Looking for the best VPS OS for beginners? Here's a comprehensive guide to help you compare the features of different options available today.
While most people are familiar with VPNs and their use cases, only a few know about VPN's more powerful and secure software brother, VPS.
The ext4 filesystem supports per-folder encryption, called "fscrypt". This is a feature that can be enabled using the 'tune2fs' utility.
In EasyOS, the working-partition (usually) has fscrypt enabled, and some folders are encrypted. This means, if the drive is stolen, no one will be able to read the contents of those folders.
The advantage of encrypting a folder, compared with a file as may be done in Puppy Linux, is the folder has no size limit, or rather, it is the limit of free space in the partition.
There is a utility name 'e4crypt' in the initrd, that decrypts these folders at bootup. Easy has used this utility up until the present; however, it is what is called "version 1" fscrypt, and has some serious problems with multiple users.
When I took Easy down the path of running apps as separate users, things got complicated. I had to use the 'keyctl' utility for each user to decipher the folders. And recently it got even more complicated with Flatpaks, that run in a sandbox and have great difficulties with recognizing the kernel keys -- meaning unable to access the encrypted folders.
Since the 5.4 kernel, I think about 2020, there has been fscrypt v2, that looks like it might make usage with multiple users much easier. Here is some early information about v2:
The SystemTap team announces release 4.9
Enhancements to this release include: Jupyter web-based interactive frontend, language-server-protocol backend
= Where to get it
https://sourceware.org/systemtap/ - our project page https://sourceware.org/systemtap/ftp/releases/ https://koji.fedoraproject.org/koji/packageinfo?packageID... git tag release-4.9 (commit ebb424eee5599fc)
There have been over 70 commits since the last release. There have been 10 bugs fixed / features added since the last release.
= SystemTap backend changes
* Corrected handling of DWARF5 implicit-pointer and entry-value data and bit-fields.
* Corrected accidental runtime double-hit of some types of synthetic probes.
* Improved kernel backtrace repeated artifacts.
= SystemTap frontend (stap) changes
* Added a Jupyter based front-end to stap. This may be invoked via a container - or built locally (likely via pip3 downloads). The user interface becomes an interactive notebook in a web browser. See the "stap-jupyter" man page.
* Added a "--language-server" option to stap, which switches it into an LSP server on stdin/stdout. This allows users of a variety of editors to trigger symbol-completions and similar operations in context. This code includes a small reusable jsonrpc server library implementation in C++.
* Improved documentation generation scripts, so the website doc snapshots can be fresher.
* Improved deterministic buildability of dtrace-flavoured .h/.c file generation.
* Temporarily disabled $context-variable liveness safety checks on retpoline kernels.
Version 4.9 of the SystemTap tracing tool has been released. The headline changes this time include a new, Jupyter-based frontend and a language-server-protocol interface for name completion.
Wireshark version 4.0.5 was released with 11 bugs and 3 vulnerabilities fixed.
GNOME devs have released the first version of a new camera app which could replace the classic Cheese webcam utility.
In this tutorial, we will show you how to install the LEMP stack on Fedora 38. LEMP stands for Linux, Nginx, MySQL, and PHP. This means that we are going to install and configure these software packages on our server to set up a fully functional web server.
Deploying a very basic Docker container isn't all that hard.
In this tutorial, we will show you how to install Java on Fedora 38. Are you a developer who needs to work with Java on your Fedora 38 system? Look no further! Java is an incredibly versatile and popular programming language, known for its cross-platform compatibility and extensive libraries.
Learn how to properly install Qemu in Ubuntu and then configure a Linux distro in VM.
In preparing for releasing Debian 12.0 "Bookworm" in June, out this weekend is the second release candidate of the Debian Installer for this next major Debian Linux release...
In this tutorial, we will cover how to add a sudo user on RHEL, Rocky Linux and Alma Linux.
Pop!_OS is a user-friendly and visually appealing Linux distribution based on Ubuntu. It's designed to offer a smooth and efficient experience for both beginners and advanced users. If you're interested in trying out Pop!_OS or installing it on your computer, creating a bootable USB is an essential first step.
Linux is renowned for its stability, efficiency, and robustness, making it a preferred choice for many system administrators and users. However, as with any other operating system, Linux-based systems may experience a decline in performance due to memory cache buildup over time.
Bash is a powerful and versatile Unix shell that has become the default command-line interface on most Linux distributions and macOS. Shell scripting is an essential skill for system administrators, programmers, and anyone who wants to automate tasks or improve their workflow.
I recently wanted to convert a UIColor to a CSS-compatible string so I could update the color inside a webview. Here’s how I did it.
Anyone who has setup a website will appreciate that SSL/TLS requires a web server to have an SSL certificate authenticating its identity. However, while TLS requires a server certificate, it also has optional support for client certificates, whereby a client connecting to a TLS server must also authenticate its identity to the server. Just as in the case of server certificates, this is done by presenting a certificate and proving ownership of the corresponding private key.
If you deviate from any of the above steps, the output will be silently wrong. If you process the resulting PDF with anything except Adobe's tool suite the end result might become silently wrong. As an example here is the output of colour separation using Adobe Acrobat and Ghostscript.
Essentially, this boils down to: Trust, Verify and Hold Accountable. To put this dogma in perspective, it helps to understand that this approach may be harmful to human relationships (which could explain the social awkwardness of hackers), but it remains useful as a method to improve the design of computer systems, and a useful method to evaluate safety of computer systems. When a system fails some of the criteria above, we know we have more work to do to improve it.
Today I wanted to create a bar chart for a new blog post on blog.airsequel.com. It was supposed to show the number of days between each SQLite release. I decided to use Haskell, but I couldn't find any good code examples out there. So, I went ahead and wrote the code from scratch. ðŸË®ââ¬ÂðŸâ¨ I'm sharing it here in hopes of sparing the next person the time and effort. ðŸËâ¦
Suppose, not entirely hypothetically, that something has a crontab job that runs once a minute and that has started to generate output every time it runs, which cron will email to the crontab's owner (or MAILTO setting). This means that this machine is now running right at the edge of its sending ratelimit; if it generates even one more email message (for example from some other cron job that runs once a day to notify you about pending package updates on that machine), it will hit the ratelimit and have an email message stalled. Once even a single message stalls, this machine will never recover and will always have something in its local mail queue. If it sends a second extra email, you'll wind up with the local mail queue always having two things waiting, and so on.
In this tutorial, we will show you how to install Node.js on Fedora 38. If you're a web developer or a programming enthusiast, you must have heard of Node.Js. It's a powerful platform that allows you to build server-side applications using JavaScript, a language traditionally used for client-side scripting in web browsers.
Fedora Linux 38 is now available, featuring Gnome 44, Linux 6.2, numerous new BtrFS fixes, and other updates. In this guide, we will show you how to upgrade your Fedora Linux installation to the new 38 release.
Doom is the classic first-person shooter from the 1990s and has been adapted from its PC roots to play on everything from a Lego brick to a pregnancy test.
In the modern computing world, GPUs (Graphics Processing Units) have become an essential computer system component, particularly for tasks like gaming, video editing, and AI research.
Hewlett-Packard Linux Imaging and Printing (HPLIP) is a versatile and powerful solution designed to enhance the printing, scanning, and faxing experience for HP devices on Linux systems. Ubuntu users can significantly benefit from installing HPLIP, as it provides an all-in-one package for managing their HP devices efficiently.
MicroPython has a new and lightweight MicroPython package manager for all of your MicroPython module needs.
This guide explains how to install multimedia codecs in Fedora 38 and older versions from RPM Fusion software repository.
