Bonum Certa Men Certa

Links 7/11/2021: qBittorrent 4.3.9, Chimera Linux, and Much More

  • GNU/Linux

    • Desktop/Laptop

      • System76 Reportedly Developing Their Own Rust-Written Desktop, Not Based On GNOME

        System76's Pop!_OS Linux distribution already has their own "COSMIC" desktop that is based on GNOME, but moving ahead they are working on their own Rust-written desktop that is not based on GNOME or any existing desktop environment.

        Stemming from a Reddit discussion over the possibility of seeing a KDE flavor of Pop!_OS, it was brought up by one of their own engineers they are working on their "own desktop".

    • Server

      • Google Unveils Knative 1.0 Serverless Computing Platform

        Google has stable release of the platform announced a Knative 1.0 , designed to create a infrastructure serverless computing deployed on top of a container isolation system based on the Kubernetes platform. In addition to Google, companies such as IBM, Red Hat, SAP and VMware are also involved in the development of Knative. The release of Knative 1.0 marked the stabilization of the API for application development, which from now on will not change and will remain backward compatible. The project code is written in the Go language and is distributed under the Apache 2.0 license.

        The Knative platform launches prepared containers as needed (the application is not tied to any specific container), organizes management and provides scaling of environments required to perform functions and applications. The platform can be deployed at its own facilities without being tied to external cloud services. Only Kubernetes is required to run. Tools are provided to support a variety of common frameworks, including Django, Ruby on Rails, and Spring. The can be used to control the operation of the platform command line interface .

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.15.1
      • Linux 5.14.17
      • Linux 5.10.78
      • Linux 5.4.158
      • Linux 4.19.216
      • Intel's Habana Labs Continues Improving Their AI Accelerator Driver Stack With Linux 5.16

        The "char/misc" changes have landed in Linux 5.16 as the catch-all area for code not fitting more appropriately within another subsystem or being a portion of the kernel that's too small for submitting pull requests directly to Linus Torvalds. For Linux 5.16, the IIO code has moved from being part of the staging area also maintained by Greg Kroah-Hartman to now being under the char/misc umbrella. Additionally, another big item is the Intel Habana Labs driver updates.

        The Habana Labs kernel driver for supporting their Goya and Gaudi AI hardware continues to be part of the char/misc area with not yet having a formal "accelerator" subsystem short of the GPU/DRM area for the growing number of AI inference/training accelerators coming to market.

    • Applications

    • Instructionals/Technical

      • Anatomy of a Terminal Emulator

        The terminal is a ubiquitous platform that has been fairly stable for many years. There are plenty of resources out there for understanding its inner workings, but most of them are either fairly arcane or offer deep knowledge about a very specific area. This post aims to bridge this gap by offering a gentle and broad introduction to the terminal emulator as a platform for development.

        We’ll talk about the different parts of the terminal and how they interact, build a small program to read input from the shell and understand how it’s interpreted, discuss how to create a user interface in the terminal and finally see how we can use all of this to cause some mischief.

        I’ve used Rust for code examples, but tried to make them as simple and short as possible so that they’ll also be comprehensible to non-Rust programmers. I also provided explanations of the relevant parts of the code. We refer to the workings of terminal emulators in a unix or unix-like system (eg. Linux and macOS). Some parts might also be relevant to other operating systems.

        While this is aimed at those new to developing terminal applications, I tried to go into enough depth in certain areas to keep things interesting for old terminal hounds as well. If you found a mistake in this post, or feel something has been over-simplified or hand-waved away, feel free to hit me up on Twitter.

      • How to install KDE Connect on Ubuntu 20.04 LTS

        KDE Connect is an open-source platform to integrate some feature of your phone directly into your PC. In simple words, it is a Linux application that is also available for Windows and macOS (not officially) to connect smartphones with PC or laptops. Currently, it is available for Android only, well iOS version does not officially exist.

        Well, KDE Connect is implemented with a server service that runs on the desktop device and a client application on the mobile device, which interact with each other via a secure network protocol. So, that the user can easily transfer data using a local network.

      • How Do I Use Elasticsearch in Python?

        Elasticsearch is a free and open-source, highly available search and analytics engine built on the Apache Lucene project. Elasticsearch stores its data in JSON format, making it very easy to use.

        It provides a simple and powerful REST API for performing a collection of tasks from creating documents, monitoring cluster health, and more.

        Python is one of the most popular programming languages, and it tends to complement Elasticsearch very well.

        In this guide, we will look at how to go about using the Elasticsearch Python client to interact with the Elasticsearch cluster.

      • How Do I Set Up Elasticsearch Curator?

        Elasticsearch curator, or simply curator, is a tool that allows you to manage your Elasticsearch cluster easily. Written in Python, the curator comes in handy when you need to manage your ELK indices and snapshots.

        This guide will show you how to set up and configure the Elasticsearch curator for your ELK cluster.

      • How to Install and Use OpenSnitch Firewall in Linux?

        This article will cover a guide on installing and using OpenSnitch Firewall in Linux. OpenSnitch is a free and open source port of a proprietary firewall solution called LittleSnitch and implements most of its functionality. It can apply firewall rules system wide and can be used to block hosts as well as individual applications.

      • How to Create Table in SQLite Using “if not exists” Statement?

        SQLite is a serverless RDBMS, which is used to manage data in the database in the form of tables. These tables are created in the database to store data in columns and rows, for this purpose, tables can either be created using the “CREATE TABLE” or the “CREATE TABLE if not exists” statement in SQLite.The “CREATE TABLE if not exists” statement is very useful in creating a table because it will not create the table if the table of the same name already exists in the database. In this writeup, we will explain how the “CREATE TABLE if not exists” works, and what happens if we try to create a table without using the “CREATE TABLE if not exists”.

      • How to Create Table in SQLite?

        The “CREATE TABLE if not exists” statement is very useful in creating a table because it will not create the table if the table of the same name already exists in the database. This article explains how to create a table using the “if not exists” clause in SQLite. A general syntax on how to create a table using “if not exists” and an example is also provided in this tutorial.

      • How Do I Concatenate in SQLite?

        SQLite is used to manage the data of a database, in which the website’s or application’s data is stored in the form of tables. Like MySQL, SQLite also supports a lot of built-in functions like max(), min(), but many functions that are supported by MySQL, not supported by SQLite.

        SQLite is a database management system, which is available free of cost, and also its architecture is much simpler as compared to other database management systems. The main feature of SQLite, it is serverless, which means it uses the server of a machine or Operating System on which it is being operated, instead of using its own server.

        This write-up is focussing on how to concatenate strings in SQLite. Does concatenate function work in SQLite? Let’s find out.

      • Aggregate Functions in SQLite

        There are many database management systems that are being used to manage the data of a website or an application like MySQL and SQLite. SQLite, like other RDMS, contains many built-in functions which make managing databases easier, like aggregate functions. In this article, we will learn about the aggregate functions in SQLite by implementing those functions in some examples.

