Bonum Certa Men Certa

Links 20/08/2023: Ethernet Switch Based on Milk-V (Based on Free Chip Design)



  • GNU/Linux

    • HackadayLinux, Running On Not A Lot

      There are many possible answers to the question of what the lowest-powered hardware on which Linux could run might be, but it’s usually a pre-requisite for a Linux-capable platform to have a memory management unit, or MMU. That’s not the whole story though, because there are microcontroller-focused variants of the kernel which don’t require an MMU, including one for the Xtensa cores found on many Espressif chips. It’s this that [Naveen] is using to produce a computer which may not be the Linux computer with the lowest processor power, but could be the one consuming the least electrical power.

      The result is definitely not a Linux powerhouse, but with its Arduino-sourced ESP32 board stacked on an UNO and I2C keyboard and display, it’s an extremely lightweight device. The question remains, though, is it more than a curiosity, and to what can it do? The chief advantage it has over its competitors such as the Raspberry Pi Zero comes in low power consumption, but can its cut-down Linux offer as much as a full-fat version? We are guessing that some commenters below will know the answer.

    • Desktop/Laptop

      • Windows CentralEven Linux users can get a Microsoft Surface-alike now | Windows Central

        The design, and most likely also the construction, doesn't quite hit Surface levels, but from the early images it doesn't look bad at all. The display is a 2880 x 1920 resolution panel, which itself is amazing for something this affordable. It also promises 16GB of RAM, and storage is available from 512GB up to 2TB.

    • Applications

      • Make Use OfThe 6 Best Spelling and Grammar Checkers for Linux

        Grammarly is everyone's go-to tool for vocabulary and grammar correction. Unfortunately, Grammarly’s desktop app does not work on Linux, which is one of the primary reasons Linux users look for Grammarly alternatives.

        There are a few Linux native apps, which work seamlessly as alternatives, and most of all, they get the work done in the easiest ways. If you are looking for a grammar app to run on your Linux PC, then it’s time for you to consider a few of these Linux-friendly grammar applications.

    • Instructionals/Technical

      • VermadenQuick DBUS Fix

        Recently I again started to have some DBUS issues. Like GIMP opening a new instance everytime instead of just opening next file as a tab. After some investigation it seems that because DBUS got broken – example output from terminal for Caja file manager from Mate.

      • Terence EdenLet's build a website using XML!

        It is 2023. XHTML is dead and buried. HTML is a "living standard" with billions of users. So what kind of idiot would want to build a website using XML?

        Me. I am that idiot.

      • Software Is CrapEscape from System D, episode VIII: the Road Behind is Longer

        Ok, well. This has certainly been a long time coming. According to my records (in the form of blog posts mainly) I first announced Dinit to the wider world in June 2017. By that time I'd been working on it for around 2 years already - as a hobby, on-and-off. Development has continued, at what sometimes feels like a glacial pace, since then: I simply don't have as much time that I'd like to be able to devote to it (nor the funds to be able to put aside bread-winning concerns in order to make that time).

        That initial announcement was met with some encouragement, and some derision. I had set lofty goals, and there were plenty who were happy to fire snide remarks, criticise my level of experience (even if they knew nothing about me), attack my choice of programming language, accuse me of hubris, etc. But the encouragement was enough to offset it! I'll be ever grateful who simply said "good luck!" and told me to ignore the trolls. Some of them also offered great advice.

        However, I won't talk about the history further; I've covered it in other blog posts. What's more important is what has been happening more recently.

      • Adriaan RoselliStyling Links and Buttons

        I made a tutorial for styling links and buttons, something which many developers have struggled with (resulting in links used as buttons and buttons used as links). I have embedded it on this page, but if you are coming in with your RSS reader you can visit the tutorial directly and walk through it there.

      • Chris HannahBlog Update

        As you may have known, my blog has been powered by Ghost for a few years. It’s definitely served me well. However, a while ago I started to like the idea of static sites. Seeing as my blog is essentially a list of static posts, it felt a bit weird that the pages were being served dynamically. So, I started on the journey of moving to Hugo.

      • ansible-core >= 2.15.3-1 update may require manual intervention

        As of ansible-core 2.15.3, upstream moved documentation and examples to a separate dedicated repository (see the related changelogs). This means that, starting from version 2.15.3 the ansible-core package will stop shipping documentation and a default configuration example under /etc/ansible/ansible.cfg.

      • Linux HandbookGet Script Directory Location in Bash

        In a situation where your bash script needs to get the directory location where it is located?

      • TecMint2 Useful Tools to Count Lines of Source Code in Programming Languages

        In the realm of software development, managing and understanding codebase metrics is crucial for maintaining code quality, optimizing performance, and ensuring efficient collaboration among development teams.

