Bonum Certa Men Certa

Links 14/10/2021: DragonFly 6.0.1 Released and Red Hat Loses Another Top Executive



  • GNU/Linux

    • Desktop/Laptop

      • What is the Linux Operating System?

        The Linux kernel is the main component of the Linux operating system. In general terms, the kernel is a software code that serves as a layer between the hardware and main programs that run on a computer. It was created by Linus Torvalds back in the early 1990s in Finland and licensed under the GNU General Public License (GPL). In other words, Torvalds was made the Linux kernel available to the world for free. There is an official website for the Linux kernel.

        The rest of the system consists of other programs, many of which were written by or for the GNU Project. These utilities were then added to the Linux kernel to create a complete system. The kernel is an essential part of an operating system, but useless by itself, because the Linux kernel alone does not form a working operating system. It can only function in the context of a complete operating system.

        The Linux kernel is used by Linux distributions alongside GNU tools and libraries that interact with it. This combination is sometimes referred to as GNU/Linux.

        So Linux is just a kernel, but the term Linux is far more commonly used by the public and media and that it serves as a generic term for systems that combine that kernel with software from multiple other sources. Therefore when most people say Linux, they’re really talking about a combination of the Linux kernel plus a lot of tools and libraries from the GNU Project.

        To put it more clearly, Linux and GNU/Linux refer to the same operating system and software. There is still a controversy over which term is more appropriate.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.14.12
        I'm announcing the release of the 5.14.12 kernel.
        
        

        All users of the 5.14 kernel series must upgrade.

        The updated 5.14.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.14.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

        thanks,

        greg k-h
      • Linux 5.10.73
      • Linux 5.4.153
      • Linux 4.19.211
      • Moving Google toward the mainline [LWN.net]

        Two Google engineers came to Open Source Summit North America 2021 to talk about a project to change the way the company creates and maintains the kernel it runs in its data centers on its production systems. Andrew Delgadillo and Dylan Hatch described the current production kernel (Prodkernel) and the problems that occur because it is so far from the mainline. Project Icebreaker is an effort to change that and to provide a near-mainline kernel for development and testing within Google; the talk looked at the project, its risks, its current status, and its plans.

      • User-space interrupts [LWN.net]

        The term "interrupt" brings to mind a signal that originates in the hardware and which is handled in the kernel; even software interrupts are a kernel concept. But there is, it seems, a use case for enabling user-space processes to send interrupts directly to each other. An upcoming Intel processor generation includes support for this capability; at the 2021 Linux Plumbers Conference, Sohil Mehta ran a Kernel-Summit session on how Linux might support that feature.

      • How Red Hat uses GitLab for kernel development [LWN.net]

        Much of the free-software development world has adopted Git forges (such as GitHub, GitLab, or sourcehut) with enthusiasm. The kernel community has not. Reasons for that reticence vary, but one that is often heard is that these forges simply don't work well at the scale needed for the kernel project. At a Kernel-Summit session during the 2021 Linux Plumbers conference, Donald Zickus and Prarit Bhargava sought to show how Red Hat has put GitLab to good use to support its kernel team. Not only can these forges work for kernel development, they said, but moving to a forge can bring a number of advantages.

      • How Windows NTFS finally made it into Linux ● The Register

        Love it or hate it, Linux users in a Windows world must deal with Microsoft's New Technology File System (NTFS). This has always been a pain in the rump. Even after Microsoft finally gave up on its anti-Linux rhetoric and released its patents to the open-source community and expressively opened up its exFAT patents, we still couldn't get into NTFS.

        Things have changed. Starting with the Linux 5.15 kernel, NTFS is finally being fully supported in Linux. This journey hasn't been easy.

        Microsoft introduced NTFS, a proprietary – naturally – journaling file system in Windows NT 3.1 in 1993. From there, it replaced 1977's File Allocation Table (FAT) file system across Windows.

      • Rolling stable kernels [Ed: Microsoft wants Linux to become unstable like Windows]

        [Microsoft's] Sasha Levin, one of the maintainers of the stable kernels, gave a presentation at Open Source Summit North America 2021 on a proposal for a different way to handle the stable tree. He noted that throughout most of the kernel's history, version numbers did not really mean anything, but that the versioning scheme suggests that they do, which leads to a disconnect between how the kernels are seen versus how they are actually maintained. He proposed making a "rolling stable" release that provides users what they need—timely fixes to their kernel—without forcing them to choose to switch to a new version number.

      • Graphics Stack

    • Applications

      • 5 markdown editors I recommend trying

        You can use markdown for anything—formatting websites, authoring books, and writing technical documentation are just some of its uses. I love how easy it is to create rich documents. Everyone has their favorite markdown editor. I have used several on my markdown journey. Here are five markdown editors I have considered.

    • Instructionals/Technical

      • Reasons to limit your stack size even in non-threaded environments

        One reaction to learning that 4BSD is where Unix started to have a stack size limit is to ask why you would bother with a stack size limit at all in an environment without threads (where a process will thus only ever have one stack). There are a number of reasons that operating systems have generally done this, and probably why it starts in Unix in the 4BSD line, which ran on 32-bit VAX systems instead of the 16-bit PDP-11s that V7 did.

      • An UPDATE without a WHERE, or something close to it

        Imagine what happens when you forget the WHERE. It's the last thing on the line as shown, so you could send off the command early and it would totally work. It would look like this: [...]

      • How to Clone a Git Repository Into a Specific Folder – TecAdmin

        The process of git repository cloning is initiated on a daily basis in the DevOps world. But, if you simply issue a git clone command, the cloning process will create a new directory for the repository. In this tutorial, we will help you learn how to clone a git repository into a specific folder.

      • How to Download and Upload Remote Directory in sFTP

        sFTP or Secure File Transfer Protocol is a convenient upgrade from the traditional FTP (File Transfer Protocol). The sFTP program boasts of improved security layers since it mirrors encrypted SSH transport protocols in its file transfer operations.

      • How to Install Redis & Configure on AlmaLinux 8 - LinuxCapable

        Redis is an open-source (BSD licensed), in-memory key-value data structure store used as a database, cache, and message broker. Redis supports data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperlog logs, geospatial indexes, and streams. Redis also provides high availability with Redis Sentinel software logic, creating automatic partitioning across Redis nodes with Redis Cluster.

        At the end of the guide, you will know how to install and configure Redis on your AlmaLinux operating system.

      • How to Install Redis on Rocky Linux 8 or AlmaLinux 8

        Redis is a popular in-memory key-value store that can be used as a NoSQL key-value database, message broker as well as a caching solution. It is renowned for its flexibility, scalability, seamless replication, simplicity, and ease of use. Redis is widely used in various fields such as machine learning, real-time analytics, chat, messaging, and gaming leaderboards.

        On its own, Redis has no robust features, however, you can still tweak Redis to provide added security and ward off unauthorized users.

      • GNU Linux – network config madness – the (ever changing) basics – how to (try to) set fixed & dynamic ip & dns per interface
      • How to Install Telegram on Linux Mint 20

        Telegram is a popular free cross-platform, cloud-based instant messaging system. Telegram is famous for providing end-to-end encrypted video calling, VoIP, file sharing, amongst many other features. One of the main attractions of Telegram, it is unique in having no ties or shared interests with the big social media giants such as Facebook or Twitter. The application is also cross-platform, with versions of the app available for most operating systems for desktops and mobile/tablet devices.

        In the following tutorial, you will learn how to install the Telegram client on Linux Mint.

      • Toggle Light & Dark Mode for Flatpak Apps in Ubuntu 20.04+ / Linux Mint | UbuntuHandbook

        Using Flatpak apps in Linux? You may found that Flatpak app appearance does not change when toggling light & dark mode or switching to another app theme.

        As more and more apps publish Linux packages via Flatpak, I have a few of them installed in my Ubuntu laptop. However, the apps stick to the light theme whenever I switches to dark mode in Appearance settings.

        Since Flatpak runs in sandbox and does not have permission to access the “/usr” directory, it does not use system theme according to the document. So, some popular GTK themes are packaged as Flatpaks. And, it detects the current system app theme and tries to install the Flatpak version of the theme if available during app installation or update.

