Welcome to this week's Linux weekly roundup.
We had a good week in the world of Linux releases with Voyager Linux 22.10, Bluestar Linux 6.0.5, and Zorin OS 16.2.
I saw this recent discussion about Red Hat locking their documentation behind a login wall as if this is something that Red Hat hadn't already been doing for years, so let's have a look into it.
**kmplot** , **kmymoney** , **knetwalk** , **knavalbattle** , **knewstuff** , **knights** , **knotes** , **knotifications** , **knotifyconfig** , **kolf** , **kollision** , **kolourpaint** from the KDE software series of Slackware.
We want to hook a function, so that our code gets called... but we also want the original code to execute. How the heck does that work?
In this video, we are looking at Zorin OS 16.2.
Today we are looking at Zorin OS 16.2. It comes with Linux Kernel 5.15, based on Ubuntu 2004, Gnome 3.36, and uses about 1.5GB of ram when idling. Enjoy!
Josh and Kurt talk about Lufthansa trying to ban Airtags. This has a similar feel to all the security events where a company tries to hand waive away a security problem then having to walk back all their previous statements. There is almost always a massive imbalance between the large companies and consumers.
Are the long-timers holding Linux back? Lennart Poettering argues we are and proposes a new Microsoft-blessed way to secure Linux.
Plus, our thoughts on the slow decline of mailing lists in open-source development.
It's Sunday afternoon, so it must be time for an rc release.
I know I said last week that rc2 was unusually large. It turns out that rc3 is almost exactly the same size. But at least for an rc3 release, that bigger size is a bit more normal: this is when people are starting to find problems and send in fixes for them.
So while rc2 was just _way_ bigger than usual, rc3 is only a bit larger than an average rc3 release is. But it's still on the largish side. I hope that things start calming down, and we'll start seeing the size of these rc's shrink. Please?
Unlike rc2, there's no one single reason for the bulk of the rc3 changes. They're pretty much all over, with the usual distribution - drivers dominating (networking, gpu and sound are most noticeable, but there's a little bit of everything).
Outside of drivers, tool updates stand out, with selftests, perf, and the pm-graph tool all seeing a fair amount of changes.
And then we have the usual things: architecture updates, some filesystem work, and core kernel fixes (mainly networking and mm).
Anyway, while it isn't small, nothing looks particularly worrisome or strange, and I thin kyou can just scan the appended shortlog to get a feel for the kinds of fixes we have here. Please do give it more testing, and here's to hoping we'll start seeing the rc's shrink from now on.
Linus
The 6.1-rc3 kernel prepatch is out for testing.
Ever since thinking “that’s quite nifty”, I have the devil of a time spelling ntfy without transposing the ‘t’ and the ‘f’, but it’s called notify so the ‘t’ comes before the ‘f’. :-)
I've been exploring my Untappd data a bit more since analysing my top brewery countries, this time to see if my average ratings indicated anything about my preferred beer types. Here's what I've done so far, in part 1 of this little series.
Are you looking for a complete LAMP stack guide? This tutorial will show you how to install a LEMP stack on an Ubuntu 22.04 server.
In this tutorial, we will show you how to install Snort on Ubuntu 22.04 LTS. For those of you who didn’t know, Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows operating system to detect emerging threats. Snort has a real-time alerting capability, with alerts being sent to syslog, a separate “alert” file, or even to a Windows computer via Samba.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Snort network intrusion detection system on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.
Have you encountered a problem where you want to host a simple web server but you don’t know how to go about it, here is a very simple solution to host a simple web server on Google cloud using the free tier.
In this tutorial, I will take you through the setting up of a server on Google cloud and later install Nginx. From here you can run a simple hello world.
Here I am using a free tier. Make sure you destroy your instance when you are done experimenting to avoid incurring extra charges.
Sometimes, you might want to delete some disk partitions on your Linux system to recover or regain some storage space. You can easily accomplish this on the command line with a few simple steps.
In this guide, we will demonstrate how you can delete a partition in Linux step-by-step. We will start off by deleting a standard partition and then deleting an LVM partition.
In general, the nohup command allows you to run a command immune to hangups, with output to a non-type.
What does this mean? It allows you to keep the execution of a command independent of the terminal session. Making it continue to run despite closing the terminal.
As you can notice, the nohup command is quite useful in situations of configurations that we want to be done in the background and without affecting the user’s work.
Being a bit more technical, the nohup command ignores the HUP signal, which is the one sent to the process when the controlling terminal is closed, making it still alive.
Today we are looking at how to install Psych Engine 0.6.3 on a Chromebook.
If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!
Between 2022-10-24 and 2022-10-30 there were 156 new games validated for the Steam Deck. We use multiple factors such as popularity, ratings and more to come up with this list of Best Steam Deck Games.
While the Steam Deck is a great device for the bigger lot (AAA / AA), what about some quality choices for smaller and more casual experiences? Here's my current favourites, good for a cosy Sunday afternoon.
This month there weren’t so many releases of your favorite Xfce apps as the devs continue to focus on the next major release of the lightweight desktop environment, Xfce 4.18, which should soon be ready for public testing.
