11.28.21

Links 28/11/2021: Laravel 8.73 Released, GitHub Offline for Hours

Posted in News Roundup at 8:33 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Linux Is Everywhere: 5 Places Where You Didn’t Know It’s There

        Have you every wondered where is Linux? What key sectors does it power and in what areas is it commonly used?

        Many people, to this very day, think that Linux is nothing more than a server operating system for advanced users, and nothing more. But that’s not true.

        Linux can be found in unusual places that you may have not known before, and in today’s article we’ll be seeing some of these places.

    • Server

      • AuriStor breathes life into Andrew File System – Blocks and Files [Ed: Financial ripoff; AuriStorFS is also limited to an operating system with NSA back doors so it's money down the sewer.]

        Andrew File System developer AuriStor updated attendees at an IT Press Tour briefing about its work on the file system with an HPC and large enterprise customer base dating back 16 or more years.

        AuriStorFS (a modern, licensed version of AFS) is a networked file system providing local access to files in a global namespace that has claimed higher performance, security and data integrity than public cloud-based file-sharing offerings such as Nasuni and Panzura.

        AuriStor is a small and distributed organisation dedicated to expanding the popularity and cross-platform use of AuriStorFS.

    • Audiocasts/Shows

      • GNU World Order 436

        **Slacktrack** and **SCons** from the **d** software series.

      • This Week in Linux 177: Steam Autumn Sale, NVIDIA, carbonOS, Stargate, Arch Linux, Amazon Linux | TuxDigital

        On this episode of This Week in Linux, Steam Autumn Sale 2021 & Steam Awards, NVIDIA Image Scaling SDK 1.0, Godot Engine Plus AMD’s FSR, German State Switch To LibreOffice & Linux, carbonOS 2021.1 Alpha, Venus: Virtual Vulkan Driver On QEMU, Stargate Digital Audio Workstation, Wireshark 3.6, Archinstall 2.3, Amazon Linux Rebased on Fedora Linux, Alpine Linux 3.15, Endless OS 4.0, and Deepin Linux 20.3. All that and much more on Your Weekly Source for Linux GNews!

    • Linux Magazine

    • Applications

      • Wireshark 3.6.0

        Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable, just like a voltmeter is used by an electrician to examine what’s going on inside an electric cable (but at a higher level, of course). In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed. Wireshark is perhaps one of the best open source packet analyzers available today.

    • Instructionals/Technical

      • How to Install Asterisk VoIP Server on Debian 11 | 10 – Linux Shout

        In this tutorial, we will discuss some of the steps and commands to install the Asterisk VoIP server on Debian 11 Bullseye or 10 Buster using the terminal to call over Android or iPhone using a local network.

      • How to Install PyCharm on Debian 11 Bullseye

        PyCharm is a dedicated Python graphical IDE (Integrated Development Environment) popular amongst Python developers with its wide range of essential tools such as analyzing code, debugging, and integration. The IDE also comes with the command line, connects to a database, creates a virtual environment, and manages your version control system (Git).

        In the following tutorial, you will learn how to install PyCharm Community, Professional or Educational, with Flatpak or Snapcraft (Snap) on Debian 11 Bullseye.

      • Install apps on Linux with Flatpak | Opensource.com

        Computer applications consist of many small files that are linked together to perform a set of tasks. Because they get presented as “apps,” colorful icons in the menu or on a desktop, most of us think of applications as a single, almost tangible thing. And in a way, it’s comforting to think of them that way because they feel manageable that way. If an application is actually the amalgamation of hundreds of little library and asset files scattered throughout your computer, where’s the application? And existential crisis aside, what happens when one application needs one version of a library while another application demands a different version?

      • Easily Install PowerDNS Admin on Debian 11/Debian 10 – kifarunix.com

        In this tutorial, you will learn how to easily install PowerDNS Admin on Debian 11/Debian 10. PowerDNS Admin is a web administrative interface for PowerDNS. It enables you to easily create and manage DNS zones from a web browser.

      • See, Multi-Account Containers extension is not needed to use Containers in Firefox – LinuxBSDos.com

        That last bit about integration with Mozilla VPN is new and can be useful in some edge situations. But we won’t get into that in this article. Let’s just focus on Containers. Like I said earlier, I’ve always relied on the Firefox Multi-Account Containers extension because I thought that was the easiest method of managing Firefox containers. But what I didn’t know is that the features that the Firefox Multi-Account Containers bring to the table are already built into Firefox Core, so all that’s needed to make them shine is to just make 2 changes in the Firefox via about:config.

        Those 2 changes will give me the same functionalities as the Firefox Multi-Account Containers. So that’s what I’m going to show you show to do in this post. To begin, open a tab and type about:config in the address bar. After clicking through whatever prompt or warning it throws up, type privacy.user in the search bar. The two preferences you’re looking for are privacy.userContext.enabled and privacy.userContext.ui.enabled. Figure 2 shows both preferences in their default state – false. Notice that if you long left-click the new tab (+) button before installing the Firefox Multi-Account Containers extension and with both preferences in their default state, that noting happens.

      • [Old] Migrating Technical Docs from Jekyll to Hugo+Docsy

        Recently, I migrated Graphviz’technical documentation from the Jekyll static site generator to the Hugo static site generator, and specifically the Docsy Hugo theme for technical documentation.

        I thought it would be straightforward to move static site generators, but it turned out rather difficult, so perhaps it’s worth writing about. Good technical doc infra is underrated. I hope this will be useful to write about for anyone considering a move from Jekyll to Hugo, or anyone interested in an evaluation of Docsy.

      • Log backtraces at obfuscated Android methods

        If you have the source code to the app, and the app is in debug mode (not obfuscated by ProGuard), this is easy: open Android Studio, click in the left-margin of the source code to add a breakpoint, untick the “Suspend” checkbox and tick the “Logging Options – Stack trace” checkbox.

      • Simple network dashboard with vnstat

        Hi! If you run a server or a router, you may want to have a nice view of the bandwidth usage and statistics. This is easy and quick to achieve using vnstat software. It will gather data regularly from network interfaces and store it in rrd files, it’s very efficient and easy to use, and its companion program vnstati can generate pictures, perfect for easy visualization.

      • The Pagination Predicament

        Previously there were 10 posts to a page, then you had to click through to the next page to see more posts. I have nearly 250 posts on this site now; ain’t no-one got time to be wading through 25 pages of blog posts!

        So now, all my posts render on a single page. To help you further, posts can be filtered by category at the top of the main blog page.

        Since I don’t have any featured images being displayed in my posts feed, the page still loads really quickly. Even when rendering ~250 posts.

      • How we use the SLURM job scheduler system on our compute servers

        Our motivation for using SLURM at all is that we have a pool of compute servers of varying capacity, and some GPU servers as well. A few of these compute servers are general login servers, but the problem with these is that they’re a free for all; anyone can log in at any time and start using CPU (and perhaps memory, although that can’t be fair-share scheduled so it’s first come, first served). Traditionally people have wanted to reserve some dedicated amount of resources that are theirs for some amount of time. Well, SLURM does that.

      • Why region based memory allocation help with fragmentation

        Overall, I think we can say that region allocation reduces fragmentation by making the order of allocating and freeing memory less important. If you intermix allocating a bunch of different sized objects and then don’t free all of them (or delay freeing them for a long time), in a simple allocator you wind up with allocated holes in your free ranges. In a region allocator, those different sized allocations go to different regions, and failing to free all of the objects of one size (in one region) doesn’t cause problems for other regions of other sizes.

      • Computation that needs to be “secure” is everywhere in practice

        The problem is that we have wound up with a lot of things on our devices that we want to keep confidential, or in another perspective we’ve wound up in a world where a lot of untrusted things have an inordinate amount of access to our devices. Cryptographic keys are the tip of the iceberg; there are also access tokens in the form of cookies, JWTs, and all of the other forms they take, URLs that we visit, apps that we use, what we type on the keyboard, and on and on and on. We are barely keeping up with identifying what’s sensitive and needs to be kept confidential, never mind actually controlling snooping on it.

      • How to Install phpMyAdmin on Debian 11 Bullseye (Apache) – Linux Shout

        PhpMyAdmin is an open-source web-based application that offers a web interface to directly manage and access MySQL or MariaDB databases from anywhere/remotely using a web browser. The user can use the web graphical user interface provided by it to interact with databases without having extensive knowledge of the commands. Hence, even a newbie with some knowledge of computers can manage database tables for querying data and manipulating individual parameters.

      • How to reset or refresh Firefox

        Browsers can be customized; you can change the way they look by installing themes and you can add or extend features by installing add-ons. Firefox is no different. In fact, Firefox offers users access to more customization options than most other browsers.

      • Install and setup Steam on Manjaro Linux

        Steam is a digital game distribution platform for gamers developed by Valve (a well-known game developer). It provides cross-platform support and can be used to buy, play thousands of games. To use Steam, users have to create an account, and they can access the same games on various computers. Steam was initially launched in 2003; since then, they have focused on providing Linux-based systems support.

        Apart from providing games on Steam, users can also enjoy the voice/text chat feature. However, it is not necessary that these chats are related to the games only. The steam app is free to download, and along with paid games, it offers hundreds of free-to-play games as well. Many games now natively support Linux; in this guide, we will provide an installation process as well as the instructions to set up steam on Manjaro Linux.

      • How to fully disable the Firewall on Linux Mint

        A firewall is a network security system built into an operating system that monitors and manages network traffic according to preset rules. The firewall also aids in the monitoring of networks to determine whether they are trustworthy or not. They also protect your PC from hackers by filtering dangerous network traffic.

        The uncomplicated firewall (UFW) in Linux Mint provides a user-friendly interface for managing firewall rules. Its main goal is to make firewall rule management as simple as possible, as the name suggests. Although it is recommended that you keep the firewall turned on, there may be times when you need to disable it, such as when troubleshooting or testing. So this article will provide you the details on how you can disable a firewall on Linux Mint.

      • How to extract rar files on Manjaro

        RAR is a file format used to combine multiple files/folders in a single compressed file. The .rar file extension refers to the RAR files, and several applications can create these files. The RAR file format is practiced compressing files used for various purposes like you can keep various types of files inside one compressed file. These compressed files are then extracted to access the files contained by them.

        The rar files can be extracted by using the graphical interface and terminal support of Manjaro. In Linux-based systems, unrar command-line utility is required to extract .rar files.

        In this piece of writing, we have provided possible ways to extract rar file in Manjaro Linux. As the interaction with rar files is impossible without the unrar package. So, we will also provide the installation procedure of the unrar package as well.

      • How to enable remote access in Manjaro Linux

        Enabling remote access is crucial when you need to permit your office members to work from the branch office, home or when you want to hand over your system to the IT teams for troubleshooting purposes. However, when you want to access your own Linux-based system from anywhere, any time, without the hassle then the ideal way is to utilize remote desktop software or SSH.

        This post is all about how to enable remote access on Manjaro Linux. For this purpose, we will first use SSH and then show you the procedure of installing and configuring Chrome Remote Desktop to establish a remote connection between your Manjaro system and mac. This post will also discuss some other remote desktop software for a Linux system. So, let’s start!

      • How to enable SSH on Linux Mint

        Enabling SSH on Ubuntu is one of the first things you should do after installing the operating system as it provides an encrypted network protocol for safeguarding remote server and client logins. It allows you to access your machine remotely and execute operations securely. It encrypts all client-server traffic to prevent eavesdropping, connection hijacking, and other types of attacks.

        Secure Shell (SSH) protocol is used to manage or transmit data between computers through the internet. Old methods for accomplishing these actions, such as telnet do not have these capabilities. They are unsafe since they transmit the user’s password in plaintext. It offers a secure route over an unprotected network, connecting an SSH client program to an SSH server in a client-server architecture. It is mainly used to communicate to Unix-like operating systems, although it may also be used on Windows.

      • How to add a user on Linux Mint

        Linux is reliable and secure compared to other operating systems, yet granting complete permissions to an unskilled user might lead to severe difficulties. This is where the administrator took control, one of the most important aspects of being a system administrator is user management. Because there are so many critical components to administrate, even the tiniest error can result in the intruders taking over the entire system. The system administrator can create, add and give each user a separate set of permissions. When a user is added or created, the appropriate level of access is granted to that user. Adding a user on Linux Mint can be accomplished in two ways; through the terminal and through GUI.

      • How to Set Up a Synology Drive Server and Synology Drive Client

        Synology Drive is an alternative to OneDrive and Google Drive. You can upload files to your Synology Drive, share files, create documents, sync files between your computer and Synology Drive, and back up files from your computer to your Synology Drive.
        Each user of your Synology NAS can have their own Synology Drive and the files they create on their own Synology Drive are not accessible to other users by default. Each user can use Synology Drive from a web browser. Users can also sync and back up files using the Synology Drive Client desktop app.

        To use Synology Drive, you will have to install the Synology Drive Server package on your Synology NAS. Once installed, your NAS will become a productivity and collaboration powerhouse.

        In this article, I will show you how to set up and configure Synology Drive Server on your Synology NAS, install Synology Drive Client on Windows and Ubuntu operating systems, and use Synology Drive Client to sync and back up files. So, let’s get started.

      • How to Disable Comments on WordPress

        This brief tutorial explains how to disable comments on WordPress sites in different and simple ways.

        After reading this tutorial, you will get rid of comments on all your WordPress posts or on specific posts. All instructions explained in this article to remove comments from WordPress posts contain screenshots and can be followed by low and medium-level WordPress users.

      • What is a Tar File

        Tar is a powerful archiver that is frequently used for collecting files and archiving them. It was created to produce archives for data storage on tapes, thus the name “Tape Archive”. It was initially included in UNIX version 7 in 1979, and it is currently accessible on a variety of systems.

        Before we go into the situation’s specifics, let’s define Archive files so that no Linux newbies are left out. Archived file is a combination of multiple files with metadata information. By combining multiple files and their information into a single file, you may improve the storage and mobility of your data. The basic purpose of Tar is to combine the data but you can also compress the data using other utilities. These compressed files are referred to as Archive files, and they assist users to reduce file size and simplify data management. The tar is one of the must-have utilities for managing various files in Linux.

    • Games

      • Godot 4.0 Progressing On Its Multiplayer Capabilities

        In addition to Vulkan support and a lot of graphics renderer work happening for Godot 4.0, adding to the expansive feature list is improved multi-player capabilities.

        A prototype implementation of Godot multi-player scene replication support is ready and more functionality is being worked on as part of Godot 4.0. Godot to date has provided RPC-based messaging for multi-player games but hasn’t itself provided a common mechanism around scene/state replication. With this new code being worked on, there is now an out-of-the-box solution and should be extensible for use by different games while being easy to use on the part of the game developers.