        I’m working with default Yaru theme in the most time, so it automatically installs Yaru theme flatpak package but leaves Yaru Dark not installed. When I switching to Yaru Dark, it can’t find the match theme so falls back to the default Adwaita.

      • How to connect Rocky Linux 8 via Windows RDP protocol - Linux Shout

        f you have Rocky Linux 8 desktop and Windows 7/10/11 in a local environment and want to access using the RDP- Remote desktop protocol, then here is the way.

        To connect Linux operating systems such as Rocky Linux, AlmaLinux 8, or CentOS, we can use the open-source implementation of Remote desktop protocol called XRDP. RDP is developed by Microsoft and has been an integral part of Windows operating systems. It allows the users to remotely control and use the GUI desktop systems just like a local one. Although, Windows can be operated over this protocol out of the box, for Linux we need to install some additional packages. Here we learn how to set up a remote desktop connect to Rocky Linux 8.

      • Automatically reassign your default printer - Fedora Magazine

        I run Linux,…or does it run me? Some computing paradigms are so ubiquitous, so ingrained, we rarely stop to think that things could work another way. When such a realization comes, we can exercise our freedom – one of Fedora’s four foundations – to improve the user experience. For that sentiment to be more than cliché, I needed to re-imagine the idea of the default printer and how it gets set. This article presents that implementation.

      • How to install Ubuntu on VirtualBox (Windows) [Ed: A lot better than WSL]
      • Proxmox VE Full Course: Class 12 - The Command-Line Interface - Invidious

        LearnLinuxTV's Proxmox full course aims to get you up to speed with all the finer points of Proxmox Virtual Environment. In video #12, we take a look at the Command-Line interface.

      • [Older] Permanently add a directory to shell PATH

        When you type a command into a Linux terminal, what’s really happening is that a program is being executed. Normally, to execute a custom program or script, we need to use its full path, such as /path/to/script.sh or just ./script.sh if we’re already in its residing directory. Alternatively, we can execute a lot of commands without specifying paths, like uptime or date, etc.

      • 15 Super Useful Examples of Find Command in Linux

        The find command is used for searching for files and directories in the Linux command line.

        Find is one of the most powerful and frequently used commands. It is also one of the most extensive commands with over 50 options and this makes it a bit confusing, specially when it is paired with the exec or xargs command.

        It is impossible for a sysadmin or software developer to avoid the find command while working in the command line. Instead of being afraid of it, you should embrace its power.

        I am going to discuss some of the most common examples of the find command that you are likely to use. But before that, let me show you its syntax and how to use it.

      • Sending logs to Panther using syslog-ng - Blog - syslog-ng Community - syslog-ng Community

        Panther is an open-source log management system, which is also available as a service for a time-limited trial. It is still in beta phase, but it looks promising. You can see the “beta” sign on its opening page: https://app.panther.support/ I tested the time-limited cloud service version, but you can also install it locally, either from Dockerhub, or you can build the containers locally from the source.

        Even if it is still in beta phase, Panther comes with detailed documentation. There is a notable exception: while syslog-ng is shown on some of the figures, documenting it is still to be done. This blog helps you to get started with sending logs to Panther, using syslog-ng. You can use either legacy syslog with TLS encryption (still a bit problematic) or the http() destination to send logs to the Panther HTTP API.

      • 7 Important Linux Commands for Every Linux User

        Linux might sound scary for first-time Linux users, but actually, it isn’t. Linux is a bunch of open-source Unix operating systems based on Linux Kernel. These operating systems are called Linux distributions, such as Fedora, Debian, Ubuntu, and Mint.

        Since its inception in 1991, Linux has garnered popularity for being open-source. People can modify and redistribute Linux under their own brand. When using a Linux OS, you need a shell to access the services provided. Also, it’s recommended to run your Linux OS through a CLI or command-line interface. CLI makes time-consuming processes quicker.

        This article presents a guide to 7 important Linux commands for every Linux user to know. So, let’s begin.

      • How to Install Ubuntu MATE Desktop on Ubuntu 20.04

        For those not familiar with Ubuntu MATE, it is a free, open-source community-driven lightweight desktop environment and an official derivative of Ubuntu. One of the main differentiation from Ubuntu is that it uses the MATE desktop environment as its default user interface instead of the GNOME desktop environment that is the default user interface for Ubuntu.

        Ubuntu MATE is famous for being lightweight, fast, and stable, a community-driven project, and a great alternative to Ubuntu’s stock Gnome. At the end of the tutorial, you will have learned how to install Ubuntu MATE on your Ubuntu 20.04 system.

      • How to Install Vanila Forum on CentOS 8 - Unixcop

        Vanilla is a Canadian software company founded in 2009 in Montreal, Quebec, Canada. It is both a cloud-based (SaaS) community forum software and an open source community supported software. The company’s main product is Vanilla Cloud.

        Its open source product, Vanilla OSS, is a lightweight Internet forum package written in the PHP scripting language using the Garden framework. The software is released under the GNU GPL. Vanilla Forums is free software, standards-compliant, customizable discussion forums. Since 2009 there is also a cloud-hosted version (offered by Vanilla).

      • How to Set Environment Variables in Docker | RoseHosting

        Docker is an open-source application that provides lightweight operating-system-level virtualization through the use of containers. It is a kind of virtualization technology that is specially designed to easily develop and deploy applications inside of neatly packaged virtual containerized environments. Docker containers are in essence a set of software packages that run as one application that’s isolated from others. We can deploy it to any machine without any compatibility issues. By using this, the software stays system agnostic, simpler to use, less work to develop, and easy to maintain.

      • How to connect Rocky Linux 8 via Windows RDP protocol - Linux Shout

        If you have Rocky Linux 8 desktop and Windows 7/10/11 in a local environment and want to access using the RDP- Remote desktop protocol, then here is the way.

        To connect Linux operating systems such as Rocky Linux, AlmaLinux 8, or CentOS, we can use the open-source implementation of Remote desktop protocol called XRDP. RDP is developed by Microsoft and has been an integral part of Windows operating systems. It allows the users to remotely control and use the GUI desktop systems just like a local one. Although, Windows can be operated over this protocol out of the box, for Linux we need to install some additional packages. Here we learn how to set up a remote desktop connect to Rocky Linux 8.

      • How to install UTAU on a Chromebook

        Today we are looking at how to install UTAU on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to install Unreal Engine 4 on Ubuntu

        Are you looking to develop video games on your Ubuntu PC using the Unreal Engine? If so, you will need to install the latest Unreal Engine toolkit to your system. This guide will show how to set up the newest release of Unreal Engine 4 on your Ubuntu computer.

      • Install Gitlab CE on Debian 11 - kifarunix.com

        In this tutorial, you will learn how to install Gitlab CE on Debian 11. GitLab is an open source end-to-end software development platform with built-in version control, issue tracking, code review, CI/CD, etc. It is is a complete DevOps platform, delivered as a single application.

      • FreeIPA Server on Alma Linux 8/CentOS 8 - Unixcop

        We have 3 users, Jhon, Doe, Mike. Suppose you are at the IT department for a Software Company. You have to manage the identity of those 3 users. Easy right? You can easily manage their Identity Access. But how about 3 users become 300 or 3000? How can you manage them?

        Well things get pretty hard I guess, How about if we can have a system that has a central identity info, maybe that would be easier to solve our stated problem.No worries, FreeIPA is here to help you by solving the problem.

      • Add Client to the FreeIPA Server on CentOS 8 - Unixcop

        Hi Everyone ! In the previous article, we have seen how to set up freeIPA Server on centOS 8.

        In this write up, we will show how to add a client host to the freeIPA Domain. We will be configuring a CentOS 8 machine to authenticate against an existing FreeIPA server.

      • How to Install KDE Plasma Desktop Environment on Ubuntu 20.04 - LinuxCapable

        The name KDE comes from “K Desktop Environment”. For those not familiar with KDE Desktop, it is a free, open-source desktop environment. It provides Linux users on various distributions an alternative graphical interface to customize their desktop environment and applications for everyday use enhancement.

        Besides the graphical enhancements and changes, it is also a lightweight, fast, smooth environment with superior performance compared to native shipped desktops with some Linux Distributions. In Ubuntu’s case, this is Gnome.