According to the official Xfce 4.18 roadmap, the first pre-release version is expected to hit the streets on November 1st, 2022. A second pre-release version is planned for December 1st, while the final release could be out on December 15th or the 29th if there’s a need for a third pre-release version.
"The first-time setup process is a breeze to experience," writes It's FOSS News, applauding how it lets uses choose and enable Flatpak/Snap/AppImage.
The RAK7391 WisGate Connect is an industrial gateway board powered by the Raspberry Pi Computer Module 4. This product also includes flexible peripherals such as dual GbE ports, camera connectors, and multiple expansion sockets for memory devices.
According to RAKwireless, the WisGate Connect can support the whole Raspberry CM4 family.
A lot of old technology runs on parts no longer produced – HDDs happen to be one such part, with IDE drives specifically being long out of vogue, and going extinct to natural causes. There’s substitutes, but quite a few of them are either wonky or require expensive storage medium. Now, [dosdude1] has turned his attention to 1.8 ZIF IDE SSDs – FFC-connected hard drives that are particularly rare and therefore expensive to replace, found in laptops like the Macbook Air 1,1 2008 model. Unsatisfied with substitutes, he’s designed an entire SSD from the ground up around an IDE SSD controller and NAND chips. Then, he made the design open-source and filmed an assembly video so that we can build our own. Take a look, we’ve put it below the break!
And it turns out that particular computing environment was really the intersection point for a lot of early GUI efforts, which were built and run on Sun workstations and thus will also run on the Solbourne. With some thought, deft juggling of PATH and LD_LIBRARY_PATH and a little bit of shell scripting, it's possible to create a single system that can run a whole bunch of them. That's exactly what reykjavik, this S3000, will be doing.
Many people are quite surprised when I tell them that my primary computer is a custom-built desktop PC, that I assembled myself. After all, desktops have been going out of fashion for over a decade and most people these days use laptops or even tablets as their primary (work) devices. The only big users of the desktop PCs today seem to be gamers, but they rarely assemble their rigs from scratch.1 I’m definitely not a (big) gamer. Customs-built PCs require some degree of maintenance (at the very least you have to get them working) and are prone to some subtle issues (e.g. the RAM not playing well with the MB, some drivers being a mess, etc). So, why bother with all of this in 2022?
The browser wars of the 90s and 2000s saw the dominant player - Microsoft's Internet Explorer - locked in a David and Goliath battle against Firefox, an open-source browser that was spun off from work at Netscape.
A decade later another software war began - Microsoft was involved again with Windows Mobile, but the Goliath in this case was Symbian lead by Nokia. You should be familiar with the two Davids that took it on - Apple's iPhone and Google's Android project.
However, today's story is about Firefox OS, which was developed by Mozilla, the same community that had been working on the Firefox browser since the late 90s. Mozilla wanted to bring its principles of openness, security and privacy to the smartphone market and some smartphone makers were receptive to a new alternative to Android.
At first Mastodon looks like a straight-up clone. It meets Twitter’s 280-character Tweets with 500-character Toots. On Twitter you can Like, or Retweet to your followers; on Mastodon you can Favorite, or Boost to your followers. So far, so familiar.
But after some time on the network (I joined when the Musk purchase was first discussed in April), I’ve noticed subtle, welcome differences in how conversations play out. And some of the improvements come not from cool new Mastodon-specific features, but from Twitter features that are deliberately missing. The first of these happy omissions is right on the home timeline. Compare, Mastodon versus Twitter: [...]
Let’s recap memory allocation in general. In most languages, you can choose to have fixed size objects and arrays at program start. Or, you can modify the object and array sizes during the run of the program, maybe to add new keys to the object or maybe to grow the array to fit more elements.
While programming Arduino boards we have to deal with different programming techniques to manipulate the data accordingly. To deal with data we need multiple functions that help us to write code for our project. One of the widely used functions is dtostrf() which converts double and float values into string with defined precision.
Last week Gabriella Gonzalez wrote What does “isomorphic” mean (in Haskell), which covers isomorphism from a first-principles perspective.
This blog post contains the fifth instalment of the Don't fear the grepper! series.
In Python, there are a bunch of reasons for having your main program be importable. However, this normally requires that your program have a .py extension and you don't always want to do this. You can always make a copy of the program (or use a symlink) to add the extension when you're working on it, but that can be annoying. Due to writing my entry on why programs should skip having extensions if possible, I wound up wondering if it was possible to do this in Python using things exposed in, for example, the standard library's importlib.
This is CircuitPython 8.0.0-beta.4, a beta release for 8.0.0. It is relatively stable, but there will be further additions and fixes before final release.
9. To Summarize
FTP is an outdated, insecure, slow and unfriendly pig of a protocol. It has no business being on the Internet in the 21st century.
FTP MUST DIE!