      • How to use Ubuntu Livepatch

        The Ubuntu Livepatch service takes care of keeping your Ubuntu systems up to date with essential kernel updates, saving you time and effort. It is a tool that enables companies to patch Ubuntu Linux kernel vulnerabilities immediately. The live patch utility lets you directly patch the running kernel, eliminating the need to reboot your system. This feature was first added in Ubuntu 16.04 LTS, generally designed for servers expected to operate continuously without rebooting for months and years. This article will explain in detail how you can apply the live patch on Ubuntu OS.

      • How to Install and Use EasyOCR in Linux

        This article will cover a guide on installing and using the EasyOCR command line tool and Python module. Available as a free and open source application, It can be used to identify and extract text from images. It uses Optical Character Recognition (OCR) technology and a variety of different algorithms and language models to detect the text.

      • How to Install and Configure KVM on Debian 11 Bullseye Linux

        “KVM”, the abbreviation for “Kernel Virtual Machine” is the hypervisor of the Linux kernel. It is quite popular and used in enterprises for easily performing the virtualization of operating systems. Here in this tutorial, we learn the steps and commands to install and enable KVM Hypervisor on Debian 10 or 11 Bullseye Server or Desktop Linux.

        Since 2007, KVM is an official kernel component, however, as compared to Xen, the other open-source hypervisor, the history of KVM is less changeful and has only been steeply upward from the start. KVM is also the preferred hypervisor in OpenStack and is therefore widely used in the cloud.

      • Installing Virtualbox App on Debian 11 Bullseye - Linux Shout

        Oracle VirtualBox is a hypervisor for x86 virtualization application that allows users to create and manage Virtualization on Windows, Linux, macOS, and FreeBSD. It is an open-source project and here we learn the commands to install the VirtualBox software platform on Debian 11 Bullseye Linux.

        Virtualization is a software technique that simulates hardware. In this way it is possible, for example, to operate several virtual computers under Windows, on which other operating systems can then be installed. Virtualization uses a shift model, because at the end of the day, of course, the actual installed hardware is also used in a virtual computer, but the trick is that the virtual guests can be used like programs on a normal system. So it is possible to operate several Linux systems in parallel with VirtualBox under Windows. The other way around, you can also set up a virtual Windows with VirtualBox on a Linux system.

      • Configure BIND DNS Server using Webmin on Debian 11 -

        Welcome to out tutorial on how to configure Bind DNS server using Webmin on Debian 11. Webmin is a web-based control panel that allows system administrators to administer system administration tasks from web user interface.

        You can follow the link below to install Webmin on Debian 11.

      • NextCloud: Enable video previews - Anto ./ Online

        This guide will show you how to enable video previews on NextCloud hosted on Debian/Ubuntu. You can apply the same steps if running the Docker version of NextCloud or different distribution.

      • Getting Started with Docker: Run Docker without sudo - LinuxLinks

        Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers.

        A container is software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. A Docker container image is a lightweight, standalone, secure, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries, and settings.

      • Building the Linux Kernel in a GitLab Runner | Adam Young’s Web Log

        Git Lab provides a mechanism to run workloads triggered by a git commit. We try to let the automation do as much work as possible before interrupting a human code reviewer. We want to know if the code is right in as objective a manner as possible before we take the expensive context switch to perform a code review.

        We can think of the set of tasks in a three step process. The first step is fast up front checks. The second is long programmatic correctness checks. The final is regression tests. There is a natural ordering between these, and they also progress in an increasing order of time and resource commitments.

        The Linux Kernel is a C program, and the long, programmatic correctness check is the compile and link processes. It is worthwhile to think in terms of the third level tests, though, and package up the result of the compilation for later install on a wide array of systems based on a binary packaging format, either RPM or .DEB. We’re testing on Fedora, so we need an rpm.

      • How to rsync files between two remotes?

        scp -3 can copy files between two remote hosts through localhost. This comes in handy when the two servers cannot communicate directly or if they are unable to authenticate one to the other.1 Unfortunately, rsync does not support such a feature. Here is a trick to emulate the behavior of scp -3 with SSH tunnels.

        When syncing with a remote host, rsync invokes ssh to spawn a remote rsync --server process. It interacts with it through its standard input and output. The idea is to recreate the same setup using SSH tunnels and socat, a versatile tool to establish bidirectional data transfers.

        The first step is to connect to the source server and ask rsync the command-line to spawn the remote rsync --server process. The -e flag overrides the command to use to get a remote shell: instead of ssh, we use echo.

      • OpenFaaS: Getting started tutorial on Kubernetes - Anto ./ Online

        OpenFaaS ( Function as a Service) is a popular serverless framework. It provides an easy way to create portable functions, microservices, and APIs using Kubernetes and Docker. This tutorial guide will serve as your OpenFaaS introduction to get you up and running quickly.

      • How to create snapshots in openSUSE with YaST2 - TechRepublic

        OpenSUSE is yet another outstanding Linux distribution that has plenty to offer. Many believe openSUSE is one of the best flavors of Linux for business desktop use cases. One of the many reasons for that is the built-in snapshot tool made possible by a combination of the btrfs file system and the YaST2 snapper plugin.

      • Linux 101: What tech pros need to know
      • How to Install and configure Jenkins on CentOS 8 / RHEL 8 - Unixcop the Unix / Linux the admins deams

        Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration and continuous delivery.

        Jenkins is based on Java and helps with every part of the software development process.

        Jenkins is a server-based system that runs in servlet containers such as Apache Tomcat. It supports version control tools, including AccuRev, CVS, Subversion, Git, Mercurial, Perforce, ClearCase and RTC, and can execute Apache Ant, Apache Maven and sbt based projects as well as arbitrary shell scripts and Windows batch commands.

      • How To Upgrade Ubuntu To 22.04 LTS Jammy Jellyfish

        Ubuntu 22.04 LTS Jammy Jellyfish is due to release on April 21, 2022. However, users of Ubuntu 21.10 are able to upgrade to the latest release right now.

        In this tutorial, we will cover the step by step instructions to upgrade your Ubuntu system to version 22.04 Jammy Jellyfish, which is the latest long term support release.

    • Wine or Emulation

      • Wine 6.21 and Wine staging 6.21 Released

        An experimental branch of the open implementation of WinAPI – Wine 6.21 has been released . Since the release of version 6.20, 26 bug reports have been closed and 415 changes have been made.


        The new release provides synchronization with the Wine 6.21 codebase. 5 patches related to the implementation of the uiautomationcore DLL, handling mouse movement in winex11.drv, adding critsection.c to ntdll and a test suite for ntdll have been transferred to the main Wine composition. Updated patches user32-rawinput-mouse . A patch has been added that attaches the “.exe” string to the mask in case of an unsuccessful search in the registry.

    • Games

      • Open source game development levels up with Godot Engine 3.4 out now

        Probably the most exciting free and open source game engine around, Godot Engine has a brand new release available.

        Comprising of thousands of improvements across what looks like all areas, they said it themselves that listing everything would be pretty much impossible.