        At the end of the tutorial, you will have learned how to install KDE Desktop Environment on your Ubuntu 20.04 system.

      • How to fix "Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock error - blackMORE Ops

        Quickest way to fix How to fix “Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post “http://%2Fvar%2Frun%2Fdocker.sock/v1.24/auth”: dial unix /var/run/docker.sock: connect: permission denied” error.

      • How To Install NVIDIA Drivers on Fedora – TecAdmin

        Fedora, the operating system of RHEL(Red Hat Enterprise Linux) does not have pre-installed exclusive Nvidia drivers in it for the users. Although it does have default Nouveau drivers which work in most conditions, you may face some problems while using them. If you encounter issues while using the Nouveau drivers you will have to install the official proprietary Nvidia drivers.

        The official Nvidia drivers can help you get the most out of your GPU by enhancing its performance. In this article, we will learn to install the official Nvidia drivers on Fedora

        However, before we start with the installation process, we need to do system configuration. The first configuration we need to do is stop the GUI from running and the second step is to disable the default nouveau drivers. From the GRUB boot menu, it is really easy and doable.

      • Securing your Kubernetes cluster with Kubewarden

        Kubernetes is fast becoming the operating system of the cloud. Every major cloud provider has a supported Kubernetes platform, Kubernetes can be run on-premises, and Kubernetes even has a package manager with Helm. And thanks to the operator pattern, Kubernetes has built-in support to describe and manage almost any kind of workload.

    • Games

      • DOOM Played By Tweet

        Getting DOOM to run on hardware it was never intended to run on is a tradition as old as time. Old cell phones, embedded systems, and ancient televisions have all been converted to play this classic first-person shooter. This style of playing games on old hardware might be passé now as the new trend seems to be the ability to play this game on more ethereal platforms instead. This project brings DOOM to Twitter.

      • Post-apocalyptic 4x strategy game Punk Wars releases November 11 | GamingOnLinux

        Strategy Forge S.A. and Jujubee S.A. have announced that their 4x strategy game Punk Wars will be releasing with Linux support on November 11.

        "Punk Wars tells the story of four new powers emerging from the ashes of a global cataclysm and fighting for domination of the ruins of a once magnificent megacity. Become the powerful leader of the messianic steampunk, tenebrous dieselpunk, militaristic steelpunk, or technocratic atompunk, with each faction holding the key to a different branch of industrial science, with a different set of unique skills. Explore the ruins of a bygone civilization, where resources are scarce and the dangers way too common. Develop your infrastructure and technology that will secure your triumph. Create a winning strategy and a playstyle for each faction, utilising their distinctive skills and units. Become the messiah of the new age and lead humanity towards the era of prosperity and happiness… as you see it."

      • Fallout 3 removes Games for Windows Live, works well on Linux with Proton | GamingOnLinux

        Fallout 3 from Bethesda Game Studios received a surprise update recently where the developer finally removed Games for Windows Live which is great news.

        Released back in 2008, Fallout 3 is something of a classic and a game I thoroughly enjoyed before making the switch fully to Linux. Thanks to Steam Play Proton, you can play Fallout 3 easily on Linux and with this update no workarounds are needed - at all.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE's 25th Anniversary

          You'll find on the website − https://25years.kde.org/ − the full celebration of the event: videos, meeting, activities, old KDE distro ready to run on virtual machine, merch (Tee-Shirt/Stickers).

          But if you still wonder what is KDE; I'll try to give you an overview: KDE is an international free software community that develops free and open-source software. KDE helps these projects to get common tools: bug trackers, software development forge, distributing the software, organizing in real life events like sprints,conferences, etc... Y

      • GNOME Desktop/GTK

        • More GNOME Software FAIL. Useless software reviews. – BaronHK's Rants

          It’s come to my attention several times now that if you want information about a program for GNU/Linux, don’t bother reading the reviews that people put in GNOME Software.

          Some of it isn’t in English, which is the language that I speak, and GNOME Software doesn’t sort them out based on your preferred language.

          The GNOME Software application doesn’t collect basic information about what distribution of GNU/Linux. (Or if it even is GNU/Linux, as GNOME actually still does run on other *nix systems, but I can’t imagine there’s too many non-GNU/Linux users left).

          It doesn’t consider what package manager you installed the program from.

          It could be from Fedora, it could be from Debian, or Ubuntu, or Arch. It could be a Snap. It could be a Flatpak.

    • Distributions

      • BSD

        • DragonFly 6.0.1 released

          DragonFly version 6.0 has been released. DragonFly version 6.0 brings a revamped VFS caching system, significant dsynth updates, various filesystem updates including HAMMER2, and a long list of userland updates. 6.0.1 brings a Let's Encrypt certificate fix for dport installation, plus other minor fixes

        • DragonFlyBSD 6.0.1 Released With AMD Zen 3 Temperature Monitoring, Fixes - Phoronix

          Released back in May was the shiny DragonFlyBSD 6.0 release while today a point release for it has been issued.

          The DragonFlyBSD 6.0.1 release appears to be primarily driven by the need to address a certificate issue for downloading dpkg binaries. Due to an expired Let's Encrypt certificate, downloading dpkg binaries began failing. With DragonFlyBSD 6.0.1 that certificate has been renewed.

      • Screenshots/Screencasts

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • Filezilla €» PCLinuxOS

          Filezilla updated to 3.56.0. FileZilla is a fast and reliable FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface.

        • Chromium Browser €» PCLinuxOS

          The Chromium Browser has been updated to 94.0.4606.81 and shipped to the PCLinuxOS Software Repository.

        • Dino €» PCLinuxOS

          Dino 0.2.2 is a modern XMPP (“Jabber”) chat client using GTK+/Vala.

        • Blender €» PCLinuxOS

          Blender 2.93.5 is the essential software solution you need for 3D, from modeling, animation, rendering and post-production to interactive creation and playback. Professionals and novices can easily and inexpensively publish stand-alone, secure, multi-platform content to the web, CD-ROMs, and other media.

      • SUSE/OpenSUSE

      • IBM/Red Hat/Fedora

        • ModelMesh and KServe bring eXtreme scale standardized model inferencing on Kubernetes

          One of the most fundamental parts of an AI application is model serving, which is responding to a user request with an inference from an AI model. With machine learning approaches becoming more widely adopted in organizations, there is a trend to deploy a large number of models. For internet-scale AI applications like IBM Watson Assistant and IBM Watson Natural Language Understanding, there isn’t just one AI model, there are literally hundreds or thousands that are running concurrently. Because AI models are computationally expensive, it’s cost prohibitive to load them all at once or to create a dedicated container to serve every trained model. Also, many are rarely used or are effectively abandoned.

          When dealing with a large number of models, the ‘one model, one server’ paradigm presents challenges on a Kubernetes cluster to deploy hundreds of thousands of models.

        • The Application Hierarchy of Needs for SREs and IT Operators – IBM Developer

          The Hierarchy of Needs was defined by the psychologist Abraham Maslow in his paper “A Theory of Human Motivation.” The base of the pyramid contains the most fundamental and most critical needs, with each subsequent layer representing needs that become important once those of the preceding layer have been satisfied. Maslow’s “Hierarchy of Needs” was used to represent the needs and behavioral motivation drivers for humans. This pyramid represented a series of basic psychological and self-fulfillment needs.

          Maslow’s hierarchy of needs has been adapted and adopted to represent the needs and motivations in other domains, including the needs of applications and services being managed by SREs and IT Operations teams.

        • A Red Hat validated pattern for Industrial Edge

          We've improved on the technology of our AI/ML Industrial Edge solution, designed to boost manufacturing efficiency and product quality with AI/ML, edge computing and Kubernetes. Let's see what's new!

        • Meet single node OpenShift: Our newest small OpenShift footprint for edge architectures

          Single node OpenShift is here, putting both control and worker capabilities into a single server to help fit into space-constrained environments.

        • Single node OpenShift at the manufacturing edge

          Where does it make sense to utilize single node OpenShift? Learn how it can help at the manufacturing edge!