Casting parts in silicone is great, and 3D printing in resin is fantastic for making clean shapes, so it’s natural for an enterprising hacker to want to put the two together: 3D print the mold, pour in the silicone, receive parts! But silicone’s curing process can be inhibited by impurities. What’s cure inhibition? It’s a gross mess as shown in the image above, that’s what it is. Sadly, SLA-printed resin molds are notorious for causing exactly that. What’s a hacker to do?
We love hacks that give new life to old gadgets, and [edwardianpug]’s YouTube Terminal certainly fits the bill by putting new hardware inside a Super 8 film editor.
Another week of my RC batch wraps up. I'm done with five weeks, and seven weeks are left! Time is still flying by, and I've hit an inflection point. I have gotten what I want out of the two projects I've worked on so far, so I'm going to wrap them up and move on to one new project for the rest of the batch.
While getting personal mail is a novelty in itself in 2022, what made these particular letters so interesting was the fact that more than a few of them were typewritten... you know, like with a typewriter. Now, as funny as it would be to say that my grandpa is friends with a bunch of farm town hipsters, the much more heartwarming reality is that he and his peers haven't embraced modern technology with nearly as much vigor as younger generations have; and as a result, still connect on a much more physical and personal level.
We recall that at the conclusion of Romeo and Juliet, the Prince bemoans the predictable and preventable consequences of senseless vendettas, vanities, arrogance and intransigence – a riveting moment:
Slicing software needs to maintain a balance between ease-of-use and control, while handling handle any STL file you throw at it. If you eliminate the need to convert an existing 3D model, and create G-Code directly, you gain a lot of design freedom, at the cost of increased design effort. By taking advantage of this freedom and making it more accessible, [Andrew Gleadall] and [Dirk Leas] created the FullControl Design Library.
A few years ago, Toyota was in the news for a major safety issue with a number of their passenger vehicles. Seemingly at random, certain cars were accelerating without concern for driver input, causing many crashes and at least 37 confirmed deaths. They issued recalls both for the floor mats which were reported to have slid forward to jam the accelerator pedal, but this didn’t explain all of these crashes. There was another recall for stuck throttles, which [Colin O’Flynn] demonstrates a possible cause for on his test bench.
A quantum device that can determine its position in three dimensions is more accurate than non-quantum versions. Vehicles could use it to navigate even if GPS stopped working.
One way to keep track of something’s position is with an accelerometer, which is a small device that is found in everything from phones to drones. Accelerometers work by detecting changes in movement and therefore position.
ClearBuds" is the code-name of the first "end-to-end hardware-software neural-network based binaural system using wireless synchronized earbuds," according to hardware engineer Maruchi Kim at the University of Washington.
Kim and his colleagues demonstrated a prototype of their speech-enhancing/noise-reducing devices at the ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys2022, held in Portland, OR June 27-July 1 ).
The "first" claimed by the researchers is the pairing of binaural (dual) microphones—one in each ear's ClearBud—with two neural networks in an app on a smartphone, resulting in a superior user-experience of voice isolation and noise cancellation during telephone conversations, according to test subjects.
"While neither dual mics nor neural network software is unique or innovative, the combination has value since it reportedly provides an experience that the users liked," said Fan Gang Zeng, a professor of otolaryngology and director of the Hearing and Speech Laboratory at the University of California, Irvine. A researcher in auditory science and technology who was not involved with the research, Zeng added, "Also, there is no technical barrier for others to develop or use the same combo."
To assist other researchers and even commercial telephony equipment providers to use the ClearBud approach, the researchers open-sourced their hardware, software, and neural network architectures. Details are provided in their paper, as well as in their audio demonstrations (which also contain links to the open-source hardware, including the printed circuit board layout, the software code for binaural transmission over Bluetooth, and the code and architectures of the neural networks).
To deliver value in healthcare, artificial intelligence and machine learning models must be integrated not only into technology platforms but also into local human and organizational ecosystems and workflows. To realize the promised benefits of applying these models at scale, a roadmap of the challenges and potential solutions to sociotechnical transferability is needed.
Predictive model transferability, traditionally defined as “the ability to produce accurate predictions among patients drawn from a different but plausibly related population”1, is receiving increasing attention as healthcare organizations attempt to implement artificial intelligence (AI)-based prediction tools2,3,4. Although some machine learning (ML)-based models fail when subjected to retrospective validation across institutions and patient populations5, technical improvements (e.g., foundation models) show promise for addressing this model efficacy problem. To address the engineering challenges, a technical subfield labelled MLOps has emerged, promising to address technical transferability by injecting needed discipline into the development, integration, deployment, monitoring, iteration and governance of ML models6,7. These developing solutions open the door to deploying models developed for localized applications in new contexts, thereby realizing AI’s promise of scalability.
A study was recently published that tries to shed light on this topic: Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study.
They conducted a lab study where 37 programmers were instructed to comprehend code solutions to Leetcode-like problems and then asked the output given a specific input. The programmers did so while wearing an EEG cap and in front of an eye tracker.
Back in the 1990’s I wanted a G-Shock watch, so my nan bought me one for Christmas. Here’s the story of what happened to that watch…
So cast your mind back to the late 90s. I was in high school, Saved By The Bell was all the rage, and 13 year old Kev desperately wanted a G-Shock watch.
