gets the medication they need," Sanders (I-Vt.) tweeted Friday, explaining his support for Singh and the NDP.
In response to the censorship of its digital content project “Redfish,” the television network Russia Today (RT) asked the authorities of its country to monitor more carefully the actions of Facebook.
This week, this California-based company suspended Redfish's account on Instagram. Given that this action was arbitrary, RT asked the Russian media regulator Roskomnadzor (RKN) and the Prosecutor General’s Office to take the pertinent measures in this type of case.
Mobile app store metrics from NetBlocks confirm the removal of a popular opposition election tracking app from the Apple App Store and Google Play Store. The incident comes as Russia holds parliamentary elections from 17 to 19 September 2021.
This morning in Russia, as polls opened for three days of voting to elect a new parliament, Apple and Google submitted to an escalating pressure campaign by the Russian government and deleted opposition leader Alexei Navalny’s app from their respective app stores. Their decisions come after months of government efforts to suppress Navalny’s Smart Voting project, which published a voter guide available through the app. The Russian government has reacted to this voter guide as if facing a serious national security threat—a reaction that has stirred international controversy. The furious (and ultimately successful) efforts to suppress this voter guide not only demonstrate the Russian government’s determination to assert broad control over both the outcome of Russian elections and the information Russian citizens can access online, but also how the underlying dynamics of Russia’s censorship agenda can become an international problem, forcing companies based outside its borders into complicity with domestic repression.
Popular messaging app Telegram is suspending all chat bots used in the Russian elections campaign, in another blow to jailed opposition politician Aleksei Navalny’s Smart Voting initiative after Apple and Google removed the election-guide app from their stores.
Telegram founder Pavel Durov announced late on September 17 that the service would abide by Russia’s “election silence,” a law practiced in other countries that prohibits campaigning during the elections.
The program, referred to as "cross check" or "XCheck," shields millions of elite users from rules that Facebook claims to apply equally at the social network, according to a report citing internal documents.
For the party’s poor and working-class supporters, the Socialists explained why their lives were often-dispiriting trials of toil, hardship, and humiliation. The problem, according to the party, was the despotism of capitalism: the system turned workers into bosses’ underlings — forced to work or starve — and made the political arena a fetid square of ravenous corporations and bought-and-paid-for politicians. They proposed an array of immediate reforms (from the eight-hour-day and unemployment insurance to public ownership of major industries and equal voting rights for African Americans and women), while advocating, in the long term, a “cooperative commonwealth,” where the economy would be democratically controlled and the political system would be rid of plutocrats.
Freedom was central to that vision. “As long as he owns your tools he owns your job,” Debs told a labor convention in 1908, referring to employers: [...]
Noam Chomsky talks to Jacobin about why the US withdrawal from Afghanistan won’t change US imperialism, the many war crimes of George W. Bush, and why he still believes in average people’s ability to push back against the war machine.
As it has been drafted, the Bill gives sweeping powers to the Secretary of State for Digital, Culture, Media, and Sport, and potentially to the Home Secretary, to make unilateral decisions, at any time they please, as to what forms of subjectively harmful content must be brought into the scope of the bill’s content moderation requirements. Shockingly, it allows them to make those decisions for political reasons.
The BBC spoke with six singers who crossed the border to Pakistan illegally and are now living in hiding. One said he feared he would be executed if he stayed in Afghanistan.
The Taliban have banned music and are accused of executing a folk singer in northern Baghlan province in August.
On November 2, Egyptian investigative journalist Hossam Bahgat is set to go on trial over a tweet. In the December 2020 post on Twitter–where he has more than 260,000 followers–Bahgat, who is also the executive director and founder of local rights group the Egyptian Initiative for Personal Rights, criticized the former president of the National Election Authority, Lashin Ibrahim, for alleged corruption during the country’s 2020 parliamentary elections.