        • Transitioning Red Hat’s Marketing leadership

          Today, we are sharing news that Tim Yeaton, Red Hat’s executive vice president and chief marketing officer (CMO) will retire in 2022. We’ve had the benefit of planning for Tim’s retirement for some time and using Red Hat’s succession planning process to identify and develop our next CMO. Long time Red Hat marketing communications and brand leader Leigh Day has been promoted to senior vice president (SVP) of Marketing and in January, she will assume the role of CMO. Until his retirement in mid-2022, Tim will become a senior advisor at Red Hat, helping with a smooth transition.

        • Customer experience (CX) plans: 5 questions to ask | The Enterprisers Project

          The pressure is on for companies to deliver a top-notch customer experience (CX). But to deliver a high-quality and holistic CX, you need to invest in the right data and technology. For IT leaders facing an abundance of options, investing in technology to enhance CX can feel like a gamble.

        • IBM Cheese Cutter Restoration | Hackaday

          For a while now, Mac Pro towers have had the nickname “cheese grater” because of their superficial resemblance to this kitchen appliance. Apple has only been a company since the 70s, though, and is much newer than one of its historic rivals, IBM. In fact, IBM is old enough to have made actual cheese-related computers as far back as the 1910s, and [Hand Tool Rescue] recently obtained one of these antique machines for a complete restoration.

        • Going to market with an open source product

          Many people with a long career in engineering, including me, have had misconceptions about sales and marketing. As an engineering community, we've viewed it as things like ordering swag, naming things, running ad campaigns, and creating white papers. There's a joke in the marketing community about how engineers are always willing to provide their "opinions" on marketing decisions without fully comprehending the discipline, but marketers rarely—like never—make suggestions on code improvements. To work together, engineers and marketers must share a common definition.

          While product marketers do help drive those commonly recognized tasks, the role is so much richer. Product marketers, technical marketers, and evangelists have outbound responsibilities like creating content (e.g., blogs, press releases, white papers, demos), delivering roadmap sessions to customers (as well as analysts and journalists), building content for sales teams, and much more. Combined, these outbound functions are often referred to as getting a product to market, but just as importantly, product marketing also has inbound functions. They serve as another set of eyes and ears to listen for customer needs and provide input to the product strategy. There's a saying in product management: nothing interesting happens within these four walls. Businesses must go out into the world, talk to customers, and more importantly, listen to them.

    • Devices/Embedded

  • Leftovers

    • Health/Nutrition

      • Deputy health minister proposes ban on all tobacco marketing

        Separately, he called on senators to reject a bill on the legalization of vapers and electronic cigarettes, and claimed that tobacco companies were deliberately obfuscating the issue. “If we go with this fallacy that the tobacco industry has put to us, that vapers are the alternative solution to the tobacco problem, we will once again be making a mistake because vapers and heated tobacco products are not an alternative to harm reduction,” he said.

      • COVID-19 could nudge minds and societies towards authoritarianism

        It is a little-known fact that humans have not one but two immune systems. The first, the biophysical immune system – the one we’ve all heard much about – responds to infections as they enter the body, detecting and eliminating intruders such as the coronavirus.

        The second is the behavioural immune system, which adapts our behaviour to preemptively avoid potentially infectious people, places and things. The behavioural immune system is the first line of defence against infectious disease. It prompts people to socially conform with known traditions and to avoid foreign, dissimilar and potentially infectious groups.

        In a recently published study, my colleagues and I at the University of Cambridge examined the impact of the behavioural immune system on our attitudes towards obedience and authority. We found that high rates of infectious diseases – and the disease-avoidance they promote – may fundamentally shape political opinions and social institutions.

    • Integrity/Availability

      • Proprietary

        • After Spike in Ransomware Attacks, U.S. Looks to Go on the Offensive [iophk: Windows TCO]

          The Biden administration has sought to rally its allies to help fight cyberthreats and ransomware attacks, pushing NATO to adopt a new cyber defense policy and launching talks on cyberthreats among G-7 nations. It also launched a series of initiatives in recent months to target cybercriminals and boost protection against ransomware attacks following several high-profile ransomware attacks against a major oil pipeline company and a meat-processing company earlier this year. The attacks laid bare how vulnerable elements of U.S. critical infrastructure, including its food and energy sectors, were to cyber incursions.

        • VirusTotal study finds 95% of 80m ransomware samples analysed aimed at Windows

          About 2% were Android-based, while one set, known as EvilQuest, targeted OSX, the study, titled Ransomware Activity Report, said. It took into account samples submitted all the way back to January 2020.

          Vicente Diaz of VirusTotal said in a short blog post accompanying the 14-page study that of the 140 countries which submitted ransomware samples, Israel was far and away an outlier with the highest number of submissions and nearly 600% rise in submissions compared to its baseline.

        • Insulin dump

          The student is allowed to keep a small purse with her at all times, as it contains a smartphone that runs an app that talks to, and controls her insulin pump. The teachers at the school were briefed about the smartphone. However, there’s one part of the setup that caused problems: the pump would occasionally issue a beeping noise.

          This beeping makes for a disastrous experience for a sixth grade girl. She’s at the age where social pressures really start to manifest. The pump gives something other students can latch onto to make fun of.

        • White House to host virtual ransomware summit with 30 countries — but not Russia [iophk: Windows TCO]

          The White House plans for at least 30 countries to attend a series of meetings to be held over Zoom. The summit will be the most concrete step it has taken so far to build an international coalition to address ransomware, an epidemic of cybercrime where hackers remotely lock victims’ computers and demand an extortion payment to fix them.

        • End of Life Google Chrome devices should be repurposed with GNU/Linux. – BaronHK's Rants

          Of all companies, Lenovo gave me an idea.

          They mentioned GalliumOS as a potential Chrome OS replacement on some of their own Chrome devices.

          These are considered low end by PC standards, but they run Chrome OS fine because it’s a stripped down GNU/Linux system. Not some bloated 100 GB+ Windows horror that has to trap every file system call in case it’s a virus.

          The Intel-based ones, mostly, should run a normal GNU/Linux distro, but they occasionally have odd hardware in them that’s not well supported by the vanilla Linux kernel, and GalliumOS steps in to add those.

          Many years ago, there was a guy running a charity in Texas that took old computers that were not able to run Windows anymore, and re-imaged them with a minimum GNU/Linux distribution, which they were able to run okay.

          Somewhere, out of the blue, Texas sent the police in to enforce “environmental standards”.

        • macOS 11.6 makes the theme worse then ever. Free Software GUIs are whatever you want them to be. – BaronHK's Rants

          Jamie Zawinski commented that his perfect Mac experience continues with light grey text on light grey backgrounds.

          These have been a problem for years, and it’s only getting worse.

          It’s why I use the Adwaita-Dark theme and Solarized Dark for Gedit and GNOME Terminal.

          I think they’re all making the default theme so unusable unless you jack up the display backlight to “IT BURNS US! IT BURNS US PRECIOUS!” so they can market “Dark Mode” as if it was a special feature, when I’ve always used them in one form or another.

          When I started using Solaris, I got hooked on one that Sun wrote for GTK2 called Nimbus. The icon pack was pretty sharp too. And even the light version was quite lovely.

        • Pseudo-Open Source

          • Openwashing

            • .NET Foundation admits it 'violated the trust of project maintainers' [Ed: Simon Sharwood at it again, relaying Microsoft talking points and face-saving statements]

              The beleaguered .NET Foundation has apologised, again, and reversed one of the policies that saw its members revolt.

              The Foundation's had a tricky few weeks, after a board member resigned and complained the reasons for doing so were misrepresented. Members have also complained the organisation had made unauthorised changes to projects, and about the decision to move projects to a GitHub account the Foundation controlled without advance notice. Foundation executive director Claire Novotny stepped down as the controversies swirled.

        • Security

          • Russia excluded from virtual White House meeting on ransomware

            The White House on Wednesday will convene a virtual meeting on countering ransomware with senior officials representing 30 countries and the European Union, Biden administration officials said, as part of President Biden’s effort to work with global partners to address cyber threats.

            Ministers and senior officials from a range of countries will take part in the virtual meeting, though the attendees do not include representatives from Russia, which has been a key focus of the Biden administration in trying to root out criminal ransomware groups.