        Tools that assist in analyzing and quantifying code statistics play a pivotal role in this process. Two prominent tools that have gained traction for their simplicity and effectiveness are “SLOC, CLOC, and Code” or simply “scc” and “CLOC” (Count Lines of Code).Table of ContentsToggleWhat is scc?What is Cloc?Install Sloc Cloc and Code (scc) in LinuxInstall Cloc on LinuxCount Lines of Code in FileOther Code CountersConclusion

      • LinuxTechiHow to Install Ansible on Ubuntu 22.04 Step-by-Step
      • OSNoteHandle Gmail with Roundcube Webmail User Agent

        In this tutorial we will describe how to install and configure the latest version of the Roundcube Webmail User Agent in Debian to manage emails from one of the most popular email services, Google Gmail.

      • RoseHostingHow to Install SuiteCRM on Ubuntu 22.04

        Suite CRM is an open-source Customer Relationship Management system written in PHP. Suite CRM is an extended version of SugarCRM and was developed when SugarCRM stopped its open-sourced version.

        Now, Suite CRM as a system offers a variety of new modules such as Products, Quotes, Teams Security, Responsive Theme, and many more.

        In this tutorial, we are going to explain in step-by-step detail how to install SuiteCRM with LAMP stack on Ubuntu 22.04 OS. Let’s get started!

      • Make Use OfThe 5 Best Linux Tools for Directory Bursting

        In the reconnaissance stage of every web application pentest, it is essential to find possible directories on the application. These directories might hold significant information and findings that would help you greatly to find vulnerabilities in the application and improve its security.

        Luckily, there are tools on the internet that make directory brute-forcing easier, automated, and faster. Here are five directory-bursting tools on Linux to enumerate hidden directories on a web application.

      • Electronics WeeklyTribulations on the road to running UGS under Mint Linux

        Last weekend, I spent many hours banging my head against software, trying to get Universal G-code sender to run with Mint Linux.

      • How to Delete Files and Directories in Linux

        Deleting files and directories is an essential skill you must have as a Linux user. While it’s not hard, you can get more out of the needed Linux commands once you learn how to use them properly.

        In this tutorial, we’ll show you the different ways you can delete files and directories in Linux.

        Let’s get started!

    • Games

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Nzyme.orgDevelopment Update 002

      We are back from Las Vegas and had a great time at BSides as well as at DEF CON. Teams on site ran the latest nzyme alpha release to monitor the local WiFi environment. Things worked even better than expected and we took a ton of experience and new ideas home.

    • Programming/Development

      • Dan CowellBreaking the rules: I threw away 10 months of work after 2 months on the job.

        Our JavaScript bundle size was 168mb on a good day. The development environment took 3 minutes to become responsive on a top-of-the-line MacBook Pro. Engineers would regularly come in to work, type npm run dev and go for a coffee while their machine's fans tried and failed to keep up with the demands placed on them by our bloated project.

        Where did it go so wrong?

      • Daniel LemireTranscoding Latin 1 strings to UTF-8 strings at 12 GB/s using AVX-512

        Though most strings online today follow the Unicode standard (e.g., using UTF-8), the Latin 1 standard is still in widespread inside some systems (such as browsers). It captures the first 256 characters from the Unicode standard and represents them as a single byte per character.

        In a previous blog post, we examined how we could convert UTF-8 strings to Latin 1. I want to examine the reverse problem, the transcoding of Latin 1 strings to UTF-8. We receive a byte array, and each byte is one character. There is no need for any validation. However, some characters (the ASCII characters) are mapped to one byte whereas all others should be mapped to two bytes.

      • MaskRayMy involvement with LLVM 17

        LLVM 17 will soon be relased. This post provides a summary of my contributions in this release cycle to record my learning progress.

  • Leftovers

    • Daniel MiesslerWhat I'm Doing and How It's Going

      I’ve needed to write this for a long time, for multiple reasons.

      1. Lots of people have been asking what the hell I’m doing. Like do I work somewhere? What do I actually do all day?

      2. Tons of my friends are either miserable at work or are getting laid off

      3. I believe that the time for being identified by—and tied to—corporate jobs is passing, and it’s time to transition to what comes next

      I want to cover each of those and then talk about what we can do about it.

    • [Repeat] TediumMagalogs & Mailboxes

      Today in Tedium: We live in a world where the lines between marketing and journalism are constantly blurred. Sometimes content drives marketing; sometimes marketing drives content. Trying to find an objective middle? Now that’s hard. But there was once a time when the objective middle was much more obvious, where you knew what you were getting. So, where did the lines begin to blur? One could point to the infomercials of the ’90s or native advertising of the 2010s, but the point where things got really interesting might have come in the form of a trend that explicitly merged art and commerce in a way that ensured we’d never again be able to tear them apart. Today’s Tedium discusses the “magalog,” an unholy merger of content and sales that once dominated the marketing world. — Ernie @ Tedium

    • Education

      • uni MichiganAcademic Innovation aids 13 projects that use educational technology

        The Center for Academic Innovation is providing funds and in-kind support and expertise to 13 new projects to help implement educational technology that enhances learning.

      • Thorsten BallIs looking cool underrated in education?

        A couple weeks ago, on social media, a dad was talking about the best materials to teach his kid how to program. It’s a very interesting thread and I recommend reading it. What stood out to me: most of the learning materials just don’t look cool.

