There are some great standalone RSS readers for Android but I got slightly tired of pulling out my phone when I was at my computer to catch up on news and blogs. I already had a VPS that wasn't seeing a ton of use and had heard people talking about FreshRSS so I figured why not give it a try.
Setup was straightforward, though anyone who hasn't set up a web server before or isn't familiar with Docker will have to do a bit of learning (you could also totally use DDEV!).
I'm not sure what there is to say about an RSS reader other than it works great and it's nice having access to all my articles on any device. It's plenty customizable, each user can configure addons and themes that have been installed on the server. And the default keyboard shortcuts are super nice.
Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.
Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.
This series looks at the best free and open source alternatives to products offered by Corel.
One fun aspect of using any Linux operating system distribution is its ability to transform us into computing wizards. With Linux, its open-source nature makes it possible to break and/or create any logical computing rule(s). Filenames’ length and limit fall under such computing rules.
Since Linux is part of the Unix-based systems, the file name length associated with this operating system has a limit. The length limit of filenames under a Linux operating system depends on the filesystem in question.
Last year, I wrote about managing focus in the shadow DOM, and in particular about modal dialogs. Since the <dialog> element has now shipped in all browsers, and the inert attribute is starting to land too, I figured it would be a good time to take another look at getting dialogs to play nicely with shadow DOM.
This post is going to get pretty technical, especially when it comes to the nitty-gritty details of accessibility and web standards. If you’re into that, then buckle up! The ride may be a bit bumpy.
Text editors are important tools in the life of a Linux user. As we get used to our preferred Linux operating system distribution, we slowly transition from beginners to expert users.
In the course of this transition, we find ourselves leaning more and more towards this operating system’s non-graphical user interface. Reason? This Linux OS environment hosts numerous computing tools associated with it. This non-graphical user interface is none other than the Linux command-line environment.
Linux application packages and utilities bound to the command-line environment are resource-friendly and faster in their executive power in comparison to the ones bound to the graphical user interface like the Linux Desktop environment.
Graylog is a free and open-source log-management platform for capturing, storing and enabling real-time analysis of your data and logs. It's written in Java and built on top of other open-source software like MongoDB and Elasticsearch.
 This error is very common when you try to log in to your MySQL for the first time.
Personally, I too faced this issue multiple times, maybe because we were not following the right way to install MySQL, or we forgot to set a password, or else we didn’t get the options to set a password.
Similarly, there may be many other reasons for the above error, but the solution to this error is pretty simple and easy. In this article, you will find a way to resolve 1698 (28000) Access denied for user ‘root’@’localhost’.
There are two ways to resolve this error. First, you will see a simple and less time-consuming method. If the first method didn’t work in your case, then go to the second one.
AMD announced yesterday that they're now supporting the Radeon Memory Visualizer on Linux, as a result of "the rising popularity of gaming on the Linux OS".
Crazy animal fighting game Them's Fightin' Herds has a huge 3.0 update out now, bringing with it some new super abilities and some DLC pulled into the main game for everyone.
With a demo currently available in Steam Next Fest, the racer game Turbo Golf Racing is one to watch. Tested on Fedora Linux and Steam Deck, it works out of the box with Proton 7.
Another smaller update is now available for Proton Experimental, the special version of Proton that has all the latest fixes first for you to try. Info: Proton is the compatibility layer you can use on Linux and Steam Deck to run Windows games.
Cassette Beasts is an incredibly exciting looking upcoming monster collecting game, one that will offer a rather unique take on the genre and a new trailer is up showcasing the fusion system.
20 Minutes Till Dawn is what you get when you take the basic action-survival idea that Vampire Survivors made popular again, makes it really dark and puts a gun in your hand. Note: personal purchase.
You're an android who awakens in a ruined future, this is Kandria. A new upcoming 2D hack and slash open world action RPG. Developed by Shirakumo Games / Nicolas Hafner, you'll be exploring a world full of caverns, tunnels, and ruined buildings while also fighting off hordes of enemies and there's plenty of challenging platforming thrown in too.
With an initial setting that seems a little like The Long Dark, the upcoming Arctic Awakening seems like a thoroughly interesting story-focused exploration adventure. Shown off during the Future Games Show summer showcase, the developer confirmed to me today their plans to have it release with a Native Linux build.
Proton 7.0-3 is the latest stable version of the compatibility layer, that allows you to run Windows games on Steam Deck and Linux and it's out now. Here's what's new. Not to be confused with Proton Experimental, the special testing version you can try, which was also updated today.
Ready to get the latest and greatest from the KDE team? The awesome Plasma 5.25 release is officially out now. This is the desktop environment used on the Steam Deck when in Desktop Mode! Hopefully Valve will update it at some point.
We have released OpenBGPD 7.4, which will be arriving in the OpenBGPD directory of your local OpenBSD mirror soon.
In a recent Red Hat survey, summarized by our 2022 State of Kubernetes security report, a broad majority of the more than 300 correspondents reported that they are incorporating security into DevOps processes and pipelines, a practice called DevSecOps.