          • How does HTTPS protect you (and how doesn't it?) - The Mozilla Blog

            It’s true that looking for the lock icon and HTTPS will help you prevent attackers from seeing any information you submit to a website. HTTPS also prevents your internet service provider (ISP) from seeing what pages you visit beyond the top level of a website. That means they can see that you regularly visit https://www.reddit.com, for example, but they won’t see that you spend most of your time at https://www.reddit.com/r/CatGifs/. But while HTTPS does guarantee that your communication is private and encrypted, it doesn’t guarantee that the site won’t try to scam you.

            Because here’s the thing: Any website can use HTTPS and encryption. This includes the good, trusted websites as well as the ones that are up to no good — the scammers, the phishers, the malware makers.

            You might be scratching your head right now, wondering how a nefarious website can use HTTPS. You’ll be forgiven if you wonder in all caps HOW CAN THIS BE?

            The answer is that the security of your connection to a website — which HTTPS provides — knows nothing about the information being relayed or the motivations of the entities relaying it. It’s a lot like having a phone. The phone company isn’t responsible for scammers calling you and trying to get your credit card. You have to be savvy about who you’re talking to. The job of HTTPS is to provide a secure line, not guarantee that you won’t be talking to crooks on it.

            That’s your job. Tough love, I know. But think about it. Scammers go to great lengths to trick you, and their motives largely boil down to one: to separate you from your money. This applies everywhere in life, online and offline. Your job is to not get scammed.

          • Security updates for Wednesday [LWN.net]

            Security updates have been issued by Debian (flatpak and ruby2.3), Fedora (flatpak, httpd, mediawiki, redis, and xstream), openSUSE (kernel, libaom, libqt5-qtsvg, systemd, and webkit2gtk3), Red Hat (.NET 5.0, 389-ds-base, httpd:2.4, kernel, kernel-rt, libxml2, openssl, and thunderbird), Scientific Linux (389-ds-base, kernel, libxml2, and openssl), SUSE (apache2-mod_auth_openidc, curl, glibc, kernel, libaom, libqt5-qtsvg, systemd, and webkit2gtk3), and Ubuntu (squashfs-tools).

          • Linux Foundation Raises $10M To Expand And Support Open Source Security Foundation
          • Open Source Security Foundation Raises $10 Million in New Commitments to Secure Software Supply Chains
          • Linux Foundation raises $10M to support open-source security project - SiliconANGLE

            The funding came from members of the foundation. The long lineup: Dell Technologies Inc., Telefonaktiebolaget LM Ericsson, Facebook Inc., Fidelity Investments Inc., GitHub Inc., Google LLC, International Business Machines Corp., Intel Inc., JPMorgan Chase & Co., Microsoft Corp., Morgan Stanley, Oracle Corp., Red Hat Inc., Snyk Inc., VMware Inc., Anchore Inc., Apiiro LLC, AuriStar Technologies Inc., Deepfence Inc., Devgistics, GitLab Inc., Nutanix Inc., Tidelift Inc. and Wind River Systems Inc.

          • The World’s Major Technology Providers and Converge to Improve the Security of Software Supply Chains

            Imagine you have created an open source project that has become incredibly popular. Thousands, if not millions, of developers worldwide, rely on the lines of code that you wrote. You have become an accidental hero of that community — people love your code, contribute to improving it, requesting new features, and encouraging others to use it. Life is amazing, but with great power and influence comes great responsibility.

            When code is buggy, people complain. When performance issues crop up in large scale implementations, it needs to be addressed. When security vulnerabilities are discovered — because no code or its dependencies are always perfect — they need to be remediated quickly to keep your community safe.

          • Privacy/Surveillance

            • I Lived Through the US Military’s Culture of Surveillance

              I know what it means to be watched all too carefully, a phenomenon that’s only grown worse in the war-on-terror years. I’m a strange combination, I suspect, being both a military spouse and an anti-war-on-terror activist. As I’ve discovered, the two sit uncomfortably in what still passes for one life. In this country in these years, having eyes on you has, sadly enough, become a common and widespread phenomenon. When it’s the government doing it, it’s called “surveillance.” When it’s your peers or those above you in the world of the military spouse, there’s no word for it at all.

            • Who should police the web?

              For an example of how private firms have become the digital police, consider the rules on [Internet] pornography being introduced by Mastercard on October 15th. In a bid to weed out illegal material, the card firm is demanding that porn sites take steps that go beyond what the law requires, including reviewing footage before publication and checking the identity of those who upload or feature in it. Sites that think these sorts of rules too onerous are under no obligation to work with Mastercard. But Visa is also cracking down, and the two firms handle 90% of card payments outside China, meaning that they are becoming the industry’s de facto regulators.

            • Microsoft Agrees to Human Rights Review in Deals With Law Enforcement, Government

              The move came in response to a June filing of a shareholder proposal asking the company to evaluate how well it sticks to its human rights statement and related policies. Microsoft committed to a review of any human rights impacts that its products have on those including communities of Black, Indigenous and People of Color in contracts for police, immigration enforcement and unspecified other government agencies, according to correspondence from the company viewed by Bloomberg.

            • Samsung is the worst phone for privacy in the Android market, and if you try to fix it, they will punish you. – BaronHK's Rants

              A new report shows that Samsung is the worst Android vendor for invasions of privacy.

              Among the problems unique to Samsung is that they’ve foisted Microsoft spyware and Clown Computing that phones home to Microsoft into the stock ROM as system apps.

              Also, LineageOS could fix it, if you could get it to run. But Samsung’s “security system” will break your camera for no reason whatsoever if you do, in their newer phones. This isn’t “Oh, the other firmware has no driver.”. It’s Samsung Knox preventing the camera from ever working again.

    • Defence/Aggression

    • Environment

      • Environmental Justice Advocates Respond to Oil Spill: End Neighborhood and Offshore Oil Drilling Now

        Governor Newsom’s oil and gas regulators have continued granting offshore oil well permits also. As of€ October 1, 2021, there have been a total of 150 reported permits issued for offshore wells since January 1, 2019, according to a new analysis of permits approved through October 1, 2021 and posted at€ www.NewsomWellWatch.org€ by Consumer Watchdog and FracTracker Alliance.

        In the wake of another disastrous oil spill, CEJA and VISION provided the following statements:

      • Degrees of danger: What will the world look like if we miss our climate targets?

        In 2015, almost all of the world's nations agreed to limit the temperature increase to 2 degrees Celsius (3.6 F) above preindustrial levels, and to aim for a limit of 1.5 C under the Paris Agreement.  So far, the actual commitments made to cut fossil fuel use and other measures to reduce emissions of greenhouse gases into the atmosphere — if carried through — will only get us down to 2.7 C of warming, the UN has warned.

      • EU Commission: Climate change 'most comprehensive threat' facing Arctic

        The Arctic region has reached an "unprecedented crisis point" due to climate change, a problem which is the "most comprehensive threat" facing the region, the EU Commission said in a joint statement on Wednesday.

      • Energy

        • [Old] Will PayPal's adoption of bitcoin make cryptocurrency more mainstream?

          Cryptocurrencies are decentralised systems with no official oversight, so regulation is difficult. Registered companies that deal in them are finding themselves under increasing scrutiny. In June, the UK’s Financial Conduct Authority ruled that Binance Markets Limited, one of the world’s largest cryptocurrency exchanges, had to cease regulated trading in the UK.

        • Bitcoin Uses More Electricity Than Many Countries. How Is That Possible?

          We’ll explain how that works in a minute. But first, consider this: The process of creating Bitcoin to spend or trade consumes around 91 terawatt-hours of electricity annually, more than is used by Finland, a nation of about 5.5 million.

          That usage, which is close to half-a-percent of all the electricity consumed in the world, has increased about tenfold in just the past five years.

        • Anti-money laundering chief: Cryptocurrency licenses should be revoked

          Cryptocurrency operating licenses in Estonia should be revoked, and the system rebuilt from scratch, chief of the money laundering bureau (RAB) Matis Mäeker told investigative weekly Eesti Ekspress. Failure to do so may result in another Danske-style financial scandal. The news comes amid revelations that despite a cull of license-holders in 2020, over 400 cryptocurreny operators are still active in Estonia.