    • Distributions

      • Cross-platform package building: Pkgsrc vs. Ravenports (1/2)

        This is the first of a two articles on cross-platform package management / package building. It covers the basics by discussing why it is actually surprisingly (to many people) difficult to do and what some of the problems are. It also takes a quick look at some strategies to solve the problem.

      • IBM/Red Hat/Fedora

        • Top 8 alternative desktops for Fedora and how to install them | FOSS Linux

          Are you looking for a way of giving your Fedora distro a new look and feel? If so, here is how to install a new Linux desktop environment on your Fedora and which ones are worth testing. Ideally, there are over 30 diverse desktop environments and window managers available for this distro. However, this article will break down the eight excellent desktop environments for you and cover how to install and switch between them in just a couple of minutes.

          Today, the most common desktop environment is probably GNOME and KDE Plasma. GNOME comes as the default desktop environment for Fedora, but that does not exempt you from installing the operating system with KDE plus a few other desktop environment alternatives by utilizing one of the many Fedora spins.

          [...]

          Alternative window managers and desktop environments are readily available in this distro’s (Fedora) software repositories. Many may wonder what may be the difference between a desktop environment and a Windows manager. What distinguishes the two is the inclusion of apps and utilities. Windows manager is responsible for the placement of windows, how they interact with one another up to the point of their appearance.

          While, the desktop environment is responsible for the toolbars, panels, and all the little tools we do not take seriously on our desktops. Some tools include the clipboard manager and applets that permit us to control our network connections or maneuver between virtual desktops. For instance, GNOME and KDE come with their applications such as terminal programs, email clients, file explorers, and calculators. So, when you install one of these environments, you will also get all of the apps that ship with it.

          Below is a compiled list of the eight most popular desktop environments that you can opt for if you are a Fedora user. Along with them are the DNF commands to help you install the preferred one to your machine or instead remove them, which is entirely up to you, mate. Without further to-do, let us delve right into the list.

        • Fedora 35 Mini-Review On The Blackbird And TALOS II

          My conclusion is damning with faint praise: at least it wasn’t any worse. And with these tweaks it works fine. If you’re on F34 you have no reason not to upgrade, and if you’re on F33 you won’t have much longer until you have to (and you might as well just jump right to F35 at that point). But it’s still carrying an odd number of regressions (even though, or perhaps despite the fact, the workarounds for F35 are the same as F34) and the installation on the T2 was bumpier than the Blackbird for reasons that remain unclear to me. If you run KDE or Xfce or anything other than GNOME, you shouldn’t have any problems, but if you still use GNOME as your desktop environment you should be prepared to do more preparatory work to get it off the ground. I have higher hopes for F36 because we may finally get that float128 update that still wrecks a small but notable selection of packages like MAME, but I also hope that some of these regressions get dealt with as well because that would make these updates a bit more liveable. Any system upgrade of any OS will make you wonder what’s going to break this time, but the most recent Fedora updates have come off as more fraught with peril than they ought to be.

    • Devices/Embedded

      • Open Hardware/Modding

        • How I Built a Homelab on the Budget

          In my previous article, I discussed what is a Homelab and why you should (or should not) have one for yourself.

          Now, can anyone who wants or need, have a homelab? It depends on several things but money or resources can be worked around. In this article, I will explain how I have managed to have my own Homelab without investing a fortune in it. As a matter of fact, it costed me less than US $1,000 and it works good enough to manage my home’s infrastructure requirements.

          That being said, it is important to mention as a disclaimer: this article doesn’t describe the best way to do things. It just describes how I manage to make it work even knowing there are some issues and risks with it but for now, I am fine to live with these.

        • Want Octoprint But Lack A Raspberry Pi? Use An Old Android Phone | Hackaday

          3D printers and Octoprint have a long history together, and pre-built images for the Raspberry Pi make getting up and running pretty easy. But there’s also another easy way to get in on the Octoprint action, and that’s to run it on an Android phone with the octo4a project.

        • This Raspberry Pi Mini ITX Board Has Tons Of IO | Hackaday

          The Raspberry Pi now comes in a wide variety of versions. There are tiny little Zeros, and of course the mainstream-sized boards. Then, there’s the latest greatest Compute Module 4, ready to slot on to a carrier board to break out all its IO. The Seaberry is one such design, as demonstrated by [Jeff Geerling], giving the CM4 a Mini ITX formfactor and a ton of IO. (Video embedded after the break.)

          The Seaberry sports a full-sized x16 PCI-E port, with only 1x bandwidth but capable of holding full-sized cards. There’s also four mini-PCI-E slots along the top, with four M.2 E-key slots hiding underneath. The board then has a M.2 slot in the middle for NVME drives, and x1 PCI-E slot hanging off the side.

        • 2021 Open Source Pay-it-Forward Pi Giveaway

          To solve both problems, I’m doing a giveaway—to enter to win one of any of the pictured items below (and maybe a few others I can find lurking in my office), just donate or say thank you to any open source project or maintainer, then submit your entry.

        • Mini-ITX Seaberry adds 11 PCIe slots to a Raspberry Pi

          But it’s definitely a specialty board. People who need a low-power ARM-based development or experimentation platform could use this board like I do, to test more exotic configurations on the Pi. And it’s looking like it will be the first commercially-available (though not cheapest) ways to install a Pi into a standard desktop or rackmount PC case, since it’s mini ITX.

        • xa 2.3.12

          I’ve updated xa, André Fachat’s venerable 6502 cross-assembler, to version 2.3.12. This contains a bug fix for a regression in 65816 mode which I’d meant to release earlier but got sidetracked on (thanks Samuel Falvo for the nice test case, which is also incorporated into the suite). As with prior versions it is tested on pretty much all of my Un*x-alike systems here including AIX, Mac OS X (PowerPC, Intel and Apple Silicon), NetBSD/mac68k and Linux/ppc64le. I said this before for 2.3.11 but one more time for the record: this will probably be the last in the exceptionally long-lived 2.3 series before 2.4, which as I keep warning you will definitely have some minor compatibility breaks and jettison a couple long-deprecated options and syntaxes (but will have some new features to make up for it). Again, more to come on that.

    • Free, Libre, and Open Source Software

      • Trends That Defined Open Source This Year
      • Web Browsers

        • Mozilla

          • Waterfox G4.0.3.1 update released with fix for bootstrapped extensions, menu bar issues [Ed: It's irresponsible to promote Waterfox in any way. It's covertly owned by a surveillance company, System1.]

            Waterfox has been updated to version G4.0.3.1. This release fixes some issues that users had reported in the previous build.

            Version G.4.0.2 of the web browser, which shipped at the beginning of this month, had a bug that prevented the installation of bootstrap add-ons. Waterfox would throw out an “addon is corrupt” error message, when users tried to install the legacy extensions. Waterfox G4.0.3.1 update resolves the issue. The latest version also patches a bug that was preventing previously installed bootstrap add-ons, from loading upon the next restart, they were getting disabled by the application.

            You may have come across an issue in Waterfox G 4.0.2, that caused the menu bar to be displayed partially off the screen, in maximized mode. It also resulted in tabs listed on the menu bar. Both of these issues have been fixed in Waterfox G4.0.3.1. Users who wish to use bootstrap extensions, can find forked versions of some popular add-ons at this page. The update introduces a patch for a problem that was preventing the Copy Tab Link option from working. There is still no option to toggle the menu bar icons.

      • Productivity Software/LibreOffice/Calligra

      • Education

        • Computer Science was always supposed to be taught to everyone, and it wasn’t about getting a job: A historical perspective

          C.P. Snow’s chapter (with Norbert Wiener of Cybernetics as discussant) predicted a world where software would rule our lives, but the people who wrote the software would be outside the democratic process. He wrote, “A handful of people, having no relation to the will of society, having no communication with the rest of society, will be making decisions in secret which are going to affect our lives in the deepest sense.” He argued that everyone needed to learn about computer science, in order to have democratic control of these processes.

          [...]

          I completely buy the necessity part and the basic skill part, and it’s true that CS can provide economic opportunity and social mobility. But that’s not what Perlis, Simon, Newell, Snow, and Forsythe were arguing for. They were proposing “CS for All” decades before Silicon Valley. There is value in learning computer science that is older and more broadly applicable than the economic benefits.

        • Open LMS Launches Pro-Bono Partnership With Pancare Foundation

          As part of the partnership, Open LMS will provide Pancare with its open-source learning platform for Pancare’s volunteer training program, helping the foundation enable, engage, and mobilize a growing volunteer workforce while providing additional support for those suffering from GI cancers.

      • Public Services/Government

        • A German State Is Saying Goodbye Windows – neritam

          Schleswig-Holstein, the northernmost state in Germany, has plans to move almost entirely open source. By the time the dust settles, the regional government will have all but dropped Windows, Microsoft Office, Zoom and other proprietary software for Linux, LibreOffice, OnlyOffice, and Jitzi. By the end of 2026, Microsoft Office is to be replaced by LibreOffice…

      • Programming/Development

        • CAPLin framework to build a SocketCAN node application in C

          The SocketCAN functionality, combined with the can-utils programs, enable you to view, interact and analyze the CAN bus traffic on Linux. However, these tools are no match for high-end tools such as Vector CANalyzer and CANoe under Windows. I especially miss CAPL scripts on Linux. For this reason I developed the CAPLin framework. With CAPLin you can quickly build a SocketCAN node application in the C programming language.

        • [Old] Thoughts on how to find remote work in Cameroon

          Remote work is the new norm there has never been a time like this, where as a SE you can make more than a decent living. This isn’t a know-it-all kind of post, I just wanted to write a bit about my experience, but it’s way too long (6 months+) so I will just share what worked and not for me. Before I forget, this is mainly for people like me doing computer science for the sake of doing it. Not because someone forced us or whatever. In short, geeks I guess. If you’re like me the perspective of spam applying and writing corresponding CVs is not very appealing. So, if CS is just a means to an end – not that there’s something wrong with that – but this might rub you off the wrong way (and you guessed right, no, I don’t look forward to enter management to “escape” coding). The job landscape in Cameroon is… saddening. While everywhere else the supply exceeds the demand, here it’s the exact opposite, which inevitably leads to abuse. Also, if you are still a student, this might not be for you directly, you can still read it to be prepared but there are many opportunities for students and I talk a bit about GSoC here. That being said, let’s get started.

        • Emacs is a Lifestyle

          I think that perfectly captures the spirit of Emacs and the nature of its (most devoted) users. I’d even go a bit farther and make the claim that (using) Emacs is essentially a lifestyle (choice).

        • Uninitialized Stack Variables

          Finally, as we observe here once more, writing C leaves us (necessarily) at the whims of the compiler: FreeBSD 13.0-RELEASE happens to use clang, and gcc(1) would have failed in either of our two scenarios. So one question that arises is whether compilers should perhaps auto-initialize stack variables.

          clang has a discussion around this, as does gcc, but there does not seem to be an agreed upon conclusion. Considering the possible security implications, it does seem to me that it would be a Good Thing™ to at least move away from having uninitialized variables by default and instead requiring explicit requests from the programmer (say, by way of an attribute?) that a given stack variable not be initialized. But I honestly don’t know what the performance impact of this would be.

          Either way, I’m going to make it a habit to memset(3) my structs going forward…

        • Testing

          I think about tests in terms of defense in depth, value-for-effort and debugging efficiency.

          Debugging efficiency is not something I see discussed often and it’s the only place where I disagree slightly with Aleksey’s post above. The more that happens between the cause of a bug and the actual test failure, the longer it takes to track down the bug. So I tend to write unit tests for code which is: [...]

        • Writing

          I have a file called ‘ideas’ where I write down potential projects or thoughts that might be worth writing about. Entries grow over time as I add more thoughts. The entry that eventually became Against SQL existed for over a year. Every time I encountered a new bizaare corner of the SQL I would make a quick note of it.

          Eventually one of the ideas will feel ready and I’ll try to write it up in full. This can take anywhere from a few hours to a few weeks depending on what the goal of writing it is and how much research is required. Against SQL took something like 60-80 hours to write because I was trying to make a strong argument about a complicated and contentious subject. Why isn’t differential dataflow more popular took maybe an hour or two because I just wanted to hear about other peoples experiences.

        • Property-Based Testing In Go

          Property-based testing can be a bit trickier to learn, and not every problem can be well tested in this manner, but it’s a powerful technique that’s well supported by the go std-lib (testing/quick) and that is under-utilized.

        • [Old] EP. #91: Open Source Security: with Dr. David A. Wheeler

          In episode 91 of The Secure Developer, Guy Podjarny speaks to Dr. David A. Wheeler, an expert in both open source and developing secure software. David is the Director of Open Source Supply Chain Security at the Linux Foundation and teaches a graduate course in developing secure software at George Mason University. Today’s discussion revolves around open source security (or OSS), in which David is an expert, not just from the perspective of consuming open source but also creating and even governing open source. Tuning in, you’ll learn about some of the primary security concerns in open source and the necessity to educate developers about secure software.

        • [Old] Managing Risks and Opportunities in Open Source with Frank Nagle & David A. Wheeler

          We start off on the topic of looking at metrics that are useful for identifying what’s going on in a Software Configuration Management system. David tells us what it is and if there’s a difference between building software and deploying it. Also, figuring out which components you’re going to bring in, to your overall system.

        • Toit open-source language claims to be 30x faster than MicroPython on ESP32 – CNX Software

          Developed by a team of former Google employees, Toit is a complete IoT platform with remote management, firmware updates for fleets of devices with features similar to the one offered by solutions such as balena, Microsoft Azure, or Particle edge-to-cloud platform.

          Toit currently works on ESP32 microcontrollers using lightweight containers, and after seeing existing high-level languages MicroPython and Javascript were not fast enough on low-end microcontrollers platforms, the team at Toit started to develop the Toit language in 2018, and has just made it open-source with the release of the compiler, virtual machine, and standard libraries on Github under an LGPL-2.1 license.

        • Laravel 8.73 Released | Laravel News

          The Laravel team released 8.73 with support for Countable objects in the string pluralizer, allowing closures for determining cache TTL, a lazyByIdDesc() query builder method, and the latest changes in the v8.x branch.

        • Medical Web Development: Top 10 Programming Languages Used in Health Tech
        • What are Container Classes C++?

          A container class as the name suggests is used to contain different values, objects, and variables, etc. in the memory or the external storage. A container class supports other classes present in the programs and it functions to hide the objects/variables used in the memory. It stores many items and all of these items are easily accessible by other members of the program.

          All container classes access the elements of the container efficiently through the iterators. This class is known to hold some similar and mixed objects in the memory. A container can be of a homogeneous or heterogeneous type. If the container holds mixed objects then it is heterogeneous, while in the case of similar items it is known as homogeneous container class.