This was because my good friend, Cockney Chris (he was from Milton Keynes and moved to the north…that made him a cockney to us), had a G-Shock. I remember Chris’ G-Shock being MASSIVE and really cool. I was so jealous.
Then, one day when we were getting changed in the gym for PE (physical education), and he dropped a bombshell…
In the presentation, I gave a tour of my homelab, highlighting it's growth from a modem and 5-port switch to a full 24U rack with a petabyte of storage and multiple 10 gigabit switches!
The Garmin HUD+ was a small Bluetooth device intended for the dashboard of a car, meant to be used as a GPS heads-up display for data from Garmin smartphone apps. It used a bright VFD (vacuum fluorescent display) which was viewed through a clear reflector, and displayed GPS information and directions. It was discontinued in 2015, but [Doz] was fond of his and used it happily until a phone upgrade meant it no longer worked. Was it destined for a landfill? Not if he had anything to say about it!
Deputy Agriculture Minister Víctor Suárez told the news agency Reuters that the government is proceeding with the ban and no modifications would be made, but didn’t specify whether it would apply to corn used to feed farm animals.
Siphoning is the practice of emptying a vehicle's tank by sucking fuel with the mouth through a hose. The contents of the tank can then be transferred to a jerrycan to fill up another vehicle. It is a phenomenon that has multiplied in recent weeks: with parts of France being deprived of petrol and diesel, the number of poisonings linked to fuel siphoning have thus exploded.
The National Agency for Food, Environmental, and Occupational Health Safety (ANSES) has even released a statement to address the dangerous practice: "In October 2022, the poison control centres have recorded more than five times the number of poisonings caused by siphoning petroleum fuels."
UC San Diego study finds health care facilities serving underrepresented, rural and hardest-hit communities were less likely to administer COVID-19 vaccines during initial rollout
River pollution in China tended to substantially increase at the border of an upstream province, which means the harm was mainly born by the neighboring downstream province. A classic case of negative externalities. As a measure to reduce this problem, the central Chinese government changed the promotional incentives of province leaders in a way that makes them more accountable for river pollution at the province border.
In their very interesting and great article Water Pollution Progress at Borders: The Role of Changes in China’s Political Promotion Incentives (AEJ Policy, 2015) Matthew E. Kahn, Pei Li and Daxuan Zhao study in how far that change in promotional incentives indeed helped to reduce river pollution at province borders. They also explore concrete channels to reduce river pollution like the placement of pulp and paper factories and whether younger provincial leaders react stronger to the change in the promotional incentives.
For example, one of the fastest-growing and most damaging forms of cyber crime - ransomware attacks - involves malicious software that paralyses a victim's device or system until a decryption key is provided following payment of a ransom.
Ransomware attacks are big business. In 2021 alone, they earned cyber criminals more than USD 600 million. The huge amounts of money to be made in ransomware, and the rich abundance of targets from all around the world are fostering the development of a vast ransomware industry.
British security researcher Kevin Beaumont has played down the hype over a recent announcement about a critical flaw in the open-source cryptographic library OpenSSL from Red Hat Linux. The advisory is due on 1 November.
Mark Cox, vice-president of security at the Apache Software Foundation, tweeted on 26 October that an OpenSSL 3.0.7 update would fix a critical CVE due to be announced on 1 November, adding that it did not affect versions before 3.0.
This led to American tech site ZDNet putting the hype machine in overdrive, with Steven Vaughan-Nicholls penning an article where the standfirst read: "We don't have the details yet, but we can safely say that come Nov. 1, everyone - and I mean everyone – will need to patch OpenSSL 3.x."
Some collaboration suites offer built-in tracking already — it’s used holistically to identify communication roadblocks, ensure teams work together, find technical or administrative impediments to collaboration, even to help workers understand their own personal productivity and improve it. These kinds of tools track usage across devices and platforms, focusing on interaction with a suite of services instead of an individual PC or device.
In fact, there are no references to a supreme being anywhere in the Constitution, because the Founding Fathers were adamantly opposed to centralized religious power as well as requiring individuals to subscribe to any particular denomination.
An estimated 1,900 migrants crossed the Channel at the weekend, taking the total for 2022 to more than 40,000, compared with 28,500 for the whole of 2021.
On October 28, 1922, Mussolini's paramilitary forces entered the Italian capital and were handed power, marking the start of a regime marked by intense authoritarianism and nationalism that lasted until 1943.
Mussolini was shot by partisans in April 1945 in the waning hours of the war, his body later hung and mutilated by the crowd in a Milan plaza.
Although Italian law today bans the apology for -- or justification of -- Fascism, it is rarely enforced.
With Election Day nearing and Trump relentlessly promoting claims he did not lose to Biden in 2020, federal agencies warned on Friday that domestic extremists fueled by election falsehoods "pose a heightened threat" to the midterms. The Department of Homeland Security and other federal agencies said the greatest danger was "posed by lone offenders who leverage election-related issues to justify violence."