        Let me be clear. I do NOT mean that they don’t look good, or that they don’t look like great learning resources, or that they aren’t valuable and a lot of work went into them. I mean exactly what I wrote: they don’t look cool.

      • Jacobin MagazineUS Colleges and Universities Are Becoming Giant Exploitation Machines

        Since the 1970s, many colleges and universities have become predatory financial giants, while mountains of student debt pile up and academic work becomes ever more precarious. An ascendant academic labor movement may be key to reversing these trends.

      • [Repeat] Arun RaghavanTo Conference Organisers Everywhere…

        But if you’re in my position, you need at least 2-3 months between the first and the last step. If your attendance is conditional on speaking at the conference (for example, if your company will only sponsor you if you’re speaking), then you need a minimum of 2-3 months between when speakers are notified and the conference starts.

        From what I see, this is not something that is top-of-mind for conference organisers. That may happen for a host of perfectly understandable reasons, but it also has a cost to the community and individuals who might want to participate.

      • AxiosAmerica’s empty classrooms

        School districts across the country are staring down another year with dire teacher shortages.

        The big picture: The teaching profession faces an existential crisis. Turnover rates are high, and not enough young people want to become teachers.

    • Hardware

      • Tom's HardwareRussian Baikal Electronics Set to Take on Nvidia with AI ASICs

        After failing to develop competitive CPUs, Baikal kicks off development of AI ASICs.

      • Matt RickardThe Truth About GPU Utilization

        The truth is that GPU, CPU, RAM, and every other compute resource is probably at less than 50% utilization in any organization. There are plenty of exceptions — training jobs, for example — but this is the norm.

      • Tom's HardwareRaspberry Pi KVM Powers On 16 Mac Minis with 8 Servos

        The Pi is connected to 8 individual servo motors that are responsible for activating the power switch on two Mac Minis a piece. The Raspberry Pi is fitted with a PiKVM HAT so it does more than just power on the Mac Minis. This also meant that developing a custom case was necessary to support the additional hardware.

    • Health/Nutrition/Agriculture

      • Computers Are Bad2023-08-19 meanwhile elsewhere

        I had meant to write something today, but I'm just getting over a case of the COVID and had a hard time getting to it.

      • The Kent StaterStaying safe on and off campus this new semester

        Before COVID-19, Kent State was ranked as the safest campus in Ohio – and the 25th safest college in the nation – according to Sgt. Tricia Knoles from the university’s police department.

      • US News And World ReportThe #1 Enemy of Good Sleep for School Kids: Screens

        Video games and social media are keeping school kids up at night, according to a new survey from the American Academy of Sleep Medicine (AASM).

        But so, too, are more constructive pursuits, including homework and extracurricular activities, which can be a problem when it comes to setting a good sleep routine early in the school year.

    • Proprietary/Artificial Intelligence (AI)

      • India TimesGoogle will delete accounts that remain inactive for two years starting December 1

        This change starts rolling out now, and will apply to any Google Account that's been inactive, "meaning it has not been signed into or used within a two-year period".

        An inactive account and any content in it will be eligible for deletion from December 1, 2023, the tech giant said.

      • The Register UKNeed a decent dining spot in Ottawa? Microsoft suggested a food bank

        Microsoft declined to elaborate further on what type of "algorithmic techniques" it employed to produce the piece and others like it.

        Unsurprisingly, folks at the Ottawa Food Bank weren't too pleased.

      • The VergeMicrosoft says listing the Ottawa Food Bank as a tourist destination wasn’t the result of ‘unsupervised AI’

        “Needless to say, this is not the type of messaging or ‘story’ we would ever put out or wish to be included in,” Samantha Koziara, communications manager at the Ottawa Food Bank, said in a statement to The Verge on Thursday. “The ‘empty stomach’ line is clearly insensitive and didn’t pass by a (human) editor. To my knowledge, we haven’t seen something like this before — but as AI gets more and more popular, I don’t doubt an increased number inaccurate / inappropriate references will be made in listicles such as this. This simply highlights the importance of researchers, writers, and editors… of the human variety.”

      • VoxSan Francisco’s robotaxi experiment is getting out of hand

        On August 10, the California Public Utilities Commission handed Cruise and Waymo a victory by allowing them to operate across San Francisco at all hours and charge fares. During a six-and-a-half-hour hearing, hundreds of residents testified for and against the robotaxis. Supporters claimed they were safer and more reliable than human-driven vehicles, and disabled people said they were more accessible, especially for service animals. Opponents, including transit and fire officials, argued that the taxis had repeatedly gotten in the way of emergency responders and had become a nuisance.

      • Windows TCO

        • The Register UKFYI: There's another BlackCat ransomware variant on the prowl

          The BlackCat malware works on Windows and Linux, and is rented out to criminals, who break into targets and run the data-stealing malware, making it a ransomware-as-a-service operation. Under this business model, the affiliates pay to use the malware developed by operators in their attacks, and then the affiliates earn a cut of the proceeds if the victims pay the ransoms.