This guide explains what is RPM Fusion repository and how to enable RPM Fusion repository in Fedora, RHEL, CentOS, AlmaLinux, and Rocky Linux.
Beyond Compare is a free (trial) and paid software application that allows users to compare and syn files & folders [sic] on their PC system. It is developed by Scooter Software.
I am just back from a full day out in Osaka to cover the fact that the Steam Deck launches in stores in Japan for the first time, and probably also worldwide.
Think you have what it takes? These games might test your limits. The Striking Soulslike Bundle is live and here's what compatibility to expect on Linux desktop and Steam Deck.
Wine, the compatibility layer for running Windows apps and games on Linux has a fresh development release up with version 8.7. Once a year a new stable releasing is made with the next being Wine 9.0, and Wine is just one part of what allows Steam Play Proton to play some of the biggest games around on Linux desktop and Steam Deck.
It has been over four years since X4: Foundations was released. With the new fourth DLC Kingdom End, Egosoft has now brought the last of the original races back into the game, namely the peaceful and scientifically highly motivated Borons.
Here I’ll write an ode to two closely-linked FOSS projects that have, recently, absolutely floored me with their competence & quality: Sunshine and Moonlight. These are used to stream video games over a (usually local) network. Sunshine is a game streaming server: it runs on your PC as it chugs away doing all the heavy lifting of running the game itself, while Moonlight is a game streaming client that runs on whatever thin hardware exists where you want to play the game! I run Sunshine on my home office workstation and Moonlight on a NVIDIA Shield Android TV connected to a 55" screen in the living room. Some games are just best played on the couch! It’s also important if you have someone you want to share the experience with instead of sequestering yourself alone in your dark Gamer Den.
Debian 11.7 has just been released. It rolls all of the available fixes into a new ISO image. If you have Debian installed already, just apply the latest updates to be upgraded to Debian 11.7.
Although all eyes are on the upcoming Debian 12 (Bookworm), which, as our media informs you, already has a release date scheduled, the current stable Debian 11 (Bullseye) release is the distribution focus at the moment.
In this light, powered by Linux kernel 5.10.0-22, Debian has released its latest version, 11.7, to continue the stable 11.x (Bullseye) series, which was first introduced in August 2021.
€ We're all but done - a couple of bugs sorted. All testing complete.
€ We've been joined by Simon (smcv) - lots of chat bouncing backwards and forwards. Laptops appearing out of backpacks suddenly being repurposed.
Settling very much into a rhythm and routine.
Working with two laptops on your lap ends up being quite heavy :)
Debian 11.7 is here almost four and a half months after Debian 11.6 to provide those who want to deploy the Debian GNU/Linux 11 “Bullseye” operating system series on new computers with up-to-date installation media so you won’t have to download hundreds of updated from the repositories after the installation.
This means that Debian 11.7 includes all the security and software updates that have been released from December 17th, 2022, when Debian GNU/Linux 11.6 was released, until today. In numbers, Debian 11.7 includes a total of 102 security updates and miscellaneous bug fixes for 92 packages.
The Debian Installer team[1] is pleased to announce the second release candidate of the installer for Debian 12 "Bookworm".
Improvements in this release ============================
* apt-setup: - Enable <codename>-updates when installing testing, not only when installing (old)stable (#991947). * argon2: - Restore threading support in the installer (#1034696). * base-installer: - Install zstd alongside initramfs-tools, like busybox. * choose-mirror: - Update Mirrors.masterlist. * cryptsetup: - Improve support for low-memory systems (#1028250): Check for physical memory available also in PBKDF benchmark, and use only half of detected free memory on systems without swap. * debian-cd: - Include zstd alongside initramfs-tools, like busybox. * debian-installer: - Fix grub font loading, making sure we get the nice graphical splash screen in Secure Boot mode too (#1034535). * grub-installer: - Install shim-signed on i386 and arm64 as well as amd64 when we're installing grub-efi-*-signed packages. - If we detect other operating systems installed, check with the user (at low priority) and re-enable os-prober. * grub2: - Add debconf logic for GRUB_DISABLE_OS_PROBER to make it easier to control things here, particularly useful for the installer (#1031594, #1012865, #1025698). - Add luks2 to the signed grub efi images (#1001248). - Fix probing of LUKS2 devices (#1028301). - Fix Secure Boot on arm64 (#1033657). - Don't warn about os-prober if it's not installed (#1020769). - Fix an issue where a logical volume rename would lead grub to fail to boot (#987008). * live-installer: - Remove the live packages before the cdrom is unmounted, avoiding a long wait at the end of the installation process. * partman-efi: - Fix detection of BIOS-bootable systems, fixing at least the "Guided - use entire disk and set up LVM" use case on UEFI systems (#834373, #1033913). * preseed: - Restore support for the "hostname" alias on the kernel command line (#1031643, #1034062). - Switch auto-install/defaultroot to bookworm.
Hardware support changes ========================
* flash-kernel: - Adjust OLPC XO-1.75 boot script. - Add Lenovo Miix 630 and Lenovo Yoga C630. - Add StarFive VisionFive board. - Add D1 SoC boards. - Add QEMU-related "dummy" entries. - Add A20-OLinuXino_MICRO-eMMC (#1019881). - Add Lenovo ThinkPad X13s. - Add Colibri iMX6ULL eMMC. - Add Raspberry Pi 3 Model B Plus Rev 1.3. * linux: - udeb: add intel_lpss* (optional) to kernel-image (#1032136). Many laptops have their touchpad accessible over I2C, only visible if LPSS is available in the installer.
Localization status ===================
* 78 languages are supported in this release. * Full translation for 41 of them.
Known bugs in this release ==========================
* There seems to be no known major bug as of yet.
See the errata[2] for details and a full list of known issues.
Feedback for this release =========================
We need your help to find bugs and further improve the installer, so please try it. Installation images, and everything else you will need are available at our web site[3].
Thanks ======
The Debian Installer team thanks everybody who has contributed to this release.
1. https://wiki.debian.org/DebianInstaller/Team 2. https://www.debian.org/devel/debian-installer/errata 3. https://www.debian.org/devel/debian-installer
Cheers,
Canonical has announced that Ubuntu 23.10, which is due out in October, will carry the codename Mantic Minotaur. It’s typical for Ubuntu to receive a codename of an endangered animal like a Pangolin but it seems with this release, the company has decided to go entirely with non-existent creatures.
The adjective, Mantic, "relating to divination or prophecy", comes from the Greek word mantikos and mantis which means prophet. So you could read Mantic Minotaur as Prophetic Minotaur.
The disclosure of the codename for Ubuntu 23.10 comes nearly a month after the cycle’s calendar was published in which it states that a beta will be made available on 21st September and the final release due on 12th October. The beta will give the public an opportunity to try it out and report any last-minute bugs that developers may have missed.
Kickstarter featured this week an Open-source development ESP32-based board designed for learning and quick prototyping. The TESPuino provides up to 14x GPIOs, 1x MicroSD card slot for storage and 1x USB Type-C port programming and power.
LCD photo frames never really caught on — by emitting light, they didn’t seamlessly blend in with a home’s decor in the way printed photos do. [Sprite_tm] decided to see if a color e-Ink screen could do any better, and whipped up a WiFi-enabled photo frame using a Waveshare display.
Shared by feiticeir0 on Thingiverse, this neat tripod and camera support comes in handy!
Last time I got as far as the Euro PC showing tons of BIOS errors on the screen, which is a good first step. This time I try to get a little further…
Pinout.xyz has released a new command line-based GPIO pinout chart for the Raspberry Pi Pico microcontroller.