This article draws on the report as well as a Red Hat white paper, How to automate DevSecOps in Red Hat OpenShift, to show the rate of DevSecOps adoption and the factors that we believe make it work well.
Changes in libraries have a risk of breaking things in unpredictable places. Debugging a crash is usually simple. But recently, in the late stages of working on the curl utility for Red Hat Enterprise Linux 9, I encountered a bug report that looked rather strange. In this article, I will discuss how this report led me to implement a localization bug fix during the late stages of RHEL 9 development.
Successful digital transformation hinges on the continuous improvement of people, processes, and technologies. We often treat these three components as independent silos: We’ll mutually exclusively upgrade our technologies, enhance our processes, or improve the work lives of our people.
These are all important and necessary, but what if we linked all three together? What if we could automate our processes to integrate our technologies to enhance the efficiency and satisfaction of our people?
Let me give you an easy example of how we’re doing this at Red Hat.
We all know how the Great Resignation, physical isolation from coworkers, and return-to-office anxieties contribute to what many call the Great Reprioritization. Employees want to make a difference and a visible impact and are re-evaluating their place in the organization and looking for meaning and purpose in their work.
In 2022, almost 50% of developer-focused recruiters testified to having difficulty finding qualified candidates.
The pinephone has lost most of its appeal, mainly because the keyboard case doesn't charge (itself or the phone) consistently.
This wouldn't be a problem if the phone could be in the keyboard case and be powered off. But since the keyboard case is a power supply, the phone will immediately boot up again.
The BeagleBoard community released a new BeagleBone board yesterday. The new model is called the BeagleBone AI-64 which builds on the BeagleBone AI SBC released a few years ago. The new Single Board Computer is equipped with the TDA4VM System on Chip (SoC) produced by Texas Instruments.
The SoC implemented for the BeagleBone AI-64 consist of two ARM Cortex-A72, six ARM Cortex-R5, a PowerVR Rogue 3D GPU, 4GB LPDDR4, 16GB of eMMC storage, one MicroSD card socket, one GbE LAN port, and many other peripherals.
When the Raspberry Pi people launched their RP2040 microcontroller, it seemed as though it might be destined as a niche product for those areas in which the Pi has traditionally been strong. But during the global semiconductor shortage, it has remained almost alone among microcontrollers in having plenty of fab capacity to keep the supplies rolling. That, and its very vanilla set of ARM peripherals alongside those programmable state machines have thus seen it find a home in many places it might not otherwise have seen. Take the dual RP2040 motor controller from [Twisted Fields] as an example, would it have been more likely to have sported an STM32 in previous years?
As one should have expected after Nordic Thingy:52 and Thingy:91 IoT devkits were introduced in 2017 and 2019 respectively, the Norwegian company has now launched the Thingy:53 platform based on Nordic Semi nRF5340 dual-core Arm Cortex-M33 SoC for IoT prototyping with Bluetooth Low Energy, Thread, Matter, Zigbee, IEEE 802.15.4, NFC, and Bluetooth mesh RF protocols.
The development kit also incorporates the nPM1100 PMIC and nRF21540 Front End Module (FEM), a power amplifier/low noise amplifier (PA/LNA) range extender, as well as multiple motion and environmental sensors, as well as a rechargeable 1350 mAh Li-Po battery for power.
Some projects you come across simply leave you in awe when you look at the thought and the resulting amount of work that went into it, not only for the actual implementation, but everything around it. Even more so when it’s a single-developer open source project. [Stone Preston]’s synth / sampler / sequencer / DAW-in-a-box LMN-3 absolutely fits the description here, and it seems like he has set his heart on making sure everyone can built one for themselves, by providing all the design files from case down to the keycaps.
The cross platform email client Thunderbird is to launch an Android version, which will be based on the existing K-9 app.
A month after Thunderbird's product manager, Ryan Lee Sipes, tweeted that a mobile version of the email client was "coming soon", the project has announced how it will do it.
It has acquired the FOSS Android email client and one-time Register app of the week K-9 Mail, which will become Thunderbird for Android.
The Thunderbird Foundation has hired Christian Ketterer, known online as "cketti", developer of K-9.
Thunderbird users have been asking for an Android version for years. This is an unexpected route to get there, but it's a viable one: K-9 is a well-regarded app, and one of the very few Android apps to handle traditional bottom-posted email.
On Tuesday, Mozilla and its Firefox browser announced Total Cookie Protection, a powerful way for Firefox to preserve privacy while allowing websites to recognize you and provide customized experiences.
Total Cookie Protection is rolling out to all Firefox users worldwide, the company announced on Tuesday. It will be on by default.
Tor Browser receives hundreds of changes a year: from updates to Firefox – the underlying browser on which Tor Browser is based – to entirely new features designed to help protect at-risk and censored users. However, each change made to Tor Browser has the potential to introduce new and sometimes elusive bugs.
In order to find and fix these bugs before they reach the majority of our users, we apply updates to an early version of Tor Browser known as Tor Browser Alpha before releasing them more widely. Then, as a small nonprofit, we rely on a community of volunteer testers to try out our alphas before their general release in order to keep Tor Browser available on so many platforms.