Seven months later, the state prosecutor’s office summoned him for interrogation based on a complaint about the tweet by the acting president of the election authority and charged the journalist with insulting the National Election Authority, spreading false news on electoral fraud that undermines public interest, and misusing social media.
Mere minutes before midnight on September 18 when the new policy he was announcing would take effect, Telegram founder Pavel Durov published a statement on his personal channel explaining that the network would begin blocking bots “involved in campaigning” in accordance with Russia’s “election silence” law. His announcement did not begin with this information; Durov spent the first three paragraphs of his message berating Apple and Google for bowing to Russia’s censorship demands. “It’s a dangerous precedent,” he said, referring to the two American companies’ decisions to disable access inside Russia to the Navalny app on their respective app stores. “I’ve written many times that the Apple and Google oligopoly poses a threat to free speech.” After these condemnations and praise for Telegram as “still the freest platform on the Web,” Durov got to the core of his announcement. Meduza explains what’s wrong with his explanation.
The Wikimedia Foundation has revealed efforts to gather personal information on some Chinese Wikipedia editors by entities opposed to their activities on the platform and likely to threaten the targets' privacy or well-being.
The foundation's response has been to ban seven users in mainland China, cancel sysop privileges for another dozen, and warn plenty more Wikipedia editors to modify their behaviour.
Of the dozen journalists arrested in September 2001, only three are believed to be still alive in the prisons where they are held incommunicado. At least 11 journalists in all are currently imprisoned in Eritrea without access to lawyers and without any plans for trials. Some of them are probably held in Eiraeiro, a detention centre built specially for prisoners of opinion. This chilling message is inscribed above the room where they are interrogated: “If you don’t like the message, kill the messenger.”
“Twenty years after the dictatorship was imposed, Eritrea is still a news and information desert in which journalists are systematically arrested, tortured and forced to go into hiding or flee the country,” said Arnaud Froger, the head of RSF’s Africa desk. “This dramatic situation, which is almost unique in the world, is the result of a policy of constant predation that tramples on the most elementary human dignity. We urge Eritrea’s partner countries to step up pressure on its government to free the journalists it is holding in the most atrocious conditions and to quickly provide proof that those held incommunicado for the past two decades are still alive.”
On August 28, demonstrators protesting the government’s measures to curb COVID-19 in Scarborough, a resort town on England’s North Sea coast, surrounded and threatened Norton, a reporter for public broadcaster BBC, his cameraman, and a site producer, the journalist told CPJ via messaging app and local news site Yorkshire Live reported. CPJ was unable to determine the name of the cameraman or the site producer.
“Anyone who says we are not doing our job is obviously not watching our TV stations and programs,” says Saad Mohseni, head of the Moby media group, which includes the 24-hour Tolo News channel. “But for how long? I’m not sure,” says Mr. Mohseni, contacted in London. Tolo News notes that 153 local media organizations have shut down across Afghanistan in the past month.
“I don’t want to get too optimistic, because I know things can change quickly,” Mr. Mohseni says. “And I don’t want to be too pessimistic, because so far [the Taliban] have given us enough freedom for us to be able to continue with our work.
“It’s not even a day-to-day proposition,” he says. “It’s an hour-by-hour proposition.”
A version of this essay was presented to an online Diversity & Inclusion gathering on August 12, 2021
Advocates for reproductive freedom and LGTBQ+ equality on Saturday pointed to a legal brief filed in a U.S. Supreme Court case that could soon overturn Roe v. Wade as a crucial example of the broader goals of those fighting to end abortion rights across the United States.
"ALL anti-LGBTQ and anti-choice views stem from the same desire to control bodies."—Zack Ford, Alliance for Justice
Still under fire from human rights advocates after appealing a court order to stop using the Covid-19 pandemic as justifation for expelling asylum-seeking families, the Biden administration on Saturday confirmed that it is ramping up deportations to Haiti and elsewhere.