Long time readers will know that occasionally we mix up our usual subject matter with a dash of farm equipment. Usually the yellow and green variants that come from John Deere, as the agricultural manufacturer has become the poster child for all that is wrong in the fight for the right to repair. An old Deere is worth more than a nearly new one in many places, because for several years now their models have had all their parts locked down by DRM technologies such that only their own fitters can replace them. Now after a long legal fight involving many parties, the repair and parts company iFixit sound justifiably pleased as they announce the world’s first agricultural right to repair law being passed in the US state of Colorado. (Nitter)
I remember reading an article about Linux back in (maybe) 1998 or 1999, and I was fascinated by it, but I didn’t actually try it for the first time until late 2005.
I obtained a used computer from a tech friend and started experimenting with it. My first distros were Linspire and Mepis. From there, I moved to Ubuntu. At first, it was just having fun and learning how to make things work. Then, I started trying to do more of my teaching work using Linux. Then, it was getting students interested and involved.
I first started doing Linux clubs at school back in 2012, and the whole thing started by accident. Our school had started a 1:1 laptop program that year, and almost immediately students started breaking and losing laptops. I wanted to integrate tech into my teaching, but I would have students in each class that did not have a laptop because they had broken it.
Last weekend I attended the Linux App Summit (LAS) 2023 in Brno, Czechia, to speak about push notifications and to get a few remaining interoperability issues sorted out.
LAS
While my goal for last LAS was to finally meet people in person again for the first time since the pandemic, I had a much more specific objective this time, get the remaining questions around UnifiedPush on Linux sorted out.
I attended FOSSASIA 2023 summit held at Lifelong Learning Institute, Singapore. A 3 day long parallel talk filled conference. Its my second time attending FOSSASIA. The first one was 2018 summit. Like last time, I didn’t attend much talks but focussed on networking with people. A lot of familiar faces there. PV Anthony, Harish, etc.
I vounteered to run Debian Booth at the exhibition hall distributing stickers, flyers. Rajudev also helped me at the booth. Most of the people there used debian or its derivates or know debian already, its easier for me that way, that I don’t have do much explaining compared to other booths. Thanks to Parth for looking after booth in my breaks.
So let's take a look at some of the exciting improvements and refinements that SQLite has seen since 2020. This list focuses on changes related to the supported SQL instructions and the CLI.
Dear all,
I am happy to announce the 20th stable version of Gnuastro: version 0.20.
Gnuastro is an official GNU package, consisting of various command-line programs, C/C++ library functions and Makefile extensions for the manipulation and analysis of (astronomical) data. All the programs share the same basic command-line user interface (modeled on GNU Coreutils). For the full list of Gnuastro's library, programs, and several comprehensive tutorials (recommended place to start using Gnuastro), please see the links below respectively:
https://www.gnu.org/s/gnuastro/manual/html_node/Gnuastro-library.html https://www.gnu.org/s/gnuastro/manual/html_node/Gnuastro-programs-list.html https://www.gnu.org/software/gnuastro/manual/html_node/Tutorials.html
In the 27 weeks since 0.19, there have been 122 commits by 12 people with 15265 lines of code and documentation inserted and 5779 deleted. See [1] for the list of people who contributed for all the exciting new features that have been added (thanks a lot everyone!). For the full list of added and changed features, as well as the fixed bugs, please see [2].
Here is the compressed source and the GPG detached signature for this release. To uncompress Lzip tarballs, see [3]. To check the validity of the tarballs using the GPG detached signature (*.sig) see [4]. See [5] for the list of software used to bootstrap this tarball.
https://ftp.gnu.org/gnu/gnuastro/gnuastro-0.20.tar.lz (4.4MB) https://ftp.gnu.org/gnu/gnuastro/gnuastro-0.20.tar.gz (7.0MB) https://ftp.gnu.org/gnu/gnuastro/gnuastro-0.20.tar.lz.sig (833B) https://ftp.gnu.org/gnu/gnuastro/gnuastro-0.20.tar.gz.sig (833B)
Here are the SHA1 and SHA256 checksums (other ways to check if the tarball you download is what we distributed). Just note that the SHA256 checksum is base64 encoded, instead of the hexadecimal encoding that most checksum tools default to (see [6] on how to generate it).
c8d2c8f8cb32ff7bac3d6c0dc281295cbc8f251b gnuastro-0.20.tar.lz VkBKS5GeEGdC102c53QCQTxZWz2giCcqmKmr1UFTcxU= gnuastro-0.20.tar.lz eab2aeb48f68a8b43f48f8bebb46b6fd74455a48 gnuastro-0.20.tar.gz kkuLtqwc0VFj3a3Dqb/bi4jKx7UJnV+CHs7bw/Cwac0= gnuastro-0.20.tar.gz
If any of Gnuastro's programs or libraries are useful in your work, please cite _and_ acknowledge them. For citation and acknowledgment guidelines, run the relevant programs with a `--cite' option (it can be different for different programs, so run it for all the programs you use). Citations _and_ acknowledgments are vital for the continued work on Gnuastro, so please don't forget to support us by doing so.
Best wishes, Mohammad
The 20th release of GNU Astronomy Utilities (Gnuastro) is now available. See the full announcement for all the new features in this release and the many bugs that have been found and fixed: https://lists.gnu.org/archive/html/info-gnuastro/2023-04/msg00001.html
I couldn't find a way to publish this via my university, which was a little disappointing. And I didn't have the time or energy to rewrite it for submission to a journal. Then a couple of people suggest that I submit it to arXiv.
JavaScript, a versatile and widely used programming language, is an essential tool for web developers. One of the key concepts in JavaScript is the function, which allows you to write reusable and maintainable code.
JavaScript is a powerful, versatile, and widely-used programming language that has become an essential tool for modern web development. Understanding the basics of JavaScript, such as variables and data types, is crucial for any aspiring web developer.
Introduction: While coding in RStudio I wanted to use the RStudio keyboard shortcuts to wrap functions and custom lines of code around datasets, code, or objects in the editor pane.€ I could not find what I wanted after reviewing various packages and solutions.
Recently I’ve been trying to improve state management and component API in Humble UI. For that, I’ve tried to read and compile all the possible known approaches and synthesize something from them.
I haven’t decided on anything for Humble UI yet, let’s say I’m in an experimenting phase. But I think my notes could be useful to quickly get a birds-eye overview of the field.
This is a compilation of my research so far.
This is a bug fix and minor feature release over INN 2.7.0, and the upgrade should be painless. You can download the new release from ISC or my personal INN pages. The latter also has links to the full changelog and the other INN documentation. As of this release, we're no longer generating hashes and signed hashes. Instead, the release is a simple tarball and a detached GnuPG signature, similar to my other software releases.
In this tutorial, you will learn how to create a simple graphical user interface (GUI) using Python and Tkinter. We'll guide you through the process of crafting your first Tkinter application step-by-step, from installing the necessary dependencies to building and running the app.
PyTest is a popular testing framework for Python programming language. Fixtures in PyTest provide a way to manage the resources and data required for running tests. They simplify the process of setting up, tearing down, and sharing test data between test functions. PyTest fixtures provide a convenient way to define these resources and data once and reuse them across multiple tests, saving time and reducing the chance of errors.
In this tutorial, you will learn what PyTest fixtures are, why they are used, and how to define and use them in your tests. To explore the usage of Pytest fixtures, you’ll be creating a simple note-taking application that lets users add, edit, and get notes.
Gtk4 has interesting ways of splitting models and views. One that I didn't find very well documented, especially for Python bindings, is a set of radio buttons backed by a common model.