    • Security

      • IT Pro TodayLinux Malware: What To Know About the Malware Threat [Ed: Projecting Windows issues onto "Linux"]

        Linux is often praised for its enhanced security compared to other operating systems. Nevertheless, IT professionals must never assume that Linux is immune to threats.

        Due to widespread adoption in critical infrastructure, Linux has drawn the attention of advanced persistent threat (APT) groups aiming to breach its security. Additionally, Linux finds use in various IoT devices. One of the largest cyberattacks in history involved the “Mirai” malware, which exploited vulnerabilities in devices running Linux.

      • Tesla notifies employees of data breach

        Tesla has started notifying current and former employees who were affected by a data breach that occurred in May. The company conducted an investigation and found that two former employees had misappropriated confidential information in violation of Tesla’s IT security and data protection policies. As a result, Tesla has filed lawsuits against the former employees and has seized their electronic devices containing the stolen information.

        To prevent further use or dissemination of the data, Tesla has obtained court orders prohibiting the former employees from accessing or sharing the information, subject to criminal penalties. Additionally, Tesla discovered that the two former employees had shared the stolen data with a German newspaper, Handelsblatt. However, Handelsblatt assured Tesla that they will not publish the information and are legally prohibited from using it inappropriately.

      • Data BreachesSnatch Team starts really detailing their attacks and ups the ante for those who don’t pay up

        Snatch Team has recently been exploring some novel uses of Telegram. Unlike other groups that use Telegram mainly to list new leaks, Snatch is providing commentaries and analyses of their breaches and more educational materials for readers.

        Some of their commentaries on specific incidents can be fodder for any lawsuits against the companies or entities they breached because they point out security failures that plaintiffs’ lawyers will appreciate. And some of CyberSnatch’s comments seem designed to help insurers avoid having to reimburse clients, which is a somewhat novel approach.

      • Boston GlobeAfter cyber breach, Point32Health suffers financial losses



        A crippling cyber attack at the state’s second-largest insurer not only interrupted operations for months but also pummeled the insurer’s financials.

        For the six months ending in June, Point32Health reported a $102.7 million operating loss on $4.8 billion in revenue. Those results compare to a $25.8 million operating loss on $4.9 billion in revenue in the same period the previous year. The most recent earnings capture nearly the full timespan of the ransomware attack and cyber security breach that hamstrung operations at one of Point32′s insurers, Harvard Pilgrim Health Care, from mid-April through much of July.

      • Data BreachesTwo more attacks involving sensitive data: a plastic surgery center in Brazil and a psychiatric hospital in Lithuania

        This week, DataBreaches spotted a listing for data from a Brazilian plastic surgery practice. The seller, who calls himself “TheSnake,” claims to have 1.3 TB of files from RobertoPolizzo.com.

        [...]

        A sample of files was uploaded as proof of claims. DataBreaches notes that all the files appeared to be password-protected. DataBreaches sent an email inquiry to Dr. Polizzi yesterday about the claimed attack but received no reply.

      • PR NewswireMay 2023 Data Security Incident Public Notice

        Bunker Hill Community College (“BHCC”) confirmed today that the college experienced a data incident in May 2023 and will issue notices to affected individuals and relevant state and federal agencies about the incident.

        On May 23, 2023, BHCC detected irregular activity on certain BHCC systems that was consistent with a ransomware attack. BHCC immediately responded to the situation by taking the affected systems offline, engaging data security and privacy experts, contacting law enforcement, and simultaneously beginning an investigation. BHCC personnel were able to stop the unauthorized activity from spreading and contained the incident to a limited number of BHCC systems. BHCC’s backups were not affected by the incident, and BHCC personnel were able to restore BHCC’s network from those backups without any data loss. As a credit to the existing safeguards that BHCC had in place, BHCC personnel successfully and safely restored BHCC’s network, enabling BHCC to continue with its academic calendar without any delay.

        Due to the complexity of the unauthorized activity, BHCC’s investigation is still ongoing; however, out of an abundance of caution, BHCC is providing this notice. Based on the information BHCC generally collects and maintains for students, applicants, and personnel, data including names, addresses, dates of birth, social security numbers, education records, and other personal information may potentially be involved. However, BHCC’s investigation is ongoing and specific details as to what categories of information were involved are not yet available. Note that this describes general categories of information collected and maintained by BHCC, and it likely includes categories that are not relevant to each individual. As soon as BHCC is able, individual notification letters will be mailed to affected individuals with further details. If you do not receive a letter, this indicates that your information was not involved in the incident.

      • Ars TechnicaReal estate markets scramble following cyberattack on listings provider

        Home buyers, sellers, real estate agents, and listing websites throughout the US have been stymied for five days by a cyberattack on a California company that provides a crucial online service used to track home listings.

        The attack, which commenced last Wednesday, hit Rapottoni, a software and services provider that supplies Multiple Listing Services to regional real estate groups nationwide. Better known as MLS, it provides instant access to data on which homes are coming to the market, purchase offers, and sales of listed homes. MLS has become essential for connecting buyers to sellers and to the agents and listing websites serving them.