"It's time to immediately stop all deportation and expulsion flights to Haiti. And to—finally—commit to a welcoming and fair approach at the border."—Clara Long, HRW
Teamsters Local Union 362 said Tuesday it has filed for a unionization vote at the Amazon warehouse in Nisku, Alta., just south of Edmonton. The Alberta Labour Relations Board must verify the application before a date is set, but the union expects a vote before the end of the year.
Melo eventually decided to report what happened to the authorities, but her attempts only drew derision from an official who said that she since she was not drugged or raped, there was no crime. That was when she realized that things needed to change. She began compiling testimony from other victims of revenge porn and founded the National Front for Sorority to prevent abuse and support victims.
In a courtroom hearing Thursday, the government disclosed for the first time publicly that female physicians in California and Illinois also were performing the procedures on minor girls who belonged to their small Indian Muslim sect, known as the Dawoodi Bohras. They also alleged that Nagarwala — the lead defendant in Detroit's historic female genital mutilation case — traveled to the Washington D.C. area to perform genital mutilation on as many as five minor girls there.
As Department of Justice attorney Amy Markopoulos told a judge, these doctors "were in demand."
The International Society for Civil Liberties & the Rule of Law (Intersociety), a nonprofit based out of Nigeria, released a report in August stating that that 43,000 Christians were killed by Nigerian Islamic radicals in the last 12 years. 18,500 Christians have permanently disappeared, 17,500 churches have been attacked, 10 million Christians have been uprooted and about 2,000 Christian schools have been attacked.
In 2020, a Christian auto-rickshaw driver named Nasir was beaten and falsely accused of terrorism after he was told he could not pick up passengers from a local medical clinic. Although he enjoyed his driving business, Nasir explained that he “was often teased, discriminated against, and abused by Muslim drivers at the pickup point in front of a medical clinic.”
Thirty years ago, MIT professor Tim Berners-Lee invented the World Wide Web and altered the course of human history. Now, in the face of misinformation, malicious behavior, and the exploitation of personal data online, he’s determined to slay the beast it has become.
South Korea's Fair Trade Commission has fined Google ââ©207 billion (US$177M) for abusing its market dominance in mobile operating systems by prohibiting forks of Android.
As explained in an announcement, the Commission took exception to Google's practice of requiring companies that sought early access to information about forthcoming Android releases – essential info for handset-makers – to sign an anti-fragmentation agreement (AFA) that prohibited them from forking Android.
On May 28th, Junior Party the Broad Institute, Harvard University, and MIT (collectively, "Broad") filed its Substantive Preliminary Motion No. 3 in CRISPR Interference No. 106,126 (where ToolGen is the Senior Party). This motion, pursuant to 37 C.F.R. ۤۤ 41.121(a)(1)(iii) and 41.208(a)(1) requested that the Board de-designate Broad claims in these five categories as not corresponding to either Count 1 or proposed Count 2 (A-E) or Count 1 (F)...
On May 28th, Junior Party the Broad Institute, Harvard University and MIT (collectively, "Broad") filed its Contingent Preliminary Motion No. 2 in CRISPR Interference No. 106,126 (where ToolGen is the Senior Party), pursuant to 37 C.F.R. ۤۤ 41.121(a)(1)(i) and 41.208(a)(2) and Standing Order ("SO") 203.2. This motion is contingent on the Board's grant of Broad's Substantive Preliminary Motion No. 1. In that motion, Broad asked the Board to substitute (in part) a new Count No. 2 in place of Count 1 in the '126 Interference as instituted (see "Broad Files Substantive Preliminary Motion No. 1 in CRISPR Interference").