The idea is to define an action that takes a string as a state. Each radio button is assigned a string matching one of the possible states, and when the state of the backend action is changed, the radio buttons are automatically updated.
All the examples below use a string for a value type, but anything can be used that fits into a
GLib.Variant
.The model
This defines the action. Note that enables all the usual declarative ways of a status change: [...]
Much of my latest Japan trip was unfortunately spent with a series of headaches, but in a roundabout way they lead Clara and I to a new place we’d never been to before! And it was just what the doctor ordered.
We’d had such success at the Hard Off second-hand electronics store in Kyà Âto, that we decided to check out another branch that was accessible by rail. Unlike car or bus rides, the smooth and comfortable intercity trains in Japan are a great way to explore with a headache. Maybe that’s another avenue for tourism promotion they should consider!
I have stolen this title from the stage play of the same name based on Christopher Isherwood’s 1939 novel Goodbye to Berlin. The title is taken from a quote in the novel’s first page: “I am a camera with its shutter open, quite passive, recording, not thinking.”
One of my favourite parts of travelling to a destination by plane -- and indeed train -- is to play an available piano. I find playing piano relaxing, a way for me to take a break from thinking about all of the details of my journey. With that said, there are many airports without pianos, and many more that have one piano in a single terminal but no pianos in other terminals. I was speaking with a few people about how we could help place pianos in airports where one is not available, providing travellers with the ability to have the same experience I and many other travellers have: a moment to sit back and make music between legs of a journey.
He was sweeter than Howard Stern, realer than Phil Donahue. His coolness gave his show its plausible deniability.
This is really weird.
Et tu, clouds?
Last week, I wrote about NASA’s technology demonstrator projects, and how they’ve been runaway successes – both the Mars rovers and the current copter came from such experimental beginnings. I argued that letting some spirit of experimentation into an organization like NASA is probably very fruitful from time to time.
In 2017, as lawyers for prisoners in Ohio sought to spare their clients from lethal injection, they challenged one of the state’s key witnesses: Daniel Buffington.
As he had done elsewhere, the Florida-based pharmacist had submitted written testimony saying that prisoners would not feel pain from the three-drug cocktail administered by executioners. But the lawyers for the men on death row argued that Buffington was unqualified to testify in an upcoming hearing, noting that he had not administered general anesthesia or conducted research on midazolam, the key sedative in the execution protocol.
Last winter, Dr. Gail Van Norman sat on the witness stand in the federal courthouse in Oklahoma City, testifying as part of a trial that would determine whether Oklahoma’s lethal injection procedure was constitutional. Two weeks earlier, at the request of lawyers representing more than two dozen prisoners, Van Norman, an anesthesiologist and professor at the University of Washington, had attended the execution of a man named Gilbert Ray Postelle.
In the execution chamber, she testified, Postelle was lying face-up on a gurney with his arms stretched out beside him. Executioners injected him with midazolam, a drug that was supposed to knock him unconscious so he didn’t feel pain from two drugs that would soon paralyze him and stop his heart. It didn’t appear to work. For 2 1/2 minutes after receiving midazolam, Postelle continued to wiggle his hands and feet. His eyes remained open, blinking and looking up at the ceiling. Postelle’s breathing became increasingly strenuous and rapid. Van Norman said his trouble breathing was a result of the large dose of midazolam.
In part six of her series, Christina shares the experience of moving from Canadian to Mexican schools, and the benefits for her daughter.
The slow and steady dismantling of New College of Florida.
There has been immense confusion over the "education export" programme both in Finland and Kenya.
When we have two 3D printed parts that need to fit together, many of us rely on pins and holes to locate them and fix them together. [Slant 3D] has explored some alternative ideas in this area that may open up new avenues for your own designs.
Most ham radio operators will build an antenna of some sort when they first start listening or transmitting, whether it’s a simple dipole, a beam antenna like a Yagi, or even just a random wire vertical antenna. All of these will need to be connected feedline of some sort, and in the likely event you reach for some 50-ohm coax cable you’ll also need a balun to reduce noise or unwanted radiation. Don’t be afraid of extra expenses when getting into this hobby, though, as [W6NBC] demonstrates how to construct an “ugly balun” out of the coax wire itself (PDF).
Once upon a time, a radio controlled plane was a hefty and complex thing. They required small nitro engines, support equipment, and relatively heavy RC electronics. Times have changed since then, as this lightweight RC build from [Ravi Butani] demonstrates.
Our XPS 15 review sample came configured with an Intel Core i7-13700H, Nvidia GeForce RTX 4070, 32GB of RAM and a 1TB SSD.
"Unlike other weeding technologies, the robots utilize high-power lasers to eradicate weeds through thermal energy, without disturbing the soil. The automated robots allow farmers to use fewer herbicides and reduce labor to remove unwanted plants while improving the reliability and predictability of costs, crop yield, and more."
Some are taking sick days. Others are cutting back their hours. Still others end up quitting altogether.
After analyzing genetic data swabbed from a Wuhan market in early 2020, a virologist said it was unclear if animals for sale there had been infected.
When we peer into our patient portals, we don’t always see ourselves more clearly.
We have to do something.
They're not where they should be.
Feeling a bit bored I asked ChatGPT “Write a blog post in the style of Russell Coker” and the result is in the section below. I don’t know if ChatGPT knows that the person asking the question is the same as the person being asked about. If a human had created that I’d be certain that “great computer scientist and writer” was an attempt at flattery, for a machine I’m not sure.
I have not written a single book, but I expect that in some alternate universe some version of me has written several. I don’t know if humans would describe my writing as being known for “clarity, precision, and depth”. I would not be surprised if “no-one else wrote about it so I guess I’m forced to read what he wrote” would be a more common response.
The actual “article” part doesn’t seem to be in my style at all. [...]
Worldwide spending across the three product categories totaled $63.7 billion in the first quarter, according to Synergy Research. That’s $11 billion more than what organizations spent the same time a year earlier. But although cloud investments increased significantly, demand is growing at a slower pace than in previous years.
Multi-cloud had many theoretical benefits. Cost-efficient. Flexible. No vendor lock-in. Best-of-breed services. Increased bargaining power. Risk mitigation.
Of course, none of these came true. In fact, many of these predictions actually ended up working in the opposite direction. Some reasons why multi-cloud failed.
Git 2.40.1 has been released to address three new security vulnerabilities being disclosed, which have been classified as “high-severity” by the National Vulnerability Database (NVD) due to their high confidentiality, integrity and availability impact, and the low attack complexity and lack of privileges required to exploit them. Due to these security fixes, updates for prior stable Git series are also availble with v2.39.3, v2.38.5, v2.37.7, v2.36.6, v2.35.8, v2.34.8, v2.33.8, v2.32.7, v2.31.8, and v2.30.9.
I posted yesterday about fscrypt v2:
https://bkhome.org/news/202304/preliminary-support-for-fscrypt-v2.html
There is a security concern, as the password the user types in at bootup is used to create the encrypted folders. Quoting from here:
https://www.kernel.org/doc/html/latest/filesystems/fscrypt.html
Master keys must be real cryptographic keys, i.e. indistinguishable from random bytestrings of the same length. This implies that users must not directly use a password as a master key, zero-pad a shorter key, or repeat a shorter key. Security cannot be guaranteed if userspace makes any such error, as the cryptographic proofs and analysis would no longer apply.
BianLian often uses the asterisk system before they actually name the victim and leak data.
