Windows and Mac machines are pretty much everywhere these days, but another category of devices has been slowly bubbling up and capturing market space, and that is Chromebooks. But what exactly is a Chromebook, and why should you care? Let’s find out the answer in this article.
Recent statistics suggest that Chromebooks dominate the education sector with over 50% of the market share. A lot of Chromebook growth has come during the Covid-19 pandemic when working and studying from home became a norm for two years straight. In 2021, the machines witnessed a 275% growth, according to Canalys.
A completely different desktop experience is offered by Arch Linux and Ubuntu, it becomes quite a tough choice on what to select as our daily driver especially when we cannot ignore the benefits of both. We go over various important points comparing speed, gaming and if it is good for programmers and developers.
Now, how to choose one knowing their differences?
Now that I'm back on Pipewire it's time to fix my terrible audio solution and setup a patchbay, and since my original stint on Pipewire there are now some native pipewire patchbays like Qpwgraph which work really well.
We have lots of feedback on Pop!_OS, keyboard shortcuts, and backup scripts. We also have comments on installing Linux on Asus computers and talk about some Elementary news.
Oracle has a fairly prominent position with open source. They are a supporting member of the Linux Foundation, Cloud Native Computing Foundation, Eclipse Foundation, and the Java Community Process.
Through its acquisition of Sun Microsystems in 2010, Oracle also became the steward of many other important and long-running open source projects such as the Java programming language and the MySQL relational database, introduced in 1995. The acquisition of Sleepycat Software, brought the open source Berkeley DB key/value store.
The company co-develops the OpenJDK, an open source implementation of the Java Platform Standard Edition, and Btrfs, a B-tree file system. They also open source the Oracle Coherence Community Edition, NetBeans, and produce Oracle Linux which is a Linux distro compiled from Red Hat Enterprise Linux source code.
SAS Enterprise Miner aims to streamline the data mining process. It helps you analyze complex data, discover patterns and build models so you can more easily detect fraud, anticipate resource demands and minimize customer attrition.
SAS Enterprise Miner is proprietary software. What are the best free and open source alternatives to Enterprise Miner?
Not everything in life is free; but, there is plenty of great software that is. Here are excellent replacements for all your essential paid programs
I've been using VMWare Workstation at work for a long time now. In the beginning, it was more or less your only good option for virtualization on Linux hosts. Then I kept on using it because it was the least intrusive option and had the best GUI. It's still all of that, and as an added bonus it works well enough over remote X, but unfortunately things are adding up to the point where I probably need to replace it with something else, something without the major flaw that currently afflicts my VMWare Workstation setup and ideally the minor one too.
My preferred method for deploying webapps is to have the webapp listen directly on port 443, without any sort of standalone web server or HTTP reverse proxy in front. I have had it with standalone web servers: they're all over-complicated and I always end up with an awkward bifurcation of logic between my app's code and the web server's config. Meanwhile, my preferred language, Go, has a high-quality, memory-safe HTTPS server in the standard library that is well suited for direct exposure on the Internet.
However, only one process at a time can listen on a given IP address and port number. In a world of ubiquitous IPv6, this wouldn't be a problem - each of my servers has literally trillions of IPv6 addresses, so I could easily dedicate one IPv6 address per webapp. Unfortunately, IPv6 is not ubiquitous, and due to the shortage of IPv4 addresses, it would be too expensive to give each app its own IPv4 address.
In this tutorial, we will show you how to install IntelliJ IDEA on Linux Mint 20. For those of you who didn’t know, IDEA IntelliJ is an open-source, and cross-platform IDE for writing Java applications. It’s developed by JetBrains, the same company that developed PyCharm, the best IDE for Python. Like PyCharm, IntelliJ IDEA to has two variants: the Ultimate Edition and the Community Edition.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of an IntelliJ IDEA on a Linux Mint 20 (Ulyana).
For laptop user, there could be a quite annoying issue that the ‘Airplane Mode’ automatically turns on when lid closed, or when the screen is tilted sideways.
For HP laptops running Ubuntu, Fedora, or other Linux using systemd, there’s a workaround by mapping the HP e057 and e058 scancodes to 240 (no-op key). So it won’t automatically turn on Airplane Mode, while the option in ‘Wi-Fi’ settings and fn + F12 key combination still function.
NOTE: This tutorial is tested and works in my Ubuntu 22.04 on HP 246 laptop. It may or may not work in your machine.
Node is becoming the first choice of developers for building frontend applications. Also, many developers are using this for building REST API and CRUDs. This programing language is developed by OpenJS Foundation, which runs on Chrome’s v8 engine.
