It’s been almost exactly four years since Docker founder Solomon Hykes left the company that kickstarted the container revolution. Docker has gone through its share of ups and downs since then, including selling its enterprise business to Mirantis in 2019, but Hykes, who was long the public face of Docker, mostly stayed on the periphery, with the exception of his participation in a few funding rounds. For a while now, though, he’s been quietly working on his next startup, Dagger, which is launching into public beta today and announcing a $20 million Series A funding round.
In this video, we are looking at Ubuntu Budgie 22.04 Beta.
Today we are looking at Ubuntu Budgie 22.04 Beta. It comes with Gnome 42, Linux kernel 5.15, and uses about 1.2 GB of ram when idling. Enjoy!
In this video, we are looking at Xubuntu 22.04 Beta.
Today we are looking at Xubuntu 22.04 Beta. It comes with XFCE 4.16, Linux kernel 5.15, and uses about 800MB of ram when idling. Enjoy!
On this episode of Hey, DT: 0:00 Intro 0:19 Are you finally gonna do a true review about ChromeOS?
So a gitlab dev made a pretty big mistake and pushed a hardcoded password into production code, the results are as you'd expect.
This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.12.5 and Istio 1.12.6
If you are an active internet users, or on a self-education path, surly you collect dozens of links and web pages every day. You most likely need a software to collect, record, organize your links. So, here we introduce you to Shaarli.
The team announced the release of Ghostscript 9.56.1 with a couple of new features. Read what's new.
Today we are looking at how to install Anime Tournament HD Reborn on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
The LAMP (Linux, Apache, MySQL, and PHP) stack is wildly used for deploying PHP-based applications on Linux systems. The LAMP server installation is pretty easy and straightforward. You need some basic knowledge of the Linux package manager to complete this setup.
This tutorial will help you to install PHP, Apache & MySQL on Ubuntu 22.04 LTS Linux system.
The Xrdp protocol is an open-source remote desktop protocol for Linux and BSD. By using Xrdp server one can remotely log into the machine to perform various operations on the local machine. The Xrdp comes up with a graphical interface, thus making it suitable for novice Linux users as well.
Keeping the importance of Xrdp in mind,this guide intends to provide a step-by-step installation and configuration of Xrdp on CentOS 8.
Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. It is an essential tool in an open source developer's toolkit.
This article covers why and how to use the git rebase --interactive (-i for short) command. This is considered an intermediate Git command, but it can be very useful once you start working with large teams.
Every operating system (OS) has its pros and cons. Linux, for example, is an open-source operating system, well-known for its speed and configurability. Windows on the other hand, costs a business money, but is easier to use and has enterprise level support offerings. What if you can combine both? You can, with a Linux Virtual Machine.
After today’s technological advancements, you no longer have to stick to one OS. You can create a virtual machine with any OS on one computer, regardless of its underlying OS. In any case, this helps you to easily switch back and forth between operating systems. This is great for software development and running older software versions.
Devuan and various systemd-free Linux distributions provide alternative init systems. runit is among the most barebones and lightest. Having a small code base makes it easier to maintain and also audit for bugs and security issues. It is able to run on other Unices like *BSD, MacOSX, etc., as well. In this article, I am going to cover the basics of the runit init scheme with Devuan as a base. However, most concepts and commands should be the same for other distributions. You may refer to the references at the end for learning in more detail.
Showfoto is an Image Editor that has powerful tools for editing photographs. You can view your photos and improve them using this program’s standalone image editor from the digiKam project! One of the features that similar tools like is their versatility with tools dedicated to importing and exporting content to remote web services, like Flickr, GPhoto, Imgur, Facebook, etc.
In the following tutorial, you will learn how to install Showfoto on Ubuntu 22.04 LTS Jammy Jellyfish and update and remove the image editing software using the APT package manager with the command line terminal.
Occasionally, we have so many things on our minds that we might forget the password of a social network or even a system user. That’s why today, I will help you to change the root password in Linux Mint 20. The procedure is easier than you think.
We recently told you about Navidrome, and it is a marvel that allows us to deploy our personal streaming platform similar to Spotify. Navidrome has such good support for Linux that we can even install it via Docker. That’s the aim of our post, to help you install Navidrome using Docker.
This guide will demonstrate how to install Discord, a free voice, video, and text chat app, on different Linux distros.
Discord runs natively on all major operating systems, including Windows, macOS, and Linux. Debuted in 2015, it quickly became the communication platform of choice for gamers.