Six years after the attack in Nice on July 14, in which 86 people were killed and hundreds injured, the trial began in Paris on September 5. As BFMTV reported on Friday October 28, an incident during the hearing the day before outraged the victims’ families and the joint plaintiffs. Indeed, laughter could be heard from the hall reserved for the terrorist’s family. “It is an insult, it is unbearable,” complained Alain Dariste, joint plaintiff and co-chair of the victims’ association Promenade des Anges.
The lawyer-turned-preacher served half of a five-and-a-half-year jail sentence handed down by courts for inviting support for the terrorist organisation ISIS in 2016.
The London-based former lawyer, who is barred from many other sites, said: “I look forward to being able to use Twitter to once again call for the truth and superiority of Islam over the oppression of man-made laws.”
In a thread on Saturday, Twitter’s Yoel Roth explained that the platform’s policies around hateful conduct on the platform have not shifted since Musk officially took over on Friday despite reports of increasing use of slurs and targeted harassment. “Hateful conduct has no place here. And we’re taking steps to put a stop to an organized effort to make people think we have,” Twitter’s head of safety and integrity tweeted.
Aaron Maté and former Marine intelligence officer and arms inspector Scott Ritter discuss just what a "dirty bomb" is, and what it means for the combatting nations of Russia and Ukraine.
Chris Hedges returned to The Sanctuary for Independent Media in Troy NY on October 21, 2022 to speak on the subject of his latest book, titled “The Greatest Evil is War.”
Actions speak louder than words and the Dems' "diplomacy first" approach has been all bark and no bite.
Noam Chomsky delves into how half a century of neoliberalism set the stage for contemporary fascist movements from Hungary to India and the US. This is the second part of a two-part interview.
The Russian Ministry of Defense reports that the maritime drones which attacked the Black Sea Fleet on October 29 traveled, before the attack, through the “grain corridor” safe zone, which was created to allow Ukraine to export agricultural products from Black Sea ports.
Russia has suspended its participation in the agreement brokered by the UN and Turkey in July to allow grain and fertilizers to be exported from Ukrainian ports. The Russian Defense Ministry reported on October 29 that Moscow was withdrawing from the deal because Ukraine, “with the participation of experts from Great Britain,” used drones to attack “ships from the Black Sea Fleet and civilian ships that were involved in providing security for the ‘green corridor.’” Russia called the attack an act of terrorism and called for the UN Security Council to meet on October 31 to discuss the situation.
Publication Astra reported on October 22 that around 20 mobilized Russians were imprisoned in the annexed Luhansk region for refusing to return to the front lines. Astra cites close contacts of several of the conscripts.
Haiti appears to be on the precipice of foreign intervention yet again.
The Ministry of Defense of the UK reported in its daily intelligence update that Wagner Group founder Evgeny Prigozhin admitted that his private military company has changed its standards and is now recruiting prisoners infected with serious diseases, including HIV and Hepatitis C.
Simultaneously, culinary horrors tend to captivate audiences. As Sam Stone wrote for Bon Appetit earlier this week, scathing restaurant reviews have reached TikTok, and this breed of review is particularly cutting, with virality in mind. One reviewer told Stone: "People want the drama — and that's what we're giving."
Alpha has transferred more than 300 mining permits to smaller companies since 2015, when an industrywide downturn pushed it and other big coal companies into bankruptcy. By shedding those permits, more than it currently holds, the company also freed itself from the responsibility to clean up the mines. Those old Alpha permits are now owned by smaller companies like Lexington, many of them in precarious financial shape. The smaller companies have drawn pollution lawsuits, environmental violations and complaints from distraught homeowners like Hatfield.
While coal's devastating contribution to climate change has been well documented, it has also left a long and painful legacy in communities where it's mined. A joint investigation by Bloomberg News and NPR found that Alpha is one of several large U.S. coal companies that used the same playbook. They transferred old mines in need of cleanup to smaller operators with meager financial resources, raising the risk that taxpayers, rather than industry, will eventually be stuck with the cost.
Water Minister Tanya Plibersek has released the “Roadmap” document accepting Australia’s water trading markets are “a market-design car-crash” and backed the findings of the long-awaited ACCC report. Authors of Sold Down the River, Stuart Kells and Scott Hamilton, report.
Over a span of years if not decades, people in the Murray-Darling Basin have raised serious concerns about the water market, and the conduct therein of brokers, traders, ‘investors’ and ‘speculators’.
At first-hand, farmers, irrigators and other people in rural communities saw widespread evidence of market manipulation, front-running, insider trading, conflicts of interest, and brokers ‘trading their own book’. The benign idea of farmers trading their water rights had turned into some kind of 1980s Wall Street nightmare.
Australians love a nickname and recoiled in indignation at the farcical rebranding of the BOM. What’s the scam?
The scam is that the rebrand is just the latest plank in the corporatisation of the BOM. They tried to do away with climate change too.
Former MWM editor Sandi Keane and her contact, former BOM operative Stephen King, broke the story here two years ago of the infiltration of BOM by global oil and gas funders such as Shell, Santos, Woodside and Chevron.