        A lot of work is currently going into Godot 4.0, which is the release that will bring Vulkan support and massive improvements to the rendering system. Even so, Godot 3.x remains popular and supported so they're keeping up with these releases for now to give game developers a nicer experience. Godot 3.4 is also compatible with previous Godot 3.3.x projects and it'

    • Desktop Environments/WMs

      • LXQt 1.0.0 Lightweight Desktop Arrived, Here’s How it Looks Like

        For fans of LXQt or those still looking for a lightweight Qt5 desktop, LXQt 1.0.0 is out as the latest version of this desktop environment.

        LXQt is a free, open source, lightweight, and user-friendly desktop environment built using the Qt libraries. It consists of many small individual components like a panel program, session manager, hotkey daemon and a few more. LXQt was formed as a merger between the LXDE and Razor-Qt desktop environments. Here’s the project’s website.

        Often LXQt has been seen as the fastest desktop today, beating KDE Plasma, GNOME, and Xfce in terms of performance, responsiveness, and storage footprint. It is used by operating systems that aren’t looking for a lot of customization or productivity options, but instead are focused on performance. Just under seven months after the earlier version, the LXQt development team have released LXQt 1.0.0. That said, let’s quickly take a look at what’s new.

      • K Desktop Environment/KDE SC/Qt

        • [Older] Plasma 25th Anniversary Edition released

          I’ve used every release of KDE extensively, and its developers have every right to be damn proud of the amazing collection of frameworks and applications they’ve built. As with everything, KDE is not for everyone, but there’s no denying it’s a versatile, attractive, extensible, and fun to use environment.

    • Distributions

      • Arch and Ubuntu Comparison and Review

        For different tasks, we need a computer and for operating a computer, we need some operating system like Windows, macOS, and Linux. Where Linux further contains a list of distributions like Arch, Ubuntu, Fedora, Debian, and Kali Linux. In this article, we will make a comparison between Arch and Ubuntu, but before making any comparison, let us discuss some overview of Ubuntu and Arch.

      • BSD

        • Chimera Linux: a Linux distribution based on FreeBSD userland and LLVM

          This project is still very early in its development, but it’s an interesting premise. It’s developed by Daniel Kolesa, who also contributes a lot to Void Linux, most notably the excellent POWER/PowerPC port of that excellent distribution. Over on Twitter, Kolesa regularly posts updates on the status of Chimera, and even though some of the stuff definitely is above my pay grade, it’s quite interesting to follow along.

      • SUSE/OpenSUSE

        • SUSE announces Linux Enterprise Micro 5.1

          SUSE a provider of enterprise-grade open source solutions, has announced the availability of SUSE Linux Enterprise (SLE) Micro 5.1, a lightweight and secure operating system built for containerised and virtualised workloads. SLE Micro 5.1 adds edge-focused security features such as secure device onboarding and live patching, and it enables the modernising of workloads with support for IBM Z and LinuxONE.

        • openSUSE Leap vs Tumbleweed: What’s the Difference?

          openSUSE is a very popular Linux distros, especially in the enterprise world. SUSE has been around in one form or another since 1996. During most of that time, they have only had one version.

          Then, in 2015, they changed things up and decided to offer two versions: Leap and Tumbleweed.

          If you are new to openSUSE, it is easy to get confused between Tumbleweed and Leap. A reader recently asked us to explain the similarities and difference between the two, that’s just what we’ll do today.

      • Canonical/Ubuntu Family

        • [Older] Ubuntu 21.10 Impish Indri
        • Ubuntu 22.04 Download

          Ubuntu 22.04 LTS Jammy Jellyfish is now available for download! This is a Long Term Support version, which is due to release on April 21, 2022.

          In this tutorial, we will provide you with the download links for Ubuntu 22.04. If you are already running an older version of Ubuntu, it’s possible to upgrade Ubuntu to 22.04. Otherwise, follow the links below to download Ubuntu 22.04.

        • Ubuntu 22.04 Features and Release Date

          In this article you will learn about some Ubuntu 22.04 features of the upcoming Ubuntu stable release. Canonical’s latest iteration to the Ubuntu operating system is Ubuntu 22.04 Jammy Jellyfish, scheduled for release on April 21, 2022. This is an LTS (long term support) release – the type of release that Canonical only publishes every two years, and continues to support for the next five.

          In this article, we’re going to go over some of the features we’re most excited about, and cover a lot of the differences between Jammy Jellyfish and Ubuntu’s previous LTS release, Focal Fossa. Read on as we take you through some of the upcoming changes.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • SaaS/Back End/Databases

        • How to use $eq operator in MongoDB

          MongoDB is a database management system to store and retrieve a bulk amount of data in an effective manner. Like other databases, MongoDB also has several data manipulation commands and operators that can be used to store as well as retrieve data from a collection of documents. Several commonly used operators in MongoDB include $eq, $lt, $and, $or etc. These commands and operators relate to other databases as well; for instance, the $eq operators perform the same operation as where clause in SQL databases.

          In this article, a Comparison Query Operator operator $eq will be explained in the context of MongoDB:

        • How to use $all operator in MongoDB

          MongoDB is a NoSQL database that provides extensive support of operator classes to help in retrieving data. The $all operator falls under the category of an array operator class. As the name of $all (all operators in MongoDB) indicates, it is used to get the document from a database collection if it matches all the values in an array field. Moreover, the $all operator also provides support to match nested arrays if present in any field. In this article, a brief insight into usage of $all operator in the context in MongoDB is provided.

        • How to sort documents by date in MongoDB

          MongoDB belongs to the NoSQL category of databases and thus it stores data in JSON format. In database management systems, the sorting phenomenon is used to retrieve documents in a sequential manner. The sort by date support of MongoDB helps to get the documents that are arranged according to the date field.

          As, sorting can be performed either in ascending or descending manner; similarly, the sort by date also allows retrieving documents in both orders. After getting through this post, you’ll be able to apply the sort by date functionality in MongoBD.

        • What are the valid MongoDB datatypes

          MongoDB is a widely used non-relational database management system. The data storing mechanism of MongoDB (or any other database) strongly relies on the data types supported by that database management system. MongoDB stores data in the form of BSON, which is a binary-encoded format of JSON as its name is also derived from “Binary” and “JSON”. The data types that BSON supports are considered valid for MongoDB.

          This article of the MongoDB series will provide detailed information about the data types used in MongoDB. But before that, let’s have a comparison of JSON format and its binary extension BSON.

        • How to use where Operator in MongoDB

          MongoDB provides a strong querying system supported by several commands and operators. There exists a long list of operators (like $size, $where, $gt, $regex, and many more) that have extended the MongoDB use to fulfill the basic functionality of any database. The $where operator belongs to the evaluation query operators class and can be exercised to pass a JavaScript-based string or JavaScript function. The $where operator is used in MongoDB to get only those documents that match JavaScript expressions.

          In this descriptive post, we have provided an insight into the usage of $where operator in context of MongoDB.

        • How to use findOneAndUpdate method in MongoDB

          MongoDB supports multiple functions that are used to process data in databases. In any database, the data updating process is inevitable and is performed frequently. The findOneAndUpdate method is used to update a single document that matches the condition, and this method is an extension of the core update method of MongoDB.