Although it was designed with gamers in mind, the application’s versatile features found a home in other communities, and many Open Source organizations began to take an interest in it.
All types of Linux can install ceph on any Linux distribution, but it requires the recent kernel and other up-to-date libraries to be appropriately executed. But, here in this tutorial, we will be using CentOS with minimal installation packages on it.
In this article we will learn to Create Files of Custom Size in Linux. You can create files with your own specific size in linux using different methods. It is very useful when you perform testing of some sorts and you need files with a specific size.
We will not be using any external commands. Built in commands will be used to perform this task so that you may not download any external package.
This article describes removing software from your Ubuntu system that you do not need anymore. We are describing software removal both through the graphical user interface (Ubuntu Software Manager) and the command line-the (Terminal).
Please note that you need administrative privileges in order to install/uninstall software from Ubuntu. We have run the commands and procedures mentioned in this article on Ubuntu 20.04 LTS.
In this post, you will learn how to install Diffgram.
Complete training data platform for machine learning delivered as a single application.
Open Source Data Labeling, Workflow, Automation, Exploring, Streaming, and more!
Management of your infrastructure documentation is not an easy job. An application is designed to keep 80% of infrastructure documentation called NET BOX. Being a System Network guy, I always wondered about such an app/server that could manage my infrastructure documentation. Let me tell you more about this application.
The NuTyX team is happy to announce the new version of NuTyX 22.04.1 and cards 2.5.0.
New toolchain gcc 11.2.0, glibc 2.35 and binutils 2.38.
The xorg-server graphics server version 21.1.3, the Mesa 3D library in 22.0.1, Gtk4 4.6.2 and Qt 6.2.4.
The python interpreters are en 3.10.4 et 2.7.18.
The XFCE desktop environment is updated to version 4.16.0.
The MATE desktop environment is a 1.26.0 version .
The GNOME desktop environment is also updated to version 41.5
The KDE desktop environment is available in Plasma 5.24.4, Framework 5.92.0 and applications in 21.12.3.
Available browsers are: Firefox 99.0, Chromium 100.0.4896.60, Epiphany 41.3, etc
Many desktop applications have been updated as well like Telegram-desktop 3.6.1, Thunderbird 91.7.0, Scribus 1.5.8, Libreoffice 7.3.2.2, Gimp 2.10.30, etc.
Core NuTyX ships with Long Term Support (LTS) kernels: 4.9.309, 4.14.274, 4.19.237, 5.4.188 et 5.10.109 and 5.15.32 and the latest stable version 5.17.1 .
Apache Kafka is a distributed, open source messaging technology. It's all the rage these days, and with good reason: It's used to accept, record, and publish messages at a very large scale, in excess of a million messages per second. Kafka is fast, it's big, and it's highly reliable. You can think of Kafka as a giant logging mechanism on steroids.
The ongoing quest for greater and greater automation of building, testing, and deployment has recently inspired several new features in Argo CD, Kubernetes, Red Hat OpenShift, and other tools. This article shows how to improve feature testing by automating builds and the creation of Kubernetes environments.
Red Hat OpenShift GitOps includes an opinionated deployment of Argo CD that provides a way to manage continuous development or delivery cluster-wide, or even in a multi-tenant cluster configuration. This Operator also provides many toolsets that can help you fit your GitOps workflows into your CI/CD (continuous integration/continuous delivery) processes. One of these tools is called ApplicationSets.
ApplicationSets mass-produces Argo CD applications and deploys them onto a cluster or multiple clusters. ApplicationSets accomplishes this task by using generators. Generators vary from use case to use case and depend on things like the Git repository structure, configuration files, key/value lists, and cluster names.
Don't stand out for the wrong reasons. To showcase your ability to handle responsibility and become a trusted partner to the CIO, avoid these five mistakes
How you approach your job matters, and CIOs are looking for people who promote a spirit of collaboration and teamwork within IT. Equally important is building a positive reputation within the business as someone who takes a solution-oriented approach.
On the flip side, here are five characteristics that will make you stand out to your CIO – for the wrong reasons.
Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests, and also as base packages.
The kernel team is working on final integration for Linux kernel 5.17. This version was just recently released, and will arrive soon in Fedora. As a result, the Fedora kernel and QA teams have organized a test week now through Sunday, April 10, 2022. Refer to the wiki page for links to the test images you’ll need to participate. Read below for details.