          We are going to explain this concept on the Linux operating system, so you need to have Ubuntu installed and in the running form on your system. So you must install Virtual Box and after downloading and installation now configure it. Now add the Ubuntu file to it. You can access Ubuntu’s official website, and download the file according to your system requirement and operating system. It will take hours, then after installation, configure it on the virtual machine. In the configuration process, make sure you have created the user because it is essential for any operation on the Ubuntu terminal. Moreover, Ubuntu needs the authentication of the user before doing any installation.

          We have used the 20.04 version of Ubuntu; you may use the latest one. For the implementation, you need to have a text editor and must have access to the Linux terminal, because we will be able to see the output of the source codes on the terminal through the query. The user must have basic knowledge of C++ and object-oriented programming to make use of classes in the program.

        • Python

          • XOR Two Strings in Python

            You may have used many logical, arithmetic, and comparison operators within mathematics and programming while working. One of the frequently used logical operators is the XOR operator. It returns exactly the opposite of the result of the OR operator. Within this article, we will be using the XOR operator on two string-type variable values while working in a Python environment. Let’s have some examples in the Ubuntu 20.04 system.

          • Python String to a Dict

            In Python, the conversion of different data types is a common problem and it is very important to do it right. Dictionary is the data type that saves the information/elements in a pair form. It is important to convert the string data type to a dictionary data type during programming. However, before going to the methods of conversion, let me explain the strings and dictionaries.

            A string is a series of elements in Python. It is unchangeable. The elements or items are enclosed in single and double quotation marks. Since Python has no proper character data type. However, any character is also taken as a string in Python.

            In Python, a dictionary is essentially a collection of changeable data items. This collection is present in an unordered form. Dictionaries save the data in which every element is in the form of a pair. The elements inside the brackets are present in the form of pairs and each pair is segregated by the comma. But the elements are isolated by using a colon.

            The main attribute of the dictionary is that it does not accept polymorphism. We can get the data from the dictionary later by referencing the appropriate key name. Let’s discuss the techniques of converting the string to a dictionary.

          • Python String Decode Method

            The Python language is used to store the string in the form of Unicode. Within Unicode, a simple code point is utilized to represent a single character of a Unicode. We have to know two terms: encode and decode. The encoding would convert a simple string to a group of bytes while decoding will convert the group of bytes to a real string once again.

            So, within this article today, we will be decoding a string to an original one with the encode() and decode() function. Be sure to configure the python3 package on your Linux system. Let’s start today’s article by launching the terminal console using the Ctrl+Alt+T.

          • Python Removes Newline From a String

            In Python, the strings are a series of elements. These elements are surrounded by single and double quotation marks. Python has a newline symbol. It is represented by “/n”. It is utilized to track the climax of a line and the appearance of a new line. The newline character is utilized in f-strings. In addition, the print statement prints a newline character to the end.

            Newline character “/n” is a special character. It is helpful to make a new line. When we utilize the newline character (/n), a new line is created spontaneously.

        • Java

          • How to Convert Java to Kotlin and Kotlin to Java

            This article will cover a guide on converting code written in the Kotlin programming language to Java programming language and vice versa. Kotlin is a relatively new programming language being developed by JetBrains and it is fully interoperable with Java programming language. It offers some benefits over Java programming language like a more concise syntax, more built-in helper functions, stricter null type checking, data classes, and so on. Full list of differences between these two languages is available here. Kotlin is now the preferred language for developing Android apps and it has been fully integrated into Android Studio app development software suite.

            You can convert Kotlin to Java and Java to Kotlin using offline tools. Some of them are explained in this article. Do note that depending on the code being converted and the type of tool being used for the conversion purpose, the converted code may not be 100% accurate and you may have to make some manual edits. You should always review converted code before using it in an application.

    • Standards/Consortia

      • China: Smart tech enables users of braille book library

        It is three o’clock in the afternoon. The golden sunshine tumbles through the southern window of the main reading room of the Braille Library of China (BLC), yet there is not a single reader in sight.

        Make no mistake — that does not mean the custodians of this literary trove are doing nothing. On the contrary, the librarian on duty is quite busy.

        She simultaneously keeps one eye on WeChat, while checking the QQ app for new messages with the other, as well as standing ready to answer the phone that might ring at any time. All calls and messages come from visually impaired people or their families seeking that most essential of societal needs access to knowledge.

  • Leftovers

    • What Does It Mean to ‘Yassify’ Anything?

      It should be noted that YassifyBot is not actually a bot. Its tweets aren’t generated by software. The account is run by a 22-year-old college student in Omaha who makes art under the name Denver Adams and asked that The Times not reveal their legal name.

      The process for making each image is simple: Take a face, run it through FaceApp until it looks generically or grotesquely sexy, post, repeat. Mr. Adams said in a Zoom interview that each image takes only a few minutes to create

    • The Can That Always Can

      The year WD-40 was invented by the Rocket Chemical Company. Located in San Diego, CA, the goal of the product was to create something that would prevent rust and corrosion on aircraft. After forty attempts to create the formula, they famously came up with the right one on their 40th attempt. The name WD-40 stands for water displacement, formula 40. It’s first application came as a coating for the Atlas missiles made by Corvair in the 1950s.

    • Sinking after earthquakes | EurekAlert!

      During an earthquake, solid ground can loosen into something like quicksand.

      Under earthquake shaking some types of soil undergo liquefaction, a softening caused by groundwater pressure that becomes an evil twin to ground shaking. Liquefaction causes large ground deformations that have toppled buildings large and small, as well as crushed pipes below and taken out roads, rail, bridges, and levees.

      Such was the case for the 2010 Canterbury earthquake sequence, the most damaging being the magnitude 6.2 Christchurch earthquake. The sequence of earthquakes, 21 of which were greater than magnitude 5, caused $3 billion in damage to buildings and infrastructure on the South Island of New Zealand, particularly in the city of Christchurch, which would receive the brunt of the deadlier aftershocks a year later.

    • Science

      • SpaceX’s Starlink Will Make Life Hell for Astronomers Like Me. Telescopes on the Moon Could Help Fix That.

        While these satellite swarms are going to make life difficult for astronomers observing the universe in visible light, they are set to be even more problematic for astronomers who work with radio waves—one of the most important tools in an astronomer’s cosmic toolbox. They are emitted by all kinds of things in space, from organic molecules to dying stars. Jodie Foster in the film Contact (playing Ellie Arroway) was listening to the universe using radio waves, and to this day telescopes involved in SETI, the search for extraterrestrial life, use these waves to scan the sky for signs of cosmic intelligence.

        All of this work is in jeopardy. Satellite swarms have to communicate with humans on Earth, and they do so using radio waves. It won’t take long before the effect of all these satellites becomes overwhelming: In 10 years time we could have 100,000 radio beacons in the sky, blasting our planet with a wall of radio noise capable of deafening even the most sensitive radio telescope.

      • NASA Research Launches a New Generation of Indoor Farming | NASA
      • Can Synthetic Biology Save Us? This Scientist Thinks So. [Ed: It is not biology and it’s often just a disingenuous loophole for getting patents on life and nature as though they’re inventions meriting monopolies

        When the family house in Devon, Pa., caught fire, Drew Endy, then 12, carried out his most cherished possession — his personal computer.

        Years later, as a graduate student, Mr. Endy was accepted to Ph.D. programs in biotechnology and political science.

        The episodes seem to sum up Mr. Endy, a most unusual scientist: part engineer, part philosopher, whose conversation is laced with references to Descartes and Dylan, as well as DNA.

        He’s also an evangelist of sorts. Mr. Endy, a 51-year-old professor of bioengineering at Stanford University, is a star in the emerging field of synthetic biology. He is its most articulate enthusiast, inspiring others to see it as a path to a better world, a transformational technology to feed the planet, conquer disease and combat pollution.

    • Education

      • Are tenured professors more likely to speak freely?

        One of the justifications for tenure is that professors who have tenure can speak more freely. Thus, in theory, they can be critical of government or corporate policies.

        Do they? What would “speaking freely” entails?

      • Can Biden expose the ‘college is for everyone’ fantasy?

        So the big question we have to answer is: What messages are our kids getting about the value of a college education? Perhaps more importantly: What messages are we — parents, teachers and mentors — giving them when it comes to their future in the workforce?

    • Hardware

      • Magnus Effect Propels This Flettner Rotor Boat | Hackaday

        The Magnus effect is a interesting and useful phenomena. [James Whomsley] from [Project Air] decided to put it to work on a small radio-controlled boat, successfully harnessing the effect. (Video, embedded after the break.)

        The Magnus effect is an interesting thing, where fluid flowing over a rotating object generates an aerodynamic force at a right angle to the direction of the flow and the axis of rotation. (It’s why curveballs curve.) This can be used for propulsion on a boat, by spinning a tall cylinder called a Flettner rotor. This takes advantage of Magnus effect to generate thrust.

      • Another Way To Recycle Those Empty Beverage Cans | Hackaday

        Do you ever sit around thinking of ways to repurpose things in your house? Well [BevCanTech] found a way to recycle some of his empty beverage cans by turning them into homemade wire.

      • Replacement Motherboard Brings New Lease Of Life To Classic Thinkpads | Hackaday

        “They don’t make them like they used to.” It might be a cliché, it might not even be entirely true, but there’s something special about owning a piece of hardware that was built to a much higher standard than most of its contemporaries, whether it’s that bulletproof Benz from 1992 or that odd fridge from 1987 that just seems to last forever. For laptop aficionados, the Thinkpad series from IBM and Lenovo is the ne plus ultra: beloved for their sturdy construction and rich feature set, they have been used anywhere from the United Nations to the International Space Station. The T60 and T61 (introduced in 2006) are especially famous, being the last generation sporting IBM logos and such classic features as 4:3 displays and infrared ports.

    • Health/Nutrition/Agriculture

      • Trees and Crops Don’t Have to Compete. Climate Crisis Calls for Agroforestry.
      • Opinion | Indian Farmers Score a Victory Against Modi Government on Strike Anniversary

        India’s farmers have mobilized to create one of the world’s most vibrant protests in history, camping on the outskirts of New Delhi for one year now. Friday, November 26, 2021, marked the one-year anniversary of the day when these farmers faced water cannons and tear gas at the Delhi border as they tried to reach the Capital. On November 19, they got a big win, as Narendra Modi, the prime minister of India, announced that he has decided to repeal the three controversial farm laws.

      • Africans Should Be ‘Applauded, Not Punished,’ Say Advocates Amid Omicron Travel Ban

        As a leading World Health Organization official pleaded against “knee-jerk” reactions after the discovery in Botswana of the latest Covid-19 strain, South Africa’s government on Saturday joined public health advocates in criticizing wealthy nations for imposing travel bans on African countries while failing to address “the vaccine inequity that drives new variants.”

        “These travel bans are based in politics, and not in science. It is wrong… Why are we locking away Africa when this virus is already on three continents?”

      • Forensic Science Institute to study wastewater for drug use

        Wastewater samples for drug use monitoring are planned to be taken in Tallinn, Kohtla-Järve, Pärnu, Viljandi and Võru. The first samples will be taken in mid-January and the results will be available in February. In the future, wastewater samples will be analyzed for traces of drugs once every quarter.

      • ‘It’s scary’: Overdose deaths driven by fentanyl mixed with other drugs

        Although the trend has been identified, it’s not yet definitive what is causing it: Are drug users knowingly using fentanyl and other drugs, or does fentanyl enter the larger drug supply via dealers and distributors?

        “It really could be happening at any point and multiple points along the drug supply chain,” said Kelly Dougherty, Vermont’s deputy health commissioner for alcohol and drug abuse programs. “Some people want to use fentanyl, despite the dangers, and other people are using it without knowing — it’s scary. People are cutting it in, and it basically makes it more deadly.”

      • G.O.P. Fights Covid Mandates, Then Blames Biden as Cases Rise

        Over eight hours last Thursday night and into Friday morning, Representative Kevin McCarthy of California hit on many issues as he spoke on the House floor in an unsuccessful effort to thwart House passage of President Biden’s social safety net and climate change bill. But among his most audacious assertions was that Mr. Biden was to blame for the country’s failure to quell the pandemic.

        Mr. McCarthy used this line of attack even as members of his own Republican Party have spent months flouting mask ordinances and blocking the president’s vaccine mandates, and the party’s base has undermined vaccination drives while rallying around those who refuse the vaccine. Intensive care units and morgues have been strained to capacity by the unvaccinated, a demographic dominated by those who voted last year for President Donald J. Trump.

      • ‘False sense of security’ around COVID vaccines: WHO

        The chief of the World Health Organization has warned that the COVID-19 pandemic is not yet over and that some people were falling into a “false sense of security” after being vaccinated against the virus.

        In a news briefing in Geneva on Wednesday, Tedros Adhanom Ghebreyesus said many vaccinated people were thinking – wrongly – that receiving the COVID shot meant they no longer needed to take any other precautions.

      • Detect, Inc., Announces Major COVID Testing Innovation | Zip06.com

        A local entrepreneur is announcing another technological innovation that will be an important tool in combating the COVID-19 pandemic. Detect, Inc., of Guilford, founded by National Medal of Technology and Innovation recipient Dr. Jonathan Rothberg, has created an accurate, fast, and easy-to-use PCR-quality molecular COVID-19 test, according to the company.

      • Digital Health Accelerators Boosting Local Companies | Los Angeles Business Journal

        Business accelerators have long been a crucial link for taking startups from the research and prototype stage to marketing and selling their products and services to customers. But until about six years ago, there were only a couple of accelerators to serve L.A.’s medical device and health tech industries — including one exclusively focused on medical devices for pediatric care.

        Starting in 2015, a pair of life science accelerators came onto the L.A. County scene seeking to serve the burgeoning health tech sector: Cedars-Sinai Accelerator in West Hollywood and MedTech Innovator in Westwood. They were soon joined by KidsX in East Hollywood — affiliated with Children’s Hospital Los Angeles and USC — and a program from the South Park-based Larta Institute known as Heal.LA, along with one incubator for health tech startups, ScaleHealth in Palms.

    • Integrity/Availability

      • Proprietary

        • India says not to preorder Starlink until it obtains a license

          “Public is advised not to subscribe to Starlink services being advertised,” a tweet from India’s Department of Telecommunications (DoT) reads. The DoT also says it asked Starlink to refrain from “booking / rendering the satellite internet services in India.” In other words, Starlink will have to put preorders on hold until it can get approval from the Indian government.

        • India tells public to shun Musk-backed Starlink until it gets licence

          A government statement issued late on Friday said Starlink had been told to comply with regulations and refrain from “booking/rendering the satellite internet services in India with immediate effect”.

