This is the second Istio release of 2022. We would like to thank the entire Istio community for helping to get Istio 1.14.0 published. Special thanks are due to the release managers Lei Tang (Google) and Greg Hanson (Solo.io), and to Test & Release WG lead Eric Van Norman (IBM) for his help and guidance.
When you upgrade from Istio 1.13.x to Istio 1.14.0, you need to consider the changes on this page. These notes detail the changes which purposefully break backwards compatibility with Istio 1.14.0. The notes also mention changes which preserve backwards compatibility while introducing new behavior. Changes are only included if the new behavior would be unexpected to a user of Istio 1.13.x. Users upgrading from 1.12.x to Istio 1.14.0 should also reference the 1.13.0 change logs.
This feature is intended primarily for use on VMs, where system administrators need to restrain interception of the outgoing traffic down to a few applications instead of intercepting all outgoing traffic.
By default, as before, the Istio Sidecar will intercept outgoing traffic from all processes, no matter what user groups they are running under.
Moving from physical networks using switches, routers, and ethernet cables to virtual networks using software-defined networks (SDN) and virtual interfaces involves a slight learning curve. Of course, the principles remain the same, but there are different specifications and best practices. Kubernetes has its own set of rules, and if you're dealing with containers and the cloud, it helps to understand how Kubernetes networking works.
Dr. Andre Kudra, who plays "retro geek jazz" with Aaron Newcomb (himself a retro master) and host Doc Searls in this fact and fun-filled episode about retro computing and Demoscene. Nothing in computing gets more open, real, and truly deep—close to the metal—in a fun way, than retro computing and the Demoscene. And nobody is more involved in all of it than Dr. Kudra.
Not much is happening with AppImages, nobody likes Snaps, but flatpaks are gaining are lot of traction as of late especially with release of the Steam Deck which is the primary method to install software.
Alma Linux is a community Linux distribution designed to be binary-compatible with Red Hat Enterprise Linux.
Today we are looking at LXLE Focal. It comes with Linux Kernel 5.4, based on Ubuntu 20.04, LXDE, and uses about 500MB of ram when idling. Enjoy!
In this video, we are looking at LXLE Focal.
One of the major features of the GNOME 42 desktop environment is a highly-customizable dock or dash. Let's look at how you can customize the new dock in Ubuntu 22.04 LTS (Jammy Jellyfish) or later to have a similar look to that of macOS.
Today we are looking at how to install Natron on a Chromebook in 2022. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
Counting lines in a Linux file can be hectic if you don’t know the applicable commands and how to combine them. This tutorial makes the process comfortable by walking you through eight typical commands to count lines in a file in Linux.
For example, the word count, wc, command’s primary role, as the name suggests, is to count words. However, since a group of words forms a line, you can use the command to count lines besides characters and words.
The new Plasma System Monitor is a great example of the wider Linux ecosystem. There was a tool, called KSysGuard, which worked pretty well. And so, a new tool was created, which for quite a while lacked the functional parity and was far buggier. This new tool was called Plasma System Monitor. Now, it has become the Plasma default, the old tool is gone, but you still don't quite get the functionality equivalence, and the graphs are significantly worse (by default and else). Feels like a lot of unnecessary effort. Linux, and modern software to boot.
That said, Plasma System Monitor is an extensible program, and you can tweak its look & feel. You can add new custom graphs, edit the existing ones, and make it work the way you want it. This is great, for tinkering nerds who want to invest time in something like this. This is horrible for the average user, who just needs to see some basic metrics for their system. But hey. The wheel of code must forever turn. Hopefully, this tutorial slash rant provides the necessary guidance to help you tame Plasma System Monitor to your liking, so that you can have a reasonably productive and accurate experience. Now you have the tools to be your own ... whatever. Thank you for reading, and see you soon.
This past week I mainly worked on two things, getting Tasks to remember its window size and position and adding a way to search through tasks.
[...]
Next is the search feature, I thought it would be pretty cool if this worked similarly to the less command line utility. The way it works in less is after you type the / character, everything after that will be the search pattern.
We have been notified of a site that is using Kdenlive’s name and likeness to distribute malware to users. We will not be linking to the site to avoid accidental downloads, but if a search lands you on a site offering “lightmoon”, “a free video editor” that looks in the screenshots identical to Kdenlive, this is malware.