The Art of Running a Tor Bridge or Relay: enhancing your contribution with sysadmin fu
If you want to buy a car, there are plenty of choices. If you want to buy a jetliner, there are fewer choices. If you want to use the Large Hadron Collider, you have a choice of exactly one. The harder something is to create, the less likely there is to be many of them. If you are looking for a Linux debugger, there are only a few choices, but gdb is certainly the one you will find most often. There is lldb and a handful of non-open commercial offerings, but for the most part you will use gdb to debug software on Linux.
Right this morning when I woke up, before I even had a glass of water, I started reading a blog post by Maya discussing a new protocol. I was immediately intrigued, and starting reading the original post, Specifying Spring '83. After reading through the blog post, I excitedly moved on to the actual spec draft. I was amazed. Possibly because it was the first thing my brain had processed all day, but still, I really loved the idea. What follows is some thoughts on the spec draft, to add to the ongoing discussion.
[...]
Please don't use YAML for the peer list. YAML is not great. A simple JSON list would be better. A separate Markdown file can provide human-readable metadata if needed.
People rolling off shields and spears clashing against swords as the camera zooms in and out wildly makes the hallmark action sequences in the movie 300 so iconic. Unfortunately, achieving this effect wasn’t particularly easy. Three cameras were rolling, each with a different lens (100mm, 50mm, and 21mm) to capture a different view of the same scene. In post-production, you can dramatically switch between the three cameras since the shot is synchronized. The folks over at [Corridor Crew] wanted to recreate the effect, but rather than create a custom mount to hold three expensive cameras, they 3d printed a custom mount to hold three costly smartphones.
You can easily go stomping once your foot is through the door.
It’s easy to throw love to someone who can trust in whom it’s for
but not as easy being into those who don’t show what they feel.
It’s been weeks since you last called me so I think I see the deal.
You have a way with words to make us sound like such a thrill.
You have this way of losing me when you feel you’ve had your fill.
You shelter me from rainstorm when you want and when you care,
then forget me in the downpour as if “li’l me” ‘s not there.
My wife and I just received the keys of the apartment we bought back in late January. The (grumpy) tenant left in early May after she agreed to terminate the rental contract early, but the previous owner was on vacation (and then, on another vacation), so we received the keys only now.
So I was playing a game this evening. But then it started lagging. I decreased graphics quality from "high" to "med", from "med" to "low" - it didn't become much better - maybe even worse. I set game on pause and fired up task manager - it showed 100% CPU usage and 100% disk usage. I waited a few minutes with game on pause - numbers didn't change. I would assume that whatever game needs to load (like textures for a next level) - being paused, it should eventually load them and stop the disk activity?
Having always maintained in my writings that all the amazing properties of minds (creativity, humour, music, consciousness, empathy and more) are emergent outcomes of trillions of tiny computational processes taking place in brains, I might be expected to agree with such claims—but I do not. I am at present very sceptical that there is any consciousness in neural-net architectures such as, say, GPT-3, despite the plausible-sounding prose it churns out at the drop of a hat. Let me explain my viewpoint through a few examples.
All this is to say that there is no strong theoretical justification for the criterion for safety being three, or any other number. In theoretical computer science there is a very strong theoretical result dating from 1982, called Byzantine Fault Tolerance (BFT). This proves that 3f+1 replicas can in the worst case survive f simultaneous failures. This would lead to the idea that, to be safe against one failure, four replicas are needed. Or to be safe against two failures, seven replicas are needed.
In the last week of her life, my mother extracted a promise from me. “Make sure,” she said, “that Orion goes to college.”
Adam Bessie teaches literature, English composition, and critical thinking at a community college in Northern California.€ Peter Glanting is an illustrator and product designer based in Portland, Oregon. Their book is scheduled for release in early 2023, from The Censored Press and Seven Stories Press.
If anyone has been struggling to get hold of a 3.5ââ¬Â³ floppy drive lately, we think we’ve got a clue as to why — behold, the mighty floppotron 3.0 by [Paweà â Zadroà ¼niak.] With an utterly bonkers 512 floppy drives, four flatbed scanners and sixteen hard disks of various sizes, the floppotron 3.0 MIDI synthesiser is possibly the biggest such retro hardware synthesiser so far. Since every part of the system is motor-based, nobody is going to be surprised that to power the show is quite an undertaking, with nearly twenty switched-mode PSU modules needed to keep up with the demand, averaging 300W but rated at 1.2kW peak!
When it comes to rendering text input into an electronic form,the newest keyboards use USB for wired interfacing, while the oldest Morse keys use a single conductor. Shall the two ever meet? For [Matthew Sparks] the answer is yes, with his “The Gadget” Morse-to-USB HID interface which presents a Morse key to a computer as though it were a USB keyboard.
At some point when developing embedded applications, you’re going to want to store unique values in non-volatile memory, values that can’t be fixed at compilation time. Many microcontrollers have a small amount of EEPROM memory for this very purpose, but it’s usually rather limited if it’s provided at all. Even if you do have a bit of space on an EEPROM at your disposal, actually formatting your values into the memory and dealing with the pesky problem of wear leveling (necessary for parameters that need to change often) can be a bit of a hassle.