      • PC MagHaggling With Hackers: Surprising Lessons From 50 Negotiations With Ransomware Gangs

        The prevailing wisdom from cybersecurity experts is that trying to negotiate with ransomware hackers is a bad idea, but on December 30, 2020, one victim broke the rules and gave it a shot.

        "Help?" they typed into one of the compromised computers.

        "Hello," one of the hackers replied. "Are you ready to negotiate? Your network and all of your data were encrypted by [the] CONTI team. Besides the encryption process, we've downloaded a large pack of your internal documents and files that will be published in case our negotiations fail. The recovery price is $8,500,000.”

      • Health Data and Investigations: Between a Rock and a Hard Place

        Demands for medical records can stem from a variety of investigations, which can involve a myriad of sources. The most recent example driving headlines is an investigation involving Vanderbilt University Medical Center (“VUMC”). VUMC disclosed records concerning treatment of transgender patients to the Tennessee Attorney General. According to the Attorney General, an investigation of alleged billing irregularities was launched. The investigation stemmed from allegations of improper coding practices that were purportedly revealed by a VUMC clinician on social media posts.

      • Privacy/Surveillance

        • uni MichiganNew policy outlines research data stewardship expectations

          The university has created a new policy, effective Jan. 1, 2024, setting expectations and guidance for research data stewardship, focusing on issues of ownership, sharing and retention.

        • Ruben SchadeDrive encryption is no panacea

          It’s another classic example of a no with an if, or yes with a but, followed by a discussion about their threat domain. Or in English, what is it you’re trying to protect, and from whom.

        • Silicon AngleDoing business in Europe? Time to focus on its new Digital Services Act – now

          The DSA makes modifications to a decades-old eCommerce Directive and tries to bring the laws of EU member nations into a coherent and unified approach, especially how online businesses handle illegally posted content, disinformation and online ads. “Businesses will use new simple and effective mechanisms for flagging illegal content and goods that infringe their rights, including intellectual property rights, or compete on an unfair level,” according to the EU directives issued last year.

          Part of these rules include new mechanisms to enforce “know your customer” methods. The EU has this fact sheet for businesses that’s worth studying for more specifics. “Tech platforms will have to respond to the DSA regulations,” says privacy specialist Tom Kemp. “I don’t see anything happening in the U.S., nor with any new federal privacy laws enacted.”

          One of the more notable circumstances is that the noncompliance penalties could result in substantial fines, with up to 6% of a company’s global annual revenue that could be levied.

    • Defence/Aggression

    • Environment

      • CoryDoctorowSoCal Gas spent millions on astroturf ops to fight climate rules

        The criminal scheme is spelled out in eye-watering detail in a superb investigative report by Joe Rubin and Ari Plachta for the Sacramento Bee, which names the law firms and individual lawyers involved in the scam.

        Here's the situation: SoCal Gas is California's private, regulated gas monopoly. They are allowed to lobby, but are legally required to charge their lobbying activities to their shareholders, and are prohibited from raising customer rates to pay for lobbying.

        The company spent years secretly violating this rule, in the sleaziest way possible: working with corporate cartels like the California Restaurant Association and BizFed, the monopoly paid BigLaw white-shoe firms to procure people who posed as concerned citizens in order to oppose climate regulations that are essential to the state's very survival.

      • India TimesWith TikTok and lawsuits, Gen Z takes on climate change

        Young people are helping organize a climate march in New York next month, during the United Nations General Assembly. And their force is being felt even in deep-red states such as Montana, where a judge Monday handed the movement its biggest victory to date, ruling in favor of 16 young people who had sued the state over its support for the fossil fuel industry. In that case, a lengthy fight resulted in a surprise victory that means the state must consider potential climate damage when approving energy projects.

      • Omicron LimitedNearly two-thirds of the top fossil fuel producers in Australia and the world aren't on track for 1.5€°C climate target

        More than 60% of the top 142 oil, gas and coal companies—including three of the five Australian companies assessed—were not on track. Rio Tinto and BHP were the two Australian companies found to be on track. Between 2014 and 2020, the fossil fuel sectors exceeded overall production budgets by 64% (oil), 63% (gas) and 70% (coal).

      • Energy/Transportation

        • Battle over green energy project

          The community of Victoria West has issued notice to stage a march on August 21 in an attempt to persuade Ubuntu Municipality to conclude a contract for the R100 billion Ubuntu Green Energy project.

        • H2 ViewUniversity of Wyoming receives $10m from DOE to head hydrogen production project

          The US Department of Energy (DOE) Office of Fossil Energy and Carbon Management announced that the project had been selected to negotiate an award of around $5m as part of the ‘Clean Hydrogen Production, Storage, Transport and Utilisation to Enable a Net Zero Carbon Economy’ funding opportunity with the cost share among partners bring the contract up to $10m.

          The university is partnered with Los Alamos National Laboratory; Engineering, Procurement and Construction LLC; and energy infrastructure company, Williams, all focusing on the project aiming to demonstrate hydrogen production via water produced during oil and gas extraction.