Mitchell Krog created NGINX Ultimate Bad Bot & Referrer Blocker, a Linux Specialist focusing on security, and given his work, you can tell he is one of the good guys. NGINX Ultimate Bad Bot Blocker is, to date, one of the best open free source pieces of software you can deploy to your website free of charge with a continuous update of sometimes twice a day. The work from Mitchell and the community is outstanding.
Managing passwords via the terminal is relatively simple. In Linux, you can manage the user passwords using the passwd utility, a command designed to manage passwords.
In this guide, we’ll also learn a few advanced arguments for the passwd command, which will help you use it more effectively and make your life easier.
Remember, you can only manage your password as a regular user. However, the root user and users with sudo privileges can manage other users’ passwords and define how the password can be used.
Recently I have tried it again, after having used pcmanfm for many years. After setting everything up the way I like it I noticed that the shortcuts in the sidepane cannot be rearranged (I am used to having devices first, then bookmarks).
Linux isn't just something that runs on servers and powers the internet. It's a safe place for your data, your family history and memories, working or having fun, and real life.
Case in point: Right now I'm in the middle of a project scanning old family photos. I have been using Fedora Linux with the GNOME desktop for a few years, so I didn't have to install any additional software packages. I just plug my scanner into the USB port, start up the scanning software (Document Scanner), and I'm good to go. Keep reading to see how I did it.
DeSmuME is a great Nintendo DS emulator. It has all the features that we expect from an emulator, but it also offers some unique options for working with your computer’s dual monitors while playing games on one screen at once! This makes DeSMU quite popular among gamers who want to play their favorite titles using this method without giving up any detail or graphics quality when switching back and forth between screens as needed during gameplay.
In the following tutorial, you will learn how to install DeSmuME on Ubuntu 22.04 LTS Jammy Jellyfish using three installations method of APT or Flatpak using the command line terminal, along with some tips on maintaining the software into the future.
Element is a free and open-source software instant messaging client implementing the Matrix protocol. It supports end-to-end encryption, groups, and sharing of files between users on this platform! If you’re looking for an open-source, encrypted messaging client that offers group chats and file-sharing functions, then Element is one of the best options.
In the following tutorial, you will learn how to Install Riot Desktop or better known as Element now, on Ubuntu 22.04 LTS using the command line terminal to import the Riot or better known as Element.io official repository and gpg key and install the desktop chat client editor, along with how to maintain and remove the software if required in the future.
IntelliJ IDEA is an excellent choice for any developer who wants to have all their tools in one place. Whether you’re looking into developing software or want some help getting started with it, this program has something that will work perfectly! This IDE comes loaded up with features like Syntax Highlighting, which makes coding much easier on the eyes than staring at code after struggling through challenging sections of programming languages due mainly because they were hard/impossible without being able to see what’s going wrong while typing away only wishing.
Anyone who has ever worked with other IDEs will find their way around in no time, thanks to this great program’s ease of use and practicality for developing Java programs, especially Kotlin or Groovy, if you’re working on Android apps! Its integration, such as Git (for committing changes), SVN(to check outsources), and Mercurial & CVS, make it even more helpful, so don’t forget about them when choosing your software development tool.
In the following tutorial, you will learn how to Install the latest IntelliJ IDEA on Ubuntu 22.04 LTS Jammy Jellyfish using the command line terminal and the LaunchPAD PPA by the Marcel Kapfer to install the latest possible version of the community or ultimate edition, along with some essential tips on maintaining and remove the software in the future if required.
FileZilla is an easy-to-use, free FTP client with cross-platform support. You can download it for Windows or Linux on both server and client sides! It also supports sftp connections, so you can transfer files without having them wrapped up in (.zip) archives too much—this way, there’s less traffic on your network while still getting everything done quickly.
Zoom is a communications technology platform that provides videotelephony and real-time online chat services through a cloud-based peer-to-peer software platform. The client can be used in a variety of ways to improve communication and collaboration. With its easy-to-use platform, users can connect with colleagues, classmates, and customers in real-time from any device.
In the following tutorial, you will learn to install the Zoom on Ubuntu 22.04 LTS Jammy Jellyfish using either the flatpak package manager or the snapcraft package manager, with some tips for maintaining or removing software in the future.
For all the technical prowess that the Steam Deck represents, there is one annoying issue that seems to concern a few owners so far. Whistling. Fan noise. But not everyone. Turns out that, according to a recent reddit thread there may be two different fans used in the commercialized version of the Steam Deck...