The central bank of the United Kingdom said people were using cash less and financial technology (fintech) firms have started to offer new forms of money and new ways to pay. The Bank posted a statement last week that these changes mean new opportunities and risks that the central bank needs to plan for.
Central bank digital currency (CBDC) is money that a central bank, like the Bank of England, can produce. It's called digital (or electronic) because it isn't physical money like notes and coins. It is in the form of an amount on a computer or similar device.
In 1970, humans numbered 3.7 billion. Today, we're more than double that—eight billion! During that short time, the number of animals that also share this planet dropped by 69 per cent!
The well-known expert says India lacks the vast uninterrupted landscapes big cats, especially cheetahs, need. It is one among many reasons why Project Cheetah is unfeasible.
In 2014, as temperatures topped 40€° Celsius, or 104€° Fahrenheit, in eastern Australia, half of the region’s black flying fox (Pteropus alecto) population perished, with thousands of the bats succumbing to the heat in one day.
To access that money, Indigenous communities are creating their own funding solutions.
Liz Theoharis gives readers a sense of just what income inequality truly means for so many tens of millions of Americans.
Grasping his Bible with both hands, Burden said God was working through his North Texas congregation to take the country back to its Christian roots. He lamented that he lacked jurisdiction over the state Capitol, where he had gone during the 2021 Texas legislative session to lobby for conservative priorities like expanded gun rights and a ban on abortion.
The Johnson Amendment, a 1954 congressional measure, bans tax-exempt organizations from interfering directly or indirectly in a political campaign on behalf of or in opposition to a candidate. Violators risk having their tax-exempt status revoked by the IRS.
“The US has led coalitions to tackle [cyber threats], like ransomware and working with individual countries where we see significant compromises,” Neuberger said.
The company will continue using Twitter primarily for customer interactions despite its pause on advertisements, it said.
A spokesperson for Ford Motor , another Tesla rival, told CNBC that the automaker is not currently advertising on Twitter, and had not been doing so prior to Elon Musk's take-private deal. They added, "We will continue to evaluate the direction of the platform under the new ownership."
However, when presented with a screenshot of a promoted tweet from Ford CEO Jim Farley, the spokesperson could not confirm when was the last time Ford or its collaborators may have paid for ads, including promoted tweets, on the platform.
Ford is continuing to engage with its customers on Twitter.
President Joe Biden is undermining his party’s Congressional prospects through a deeply flawed foreign policy.€ Biden believes that America’s global reputation is at stake in the Ukraine War and has consistently rejected a diplomatic off-ramp.€ The Ukraine War, combined with the administration’s disruptions of economic relations with China, is aggravating the stagflation that will likely deliver one or both houses of Congress to the Republicans.€ Far worse, Biden’s dismissal of diplomacy prolongs the destruction of Ukraine and threatens nuclear war.€ €
Given Russia’s extensive history of cyberwarfare in Ukraine, it seemed likely that cyberattacks would play a large role in Russia’s war against Ukraine—and potentially against some of Ukraine’s supporters, including NATO member states. But that is largely not what happened. The cyberattacks that Russia has executed since the start of its war against Ukraine are perhaps more accurately characterized by Ciaran Martin as “cyber harassment” since they have failed to occur at the strength many had anticipated.
Akey to this success was keeping much data outside of the country. When servers inside Ukraine went down, far-off replacements sprung into action.
Russia failed to take down Ukrainian computer systems with a massive cyber-attack when it invaded this year, despite many analysts' predictions. The work of a little-known arm of the US military which hunts for adversaries online may be one reason. The BBC was given exclusive access to the cyber-operators involved in these global missions.
J. Alex Halderman, one of the nation’s foremost election security experts and a professor of computer science at the University of Michigan, has spent much of the last two years debunking false claims of fraud that followed the 2020 election.
While he acknowledges that demonstrating the integrity of the electoral process is important work, he notes that every minute election security experts spend on the new threat of unfounded fraud claims is a minute they can’t spend on other risks to election security.
Musk terminated Twitter Chief Executive Parag Agrawal, Chief Financial Officer Ned Segal and legal affairs and policy chief Vijaya Gadde, according to people familiar with the matter. He had accused them of misleading him and Twitter investors over the number of fake accounts on the social media platform.
Agrawal and Segal were in Twitter's San Francisco headquarters when the deal closed and were escorted out, the sources added.
The transcript for this clip is available to subscribers.
Few parties are so arch-establishment as Denmark's Social Democrats (SD). Founded in 1871, it had the largest representation in parliament for seventy-seven straight years. Its accomplishments include creating the welfare state, building modern Denmark, and shaping the Danish character. "Deep down, we're all Social Democrats" a person who dislikes the party acknowledged to me.
Despite this pedigree, plus its own history of advocating open borders, the SD has since 2019 imposed a remarkably restrictive immigration policy. In so doing, it has made Denmark the West's undisputed leader in the race to save traditional culture. As few outside Denmark have noticed this remarkable shift, I went to Copenhagen in advance of the national elections on November 1 to understand what caused this shift, how much of a difference it makes, and if Denmark can offer lessons to other countries.