        • GitHub is back online after a two-hour outage

          Microsoft-owned GitHub experienced a more than two-hour long outage today, affecting thousands or potentially millions of developers that rely on its many services. GitHub started experiencing issues at around 3:45PM ET, with Git operations, API requests, GitHub actions, packages, pages, and pull requests all affected.

        • Insurers run from ransomware cover as losses mount

          Faced with increased demand, major European and U.S. insurers and syndicates operating in the Lloyd’s of London market have been able to charge higher premium rates to cover ransoms, the repair of hacked networks, business interruption losses and even PR fees to mend reputational damage.

          But the increase in ransomware attacks and the growing sophistication of attackers have made insurers wary. Insurers say some attackers may even check whether potential victims have policies that would make them more likely to pay out.

        • Apple Grants Repair Indulgence for iPhones

          Save your huzzahs and whatever you do, do not pop the champagne. Apple did not just ‘cave’ to the right to repair movement, and the fight for an actual, legal right to repair is more important now than ever.

          The occasion for this reminder is, of course, the little-‘m’ momentous announcement by Apple this morning that it would make “Apple parts, tools, and manuals” available to “individual consumers” for self repair — starting with the iPhone 12 and iPhone 13.”

        • Montana high school hit by ransomware

          From their listing, Avos Locker is clearly aware that this is a tiny school district with only a few hundred students and less than two dozen teachers. And yet they are trying to ransom them. Avos writes: “If they refuse to negotiate, we will leak all the data we’ve got.”

        • Apple alerts journalists, activists about state-sponsored [cracking] attempts after NSO Group suit

          On the same day Apple announced a lawsuit against Israeli spyware vendor NSO Group for developing [cracking] tools to help breach iOS technology, the company was notifying potential targets of those exploits.

          El Faro, a news organization in San Salvador, El Salvador, reported late Tuesday that 12 of its staff members received notices from the company, which warned that that “Apple believes you are being targeted by state-sponsored attackers who are trying to remotely compromise the iPhone associated with your Apple ID.” The company also sent notices to four others in San Salvador who are “leaders of Civil Society organizations and opposition political parties,” the news organization reported.

        • Run a website off a Google Sheets Database, with Hugo

          Here’s how I built a website, Profilerpedia, using a Google Sheet as the backing database.

          Profilerpedia aims to map the profiling ecosystem and connect software with profilers and profilers with great analysis UIs, so we can make code faster and more efficient. More on Profilerpedia in the announcement post.

          It’s interesting to explain the architecture, because it challenges some engineering dogmas, like “a spreadsheet isn’t a good database”. I think running your site from a spreadsheet is a very reasonable pattern for many sites.

          The resulting architecture is my third or fourth attempt at this; I learned a lot along the way, I’m pretty happy with the result, and I want to share what I learned.

        • Boeing Missteps on 737 MAX Went Beyond Deadly Crashes That Killed 346, new Book Reveals

          When the first Boeing 737 MAX plane came off the production line in December 2015, it was the beginning of a highly anticipated new line of aircraft for the storied company. It incorporated the latest technology and was billed by Boeing as “deliver[ing] the highest efficiency, reliability and passenger comfort in the single-aisle market.” Tragically, that promise came to a glaring halt with two back-to-back disasters in which flight control software known as the Maneuvering Characteristics Augmentation System (MCAS) incorrectly gauged the aircrafts’ angles of ascent and prevented the pilots from manually overriding it. In total, 346 people on board Lion Air flight 610 on October 28, 2018 and Ethiopian Air flight 302 on March 10, 2019 were killed after only about 13 minutes and 6 minutes in the air, respectively.

        • Security

          • New Side-Channel Vulnerability in the Linux Kernel Enabling DNS Cache Poisoning

            A recent research paper by a team at University of California, Riverside, shows the existence of previously overlooked side channels in the Linux kernels that can be exploited to attack DNS servers.

            According to the researchers, the issue with DNS roots in its design, that never really took security as a key concern and that made it extremely hard to retrofit strong security features into it.

          • Reproducible Builds (diffoscope): diffoscope 194 released

            The diffoscope maintainers are pleased to announce the release of diffoscope version 194. This version includes the following changes:

            [ Chris Lamb ]
            * Don't traceback when comparing nested directories with non-directories.
              (Closes: reproducible-builds/diffoscope#288)
            

          • Thousands of printers at risk of denial of service attacks

            Researchers have highlighted a trio of potential attacks against printers that could allow denial of service, information theft, or botnet compromise.

            The collection of attacks, labeled Printjack, appeared in a paper from researchers Giampaolo Bella and Pietro Biondi at the Universit`a di Catania and Istituto di Informatica e Telematica in Italy.

          • Privacy/Surveillance

            • Opinion | Police Aerial Surveillance Threatens Freedom to Protest

              The ACLU of Northern California has concluded a year-long Freedom of Information campaign by uncovering massive spying on Black Lives Matter protests from the air. The California Highway Patrol directed aerial surveillance, mostly done by helicopters, over protests in Berkeley, Oakland, Palo Alto, Placerville, Riverside, Sacramento, San Francisco, and San Luis Obispo. The footage, which you can watch online, includes police zooming in on individual protestors, die-ins, and vigils for victims of police violence.

            • WhatsApp wins approval to double payments offering to 40 mln users in India: Source

              WhatsApp has won regulatory approval to double the number of users on its payments service in India to 40 million, a source with direct knowledge told Reuters on Friday.

              The company had requested that there should be no cap on users of its payment service in India.

              Instead, the National Payments Corporation of India (NPCI)this week told the company it could double the user base to which it can offer its payment service – currently restricted to 20 million – the source said.

              WhatsApp is owned by Facebook, which recently changed its name to Meta.

            • Transparency lawsuit against secret EU surveillance research: Judgement on 15 December in Luxembourg.

              The EU supported trials of the use of “artificial intelligence” at its borders by testing a “video lie detector” on travellers. On 15 March 2019, MEP and civil liberties activist Dr Patrick Breyer (Pirate Party) filed a lawsuit for the release of secret documents on the ethical justifiability, legality and the results of the technology. The European Court of Justice will deliver its judgement publicly in Luxembourg on 15 December 2021 (Case T-158/19). A landmark ruling could generally shed light on EU-funded „security research“.

            • Chat control, biometric surveillance, data retention: Major changes of Germany’s positions on EU digital policies

              Yesterday afternoon, the new German government coalition of SPD, FDP and the Greens presented its coalition agreement to the public. MEP, civil rights activist and lawyer Dr Patrick Breyer of the Pirate Party hails the new positions Germany is taking on EU digital policies: [...]

            • Confidentiality

              • no u pnp

                UPnP has sort of a bad reputation, and it’s very common in online conversations to see people repeating “disable UPnP” as stock advice. There is some reason for this, although the concern is mostly misguided. It’s still amusing, though, as it relates to the one tiny corner of UPnP functionality which has ever really had any success.

                Before we dig into that, though, we need some history.

              • GoDaddy says information on 1.2 million customers exposed in data breach

                In a document filed to the Securities and Exchange Commission on Monday, GoDaddy noted that the company had discovered its Managed WordPress hosting environment had been compromised by an “unauthorized third party,” resulting in emails and customers numbers of 1.2 million Managed WordPress users being exposed.

    • Defence/Aggression

    • Transparency/Investigative Reporting

    • Environment

    • Finance

      • Diaper Banks Are Filling a Need for Low-Income Families Whom Federal Aid Fails
      • Opinion | Why a Small Business-Centered Economy Is Critical Right Now

        On Small Business Saturday, it’s a day not only to shop small and local but also to reflect on how we can better support small businesses and our local economy for the long term. 

      • No tax and chill: Netflix’s offshore network – TaxWatch

        Facebook, Amazon and Google, have all received a significant amount of scrutiny in recent years about their tax affairs, but the last of the FANG group of companies, Netflix, has not.

        One reason for this could be that that Netflix has historically not been as profitable as other digital companies, as it has spent large amounts of money building an international presence and buying film rights. However, recent years have seen the company’s profits rocket, from $123m in 2015, to $1.2bn in 2018.

        In this report, we provide an analysis of Netflix’s corporate structure which shows that the company has implemented a similar tax avoidance structure to many other multi-national companies operating in the digital space. Revenues are not collected in the country where they are made. Instead, customers are charged from an offshore company. Profits appear to then be moved from the hub company to a tax haven through the use of intra-company transactions.

        Netflix’s historically lower profit margins mean that the scale of any tax avoidance will be much lower than other well known companies that employ similar tactics.

        However, the structure that the company operates presents a significant risk factor for the tax base of many countries as the company expands its presence, increases market share and sees an increase in profits.

        In total, we estimate that the company moved between $327.8m to $430m in profits to low tax jurisdictions from its international operations.
        Netflix also presents another issue particular to the film and television world, which is the way in which it is able to attract tax credits. The company is now ramping up production of original content in the UK, and it is likely that this will attract substantial subsidies from the UK taxpayer. Indeed, recently the company said that it is spending over £400m making original content in the UK this year, which means that it is likely to be eligible for tens of millions of pounds in tax relief when it next reports its UK accounts.

        This demonstrates a significant loophole when it comes to the administration of tax credits for multinational companies, which can take advantage of credits by locating costs in the jurisdictions where they are on offer, whilst at the same time putting their revenues somewhere else entirely.

      • Food delivery drivers question gig platforms’ safety nets

        From leg amputations in Thailand to hijackings in Nigeria, millions of food delivery drivers around the world find themselves torn between the desperation to make a living and the fear that each ride may be their last.

        The gig economy has surged during the COVID-19 pandemic and brought with it a wave of concerns from drivers and researchers who say that dangerous roads and inadequate safety equipment and training are putting lives on the line daily.

        By 2020 there were at least 777 digital labour platforms – from food delivery to web design – around the world, up from about 140 a decade earlier, according to the International Labour Organization (ILO).

      • Nearly 30,000 borrowers awarded Public Service Loan Forgiveness so far under new rules

        Katherine Rickfelder, a Florida public school teacher, is one of nearly 30,000 people who have seen their student debt balance reduced to zero since the federal government announced significant changes to a popular loan forgiveness program last month.

        “I cried when I got the letter. I honestly feel like I can finally breathe again,” said Rickfelder, who had another five years of payments to make under the old rules of the Public Service Loan Forgiveness program. She started paying off her student debt about 16 years ago.

        The letter, which she received from the US Department of Education in October, said that she would get credit for 91 additional monthly payments she had made on her student loans. That meant that she had already made more than the 120 payments required for debt forgiveness under the PSLF program, which is aimed at borrowers working in government and nonprofit sectors.

      • Creating more climate change billionaires

        The reason why the Moderna billionaires might be especially upsetting is that so much of what they did was with government funding. The development of mRNA technology, beginning in the early 1980s, was accomplished almost entirely on the government’s dime.

    • AstroTurf/Lobbying/Politics

      • Incident reporting, ransomware payment legislation faces trouble in Senate

        Legislation requiring critical infrastructure owners to report major cyber incidents to the federal government, and mandating that ransomware victims disclose when they make payments, has hit a significant snag in the Senate.

        A bipartisan group of senators announced a proposal in November that would require critical infrastructure owners and operators to report within 72 hours to the Department of Homeland Security’s Cybersecurity and Infrastructure Agency when they suffer major cyber incidents, as defined by CISA. It also would require reporting of ransomware payments to CISA from a broader set of organizations, excluding only individuals and some smaller businesses, within 24 hours.

      • Imagine Not Living in Big Tech’s World

        I want to flash back to the rise and fall of a once popular storytelling website called Upworthy. It is one of a zillion examples of the power of Facebook and other technology superstars to make or break other companies’ dreams.

      • 193 countries adopt first-ever global agreement on the Ethics of Artificial Intelligence

        “The world needs rules for artificial intelligence to benefit humanity. The Recommendation on the ethics of AI is a major answer. It sets the first global normative framework while giving States the responsibility to apply it at their level. UNESCO will support its 193 Member states in its implementation and ask them to report regularly on their progress and practices”, said UNESCO chief Audrey Azoulay.

      • UNESCO member states adopt first global agreement on AI ethics

        Participants will consider how AI governance and innovation networks can be enhanced to direct AI towards the common good in education, and for humanity.

      • [Old] Open Source Software in Government: Challenges and Opportunities. August 2013

        This document identifies key challenges and opportunities in the government application of Open Source Software (OSS), as reported in interviews of experts, suppliers, and potential users. There are many challenges to the collaborative development and use of such software in the government. To maximize the use of limited resources, the U.S. government must address these challenges, which can be grouped into categories such as: inertia, fears about low quality and malware, concerns about commercial support, procurement issues, and certification and accreditation (C&A) issues. Interviewees reported a critical need for OSS guidance and education. Specific interviewee recommendations included requiring that software and C&A materials developed with government funding be developed collaboratively and widely shared, that the government receive full data rights for such material, and that the government release such software as OSS by default.

      • Christian nurses’ bail ‘kept secret’ in blasphemy case to protect women from radical Islamist attacks

        In April, Police in Punjab province arrested nurse Maryam Lal and third-year nursing student Navish Arooj on blasphemy charges after staff at Civil Hospital in Faisalabad city accused them of removing a sticker from a cupboard that had a verse from the Quran written on it. One of the nurses was allegedly attacked by a knife-wielding Muslim colleague.

      • Opinion | Nicholas Kristof: Celebrate the season by changing someone’s life – The Washington Post

        For years, as a columnist for the New York Times, I wrote an annual giving guide, which in 2019 and 2020 included Holiday Impact awards. I recently resigned from that job to run for governor in Oregon, but I wanted to continue the tradition.

    • Misinformation/Disinformation

      • Behind the Tweet That Became the Rallying Cry for the Insurrection – Mother Jones

        The city was a Democratic stronghold in a state Trump won to secure the presidency in 2016 and needed to win again to remain in the White House. It was also a city long dogged by Republican accusations of election fraud. Will Chamberlain had driven up from Washington, DC, to chase these allegations as a last-minute volunteer with the group Lawyers for Trump.

        But Chamberlain wasn’t merely a lawyer. Although he had briefly worked at a commercial litigation firm in Los Angeles after passing the bar, he left that job in the spring of 2016, moved to DC, and spent the Trump years running MAGA Meetups, relaunching a right-wing magazine, and generally reinventing himself as a pro-Trump social media figure. When the campaign realized he had roughly 150,000 followers on Twitter, his role changed. “They figured out I’d be more useful doing stuff that wasn’t just legal,” Chamberlain told me.

    • Censorship/Free Speech

      • What people miss in the conversation about banned books

        How should parents react to this news, and to the books their children are reading? NPR senior editor Barrie Hardymon and Traci Thomas, host of The Stacks podcast, joined guest host Ayesha Rascoe to talk about banned book lists.