      • Wildlife/Nature

    • Finance

      • Gadgets NowByju's fired 100 employees following a performance review

        Byju's has laid off about 100 employees in a fresh round of job cuts. The ed-tech startup has fired employees from the mentoring and product expert divisions citing poor performance.

        As reported by TOI, the company said that the fired employees did not meet the expectations after a performance improvement plan, "As part of a periodical performance review, 100 individuals who did not meet expectations after a performance improvement plan were let go with proper procedures. This measure is firmly rooted in performance based considerations and is not in any way a cost-cutting endeavour," the company spokesperson told TOI.

      • 10,000 U.S.-based high-skilled foreign workers applied to come to Canada

        It took just two days for the Canadian program designed to attract H-1B workers residing in the United States to reach its 10,000 application cap. However, there are potential pitfalls that the program needs to overcome.

        In the United States, more than 600,000 people are employed through an H-1B visa in specialty occupation fields, making it the largest employment-based immigration program in the country.

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

      • CBCCanadian media trained audiences to use Facebook. With Meta blocking news, what's next?

        But after years of Canadians and news publishers relying on Facebook to connect them, observers are wondering how — and if — the issue can be resolved.

      • NPRSmall Kansas paper raided by police has a history of hard-hitting reporting

        And if the Record doesn't pay attention, nobody will. The weekly newspaper is the sole publication covering Marion, a city of about 2,000 in south-central Kansas.

        It's this type of reporting that's drawn the ire of local officials — including the city's police chief, whom the paper was investigating before he raided their newsroom.

        [...]

        The Record's role in the community has put a spotlight on the function of newspapers as local watchdogs. An informed public is at the heart of a strong democracy, but with the disappearance of local news organizations, many small towns have lost the ability to get information about local governance.

    • Civil Rights/Policing

      • ReasonFIRE Lawsuit Against California Community Colleges Over "Diversity, Equity, and Inclusion" Mandates

        From today's press release, by the Foundation for Individual Rights and Expression:, about€ Palsgaard v. Christian€ (E.D. Cal.): Today, the Foundation for Individual Rights and Expression filed a lawsuit on behalf of six California community college professors to halt new, systemwide regulations forcing professors to espouse and teach politicized conceptions of "diversity, equity, and inclusion."

      • teleSURSudan: Re-Arrest of Young Revolutionary

        The Permanent Commission for the Defense of Detainees and Public Freedoms: “the lack of respect for laws and regulations is what led to war, chaos, and the constitutional vacuum in the country.”

      • Court rules that severance pay should be paid to employee who was forced to resign

        S.Y., who resigned under pressure in Gaziantep, has won the lawsuit she filed to claim severance pay. The higher court, after hearing the witnesses, decided to grant severance pay despite the resignation letter being in 'handwriting'.

      • Digital Music NewsColdplay Faces Breach-of-Contract Lawsuit from Manager of 20+ Years

        British rock band Coldplay is being sued by their former manager of more than 20 years, Dave Holmes, over a breach-of-contract dispute, according to legal documents filed in the UK.

      • JURISTUS appeals court partially revives lawsuit claiming viewpoint discrimination against anti-abortion protesters

        The US Court of Appeals for the District of Columbia Circuit on Tuesday reversed the dismissal of a lawsuit against the District of Columbia alleging that it selectively enforced its defacement ordinance against anti-abortion protesters but not€ Black Lives Matter (BLM) protesters in the summer of 2020.

      • New York TimesMichael Oher’s ‘Blind Side’ Lawsuit Shows Strains in Depictions of Black Athletes

        Michael Oher has long criticized the feel-good Hollywood version of his life as a struggling high school football player. His lawsuit against the family that took him in questions their relationship.

      • Jacobin MagazineMuseum Workers Are Tired of Being Paid in Cultural Cachet — So They’re Unionizing

        On August 8, after two years of negotiations, staff at the Guggenheim Museum in New York City became the latest to ratify their first contract with an overwhelming 97 percent majority. The Guggenheim Union consists of 150 staff members across departments, including visitor service, education, curatorial, administrative, and other departments. The union first began to organize in the fall of 2021 under the United Auto Workers (UAW) Local 2110. Some highlights from the first contract include a minimum 9 percent wage increase over the next two and a half years, an increase in retirement contributions, four weeks paid family leave, and funding for career training retroactive to July 1. One major victory is that this contract guarantees minimum rates for full- and part-time employees.

      • FuturismForcing Workers Back to the Office Might Not Have Been a Good Idea After All

        In a rare moment of clarity — or even, dare we say, self reflection? — a whole bunch of executives have admitted that they may have been wrong about the whole return-to-office push made after the COVID-19 pandemic. Well, sort of.

        In a Hanover Research and Envoy survey of over 1,100 senior executives and workplace managers in the United States, a whopping 80 percent answered that they would've "approached their company's return-to-office strategy differently" if they had the right "workplace data" at the time.