LXQt 1.1 is packed with lots of cool changes, starting with better integration of applications that aren’t written in Qt, such as GTK apps through the implementation of the xdg-desktop-portal-lxqt component. With this, apps like Firefox or Chromium will finally be able to use the native LXQt file dialog.
In addition, LXQt’s PCManFM-Qt file manager now supports the file manager DBus interface, which can be used by non-Qt apps like Firefox or Chromium to display files inside folders or do other tasks.
LXQt 1.1.0 desktop environment is now available for download with new features and updates.
On my Raspberry Pi with an AMD Radeon 5450, it's not the best performing setup in the world—half the tests don't run yet—but it's a helpful tool to see if you still need to improve the drivers a bit :)
If you’re an experienced hacker, you’ve probably run into a problem at some point and thought “let’s make a tool to automate that”. A few hours later you’ve got your tool, but then realize that the amount of work you put into making the tool vastly exceeds what you would have needed to solve the original problem manually. That really doesn’t matter though: developing a fancy tool can be a rewarding experience that teaches you way more about the original problem than you would have learned otherwise. [sjm4306]’s ATtiny High Voltage Fuse Reset-er is a clever device that firmly falls into this category.
The days of yore saw telex machines and dot-matrix printers with continuous feed paper churning out data in hardcopy form in offices around the world. [Jan Derogee] wanted a bit of that old-school charm, and set about building a RSS news printer using a venerable old printer in his possession.€
I’m a huge DIY’er. I don’t like to buy things when I can build them myself. But honestly, that doesn’t always end up in the optimal allocation of my time, when viewed from a getting-stuff-done perspective. Sometimes, if you’ve got a bigger project in mind, the right way is the quick way, and the quick way is buying something that already works. But when that something is itself not hackable, you’d better be darn sure that it does what you need, and what you could reasonably expect to need in the future, out of the box. And that’s where extensibility comes in.
The 90 day mark just passed at my new gig at Voltus, feels like a good time for a bit of self-reflection.
In general, I think it’s been a good change and that it was the right time to leave Mozilla. Since I left, a few people have asked me why I chose to do so: while the full answer is pretty complicated (these things are never simple!), I think it does ultimately come down to wanting to try something new after 10+ years. I’ve accumulated a fair amount of expertise in web development and data engineering and I wanted to see if I could apply them to a new area that I cared about— in this case, climate change and the energy transition.
Voltus is a much younger and different company than Mozilla was, and there’s no shortage of things to learn and do. Energy markets are a rather interesting technical domain to work in— a big intersection between politics, technology, and business. Lots of very old and very new things all at once. As a still-relatively young company, there is definitely more of a feeling that it’s possible to shape Voltus’s culture and practices, which has been interesting. There’s a bit of a balancing act between sharing what you’ve learned in previous roles while having the humility to recognize that there’s much you still don’t understand in a new workplace.
On the downside, I have to admit that I do miss being able to work in the open. Voltus is currently in the process of going public, which has made me extra shy about saying much of anything about what I’ve been working on in a public forum.
In a recently accepted paper in the open access journal Quantitative Methods for Psychology that Daniel Schad led, we discuss how, using Bayes’ rule, one can explore the change in the probability of a null hypothesis being true (call it theta) when you get a significant effect. The paper, which was inspired by a short comment in McElreath’s book (first edition), shows that theta does not necessarily change much even if you get a significant result. The probability theta can change dramatically under certain conditions, but those conditions are either so stringent or so trivial that it renders many of the significance-based conclusions in psychology and psycholinguistics questionable at the very least.
When hiring developers, there are many things we are looking for, but over the years I have found that raw coding ability is easily the most important quality to look for. I can quickly train a person to have knowledge in some domain, but I’ve never seen raw coding ability come from anything other than personal commitment to extensive and deep practice. Because of this, I have found that some methods work better than others to discover talent.
The usual way of error checking in C, where you check the return and only then look at errno, works when you use it, but it’s possible to construct cases with surprising results if you take shortcuts.
One advantage of the Wiener construction is that the Kuratowski pair has an odd degenerate case: if !!a=b!! it is not really a pair at all, it's a singleton. The Wiener pair always has exactly two elements.
The problem isn’t Twitter doing something to them; the problem is the people on Twitter doing something to them.
You don’t solve a mob problem by buying the platform that the mob uses.
That’s my confusion with this approach.
With over 530,000 registered members, according to threat intelligence firm Recorded Future, RaidForums had great reach and influence among low to mid-level cybercriminals.