The combination of a worsening climate emergency and Russia's war on Ukraine has helped push the number of people at risk of famine globally to an all-time high of up to 49 million, according to a study by the Food and Agriculture Organization and the World Food Program.
"This should be the biggest story in the world right now," U.S. Rep. Ilhan Omar (D-Minn.), a Somali refugee, tweeted Monday in response to The Washington Post's story on the United Nations study, which warns that tens of millions of people in 46 countries are in need of "immediate life and livelihoods-saving assistance."
Covid-19 has killed more than one million people in the United States over the past two years, but more than 338,000 of those lives could have been saved if the country had a universal single-payer healthcare system such as Medicare for All.
"Universal single-payer healthcare is both economically responsible and morally imperative."
The UK government has finally published its long-awaited response to the independent National Food Strategy. Two years in the making, there were high hopes this would be a comprehensive plan of action. But when the document appeared on Monday, these hopes€ were dashed.
The strategy falls short on a number of fronts. The first: climate. Food is responsible for over a third of the UK’s greenhouse gas emissions, and industrialised agriculture is the leading cause of wildlife decline, antibiotic resistance and pollution. But the strategy did not set out a plan to transform our food system in line with limiting global heating to 1.5C – and providing a liveable planet for current and future generations.
As a major World Trade Organization meeting continued on Tuesday, a top Mexican official called out rich governments for obstructing a pathway to waive patent protections for Covid-19 vaccines and treatments "in order to put the profits of Big Pharma over people's lives."
"Global health is on its deathbed."
Nina Burleigh takes you behind the scenes of her own life to offer one of so many millions of Covid-19 dramas that played out in these years — and, of course, it hasn’t ended yet.
For years, Russian patients have been suffering from a medication shortage. After the country invaded Ukraine in February, the situation only got worse as drug prices rose. At first, this was due to a surge in demand, and drugs that initially disappeared began to return to the shelves. But despite the authorities’ attempts not to allow essential drugs to run out, problems remain. Their sources include a supply chain broken by sanctions, the departure of raw materials necessary for production from the market, and many Western companies’ refusal to conduct clinical trials in Russia. And the things still aren’t looking up: the future likely holds more supply chain disruptions, a drop in quality, rising prices, and a market closed to new drugs. Meduza explains what’s going on with Russia’s healthcare industry.
Digital rights advocates sounded the alarm on Tuesday following reports that U.S. military contractor L3Harris Tech plans to acquire NSO Group, a private Israeli firm widely condemned for selling surveillance technology to repressive governments across the globe.
"The spyware peddled by NSO Group is unsafe in any hands."
Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that’s seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer (IE) web browser, which turns 27 years old this year.
Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form.
Microsoft released the first version of Internet Explorer in 1995, the antediluvian era of web surfing dominated by the first widely popular browser, Netscape Navigator. Its launch signaled the beginning of the end of Navigator: Microsoft went on to tie IE and its ubiquitous Windows operating system together so tightly that many people simply used it by default instead of Navigator.
The Justice Department sued Microsoft in 1997, saying it violated an earlier consent decree by requiring computer makers to use its browser as a condition of using Windows. It eventually agreed to settle the antitrust battle in 2002 over its use of its Windows monopoly to squash competitors. It also tangled with European regulators who said that tying Internet Explorer to Windows gave it an unfair advantage over rivals such as Mozilla’s Firefox, Opera and Google’s Chrome.
When the cops arrived, Morris and Smith were still in the parking lot. He was declared dead just short of 1:00 a.m. Detectives took statements from multiple witnesses and asked Morris if she had placed an AirTag in Smith’s car. She initially denied it, but relented when detectives threatened to get a search warrant for Smith’s car. “Morris then admitted that she had a tracker on his car, and stated that she placed it in the backseat of his vehicle near the cup holder,” according to the affidavit.
On Twitter, there are dozens of complaints about ID.me per day, and local news articles all over the country have detailed the problem over the course of months. In California, 1.4 million unemployment beneficiary accounts were abruptly suspended on New Year’s Eve and the beneficiaries were required to re-verify their identity using ID.me, a process which many found difficult and resulted in them waiting for weeks to reactivate their accounts while they struggled to make ends meet.
We also foresee an evolution of a dark web version of the metaverse due to its very nature of interaction through avatars. The dark web is an anonymous world where people interact through unmapped virtual identities. Here nobody will be interested to know the real identity of anyone, but will still engage with each other commercially or personally. The metaverse DNA is very well suited to the dark web and that’s why I see it as a real security challenge. The dark web version of metaverse will also grow faster than the real world version of metaverse.