On April 18, 2023, the European Commission published its proposal for an EU Cyber Solidarity Act (“CSA”). It aims to strengthen incident detection, situational awareness, and response capabilities, and to ensure that entities providing services critical for day-to-day life can access expert support to manage their cyber risk and respond to incidents. Specifically, the CSA aims to promote information sharing about cyber incidents and vulnerabilities, to help improve the cyber resilience of critical entities, and to create an EU-wide resource for incident management.
The CSA adds another layer to the increasingly crowded landscape of EU cybersecurity laws. The proposed law would interact with the revised Network and Information Security Directive (“NIS2”) and certifications issued under the Cybersecurity Act. Private companies in specific sectors will also have to consider potential overlap with the forthcoming Cyber Resilience Act and the financial services-focused Digital Operation Resilience Act.
In the wake of a cyberattack at the Waterloo Region District School Board (WRDSB) this past summer, some of the people impacted are raising questions about how it was handled.
The data accessed by hackers included details about employees dating back to 1970.
But some of those former employees say getting information about what happened, along with their risks, was difficult.
Emmanuel College in Boston appears to have become a victim of Avos Locker. The college was added to the threat actor’s leak site yesterday, with a note saying,
United HealthCare made customers aware of a data breach on Friday, which temporarily allowed access to personal information for those enrolled in the company's healthcare plans.
According to a statement, "suspicious activity" was noticed on the UHC mobile application "that may have led to the disclosure of member information."
The company says that the breach happened between February 19 and February 25, and it was determined on April 10 that some member information was impacted.
They believe that information including members' first and last names, health insurance member identification numbers, dates of birth, addresses, dates of service, provider names, claim information and group name and number may have been available.
The Diocese of Las Vegas on Friday announced a cybersecurity breach that potentially compromised "sensitive information of its volunteers, parishioners, donors and other stakeholders," a news release states.
A spokesperson noted there was "no indication that personal information has been misused," but said the Diocese would notify those who may have been impacted.
On late Friday, Amnesty International Australia sent an email to supporters informing them their data may be at risk due to “anomalous activity” detected in its IT environment.
While the email went out very late in the day/week, it also went out a very long time after the activity was found. The email, sighted by Gizmodo Australia, says the activity was detected late last year.
Internet providers and wireless carriers in Brazil have stopped blocking Telegram after a federal judge partially revised a ruling suspending the social media app over its failure to surrender data on neo-Nazi activity
The drop in searches reflects a number of factors, according to the report from the Office of the Director of National Intelligence. First, the FBI used a new methodology to calculate the number of searches performed under Section 702 of the Foreign Intelligence Surveillance Act, or FISA, which allows intelligence and law enforcement agencies to gather online communications of foreign intelligence targets. The program also sweeps up Americans’ data, making it a lucrative source of information for so-called “backdoor” searches by the FBI in investigating U.S. persons.
E2EE’s growing ubiquity seems like a clear win for personal privacy, security, and safety, as well as national security and the economy. And yet E2EE’s popularity has its critics – including, unfortunately, Sen. Durbin. Because it’s harder for providers and law enforcement to detect malicious activity in encrypted environments than unencrypted ones (albeit not impossible, as I’ll discuss), law enforcement officials and lawmakers often demonize E2EE. But E2EE is a vital protection against crime and abuse, because it helps to protect people (children included) from the harms that happen when their personal information and private conversations fall into the wrong hands: data breaches, hacking, cybercrime, snooping by hostile foreign governments, stalkers and domestic abusers, and so on.
That’s why it’s so important that national policy promote rather than dissuade the use of E2EE – and why it’s so disappointing that STOP CSAM has turned out to be just the opposite: yet another misguided effort by lawmakers in the name of online safety that would only make us all less safe.
Warplanes on bombing raids drew heavy anti-aircraft fire over Khartoum on Saturday as fierce fighting between Sudan's army and paramilitaries entered a third week, despite a renewed truce.
The Proud Boys jury is dividing on something. What is it?
Spurred by mounting tensions with China, the tide is turning in favour of a greater US presence in the region.
Helsinki is among the many European capitals in which Russia has placed suspected signal intelligence gathering devices on its embassies' roofs.
KYIV (Reuters) -Ukraine had protested to key allies the European Union and Poland over restrictions on its grain supplies on Friday, before the...
Warsaw authorities have moved to claim a school building that served children of Russian diplomats
Artem Moroz survived an attack on his unit, but he was not sure he would stand again. Then a movie about the 2013 Boston Marathon bombing inspired a new goal.
With fighting in the eastern Donbas region settling into a bloody stalemate, a patch of the Zaporizhzhia region of southeastern Ukraine could prove to be the war’s next big theater.
Ukraine has welcomed the European Union’s hard-fought deal to keep farm exports flowing into and through the bloc to world markets
Wagner chief Yevgeny Prigozhin has threatened to withdraw his mercenaries from the embattled Ukrainian city of Bakhmut if supply problems are not resolved, as President Volodymyr Zelenskiy appealed for modern air-defense systems following deadly Russian strikes on civilian targets.
Since 2017, not only the Lithuanian Armed Forces but also the NATO Enhanced Forward Presence (eFP) battle group have been preparing to defend Lithuania in the event of a military crisis. In the wake of Russia’s invasion of Ukraine, the presence of NATO forces on the alliance’s eastern flank has taken on a new meaning, say the troops deployed in Lithuania.
A Russian-installed local official blamed the blaze on “enemy drones.” Ukraine, which typically maintains a policy of strategic ambiguity about strikes in Crimea, did not claim responsibility.
Poland on April 29 said it had seized a high-school building near Moscow's embassy in Warsaw meant for the children of diplomats, a move the Russian envoy called "illegal."
Data: Gallup. Note: Approximately 1,000 people at least 15 years of age were polled per country.; Chart: Axios Visuals
Global approval of U.S. leadership slumped in year two of President Biden's tenure, according to a Gallup poll of 137 countries and territories.
The release of the White House’s review of the chaotic 2021 troop withdrawal showed once again that the realities of Afghanistan and US partisan politics take precedence over President Biden's desire to permanently disentangle Washington from Afghanistan.
The fragile peace that quieted years of genocidal violence in Darfur is at risk again.
Russian occupational authorities in southern Ukraine said Saturday that Ukrainian forces were subjecting the city of Novaya Kakhovka to “intense artillery fire” that had cut off electricity. The shelling came the same day that authorities in Russian-annexed Crimea reported a drone attack on a fuel depot and as Kyiv prepares for a widely expected counteroffensive against Moscow’s forces. Read our live blog to see how all the day's events unfolded.€ All times are Paris time (GMT+2).
Pope Francis thanked Hungarians on Saturday for welcoming Ukrainian refugees and urged them to help anyone in need, as he begged for a culture of charity in a country where the prime minister has justified firm anti-immigration policies with fears that migration threatens Europe’s Christian culture.
Anti-corruption groups in South Africa have called for more protection of whistleblowers following recent killings that bore the hallmarks of professional hits
More Australians have been evacuated from Sudan overnight, with the federal government urging people to get out as soon as they can as fighting in the African nation continues.€ Deputy Prime Minister Richard Marles said 17 additional Australians had been evacuated from the country, bringing the total number to 155.
The European Union (EU) must reach a common solution to direct the frozen Russian assets to the reconstruction of Ukraine, Latvia's Minister of Finance Arvils Ašeradens (New Unity) said at the meeting of the EU Economic and Financial Affairs Council (ECOFIN) on Saturday.
Pope Francis warned against indifference on April 29 while thanking Hungary for taking in Ukrainians despite the anti-refugee policies of nationalist Prime Minister Viktor Orban.