        • EU Pushing for Oil, Coal and Gas to Stay in the Ground

          The European Commission argues that oil, gas, and coal should not be extracted in the Arctic if the climate goals are to be met, in addition to its representing a risk for environmental pollution in vulnerable areas, and calls for an international moratorium on hydrocarbon extraction in the Arctic.

        • EU to push for an end to exploitation of Arctic gas, oil and coal

          The document has been drawn up by the European Commission and the bloc's diplomatic service. It is due to be finalized and published this week. The strategy says Arctic fossil fuel extraction needs to stop so EU countries can meet targets in the 2015 Paris Agreement to limit temperature rises from global warming. It calls for a widening of the scope of existing curbs on Arctic fossil fuel exploration in the Arctic in areas of the U.S., Canada, and Greenland.

          EU member states would have to change their behavior sharply under the new policy, since they import Arctic fossil fuels including an estimated 87% of liquefied natural gas produced in the Russian Arctic. The new strategy would not have legal force, but it would create political pressure for member states to comply.

      • Wildlife/Nature

        • Wall Street’s Takeover of Nature Advances with Launch of New Asset Class

          Last month, the New York Stock Exchange (NYSE) announced it had developed a new asset class and accompanying listing vehicle meant “to preserve and restore the natural assets that ultimately underpin the ability for there to be life on Earth.” Called a natural asset company, or NAC, the vehicle will allow for the formation of specialized corporations “that hold the rights to the ecosystem services produced on a given chunk of land, services like carbon sequestration or clean water.” These NACs will then maintain, manage and grow the natural assets they commodify, with the end of goal of maximizing the aspects of that natural asset that are deemed by the company to be profitable.

          Though described as acting like “any other entity” on the NYSE, it is alleged that NACs “will use the funds to help preserve a rain forest or undertake other conservation efforts, like changing a farm’s conventional agricultural production practices.” Yet, as explained towards the end of this article, even the creators of NACs admit that the ultimate goal is to extract near-infinite profits from the natural processes they seek to quantify and then monetize.

          NYSE COO Michael Blaugrund alluded to this when he said the following regarding the launch of NACs: “Our hope is that owning a natural asset company is going to be a way that an increasingly broad range of investors have the ability to invest in something that’s intrinsically valuable, but, up to this point, was really excluded from the financial markets.”

    • Finance

      • Hampster Economics

        Something about the obnoxious, carefree version of the internet from my youth has always appealed to me. I remember exactly where I was when the Heaven’s Gate mass suicide went down and periodically check the cult’s still-functioning website. Even for a mass suicide cult, there’s something innocuous and joyful in the way the site’s displayed. The rainbow coloring, the dreamy night sky background, the welcoming tone. I love it. My love affair with the cutesy, silly part of the internet started there, but never seemed to end. In my teenage years, I must’ve watched every Homestar Runner episode at least ten times. More than anything though, Hampsterdance left an indelible mark on the way I see the internet. The focus of my own writing each week is branding and it’s impossible not to compare the notoriety of Heaven’s Gate and Homestar Runner against that of the dancing Hampsters. Today’s Tedium ponders the commercial viability of the Hampsterdance. — Jared @ Tedium

    • AstroTurf/Lobbying/Politics

      • Bullying Standard Practice for Right-wing Republicans
      • The View From Here: Rethinking What Local News Can and Should Be

        Local news organizations are rethinking their relationships with the communities they serve, from deploying new messaging platforms that deliver news to overhauling their reporting practices, editors told ProPublica in a series of recent conversations.

        Amid increased polarization and a pandemic in which misinformation has spread as fast as the virus, editors in Atlanta, Phoenix and Detroit told us in live virtual events that the notion of local news as a public good is more relevant than ever.

      • Facebook increasing protections for activists, journalists against harassment

        The platform's policies surrounding how public figures are treated include generally allowing users to call for the death of a public figure so long as they are not tagged in the post. Users are not permitted to call for the death of private users, a policy that will now extend to journalists, Reuters reported.

      • Does This Ring A Bell?

        No matter your ultimate lean on politics, you have to admit it’s pretty strange to sit with the knowledge that OAN, a conservative news network, was effectively funded by AT∓T, right? This is a strange headline that kind of shakes through people’s heads in part because of what AT∓T used to represent, as the phone company that we all had to use. (Now, at least with the dust settled, we have something of a choice.) The irony of the company that currently owns CNN bankrolling something that is literally the opposite of CNN in every way that matters is too bizarre to ignore. Now combine this with the effect of Facebook’s many negative headlines this week (including its downtime), creating the real possibility that Facebook is the AT∓T of social media (down to the permissive approach around controversial content) and might need to be broken up, and you have some real knotty fodder to think about. Today’s Tedium considers the messy effects of AT∓T’s breakup with the Baby Bells in a modern context.

      • A second Facebook whistleblower says she's willing to testify before Congress and that she's shared documents with a US law agency

        Zhang also said on Twitter on Sunday that she had provided a US law-enforcement agency with "detailed documentation regarding potential criminal violations."

        When asked by CNN, Zhang did not say which agency she gave documents to. An FBI spokesperson declined to comment when contacted by CNN.

      • Another Facebook whistleblower says she is willing to testify before Congress

        Central to Zhang's allegations about Facebook is that it doesn't do enough to tackle abuse of its platform in countries outside of the United States. Roughly 90% of Facebook's monthly active users are outside the US and Canada, according to its most recent quarterly filing.

      • Sophie Zhang: Second Facebook whistleblower reports ‘potential criminal violations’ to authorities

        “I’ve found multiple blatant attempts by foreign national governments to abuse our platform on vast scales to mislead their own citizenry, and caused international news on multiple occasions. I have personally made decisions that affected national presidents without oversight, and taken action to enforce against so many prominent politicians globally that I’ve lost count.”

      • Facebook says it will ban content that sexually harasses celebrities

        As part of this new policy update, Facebook said that it would remove any profiles, pages, groups, or events dedicated to sexualizing public figures, including celebrities, politicians, and content creators. The new policy bans sexualized photoshops and drawings and any degrading content “in the process of bodily functions,” Antigone Davis, global head of safety at Facebook, said in a blog post on Wednesday.

        Facebook also said that it would remove “unwanted sexualized commentary” and repetitive attacks harassing an individual sexually.

    • Censorship/Free Speech

      • LinkedIn Caves Again, Blocks US Journalists' Accounts In China

        LinkedIn -- the business-oriented social media platform owned by Microsoft -- has spent the last few years increasing its compliance with the Chinese government's demands for censorship. A couple of years back, the network drew heat for not only blocking accounts of Chinese pro-democracy activists but also critics of the government located elsewhere in the world.

      • Oppose the right-wing, racialist attack on composer Bright Sheng at University of Michigan

        Sheng, the Chinese-born Leonard Bernstein Distinguished University Professor of Composition, is a world-class composer, who has been teaching at the University of Michigan since 1995. He was a Pulitzer Prize finalist and was given a MacArthur “genius” fellowship in 2001. The Foundation described him as “an innovative composer whose skillful orchestrations bridge East and West, lyrical and dissonant styles, and historical and contemporary themes to create compositions that resonate with audiences around the world.”

        The “crime” for which Sheng has been forced out of teaching the class has only been made possible by the whipping up of racialist frenzy on the university campuses and in the media. No honest or fair-minded individual could find anything remotely offensive about Olivier’s performance or the film as a whole.

    • Freedom of Information/Freedom of the Press

      • Lee Camp: Julian Assange’s Father, John Shipton, on the U.S. Government’s ‘Scandalous’ Plan to ‘Murder’ His Son
      • [Old] 3 arrested can challenge Louisiana pipeline trespass law

        The law “is part of a national effort to crack down on environmental activists across the U.S.,” the Center for Constitutional Rights, which represents White Hat, Savage and Mejia, said in Thursday's news release. It said the first was passed in Oklahoma in 2017, and said similar bills have been introduced 23 times in 18 states since 2017, including 14 in 2019.

      • Covering Myanmar is Becoming Impossible, Say Local Journalists

        Access to social media and the [Internet] was blocked, at least five local media outlets had licenses revoked, and authorities detained dozens of journalists covering nationwide protests against the junta.