All system admins should be lazy. Not as in not doing their job, but as in doing it as efficiently as possible. Why do you have to do things manually when you can automate them? The more complicated a task, the more reason for automation.
Identity Management is an application that makes sense to automate when rolling it out. Red Hat Identity Management (IdM) is fairly easy to install, but the larger your environment, the more machines you need. In a typical datacenter you would probably have an intranet and a DMZ, and you would probably have your servers divided into development and production. The people that should access your servers will probably be divided up into groups as well, consisting of database, web and application administrators. Not to mention your system admins that need access to everything.
I recorded a ~20-minute video tutorial demonstrating how to work with mesh gradients in Inkscape, importing them into Scribus and producing print-ready CMYK artwork. You can watch it above embedded from YouTube or on my personal LinuxRocks PeerTube channel.
If you’re worried about your privacy, there’s plenty you can do to secure it. Tails, The Amnesiac Incognito Live System, is a live Linux-based operating system that you can boot into on any computer. Once running it can be used to encrypt your files, emails and instant messaging chats.
Today, the developers release a beta version of Tails 5.0, and this is the first version of the distro based on Debian 11 (Bullseye). It offers new versions of most of the software included in Tails, as well as some important usability improvements.
To celebrate the new release of the popular free and open source GNU/Linux distribution, Ubuntu 22.04, we are going to hold a release party. The event will take place on the 1st of May. Due to continued COVID uncertainties, the event will be held in a live virtual format with moderated Q&A.
The Call for Participation is now open for Ubuntu 22.04 Release Party. There will be 2 session types this year, General session and Workshop session. For the general session each speaker will be allowed 30 minutes to speak on the topic and an extra 15 minutes for discussion/Q&A. For the workshop session each speaker will be allowed 45 minutes for the topic and to do hands-on with the participants together and an extra 15 minutes for discussion/Q&A.
It’s important to understand how we view who are customers and competitors are, because it helps explain how we make decisions, how we prioritize our projects, and why we take such a long-term view on our goals. Because Purism is a strong supporter of free software, many people pigeon-hole us into the “Linux market” and assume our target customer is the hardcore Linux geek. For the same reasons, people often assume our competitors are other companies selling hardware that runs free software and that somehow our or their success is at each others’ expense.
While it’s true that we’ve always had a strong core of Linux geeks in our customer base (I’m one of them), I think many people would be surprised to discover just how diverse our customers are. I often say that we sit on a three-legged stool of freedom, privacy and security. Everyone, not just Linux geeks, deserve those things yet each of our customers prioritizes those three values differently.
Our core Linux geek audience prioritizes freedom and picks us because of our goal to build hardware that runs 100% free software. Security experts pick us because of our unique security features like our hardware kill switches, auditable firmware, PureBoot, and our Qubes support. Our customers who prioritize privacy pick us because they want an alternative to Big Tech that doesn’t spy on them, and many of these customers have never used something like PureOS before.
Designed by Smart Bee Designs, the tiny Bee Motion Mini combines an ESP32-C3 wireless RISC-V SoC with a PIR sensor for motion detection reporting over WiFi, Bluetooth LE, or Bluetooh Mesh.
The board was designed to be as small as possible to fit into a 3D printed case with a LiPo battery and placed/hidden anywhere you want. Motion detection range is up to 5 meters, and the Bee Motion Mini can connect to services like MQTT, ITTT, or NodeRed to trigger other devices upon motion.
The CM4S mashes a BCM2711 SoC into the Compute Module 1, 3, and 3+ form factor—which was used for years until the switch to 2x 100-pin board-to-board connectors on the CM4 (pictured on the left): [...]
Chickens, like most other livestock, require consistent care including access to fresh water, plenty of food, and space to roam around until sheltering throughout the night. For the hobbyist farmers who run the YouTube channel East x West Farms, they needed a simple way to automatically regulate their chicken coop without having to constantly visit it in person, especially while away doing other things during the day. In response, they created a chicken coop controller that is able to reduce the amount of direct care required.
The typical piano consists of an array of keys that, when struck by a finger, cause a note to play either from a digital circuit or a vibrating string. But to change this design up a bit and introduce some additional fun, a team of students from the Marie Noel college in Joigny, France set out to create a larger version that could be played using feet instead of hands just like Tom Hanks in the 1988 classic film “Big.”