Russia has put out a massive fire caused by a drone attack at a fuel storage depot in Sevastopol, the main port in the occupied Ukrainian region of Crimea and the home of Moscow's Black Sea Fleet, the region's Kremlin-installed governor said on April 29.
The Ukrainian Foreign Ministry said on April 29 that it had condemned the restrictions on Ukrainian grain imports into European Union countries as "categorically unacceptable" in diplomatic notes handed to Polish and EU representatives in Ukraine.
Polish authorities seized a building used for the Russian embassy’s school in Warsaw. The school’s employees were required to leave the building before the evening of April 29, RIA Novosti reports.
Gunfire and heavy artillery fire persisted Saturday in parts of Sudan’s capital Khartoum, residents said, despite the extension of a cease-fire between the country’s two top generals, whose battle for power has killed hundreds and sent thousands fleeing for their lives.
Prune Missoffe, of the France-based International Prison Observatory rights monitor, said the situation was "only getting worse, month by month".
While America seems to have largely forgotten the threat of radical Islamism, jihadism, according to Dutch intelligence agency AIVD, remains the greatest security threat for Europe. That threat exists not only in the form of terrorist violence, but in the effect of online propaganda, Salafist-run schools, intimidation on social media, and ongoing efforts at polarizing European society as Salafist groups and charismatic activists urge fellow Muslims to reject Western democratic mores.
Now a report by Dutch newspaper Telegraaf has Parliament asking questions: what, some members want to know, can security agencies do to prevent that kind influence and the threats against moderate Muslims (and non-Muslims) by extremists, both in person and online?
The disturbing answer: not much.
A high-ranking medical source told CNN that the lab, which contains samples of diseases and other biological material, had been taken over by RSF forces. The WHO did not appoint blame for the lab seizure but said medical technicians no longer had access to the facility.
And how is the new “interagency task force with senior government officials” going to “tackle” “Islamophobia”? No doubt we will now be inundated with taxpayer-funded material about how wonderful Islam is. In the nature of things, however, there will still be human disputes, and some of them will involve Muslims. Now that “Islamophobia” has been established as targeted by the government, these disputes will all be ascribed to “Islamophobia” and offered as evidence of how urgently needed this “interagency task force” really is. The “Islamophobia” task force will therefore likely enjoy ever-increasing budgets. That’s how government agencies work: they have to justify their existence, so they keep having to find more and more of the thing they’re supposed to be stamping out.
Robert Ham’s new film, Interpreters Wanted, sheds light on one of the most dangerous and underappreciated positions in the wars on terror.
In Yeysk, a town in Russia’s Krasnodar region, local children participated in a “kindergarten military parade.” According to Yeysk’s regional governor, Roman Bublik, the event was called “We are the great-grandchildren of the great victors.”
A fuel depot caught fire in Sevastopol on the night of April 28 - 29. The governor of the annexed city, Mikhail Razvozhayev, said that the fire was caused by a drone strike.
Why not publish the far more numerous instances of harmony between Israeli Muslims and Jews? It would be a more accurate and realistic story of life in Israel. But the paper and its editors would rather sow division because that’s what sells, and that is seemingly all they care about.
Last year, the company only disclosed how much greenhouse gas pollution it generated from its direct operations and from customers charging their EVs. Altogether that was roughly equivalent to 2.5 million metric tons of carbon dioxide. But that missed the big picture since supply chain pollution — considered indirect emissions — often make up a major chunk of a company’s carbon footprint.
This year, Tesla finally released data on its supply chain emissions for 2022, which is equivalent to roughly 30.7 million tons of carbon dioxide. That’s a huge change from what the company reported last year.
Economic summits in Washington, DC rarely provoke much interest on the streets of Khartoum or Karachi. The Spring Meetings of the IMF and the World Bank, held in the United States capital during April 10-16, were no exception.
Mainland Spain and Portugal have broken temperature records for April, officials said Friday, as both nations wilt in an unusually early heatwave that has raised the risk of wildfires.
Expressing solidarity with people in frontline communities where the fossil fuel industry has for decades polluted the air and water and exposed millions of people to public safety risks, nearly two dozen campaigners with Greenpeace Belgium on Saturday entered the liquefied natural gas terminal of energy infrastructure company Fluxys in Zeebrugge, to demand an end to European imports of LNG from the United States.
Buildings currently consume about 50% of the world’s electricity, so finding ways to reduce the loads they place on the grid can save money and reduce carbon emissions. Scientists at the University of Toronto have developed an “optofluidic” system for tuning light coming into a building.
Tidal power turbines operating on the Bay of Fundy in Nova Scotia were suspended after the company running them was unable to get a permit to continue testing.
Working through this book – and its two sequels, which travel back in time to the 1980s and Marty's first encounters with VisiCalc and Lotus 1-2-3 – I was struck by the similarities between spreadsheets and science fiction.
While many people use spreadsheets as an overgrown calculator, adding up long columns of numbers, the rise and rise of spreadsheets comes from their use in modeling. Using a spreadsheet, a complex process can be expressed as a series of mathematical operations: we put these inputs into the factory and we get these finished goods. Once the model is built, we can easily test out contrafactuals: what if I add a third shift? What if I bargain harder for discounts on a key component? If I give my workers a productivity-increasing raise, will the profits make up for the costs?
JPMorgan, PNC and Bank of America are said to be interested in acquiring the troubled lender after it is seized by the Federal Deposit Insurance Corporation.
The€ World Bank says nearly 80% (560 million) of the 700 million people who were pushed into extreme poverty in 2020 due to COVID policies were from India. Globally, extreme poverty levels increased by 9.3 per cent in 2020. In 2022, it was estimated that a quarter of a billion people across the world …
JPMorgan, and PNC Financial Services are among the large U.S. banks preparing a bid for embattled First Republic Bank, in a process the FDIC hopes to finalize over the weekend, according to sources familiar with the matter.
Once the hottest new social platform to emerge, Clubhouse is now ‘resetting’ with a 50% employee reduction, less than a year after its last round of job cuts. The once-booming social audio platform Clubhouse has laid off more than half of its remaining staff...
Federal regulators are scrambling to find a buyer for First Republic Bank as the banking company's stocks continue to tumble, according to sources.
Fitch on Friday cut France's sovereign credit rating by one notch to 'AA-', citing a potential political deadlock and social movements that are posing risks to President Emmanuel Macron's reform agenda.
A global credit ratings agency downgraded French debt worthiness a notch on Saturday, citing pension reform protests as a cause. Two weeks after the contested pension reform passed, persistent social movements threaten to erase the financial gains that the French government expected.
While we’ve been busily distracted on the big issues like cost of living, AUKUS, the Voice, access to doctors and a broken gas market, Prime Minister Anthony Albanese has been quietly wrapping a highly controversial topic in a Cabinet secrecy blanket. Rex Patrick looks at politicised government advertising and raises concerns about the new Government Communications Sub-Committee of Cabinet.
Most people take issue with political donations; not the small donations that allow a person to support their political party, but the large donations that are made to grant access to politicians and to influence them. Big political donations distort democracy.
>Ahead of the federal budget the Albanese government is being urged to mandate superannuation payments in line with workers’ wages to prevent widespread super theft. According to an analysis conducted by Industry Super Australia (ISA), unpaid and underpaid superannuation has cost workers more than $33 billion over the past seven years.
Mortgage holders will be crossing their fingers this week for another month of interest rate relief. The Reserve Bank board is due to meet on Tuesday for what’s shaping up to be another€ close call between another 25 basis point hike or a second month of staying on the sidelines.
Friends and family members looking to buy their first home together will be among many more Australians set to benefit from an expansion of three government housing schemes. The first home guarantee and its regional and family home equivalents will have their criteria expanded from July 1, to help more Australians achieve home ownership.