The Justice Department claims that RaidForums members used the platform to provide for sale hundreds of databases of stolen data containing more than 10 billion unique records for individuals residing in the U.S. and internationally. At the time of its founding in 2015, RaidForums also operated as an online venue for organizing and supporting forms of electronic harassment, including raiding, the practice of posting or sending an overwhelming volume of contact to a victim’s online communications medium, and swatting, which involves making prank calls to emergency services about ongoing critical incidents to get them to visit an address unnecessarily.
Raidforums.com, along with Raid.ws and Raid.lol domains used by the site, were seized by the U.S. Department of Justice with the image above now appearing where the forum once resided. The founder of RaidForums, Diogo Santos Coelho of Portugal, was arrested in the U.K. on Jan. 31 and now faces extradition to the U.S.
In a parallel statement, Europol also lauded the takedown saying the RaidForums online marketplace had been seized in an operation known as "Operation Tourniquet," that helped coordinate investigations by authorities from the United States, the United Kingdom, Germany, Sweden, Portugal and Romania.
This post assumes that you possess some familiarity with zero-knowledge proofs. If you would like to read more about them, there are several helpful blog posts and videos available to you, such as Matt Green’s primer. To learn more about the Fiat-Shamir transformation, check out the blog post I wrote explaining it in more detail. You can also check out ZKDocs for more information about both topics.
So here’s how this will go, folks. I’ll show you a screenshot of the site, and the date it existed. Where available, I’ll even link to it on the Web Archive so you can see the various designs in all their (sometimes horrendous) glory.
I’ll also talk a little about what I think was going through my head, as well as some of the good and bad of each design.
Want to write a new Wikipedia article but can't think of a subject not already covered? Here are some items that are notable and should be easy to source: [...]
The mystery of the miracle year by Dwarkesh Patel is a great blog post that's been floating around. It's actually synthesized a lot of topics that I've written about in a way that I could never. Dwarkesh explores the short bursts of intense productivity and discovery that great scientists had – Newton, Copernicus, von Neumann, and Gauss. It is worth the read.
If there’s one thing people love to argue about, it’s charter schools.
I just spent an amazing day at the Smithsonian Museum of African American History. Just getting an admission ticket was a bit of a feat, but I worked through the tech maze eventually. The museum is a wonder- serious looking and very beautiful on the exterior, full to bursting every day since it has opened with people who actually have some interest in learning about the history of America.
What I told them was porn is a form of entertainment. Like superhero movies, it's exaggerated to make you feel strong emotions and excitement. The men and women are actors playing a role — even those verified amateurs are performing for money in most cases—and the scenes and actions in the videos are not necessarily an accurate representation of what intimacy, love and sex is or should be.
84 years ago, a teenager built a TV set in a basement in Hammond, Indiana. The teen was a radio amateur, [John Anderson W9YEI], and since it was the late 1930s the set was a unique build — one of very few in existence built to catch one of the first experimental TV transmitters on air at the time, W9XZV in Chicago. We know about it because of its mention in a 1973 talk radio show, and because that gave a tantalizing description it’s caught the interest of [Bill Meara, N2CQR]. He’s tracking down whatever details he can find through a series of blog posts, and though he’s found a lot of fascinating stuff about early TV sets he’s making a plea for more. Any TV set in the late ’30s was worthy of note, so is there anyone else out there who has a story about this one?
Having a pool is great, but it also requires significant monitoring and maintenance to keep it crystal clear and clean. The OPNpool controller from [Coert Vonk] aims to help in this task, integrating neatly into the smart home ecosystem of today.
We’ve noticed a couple of things about the “Widget from a Single Bolt” genre of metalworking videos. The first thing is that almost all of them need to use a freakishly large bolt, and many of them also rely on other materials to complete the build. And secondly, these builds all pretty much depend on a lathe to transform the bolt into the intended widget.
Input devices consisting of optical readers for punched paper tape have been around since the earliest days of computing, so why stop now? [Jürgen]’s Paper Tape Reader project connects to any modern computer over USB, acting like a serial communications device. Thanks to the device’s automatic calibration, it works with a variety of paper materials. As for reading speed, it’s pretty much only limited to how fast one can pull tape through without damaging it.