      • Pro PublicaBoth Parents Agree: The Child Is Being Harmed. Which One Will the Court Believe?

        As a special consultant to Colorado’s child welfare agency, Susan Coykendall accepted that there was no reliable profile for a child abuser, but she was fairly certain Bruce was not one.

      • Pro PublicaParental Alienation and Its Use in Family Court

        ProPublica has been reporting on family courts’ handling of custody disputes that involve allegations of child or domestic abuse. The reporting shows that a disputed psychological theory that’s been rejected by mainstream scientists has widespread influence on outcomes in family court.

        Parental alienation is a theory in which one parent is accused of brainwashing a child to turn them against the other parent. It is most frequently diagnosed and cited as evidence in divorce and custody cases, even though most mental health professionals reject it as junk science.

    • Digital Restrictions (DRM)

      • Eric RescorlaThe endpoint of Web Environment Integrity is a closed Web

        The basic property of an open system like the Internet and the Web is that you can only be assured of the properties of the elements you directly control. The elements that belong to other people work for them and not you. In a closed system, by contrast, the software on the end user device works for the provider, not for them, whether it is officially owned by the user (as in mobile apps) or it actually belongs to the provider (as with the old Bell System monopoly).

        WEI and similar attestation technologies represent an attempt to impose an alien model, that of a closed system, onto the open system of the Web. As with any closed system, the net impact will be that users don't control their own experience of the Web but rather have only the experiences that sites are willing to let them have. That seems bad.

    • Monopolies

      • Trademarks

      • Copyrights

        • GizmodoJudge Rules Wholly AI-Created Art Can't Get Copyright Protections

          Howell, in this most recent ruling, reaffirmed that US copyright law “protects only works of human creation.” Further, she stated that creations made by “non-human actors” such as AI “need no incentivization with the promise of exclusive rights under United States law, and copyright was therefore not designed to reach them.” While she acknowledged that the copyright is meant to “adapt with the times,” she argued that anything seeking protection is required to have “an originator with the capacity for intellectual, creative, or artistic labor. Must that originator be a human being to claim copyright protection? The answer is yes.”

        • [Old] Law Society GazetteSony tries to hit pause on copyright battle with Jimi Hendrix Experience estates

          Simon Malynicz KC, for Redding and Mitchell, told the court the releases did not give the musicians’ rights away and only related to revenue generated by the vinyl recordings, which does not include digital income including from streaming, YouTube and other digital platforms.

        • [Old] Guitar (NME Networks)The heirs of Noel Redding and Mitch Mitchell sue Sony Music for royalties from the Jimi Hendrix Experience

          The heirs of bassist Noel Redding and drummer Mitch Mitchell – who made up two thirds of the Jimi Hendrix Experience – have filed a lawsuit against Sony Music for copyright infringement and are seeking royalties.

        • [Old] VarietyJimi Hendrix Bandmates’ Heirs Sue Sony Music U.K. for Millions Over Copyright, Streaming Royalties

          The U.K. lawsuit seeks a declaration of copyright ownership in the musical works, sound recordings and performers rights (each of which are a separate right invested in the work), a declaration as to whether there has been copyright infringement and, if there has, damages as well as an account of profits plus interest on that figure and legal costs.

          It is unclear how the U.K. lawsuit will interact with Sony and the Hendrix’s estate’s pre-emptive claim in New York and it is likely the first matter the courts will deal with before even getting to the copyright issues is jurisdiction.

        • Torrent FreakInside a Live Pirate IPTV Blocking Order Protecting UEFA's Champions League

          Football bodies and broadcasters including the Premier League, Sky and UEFA, recently obtained permission to continue their ISP blocking programs to limit access to pirate IPTV streams. While almost no information relating to these secret processes appears in public, today we're able to take a look inside one of several blocking orders active right now in Europe.

        • Unicorn MediaConsequence of Ottawa’s ‘Link Tax’ Dampens News on Canadian Wildfires

          There are plenty of examples of supposedly good ideas that had unintended consequences that were not so good. There are also plenty of examples of “good” ideas that weren’t good at all and should never have been implemented. The recent Canadian “link tax” law that went into effect on June 22, which requires major online publishers such as Facebook and Google that link to online news sites to pay those site for the links, fits both categories.

          Yes, you have that right. Under the new law, if a Canadian searches Google for information and Google’s results include a link to a Canadian news site, Google has to pay that site for running the link and sending traffic its way.