Though Meta is the main company developing metaverse for users and players to be in the vast network of real-time 3D virtual worlds while maintaining their identity and payment history, the other top 10 companies that are integral to build this are NVIDIA. Epic Games, Microsoft, Apple, Decentraland, Roblox Corporation, Unity Software, Snapchat, and Amazon
The EDRi network welcomes the attempt by the Belgian lawmakers to set up a legal framework in conformity with the Court of Justice of the European Union’s (CJEU) case law for the retention of traffic and location data. Data retention regimes that are illegal under EU law must be abandoned and replaced as soon as possible with solutions that pass the strict necessity and proportionality test established by courts.
It is therefore essential that the new draft law that Belgium’s Parliament is currently discussing does not introduce measures that would replicate the effects of the previous law on fundamental rights and that would be contrary to the Belgian Constitutional Court’s and the CJEU’s rulings.
Unfortunately, this draft law, as it is and if adopted without adequate adjustments, would pose a threat to people’s rights, such as the right to privacy and data protection, freedom of expression and information, press freedoms and professional secrecy guarantees, and would potentially set a dangerous precedent for other Member States.
This has disturbing implications for people who walk, bike, or even drive by dozens of these devices every day, not knowing that their conversations may have been captured and recorded. It may be even more problematic for people who live in an apartment building where neighbors have installed Ring cameras indoors, where echoey hallways might amplify conversations that could be recorded even beyond line of sight with the device. A surveillance doorbell owner may even have their own private conversations caught on tape if the device is triggered and captures voices drifting through open windows.
In his letter to Amazon, the senator writes:€
In the UK,€ a judge ruled€ in October 2021 that the audio capabilities of Ring cameras amounted to a violation of the Data Protection Act when a neighbor put up multiple cameras aimed at a communal parking lot.
A.€ 7326/S. 6541 protects the confidentiality of medical immunity information by limiting what data can be collected or shared, who it can be shared with, and how long it can be stored. In New York, bills must have identical versions in each chamber in order to move forward; these passed the Senate and Assembly on June 2 and 3, respectively.
New Yorkers are often required to present information about their immunity—like vaccination records or test results—to get in the door at restaurants, gyms and entertainment venues. This bill protects them from that information being misused by private companies, the government, or other entities that wish to track their movements or use their private medical information to punish or discriminate against them. Assuring people that their medical information will not be used in unauthorized ways increases much-needed trust in public health efforts.€
This bill expressly prohibits immunity information from being shared with immigration or child services agencies seeking to deport someone or take away their children based on vaccination status. It also requires that those asking for immunity information must accept an analog credential, such as a paper record.
American consumers need a strong federal privacy law. EFF appreciates the Committee highlighting the national conversation over how the government should protect us from businesses that harvest and monetize our personal information, and address the racial and other bias that excludes consumers of color from opportunities. To achieve these goals, the discussion draft of the American Data Privacy and Protection Act needs to be strengthened in several areas listed in our letter.
This draft might be a step in the right direction on many privacy concerns – assuming it is amended, as discussed in the letter, to ensure strong private enforcement in court, and to not undo other privacy laws at the federal and state levels.
We look forward to working with the sponsors to improve this legislation and strengthen the necessary protections.€
Watching live€ videos of young Israeli Jews in Jerusalem chanting, with unbridled venom and violence: "Death to the Arabs," "May your village burn," and other epithets (that belie a breath-taking inhumanity), is beyond heartbreaking.€ How can one not feel shaken to your core watching this?
In the wake of the horrors of Uvalde, it looks like Senate Democrats are about to make a "bipartisan" gun deal with Senate Republicans that will likely accomplish next to nothing except let Republicans off the hook for opposing even minimal gun safety laws.€ Here's what the deal does not include:
I don’t know who said “don’t let the perfect be the enemy of the good,” but I doubt if that person got a look at the Senate’s “framework” for gun safety in the wake of the Robb Elementary school shooting in Uvalde, Tex. The bipartisan agreement is as likely to stop the next school shooting as an AR-15 would be at stopping the 1st Armored Division. That’s because the framework feels more like a Republican attempt to avoid the issue of gun violence than a Democratic attempt to solve it.
The Democratic candidate for governor in Ohio was among the critics condemning Gov. Mike DeWine's decision on Monday to sign a bill permitting teachers to carry a gun to class after just 24 hours of firearms training—pointing out that educators will need far more training to renew their teaching licenses than to bring a deadly weapon into their classrooms.
"Teachers will need 180 hours to renew their teaching license so they can teach your kids, but only up to 24 hours of training to carry a gun around with them," Nan Whaley, who was the mayor of Dayton in August 2019 when a mass shooting there killed 10 people and injured 27, told the Cleveland Plain Dealer. "That is insane."
In September 2017, Google won the Project MAVEN contract from the Pentagon. Under the plan, Google was to build a monitoring system based on footage taken by U.S. drones and help the U.S. military quickly evaluate the drone footage using artificial intelligence and machine learning. Pentagon analysts were to monitor images of vehicles, people, land features and large crowds of the "entire city."
For roughly two decades, Google has boasted that it doesn’t accept gun ads, a reflection of its values and culture. But a ProPublica analysis shows that before and after mass shootings in May at a New York grocery store and a Texas elementary school, millions of ads from the some of the nation’s largest firearms makers flowed through Google’s ad systems and onto websites and apps — in some cases without the site or app owners’ knowledge and in violation of their policies.