It's a nice first build for us, and a great opportunity for her to learn about guitars, woodworking, electronics, and so much more. The guitar is really more of an octave guitar, or, a six string ukulele depending on how you look at it. It is a Telecasteresque short scale electric guitar whose mahogany body will be stained cherry red, and the neck a light tint of "Bordeaux." My daughter has decided that she will name it hummingbird, which just seems like the perfect name for this twangy lil guy. We are both really excited to see how it turns out. So far we have only done the first round of sanding, but it feels like it has already come a long way. We got the coarse ends of the frets sanded down and managed to buff out other tricky details, like the truss rod cavern on the peghead.
This week Broadcom announced their full end-to-end chipset solutions designed for Wi-Fi 7 applications that range from residential gateways, enterprise access points, client devices to Wi-Fi routers. Broadcom claims that these Wi-Fi 7 chips double the performance of Wi-Fi 6 and 6E solutions commercially available today.
Broadcom’s Wi-Fi 7 devices for access points consist of the BCM6726/BCM6726 (residential Wi-Fi), the BCM43740/BCM43720 (enterprise Wi-Fi) and the BCM4398 which integrates Bluetooth 5.2 to optimize mobile handset applications.
RBI's digital currency to have anonymity feature for low value transactionsThe central bank digital currency (CBDC) that the Reserve Bank of India (RBI) is working on may have an anonymity feature for low-value transactions — the level up to which cash transactions are allowed. Records of higher value transactions, however, will be retained in the ledger, which makes traceability a feature.
According to sources, the thinking is that if a digital currency has to have the utility of paper currency, it needs to preserve the anonymity feature for everyday transactions. To ensure anonymity, the system needs a feature that will kill details of such low-value transactions.
Nearly 70% of smart TVs and 46% of game consoles were found to contain hardcoded DNS settings - allowing them to simply ignore your local network’s DNS server entirely. On average, Smart TVs generate an average of 60 megabytes of outgoing Internet traffic per day, all the while bypassing tools like PiHole.
Video conferencing apps (VCAs) make it possible for previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device’s video camera is carefully controlled, little has been done to ensure the same level of privacy for accessing the microphone. In this work, we ask the question: what happens to the microphone data when a user clicks the mute button in a VCA? We first conduct a user study to analyze users’ understanding of the permission model of the mute button. Then, using runtime binary analysis tools, we trace raw audio flow in many popular VCAs as it traverses the app from the audio driver to the network. We find fragmented policies for dealing with microphone data among VCAs — some continuously monitor the microphone input during mute, and others do so periodically. One app transmits statistics of the audio to its telemetry servers while the app is muted. Using network traffic that we intercept en route to the telemetry server, we implement a proof-of-concept background activity classifier and demonstrate the feasibility of inferring the ongoing background activity during a meeting — cooking, cleaning, typing, etc. We achieved 81.9% macro accuracy on identifying six common background activities using intercepted outgoing telemetry packets when a user is muted.
They found that all of the apps they tested occasionally gather raw audio data while mute is activated, with one popular app gathering information and delivering data to its server at the same rate regardless of whether the microphone is muted or not.
In the twentieth century, photography enabled the mass reproduction of art works, broadening their accessibility while degrading their individual impact. Just as art works ahve physical “auras,” as Walter Benjamin described it, traditional cameras produce images with distinctive qualities. Think of the pristine Leica camera photo shot with a fixed-length lens, or the Polaroid instant snapshot with its spotty exposure. The images made on those devices are inextricable from the mechanics of the devices themselves. In a way, the iPhone has made the camera itself infinitely reproducible. The device’s digital tools can mimic any camera, lens, or film at any moment, without the manual skill that was necessary in the past—not unlike the way in which early photographs replicated painters’ brushstrokes. The resulting iPhone images have a destabilizing effect on the status of the camera and the photographer, creating a shallow copy of photographic technique that undermines the impact of the original. The average iPhone photo strains toward the appearance of professionalism and mimics artistry without ever getting there. We are all pro photographers now, at the tap of a finger, but that doesn’t mean our photos are good.
The Freedom Phone advertises itself as a "Free speech and privacy first focused phone". As documented on the features page, it runs ClearOS, an Android-based OS produced by Clear United (or maybe one of the bewildering array of associated companies, we'll come back to that later). It's advertised as including Signal, but what's shipped is not the version available from the Signal website or any official app store - instead it's this fork called "ClearSignal".
The first thing to note about ClearSignal is that the privacy policy link from that page 404s, which is not a great start. The second thing is that it has a version number of 5.8.14, which is strange because upstream went from 5.8.10 to 5.9.0. The third is that, despite Signal being GPL 3, there's no source code available. So, I grabbed jadx and started looking for differences between ClearSignal and the upstream 5.8.10 release. The results were, uh, surprising.