Following a€ review by the Australian Government Thursday into Australia’s migration laws, Minister for Home Affairs Claire O’Neill declared the nation’s migration system as “broken.” This arises from Australia’s uncapped restrictions on temporary visa-holders, thereby doubling migrant numbers in the absence of a clear pathway for them to obtain permanent residency.
Determined to pack more homeless people into Toronto’s overcrowded shelters, officials have come up with a solution: reduce the number of inches between beds.
President Yoon Suk Yeol’s foreign policy, aligning his country more closely with Washington and Tokyo, has polarized his country. And critics say he has won little to show for it.
My car insurance company has been offering Non-Binary drivers the ability to identify as such for about a couple of years now.
In interviews, Black voters, organizers and elected officials pointed to what some saw as unkept promises — raising questions about the enthusiasm of Democrats’ most loyal voters.
Nobody’s going to make a movie about reporters at home with their cursors.
Bosnia-Herzegovina's House of Representatives has appointed a new government in an urgent session held on April 28, a day after the high representative of the international community imposed changes to the country's constitution and the criminal laws.
Armenian Foreign Minister Ararat Mirzoyan will arrive on a working visit to Washington on April 30, Foreign Ministry spokeswoman Ani Badalian said.
The charges will keep Thach Setha in jail longer, preventing him from campaigning in July election.
Beyond refusing to invite the junta to its meetings, ASEAN has done little except let down the people of Myanmar.
As the latest polling showed a majority of Americans believe U.S. Supreme Court Justice Clarence Thomas should step down from his lifetime appointment, government watchdog Accountable.US deployed several trucks to Capitol Hill Saturday to display mobile billboards plastered with Thomas' and other right-wing justices' images and recent headlines regarding allegations of ethics violations.
The new form was developed in collaboration with the White House and is based on practices established in the National Institute of Standards and Technology’s Secure Software Development Framework.
Software providers working with federal government agencies will in short order have to begin signing the letters of attestation and submitting them to the General Services Administration. In a procurement memo in January, that agency said it would start collecting the documents in mid-June.
It’s been exactly six months since Elon Musk took over Twitter, promising a new era of free speech and independence from political bias. But Twitter’s self-reported data shows that, under Musk, the company has complied with hundreds more government orders for censorship or surveillance — especially in countries such as Turkey and India.
“The White Coat” is the first documentary to examine the life of Soviet dissident and activist Valeriya Novodvorskaya. With the permission of Berlin film studio Narra and the independent journalist cooperative Bereg, Meduza has made the full film available on YouTube.
“Small and medium businesses, local school districts, water utilities, local hospitals, are not going to be successful in managing cybersecurity risk alone if they ever get in the crosshairs of a ransomware gang or an APT actor,” said Eric Goldstein on Wednesday during the annual RSA Conference here that brings together government officials and industry executive. “Those who can bear the burden are held accountable for providing services that are safe and secure by design by default.”
Jack Cable, a senior technical adviser at CISA, told CyberScoop that CISA held two listening sessions recently with industry partners as well as one with the open-source community. He said the agency plans to build on secure by design principles recently outlined in a white paper the agency published. “This is the first chapter of the story here and we want to work closely with industry and governmental partners with this.”
“Insecure technology products can pose risks to individual users and our national security,” said NSA Cybersecurity Director Rob Joyce in a statement. “If manufacturers consistently prioritize security during design and development, we can reduce the number of malicious cyber intrusions we see. The international coalition partnering on this report speaks to the importance of this issue.”
A conversation with Agnieszka Legucka, an analyst with the Polish Institute of International Affairs. Interviewer: Maciej Makulski
MACIEJ MAKULSKI: I would like to start by asking you to paint a general picture of where we are regarding this information war and the counter-measures used to address this problem. We decided to go back into history a little and mark Russia’s war against Ukraine as a kind of breakthrough point, although we know that all kinds of lines are a bit artificial. But it was actually interesting for me to think about how before that we were rather discussing the problem of post-truth, which was a buzzword at that time, and after February 22nd 2022 I have an impression that a whole industry fighting disinformation has developed even more; that we are in a different place because the answer to the threats is more systemic, coherent and consistent. So, what I would like to ask you first is how you would characterise the position we are in right now and what major trends are worthy of discussion?
As the last students stepped out of Hong Kong’s university entry test venues after sitting the Liberal Studies exam on Thursday, the moment marked the end of the subject’s short-lived yet controversial history.
A Russian court has fined a 65-year-old grandmother from Siberia 1 million rubles ($12,400), the equivalent of about four years of pension payments, for posting on social media the eyewitness accounts of her Ukrainian friends in the days following Russia's invasion.
A Russian court has fined a 65-year-old grandmother from Siberia 1 million rubles ($12,400), the equivalent of about four years of pension payments, for making an anti-war post on social media in the days following Russia's invasion of Ukraine.
Elon Musk-owned social media platform Twitter blocked and later restored the main handles of domestic media agencies ANI and NDTV claiming that owner of both the accounts was less than 13 years of age and therefore could now be allowed to be on the platform.
A quick search for both handles showed a notification of the accounts not existing on Twitter. It was not immediately clear as to why these accounts were suspended. As per the platform’s policies, account holders must be at least 13 years old to create and operate a handle on Twitter.
Oxford had for years been celebrating Saint George’s Day. Once the pandemic arrived in 2020, however, the day was (“temporarily”) suspended; and now, following that “reset,” Islam has taken its place.
This move, incidentally, is meant to appease Islam in more ways than one. Although the patron saint of England for some seven centuries, Saint George has increasingly been a cause of concern because he “offends” Muslims. For example, according to a 2013 report,
They had both been asked to clean a store room. During the cleaning they gathered all the rubbish (Paper etc) and later burnt them.
Since they are both illiterate therefore they didn't know what kind of paper they were burning, and there were some Qurans page in that rubbish.
After taking a statement from the witnesses, the police have registered a case under section 295- B of blasphemy law against Musarrat Bibi and Mohammad Sarmad and taken them into custody at Police Station Sadar Arifwala Park Pandan [Punjab].
Momeni, a former student leader who was previously jailed, made the comments during a virtual event on the popular app Clubhouse during which dozens of rights campaigners, political prisoners, and academics called for a transition to a new, democratic political system in Iran.
Days later, on April 27, police arrested Momeni at his home in Tehran and confiscated his electronic devices.
More houses were raided this morning in various cities, as a result of an Ankara-based investigation. Dicle Fñrat Journalists Association (DFG) co-chair Dicle Müftüoßlu, Mesopotamia Agency (MA) Editor Sedat Yñlmaz and his wife Selma Yñlmaz were taken into custody in Amed. Many people, including Filiz Yñlmaz, journalist Sedat Yñlmaz' sister, were taken into custody in Istanbul.
Investigators in Massachusetts are turning to the public to help them identify a newborn baby girl whose remains were found earlier this week at a regional recycling facility
A former teacher at a Louisiana school has been arrested after a video surfaced that appears to show him saying sexually suggestive things to someone he says he tutors
In Mexico and globally, adults have collectively failed to ensure a great many of kids' basic rights, especially for the poor and vulnerable.
Mexico's Senate has approved a wide-ranging reform of laws governing the mining industry, including a requirement that companies pay 5% of profits to local communities
A group of Afghan women on April 29 staged a spontaneous march in the Afghan capital, Kabul, in defiance of Taliban security forces to urge the international community not to recognize the militant group that returned to power in Afghanistan in August 2021.