Ads from gunmaker Savage Arms, for example, popped up on the site Baby Games, amid brightly colored games for children, and on an article about “How to Handle Teen Drama” on the Parent Influence website. Ads for Glock pistols loaded on a recipe site’s list of the “50 Best Vegetarian Recipes!” as well as on the quiz site Playbuzz, on the online Merriam-Webster dictionary and alongside stories in The Denver Post, according to Adbeat, which aggregates data about web and mobile digital ads.
China will “fight to the very end” to stop Taiwanese independence, the country’s defence minister vowed Sunday, stoking already soaring tensions with the United States over the island.
The superpowers are locked in a growing war of words over the self-ruled, democratic island, which Beijing views as part of its territory awaiting reunification.
After blanket denials that China is building a naval facility for its use at Cambodia's Ream Naval Base, Cambodia is now saying Chinese forces will not have exclusive use of the structure at the Gulf of Thailand base.
In the last few weeks, defenceWeb has confirmed that the recently created United States’ Office of Security Cooperation in Zambia is not to be confused with a US military base, amid opposition from some quarters.
A strategy to defeat US adversaries in cyberspace is not the same as, nor sufficient for, securing cyberspace. US policy is on two potentially divergent paths: one that prioritizes the protection of US infrastructure through the pursuit of US cyber superiority, and one that seeks an open, secure cyber ecosystem. Defend Forward was a compelling and necessary shift in thinking, but it is just one of many policy tools available to implement the US cyber strategy. In the new National Cyber Strategy, policymakers and practitioners should heed the costly lessons of a generation of counterinsurgency and ensure that efforts to defeat adversaries in cyberspace do not displace efforts to secure it. In an article published by Foreign Affairs, National Cyber Director Chris Inglis and Harry Krejsa, assistant national cyber director for strategy and research, emphasized, “security is a prerequisite for prosperity in the physical world, and cyberspace is no different.”1 A revised national cyber strategy should: (1) enhance security in the face of a wider range of threats than just the most strategic adversaries, (2) better coordinate efforts toward protection and security with allies and partners, and (3) focus on bolstering the resilience of the cyber ecosystem, rather than merely reducing harm.
In early June, the independent polling agency the Levada Center published survey data showing that three quarters of Russians believe the “special military operation” in Ukraine is “progressing successfully.” Almost 25 percent expect a Russian victory in “less than six months,” while about 20 percent expect it to come in about a year, and another 20 percent expect victory in over a year. In the 20 years that the Levada Center has been operating, experience has shown that there’s often a wide gulf between the expectations of the Russian public and the worldviews of those who lead the organization. In this essay for Meduza's “Ideas” section, Alexey Levinson, the Levada Center’s social research director, lays out his view of what Russia is hoping to achieve with this war.
On June 12, the Boris Nemtsov Foundation for Freedom awarded its annual prize to Ukrainian President Volodymyr Zelensky. All of the award’s past recipients have been Russian opposition politicians and activists. In 2021, for example, it was awarded to Kremlin critic Alexey Navalny shortly after the Russian authorities imprisoned him. To find out more about the decision to honor Zelensky, and how Russia’s war against Ukraine has impacted the Nemtsov Foundation’s work, Meduza sat down with the foundation’s co-founder, Zhanna Nemtsova.€
Even before day two of the January 6 committee hearing began, it broke news: Donald Trump’s former campaign manager Bill Stepien canceled his planned testimony at the last moment. The news launched a thousand jokes invoking The Godfather movies and dark humor suggesting Stepien had been threatened, perhaps by Trump; it turned out his wife had unexpectedly gone into labor. The last-minute news forced the committee to scramble a bit, but the day’s agenda had always been clear: to showcase the sober white men around Trump who would testify that they told him the truth in real-time—that he’d lost the election. Stepien was one of many Trump aides and lawyers who came to be known as “Team Normal.”
One of the key witnesses who testified live at Monday’s hearing of the House Select Committee to Investigate the January 6th Attack on the U.S. Capitol was former Fox News political editor Chris Stirewalt, who led the the Fox News decision to become the first network to call Arizona for Joe Biden on election night in November 2020. Fox fired Stirewalt months later. Answering questions from Congressmember Zoe Lofgren, Stirewalt said Trump’s chance of winning was virtually zero. His comments were supported by Trump’s former Attorney General William Barr. The committee also heard testimony from Trump’s former campaign manager Bill Stepien, who said he had contradicted false election victory claims by Trump’s lawyer Rudy Giuliani, and was part of what he called “Team Normal.” Former Attorney General Barr told the committee about how he became “demoralized” after the 2020 election when he tried to counter allegations of voting fraud with then-President Trump.
Monday’s January 6 committee hearing ended with closing statements from January 6 committee vice chair, Republican Liz Cheney and Democrat Zoe Lofgren describing how the Trump administration raised over $250 million from his supporters, off of the lie that the 2020 election results were fraudulent, for an election defense fund that didn’t exist.