First up is that they seem to have integrated ACRA, a crash reporting framework. This feels a little odd - in the absence of a privacy policy, it's unclear what information this gathers or how it'll be stored. Having a piece of privacy software automatically uploading information about what you were doing in the event of a crash with no notification other than a toast that appears saying "Crash Report" feels a little dubious.
As we head into the 2022 congressional elections, the implications of Trump's Big Lie, the January 6 violent insurrection at the Capitol, and the voter suppression and election sabotage laws that followed, are coming into major play.
After East Timor declared independence from Portugal in 1975, Indonesian dictator Suharto ordered an invasion and tried to crush the national liberation movement. Australia knew Indonesian forces were carrying out massacres — and helped hide it from the world.
Among EU nations, there are wide gaps between which countries import the most Russian gas in quantity and which are most dependent on the Russian gas they import — and for varying reasons, The Hill decided to take a look at both groups.
Violent riots by Muslim migrant groups broke out in Sweden after the announcement that they were going to stage a Koran burning. A new video shows that the gang [sic] even attacked the fire brigade that arrived.
“Our actions have shown that freedom of speech and freedom of peaceful assembly no longer exists in Sweden. Now, Sharia is the law of the land.” – Rasmus Paludan
The state chief minister took to Twitter and appealed to people to maintain peace and harmony; unfortunately, the miscreants don’t heed his pleas. These groups that were disrupting the peace have no interest in living in harmony with the “idol-worshippers.” They make deliberate attacks on their targets, and as observed in recent years, Hindu festivals top their target list — each one of them, be it Durga Puja, Ram Navami, Saraswati Puja, or a relatively less religious festival, the Hindu New Year.
I have now had one cloudy day, and one much more sunny day. This is April 14th and 15th. Bearing in mind that the best forecast from the installer was an average of 10.34kWh/day over the year. I expect winter to be much lower, obviously.
I installed monitoring for power usage a few months ago. This is using Shelly EM power monitoring modules with current clamps, reflashed with tasmota code. It works well, I have some nice graphing stuff (all on GitHub).
I finally have a solar install, and a battery on order. So this blog is the first one on this - I don't have a lot of data yet as it just went in, and I don't have a battery yet as they are like hen's teeth, so more on both of those later.
A blockchain is a shared database (or a log of transactions) that cannot be edited and whenever a new record is being added to its database (or line term), a new line of an item is added within the (block) book so that more records can be added within it and this block contains all information (not just financial) and the reason why is it called as dApps is that all the records of this book (or block) are stored in thousands of places all over and each one of them is maintaining copies, and are connected to the server.
In other words, we can say that it’s nothing but a safe and reliable database of records. Besides this, the person who uses this technology and architecture for developing applications is called a blockchain developer and the apps that leverage this technology runs on the internet called Web3 and they are also responsible for making the way out of any kind of complex issues during the execution.
Before moving ahead, we need to understand the role of a blockchain developer.
This RfC was open to community input between January 10, 2022 and April 12, 2022. A little under 400 users participated in the voting and discussion concerning the proposition that the Wikimedia Foundation stop accepting cryptocurrency donations.
Tens of thousands of anti-far right protesters marched across France on Saturday as opponents of presidential candidate Marine Le Pen seek to form a united front to prevent her from winning ahead of next weekend's presidential run-off.
Macron, a centrist, defeated Le Pen in 2017 when voters rallied behind him in the run-off to keep her far-right party out of power.
Perhaps related to this, I’ve drastically reduced my participation in and consumption of social media over the last several months.
The ordeal took nine years of Leysner’s life. The stress caused by the tax bill and her mother’s cancer diagnosis drove Leysner into depression and burnout. She ended up separating from her children’s father. “I was working like crazy so I could still do something for my children like give them some nice things to eat or buy candy. But I had times that my little boy had to go to school with a hole in his shoe,” Leysner said.
Leysner is one of the tens of thousands of victims of what the Dutch have dubbed the “toeslagenaffaire,” or the child care benefits scandal.
In 2019 it was revealed that the Dutch tax authorities had used a self-learning algorithm to create risk profiles in an effort to spot child care benefits fraud.
The French Presidency is aiming to loosen restrictions on law enforcement use of "artificial intelligence" technology, with a proposal circulated earlier this week to modify certain provisions in the Commission's proposal. The proposed changes would make it easier to deploy mass biometric surveillance technology in public, and significantly reduce the transparency obligations placed upon the authorities, amongst other things.
The European Union institutions are taking the significant step to regulate artificial intelligence systems, including in the area of law enforcement, within the proposed Artificial Intelligence Act (AIA).