The weekly M2 data published by the SBP has so far supported her view though the picture will be much clearer when quarterly numbers are published. But that still leaves a growing tendency among Islamic banks to join their conventional banking brethren in a rich tradition of rent-seeking where good-for-nothing treasuries park most of the customer money into government securities.
With less than two weeks to go before the November 8th congressional elections, the candidates in close races are frantically racing around their districts, dialing for campaign dollars and doing more of the same speechifying and repetitive political ads. “More of the same,” however, may not be enough.
That's how RootsAction director Norman Solomon described Brazilian President-Elect Luiz Inácio Lula da Silva's Sunday presidential runoff victory against far-right incumbent Jair Bolsonaro, the culmination of a most remarkable political comeback for a man who was languishing behind bars just three years ago.
"We are facing a clear attempt to curtail people's right to vote. This only happens in dictatorships."
"From L.A. to NYC we're demanding that the U.S. #UnblockCuba!"
The largest-ever analysis of Google’s ad practices on non-English-language websites reveals how the tech giant makes disinformation profitable.
Elon Musk on Sunday responded to a tweet by Hillary Clinton tying an assault on Paul Pelosi to Republican rhetoric by espousing a conspiracy theory surrounding the circumstances of the incident.
Musk had shared a link to an article detailing a right-wing conspiracy about the circumstances of the attack, which drew wide condemnation, from a website known for repeatedly publishing stories that are false.
Such belief systems, I’ve come to understand, have less to do with specific conspiracy theories, and more to do with generalized conspiracist attitudes about the world. I have grouped these attitudes into three overarching categories.
In a blog post shared on Thursday, Dr. Garth Graham, the global head of YouTube Health, wrote that healthcare professionals like doctors, nurses and mental health specialists, can now apply to use the platform's health product features.
YouTube’s health product features were introduced last year but were only available to educational institutions, public health departments, hospitals and government entities.
Brazil Court Orders – Removal of “Fake News”
Recent uptick in Brazilian court order complaints at Lumen reveal removal of alleged ‘Political Propaganda’, ‘Electoral Propaganda’ , and ‘Fake News’ prior to the Brazilian Election
Since the end of September 2022, there has been an increase in Brazilian court order complaints to Google shared with the Lumen Database, complaints that concern the removal of ‘Political Propaganda’, ‘Electoral Propaganda’ , and the ‘Disclosure of Known False News’.
The Wall Street Journal reported on Sunday that the court would be hearing a case against Google which argues that Section 230 of the Communications Decency Act, the clause in law that offers protection to technology companies, should not serve as a shield against companies that link to so-called harmful content.
The US Government has tried in the past to change Section 230, with a bid two years ago to pass what it called the EARN IT Act which looked to add conditions for those who sought protection under it.
Risto Berendson, head of the investigative editorial department of Estonian daily Ãâ¢htuleht, said the paper had decided not to publish the story about Marko Mihkelson until all parties involved had had the opportunity to explain their sides publicly. Speaking on ETV show "Ringvaade," Berendson said, that the press often refrains from publishing stories in order to protect the wellbeing of children.
I disagree. This was not a tactical move by Khomeini to promote himself but a true and furious response. Why? Because an author named Salman Rushdie wrote a book called The Satanic Verses. Those two bare facts—and not the complex contents within the 546 pages in the novel—sufficed to provoke an emotional reaction.
Glenn Greenwald is launching a new live, one-hour, prime-time news broadcast. Armed with cable-sized budgets, it will be part of a network that Russell Brand has already debuted.
Businessman and founder of PMC Wagner Evgeny Prigozhin appealed to Russia’s Prosecutor General to limit access to video sharing service YouTube, and to declare Google’s activities in Russia “undesirable.” Prigozhin’s company, Konkord, shared the appeal on its VKontakte page.
The dual car bomb blasts took place near the Ministry of Education and targeted the busy Zobe intersection in Mogadishu. The second blast detonated as first responders and local media arrived on the scene.
A man who spent more than 38 years behind bars for a 1983 murder and two attempted murders has been freed from a California prison after long-untested DNA evidence pointed to a different person
From anti-government graffiti to students heckling government officials, to women walking in the street without headscarves to workers putting down their tools, Iran’s regime looks increasingly bewildered by events.
Historians who study Iran, human rights activists, political analysts, U.S. officials and Iranians on the ground all say the protests represent a potentially revolutionary moment, and that Iranian citizens are increasingly ready to risk their lives for the cause.
“It’s like a war, the Islamic Republic versus the Iranian people,” said the woman from Tehran. She and other Iranians say the helmeted police flooding the streets resemble an occupying force, unsure of their position and unable to trust the local population.
Security forces for the Islamic Republic of Iran killed a general surgeon who was protesting along with doctors in front of the Tehran Medical Council on Tuesday.
The London-based Iran International news outlet reported on Saturday that the surgeon Parisa Bahmani, from Zanjan, was killed as a result of a shot to her head.