The aptly named Arduipiano is based around an Arduino Mega 2560 owing to its large number of GPIO pins. After cutting out piano “keys” from large sheets of aluminum foil, each piece was glued to a cardboard base and wired to the Mega via a single 4.7Mohm resistor on each receive pin. Pin 2 acts as the capacitive send pin, which lets the microcontroller measure the change in capacitance for every key in order to determine if it is currently being touched. At the end of each iteration of the main loop, all of the pressed keys are converted to notes and sent through a serial port to a MIDI receiver.
After coming to the conclusion that the traditional analog clock just isn’t enough and the digital clock is too boring, Hans Andersson decided to make his own version that integrates both RGB LEDs and fiber optics to show the current time in a far more entertaining manner. Rather than moving a set of three hands around in a circle or toggling a bunch of digits, the “O-Clock” lights up a series of 60 slits in a hollow ring in red, green, and blue, as well as many other colors, to indicate the hour, minute, and second.
Mozilla announced the release of Firefox 99 across all stable channels, and soon, it will be available for all the official Linux distribution repo.
Clutter isn’t just material stuff scattered about your floor and shelves. Clutter can consume us in digital form, too — from an overabundance of browser bookmarks and open tabs to navigating a world wide web that’s littered with junk. The right browser extension, however, can really help clean things up…
While well-intentioned, the Philippines’ Subscriber Identity Module (SIM) Card Registration Act (2022) will set a worrying precedent for the privacy and anonymity of people on the internet. In its current state, approved by the Philippine Congress (House of Representatives and Senate) but awaiting Presidential assent, the law contains provisions requiring social media companies to mandatorily verify the real names and phone numbers of users that create accounts on their platform. Such a move will not only limit the anonymity that is essential online (for example, for whistle blowing and protection from stalkers) but also reduce the privacy and security they can expect from private companies.
WordPress 5.9.3 is now available!
This maintenance release features 9 bug fixes in Core and 10 bug fixes in the block editor.
WordPress 5.9.3 is a short-cycle maintenance release. The next major release will be version 6.0.
This article continues the long-lost series on how to migrate away from terminal protocols as the main building block for command-line and text-dominant user interfaces. The previous ones (Chasing the dream of a terminal-free CLI (frustration/idea, 2016) and Dawn of a new Command-Line Interface (design, 2017)) might be worth an extra read afterwards, but they are not prerequisites to understanding this one.
The value proposition and motivation is still that such a critical part of computing should not be limited to device restrictions set in place some 50-70 years ago. The resulting machinery is inefficient, complex, unreliable, slow and incapable. For what is arguably a strong raison d’être for current day UNIX derivates, that is not a strategic foundation to neither rely nor expand upon.
The focus this time is about the practicalities of the user facing ‘shell’ — the cancerous and confused mass that hides behind the seemingly harmless command-line prompt. The final article will be about the developer facing programming interfaces themselves as application building blocks, how all of this is put together, and the design considerations that go into such a thing.
In the last post I explained how I built a base map of Tasmania (coastline plus main roads) with a lat/lon grid using gnuplot. Here I describe how the base map was used to generate GIF animations.
Write a Java program to get keys from the hashmap using the value.
The HashMap class is available under the java.util package. It is pretty similar to HashTable, but the HashMap is unsynchronized and also allows to stole one null key.
In this tutorial, you will learn Java examples to get keys from a HashMap based on a defined value.
The hover @media feature query lets you check if a device’s primary input device supports hovering interactive elements. It became part of the web platform as of CSS Media Queries Level 4. The hover: hover query should match on devices with a mouse cursor (e.g. a touchpad), and hover: none should match touchscreens (mobile devices). Unfortunately, Samsung devices say their touchscreens are touchpads.
The media feature query let you detect and apply different styling when a device supports hover interactions. For example, you can collapse an expandable menu when the device supports hovering and expand it by default when it doesn’t.
How do you prove that you know something secret without revealing the secret?
The new audio confirms that the speed of sound is slower on Mars than on Earth, a result that was expected since the motion of acoustic waves is modulated by the density of substances they occupy. For instance, here on Earth, the speed of sound is faster in the dense medium of water than it is in the air.
We all know the havoc that water in the wrong place can do to a piece of electronics, and thus we’ve probably all had devices damaged beyond repair. Should [Solderking] have thrown away the water-damaged PCB from a Nintendo Pokemon Ruby cartridge? Of course he should, but when faced with a board on which all vias had succumbed to corrosion he took the less obvious path and repaired them.