          The findOneAndUpdate() method returns the document after the update, whereas the updateOne() method of MongoDB also updates one document but it does not return any document.

          In this article, you will learn to understand and apply the findOneAndUpdate() method of MongoDB to match and update a single document.

        • Splunk’s Simon Eid joins MongoDB in APAC lead role

          Eid, who was with software solutions provider Splunk for six years, has 25-plus years of sales and business management experience, having held leading positions at a variety of enterprise technology organisations including Dell EMC and Symantec.

      • FSF

        • Licensing/Legal

          • [Old] The Greatest OS That (N)ever Was

            GNU's aim was to write a complete "free" version of Unix - the kernel and all the associated elements - that is, one that gives users the freedom to share and change software but not add restrictions and impose them on others. With the Linux kernel, Stallman says, "the available free software added up to a complete system."

            Rather than wait for someone to write applications designed specifically for his operating system, Linus tweaked Linux to perfectly fit GNU's pre existing apps. "I never ported programs," Linus says. "I ported the kernel to work with the programs. Linux was never the primary reason for anything - user programs have always been the reason."

      • Openness/Sharing/Collaboration

        • Open Access/Content

          • Free and Best OSINT Tools 2021

            OSINT or Open source intelligence refers to information about businesses or people that can be collected from online sources. However, it requires tools to do so, and here are the 10 best OSINT Tools for 2020.

            It’s only natural that we feel the need to weed out what’s most valuable in the age of information digitalization. Organizations use a variety of paid and unpaid methods and services to accomplish this. The latter group is part of the open-source intelligence (OSINT) area, and it can be extremely useful.

          • Having an impressive impact on Wikimedia is a positive influence for me – Sam Oyeyele

            Sam Oyeyele is one of the key figures for Wikipedia in Nigeria. Over the years, he has firmly positioned his status as a poster child for the Wikimedia movement, not just in Nigeria, but the African continent as a whole.

          • Separating Ideas From Words | Hackaday

            We covered Malamud’s General Index this week, and Mike and I were talking about it on the podcast as well. It’s the boldest attempt we’ve seen so far to open up scientific knowledge for everyone, and not just the wealthiest companies and institutions. The trick is how to do that without running afoul of copyright law, because the results of research are locked inside their literary manifestations — the journal articles.

            The Index itself is composed of one-to-five-word snippets of 107,233,728 scientific articles. So if you’re looking for everything the world knows about “tincture of iodine”, you can find all the papers that mention it, and then important keywords from the corpus and metadata like the ISBN of the article. It’s like the searchable card catalog of, well, everything. And it’s freely downloadable if you’ve got a couple terabytes of storage to spare. That alone is incredible.

      • Programming/Development

        • 10 eureka moments of coding in the community |

          If you've written code, you know it takes practice to get good at it. Whether it takes months or years, there's inevitably a moment of epiphany.

          We wanted to hear about that time, so we asked our community to share about that time they sat down and wrote code that truly made them proud.

        • Announcing the new

          We are pleased to announce the launch of the new website!

          The design and content are roughly the same as the old website. The most notable changes are: [...]

        • Tech focus: Software tools | Scientific Computing World

          Software tools are an essential part of the HPC ecosystem, for both scientists and all potential HPC users. While there are a huge number of different categories of tools available to the HPC community, the exascale projects in the US and Europe are focused on the development of open source software, or software that can facilitate the use of a wide range of resources.

        • Complexity is killing software developers | InfoWorld

          The shift from building applications in a monolithic architecture hosted on a server you could go and touch, to breaking them down into multiple microservices, packaged up into containers, orchestrated with Kubernetes, and hosted in a distributed cloud environment, marks a clear jump in the level of complexity of our software. Add to that expectations of feature-rich, consumer-grade experiences, which are secure and resilient by design, and never has more been asked of developers.

        • Add to Array in Ruby

          When it comes to storing related and non-complex information in a program, arrays always come up. Arrays are a collection of an ordered list of items. Using arrays, you can store related values in a single variable, making your code efficient and easy to manage. In Ruby, arrays contain lots of built-in methods, making working with list data much more effortless.

          This article describes various methods you can use to add items to an array in Ruby.

        • PHP

          • PHP Strtotime() Function

            The UNIX timestamp value is calculated from 1st January 1970. The strtotime() is a built-in PHP function to convert human-readable date and time values into UNIX timestamp values. The way to use this function in PHP for different purposes has shown in this tutorial with examples.

          • PHP Sprint() Function

            The sprint() function of PHP works like the printf() function. Both functions generate the formatted output, but one difference between these functions is that the output of the sprinf() function is stored into a variable, and the output of the printf() function is displayed in the browser. How sprint() function works and the uses of this function is shown in this tutorial.

          • Split PHP String

            Sometimes we need to divide the string data based on the particular separator for programming purposes. Many ways exist in PHP to do this task. Three built-in functions of PHP that can be used to split string data are explode(), str_split(), and preg_split(). These functions create an array by dividing the string value based on the particular delimiter or pattern. How these functions work and the uses of these functions to split PHP strings have shown in this tutorial.

          • PHP If..Else Statements

            The conditional statement is used to execute the block of statements based on the particular condition. The ‘If..else’ statement is one type of condition statement that works with the particular condition(s). Different types of ‘if..else’ statements can be used in PHP for implementing conditional statements. These are mentioned below.

          • PHP Associative Array

            Mainly two types of the array can be created in any programming language. One is a numeric array and another is an associative array. Each value of an array is accessible by the index of that value. The index value is not required to define for numeric array and the sorted numeric index is generated automatically for this array if no index is defined. If it is required to create a particular string value for each index of the array, then the associative array is used to do the task.

            PHP associative array can contain a number or both number and string in the index value. The user-defined index is used in an associative array. The ‘=>’ is used to assign the key-value pair of the associative array in PHP. The way to define and use associative array in PHP was shown in this tutorial.

        • Python

          • How to use python csv writer

            In this blog, we will see how we can use the python csv writer to write the list data to csv.

          • I just want to run this one Python script |

            So I couldn't sleep the other night, and my brain wanted to think about odd problems…

            Ever had a script that's compatible with both, Python 2 and 3, but you didn't want to bother the user to know which interpreter to call? Maybe because the script is often used in environments where only one Python is available and users just expect things to work? And it's only that one script file, no package, no additional wrapper script, nothing.

            Yes, this is a rather odd scenario. And yes, using Python doesn't make it easier, but trust me, you wouldn't want to implement the same in bash.

            Nothing that you will read from here on should ever be actually implemented, it will summon dragons and kill kittens. But it was a fun midnight thought, and I like to share nightmares!

            The nice thing about Python is it supports docstrings, essentially strings you can put inside your code which are kind of comments, but without being hidden inside commnent blocks. These are often used for documentation that you can reach using Python's help() function. (Did I mention I love help()?)