As some readers may recall, the increasing efficacy and ubiquity of artificial intelligence has instigated philosophical and legal debate concerning whether an artificial intelligence may itself be considered the inventor of an innovation it has generated. Granting a machine the status of an inventor would deviate from the traditional view that only a human being may be an inventor. The United States Patent and Trademark Office (USPTO) requested comment on various issues concerning patents of “AI inventions,” whether directed to or created using artificial intelligence. Among the questions the USPTO solicited was:
Expert evidence is key to a UK patent case. Ordinarily the role of an expert witness is to provide an independent, impartial and objective opinion on technical matters within their expertise, with the dual objective of helping the court understand the technical issues and to educate the court as to what people working in the relevant field were doing and thinking at the relevant time (usually the priority date of the patent in suit, which may be many years prior to the litigation). However, the nature of a typical patent action means that the expert will also likely be required to consider concepts from patent law that are unlikely to be familiar, such as the identity of the skilled person, the state of the common general knowledge, and the legal tests for obviousness and sufficiency (although ultimately these are matters for the court to decide). As Mr Justice Arnold (as he then was) put it in MedImmune Ltd v Novartis Pharmaceuticals UK Ltd & Anor[1]:
The Senate and the FDA are appealing to the U.S. Patent and Trademark Office (USPTO) to examine how it can limit the ability of pharmaceutical companies to leverage patent strategies to extend their drug monopolies. In separate letters last week to the USPTO, FDA acting Commissioner Janet Woodcock, M.D., and Sens. Patrick Leahy, D-Vermont, and Thom Tillis, R-North Carolina, of the Senate Judiciary Intellectual Property Subcommittee provided (PDF) suggestions on how the organization can better screen patent applications. (Dunleavy, 9/14)
Earlier this month, the U.S. District Court for the Eastern District of Virginia issued the first court opinion in this country addressing whether an AI system can be named as an inventor on a patent.[1]
Consistent with decisions from the U.S. Patent and Trademark Office, as well as the European Patent Office, or EPO, and U.K. Intellectual Property Office, or IPO, the court in Thaler v. Iancu found that an AI system cannot be named as an inventor on a patent, holding that an inventor must be a natural person.
Sept 16, 2021 is the 10 year anniversary of enactment of the Leahy-Smith America Invents Act of 2011. I’ve got a quick anonymous survey below (5 minutes) on the impact.
The patent system has seen tremendous change over the past decade. A large part of the transformation stemmed from the Leahy-Smith America Invents Act of 2011 that was enacted ten years ago in September 2011. Earlier this week, I conducted a quick survey of Patently-O readers asking for their thoughts on the impact of the AIA, which has repeatedly been heralded as the largest change to the U.S. patent system since the Patent Act of 1952. We have about 600 responses.
[...]
The survey included an open-ended response block asking “What else do you have to say about the impact of the AIA?” About 1/3 of responses included these additional thoughts. My survey tool (Qualtrics) used semantic analysis on these responses and reports that the sentiment expressed was most often generally either “negative” or “very negative.” (65% Negative or Very Negative; 25% Mixed; 10% Positive or Very Positive).
Some comments focused on the AIA coupled with Eligibility Decisions have “decimated the patent system”; “Devalued IP”; and “greatly reduced the value of U.S. patents” all “to the benefit of large enterprises.” ” A real mess.”
In April Enrico Bonadio, Luke McDonagh and Francesco Chierichetti reported in this blog four decisions in Italian SEP-related litigations. Since then, thanks to further research and inputs from friends and colleagues, we have come across some other unpublished decisions, which we want to highlight here.
Instagram deleted the account of an artist producing work critical of Solo Cup Company, maker of the iconic, disposable red cup.
“My intent was just to talk about paper plates,” artist Christopher Locke told Motherboard. Now his account, his followers, and years of conversations with fellow artists are gone. (disclosure: Motherboard has commissioned two pieces from Locke in 2019.
YouTubers operating in the free TV/streaming niche are becoming pretty frustrated by the community policies, which are designed to prevent piracy instruction videos from appearing on the platform. The users claim that YouTube is becoming increasingly unfair with demonetizations but the cold hard truth is very straightforward - abide by the rules or publish elsewhere.
Based in: Rome, Italy
Based in: Minneapolis, U.S.
Based in: India
Based in: Eugene, Oregon, United States