It’s fascinating to see what happens when a creative hacker is given a set of constraints to work within. [rctestflight] found themselves in a very specific set of circumstances: Free RC cars from sponsors, and no real purpose for them. Instead of just taking them apart to see what made them tick (itself the past time of many a beginning hacker), [rctestflight] decided to let the RC cars disassemble themselves, destructively, on their way to 100,000 (scale) RC Car Miles, tallying up the distance (and the carnage) in the end as you see in the video below the break.
Making a camera can be as easy as taking a cardboard box with a bit of film and a pin hole, but making a more accomplished camera requires some more work. A movie camera has all the engineering challenges as a regular camera with the added complication of a continuous film transport mechanism and shutter. Too much work? Not if you are [Yuta Ikeya], whose 3D printed movie camera uses commonly-available 35 mm film stock rather than the 8 mm or 16 mm film you might expect.
We love clock projects here at Hackaday, and we’ve seen many beautiful designs based on a wide variety of display technologies. There are various types of glass tubes like Nixies, Numitrons and classic VFD displays, all of which have that warm “retro” glow to them. Then there’s LEDs, which are useful for making cool pixel-based timepieces and easy to drive with low-voltage electronics. So how about combining the best of both worlds, by using LEDs to make a Numitron-like display? That’s exactly what [Jay Hamlin] did when he built a digital clock based on LED filaments.
We aren’t shy of dangerous projects, but, then again, a large cooking pan full of lead solder might be a bit much, even for us. It goes without saying that you should be extremely careful and you won’t want to use any of the cookware again for any other purpose. You can see the build in the video below.
Scientists who work with animals love to track their movements. This can provide interesting insights on everything from mating behaviour, food sources, and even the way animals behave socially – or anti-socially, as the case may be.
When reaching for a power supply design it’s normal here in 2022 to reach for a switching design. They’re lightweight, very efficient, and often available off-the-shelf at reasonable prices. Their benefits are such that it’s become surprisingly rare to see a traditional linear power supply with a mains-frequency transformer and rectifier circuit, so [ElectroBoy]’s dual voltage PSU board for audio amplifiers is worth a second look.
The newly released “Poor People’s Pandemic Report” shows poor people died from COVID at twice the rate of wealthy Americans and that people of color were more likely to die than white populations. “Our country has gotten used to unnecessary death, especially when it’s the death of poor people,” says Rev. Liz Theoharis, co-chair of the Poor People’s Campaign.
interoperability standards, facilitated by a common digital architecture, for a digitized test result certificate which can be used as proof of negative test results or proof of previous SARS-CoV-2 infection for international travel, or as a means for protection policies that reduce public health risk in public or private venues – in accordance with individual Member States’ public health policy and their risk-based approach to addressing COVID-19. Additional technical details to support the adoption of open standards for interoperability and approaches for implementing a DDCC:TR solution can be found in the WHO DDCC Health Level Seven (HL7) Fast Healthcare Interoperability Resources (FHIR) implementation guide.
Google has taken a potshot at Microsoft, something it does occasionally, using a survey conducted by Public Opinion Strategies — and paid for by its own cloud business — to ventilate the concerns of government users who are mostly locked into a Microsoft environment.
Despite some quibbles I voiced in the first part of my review of Johan Norberg's Open: The Story of Human Progress, the author's argument remains engaging—especially at this historical juncture, as the world witnesses Russia's invasion of Ukraine, and authoritarian movements around the world are threatening the sustainability of the liberal democracies Norberg identifies as bastions of openness.
But if the world were to somehow make a transformational leap towards more global openness, what would actually be required? The conceptual challenge of that is daunting—but a first step might begin simply by articulating some of the unexplored questions that follow from Open's overall vision.
These are meaty questions, to be sure—about the actual "performance gains" more openness will deliver, about design considerations that any community would need to make if to pursue open transformation, and about how, precisely, that work would have to be undertaken in different contexts.
In January 2022, the European Parliament voted in favor of the Digital Services Act (DSA), a horizontal legislation for the EU’s digital single market that seeks to define platforms’ responsibility regarding user content. The draft law also contains several concrete provisions aimed at mitigating certain harms of online advertising, including imposing a ban on ‘dark patterns’ when getting consent from users (Article 13a), a behavior that recently led to the French DPA imposing fines of over $200 million on Facebook and Google. While the DSA seeks to promote a more free internet in numerous ways, this article focuses on its transparency mandates for content moderation decisions and the provisions mandating researcher access to data.