  • Leftovers

    • Science

      • Comparing photosynthetic differences between wild and domesticated rice

        Millions of people in Asia are dependent on rice as a food source. Believed to have been domesticated as early as 6000 BCE, rice is an important source of calories globally. In a new study, researchers compared domesticated rice to its wild counterparts to understand the differences in their photosynthetic capabilities. The results can help improve future rice productivity.

        Wild rice species Oryza rufipogon and Oryza nivara are typically weed-like and are taller than cultivated rice Oryza sativa. While these features are helpful in the wild, since they can shade out competitors, they are unfavorable in an agricultural setting and can lead to lower yields. Through domestication and breeding, many rice varieties have been selected to be short with erect leaves that have steep angles, which allows better light distribution through the canopy. Despite these improvements, the distribution is uneven and is affected by changes in wind and cloud cover.

    • Hardware

      • VIA To Offload Parts of x86 Subsidiary Centaur to Intel For $125 Million

        As part of their third quarter earnings release, VIA Technologies has announced this morning that the company is entering into an unusual agreement with Intel to offload parts of VIA’s x86 R&D subsidiary, Centaur Technology. Under the terms of the murky deal, Intel will be paying Centaur $125 million to pick up part of the engineering staff – or, as the announcement from VIA more peculiarly puts it “recruit some of Centaur's employees to join Intel,” Despite the hefty 9-digit price tag, the deal makes no mention of Centaur’s business, designs, or patents, nor has an expected closing date been announced.

        A subsidiary of VIA since 1999, the Austin-based Centaur is responsible for developing x86 core designs for other parts of VIA, as well as developing their own ancillary IP such as deep learning accelerators. Via Centaur, VIA Technologies is the largely aloof third member of the x86 triumvirate, joining Intel and AMD as the three x86 license holders. Centaur’s designs have never seen widescale adoption to the extent that AMD or Intel’s have, but the company has remained a presence in the x86 market since the 90s, spending the vast majority of that time under VIA.

      • 3D-printed Fan Mount Keeps Server GPU Cool In Desktop Case | Hackaday

        Most readers of Hackaday will be well aware of the current shortages of semiconductors and especially GPUs. Whether you’re planning to build a state-of-the art gaming PC, a mining rig to convert your kilowatt-hours into cryptocoins, or are simply experimenting with machine-learning AI, you should be prepared to shell out quite a bit more money for a proper GPU than in the good old days.

        Bargains are still to be had in the second-hand market though. [Devon Bray] chanced upon a pair of Nvidia Tesla K80 cards, which are not suitable for gaming and no longer cost-effective for mining crypto, but ideal for [Devon]’s machine-learning calculations. However, he had to make a modification to enable proper thermal management, as these cards were not designed to be used in regular desktop PCs.

      • ‘Tiny Wake-Up Light Is Hugely Bright | Hackaday

        Let’s face it — waking up is rough no matter what time of year it is. But the darkness of fall and winter makes it so much worse. In the past, [Maarten] has used music with increasing volume, but depending on the setup, it can be dodgy if you want to hear a different song each day and don’t have all your files volume-leveled.

        Wake Up Bright is the latest in a line of wake-up widgets [Maarten] has made to help rouse them in the morning. Their write-up covers all ideas they’ve had on the subject over the years, as well as the electronics, firmware, debugging, and all the upgrades made after using it for awhile.

      • Cheap DIY Mic Sounds (And Looks) Damn Good | Hackaday

        As any musician, podcaster, or youtuber will be quick to tell you, there’s no substitute for a good microphone. They’ll also be quick to tell you all about their favorite microphone, why it’s better than all the others, and how much it cost (oh, and how round it sounds, whatever that means). But what if you could build your own that sounds as good, if not better, and do it for only $30?

        That’s what [Matt] from DIY Perks set out to discover when he built his DIY USB-C Microphone. He was able to source the same microphone capsule that can be found in his high-end, $600 CAD E100S, and built a simple pre-amplifier that bumps its quiet output up to line-level. He even connected it to the mic module with some custom cable made from two tiny enameled wires that won’t transmit bumps and vibrations, wrapped inside desoldering braiding which acts as a shield. He fed the output from the pre-amp into a cheap USB audio interface and viola! — top-notch sound for next to nothing. Make sure you check out the video below to hear a comparison between the mic and its professional counterparts.

      • SPAM-1 Is A Well-Documented Discrete CPU With An Impressive Software Library | Hackaday

        Here at Hackaday we love projects that are so well-documented that you can spend days reading up on what the designer has achieved. [John Lonergan] didn’t disappoint when he designed the SPAM-1, an 8-bit CPU built from discrete logic gates. His detailed log contains a wealth of information on such things as designing opcodes, optimizing program counter logic, running a digital simulation, as well as his thoughts on microcode design. The sheer volume of it may be a bit off-putting to beginners, so it might be best to start with the video series that describes the architecture and goes into detail on several sub-blocks.

        The design has changed a bit since [John] first started on the project, as he decided to add more and more features, but the final result is a well-thought out architecture that keeps the simplicity needed for discrete hardware but still has enough features to keep it interesting for seasoned CPU aficionados. The instruction size is rather large (48 bits) to simplify the instruction decoding at the expense of larger code size. Conditional jump instructions are not present; instead, all instructions have an optional control flag to make them conditional, a feature inspired by the ARM instruction set.

    • Health/Nutrition

    • Integrity/Availability

      • Peeking through logs

        Then, one part of the article caught my eye:

        I assume each and every message could itself be malicious. I treat inspecting the log files with care. If any system was compromised, an attacker could theoretically pivot to other systems via carefully crafted malicious syslog messages. Would anyone do this? I doubt it.

        Brace yourselves, for what follows is a recount of a case I've helped solve where the initial attack was performed via a carefully crafted syslog message and a tiny bit of social engineering.

        Before I go into details, I have to mention that I am not at liberty to disclose the exact details, I cannot go into deeper specifics. So read what follows with that in mind. If something isn't clear, that's probably because I cannot clear it up without breaching confidentiality.

        With that out of the way, lets set the stage!

      • Proprietary

        • Tesla Is Recalling Nearly 12,000 Vehicles Due To Software Glitch
        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • Linux Foundation enhances LFX Security platform | IT World Canada News

                The Linux Foundation has enhanced its free LFX Security vulnerability detection toolkit so open-source projects can secure their code and reduce non-inclusive language.

                On Tuesday, the foundation said the LFX Security module now includes automatic scanning for secrets-in-code and non-inclusive language, adding to its existing comprehensive automated vulnerability detection capabilities.

        • Security

          • Likely Drone Attack On U.S. Power Grid Revealed In New Intelligence Report (Updated)

            U.S. officials believe that a DJI Mavic 2, a small quadcopter-type drone, with a thick copper wire attached underneath it via nylon cords was likely at the center of an attempted attack on a power substation in Pennsylvania last year. An internal U.S. government report issued last month says this is the first time such an incident has been officially assessed as a possible drone attack on energy infrastructure in the United States, but that this is likely to become more commonplace as time goes on. This is a reality The War Zone has sounded the alarm about in the past, including when we were first to report on a still-unexplained series of drone flights near the Palo Verde nuclear powerplant in Arizona in 2019.