40+ civil organisations call on the Council of the European Union, the European Parliament, and all EU member state governments to prohibit AI predictive and profiling AI systems in law enforcement and criminal justice in the AIA.
In April,€ Ms. Magazine€ published€ ‘The News That Didn’t Make the News’: How the Media Ignores Important Stories About Gender Violence and Inequity, by Project Censored’s€ Steve Macek€ and€ Shealeigh Voitl. Macek and Voitl use examples from the Project’s annual Top 25 story lists to document persistent gaps in corporate media coverage.
U.S. human rights monitor is calling for the release of journalist Vladimir Kara-Murza, a prominent Russian opposition figure who has spoken out against what he has called his government's crackdown on dissent.
The U.S. Helsinki Commission on Monday raised alarm over the detention of Kara-Murza in Moscow a month after he outlined the Kremlin's increased use of propaganda and censorship. His arrest is the latest report of authorities attempting to silence critics since Russian President Vladimir Putin launched his invasion of Ukraine in February.
When Rushdie was being persecuted, people rightfully recognized that the death decrees issued on him were not protected speech. So obviously there are speech acts that aren’t tolerated. But as soon as it’s Rasmus Paludan or Flemming Rose, it’s “just go ahead, boys, this is what a democracy is all about”. I’m not onboard with that.
Muhammad Kace, 56, is a former Muslim cleric who converted to Christianity in 2014. After his conversion, he began uploading videos to YouTube criticizing his former faith. He was arrested in Bali last August, following a sermon video in which he allegedly insulted the prophet Muhammad.
While a Muslim, he taught at an Islamic boarding school and went on the hajj pilgrimage to Mecca in Saudi Arabia three times.
His comments about the Prophet Muhammad were uploaded on his YouTube channel on Aug. 23 last year and went viral. He was arrested a few days later in Bali after complaints poured in from Muslims
On Thursday afternoon, riots broke out in the Skäggetorp districst of Linköping. The protests were triggered by the organisation of an Islam conference by the Danish politician Rasmus Paludan in this district, which is known for its high density of immigrants. Paludan had become known in the past for burning copies of the Koran at these meetings.
Four Islamist militants have been sentenced to death for killing a prolific Bangladeshi writer more than 18 years ago.
Azad earned the wrath of JMB and other militants and extremists because of his writings challenging bigoted thoughts. Days before the attack, he wrote a book critical of some Pakistanis for their role before Bangladeshi independence in 1971.
The illustrated author and academic of Dhaka University was stabbed near Bangla Academy in the capital on February 27, 2004.
Nigerian atheist activist Mubarak Bala, detained in April 2020, was sentenced Tuesday to 24 years after pleading guilty to 18 charges in a blasphemy case.
The 37-year-old was accused of writing Facebook posts criticising Islam and its prophet, which the court said were capable of breaching public peace in Nigeria's conservative Muslim north where sharia law is enforced alongside common law.
School librarians have tough jobs. And in 2021, an unprecedented number of attempts to ban books made it even tougher, according to the American Library Association.
Yishan Wong, who was Reddit’s chief executive officer for more than two years between 2012 and 2014, posted a long thread on Twitter about the reality of running a social media platform, stating Musk had “no idea” what he was taking on.
While the thread has attracted a great deal of attention online, Musk brushed it off with a swipe at its length, saying his key takeaway was that Twitter was “*way* overdue for long form tweets”.
Despite the recent revelation of Musk’s stake in the company, he’s been buying shares since the end of January. In March, he began publicly criticizing the company for supposedly limiting free speech. Musk adopted this language from the right-wing provocateurs he’s increasingly associating himself with, but neither truly care about free speech: they just want speech that better serves their interests. Musk himself has a history of slandering his critics, getting impersonators banned from Twitter, firing employees who disagreed with his ideas, and even reportedly having a whistleblower framed as a mass shooter.
"I think that open-source data and investigations have a really important role to play in helping to provide good information and in providing that information in a way that anyone can go and check it," she said.
But Killing added that information, as always, must be fact-checked.
When it comes to manga, censorship will always be an issue needing closer examination, and reports of it happening seem to grow by the month. According to a new report from Japan, it sounds like a recent manga is dealing with censorship in a big way after executives at Shueisha chose to remove the work. Now, news from abroad has surfaced suggesting the ban was done in part because of a controversial religious group, and netizens aren't sure how to feel about the whole ordeal.