If the last two years have taught us anything, they’ve taught CIOs how to be resilient. Resiliency comes in the form of being agile, adaptable, and the right security. And the ability to thrive in unforeseen circumstances.
Dirty Pipe is one of the most severe vulnerabilities to hit the Linux kernel in several years. The bug lets an unprivileged user overwrite data that is supposed to be read-only, an action that can lead to privilege escalation. The bug was nailed down on February 19, and for Linux flavors like Unbuntu, a patch was written and rolled out to end users in about 17 days. Android is based on Linux, so Google and Android manufacturers need to fix the bug, too.
The security world has been abuzz about a new Linux exploit called “Dirty Pipe,” which also affects Android 12 devices like Galaxy S22 and Pixel 6. Here’s everything you need to know about “Dirty Pipe,” which devices it affects, and how best to avoid it.
zlib has recently reported that it has a security issue when deflating which could cause memory corruption if the input has many distant matches. This is reported in a bit more detail here: https://github.com/madler/zlib/issues/605 and has been assigned the CVE id CVE-2018-25032. This has been fixed in an update to zlib 1.2.12
Have a look at our roadmap to see where we are heading to.
Australia's news media bargaining code is being reviewed after its first year of operation, but the Federal Government has signalled that it will not force any company that has not adhered to the requirements of the code to do so.
Initially, the Ukrainian military dominated the drone war against the Russian attackers, who are now striking back unmanned. Both sides are relying on a new weapons system.
An internal paper of the Bavarian Police problematises a symbol which stands for a conspiratorial community of solidarity. According to the paper, it is widespread in right-wing police circles and could violate the principle of neutrality and lead to disciplinary consequences. Not all police officers see it that way.
Amnesty International and Human Rights Watch (HRW) said Tigrayan civilians had been targeted in "a relentless campaign of ethnic cleansing" in the long-contested western Tigray region since the outbreak of Ethiopia's war in November 2020.
Over the ensuing months, several hundred thousand Tigrayans were forcibly expelled from western Tigray in a "coordinated" manner by security forces and civilian authorities through ethnically-motivated rape, murder, starvation, and other serious violations.
Fighters believed to be from the Allied Democratic Forces (ADF) attacked the village of Masambo on Sunday night, said Ricardo Rupande, president of the group, the Ruenzori Sector Civil Society.
Following the report of his killing, Egyptian journalist Amira Khawasek published an article in the daily Al-Yawm Al-Sabi', in which she mentioned other terrorist attacks against Egypt that some Egyptian elements had attributed to Hamas. She stated that Mus'ab Mutawa's ties to both Hamas and ISIS prove that "ISIS, Hamas and the Muslim Brotherhood (MB) are equal in their depravity and crimes, and do not differ in any way."
It's a lot less morally questionable than my grim speculation about geolocation/social media apps mediating intra-community genocide, but it's still appalling by implication. The Ukrainians are justified in doing this, but sooner or later someone is going to turn this into a tool for genocide.
What is funny, in the sense of funny-peculiar, not funny-humorous, is the war of the cellular networks. It turns out the Russian field units are using 1980s analog radios and cellphones to communicate. A lot of them got lost because after commanders confiscated all the troops' smartphones, they issued paper maps which nobody knows how to use any more. Meanwhile the Russian commanders were using an end-to-end encrypted secure messaging app ... that required cellphone service, and by shelling the Ukrainian cellphone base stations they were disrupting their own secure comms. It's an absolute clusterfuck, and if it wasn't combined with atrocities and war crimes it would be hilarious.
As WikiLeaks founder and publisher Julian Assange remains in the UK's Belmarsh Prison, waiting for the next move in the US bid to extradite him, WikiLeaks has released long and short versions of the Collateral Murder video that shows unprovoked killings by US forces in Iraq in 2010.
Let’s be clear. Industry executives have known about the devastating climate impacts of their business for more than 50 years. Instead of acting on the science, however, they spent millions of pounds spreading climate disinformation and expanded their fossil fuel operations. They continue to engage in extensive anti-climate political lobbying and resolutely focus the overwhelming majority of their business on fossil fuels, including building new infrastructure and exploring for new reserves. Meanwhile, the world’s top scientists and energy experts are clear that no new fossil fuel infrastructure can be built if the world is to reach net zero emissions by 2050 and avoid runaway climate breakdown.