Afghan women Saturday marched in Afghanistan’s capital Kabul to urge the UN not to formally recognize the Taliban government at a UN summit scheduled for next week. Approximately two dozen women took to the streets despite the Taliban government’s increasingly strict crackdowns on women.
A group of Afghan women on April 29 staged a spontaneous march in the Afghan capital, Kabul, in defiance of Taliban security forces to urge the international community not to recognize the militant group that returned to power in Afghanistan in August 2021.
In their attempts to push back, the writers have what a lot of other white-collar workers don’t: a labor union.
Mr. Schur, who serves on the bargaining committee of the Writers Guild of America as it seeks to avert a strike before its contract expires on Monday, said the union hopes to “draw a line in the sand right now and say, ‘Writers are human beings.’”
The government says as many as 12 per cent of Canadians don't file their taxes every year, most of whom are low-income Canadians. It's estimated that non-filers missed out on more than $1.7 billion worth of government rebates and programs they were entitled to in the 2015 tax year alone.
To fix that, Ottawa is beefing up an existing program called File My Return that allows Canadians to file their tax returns by answering a series of simple questions over the telephone. The goal is to triple the uptake on that program to 2 million people annually.
Iranian state media on Tuesday stated that police in the capital charged Katayoun Riahi and Pantea Bahram with "the crime of removing their hijab in public and publishing its images in the virtual space".
The actresses could face fines or prison terms if found guilty.
The Faisal Mosque incident followed another such incident in which several foreign women faced harassment at Shakarparian on Pakistan Independence Day.
On a freezing cold day, February 15th, 2003, Harry Belafonte, the legendary singer, actor, and activist strode onto a stage outside the United Nations in New York City. Rallies against the imminent U.S. invasion of Iraq were taking place around the globe that day, in what is believed to be the largest mass protest in human history. Belafonte then did what he had been doing for over half a century–he spoke truth to power:
On May 15, 2023, the Palestinian Nakba will be 75 years old.
The failure of bills curbing abortion rights in two deeply conservative US states this week underscored the growing disquiet felt by Republicans over the threat the issue poses to their political ambitions.
A pro-Beijing figure has urged Hong Kong to cut the ratio of seats democratically elected by the public at District Councils to 22 per cent, in order to protect future elections from “Western forces or Taiwan independence advocates.”
By Matthew Walsh Once jailed for murder, Cao Yongsheng now makes a living caring for the dead, benefitting from a bold rehabilitation scheme that’s giving some of China’s most serious criminals a second life as funeral workers.
The feature, to be rolled out in May, will enable users who do not "sign up for a monthly subscription to pay a higher per article price for when they want to read an occasional article," billionaire owner Musk tweeted.
On Friday, Musk had said that Twitter will take a 10% cut on content subscriptions after the first year, noting that the company will not take a cut for the first 12 months. These subscriptions include long-form text and hours-long video.
Some British residents said they received misleading emails suggesting they had secured free tickets to the concert for the coronation of King Charles III at Windsor Castle.
Universities and colleges tend to have strict anti-piracy policies for students. In the United States, this is very much a necessity since its required by law. While most students play by the rules, a worrying trend is developing where outsiders exploit university websites to promote piracy scams.
My family - the one I was born into and grew up with - are all idiots. Zero capacity for nuance. Everything you say to them must pertain to obvious physical realities literally directly in front of them or there will be a whole lotta duh going on, generally leading to dramatic displays of judgement indistinguishable from what we call "canceling" these days. Anyone half a braincell smarter than them is a threat to be both kept at a distance, and watched very carefully.
Golden Week started yesterday, the 29th of April. This whole week until Sunday, May 7th, most of the country is on vacation.
I sit here with my little USB fan going. It was cloudy and muggy and stuffy and a little rainy today. Monday and Tuesday I had the heat on it was so cold. Later in the week I got sunburned on a day with not a cloud in the sky.
Along with getting settled in Manjaro, this week I installed Garuda Linux. KDE Plasma in Garuda is simply stunning. The last time I was so taken aback by an OS was Mac OS X 10.1 in 2001, but MacOS now looks almost flat and boring in comparison.
Anyways there was a very green frog (Pseudacris regilla, probably) perched on a bag of bark, maybe because the area was in the shade and somewhat moist, being on the north side of the building. The other garden path here is "a grammatically correct sentence that starts in such a way that a reader's most likely interpretation will be incorrect" insofar as this is possible in lojban. Here a line break is used to trick the reader; we start off with "a green tree" but the next line gives a bo which joins the tree tighter to pipybanfi, so it's a (green (tree frog)) once you get to the second line, not the default ((green tree) frog) without the bo. Garden path sentences are really better done in not lojban, where you can usually play around with homonyms, verb nouns, or who knows what else to really cause the reader to stop and have to rethink the sentence.
I very much agree with this sentiment. I like pico-8 in a lot of ways though, actually _because_ it's a very self-contained and quite simple system, but I've often thought it would have been a lot more fun if we'd just get to program in some sort of fantasy assembly. I would have loved to see an instruction set and architecture on such a machine that's very different from what we're used to on the likes of x86 and arm. That would have been so much fun.
It's been awhile since I used the eeepc 701. It still does OK. Running antix v19.2 x86. It hasn't been updated in awhile, but I will probably do that when I connect to the network. I forgot that I don't like the keyboard on this device. It's cramped and I keep hitting the wrong keys. Also, not much light here. I've been spoiled by illuminated keyboards.
The speaker repurposing from my last post was a success! I ended up crimping a mix of terminal and Posi-lock connectors to some speaker wires so I wouldn't have to solder anything. Yeah, I'm lazy and I could use the practice. Another time.
Too much of what we do in our industries is improving on products that have long passed a threshold of dimminishing returns.
So after a few days of trial and error I have finally arrived in GeminiSpace, if that is a word for our location. I am still in the process of figuring everything out and getting my pod put together so I can not say that I am totally here but I am really close.
"So after a few days of trial and error I have finally arrived in GeminiSpace, if that is a word for our location. I am still in the process of figuring everything out and getting my pod put together so I can not say that I am totally here but I am really close." gemini://jimmorgan.smol.pub/almost-here
For fun, I am tracking the uptime of various personal machines (servers, laptops, workstations...). I have been doing this for over ten years now, so I have a lot of statistics collected.
As a result of this, I am introducing `guprecords.raku`, a handy Raku script that helps me combine uptime statistics from multiple servers into one comprehensive report. In this blog post, I'll explore what Guprecords is and some examples of its application. I will also add some notes on Raku.
Ending up at a big tech company and spending many years in Java land, I gravitated towards modern graphical IDEs. At the time Eclipse was dominant; it was also, for the size of codebases we were using and the speed of computers at the time, incredibly slow. I logged hundreds of milliseconds to respond to a keypress.
You can quickly identify the nature of a link with a few lines of CSS. According to the protocol (http, gopher, mailto...), or if the link is an inner link, a tiny icon will be displayed next to it...
A while back the Rust project switched from recommending the Rust Language Server (rls) to officially supporting it's replacement, rust-analyzer for use in IDE's and editors. There were solid technical reasons for the change, but the rollout was not without some growing pains.
One issue with using an lsp server in the context of Rust is that it is common for people to have multiple versions of the Rust toolchain on their system. Most people who use Rust in anger have at least a stable toolchain and a nightly, while some projects (such as the Linux kernel) requiring a specific stable compiler version. It's not a problem due to the language changing that fast (although a few years ago it would have been). The issue is that in order to support procedural macros rust-analyzer must be built from the same source as the compiler in use. That means that one would need a version of the program for each toolchain, and a way to switch between them.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.