We spend the hour featuring highlights from the second public hearing of the House Select Committee to Investigate the January 6th Attack on the United States Capitol. Main witnesses were ex-President Donald Trump’s former inner circle, including campaign manager Bill Stepien, Attorney General William Barr, campaign adviser Jason Miller and his own daughter Ivanka Trump, who all said Trump ignored them on election night in November 2020 when they argued against declaring victory. They described how Trump instead turned to his lawyer Rudy Giuliani, who they said was drunk when he urged Trump to claim he’d won and say the election was being stolen.
The corporate media landscape has saturated our feeds with images of NATO allies as superheroes, science fiction and fantasy protagonists, and pop culture icons.
Author and Pulitzer Prize winning journalist, Chris Hedges, explains America's gun fetish, why people in America cling to its guns, and what we must do if we ever hope to change this culture.
The outgoing United Nations climate chief warned Monday that a victory by Donald Trump—or any other Republican ally of the fossil fuel industry—in the 2024 U.S. presidential election would represent a fatal setback for efforts to limit global warming to 1.5€°C by the end of the century.
"Well, yes," Patricia Espinosa, executive secretary of the United Nations Framework Convention on Climate Change (UNFCCC), told Politico when asked whether Trump or another Republican president similarly hostile to climate action would spell doom for the Paris Agreement's lower-end warming target.
Footage circulating on social media Tuesday showed a home in Gardiner, Montana crashing into the flooded Yellowstone River after rushing water undermined the foundation and broke the house's stilts, offering what climate campaigners warn is a picture of the kind of catastrophe likely to become more common as the climate crisis worsens.
"A hot world means more rain," said author and 350.org co-founder Bill McKibben in response to the video.
As brutal heat waves creep further into the school year, cash-strapped school districts that previously didn't need cooling systems are struggling to afford the air conditioning they now need to keep students safe in the face of climate change.
The climate crisis continues to bite in the U.S. this week with nearly one-third of people€ in the€ country living under€ heat advisories and warnings€ on Tuesday as high temperatures were reported from the Gulf Coast to the Upper Midwest and across the Southeast.
More than 107 million people are being advised to stay indoors as possible to avoid record-setting heatwaves that have been reported across the country in recent days, moving eastward and expected to continue for at least the next two weeks.
The 25th St. Petersburg International Economic Forum (SPIEF) is set to kick off tomorrow, June 15. Its official topic? “New Opportunities in a New World.”
Did you know Joe Biden can help American workers right now, even without Congress? He can sign three executive orders, affecting a fifth of the economy and transforming millions of workers’ lives.€
With inflation running rampant in the United States and the Biden administration scrambling for a solution to what's become a major political and economic crisis, new polling data and swing-state focus group results shared exclusively with Common Dreams suggest one approach would be especially effective: Challenging corporate greed.
Conducted by the research firm GBAO on behalf of Fight Corporate Monopolies, the recent national surveys and focus groups in two key battleground states show that voters are particularly responsive to and supportive of messaging that connects price hikes to profiteering by big business.
The Patreon API is buggy bullshit, and they will provide no support. Can someone explain to me how to use it properly?
For almost 30 years, I worked on the trading floors of banks around the world—mainly in London, but also Hong Kong, Tokyo, Madrid and Bangkok. Being well paid can in itself convince you and your colleagues that your work is important and socially useful. We were creating the money the world needed to trade. We were primary wealth creators.
In an Oxford-style debate Monday with Republican Sen. Lindsey Graham, Sen. Bernie Sanders argued that progressive policy goals such as Medicare for All, Social Security expansion, and a higher minimum wage are "what the American people want" and blasted the political establishment—including his GOP colleague—for ignoring the most important crises facing the United States, from the climate emergency to obscene levels of economic inequality.
"If we don't stand up and say that we need a government that represents working people and the middle class, I worry very much about the future of this country."
By contrast, U.S. influence has dropped by 12% since 2020, according to the survey of more than 4,500 Africans 18 to 24 years old and living in 15 countries across Africa.
Seventy-seven percent of young Africans said China was the “foreign actor” with the greatest impact on the continent, while giving the U.S. an influence rating of just 67%. In a follow-up question on whether that influence was positive or negative, 76% said China’s was positive, while 72% said the same of the U.S.
Described in the media as a “seasoned intelligence veteran,” Haspel had been at the CIA for more than 30 years, both at Headquarters and in senior positions overseas. And throughout that entire period, she tried hard to stay out of the public eye. Then-outgoing CIA director and Mike Pompeo at the time lauded her “uncanny ability to get things done” and said that she “inspires those around her.” I’m sure that was true for some, but many of the rest of us who knew and worked with Gina Haspel at the CIA called her “Bloody Gina.”
The New York Times and Washington Post have written extensively about Haspel’s background, especially overseas. The CIA will not let me repeat her resume here, calling it “currently and properly classified.” I won’t go down that road. But I will say that it was Haspel who carried out her master’s instructions to destroy videotaped evidence of the torture of Abu Zubaydah, mistakenly thought to have been the third-ranking person al-Qaeda. And that was after the White House Counsel specifically told her to not destroy it. She made no apologies. I would call that “obstruction of justice,” a felony.