We’re now in the final stretch with just a handful of issues left to resolve before we can release elementary OS 7. This month there was a large focus on making new stable releases of packages so that we can prepare for building stable images of OS 7. As we’ve mentioned before, the primary development focus has shifted from OS 6 and some components can no longer be released there. But, for those things which can still be built on both versions, a trickle of updates has landed in OS 6.1 this month.
Many thanks to our sponsors and all the people who donated to us. Thank you for your generous donations!
Many thanks also to our developers, moderators and all the people in our community who help us in different ways. This is a fantastic project, it’s a real pleasure to work with you.
There has been an interesting development in this month’s Linux Mint news segment regarding the future of the backup utility Timeshift which has become a core part of the distro in recent years. It turns out that Tony George, the developer behind the project doesn’t have time to work on Timeshift any longer and has agreed for the Mint team to take over. As part of the plans, Timeshift will now become a XApp, a suite of apps developed by the Mint team.
A core principle of Linux Mint is that things just work. To ensure things keep working after updates and upgrades, the Mint team started pushing, quite aggressively, for people to begin making system backups so they could restore their computers to an earlier state if anything went wrong. The tool of choice for backups in Mint was Timeshift and that utility has been bundled with the distro for quite a while now.
Warp is a simple, no-fuss file transfer app for Linux desktops.
Like, seriously simple.
Built in GTK4, Warp offers the sort of clean, focused UI we more commonly associate with Mac apps than Linux ones.
Not that user-friendly file transfer apps are unique or exclusive to Linux. Plenty exist. Yet Warp does something that tools I’ve written about in the past, like Linux Mint’s (terrific) Warpinator, don’t: it lets you send files outside of your local network.
Or to quote the Warp page on Flathub: “Warp allows you to securely send files to each other via the internet or local network by exchanging a word-based code.”
Which is kinda neat.
The extra-LAN capability makes Warp the ideal tool to reach for when you want to share a file with friend/colleague but don’t want to go through the predictable hassle of uploading it to a cloud-based service, generating a shareable link, sharing the link, them complaining the link doesn’t work, you having to check again… and so on.
Just open Warp, select the file to “send”, and copy the shareable code it generates. The recipient just opens Warp, clicks “receive”, punches in the code and… et voila: digital transference through the binary ether.
Today, SUSE has added IBM Z and LinuxONE support for several SUSE Rancher products – Rancher Manager, RKE2, K3s and Longhorn. Read on if you would like a little more information about each of these products.
Rancher Manager is undoubtedly the most important product. With Rancher Manager it is easy to run Kubernetes everywhere. Learning how to manage Kubernetes can be difficult. The Rancher Manager web UI makes centrally managing multiple Kubernetes clusters much easier than having to use the command line to manage each Kubernetes cluster separately. Rancher Manager 2.6.4 includes support to manage any CNCF-certified s390x Kubernetes cluster which includes RKE2 and K3s. s390x is the architecture designation for IBM Z and LinuxONE servers. The validated features for the initial s390x support in Rancher Manager include Rancher Server, Rancher Agent, Kubernetes Fleet operations, Helm chart catalog and backup/restore operations. As newer Rancher Manager versions are released, monitoring, logging alerting and CIS scans for s390x Kubernetes deployments will be added.
This is an article which is part of a series that attempts to showcase the kind of work that SUSE Support does and how we help customers resolve issues they encounter when running SUSE products. The cases that are selected will be based on real cases. However, all details will be fully anonymized and stripped of identifying marks.
Some problems are very hard to identify, but the steps to solve that issue are quite simple. Other problems are relatively easy to identify, but are not trivial to solve. I will share a problem that seems quite simple on the surface, but there are many complexities to take care of.
Today, everything is digitally connected—from gaming, banking, education, and job searching, to socializing with your friends and family. While access to technology and the internet has become abundant in the developed world, a significant portion of the world’s population still does not have this same freedom to access. At the same time, global warming and environmental issues persist.
The subscription includes over 130 hours of technical training content covering SUSE Linux Enterprise Server, SUSE Linux Enterprise High Availability, SUSE Linux Enterprise Server for SAP Applications, SUSE Manager and SUSE Rancher. With an annual subscription, you’ll also stay up to date with the latest product releases from SUSE.
Cloud-native architectures have changed the way applications are deployed, but remain relatively uncharted territory for high-performance computing (HPC). This week, however, Red Hat and the US Department of Energy will be making some moves in the area.
The IBM subsidiary – working closely with the Lawrence Berkeley, Lawrence Livermore, and Sandia National Laboratories – aims to develop a new generation of HPC applications designed to run in containers, orchestrated using Kubernetes, and optimized for distributed filesystems.