          • wolfSSL cryptographic library 5.0.0 Released - LinuxStoney

            A new release of the compact cryptographic library is wolfSSL 5.0.0 now available IoT , optimized for use on embedded devices with limited processor and memory resources, such as devices, smart home systems, automotive information systems, routers and mobile phones. The code is written in C and is distributed under the GPLv2 license.

            The library provides high-performance implementations of modern cryptoalgorithms, including ChaCha20, Curve25519, NTRU, RSA, Blake2b, TLS 1.0-1.3 and DTLS 1.2, which, according to the developers, are 20 times smaller than the OpenSSL implementations. Both its simplified API and a layer for compatibility with the OpenSSL API are provided. There is support for OCSP (Online Certificate Status Protocol) and CRL (Certificate Revocation List) for checking certificate revocation.

          • Keyless signatures for blobs with cosign

            This whole process is called “keyless” signature or ambient credentials via workload identities. The word keyless can be a little bit misleading. It does and does not refer to the existence of a cryptographic key. Implementation-wise, there is a key. Otherwise, the whole private/public procedure would not work. But, on the same time you do not have to provide a secret for generating this key. The process is secretless; at least on the first look. On the second look you will realize that your Identity has become the secret.


            Next, we will use the public sigstore instance to generate a new signature via our OpenID and upload it to a public rekor instance. This feature is still experimental. I hope they will release it soon. During the process your browser will pop-up, forward you to the public sigstore instance and ask you for a login. If you login, cosign will use your OpenID to sign the file.

          • Privacy/Surveillance

            • [Old] Ten years of MAT

              Around 10 years ago, the 7th of June 2011, the first commit of MAT, the metadata anonymisation toolkit, was published. This was done as part as my Google Summer of Code, for the Tails project, under the umbrella of Tor and the EFF. My mentor was Mike Perry, but since he was super-duper-busy, intrigeri was my de facto mentor. I fondly remember writing the design proposal in completely broken English.

            • Meta to continue use of facial recognition feature

              Earlier this week, Facebook announced that it would be shutting down its facial recognition systems. But now, the social network's parent company Meta said that it would be using the same system for its metaverse products.

              Meta is already exploring ways to incorporate biometrics into its emerging metaverse business, which aims to build a virtual, [Internet]-based simulation where people can interact as avatars, reports Recode.

            • Facebook is backing away from facial recognition. Meta isn’t.

              Facebook says it will stop using facial recognition for photo-tagging. In a Monday blog post, Meta, the social network’s new parent company, announced that the platform will delete the facial templates of more than a billion people and shut off its facial recognition software, which uses an algorithm to identify people in photos they upload to Facebook. This decision represents a major step for the movement against facial recognition, which experts and activists have warned is plagued with bias and privacy problems.

              But Meta’s announcement comes with a couple of big caveats. While Meta says that facial recognition isn’t a feature on Instagram and its Portal devices, the company’s new commitment doesn’t apply to its metaverse products, Meta spokesperson Jason Grosse told Recode. In fact, Meta is already exploring ways to incorporate biometrics into its emerging metaverse business, which aims to build a virtual, [Internet]-based simulation where people can interact as avatars. Meta is also keeping DeepFace, the sophisticated algorithm that powers its photo-tagging facial recognition feature.

            • FCC Approves Boeing LEO Satellites, Esri Pilots Broadband Data Program, ‘Dystopian’ Metaverse

              “Facebook should not be allowed to create a dystopian metaverse,” Roger McNamee, a former investor and mentor of Mark Zuckerberg, said Thursday about the company’s plans, following the company’s change of name to Meta. McNamee has emerged as a regular critic of Facebook after he started to see more misinformation on the platform, the BBC reports.

              “There’s no way that a regulator or policymaker should be allowing Facebook to operate there [in the metaverse] or get into cryptocurrencies,” he said. “Facebook should have lost the right to make its own choices. A regulator should be there giving pre-approval for everything they do. The amount of harm they’ve done is incalculable.”

            • Facebook's metaverse plans labelled as 'dystopian' and 'a bad idea'

              Mr McNamee became a critic of Facebook as he began to see more misinformation on the platform. He said he was not convinced the metaverse would be safe in chief executive Mark Zuckerberg's hands.

            • €» Edward Snowden – Permanent Record – democracy + mass surveillance is no democracy – “the cloud” largely a DELL and CIA invention – Snowden and Socrates thinkers of society |

              if big data about every keystroke every step we make (the police: every step you make) algorithms determine how mankind will live


              ‘”You are aware of the fact that somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off,” he said. “You know this, I hope? Yes? Well, you should.”

              “It is really very nearly within our grasp to be able to compute on all human generated information,” Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don’t even know they are creating.

              “You’re already a walking sensor platform,” he said, nothing that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities.’

              “Technology in this world is moving faster than government or law can keep up,” he said. “It’s moving faster I would argue than you can keep up: You should be asking the question of what are your rights and who owns your data.”

    • Defence/Aggression

      • Opinion | Alternatives to the Pentagon's China Nightmares

        I'm embarrassed for my friends when they make mistakes, not that I haven't made a few myself. Recently when the Pentagon issued its terrorizing annual report on China warning that by 2030 China's People's Liberation Army could have 1,000 nuclear warheads, a valued colleague commented that at this rate China will then have as many nuclear warheads as Albuquerque, New Mexico.

      • People Worldwide Name US as a Major Threat to World Peace. Here's Why.
      • David Morris: Maryland man exonerated on murder charges after nearly 17 years in prison - CNN

        David Morris has spent almost 17 years in prison for a murder that he didn't commit.

        On Wednesday, a judge threw out his conviction following a review of evidence that determined Morris was wrongfully charged and found guilty in 2005, according to the Office of the State's Attorney for Baltimore City.

        Baltimore Circuit Judge Charles Peters granted prosecutors' request to throw out Morris' old conviction after the Mid-Atlantic Innocence Project (MAIP) brought the case to the Baltimore City State's Attorney's Conviction Integrity Unit (CIU). The unit began a re-investigation in 2018, ultimately finding Morris should not have been convicted, according to the state's attorney's office.

    • Environment

      • More Than 100,000 Take to Streets on Global Day of Action for Climate Justice

        As diplomats from wealthy countries continue to say "blah, blah, blah" at COP26, over 100,000 people growing increasingly impatient with empty promises and inaction marched through Glasgow on Saturday, with thousands more hitting the streets in cities around the world during€ roughly 300 simultaneous demonstrations on a Global Day of Action for Climate Justice.

        "Many thousands of people took to the streets today on every continent demanding that governments move from climate inaction to climate justice," Asad Rehman, a spokesperson for the COP26 Coalition, said in a statement. "We won't tolerate warm words and long-term targets anymore, we want action now."

      • Tens of Thousands Throng Streets of Glasgow Demanding Climate Justice

        GLASGOW, SCOTLAND — Thousands of protestors marched through Glasgow today to demand action from world leaders and polluting companies, as the COP26 UN climate summit moves into its second week.