Protesters in the eastern city of Zahedan encountered teargas and gunfire following Friday prayers, according to videos posted on social media and provided by IranWire, an activist website. At least one 12-year-old boy was shot, according to video posted on activist group 1500tasvir’s social channels.
Salami criticized the supposed influence of American and Israeli politicians on the protest movement, alleging that they do “not call you directly, but through their media they force you to face your society.”
In a video obtained by CNN via the pro-reform activist outlet Iran Wire, two uniformed officers can be seen in what appears to be an attempt to arrest a protester. The video is said to be recorded at Sanandaj Technical College in northwestern Iran.
In the capital Tehran, activist groups claimed clashes broke out between protesters, members of the Basij militia and police officers in plain clothes at Azad University but CNN cannot independently verify whether those in the clashes are security forces.
During the attack, which took place on Friday night, dozens of Muslim men hurled stones at the church, injuring a number of people.
Iranians have defied such warnings throughout the popular revolt in which women have played a prominent role. There were more reports of fresh bloodshed on Saturday.
Human rights group Hengaw reported security forces shooting students at a girls' school in the city of Saqez. In another post, it said security forces opened fire on students at Kurdistan University of Medical Science, in the Kurdistan provincial capital of Sanandaj.
"China's achievements in eliminating absolute poverty in recent years have been outstanding, especially compared to developed countries."
The Federal Government will conduct an audit of mobile coverage in the country with a view to identify blackspots and help guide it in areas of investment from next year onwards.
A statement issued by Communications Minister Michelle Rowland on Monday said $20 million had been set aside for the Better Connectivity for Regional and Rural Australia Plan.
It said a regional telecommunications review in 2021 had expressed concerns from community members about the predictive coverage maps issued by providers and indicated that an audit would help validate them.
Presumably the focus will be on rural and regional areas where coverage is not half as good as in the metropolitan areas.
Facebook's parent company Meta has been accused of resorting to "robber-baron" tactics in Canada by threatening to block sharing of news feeds if Ottawa legislates to force it to pay news outlets for their content.
The accusation was made by Liberal MP Chris Bittle during a parliamentary hearing on Friday.
Liberal MPs Anthony Housefather and Lisa Hepfner also subjected Meta Canada Media Partnerships chief Marc Dinsdale and global policy director Kevin Chan to tough questioning.
On New Year’s 2021, books, music and films published in 1925 entered the public domain, free for anyone to copy, quote at length, mash up, whatever you like. Jennifer Jenkins at Duke Law’s Center for the Study of the Public Domain provides a rundown of what’s been set free and why it matters. Highlights in literature include Mrs. Dalloway, The Great Gatsby, and Kafka’s The Trial in the original German. An English translation of The Trial, however, won’t be public domain until 2033, and the Franz Kafka cartoon rock opera that got teenage me into Kafka will stay copyrighted until 2096.
A new study reveals how purchasing a Kodi-powered streaming box changed the Internet and media consumption habits of US households. The researchers use these boxes as a piracy proxy, as they were often loaded with third-party piracy apps. Interestingly, their data show that the use of these boxes led to increased legal consumption through on-demand services such as Netflix and YouTube.
Today was a pretty miserable day here in Brevard [1], with it being both cold and rainy. Bunny and I didn't really go out much today. But a few days ago, when I sat in the garden [2] I also took a stroll around the grounds here at the The Bromfield Inn [3]. And it was on the grounds that I found this bridge:
I bought a second-hand Thinkpad X13 Yoga (Gen 1) with a broken camera. A quick search shows this is quite a common problem that usually ends up in a RMA'd laptop, but as this one is well out of warranty I had a go at repairing it.
These laptops come with one of two types of cameras - one that includes an infra-red sensor and one without. The IR sensor is mostly used to sign in using facial recognition (i.e. Windows Hello). My laptop was originally non-IR model but through the repair I upgraded it to an IR-capable camera too.
There is a short discussion with #Gemini hashtag on Mastodon where a barrier term came up. It's about accessing Geminispace, where reading and writing is limited to people who has knowledge how to do this. It's true that there is a technical barrier. People must learn to do things in a special way to overcome that. I appreciate that it is so. Probably many of us appreciate that. So we are a new caste of Gemini priests?
Like a Mayan priests (and several other historical examples) who had a power to rule (in a direct or indirect way) the whole society. Mayan priests had a knowledge of astronomy, astrology and calendar/time. Gemini priests have a knowledge to do a real network communication. There are no any abilities to control a whole society, but this is a key to enter or not enter that better world. So you can be an ordinary account in the world of big social network, or an awaken man. It's some cyberpunk theme there?
I'm slightly surprised that anyone reads this, but I have had a couple of people get in touch. Since my last post I heard from Sandra (idiomdrottning) who wondered why I thought it wasn't good that Alonso got a penalty if that's what the rules say. This question opens a can of worms, but lets start with the facts.
[...]
So Sandra asked why Alonso shouldn't get a penalty if that's what the rules say. My answer is that the rules are not clear and straightforward, and their application is even less so.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.