The report suggests the manga received complaints concerning its depiction of religion. Or to be even more specific, its alleged take on the controversial religious group Happy Science. After all, Kukichi does tackle a variety of religions in their latest release, but the entire series was removed by Shueisha after its fifth chapter went live.
There are two ways to look at the BBFC. One is as an organisation that does what it says, and classifies things. It does far more of this than is often realised. The BBFC is known for the circular and triangular age ratings that appear before a film begins, with Mr Austin’s signature beneath. But its work is not limited to cinemas. Netflix and other streaming services classify content under its aegis, while fine threads of BBFC judgment lie over the entirety of the web itself. Activate “parental controls” on a mobile device and you are activating its guidelines, for those things deserving of a BBFC “18” will be automatically filtered out.
The other way of looking at the BBFC is as an unintentional but unsurpassed chronicle of British mores. Founded just over a century ago as the British Board of Film Censors, its early annual reports offer an almanac of old anxieties and moral panics. Between 1917 and 1933, for example, it was variously distressed by bull fights, blasphemy, “men leering at exposure of women’s undergarments”, “Bolshevist propaganda” and the opaque but unarguable “revolting monstrosities”.
At least Nine’s mastheads SMH and Age ran on the Coalition’s mega-pork this morning; some $55bn in public money being spayed about to buy votes. For their Murdoch peers in the media duopoly, there was no such attempt at balance; they were still pinning their ears back with inflated claims, “Labor’s jobs plan to cost billions”. Like their fallacious Darwin Port and Tasmanian loggers coverage this week, the fear-mongering over jobs was not based on any substance.
Substance is not their strongest suit. Going into week two of the campaign, Albo’s starts again with the large handicap of a Coalition-subservient media cheering on incumbent Scott Morrison.
“These sweeping arrests expose the intolerance for independent reporting that has made Somaliland a hostile environment for members of the press,” said CPJ’s sub-Saharan African representative Muthoki Mumo. “Authorities must release all journalists detained for their work, allow them to go back to their jobs without interference, and ensure that security personnel no longer harass or detain journalists for doing their jobs.”
I’m often asked whether consumers are better or worse off since the modern consumer movement took hold in the nineteen sixties.
In our new book, "Baseball Rebels: The Players, People, and Social Movements That Shook Up the Game and Changed America," Rob Elias and I profile the many iconoclasts, dissenters and mavericks who defied baseball's and society's establishment.
He may have come to Beijing’s attention when he criticized the Communist Party and promoted democratic ideas in private chat groups and on Chinese social media, according to Taiwanese media. He also sent books on similar topics to some of his contacts and reportedly helped the families of jailed Chinese dissidents.
Lee’s arrest in 2017 had a chilling effect on Taiwanese human rights activists because at the time he was a relatively low-profile activist with moderate views, said Yu-jie Chen, an assistant research professor at the law institute of Taiwan’s renowned Academia Sinica.
Now your generation is at the forefront of another breakthrough. Against all odds, exploited and mistreated workers in Staten Island, New York won the first ever union election at Amazon. These eight thousand warehouse workers, many of them young and pissed off just like you, beat a multimillion-dollar anti-union campaign by one of the most powerful companies in world history.
According to eyewitnesses, one of the two men was enraged by the Bible distributor’s shirt, which had “Christ is God” written on it in Arabic script. Apparently, this provoked the thuggish man to such an extent that he completely lost his temper and literally chased him. And this is exactly what outraged a colleague of the victim, because: in his opinion, the attack had radical-religious backgrounds.
A controversial fatwa [edict] published on Tuesday by Egypt's privately-owned daily Al-Masry Al-Youm newspaper that calls for a ban on serving food before iftar time during the Islamic holy month of Ramadan to "infidels" has sent shockwaves across the country.
The fatwa was released by preacher Mohamed Saleh El-Munajjid, a Syrian national of Palestinian origin who lives in Saudi Arabia, the hotbed of Wahhabism, an extremist interpretation of Islam.
The Human Rights Association (ðHD) Delegation for Monitoring Prisons in Marmara Region has announced its findings regarding the rights violations in ðstanbul's Silivri No. 5 Type-L Prison.
Lawyer Gülseren Yoleri, the head of the ðHD ðstanbul Branch, said they had confirmed the recent reports of torture and forced suicide in the prison during their visit.
Following a suspension last month, major streaming site Lookmovie was forced to switch to a new domain. Records show that Hollywood quickly went to court to maintain the pressure, while also seeking information on more than a dozen pirate streaming sites and IPTV services accounting for more than 100 million monthly visitors.