The work might also make AI/ML workloads easier for enterprises to deploy in the process.
In just three years, this community site "by sysadmins, for sysadmins" has given millions of people information to help them do their work better.
In the first quarter of 2022, the labor market continued its trend of what has been coined the "great resignation," leaving many organizations competing to recruit and retain top talent. Red Hat continues to iterate its training offerings to keep pace with the changing needs of this talent as well as the landscape of technology.
Employees who participate in Red Hat Training average longer tenures and higher satisfaction with their jobs. Further, 75% of Red Hat Learning Subscription users agree that the subscription makes it faster and easier for them to troubleshoot issues with Red Hat technologies and 84% agree that they feel more confident on the job as a result of their training.
As part of Red Hat’s hybrid cloud vision, Red Hat Insights is available on all actively supported versions of Red Hat Enterprise Linux (RHEL), to help continuously analyze platforms and applications and better predict potential risk, no matter where RHEL is actually deployed. Even with this relative ubiquity of the service, we’ve never had IBM Power-specific recommendations in Insights — until now.
Insights now integrates with an offering from IBM, the IBM Fix Level Recommendation Tool (FLRT). IBM FLRT provides cross-product compatibility information and fix recommendations for IBM products. One of the main IBM FLRT use cases is to plan upgrades of key components and to verify the installed software and firmware level to assess health and stability of your IBM Power systems.
Switch button with Raspberry PI Pico allows your projects to get the simplest input from the user: a push. With this input, you can start a program to execute a specific job only when the user requires it
When it comes to activity monitors such as smartwatches, rings, and pendants, they are often considered cumbersome or too difficult to keep track of, especially for the elderly with memory or dexterity problems. This is why the team of Jure à  peh, Jan Adamic, Luka Mali, and Blaz Ardaljon Mataln Smehov decided to create the SmartSlippers project, which is a far more integrated method for detecting steps and falls.
The hardware portion of the SmartSlippers prototype is just a Nano 33 BLE Sense board due to its onboard inertial measurement unit (IMU) and Bluetooth€® Low Energy capability. At first, the team collected 14 minutes of five different types of movements: walking, running, stairs, falling, and idle within the Edge Impulse Studio. From here, they trained a neural network on these samples, which resulted in an accuracy of around 84%.
Mature process nodes like SKY130 (a 130nm technology) offer a great way to prototype IoT applications that often need to balance cost and power with performance and leverage a mix of analog blocks and digital logic in their designs. They offer a faster turnaround rate than bleeding-edge process nodes for a fraction of the price; reducing the temporal and financial cost of making the right mistakes necessary to converge toward the optimal design.
By combining open access to PDKs, and recent advancements in the development of open source ASIC toolchains like OpenROAD, OpenLane, and higher level synthesis toolchain like XLS, we are getting us one step closer to bringing software-like development methodology and fast iteration cycles to the silicon design world.
Free and open source licensing, community collaboration, and fast iteration transformed the way we all develop software. We believe we are at the edge of a similar revolution for custom accelerator development, where hardware designers compete by building on each other's works rather than reinventing the wheel.
Towards this goal, we've been sponsoring a series of Open MPW shuttles on the Efabless platform, allowing around 250 open source projects to manufacture their own silicon.
Word users expect to be able to import their document to Writer and experience a matching feature set: form filling is not an exception. Word provides several content control kinds (inline, block, row and cell content controls), this project focuses on inline ("run") content controls.
In the scope of inline content controls, the above linked blog post already described the rich text and checkbox types. In this post, we’ll focus on the new dropdown, picture and date content controls.
In order to make it easier for users to find training videos about LibreOffice, we have created a comprehensive index updated to the end of April 2022 using the open source Zotero bibliography and reference management software.
The index is published on this blog in the Media Hub section (clicking on the Media Hub menu, you will open a drop down menu with Press Releases and Index of Videos).
The regular meeting would have been Thursday, June 2nd but we decided to postpone for one week to gather up more topics... so the meeting will be on Thursday, June 9th instead. Hopefully topics will be added to this meeting notice later.
The 5th monthly Sparky project and donate report of 2022...
Tailwind is a free, open-source utilities-first CSS framework. It was featured in dozens of projects by developers who use different frameworks as Vue, React, Angular, Blaze, Meteor, Svelte, and others. As its popularity is growing, developers start building their own custom libraries on top of Tailwind.
Easiest app/database deployment platform and webserver package for your NodeJS, Python, PHP, Ruby, Go applications.