        The three talk about why it’s important for kids to discover books freely, even if that means starting a hard conversation with them. They also discuss their favorite — and least favorite — books that often show up on banned book lists.

      • Internet disruption registered in Iran amid water protests

        The disruption registered in the southwestern city of Ahvaz comes amid protests against government water management policies which have centered around Isfahan, where outages have also been reported by users.

      • [Old] Renowned DJ Zedd “Permanently Banned” From China for Liking a ‘South Park’ Tweet

        Born Anton Zaslavski, the Russian-German DJ and music producer made the announcement via social media. He has 8.1 million followers on Twitter alone.

        “I just got permanently banned from China because I liked a @SouthPark tweet,” Zedd said via a tweet.

        His reps confirmed to CNBC Zedd was notified he was banned from the country.

      • [Old] Katy Perry Has Reportedly Been Banned from Entering China for Wearing This Dress

        Sources told the site that Perry, 33, had applied for a visa but was denied by Chinese officials. Page Sixreports that the singer was informed she’d be granted access, but that changed after the government became aware of a sunflower dress she had worn during a performance in Taipei, Taiwan, in 2015.

        The look had caused controversy because the sunflower was the key symbol of a 2014 movement that protested a Chinese trade agreement that was seen as unfair to Taiwan. At one point of the concert, Perry also draped a Taiwanese flag over her shoulders. Though it might not have been her intention, the outfit and the flag-waving was seen as a politically charged gesture and caused uproar in China, which has had long-running tensions with Taiwan regarding its independence.

      • The Taliban destroyed Afghanistan’s ancient Buddha statues. Now they’re welcoming tourists.

        For around $5, curious visitors can wander around and take photos of the giant holes in the cliff face where the ancient Buddha statues once stood.

      • Canadian school cancels ISIS survivor Nadia Murad over Islamophobia fears

        Murad advocates for survivors of genocide and sexual violence and is also a Nobel Peace Prize Laureate and UN Goodwill Ambassador.

        Murad’s book tells how she escaped the Islamic State after being taken from her home and sold into sexual slavery when she was just 14.

        Murad details how she was raped and tortured before finding her way to a refugee camp in Durhok, in northern Iraq, and then to Germany, where she lives today.

      • School pulls event with former Islamic State sex slave over fears it would ‘foster Islamophobia’

        Helen Fisher, the superintendent at the Toronto District School Board, voiced her concerns over Ms Murad’s ‘The Last Girl: My Story of Captivity, and My Fight Against the Islamic State’ and said that her students would not participate in a sit-down event with the author scheduled for February.

      • FATAH: The outrageous censorship of Nadia Murad

        For many of us who have followed the mass murder of the Yazidi people of Iraq and have marvelled at the courage of Murad, the TDSB decision came as a shock. It reeked of ignorance and subservience to an Islamist attitude that has infiltrated too many institutions of Canada, especially urban schools where cafeterias have been turned into prayer halls, with gender apartheid on full display.

        Shocked by the exchange with Helen Fisher, Tanya Lee says she then sent her an email containing detailed information on the Islamic organization, coming from the BBC and CNN.

      • School Cancels Former ‘ISIS Sex Slave’ Nadia Murad’s Event Over Fears of ‘Offending Muslims’

        Nadia was all set to discuss her book with the students of TDSB, however, the school board president Helen Fisher pulled the event, claiming that Nadia’s book might promote ‘Islamophobia’ amongst the students. Fisher issued an apology for the act as well.

      • School shuts down after cops get mad over student project about “V for Vendetta”

        Katey O’Connor, a teacher at Muncie Central High School, had her students read V for Vendetta, the classic graphic novel by Alan Moore and David Lloyd, and create some posters reflecting on how the ideological mission of the eponymous V from the book might relate to current real-life social conditions.

        In the book, V is a queer anarchist who openly admits that he’s doing terrorism as performance art in the name of anti-fascist liberation. He is fighting against a racist, sexist, homophobic authoritarian government.

    • Freedom of Information/Freedom of the Press

      • “A Lot of Mistakes”: The Guardian and Julian Assange

        In 1921, the Manchester Guardian’s editor, Charles Prestwich Scott, marked the newspaper’s centenary with an essay entitled “A Hundred Years.” In it, Scott declared that a newspaper’s “primary office is the gathering of news. …Comment is free, but facts are sacred.”

      • Stella Moris on fiancé Julian Assange: ‘This isn’t about him, it’s about press freedom’

        The result of Assange’s appeal should be known by Christmas (though he will not be immediately released unless America formally drops its case). In the meantime, Moris, 38, has been fighting a second battle. After our meeting, she is rushing straight off to meet her lawyer about their legal action against the deputy prime minister Dominic Raab and the Belmarsh prison governor, who she claims were blocking her and Assange from getting married inside the prison. Just hours later, the news she has been battling for comes through: after five years of trying, she and the Australian-born whistleblower have been granted permission to marry. Moris is relieved that “reason has prevailed” in her marriage battle, calling the delays a “completely outrageous and illegal interference in [their] private lives”.

    • Civil Rights/Policing

      • Starbucks Is Swarming Buffalo-Area Shops With Top Execs to Quash Union Drive
      • A Unionization Wave Is Reshaping Museums and Cultural Institutions Across the US
      • No Dogs Allowed? Iran Considers Nationwide Ban On ‘Dangerous, Harmful’ Pets

        The authorities have attempted to introduce similar restrictions against household animals in recent years as the ownership of dogs and other pets has become more popular despite the clerical establishment’s arguments that keeping them inside homes is unhygienic and un-Islamic. Instances of people being attacked by stray dogs have also fueled calls for restrictions.

        But while previous attempts to curtail pet ownership through local bans on dog walking and transportation have largely failed or met resistance, the latest proposal would be nationwide and comes as hard-liners increase their influence following the election of ultraconservative President Ebrahim Raisi in June.

      • Unions are finally fighting two-tier contracts

        What’s a two-tier contract? Just what it sounds like: management offers the union concessions on its key demands, but only for current workers. Future workers get a worse deal.

        Management’s theory is that workers may have solidarity with one another, but not with workers who haven’t even been hired yet, and that a two-tier contract will lead to an ever-expanding cohort of workers who pay full union dues but don’t get full union benefits. Thus, over the span of years, the union will get weaker and weaker, and eventually it will be too weak to stand up for any of its workers – even the top-tier workers, who will see all those gains clawed back in future negotiations.

      • RCMP still clearing Indigenous lands for corporate interests

        Media couldn’t access the raw footage taken by filmmaker Michael Toledano until he and journalist Amber Bracken were released from prison days later. Even though the pair had identified themselves as journalists, the RCMP jailed them anyway. When they were released three days later, we then saw the dramatic arrest of unarmed land defenders at gunpoint.

      • Turkish police tear-gas women protesting over violence

        Turkish police on Thursday fired tear gas to break up a protest in Istanbul by women demanding the country’s return to a landmark international treaty, signed in the same city, that is meant to protect women from violence.

      • France: Muslim stabs his sister’s boyfriend for not being Muslim

        It was the eve of Valentine’s Day in 2020. Inès and Sébastien, two young people from Colombes in the middle of a love affair, were planning to celebrate the day of lovers. But Inès’ brother, who viewed his sister’s relationship with suspicion, would not allow it. On this February 13, he stabbed Sébastien with a knife and is now on trial before the jury court of the Hauts-de-Seine department.Le PArisien.

      • Suspected Boko Haram Terrorists Abduct 22 Girls For Marriage In Niger State

        The gunmen allegedly told the villagers that they were going to marry the girls. A community leader who spoke on condition of anonymity said they had earlier informed them that the girls should be withdrawn from the school because they would come to marry them, adding that they were surprised that the terrorists came yesterday (Thursday) to pick up the girls without any security check. He said the group leader, identified as Malam Sadiku led several operations in the area, preaching weird Islamic ideology unhindered for several months.

      • Outcry After Iran ‘Shocking’ Execution Of Young Murder Convict

        It described his sentencing in December 2015 as being the result of “a grossly unfair trial” by a court that “relied on torture-tainted ‘confessions’”.

        Mahmood Amiry Moghaddam, head of Oslo-based NGO Iran Human Rights (IHR) which monitors executions in Iran, described Abdolali’s execution as an “international crime”.

      • Iran: Execution of juvenile offender ‘deeply alarming and shocking’

        OHCHR expressed serious concern that his case follows the pattern of child offenders being convicted after a flawed trial and on the basis of forced confessions.

        “It is deeply alarming and shocking that his hanging went ahead, despite interventions by numerous parties on the case, including direct engagement by the UN Human Rights Office with the Government of Iran,” Spokesperson Liz Throssell said in a statement.

    • Internet Policy/Net Neutrality

      • Can a Free Internet Survive?

        Says John Arquilla, Distinguished Professor Emeritus of Defense Analysis at the U.S. Naval Postgraduate School, “There’s a growing emphasis among some governments to curtail political freedom by using the Internet and social media to control thought and action.”

        Out of Control

        Internet freedom is eroding on two fronts: the sheer number of efforts to block access to legitimate information, and the level of sophistication used. According to Access Now, an organization that says it “defends and extends the digital rights of users at risk around the world,” 850 intentional shutdowns have taken place over the last decade, with 768 of these events occurring over the last five years.

      • EU [Internet] regulation to push Facebook to sanitise Metaverse platforms

        The proposed DSA aims to keep users safe from illegal goods, content or services and protect their fundamental rights online, on the principle that what is illegal offline should also be illegal online.

    • Monopolies

      • EU companies issue formal complaint against Microsoft OneDrive Windows integration

        Remember how Microsoft spent years in hot water in the late ’90s and early ’00s by forcing Internet Explorer on its customers? European open-source cloud company Nextcloud does.

        Now, with a coalition of other European Union (EU) software and cloud organizations and companies called the “Coalition for a Level Playing Field,” Nextcloud has formally complained to the European Commission (EC) about Microsoft’s anti-competitive behavior by aggressively bundling its OneDrive cloud, Teams, and other services with Windows 10 and 11.

      • Microsoft Weekly: Defender for the win, trouble with Nextcloud, and ARM exclusivity

        Microsoft seems to have found itself in a bit of bother at the European Union (EU). This is due to a Nextcloud-led coalition that has filed a complaint against the Redmond tech firm for anti-competitive behavior. Other notable members of the coalition include Tutanota, OnlyOffice, Free Software Foundation Europe, The Document Foundation, and European Digital SME Alliance.

        Together, these parties claim that Microsoft is bundling its 365 services such as OneDrive and Teams natively into Windows and is shipping the OS with them installed by default. According to the group, this pushes users to Microsoft’s bundled software rather than third-party alternatives. As of now, the challenging party’s demands include Microsoft unbundling its software from Windows and adopting open standards that makes it easier for users to switch software. The issue is still evolving so do keep an eye out on our coverage.

        In related news, the German state of Schleswig-Holstein has announced that it is shifting 25,000 government machines running Windows to open-source alternatives like Linux by the end of 2026. This will be a multi-step process initially involving migrating to LibreOffice from Microsoft Office, and then switching to Linux entirely. One of the reasons being cited for this massive transition is licensing costs. It is important to note that Munich city attempted the same a few years ago but the experiment eventually failed, with the government going back to Windows in 2015.

      • Patents

        • Innovation from myFC approved by the European Patent Office – electrochemically operated valves optimize fuel cells [Ed: EPO grants loads of junk patents these days, so does this merit a press release?]

          The European Patent Office announces that myFC has one of its patents approved in several countries. With the help of the electrochemically operated valve that the patent protects, it is possible to distribute the hydrogen gas individually to the fuel cells.

        • UPC favourites: French and German judges dominate [Ed: Mathieu Klo publishes fake news for Team UPC to promote the illusion of UPC being inevitable; JUVE became “lying press”]

          The Unified Patent Court has already defied many a problem in its now more than 10-year development phase. Years of bitter wrangling over new procedural rules, Brexit and two constitutional complaints in Germany put extreme strain on the nerves of UPC officials and patent experts worldwide. Last Friday, the Austrian Parliament voted in favour of the ratification of the protocol on the provisional agreement (PAP) in its first reading.

        • Austria will most likely trigger start of preparatory phase Unified Patent Court [Ed: No, Kluwer, Austria is not in the UK. UPC can only even progress by breaking the law, which will cause a major lawsuit.]

          Austria will most likely become the member state which will trigger the start of the preparatory phase of the Unitary Patent project. Last Friday the National Council, one of the chambers of its parliament, unanimously approved draft legislation enabling Austria to ratify Protocol for Provisional Application (PPA) of the Unified Patent Court Agreement.

        • Software Patents

          • Peloton sues Lululemon in battle over patent infringement claims

            Peloton Interactive, Inc., is urging a court to say that its sportswear does not infringe on Lululemon’s patent designs by filing a lawsuit against the athletic wear brand earlier this week.

          • German Federal Patent Court confirms Zoe Life software patent [Ed: Well, software patents are not legal, but a corrupted and bribed system ceases to care about legality, it bends to lobbying]

            Until now, controversy has surrounded the enforceability of software patents. But a ruling by the German Federal Patent Court has fully upheld investor Zoe Life’s key patent on cloud computing. This marks a success for the software patent industry.

      • Copyrights

        • Virgin Media ‘Pirates’ Told They’re Also Liable For Other People’s Movie Piracy

          Virgin Media subscribers who responded to letters accusing them of piracy are now getting feedback from movie company lawyers in the UK. While initial feedback suggested that alleged pirates could be on the hook for potentially thousands in damages, it now appears the movie company is taking a broader view of the situation. Whether such claims will hold up in court remains to be seen.

        • The film industry effectively solved the problem of unauthorised downloads; now it is “unsolving” it…

          There’s no doubt that the introduction of good-value streaming services like Spotify has meant that many people have stopped turning to unauthorised sources. Separate research from 2012, 2013 and 2014 showed this unequivocally: unauthorised music downloads were cut by 20% to 50% when good legal alternatives were available in a country. What’s sad is that having effectively solved the piracy problem through fairly-priced, simple-to-use services offering nearly everything in one package, the film industry is now “unsolving” it by increasing prices unreasonably, and forcing people to subscribe to multiple, fragmented services in order to access the range of material they want.

        • Why Michael Moorcock’s Elric of Melniboné is getting a game after 60 years

          Hillborg said he inquired about the rights to Elric a couple of years ago after a chance conversation triggered the idea. He was told at the time that the ancillary rights to the video game were tied up in a movie license that failed to come through. But a year ago, he was contacted again by Moorcock’s agent, who said the rights to a game were now available.