        Indigenous groups were front and centre of the demonstration, with one protestor calling them the “first true climate leaders”.

      • Opinion | Missing From the Climate Talks: Corporate Powers to Sue Governments That Limit Pollution

        International negotiators are meeting in Glasgow, Scotland to develop solutions to the climate change threat. But one major obstacle to global sustainability will be largely absent from the discussions: the investor-state dispute settlement (ISDS) system.

      • Opinion | Conservation or Land Grab? The Financialization of Nature

        A month before the 2021 United Nations Climate Change Conference (known as COP26) kicked off in Scotland, a new asset class was launched by the New York Stock Exchange that will "open up a new feeding ground for predatory Wall Street banks and financial institutions that will allow them to dominate not just the human economy, but the entire natural world." So writes Whitney Webb in an article titled "Wall Street's Takeover of Nature Advances with Launch of New Asset Class":

      • How might climate change affect European gastronomy?

        But in the long run deeper change seems likely. If temperatures rise unabated, farmers in northern Europe may find they can grow southern staples; polenta may invade Germany. And southern locavores may have to adapt. If tropical fruit continue to thrive in Sicily, could ham and pineapple pizza one day be considered authentically Italian?

      • It’s time to freak out about methane emissions

        In the public conversation about climate change, methane has gotten too little attention for too long. Many people may be unaware that humans have been spewing a greenhouse gas that’s even more potent than carbon dioxide into the atmosphere at a rate not seen in at least 800,000 years. It harms air quality and comes from sources as varied as oil and gas pipelines to landfills and cows. But methane and other greenhouse gases, including hydrofluorocarbons, ozone, nitrous oxides, and sulfur oxides, are finally getting the attention they deserve — thanks largely to advances in the science.

      • A new Supreme Court case could gut the government’s power to fight climate change

        In this scenario, hundreds of laws could be weakened or even deactivated. Many of them would be gone for good, and reenacting any of these laws would require passing legislation through a bitterly divided Congress.

        So West Virginia is a monster of a case — potentially the culmination of a conservative vision incubated at the Federalist Society for years, and long championed by conservative activists such as Justices Neil Gorsuch and Brett Kavanaugh. Indeed, a majority of the Court has already expressed sympathy toward Gorsuch’s plans to shrink the power of federal agencies, which is a strong sign that the West Virginia petitioners are likely to prevail on at least some of their claims.

      • Technology Fetishism Reigns at COP26. It'll Keep Us Burning Fossil Fuels.
      • Energy

        • More Than 1 in 4 Members of the Senate Have Fossil Fuel Investments
        • Solar Cells, Half Off | Hackaday

          A company named Leap Photovoltaic claims they have a technology to create solar panels without silicon wafers which would cut production costs in half. According to [FastCompany] the cells are still silicon-based, but do not require creating wafers as a separate step or — as is more common — acquiring them as a raw material.

          The process is likened to 3D printing as silicon powder is deposited on a substrate. The design claims to use only a tenth of the silicon in a conventional cell and requires fewer resources to produce, too.

    • Finance

      • 'Foolishness': House Passes Infrastructure Bill But Postpones Build Back Better Act

        The U.S. House on Friday night passed a bipartisan physical infrastructure bill but didn't bring the Build Back Better Act to the floor—sending just one half of President Joe Biden's two-pronged economic agenda to the White House, with only a pledge that conservative House Democrats will vote for the party's broader social infrastructure and climate package at a later date.

        "Passing BIF gives up our leverage to get Build Back Better through the House and Senate, and I fear that we are missing our once-in-a-generation opportunity to invest in the American people."

      • Making Sure "Number Go Up"

        The credulous press reports make it look like the cryptocurrency market is much bigger and much more successful that it really is, further inflating the bubble. Below the fold, I provide a set of examples of the techniques that are used to fuel the mania.

      • Public Banking Has the Potential to Truly Revolutionize Our Economy
      • Tech Tools Aim to Help Tenants Fight Eviction

        Research group Eviction Lab counted more than 532,000 evictions since March 2020 in the six states and 31 cities where it collects data from state, nonprofit and commercial sources. The expiration of the eviction moratorium has left many renters months behind on rent, and landlords hungry for payment. Sometimes negotiation is possible, but many tenants don’t know where to start.

        Using tech tools can help put a bit more power in the hands of tenants as they navigate a complicated legal process during a very stressful time. According to data compiled by the National Coalition for the Civil Right to Counsel, most tenants don’t have legal representation to help them if they’re faced with eviction: Nationally, about three percent of tenants have attorneys during eviction proceedings – but 81 percent of landlords do.

    • AstroTurf/Lobbying/Politics

    • Freedom of Information/Freedom of the Press

      • The Project Censored Newsletter—November 2021 - Censored Notebook, Newsletters

        Balancing critical analysis with optimistic vision, State of the Free Press 2022 advances remedies for a more robust free press and provides inspiring models for grassroots engagement. In the foreword, journalist Danielle McLean writes, “We need more of the kind of journalism you’ll find in this book.”

      • China Lashes Out at Press Freedom Survey in Hong Kong

        China on Friday criticized a press freedom survey from the Hong Kong Foreign Correspondents' Club that found nearly half of its members were considering leaving the city.

        The survey said the members were concerned about a decline in press freedoms under a sweeping national security law imposed by Beijing following massive anti-government protests in 2019.

        Eighty-three of the 99 journalists polled said that the working environment had "changed for the worse" since the law was introduced last June. The law outlaws subversion, secession, terrorism and foreign collusion to intervene in the city's affairs, and has since been used to arrest more than 120 people in the semi-autonomous Chinese city.

      • Chinese journalist jailed over Covid reports 'close to death'

        A citizen journalist jailed for her coverage of China's initial response to Covid in Wuhan is close to death after going on hunger strike, her family said, prompting renewed calls from rights groups for her immediate release.

    • Civil Rights/Policing

      • [Old] Opinion: The Amish use tech differently than you think. We should emulate them.

        When I heard about that discussion, I thought of a woman at my children’s school who said the disintegration of her family began the day her husband bought a TV for every kid’s bedroom. That was a while back. Today, millions of parents are unwittingly putting TVs in their children’s bedrooms, in the form of smartphones and laptops. And uneasiness about weakening family ties is widespread.

        For the Amish, technology in the workplace has long been more accepted than technology in homes, especially as the group has had to expand beyond farming to make a living. A recent issue of the Fabricator trade journal reported on advanced manufacturing processes in an Amish factory in Dalton, Ohio. A robot welds wheels. Programmed lasers cut metal. Engineers use three-dimensional computer-aided design, known as 3-D CAD, to devise products. And yet the plant is not connected to the electrical grid: A generator powered by natural gas provides electricity. At day’s end, the workers ride home on bicycles. High and low tech successfully live side by side because the focus stays on human connections.

    • Internet Policy/Net Neutrality

      • 5 Ways Email Lookup Tools Can Make Networking Safer

        Making new friends or business partners online is easy, but it can also be dangerous too. You can’t always tell if a contact or offer is legitimate, for example. Fortunately, there’s a simple way to protect yourself from such threats that often gets overlooked: email lookup tools.