Jenkins is an open-source continuous integration server. It provides continuous integration services for software development, mostly used in highly customized builds of software. And it is a continuous integration service for software development which you can primarily utilize in highly customized software builds.
Continuous Integration (CI) is a software development process in which members of a team merge their work on a regular basis; typically, each individual integrates at least once each day, resulting in several integrations per day. To uncover integration faults as fast as possible, an automated build evaluates each integration (which includes a test). Further, the goal of CI is to ensure that all code committed to a shared repository can be built and tested, validating not only that the code works but also that it will continue to work properly when integrated with other code changes.
The much-anticipated Perl 7 continues to twinkle in the distance although the final release of 5.36.0 is "just around the corner", according to the Perl Steering Council.
Well into its fourth decade, the fortunes of Perl have ebbed and flowed over the years. Things came to a head last year, with the departure of former "pumpking" Sawyer X, following what he described as community "hostility."
Part of the issue stemmed from the planned version 7 release, a key element of which, according to a post by the steering council "was to significantly reduce the boilerplate needed at the top of your code, by enabling a lot of widely used modules / pragmas."
It all sounds wonderful, but the price would have been the breaking of some backwards compatibility, meaning that some code targeting earlier versions of the programming language would have needed changing.
"This prompted a lot of heated discussions," said the council. "Some thought this was a great idea, and some thought it a terrible idea to throw away one of Perl's key strengths."
Considered to be preferable to sale to China-owned Nexperia, say sources
Intel CEO Pat Gelsinger and Samsung Electronics boss Lee Jae-yong met on Monday in South Korea and “discussed how to cooperate between the two companies."
That quote comes from Samsung, which also let the world know the two leaders talked about next-generation memory chips, silicon for PCs and mobile devices, fabless chip design, the foundry business, and more.
It is unclear if the talks addressed a particular issue, or just represented the heads of the world’s top two chipmakers getting together for a chat while Gelsinger was in town.
In a sign of how meteoric AMD's resurgence in high performance computing has become, the latest list of the world's 500 fastest public known supercomputers shows the chip designer has become a darling among organizations deploying x86-based HPC clusters.
The most eye-catching bit of AMD news among the supercomputing set is that the announcement of the Frontier supercomputer at the US Department of Energy's Oak Ridge National Laboratory, which displaced Japan's Arm-based Fugaku cluster for the No. 1 spot on the Top500 list of the world's most-powerful publicly known systems.
Top500 updates its list twice a year and published its most recent update on Monday.
The land of the rising sun has fallen to the United States’ supercomputing might. Oak Ridge National Laboratory’s (ORNL) newly minted Frontier supercomputer has ousted Japan’s Arm-based Fugaku for the top spot on the Top500 rankings of the world's most-powerful publicly known systems.
Frontier’s lead over Japan’s A64X-based Fujitsu machine is by no means a narrow one either. The cluster achieved peak performance of 1.1 exaflops according to the Linpack benchmark, which has been the standard by which supercomputers have been ranked since the mid-1990s.
Frontier marks the first publicly benchmarked exascale computer by quite a margin. The ORNL system is well ahead of Fugaku’s 442 petaflops of performance, which was a strong enough showing to keep Fugaku in the top spot for two years.
Reaching exascale status is one thing, but many expected the efficiency-geared Fugaku system to hang onto its green rankings, even if it slipped on the performance front. But Frontier isn’t just the most powerful known supercomputer, its technology is now also the most efficient. At 52.23 gigaflops per watt, the system's test-and-development machine Crusher also outperformed Japan’s Preferred Networks MN-3 system to take the lead spot on the Green500.
Microsoft has warned users that Azure Active Directory isn't currently producing reliable sign-in logs.
"Customers using Azure Active Directory and other downstream impacted services may experience a significant delay in availability of logging data for resources," the Azure status page explains. Tools including Azure Portal, MSGraph, Log Analytics, PowerShell, and/or Application Insights are all impacted.
Security updates have been issued by Debian (libjpeg-turbo, webkit2gtk, and wpewebkit), Fedora (golang-github-opencontainers-runc, mingw-pcre2, python-jwt, python-ujson, and weechat), Oracle (nodejs:16 and rsyslog), Red Hat (container-tools:3.0, expat, fapolicyd, kernel, kernel-rt, kpatch-patch, mariadb:10.3, postgresql:12, rsyslog and rsyslog7, and zlib), Slackware (mozilla), SUSE (bind, dpdk, fribidi, hdf5, librelp, php74, postgresql12, and postgresql13), and Ubuntu (cups, linux-gcp-5.13, linux-oracle, linux-oracle-5.13, linux-gcp-5.4, linux-gkeop, linux-gkeop-5.4, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, and webkit2gtk).
CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN) have released a joint Cybersecurity Advisory (CSA) to provide information on the Karakurt data extortion group. Karakurt actors steal data and threaten to auction it off or release it to the public unless they receive payment of the demanded ransom.
An emailed report seemingly about a payment will, when opened in Excel on a Windows system, attempt to inject three pieces of file-less malware that steal sensitive information.
Researchers with Fortinet's FortiGuard Labs threat intelligence unit have been tracking this mailspam campaign since May, outlining how three remote access trojans (RATs) are fired into the system once the attached file is opened in Excel. From there, the malicious code will not only steal information, but can also remotely control aspects of the PC.
The first of the three pieces of malware is AveMariaRAT (also known as Warzone RAT), followed by Pandora hVCN RAT and BitRAT.
Smart homes are increasingly becoming hackable homes, according to consumer research.
The report by consumer rights organization Which? paints a grim picture for people who have equipped their residences with gadgets, many from trusted tech names.
As with pretty much everything in IT, if you connect a device to the internet, ensuring it's patched and has a decent password is the very least owners can do. Even then, there are no guarantees that this is secure.
"It will also exfiltrate credentials from multiple software programs like Google Chrome, Mozilla Firefox, and Microsoft Outlook — making its potential impact truly catastrophic," Qualys Principal Research Engineer Ghanshyam More wrote in a technical analysis earlier this year.
Eleven significant tech-aligned industry associations from around the world have reportedly written to India’s Computer Emergency Response Team (CERT-In) to call for revision of the nation’s new infosec reporting and data retention rules, which they criticise as inconsistent, onerous, unlikely to improve security within India, and possibly harmful to the nations economy.
The rules were introduced in late April and are extraordinarily broad. For example, operators of datacenters, clouds, and VPNs, are required to register customers’ names, dates on which services were used, and even customer IP addresses, and store that data for five years.
Another requirement is to report over 20 types of infosec incident, even port scanning or attempted phishing, within six hours of detection. Among the reportable incidents are “malicious/suspicious activities” directed towards almost any type of IT infrastructure or equipment, without explanation of where to draw the line between malicious and suspicious activity.
The new rules attracted plenty of local criticism on grounds that a six-hour reporting window is too short, the requirement to record VPN users’ details is an attack on privacy, and that the requirements are too broad and therefore represent an onerous compliance burden.
Researchers have reported a still-unpatched Windows zero-day that is currently being exploited in the wild.
A critical code execution zero-day in all supported versions of Windows has been under active exploit for seven weeks, giving attackers a reliable means for installing malware without triggering Windows Defender and a roster of other endpoint protection products.
The Microsoft Support Diagnostic Tool vulnerability was reported to Microsoft on April 12 as a zero-day that was already being exploited in the wild, researchers from Shadow Chaser Group said on Twitter. A response dated April 21, however, informed the researchers that the Microsoft Security Response Center team didn't consider the reported behavior a security vulnerability because, supposedly, the MSDT diagnostic tool required a password before it would execute payloads.
Ask 1,000 CIOs whether they believe their organizations are vulnerable to cyberattacks targeting their software supply chains and about 82 percent can be expected to say yes.
Security biz Venafi engaged research firm Coleman Parkes to put that question to as many corporate IT leaders from the US, UK, France, Germany, Austria, Switzerland, Belgium, Netherlands, Luxembourg, Australia, and New Zealand.
The result was an emphatic vote of no confidence.
"The results show that while CIOs understand the risk of these types of attacks, they have yet to grasp the fundamental organizational changes and new security controls they will need to incorporate into their security posture to reduce the risk of supply chain attacks that can be devastating to themselves and their customers," says Venafi's report, which was released on Tuesday.
[...]
Blame SolarWinds, Codecov, and Kaseya – companies that had their corporate software build tools compromised in sophisticated attacks that affected their customers – not to mention the past five years of poisoned packages at popular open-source software registries.
A Data Protection Impact Assessment (DPIA) into Google Workspace was launched by the Central Dutch government in 2020. The report noted there were eight high-risk issues, principally around data collection. It also noted that Google did not provide all the personal data it held when asked to do so under the GDPR provisions for the right to request access.