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

After Softpedia Pushed Out Its Linux News Editor - and Effectively Killed the Linux Section - it Killed the Whole News Section (Altogether)
So they've killed Linux coverage, then their whole "news" section died
Cybersecurity is a structural not behavioural problem.
Reprinted with permission from Cyber|Show
 
Links 01/06/2024: Ukraine Updates, MongoDB Collapses
Links for the day
Gemini Links 01/06/2024: MNT Pocket Reform, Gemini and Content Length
Links for the day
Links 01/06/2024: WeblogPoMo2024, Pentagon’s Increasing Reliance on (i.e. Bailouts to) Microsoft
Links for the day
Twitter is (in Many Ways) Already Dead
Put an 'X' on it
Posts About Free Software, BSD, and GNU/Linux
Focus shifts have occasionally been discussed here over the years
Their Goal is Control, Not Security (and Their Staff Advocates Fake Security or Pricey Gimmicks That Disempower the Users)
Those companies just want control, or simply domination over users (and their computers)
[Meme] The Lowest Standards of Security
No need for any qualifications
IRC Proceedings: Friday, May 31, 2024
IRC logs for Friday, May 31, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Free Software is the Future, Open Source is Just Openwashing (Proprietary With a False Marketing Twist)
Also see postopen.org
Society Has Been Destabilised by Social Control Networks
Is it time to get rid of them, if not by sanctions/bans then simply by popular boycotts?
Gemini Turns 5 This Month
As long as Geminispace exists and is accessed by enough people, Gemini Protocol will continue to matter
Links 01/06/2024: More Crackdowns in Hong Kong, Street Named After Navalny
Links for the day
The War on Free Software Reporters - Part II - Antisocial Mobs
how various GNU/Linux bloggers got "canceled" over the years
Microsoft's Share of Physical Web Servers Fell From 9.14% to 9.04% in One Month
What's interesting to us is how Microsoft continues moving down in everything measured
Links 31/05/2024: Escalations in Ukraine and Russia, National Reporter's Shield Law in US
Links for the day
Links 31/05/2024: Generating and Using Identifiers, Why Unicode
Links for the day
A 3-Year Campaign to Coerce/Intimidate Us Into Censorship: In Summary
Some high-profile examples of defamation include Linus Torvalds, Richard Stallman...
[Meme] Never "Missing Out" in FOSS Conferences
The sexists who objectify women and bully women are going to FOSS events in pursuit of sex, according to themselves
Racism, Ageism, and Ableism at IBM/Red Hat and Kyndryl
IBM's Kyndryl is now accused of "racial, age, disability discrimination"
The War on Free Software Reporters - Part I - Why Techrights Cannot be Censored (and Won't be Censored)
Microsoft remains by far the biggest culprit
In Spite of Boot-locking (Trying to Make It Hard If Not Impossible to Install BSDs and GNU/Linux on New PCs) Microsoft's Grip is Rapidly Slipping
Escaping the Microsoft prison
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, May 30, 2024
IRC logs for Thursday, May 30, 2024
Microsoft's Problem in Puerto Rico
Notice how much Windows has fallen
Gemini Links 31/05/2024: MNT Pocket Reform and Benben v0.5.0
Links for the day
"I once preached peaceful coexistence with Windows. You may laugh at my expense -- I deserve it." -Be's CEO Jean-Louis Gassée
Execution of Red Hat: But I helped promote Azure and .NET
In Many Countries Vista 11's Market Share Goes Down, Not Up (Even Microsoft-Funded Mainstream Media Admits This)
More people are moving to GNU/Linux
10 More Days
Tux Machines turns 20.
[Meme] Meeting People on 'Dating Apps'
On the Internet, nobody knows you're a dog until you bark
The Campaign to 'End' Richard Stallman - Part IV - The Legitimate Concerns
So at least we now know why the FSF does not mention public talks
Links 30/05/2024: Public Domain and Kangaroo Courts
Links for the day
Canonical Works for Microsoft
Where are the antitrust regulators or CMA?
Links 30/05/2024: Microsoft Layoffs Back in Headlines, RISC-V and Standards
Links for the day
Gemini Links 30/05/2024: A Lonely Friend and Deletion of Old Posts
Links for the day
[Meme] 10 Years Down the New Career System (NCS) and What it Did to Our Collegiality
New from SUEPO, the staff union of the EPO
[Chart] Chromebooks in Micronesia Grew at the Expense of Microsoft Windows
As of today...
Angola: Microsoft Windows Down From 98% to 12%
Africa is "lost territory" for Microsoft colonialism
No News Drought in Techrights
Leaving my job after almost 12 years also contributes to available time for research and publication
A 3-Year Campaign to Coerce/Intimidate Us Into Censorship: Targeting My Wife
In my view, it is a form of overt sexism
Death Valley
The truth can be twisted
[Meme] UEFI 'Secure' Boot's Model of Security
Lion cage with people
Climbing a Tall Mountain for 2 Decades
In Web terms, 20 years is a very long time. Very few sites (or a small proportion of the whole) make it to 20.
If You're Going to Concern-Troll "Linux" Make Sure You Actually Use It (Or Tried It)
Concern-trolling has long been a key ingredient of GNU/Linux Fear, Uncertainty, and Doubt
The Serial Strangler From Microsoft is About to Be Served Court Papers
You can run, but you cannot hide
The Campaign to 'End' Richard Stallman - Part III - The Reddit Mob (Social Control Media Controlled, Steered or Commandeered by Wall Street)
This is totally reminiscent of what authoritarian regimes do
Caged by Microsoft
Are you telling me that preventing people from booting their Linux is security?
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, May 29, 2024
IRC logs for Wednesday, May 29, 2024