          Over time, Elric has become a huge part of fantasy culture. The band Blue Oyster Cult made songs about Elric. The Finnish version of Dungeons in Dragons in the 1980s had Elric’s sword, Stormbringer, on its cover. Elric has also been drawn countless times. (Hillborg said he wasn’t yet ready to talk about the game’s art style, but he said the contributions of fans have been amazing.)

          Stockholm, Sweden-based Runatyr will work with development collective Aurora Punks and United Kingdom-based studio Upstream Arcade on the project. The independent-focused companies hope to ship a narrative action computer game in 2024.

        • Can Nigeria lead the way in modernising outdated copyright laws through expanded exceptions?

          The second paragraph above raises an important point. Nigeria’s new copyright law may well serve as a template for the MINT nations, and other rising economies, as they revise their old laws in this domain. If Nigeria brings in wide-ranging copyright exceptions, they could ripple through dozens of legal systems as governments follow suit. Indeed, if Statista’s prediction that Nigeria’s population will reach 400 million in 2050 is correct, it is possible that the country will emerge as one of the trendsetters in copyright law not just for those countries, but for the entire world. Getting it right now is therefore of critical importance.

        • In response to NFT debate

          At CC, we pride ourselves on raising issues thoughtfully and often share articles on our platforms about the digital space where we work. Many times CC staff will expand on these topics through our blog, to provide a perspective that reflects CC’s experiences around our work to support, steward and provide legal and technical assistance for the maximization of digital creativity, innovation and sharing. It is our hope that this open space of conversation will generate different viewpoints and promote civil debate. 

IRC Proceedings: Saturday, November 27, 2021

Posted in IRC Logs at 2:33 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmTxQWgRfqea9HvrhzrDcuEqnoSci41Zp9P99jVrYFHhPs IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmcuRrqEuDo7FNL7pxim1RHZEfnQyZV7rJLMFLhpFjiN98 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmPqpGghsFb1P5nAYKGLTyThyi63p6Cxfa7YyM7WBuKqjX IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmRak8TjLxD2HdDG6rzP3rapc7KdyTp39zMkCy4epEC9Ci IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 Qmd3rgqEQ2qZGmW2qHc36V1UBSHH9vLBvScb9pyhgGEbG1 IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmQHNuyPMgxSX6kPsi6YpChvS4Gavfwej6rCTh1jY1Yzq4 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmXkHyYxZNQC7nGwKwFiEqtNpR7pJNNLeEFyPyygL9p98X IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmePj5szLJ7bqYbmodVqPTejx1Ukp5yTskKSJ99UqZuWVc IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmUKBswRXMsDq5RCK5eUe68NysKpHtQ9EhcoUWes6WJbtG

11.27.21

Links 27/11/2021: Nvidia’s DLSS Hype and Why GNU/Linux Matters

Posted in News Roundup at 4:35 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • What Is Linux and Why Is It Important?

        Linux is technically not a desktop operating system, but a kernel. The kernel is the part of your computer that enables physical hardware to communicate with what’s on-screen. The kernel is the reason text appears when you type, the cursor moves when you stroke the touchpad, and images appear on your monitor.

        In the early days of computing, programmers freely shared code and programs. This started to change when corporate entities like IBM, Apple, and Microsoft started to release copyrighted code that users couldn’t view and came with restrictions on use. In response, the GNU Project was formed as an effort to create a fully functional computer powered by software that was still freely shared and distributed.

    • Server

    • Audiocasts/Shows

    • Kernel Space

      • Futex2 Brings Linux Gaming To The Next Level – Invidious

        Futex2 has been a work in progress by Valve and collabora for a very long time and it seems like it’s finally going to make it’s way into the kernel.

      • Patch out for Alder Lake Linux bug that reminds of the Windows 11 Ryzen CPPC issue – Neowin

        Linux boss Linus Torvalds merged earlier today several important patches for Intel CPU generally related to performance states (P-states) on Linux.

      • Linux 5.16 Merges Fix For One Of The Intel Alder Lake Issues – Phoronix

        Merged this Friday afternoon into the Linux 5.16 development kernel is fixing a performance issue affecting some Intel Alder Lake motherboards.

        The fix merged a short time ago is the item previously covered within Linux ITMT Patch Fixes Intel “Alder Lake” Hybrid Handling For Some Systems.

        As explained in that prior article, TurboBoost Max 3.0 / ITMT (Turbo Boost Max Technology) code within the kernel isn’t being enabled for some systems, particularly if overclocking or even any memory XMP / optimal settings. The ASUS Z690 board I’ve been primarily using for the i9-12900K was affected as are numerous other boards. I’ve also heard reports of some motherboards running purely stock are even having this issue.

      • Intel Preparing USI Stylus Support For Linux – Phoronix

        Intel open-source driver engineers have been working on USI stylus support for the Linux kernel. The Universal Stylus Initiative (USI) aims to offer interoperability of active styluses across touchscreen devices.

        The Universal Stylus Initiative has a goal of allowing all styluses that comply with USI to work across devices. USI is backed by the likes of Google who wants to see USI working uniformally across Chromebooks, Dell and other hardware vendors, Intel is also involved and leading the upstream Linux support patches, and peripheral vendors like Logitech are also supporting the standard. Other big names like Wacom, Samsung, and many other players from desktop to laptops to mobile.

      • Graphics Stack

        • RenderDoc 1.17 Released For This Leading Open-Source Graphics Debugging Tool – Phoronix

          RenderDoc 1.17 released this week as the newest version of this leading cross-platform, cross-API graphics debugging utility.

          RendertDoc 1.17 continues to be a gem for developers working with Vulkan and OpenGL along with Direct3D 11/12. RenderDoc as the MIT-licensed frame-capture-based graphics debugger works extremely well for game/engine developers as well as GPU driver developers in working through different issues.

        • DMA-BUF Feedback Support For Wayland Lands In Mesa 22.0′s EGL Code – Phoronix

          Landing in Mesa on Black Friday was DMA-BUF Feedback support within the EGL code as another important step forward for Wayland.

          Introduced earlier this week was Wayland Protocols 1.24 and the primary addition to that collection of protocols is DMA-BUF feedback support. The DMA-BUF “feedback” support is important for Wayland multi-GPU systems where needing to know more information about the GPU device used by the compositor and for being able to efficiently exchange buffers between the secondary and primary GPUs.

        • RADV Vulkan Driver Finally Adds VK_KHR_synchronization2 Support – Phoronix

          The Mesa Radeon Vulkan driver “RADV” has added support for the prominent VK_KHR_synchronization2 extension introduced earlier this year.

          Added back in February with Vulkan 1.2.170 was VK_KHR_synchronization2 for simplifying the core synchronization APIs of this industry-standard graphics API. VK_KHR_synchronization2 makes Vulkan synchronization handling easier to deal with Those interested in the changes with the “synchronization2″ revision can see this Khronos blog post going over the Vulkan synchronization handling in detail along with the changes from this extension.

    • Applications

      • Best Free and Open Source Alternatives to Corel WinZip

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

      • Wireshark 3.6.0 Network Protocol Analysis Software Released

        Recently, Wireshark has released a new version of its free and open-source packet analyzer, Wireshark 3.6.0, with all new features and protocols.

        Originally known as Ethereal, Wireshark has developed a reputation as one of the most reliable network protocol analyzers available out there. It captures packets in real time and display them in human-readable format.

        Wireshark is absolutely safe to use. Government agencies, corporations, non-profits, and educational institutions use Wireshark for troubleshooting and teaching purposes. Probably, there isn’t a better way to learn networking than to look at the traffic under the Wireshark microscope.

        On the other side, there are questions about the legality of Wireshark since it is a powerful packet sniffer. It captures network traffic on the local network and stores that data for offline analysis. Therefore, you should only use Wireshark on networks where you have permission to inspect network packets.

    • Instructionals/Technical

      • How To Install AMD Radeon Driver on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install AMD Radeon Driver on Ubuntu 20.04 LTS. For those of you who didn’t know, Installing AMD Radeon drivers on the Ubuntu system is an easy task that can be done in less than a minute. Radeon driver is needed by your AMD Radeon Graphics GPU to function with better performance. Some Linux distributions offer the proprietary driver pre-packaged as part of its standard package repository making the entire AMD Radeon Linux Driver procedure extremely easy to follow.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FreeOffice on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • What you need to know about disks and disk partitions in Linux – LinuxBSDos.com

        This is an update to A beginner’s guide to disks and disk partitions in Linux, which itself was an update to Guide to disks and disk partitions in Linux. It is intended to be an absolute beginner’s guide to understanding how disks and disk partitions are handled in Linux. This update adds info on NVMe SSDs.

        If you are migrating from Windows to Linux and are attempting to install any Linux distribution alongside Windows 10/11 on your computer, this article should come in handy. You’ll read about hard drive naming convention in Linux, how they are partitioned, partition tables, file systems and mount points.

        By the time you are through reading this, you should have a pretty good idea of what you are doing when installing your next Linux distribution on your laptop or desktop computer. An understanding of all the aspects concerning how a disk is referenced and partitioned will put you in a better position to troubleshoot installation and disk-related problems. Most of the highly technical terms associated with this subject have been omitted, so this should be an easy read.

      • How To Install PrestaShop on Debian 11 – idroot

        In this tutorial, we will show you how to install PrestaShop on Debian 11. For those of you who didn’t know, PrestaShop is a freemium, open-source e-commerce software. It lets you start your own online store with secure payments, multiple shipping methods, custom themes, and more. PrestaShop written in PHP is highly customizable, supports all the major payment services, is translated in many languages and localized for many countries, has a fully responsive design (both front and back-office), etc.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of PrestaShop e-commerce software on a Debian 11 (Bullseye).

      • How to Install Asterisk VoIP Server on Debian 11 | 10 – Linux Shout

        In this tutorial, we will discuss some of the steps and commands to install the Asterisk VoIP server on Debian 11 Bullseye or 10 Buster using the terminal to call over Android or iPhone using a local network.

      • How to install Docker-ce on Ubuntu 21.10 – NextGenTips

        In this tutorial am going to show you how you can install Docker-ce on Ubuntu 21.10.

        Docker is a set of platform as a service product that uses OS-level virtualization to deliver software in packages called containers. Containers are usually isolated from one another and bundled their own software libraries and configuration files, they can communicate with each other through well-defined channels.

        Docker makes it possible to get more apps running on the same old servers and also makes it easy to package and ship programs.

      • How to Uninstall Software On Ubuntu

        Regardless of the operating system you are using; there are multiple reasons why you might want to uninstall software. Maybe the software has become corrupted, and it doesn’t function the same as before, or your application is now virus-ridden, so uninstalling it is safe. There are times when you don’t use the software anymore, so you uninstall it to make space.

        We all know that Ubuntu and other Linux distros are different from the commonly used Windows. Users migrating from Windows to Ubuntu can find it hard navigating even the basic stuff. Uninstalling software can be tricky, so this article will help you understand the different ways you can bin software in Ubuntu.

      • How to Mount USB Drive on Linux

        We live in the modern age of technology where there are multiple important variables to keep track of. But arguably, the biggest variable today is “data”. With some maturing and emerging technologies, everything is being centered around the quantity and quality of data. Thus, gathering and protecting data has become paramount.

        These days, it’s quite common to see people carrying their data around at all times. Different devices and technologies are used for this purpose, including a certain device called USB (Universal Serial Bus).

        A USB is an electronic communication protocol (ECP) most commonly used for computer accessories and other small-end electronic devices, either for data transfer or power transfer. Although USBs are being phased out slowly due to technologies such as “Cloud Computing”, there is a sense of privacy and security with using USBs that you don’t get with other methods.

        Accessing USBs is straightforward. It is a plug-and-use device, so the stick only needs to be connected to your computer via a USB port. Usually, USBs mount themselves automatically to your system regardless of the operating system, but there are instances where there is a problem, and the USB refuses to connect.

        For such times, if you are using a Linux distro, it is best to use the Terminal and execute your way to mount the USB in your computer. This article will be guiding you on how exactly you can achieve this task.

        Although it is time-consuming, once you know how to mount a USB in Linux, you will feel lightened, and it will be easier for you to perform it the next time when needed. So follow these instructions to get a proper hang of it.

      • How do I change my homepage in WordPress?

        This brief tutorial explains how to change the homepage in WordPress.
        After reading this tutorial, you’ll learn the two common ways to define your website homepage by editing WordPress settings. This article also includes instructions to create a new page to set as a homepage or a posts page if you have not created a home page.

        All steps described in this tutorial include real screenshots and can be followed by any WordPress level user.

      • How do I Rename a Column in MySQL?

        MySQL is a popular database management system that provides the backbone for a huge portion of today’s internet. Developed and maintained by Oracle, MySQL is an open-source RDBMS (relational database management system) with a client-server model. It offers secure database storage, fast performance, and powerful features.

        This guide will showcase how to rename a column in MySQL.

      • What Are Environment Variables in Linux? Everything You Need to Know

        If you’ve been using Linux for a while, you may be wondering how to set certain parameters from the command line that can keep your settings across programs. Environment variables are how you do this.

        By the end, you’ll have a deep understanding of what environment variables are, and how you can create such variables from the command line.

      • SysMonTask – SparkyLinux

        There is a new application available for Sparkers: SysMonTask

    • Games

      • Godot Engine – Multiplayer in Godot 4.0: Scene Replication (part 1)

        It’s finally time for the long-awaited post about the new multiplayer replication system that is being developed for Godot 4.0. Below, we will introduce the concepts around which it was designed, the currently implemented prototype, and planned changes to make it more powerful and user-friendly.

        Design goals

        Making multiplayer games has historically been a complex task, requiring ad-hoc optimizations and game-specific solutions. Still, two main concepts are almost ubiquitous in multiplayer games: some form of messaging, and some form of state replication (synchronization and reconciliation).

        While Godot does provide a system for messaging (i.e. RPC), it does not provide a common system for replication.

        In this sense, we had quite a few #networking meetings in August 2021 to design a replication API that could be used for the common cases, while being extensible via plugins or custom code.

      • Proton 6.3-8 supports DLSS via DirectX 11 and 12 – LinuxStoney

        Competition has forced NVIDIA to take better care of the Linux desktop, a market in which it has traditionally swept by idling due to its rivals failing to do better. Luckily, the appearance of FidelityFX Super Resolution and the proximity of dedicated graphics from Intel and XeSS forced the green giant to move forward to bring DLSS to Proton, adopt Wayland standards and even publish as its rescaling technology Open Source .

        Now, with the release of Proton 6.3-8 (the latest version of the stable branch), Linux users can officially run DLSS via DirectX 11 and 12 , whose instructions are translated into Vulkan via DXVK and VKD3D respectively. To make use of this support, in the launch parameters of the game you have to put PROTON_USE_WINED3D=1 %command%, while in the file ‘ dxvk.conf ‘ you have to set the option ‘dxgi.nvapiHack’ to False ( dxgi.nvapiHack = False).