“Investing in new fossil fuel infrastructure is moral and economic madness,” UN Secretary-General António Guterres said as the Intergovernmental Panel on Climate Change (IPCC) released part of its latest report on Monday. This scientific summary, focused on how the world can cut greenhouse gas emissions, warns of the extraordinary harm to all of humanity caused by fossil fuels and the need for a rapid energy transition away from oil, gas, and coal, calling for meaningful changes over the next three years. “Such investments will soon be stranded assets, a blot on the landscape, and a blight on investment portfolios.”
That same day, oil giant ExxonMobil made an announcement of its own: a $10 billion final investment decision for an oil and gas development project in the South American nation of Guyana that the company said would allow it to add a quarter of a million barrels of oil a day to its production in 2025.
THE WINDOW for limiting global warming to relatively safe levels is rapidly closing, according to the Intergovernmental Panel on Climate Change (IPCC). On April 4th the body released a new report, of nearly 3,000 pages. It appeared after two weeks of wrangling by representatives from 195 governments over how best to present the “state of the union” of climate science. Its conclusion is hardly cheering. To meet the goals of the Paris agreement, to limit the average global temperature rise to 1.5€°C above pre-industrial levels—and failing that, to below 2€°C—will take immediate and unprecedented action from every country.
The IPCC, a UN-backed body, releases a new “assessment report” every eight years or so. Each cycle is a mammoth undertaking, culminating in a trio of reports that comprehensively examines the science of climate change. Hundreds of scientists from around the world plough through thousands of peer-reviewed papers, and then collate their findings into a door-stopping tome.
Throughout the process of filing these complaints, we engaged in conversations with people in the highest positions of administrative power on convoluted topics like institutional asset management. After our Vanderbilt Divestment group presented in front of the faculty senate, we received dozens of messages from faculty members applauding our presentation and ability to synthesize these complex subject matters. Long-gone is the stereotype of unmotivated college students focused on partying more than anything else. When our future is at stake, we step up.
Now, frustrated by the response from some school officials, a coalition of student groups working with the nonprofit Climate Defense Project has escalated the fight. Instead of just trying to convince university leaders that their investments are immoral for contributing to global warning, the groups argue that the investments are also illegal.
Student-led campaigns at Yale, Princeton, Stanford and Vanderbilt universities and the Massachusetts Institute of Technology filed complaints Wednesday with their respective state attorneys general in a bid to compel schools to divest. The campaigns have requested an investigation into whether the schools have violated a state law related to investments by nonprofit institutions.
The world must achieve “deep and rapid” emissions reductions across all sectors in order to skirt the worst effects of the climate crisis, according to the latest report from the Intergovernmental Panel on Climate Change (IPCC).
The United Nations body responsible for advancing knowledge on climate change urged multiplying the speed of the global shift to renewable energy by ending subsidies for fossil fuels and reinvesting those funds in wind and solar in the latest report from the Working Group III on Mitigation of Climate Change, released on Monday.
The goal is clear, Ferrone stressed, namely to reduce CO2 emissions, "preferably to zero". Fossil fuels currently account for 64% of carbon emissions.
Ferrone explained that in practice, this means limiting CO2 emissions to what can be naturally re-absorbed. To limit global warming to 1.5 degrees, "net zero" must be reached by 2050. Global warming could still be limited to 2 degrees by reaching net zero by 2070.
We go to El Salvador for an update on how the government under President Nayib Bukele has arrested over 6,000 people since a 30-day state of emergency was imposed following a wave of violence. The state of exception has suspended freedom of assembly and weakened due process rights for those arrested, including an extension of how long people can be held without charge. Nelson Rauda, a journalist at the newspaper El Faro who has been a target of harassment and surveillance by the Salvadoran government, says the impact of the state of exception has a class divide. “If you have resources … you might go about the state of exception as if nothing is happening,” he says. “For the majority of the country which comes from the lower-income population, it’s been difficult. It’s military checkpoints and police checkpoints and stop-and-frisk.”
Pakistan is facing a constitutional crisis after Prime Minister Imran Khan dissolved the country’s National Assembly and called for new elections in an effort to block an attempt to remove him from power. Khan was facing a no-confidence vote in Parliament that would have unseated him, but his allies blocked the vote from happening. Pakistan’s Supreme Court is now hearing a pivotal case on whether it was within the authority of the speaker of the National Assembly to reject the motion for a vote of no confidence, says Pakistani journalist Munizae Jahangir.