Google said today: "As a result of this process, the Central Dutch government, the Dutch education sector organisations/institutions, and Google Cloud found agreement and will continue working together on the DPIA recommendations."
Among all the other introduced pests in Australia, one that I really detest and keep meeting up with is the European wasp[1]. Sadly, there seem to be more and more of them each year, spreading further and further around the country and deeper into bushland.
India's government has reportedly started probes into the local activities of Chinese tech companies Vivo and ZTE, prompting a rebuke from China's foreign ministry.
As was the case when Indian authorities seized $725 million from Chinese gadget-maker Xiaomi, the investigations focus on possible irregular financial reporting that may amount to fraud, according to newswire Bloomberg's original report on the matter.
A Bloomberg reporter asked about the state of the investigations at the daily press conference staged by China's Ministry of Foreign Affairs, which produces a transcript of each day's event.
Zhao Lijian, China's famously feisty foreign ministry spokesperson, said Beijing "is closely following the situation."
I needed a sofa bed and started looking around. The only one that fit my criteria was the IKEA Nyhamn. The problem was that it doesn't currently exist.
To be more precise hardly any IKEA store (at least here in Sweden) has it in because of logistical issues.
The price of diesel has reached €£1.90 per litre (about $9 per US gallon), food prices are way up, the economy seems to be heading for a period of stagflation, the UK government is destroying the constitutional checks and balances on its actions, Russia is making gains in eastern Ukraine. And little England is putting up the bunting to celebrate the Platinum Jubilee of an elderly monarch who inherited her position and wealth and seemingly has no influence on the governance of the nation. What is an anti-monarchist to do?
The UK has begun a fast-track visa scheme for tech workers graduating from a list of top 50 universities worldwide.
Critics, however, maintain the scheme will fail to compensate for the barriers erected to tech recruitment from the EU as a result of Brexit.
Announcing the "high-potential individual route", which started from 30 May, the British government said it wants to attract the world's top graduates in subjects such as science, engineering and medical research. Sought-after skills also include cybersecurity in a plan to support both economic growth as well as technological and medical advances.
The UK's chief finance minister, Rishi Sunak, said: "This new visa offer means that the UK can continue to attract the best and brightest from across the globe. The route means that the UK will grow as a leading international hub for innovation, creativity and entrepreneurship.
"We want the businesses of tomorrow to be built here today - which is why I call on students to take advantage of this incredible opportunity to forge their careers here," he added.
Successful applicants will get a two-year work visa for Britain — three years for those with PhDs — and could move into other long-term employment routes.
Tesla supremo Elon Musk has declared that executive staff at his battery-powered vehicle biz shall not work from afar.
In an email sent to Tesla underlings and obtained by the New York Times, Musk tells Tesla execs that remote work is no longer acceptable.
"Anyone who wishes to do remote work must be in the office for a minimum (and I mean minimum) of 40 hours per week or depart Tesla," Musk's missive mandates. "This is less than we ask of factory workers."
Musk, the world's richest person at the moment, allows that he may, at his discretion, bend his rules for "particularly exceptional contributors" – if you have to ask, that's probably not you. The billionaire poly-boss and Twitter influencer further stipulates that "office" as he defines it means main office, not some remote branch unrelated to one's duties.
The US Supreme Court on Tuesday reinstated the suspension of Texas' social-media law HB 20 while litigation to have the legislation declared unconstitutional continues.
The law, signed in September by Texas Governor Greg Abbott (R), and promptly opposed, forbids large social media companies from moderating lawful content based on a "viewpoint," such as "smoking cures cancer" or "vaccines are poison" or hateful theories of racial superiority. Its ostensible purpose is to prevent internet giants from discriminating against conservative social media posts, something that studies indicate is not happening.
Those fighting the law – industry groups and advocacy organizations – say the rules would require large social media services such as Facebook and Twitter to distribute "lawful but awful" content – hate speech, misinformation, and other dubious material. They argue companies have a First Amendment right to exercise editorial discretion for the content distributed on their platforms.
It may be nearly three years since the world officially exhausted all of the available IPv4 internet addresses, but now a new initiative has been proposed that could free up hundreds of millions of addresses that are currently unused – or are they?
While the world is still slowly moving towards broader adoption of the newer IPv6 protocol, which offers a vast address space, the widespread continued use of IPv4 has caused problems because all available ranges of the roughly 4.3 billion addresses it supports have largely been allocated.
I wanted to keep a history of my bike rides, so I created the "bikelog" on my capsule.