        Regarding Windows games that use Vulkan natively, such as DOOM Eternal, No Man’s Sky and Wolfenstein: Youngblood, NVIDIA already said at the time that they can make use of DLSS , its well-known supersampling technology supported by Artificial Intelligence. which is responsible for reducing the performance impact caused by ray tracing and opening the door to consolidate 4K and 8K resolutions in PC video games.

      • Nvidia’s DLSS Has Come To Linux Gaming

        Years after its failed Steam Machines, Valve is slowly but surely improving the state of Linux gaming.

      • Nvidia’s DLSS has come to Linux gaming (but not the Steam Deck obviously)

        Years after its failed Steam Machines, Valve is slowly but surely improving the state of Linux gaming. The company’s upcoming Steam Deck handheld runs atop Linux, and its Proton compatibility layer lets it — and other computers — play Windows games as well. Now, Valve has officially added support for Nvidia’s DLSS machine learning temporal upscaling technique to Proton, potentially bringing big FPS boosts and less flicker in games that support the technology.

      • NVIDIA DLSS Landing On Proton Is A Win For Linux Gaming But There Are Caveats
      • Proton now officially supports Nvidia DLSS, but it won’t come to Valve’s Steam Deck | PCGamesN

        Valve is paving the way for us to ditch Windows and dive into Linux PC gaming, as the Steam Deck leads the charge with SteamOS and its Proton compatibility layer. Now, with the release of Proton 6.3-8 (via Videocardz), the company hopes to tempt even more players to jump ship with official support for Nvidia DLSS.

        The proprietary upscaling technology can help boost fps in games like Call of Duty: Vanguard or Back 4 Blood, without sacrificing much in the way of image quality. Unfortunately, team green’s upscaling technology won’t be supported on the Steam Deck as it uses an AMD Zen2-based SoC, and Nvidia DLSS requires an RTX chip.

      • Nvidia DLSS Upscaling Will Not Be Compatible With Steam Deck

        Upscaling is fast becoming the industry standard in modern AAA gaming, if it isn’t already. Nvidia and AMD have their own versions, with Intel working on one for its upcoming range of GPUs, though “team green’s” algorithm is probably the more popular one. The likes of Back 4 Blood use Nvidia’s DLSS, or Deep Learning Super Sampling, with the purpose to improve visual fidelity using machine learning. However, not every system is going to be compatible with it, as it turns out that Valve’s upcoming Steam Deck handheld PC won’t have this specific upscaling technology.

        According to a recent report, it won’t be possible for the Steam Deck to use DLSS, which may be a concern for some people. However, the reason why is quite simple. Nvidia’s technology requires one of its own graphics cards, specifically one from the RTX range, such as the RTX 3070 Ti for example. Given that the Deck uses an AMD product under the hood, it won’t be compatible with the rival upscaling algorithm. But that does mean it can run AMD’s own FidelityFX Super Resolution, or FSR, instead so it will still have upscaling, just not Nvidia’s. It’s also possible that it could be compatible with Intel’s upcoming Xe Super Sampling as well.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • October/November in KDE Itinerary

          Since the last summary KDE Itinerary has been moving with big steps towards the upcoming 21.12 release, with work on individual transport modes, more convenient ticket access, trip editing, a new health certificate UI, better transfer handling and many more improvements.

          New Features

          Current ticket access

          A small but very convenient new addition is the “Current ticket” action, which immediately navigates you to the details page of the most current element on the itinerary. That comes in handy when having to show or scan your ticket and avoids having to find the right entry in the list in a rush.

          This action is now also accessible from jump list actions in the taskbar on Linux, or app shortcuts on Android. Combined with the easily accessible barcode scanmode mentioned last time it’s now just two clicks or taps to get ready for a ticket check.

      • GNOME Desktop/GTK

    • Distributions

      • BSD

        • GhostBSD 21.11.24 Update Download – itsfoss.net

          The release of the desktop-oriented distribution kit GhostBSD 21.11.24 , built on the basis of FreeBSD 13-STABLE and offering a user environment MATE, has been published. By default, GhostBSD uses the ZFS file system. Both work in Live-mode and installation on a hard disk are supported (using its own installer ginstall, written in Python). Boot images are built for the x86_64 architecture (2.6 GB).

          The new version includes the ghostbsd-version utility to display the version of GhostBSD, the base FreeBSD version, the FreeBSD kernel used and the system environment. The repos package has been added to the repository with information about the current version of the repository. On the system, version information has been added to the / etc / version file updated by the ghostbsd-build toolkit and the update installation manager. In the dialog shown after the installation of updates is complete, the restart button is now displayed first on the right.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Libreboot 20211122 Released, a completely free Coreboot distribution – itsfoss.net

        Published release free firmware boot Libreboot 20,211,122 . This is the third release of the GNU Project and continues to be touted as a test release as it requires additional stabilization and testing. Libreboot develops a completely free project fork of the CoreBoot, providing a binary-stripped replacement for proprietary UEFI firmware and BIOS that are responsible for initializing CPU, memory, peripherals and other hardware components.

        Libreboot is aimed at creating a system environment that allows you to completely do without proprietary software, not only at the operating system level, but also firmware that provides loading. Libreboot not only removes non-free components from CoreBoot, but also enhances it with tools to make it easier for end users to use, creating a distribution that can be used by any user with no special skills.

      • FSF

        • GNU Projects

          • Loongson Posts Patch Series For Bringing Up LoongArch In GCC Compiler – Phoronix

            China’s Loongson continues bringing up LoongArch processor support for Linux with this MIPS64-based ISA now seeing the complete patch series for review to enable the GNU Compiler Collection (GCC).

            For months Loongson has been working on LoongArch support for the Linux kernel to varying extents from the new CPU ISA functionality to copying a lot of existing MIPS64 code and adding in new IDs. That Linux kernel support is still in the works.

      • Programming/Development

        • An Introduction to MATLAB: Structure and Application

          Programming is the core of a modern computer. You can not even think of an alive computer without programming. There are several languages to do computer programming, and each of them has its special field. Some are known for scientific computation, and some are specialized for making the building blocks of an operating system. MATLAB is also a very popular programming language. Today we are going to get an absolute introduction to MATLAB and its wide application in today’s world.

          Although there is a wide variety of programming languages available there in the virtual world, we have chosen MATLAB for several important reasons. It is a compact language for heavy-duty works. We are going to discover each and every detail of MATLAB in this journey. Stay with us to learn. The more you know, the more you grow.

        • Perl/Raku

        • Python

          • Convert a String to JSON Python

            In Python, strings are a series of elements or items. The strings are unchangeable objects. We cannot change the string after their declaration. “JavaScript Object Notation” is the full form of JSON. In Python, the ‘JSON files contain information that is readable for humans. The elements appear in the form of pairs.

            In web APIs, the information we send and receive is usually in the form of a dictionary string. To utilize this information, we extract consequential data. For this, we have to convert this information to dictionary format for more operations. JSON provides several techniques for serializing and deserializing “JSON”. The process of changing the string to “JSON” is called serializing. And the process of converting the JSON to a string is known as deserializing. Serialization is the opposite of deserialization. Several methods are used to convert strings to JSON.

          • How Do You Repeat a String n Times in Python?

            In Python, we utilize the asterisk operator to repeat a string. This operator is indicated by a “*” sign. This operator iterates the string n (number) of times. The “n” is an integer value. After repetition, a new string is created. The operation requires two arguments: a string and an integer value. We multiplied the string by a specific number for the repetition of string n times. Repeating the string merges the copy into an identical string. The asterisk operator repeats the string up to a definite length.

          • How Do I Check If a String Is Empty in Python?

            The strings are unchangeable. We cannot modify the string after defining it. Different operations are performed on strings. If we have a string that contains only whitespaces in it, that string is not considered empty. It contains the size of the non-zero value. So, if len() method and “not” operator is applied on this type of string, it considers whitespace as an element of the string. Sometimes in Python, we want to check whether the specified string is blank or not. To check the emptiness of the given string, use the “not” operator to utilize the variable of string instead of a condition, or utilize the equal operator to match an empty string. Now, we are going to explain numerous methods…

        • C++

          • Static Method C++

            A method in C++ is also known as a function, and using methods in C++ promotes the concept of modular programming and code reusability. It means the methods that are once written can be called repetitively for as many times as needed without having the necessity of writing them every time.

          • C++ Unsigned Integers

            The integer data type in C++ is further divided into many sub-types. One such sub-type is the unsigned integers. The unsigned integers are capable of storing only the positive whole numbers. The unsigned integers in C++ are preferred while manipulating bits in operating systems since you have limited storage space. Moreover, they can also be used for array indexing since the index of an array can never be negative. This article is devoted to the discussion of the unsigned integers in C++ in Ubuntu 20.04.

          • C++ Getline function

            Getline() is used to get the input string from the user in one or more lines until a special character comes (delimiter). It is a predefined function and uses a library in the program, as its definition is present inside the library’s header file.

          • C++ Pointer Arithmetic

            Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). How an exponent can be used for raising a number to a certain power in C++ is discussed in this article.

          • Exponents in C++ to Raise a Number in Power

            Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). So, within today’s article, we will see how an exponent can be used for raising a number to a certain power in C++. Make sure to have a G++ compiler already installed and configured on your Linux operating system. Let’s start implementing today’s article by opening the shell terminal using the shortcut “Ctrl+Alt+T”. As the terminal is opened now, we can start implementing our examples.

          • Bit masking in C++

            Bit masking is a process that is used to access a specific bit in the bytes of data. This phenomenon is used when you are performing the process of iteration. A bitmask is said to be a mask of a sequence of N –bits that are used to encode a part of our collection.

            These elements of the mask can be set or cannot be. There are bitwise operators to create or toggle the bits. These operators are used to turn on the off bit or vice-versa.
            To use the C++ programs in executing them on Linux, you need to have the Ubuntu file configured and in running state. Moreover, the user must have some knowledge of the C++ language. C++ source codes are written in the text editor. Whereas for the execution process, use the Ubuntu terminal.

            A bitmask is also said to be a simple mask that is a sequence of n bits. It encodes the subset of the collection. The element ‘I’ is present in the subset of the ‘ith’ bit is set in the mask. For the set of elements having nth bytes, there are chances of having a 2N mask corresponding to a subset.

          • Deep Copy C++

            The copy means the same to the same replica of an original object. Within programming, there are different methods to create copies of objects. The copy of objects, variables can be done with a copy constructor or using the default assignment operator “=”. Two types of copies can be made within the C++ code, i.e., shallow and deep copy. You can use one to copy any variable or object in the code. When our object has variables that are dynamically allocated throughout the program, we need to create a Deep copy of such type of object. This article will see how a Deep copy can be created in C++.

  • Leftovers

    • Hardware

      • Indoor Blimp Sails Through The Air Using Ultrasonic Transducers | Hackaday

        Quadcopter type drones can be flown indoors, but unless you have a lot of space, it usually just ends in a crash. The prospect of being hit in the face by the propellor blades, spinning at 10k RPM doesn’t bear thinking about, and then there’s the noise. So, as a solution for indoor photography, or operating in public spaces, they are not viable. Japanese mobile operator DOCOMO has a new take on an old idea; the blimp. But, surely even a helium filled vehicle needs blades to steer around the room, we hear you cry? Not so, if you use a pair of specialised ultrasonic transducer arrays to move the air instead! (Video, embedded below)

        [...]

        Blimps are by no means scarce on these fine pages, here is a Blimpduino, an Arduino controlled 3D printed blimp, an illuminated blimp art installation by Japanese artist [Kensho Miyoshi] and if using helium is just too darn safe for you (or if you want to help prevent this allegedly precious resource from being lost into space) you could just build a remote controlled blimp using hydrogen instead. Just don’t light a match.

      • Impressive Off-Grid Hydroelectric Plant Showcases The Hacker Spirit | Hackaday

        We all know the story arc that so many projects take: Build. Fail. Improve. Fail. Repair. Improve. Fail. Rebuild. Success… Tweak! [Kris Harbour] is no stranger to the process, as his impressive YouTube channel testifies.

      • Finally, Tame The Si5351! | Hackaday

        The Si5351 is an extremely useful device, containing multiple clock generators with many versatile programming options that go well beyond its original purpose of providing a clock for digital circuitry. It has in particular found a spot in RF projects, where it provides a cheap and effective stand-in for a variable frequency oscillator in everything from receivers to VNAs. It’s fair to say that programming the Si5351 isn’t the easiest of tasks though, and joining the various attempts to make this simpler is [MR-DOS], who has created an Si5351 library for the STM32 range of ARM Cortex M processors. Fortunately for those afflicted by the semiconductor shortage there’s the advice that porting it to other architectures should only require the relatively manageable task of modifying the i2c function for the new hardware.

      • Perovskites Understood | Hackaday

        The usual solar cell is made of silicon. The better cells use the crystalline form of the element, but there are other methods to obtain electric energy from the sun using silicon. Forming silicon crystals, though, can be expensive so there is always interest in different solar technologies. Perovskite is one of the leading candidates for supplanting silicon. Since they use lead salts, they are cheap and simple to construct. The efficiency is good, too, even when the material is not particularly well ordered. The problem is every model science has on what should make a good solar cell predicted that orderly compounds would perform better, even though this is not true for perovskite. Now scientists at Cambridge think they know why these cells perform even in the face of structural defects.

      • Spiral Music Visualization | Hackaday

        LEDs display different pitches in a sunburst pattern
        Displaying notes live as they are being played can be a really powerful learning tool, but it’s usually used to learn how to play a specific instrument. This take on the topic is actually a neat way to learn more about music theory — how pitches work together to build the sounds that we hear. The visual tack chosen arranges each of 12 notes into a spiral. As you continue to go up the scale through more octaves, pitches that share the same name line up into a line like a ray projecting out from the sun. So there are 12 rays for the notes in the scale: C, C#/D♭, D, D#/E♭,F, etc.

        [mechatronicsguy] built it a few years back but just now got around to documenting it, and we’re sure glad he did. The layout of notes at first looks just like a colorful visualization. But as he mentions in his description, this assigns a shape to each different type of cord. A major cord will have the same shape whether it is played with C, G#, B♭, or any other note as the root. The shape simply rotates around the axis based on that root note. Higher octaves will be shown further out on the radius, but the chord shape will still be the same. Minor, augmented, even modal chords and those with added pitches all have their own unique shape on the display.