The impact of the conflict on travel freedom and mobility has been more important than first imagined.
With millions of Ukrainians fleeing their home, Europe is witnessing its worst refugee crisis since World War II.
But where it became easier for Ukrainians to cross borders – thanks to the EU emergency plan that allows them to live and work in any of the 27 member states – it has become much more difficult for Russians.
The British government has decided to sell Channel 4, the publicly-owned but commercially funded broadcaster founded nearly 40 years ago as an edgy alternative to the BBC and ITV (ITVPF), the company said on Monday.
Ministers said last year that privatization would help secure Channel 4's future as a public service broadcaster.
The broadcaster, however, has fought such a move, saying there was no evidence to show that a privatized Channel 4 would be able to better fulfill its remit to provide challenging and distinctive programming for audiences under-served by rivals.
Last week, the EU reached an agreement on a core piece of platform regulation, the Digital Markets Act. The Digital Markets Act contains rules for digital companies with high market power, so-called gatekeepers. These are large companies that provide an exceptionally widely used platform service, for example a smartphone operating system, a social network, a messenger service or a search engine. Unlike traditional competition law, which mainly intervenes after the fact, the Digital Markets Act is intended to prevent market abuses and make it easier for smaller competitors to enter platform markets.
A Bloomberg opinion suggested we give Amazon and Facebook a seat at the United Nations as commercial superpowers so we can force them to behave as we wish to benefit people!
What about no?
Despite this, it’s far too early to declare information victory. If anything, this apparent consensus—that Ukraine has won the online war—might be obscuring where battles over the invasion are really raging.
If Musk is trolling, though, this is sharp. Like, maybe he’ll get a fine or something, but the SEC’s job is to protect shareholders, right? It’s why Musk and Tesla got fined for his “funding secured” tweets but Musk remained as CEO — removing him would arguably harm shareholders more than letting Musk yolo his little heart out. Musk is valuable! The disclosure of his stake in Twitter sent shares up 27 percent, a cute lil pop for a social media company that’s getting absolutely clobbered by TikTok and the company formerly known as Facebook. So if the SEC is like, “haha, you are definitely not going to be on the board of Twitter,” it’s probably wise to assume the stock will fall! And shareholders will get hurt!
While Musk has indicated he will be making "significant improvements" to Twitter it is unclear what those improvements will be. On Monday he tweeted out a poll asking if people wanted an edit feature added to the platform.
On 27 March, he wrote: "Given that Twitter serves as the de facto public town square, failing to adhere to free speech principles fundamentally undermines democracy. What should be done?"
As reported by Wired, Twitter is shifting the way it does business, moving away from ad-generated revenue and into the crypto and NFT world as part of its diversification of revenue strategy. According to the report, Twitter has a solid crypto future in full development. Twitter Crypto, a unit within the social media giant, works to massify crypto and digital assets. While digital wallets and online crypto trading sites face the challenge of attracting millions of users, Twitter already has plenty, 396.5 million of them. Now the company is developing crypto technology and moving fast into a trend which Musk publicly supports.
In journalism-speak, fixers are local people who work closely with foreign reporters on everything from securing interviews, translating, and booking hotels to more crucial work including advising on possible threats and no-go areas.
Often these are journalists already established in their home country. But some like Zubova are new to the profession — and learning on the job while navigating a war zone.
On Monday, the Supreme Court sided with Thompson in declaring that he did not have to show an "affirmative indication of innocence." The vote was 6-to-3, with three conservative justices — Chief Justice John Roberts and Justices Brett Kavanaugh and Amy Coney Barrett — joining the courts three liberals in the majority.
[...] Because the human organ market is an underground market, it is difficult to make any definitive estimates of its value. Journalist Scott Carney supposes it could be worth billions of dollars. There are estimates that 10% of all organ transplants are performed using trafficked organs.
As Giles learns how to read, in this 18th-century children's book, he consumes an alphabet baked from gingerbread, literally becoming “A little Boy who lived upon Learning”.
International music industry group IFPI has submitted its recommendations for the EU's upcoming 'Counterfeit and Piracy Watch List’. As expected, the report flags YouTube rippers, cyberlockers and torrent sites. However, messenger platforms and social media sites such as Discord, Reddit, Telegram and Twitter, are also seen as top enforcement priorities.