        In the months that followed, media outlets have been forced to restructure their operations by working online or from self-imposed exile.

        Win Zaw Naing, a journalist at the Yangon-based Red News Agency, says he has been stuck inside his house for seven months, having to work almost entirely online.

        “It is almost impossible to report on the ground now. I did not leave the house and I did not see anyone. I do it online, I make phone calls,” he told VOA.

    • Civil Rights/Policing

      • Minneapolis Police Caught on Video ‘Hunting’ Activists

        The extraordinary footage was released last week by the lawyer of a man who was caught up in an exchange of fire with police that night. (That man, Army veteran Jaleel Stallings, was exonerated by a jury in September for acting in self defense.) The footage, which was part of the evidence used in Stallings’ trial, also shows Minneapolis cops making racist comments, cursing protesters and journalists, slashing the tires of parked cars — in short, acting more lawless than the crowds they were supposed to be controlling that night.

      • Election workers accused of shredding voter applications

        Preliminary information indicates that the employees checked out batches of applications for processing, and they are alleged to have shredded some of the forms, the Fulton County statement says. Fellow employees reported the alleged actions to their supervisor Friday morning, and the two employees were fired that day.

      • The Government's Secret 'Google Search' Warrant Trap

        Keyword warrants are not new, but they are rare, and they are little known by the broader public. The Forbes documents provide hard proof of the government's judicial exercise of keyword warrant in a 2019 Wisconsin case tracking down men suspected of kidnapping and abusing a minor. Investigators asked Google for data on anyone who had searched for the victim's name, her mother's name, and her address over a period of 16 days.

        Other known uses of keyword warrants include demands for information on Google searches for the address of an arson victim who was a witness in the racketeering case against crooner R. Kelly in 2020 and Google searches for a fraud victim in Minnesota in 2017. It's not just Google. Jennifer Lynch of the Electronic Frontier Foundation points out that keyword warrants were served to Microsoft and Yahoo for searches on things like "pipe bomb" and "low explosives" in the course of tracking down the 2018 Austin bombings. Additionally, Forbes was able to track down the existence of a fifth keyword warrant request in California in late 2020, but it was only noted in a court docket, so we don't know the extent of the order.

      • The Boston Marathon bomber case reaches the Supreme Court

        "This case is the first case where the court is confronted with an almost unlimited amount of information through social media," says George Kendall, a capital defense lawyer. "So it was really sort of surprising, to say the least, that when the judge decided, 'OK, we can do this in Boston,' that kind of question was not asked of everyone."

      • Outrage Grows Over Jailing of Children as Tennessee University Cuts Ties With Judge Involved

        In the days after ProPublica’s investigation of the juvenile justice system in Rutherford County, Tennessee, one state lawmaker wrote that she was “horrified.” Another called it a “nightmare.” A third labeled it “unchecked barbarism.” A former Tennessee congressman posted the story about the unlawful jailing of kids and tweeted, “The most sickening and unAmerican thing I’ve read about in some time.” The NAACP Legal Defense and Educational Fund called for a federal civil rights investigation. A pastor, in his Sunday sermon in Nashville, said: “We can’t allow this madness to continue. These are our babies.”

        And on Tuesday evening, four days after the story published, the president of Middle Tennessee State University notified faculty and staff that Donna Scott Davenport, a juvenile court judge at the heart of the investigation, “is no longer affiliated with the University.” Davenport had been an adjunct instructor at the school, which is based in Murfreesboro, Tennessee. For many years, she taught a course on juvenile justice. In 2015, she was one of the university’s commencement speakers.

      • The General Strike of 2021
      • Origin and Meaning of Critical Race Theory

        In August 2021, the Brookings Institute reported that at least eight states had passed legislation banning the teaching of Critical Race Theory, although only Idaho actually uses the phrase.

        The modern iteration of Critical Race Theory begins in the 1980s when legal scholars followed by social scientists and educational researchers began to employ CRT as a way of understanding the persistence of race and racism in the United States. Kimberlé Crenshaw, who teaches law at UCLA and Columbia University and was an early proponent of critical race theory, described it as “an approach to grappling with a history of white supremacy that rejects the belief that what’s in the past is in the past, and that the laws and systems that grow from that past are detached from it.” Basically, Critical Race Theory rejects the idea of colorblindness or legal neutrality and argues that race and racism have always played a major role in the formulation of American laws and the practices of American institutions. It is a study of laws and institutions that sifts through the surface cover to look for underlying meaning and motivation. As an academic discipline it does not claim that everything about the United States is racist or that all white people are racist. The CRT lens examines laws and institutions, not people, certainly not individual people.

      • Ronald Deibert Provides Statement on behalf of Chelsea Manning - The Citizen Lab

        Citizen Lab founder and director, Dr. Ronald Deibert, recently provided a statement in the context of Chelsea Manning’s inadmissibility proceeding before the Immigration and Refugee Board of Canada.

        The statement proceeds in four parts. In the first section, Deibert provides background context regarding his professional experience and the Citizen Lab’s work. In the second section, he describes the Citizen Lab’s research activities in detail and the academic and public interest impacts of those activities. In the third section, he summarizes certain events that have threatened or aimed to chill the Citizen Lab’s research activities in the past. In the fourth section, he explains the chilling effects that a broad interpretation of section 342.1 of the Criminal Code and/or of subsection 16(2) of the Security of Information Act (“SOIA”) could have on the Citizen Lab’s scholarship and on related initiatives.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Amazon copied products and rigged search results to promote its own brands, documents show

        Amazon.com Inc has been repeatedly accused of knocking off products it sells on its website and of exploiting its vast trove of internal data to promote its own merchandise at the expense of other sellers. The company has denied the accusations.

        But thousands of pages of internal Amazon documents examined by Reuters – including emails, strategy papers and business plans – show the company ran a systematic campaign of creating knockoffs and manipulating search results to boost its own product lines in India, one of the company’s largest growth markets.

      • Patents

        • Corner office podcast: Managing Salesforce's diverse IP needs [Ed: Software patents propaganda and other nefarious agenda from Salesforce disguised as 'journalism' from the voice of patent trolls, Patrick Wingrove]

          David Simon, senior vice president of IP at Salesforce, shares his views on Section 101, Fintiv, the DMCA, and more

        • Europe’s IPR rules need to be strengthened to ensure they meet current and future challenges, explains Marion Walsmann [Ed: Europe does not have "IPR rules"; it has laws for patents, copyrights, etc. and they're not "rights; what we have here is lobbying that namedrops "SMEs" and shameless (massive) lies about UPC in the text below; What we basically have here is a German EPP MEP frontally attacking small businesses by lying about them while claiming to speak for them.]

          Filing a single application, rather than numerous national procedures, and obtaining a single patent that is valid throughout Europe will dramatically simplify the patent application process and greatly reduce corresponding costs. Pricey parallel lawsuits would also be prevented [sic] by the Unified Patent Court, while legal certainty would be increased. [sic]

        • Patent case: In re Juniper Networks Inc., USA [Ed: Texas run by corrupt judges who treat their courts like for-profit corporations; the higher patent courts belatedly tackle this corruption from the whackos of Waco]

          The federal district court in Waco, Texas abused its discretion in denying Juniper Networks’ motion to transfer six patent infringement actions filed by a Texas-based patent assertion entity to the Northern District of California, the U.S. Court of Appeals for the Federal Circuit has decided in granting Juniper’s motion for a writ of mandamus. The district court erred in its analysis of the relevant public and private public interest factors used for determining whether the transferor or the transferee district is the more convenient forum. For example, concerning the most important factor, the relative convenience of the transferee forum for the potential witnesses, Juniper identified 11 witness located in the Northern District of California, while the plaintiff—a company’s whose presence in Texas appeared to be both recent and ephemeral—identified only one witness (In re Juniper Networks, Inc., September 24, 2021, per curiam).