        These services are easy to use, and some even free. However, the number of options around and their complex technology can seem overwhelming. Here are a few reasons why you should consider using them, specifically related to your security while networking online.

    • Digital Restrictions (DRM)

      • [Old] Microsoft Deal Ties BIOS Tightly to Windows

        Industry observers agreed that the next generation of BIOS, as well as the digital rights management (DRM) technology that accompanies it, could improve reliability, usability, manageability and security — just as Microsoft and Phoenix claim it will. However, there are concerns that Microsoft is strengthening its grip on PC production and private information.

        “There is a risk that the relationship [between Microsoft and Phoenix] will further Microsoft lock-in,” Electronic Privacy Information Center deputy counsel Chris Hoofnagle told TechNewsWorld. “With a monopolistic software company, it can be impossible for the market to create products that are consumer friendly.”

    • Monopolies

      • [Old] Learning from Linux: OS/2 and the Halloween Memos: PART 1 - Halloween I

        The Linux community has recently posted a number of leaked memos that Microsoft admits are internal MS documents. These papers are Microsoft analyses designed to summarize the Linux phenomenon and help Microsoft focus on how to attack this alternative platform and prevent the public from enjoying it. Prominent Linux people have also commented on these memos and how they reveal Microsoft's internal culture and world-view.

        But interest in understanding the Microsoft ethos is not limited to Linux supporters. OS/2 users and advocates can learn a great deal about Microsoft's inner workings and how to take advantage of their smug neglect of the OS/2 community. For example, the articles show a pervasive amnesia about OS/2 as an available option for computer users. These memos also confirm that such tactics as FUD, the threat of lawsuits, and the corruption of open standards are all normal, everyday tactics in the Microsoft repertoire. Let us analyze the memos and see what we can learn about "The Microsoft Way" and how to overcome its intentional obstacles to progress.

      • Copyrights

        • TV Piracy Increased 30% This Year With Help From "Squid Game"

          TV piracy is on the rise. New data shared by tracking company MUSO shows that the number of visits to TV piracy sites has increased by 30% compared to last year. While copyright holders are working hard to address the problem, subscription fatigue and hit shows such as Squid Game continue to push demand higher.

Recent Techrights' Posts

[Meme] Debian's 'Cannon Fodder' Economics
Conflicts of interest don't matter
According to Microsoft, It's Not a Code of Conduct Violation to Troll Your Victims Whose Files You Are Purging
The group of vandals from Microsoft think it's "funny" (and for a "nominal fee") to troll Microsoft critics
Microsoft Inside Debian is Sabotaging Debian and Its Many Hundreds of Derivatives With SystemD (Microsoft/GitHub Slopware With Catastrophic Bugs is Hardly a New Problem)
What is the moral of the story about The Scorpion and the Frog?
Microsoft Windows in Nicaragua: From 98% to Less Than 25%
Operating System Market Share Nicaragua
Techrights in the Coming Decade: The Community Angle
Somebody needs to call them out on their BS
Techrights in the Coming Decade: The Free Speech (Online) Angle
Free speech is a fundamental tenet of a free society
Techrights in the Coming Decade: The Software Angle
Gemini Protocol has just turned 5 - i.e. roughly the same age as our Git repositories
Techrights in the Coming Decade: The Patent Angle
Next month marks 10 years since we began covering EPO leaks
Wookey, Intrigeri, Cryptie & Debian pseudonyms beyond Edward Brocklesby
Reprinted with permission from Daniel Pocock
[Meme] Choice Versus Freedom
So When Do I Start Having Freedom? Freedom is choice between the GAFAMs
Digital Liberation of Society at Times of Armed Conflicts and Uncertainty
We have technical contributions, not just written output
Links 23/06/2024: More Microsoft Cancellations, Growing Repression Worldwide
Links for the day
Gemini Links 23/06/2024: The Magician and the Hacker, tmux Tips
Links for the day
Links 23/06/2024: Twitter/X Wants Your Money, Google Reports a Billion DMCA Takedowns in Four Months
Links for the day
Digital Restrictions (Like DRM) Don't Have Brands, We Need to Teach People to Hate the Underlying Restrictions, Not Companies That Typically Come and Go
Conceptually, the hens should fear humans, not the farmer who cages them
Going Above 4% Again
Maybe 4% (or above) by month's end?
Conviction, jail for Hinduja family, Debian exploitation comparison
Reprinted with permission from Daniel Pocock
Links 23/06/2024: Hey Hi (AI) Scrapers Gone Very Rogue, Software Patents Squashed at EPO
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, June 22, 2024
IRC logs for Saturday, June 22, 2024
Gemini Links 23/06/2024: LoRaWAN and Gemini Plugin for KOReade
Links for the day
Links 22/06/2024: Chat Control Vote Postponed, More Economic Perils
Links for the day
[Meme/Photography] Photos From the Tux Machines Parties
took nearly a fortnight
Uzbekistan: GNU/Linux Ascent
Uzbekistan is almost the same size as France
SLAPP as an Own Goal
We have better things to with our limited time
Independence From Monopolies
"They were ethnically GAFAM anyway..."
GNU/Linux at New Highs (Again) in Taiwan
latest numbers
Links 22/06/2024: More Layoffs and Health Scares
Links for the day
Rwanda: Windows Falls Below 30%
For the first time since 2020 Windows is measured below 30%
[Meme] IBM Lost the Case Over "Dinobabies" (and People Died)
IBM agreed to pay to keep the details (and embarrassing evidence) secret; people never forgot what IBM called its staff that wasn't young, this keeps coming up in forums
Exactly One Year Ago RHEL Became Proprietary Operating System
Oh, you want the source code of RHEL? You need to pay me money and promise not to share with anyone
Dr. John Campbell on Gates Foundation
Published two days ago
Melinda Gates Did Not Trust Bill Gates, So Why Should You?
She left him because of his ties to child sex trafficker Jeffrey Epstein
How Much IBM Really Cares About Software Freedom (Exactly One Year Ago IBM Turned RHEL Into Proprietary Software)
RHEL became proprietary software
Fedora Week of Diversity 2024 Was Powered by Proprietary Software
If instead of opening up to women and minorities we might open up to proprietary software, i.e. become less open
18 Countries in Europe Where Windows Fell Below 30% "Market Share"
Many people still use laptops with Windows, but they're outnumbered by mobile users on Android
[Meme] EPO Pensions in the UK
pensioners: looks like another EPO 'reform'
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, June 21, 2024
IRC logs for Friday, June 21, 2024
During Fedora Week of Diversity (FWD) 2024 IBM and Its Subsidiaries Dragged to Court Over Discrimination at the Corporate Level
IBM is a deplorable, racist company
Workers of the European Patent Office Take the Office to Court Over Pension
pensions still precarious
Gemini Links 22/06/2024: FreeBSD vs XFCE and Gemini Bookmarks Syncing Solution
Links for the day