The House Select Committee on Jan. 6 has detailed what at some level we already knew. Trump lost the election. He knew it. His advisers knew it. His Justice Department knew it. The courts confirmed it. There was no evidence of voter fraud. Trump lied—and continues lying to this day.
U.S. President Joe Biden faced a firestorm of criticism Tuesday after the White House confirmed he will visit Saudi Arabia next month and is expected to meet with Crown Prince Mohammed bin Salman.
Concerns have mounted in recent weeks in response to reporting during the planning stage of Biden's mid-July trip, given the kingdom's human rights record and the 2018 assassination of journalist Jamal Khashoggi—which U.S. intelligence officials concluded was approved by the crown prince, or MBS.
Dead on arrival.
The House Select Committee to Investigate the January 6th Attack heard live testimony Monday from Al Schmidt, the sole Republican on the Philadelphia County Board of Elections in Pennsylvania, a key battleground state in the 2020 election. He described how he found no evidence of voter fraud in 2020, and said he and his family received death threats after Trump lashed out at him on Twitter for not halting the vote count due to false claims of fraud.
This could prove an historic shift, reversing more than a century of usually coercive influence in Latin America.
On June 12, when Russians celebrated “Russia Day,” the pro-government newspaper Izvestia published an article signed by Sergey Kiriyenko, Vladimir Putin’s first deputy chief of staff and domestic policy czar. The text, titled “Sergey Kiriyenko’s Message on Russia Day,” said that “all Russia will rebuild the Donbas, which has been destroyed by the fascists” at the expense of trillions of taxpayers’ rubles, “even at the cost of a temporary decline in the nation’s living standards.” The article quickly disappeared, and the newspaper later attributed the text itself to hackers. Multiple sources told Meduza special correspondent Andrey Pertsev that they believe Kiriyenko’s rivals at home (including opponents of the invasion of Ukraine) could be responsible for hacking Izvestia (though some wonder if he didn’t engineer the incident himself to speak publicly with plausible deniability).
The court also found that the foundation operates inside Russian territory, which would require it to comply. However, Wikimedia asserts that the country does not have jurisdiction over the organization.
The foundation also argues that the requests for the removal of information “constitutes a violation of human rights.”
The European Court of Human Rights (ECHR) on Tuesday said a law that allows Russian authorities to crack down on NGOs, media outlets, and others — by designating them "foreign agents" — violates its human rights convention.
Russia uses the term to label organizations that it claims are engaged in political activity with foreign support.
A court in Zimbabwe has found a New York Times freelance journalist guilty of flouting immigration laws and sentenced him to a suspended two-year prison sentence and a $1,000 fine.
A court in the city of Bulawayo convicted and sentenced 37-year-old Jeffrey Moyo to two years in prison, suspended for a fine of about $1,000, at the official rate. Beatrice Mtetwa, one of Moyo’s lawyers, spoke to VOA from Bulawayo, via WhatsApp.
I reported this problem yesterday and I do not expect it to have been fixed by the time of writing but this problem going unresolved for three years is a clear example of the difficulties faced by victims of cybercrime.
Editor's note: Quillette asked three scholars to reflect on the debate about animal rights. If you would like to contribute to this discussion, please send a response of ~800 words to pitch@[...]
Human rights campaigners celebrated late Tuesday after a European court ruling led to the cancellation of a flight to deport asylum-seekers from the United Kingdom to Rwanda as part of a controversial deal the governments unveiled in April.
"We will continue the fight tomorrow and against EVERY racist deportation."
Starbucks Workers United won its 100th election on May 27, 2022—fittingly, in Seattle, the company's hometown. And the union has notched another 46 victories in the just over two weeks since then. It comes six months after organizers won their first two union victories, in Buffalo, New. York.
The proposal will harm freedom of expression, freedom to access knowledge, and freedom to conduct business and innovation in the EU. It will hurt Europe’s [Internet] economy and create unprecedented bureaucratic barriers that will slow growth in a recovering economy. That’s why 34 civil society organisations urge Commissioner Vestager and Commissioner Breton to challenge the short-sighted and self-interested demands of the telecom industry and to ensure a free and open [Internet].
Since then we have had many exhausting, nerve-racking and sadly also personally draining negotiations with the administration - unfortunately not on equal footing. All our efforts have now failed. The city administration showed no understanding for voluntary commitment and even registered “Verschwörhaus” as a trademark behind our backs - against which we filed an objection.
Now the city administration is also throwing us out of the space at the Weinhof. We decided not to sign the city’s “contract of use” at our last community meeting. The city wanted to force us to give up our name and our public channels (website, email address, etc.), and to give us hardly any room to shape the content of what happens under the label “Verschwörhaus” in future. We cannot agree to this.
In 2020, publishers Hachette, HarperCollins, John Wiley and Penguin Random House sued the Internet Archive claiming that its mass scanning and lending of print library books is straightforward piracy. With the defendants relying on a fair use defense, both sides are now asking the court to decide the case in their favor, without need for a full trial.