        • Opinion: Tired of Brexit? The exhaustion is still to come! [Ed: Misusing the words "IP" (which are both inappropriate for the subject at hand]

          The UKIPO has still to decide on a path forward for exhaustion after Brexit – but with IP taking a back seat in government circles, don’t hold your breath

        • Hanwha Q-Cells and Hoyng ROKH Monegier win cross-border injunction against Longi [Ed: Instead of journalism JUVE is now doing ads for law firms, puff pieces thinly disguised as nothing but "case studies"; JUVE is just a PR agency now]

          The ruling from Rotterdam District Court is interesting because the Hanwha patent is valid in 16 European countries, but not in the Netherlands. Nevertheless, the court issued a cross-border injunction for 9 countries. The court also ordered a penalty sum capped at €5 million.

          The Rotterdam court did have doubts as to whether the Dutch Longi company directly infringed EP 2220689 B1. It nevertheless ruled that the distribution and sale of the solar panels in Belgium, Bulgaria, Germany, France, Liechtenstein, Portugal, Spain, the UK and Switzerland is an unlawful act against Hanwha Q-Cells. Therefore, the judges granted the cross-border injunction for nine countries (case ID: C/10/621252 / KG ZA 21-563).

        • Restoring the America Invents Act: legislative measure to defend post-grant review of U.S. patents welcomed by tech industry, patent experts

          About a year ago I described a complaint by Apple, Google, Intel, and Cisco over then-USPTO Director Iancu's PTAB rulemaking as "litigation to the rescue of legislation" because the case was brought in defense of the ideas underlying the Leahy-Smith America Invents Act (AIA). Essentially, Mr. Iancu had gutted the PTAB IPR (inter partes review) part of the AIA by establishing a discretionary-denial regime.

          By now there is also hope for the PTAB IPR process because of developments on other fronts. The next USPTO Director may undo some of Mr. Iancu's rulemaking, and now there's a proposal in the United Senate that amounts to "legislation to the rescue of (earlier) legislation": the Leahy-Cornyn Restore AIA bill ("RAIA"). Sen. Patrick Leahy (D-Vt.), one of the sponsors of the original AIA, is now the President pro tempore of the Senate. Sen. John Cornyn (R-Tex.) has also taken an interest in patent policy for some time. Both have a reputation for balanced positions on patent enforcement: neither are they in the "Coons camp" (which favors ever stronger enforcement even of weak patents) nor could they be reasonably accused of seeking to weaken patent protection.

          Litigation, executive action, legislation--three ways to reverse Mr. Iancu's PTAB rules, any single one of which could do the job. Executive action would potentially be quickest (as it won't take that much longer until the new USPTO Director has been named). Durability is the most important quality of new legislation: the Restore AIA would not only solve the problem at hand but would also prevent it from reoccurring, unless and until Congress would decide otherwise.

        • Koenig & Bauer wins infringement case against Hebenstreit [Ed: This is framed as a shameless advertisement instead of actual reporting about a patent case. JUVE is a marketing company now, which occasionally lies for lobbyists.]

          Koenig & Bauer has won the second instance of the patent infringement case. However the breach of trade secrets dispute is still ongoing. The founders of Hebenstreit, based in Ludwigsburg, are former employees of the patent holder. Koenig & Bauer accuses them of having used the company’s technical drawings for their own business.

          Koenig & Bauer, based in Würzburg, sued Hebenstreit for patent infringement. Its EP 1 266 852 B1 protects a device for feeding and stacking tabular goods. The technology is used in metal pressing, where it stacks the pressed metal plates on top of each other at the end of the line. The speed of the stacking process in particular, as well as its precise coordination with the speed of the press, plays an essential role. The original patent applicant was LTG Mailänder, which was acquired by Bauer + Kunzi (later Koenig & Bauer-MetalPrint) in 2006.

        • Software Patents

          • Prior art found on Heritage IP patent

            Unified is pleased to announce prior art has been found on U.S. Patent 6,854,067, owned by Heritage IP, LLC, an NPE and subsidiary of IP Edge. The '067 patent generally relates to a method and system for interaction between a processor and a power on reset circuit to dynamically control power states in a microcontroller. This patent has been asserted in district court against NXP, Resideo Technologies, Maytronics, Insulet Corp., August Home, and others.

      • Trademarks

        • Public Backlash Leads Tusla Park To Stop Bullying Coffee Shop Over Trademark

          A good public outcry and backlash can lead to many, many good things. We see it here at Techdirt all the time, particularly when it comes to aggressive bullying episodes over intellectual property. Some person or company will try to play IP bully against some victim, the public gets wind of it and throws a fit, and suddenly the necessity over the IP action goes away. Retailers, manufacturers, breweries: public outcry is a great way to end ridiculous legal actions.



Recent Techrights' Posts

Topics We Lacked Time to Cover
Due to a Microsoft event (an annual malware fest for lobbying and marketing purposes) there was also a lot of Microsoft propaganda
EPO Education: Workers Resort to Legal Actions (Many Cases) Against the Administration
At the moment the casualties of EPO corruption include the EPO's own staff
 
Links 22/11/2024: Dynamic Pricing Practice and Monopoly Abuses
Links for the day
Microsofters Try to Defund the Free Software Foundation (by Attacking Its Founder This Week) and They Tell People to Instead Give Money to Microsoft Front Groups
Microsoft people try to outspend their critics and harass them
[Meme] EPO for the Kids' Future (or Lack of It)
Patents can last two decades and grow with (or catch up with) the kids
Gemini Links 22/11/2024: ChromeOS, Search Engines, Regular Expressions
Links for the day
This Month is the 11th Month of This Year With Mass Layoffs at Microsoft (So Far It's Happening Every Month This Year, More Announced Hours Ago)
Now they even admit it
Links 22/11/2024: Software Patents Squashed, Russia Starts Using ICBMs
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, November 21, 2024
IRC logs for Thursday, November 21, 2024
Gemini Links 21/11/2024: Alphabetising 400 Books and Giving the Internet up
Links for the day
Links 21/11/2024: TikTok Fighting Bans, Bluesky Failing Users
Links for the day
Links 21/11/2024: SpaceX Repeatedly Failing (Taxpayers Fund Failure), Russian Disinformation Spreading
Links for the day
Richard Stallman Earned Two More Honorary Doctorates Last Month
Two more doctorate degrees
KillerStartups.com is an LLM Spam Site That Sometimes Covers 'Linux' (Spams the Term)
It only serves to distract from real articles
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, November 20, 2024
IRC logs for Wednesday, November 20, 2024
Gemini Links 20/11/2024: Game Recommendations, Schizo Language
Links for the day
Growing Older and Signs of the Site's Maturity
The EPO material remains our top priority
Did Microsoft 'Buy' Red Hat Without Paying for It? Does It Tell Canonical What to Do Now?
This is what Linus Torvalds once dubbed a "dick-sucking" competition or contest (alluding to Red Hat's promotion of UEFI 'secure boot')
Links 20/11/2024: Politics, Toolkits, and Gemini Journals
Links for the day
Links 20/11/2024: 'The Open Source Definition' and Further Escalations in Ukraine/Russia Battles
Links for the day
[Meme] Many Old Gemini Capsules Go Offline, But So Do Entire Web Sites
Problems cannot be addressed and resolved if merely talking about these problems isn't allowed
Links 20/11/2024: Standing Desks, Broken Cables, and Journalists Attacked Some More
Links for the day
Links 20/11/2024: Debt Issues and Fentanylware (TikTok) Ban
Links for the day
Jérémy Bobbio (Lunar), Magna Carta and Debian Freedoms: RIP
Reprinted with permission from Daniel Pocock
Jérémy Bobbio (Lunar) & Debian: from Frans Pop to Euthanasia
Reprinted with permission from Daniel Pocock
This Article About "AI-Powered" is Itself LLM-Generated Junk
Trying to meet quotas by making fake 'articles' that are - in effect - based on plagiarism?
Recognizing invalid legal judgments: rogue Debianists sought to deceive one of Europe's most neglected regions, Midlands-North-West
Reprinted with permission from Daniel Pocock
Google-funded group distributed invalid Swiss judgment to deceive Midlands-North-West
Reprinted with permission from Daniel Pocock
Gemini Links 20/11/2024: BeagleBone Black and Suicide Rates in Switzerland
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, November 19, 2024
IRC logs for Tuesday, November 19, 2024