    • Integrity/Availability

      • Proprietary

        • Security

          • Vulnerability in firmware of MediaTek DSP chips used in many smartphones – itsfoss.net

            Researchers from Checkpoint have identified three vulnerabilities (CVE-2021-0661, CVE-2021-0662, CVE-2021-0663) in the firmware of MediaTek DSP chips, as well as a vulnerability in the MediaTek Audio HAL audio processing layer (CVE-2021- 0673). In case of successful exploitation of vulnerabilities, an attacker can organize eavesdropping on the user from an unprivileged application for the Android platform.

            In 2021, MediaTek accounts for approximately 37% of shipments of specialized chips for smartphones and SoCs (according to other data, in the second quarter of 2021, MediaTek’s share among manufacturers of DSP chips for smartphones was 43%). Among other things, MediaTek DSP chips are used in flagship smartphones by Xiaomi, Oppo, Realme and Vivo. MediaTek chips, based on the Tensilica Xtensa microprocessor, are used in smartphones to perform operations such as processing sound, images and video, in computing for augmented reality systems, computer vision and machine learning, as well as implementing fast charging.

          • CronRAT: A New Linux Malware That’s Scheduled to Run on February 31st [Ed: This is not about "Linux" and Linux isn't how or why this malware gets on systems in the first place]

            Researchers have unearthed a new remote access trojan (RAT) for Linux that employs a never-before-seen stealth technique that involves masking its malicious actions by scheduling them for execution on February 31st, a non-existent calendar day.

            Dubbed CronRAT, the sneaky malware “enables server-side Magecart data theft which bypasses browser-based security solutions,” Sansec Threat Research said. The Dutch cybersecurity firm said it found samples of the RAT on several online stores, including an unnamed country’s largest outlet.

          • Unexpected database server downtime, affecting bugs, forums, wiki

            Due to an unexpected breakage on our database servers, several Gentoo websites are currently down. In particular, this includes Forums, Wiki, and Bugzilla. Please visit our Infrastructure status page for real-time monitoring and eventual outage notices.

    • Internet Policy/Net Neutrality

      • FTP vs TFTP compared

        In today’s digital world, it is common to transfer files over the internet and it is crucial to choose a protocol that defines your organization’s needs. So, there are different protocols available that can do this job and two of the most important ones are the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP). In this article, we will focus on these two protocols and their significance along with some drawbacks so that you can choose accordingly as per your requirement.

    • Monopolies

      • Patents

        • Software Patents

          • You Can’t Patent Software, Right?! …Or Can You? [Ed: Loopholes for illegal patents, disgracing the patent system, which no longer seems to be about law or science, just enriching monopolists and law firms]

            Most jurisdictions place limits on patenting software inventions, and the guidance published by different patent offices around these limitations has not always been clear. Moreover, software patents are an area of patent law that is still in flux though eligibility requirements are becoming increasingly well-defined and harmonized. Many people also confuse the code, which cannot be protected by a patent, with the functional aspects of the software, which can be patentable.

[Meme] Linus Gabriel Sebastian Takes GNU/Linux for a (Tail)’Spin’

Posted in Site News at 1:35 pm by Dr. Roy Schestowitz

Car drives off of cliff: See? This car is shit!

Summary: If you’re trying to prove that GNU/Linux is NOT Windows, then “haha! Well done…”

GNU/Linux is for Freedom and It’ll Gain Many Users When (or Where) People Understand What Software (or Computing) Freedom Means

Posted in Free/Libre Software, GNU/Linux, Windows at 1:10 pm by Dr. Roy Schestowitz

Video download link | md5sum 55c3dafc0821d22dae7b9f8149a5c841

Summary: Software that respects people’s freedom (and by extension privacy as well) is an alluring proposition; those who choose to try GNU/Linux for the wrong reasons are likely the wrong target audience for advocates

THIS afternoon we reposted this video (or response video, which several more people reacted to in recent hours). Among the high-profile (large audience) responses we have:

I decided to do a video not amplifying many of the false claims (if not outright trolling), seeing that Windows is a waning platform and we ought to steer people towards freedom, not a bunch of ‘lesser evil’ or ‘lesser Windows’ such as Android or MacOS. Sadly, the corporate media will never help us; it wants us to live under this illusion that the only permissible choices are GAFAM (a false dichotomy) and people have a really weak grasp of software freedom, not to mention literacy associated with concepts like freedom, which corporate media habitually associates with extremism [1, 2]. Some people try GNU/Linux (which they call “Linux”) for the wrong reasons, based on a miscomprehension or pursuit of adventure. This won’t end well. The intentions are not sincere and the motivation isn’t there to begin with.

Amid Reports of Microsoft’s Competition Crimes in Europe…

Posted in Antitrust, Europe, Microsoft at 12:52 pm by Dr. Roy Schestowitz

Summary: European companies are complaining, but they seem to overlook the principal aspect of an imperialistic system with bottomless pockets (almost 30 trillion dollars in debt already; US national debt soared again last month); Microsoft is shielded by a political system with military (“defence”) as bailout budget to help cushion international expansion for data grab and technical leverage, as we've seen in the case of EPO (this is all political, not technical, and should thus be treated as a political/corruption issue)

Here’s what Eben Moglen told, as reported by Associated Press about a decade ago:

The European stance differs strongly from the self-regulatory, free market approach favored in the United States, where Web companies have flourished by offering users free services if they provide personal information to help advertising target them better, according to Columbia University law professor Eben Moglen.

“If the European regulators get serious, it will create a significant conflict,” said Moglen, who has been examining online privacy issues since the early days of the Web.

[...]

Moglen, of Columbia University, said even if European regulators rallied together they would find it difficult to force their rules upon U.S. companies, given the close relationship between Silicon Valley and the administration of President Barack Obama.

“If the Europeans want that fight, then surely the American government wants the other side.”

Eben Moglen 1998
Source page

Is Linus Trolling the GNU/Linux Community?

Posted in FUD, GNU/Linux at 10:36 am by Dr. Roy Schestowitz

Summary: This new video responds to what many sites have been provoked into amplifying

Links 27/11/2021: Tux Paint 0.9.27 and SeaMonkey 1.1.19 in EasyOS

Posted in News Roundup at 10:03 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Is Linus Trolling The Linux Community? – Invidious

        Linus and Luke (from Linus Tech Tips) recently published video number two of their “Linux gaming challenge”. In this video, both men had some complaints about their Linux experience so far. Linus, in particular, had a lot of negative things to say. Here are some of my thoughts on their video.

    • Applications

      • Tux Paint 0.9.27 Open-Source Drawing App for Kids Adds New Ways to Draw, Other Updates

        Tux Paint 0.9.27 is here almost four months after the previous release, Tux Paint 0.9.26, and introduces new ways to draw to the popular children’s drawing program. These include no less than six new Magic tools, such as Panels for shrinking and duplicating drawings into a 2-by-2 grid like those used for four-panel comics.

        Other new Magic tools included in this release are Opposite for producing complementary colors, Lightning for interactiv drawing of a lightning bolt, Reflection for creating lake-like reflections on drawing, Stretch for stretching and squashing pictures, and Smooth Rainbow as a more gradual variation of the classic Rainbow tool.

      • 12 Best Free and Open Source OCR Tools – LinuxLinks

        Optical Character Recognition (OCR) is the conversion of scanned images of handwritten, typewritten or printed text into searchable, editable documents. OCR software is able to recognise the difference between characters and images, and between characters themselves.

        The use of paper has been displaced from some activities. For example, the vast majority of journeys on the London Underground are made using the Oyster card without a paper ticket being issued. We have witnessed talk of a paperless office for more than 40 years. However, the office environment has shown a resistance to remove the mountain of paper generated. Things have changed in the past few years, with a marked shift in the paperless office concept. Paper documents contain a wealth of important management data and information that would be better stored electronically. There is computer software that makes this conversion possible. The benefit of scanning documents is not purely for archival reasons. OCR technology is vital for gaining access to paper-based information, as well as integrating that information in digital workflows.

        The selection of the right OCR tool is dependent on specific needs. For some, online OCR services may be useful, but there are privacy concerns and file size limitations. This article focuses on desktop, open source OCR software that offer good recognition accuracy and file formats. We cover OCR engines as well as front-end tools.

        OCR software is not mainstream so open source alternatives to proprietary heavyweight software are fairly thin on the ground. Matters are also complicated by the fact that OCR computer software needs very sophisticated algorithms to translate the image of text into accurate actual text. The software also has to cope with images that contain a lot more than text, such as layouts, images, graphics, tables, in single or multi pages.

    • Instructionals/Technical

      • Setup C++/Qt SDK Programming Environment on Ubuntu 21.10 Impish Indri

        This tutorial explains how someone can setup C++ language and Qt Software Development Kit on Ubuntu 21.10 for doing software development that is world-class, full-featured, complete and crossplatform under free software licenses. For your information, Qt is the material that built professional computing software like Kubuntu, KDE and Telegram. With this tutorial you will get a full set of tools ready to use consisted of an advanced IDE Qt Creator, a GUI editor Qt Designer, a lot of code examples Qt Examples, an internationalization tool Qt Linguist and a documentation viewer Qt Assistant aside from the compiler G++ and the build tool QMake. Let’s start!

      • How to Install Apache Cassandra on Ubuntu and Other Linux – It’s FOSS

        Apache Cassandra is a free and open-source NoSQL database management system drawn to manipulate large amounts of information across many servers, providing high availability with no single point of failure.

        I am not going into the details of NoSQL database. I am going to so you how you can install Apache Cassandra on Ubuntu based Linux distributions.

      • SeaMonkey 1.1.19 compiled in EasyOS

        As I seem to have settled on Firefox as the main browser in EasyOS, I still want to keep a WYSIWYG HTML editor in the build, builtin. So, my mind turned to considering old versions of SeaMonkey…
        Looking at my old notes, the 1.1 series look good. Very old, version 1.1.19 was the last, released, I think, in 2010. The 1.1 series was the last, I think, that can be configured to build a standalone composer.
        But, then, with SM you get the browser and composer editor, both, for not much increase in size. So why not build the suite. The browser could be a substitute for the ‘surfer’ HTML viewer that I am currently using to view local help files in Easy.

      • How to install Proxmox? – Unixcop the Unix / Linux the admins deams

        Hello, friends. In this post, you will learn how to install Proxmox on a completely clean server. For this, then I will use a virtual machine but the procedure is simple and the same as on a real physical server.

        What is Proxmox?

        Proxmox VE “Virtual Environment” is a powerful enterprise-level virtualization platform 100% free and unlimited in its use.

        Of course, it has a license that allows us to obtain additional features that facilitate the administration of it. But in general, we can use it in many of our projects for free.

        Proxmox is essentially a Debian that adds KVM virtualization and Container-based Virtualization. Therefore the whole base is Free and this makes it possible for the final product to be free. How is it supported? The proxmox business model is based on training, certifications, and support and as I mentioned an enterprise license.

        One of the main advantages of Proxmox is that it has a JavaScript web interface. This has an intuitive design where all KVM clients, Linux containers, storage units, and clusters are displayed.

        So, let’s go for it.

      • Installing ArcoLinux on Windows 11
      • Removing ArcoLinux from Windows 11
      • Install ArcoLinux on Windows 11 on VirtualBox
      • Install ArcoLinux on Windows 11 on Vmware 16
      • How to dual boot Windows 11 and ArcoLinux
      • Dual booting Windows 11 encrypted and ArcoLinux on a laptop
    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • This week in KDE: Fixing a bunch of annoying bugs – Adventures in Linux and KDE

          This was a major bug squashing week, with quite a lot of annoying issues fixed–some recent regressions, and many longstanding issues as well.

          On the subject of bugs and recent regressions, I’m starting to think from a higher level about how we can prevent them. KDE has largely conquered our historical issues of excessive resource consumption and visual ugliness, and our next major challenge on the path towards world domination is reliability. One idea I’m toying with is starting an initiative to focus on the “15 minute bugs”–those embarrassing issues that can easily be found within just a few minutes of using the system normally. Here is a preliminary list of these issues in Plasma. I would encourage any experienced developers to try to focus on them! The impact will be very high.

        • KDE Squashes Many “Annoying” Bugs As It Works To Improve The Desktop’s Reliability.

          KDE developers are trying to ensure the reliability of their desktop environment and thus they have recently begun a renewed effort on bug fixing. There is also talk of starting a KDE initiative focused on “15 minute bugs” for “embarrassing” issues that can be easily found within minutes. In any event, this week saw a lot of bug fixing in the KDE world.

          KDE developer Nate Graham in his latest weekly development summary outlined many of the bugs that were fixed and some of his initial thinking about the possible “15 minute bugs” initiative. Fixed this week included:

          - Fixing support so archives can be created using Ark’s main user-interface.

          - Touch scrolling for the Konsole now works properly.

    • Distributions

      • IPFire Linux Firewall Now Supports exFAT, Boosts Intrusion Prevention System’s Performance

        IPFire 2.27 Core Update 161 introduces several new features, performance improvements, and some other important changes. For example, it brings support for the exFAT file system, support for the FriendlyARM NanoPI R2S open-source mini router, as well as Fast Flux Detection in the web proxy to proactively detect Fast Flux setups.

        Among the performance improvements included in this update, there’s a large increase of throughput for the Intrusion Prevention System (IPS), allowing it to decide if the traffic from a certain IP connection needs to be seen or not and tell the kernel to bypass it.

      • BSD

        • OpenBSD on the VIA Eden X2 powered HP t510 Thin Client

          Back in 2017, I bought two used HP thin clients on a local auction site, the t5570e and the t510, both of them powered by VIA x86-64 CPUs. In this article, I will focus on the t510, which is the more powerful of the two.

      • Debian Family

        • Bullseye

          I just upgraded my Debian GNU/Linux server to Bullseye, 11. Except for a shortage of disc space everything went smoothly. It was my fault. I created a bit too small a / partition when I moved to a newer computer… I looked around and found gigabytes of cruft I could clear out to make things fit: obsolete compilers, files I was never likely to use and I deleted a few packages I was never likely to use. Did that from my smartphone while watching old news on CNN. Went to the console for the real work which took about ten minutes.

    • Devices/Embedded

      • VisionFive V1 RISC-V Linux SBC resurrects BeagleV single board computer – CNX Software

        Last summer we reported that BeagleV StarFive RISC-V SBC would not be manufactured, but all was not lost as StarFive would collaborate with Radxa to make a new single board computer based on their JH7100 dual-core 64-bit RISC-V processor.

        But thanks to a report on Heise and extra photos acquired by CNX Software, we now have more details about the board that mostly comes with the same features as the BeagleV StarFive, but a completely different layout that brings all the main ports to one side of the board.

      • A masterclass in over-engineering

        Twitter went wild for the Robot Arm Clock featured in the new issue of The MagPi. At the last count our tweet had 1.8K retweets.

        We also showed you how to make Dune’s Gom Jabbar test, and we enjoyed a little Chopin as we watched a piano control LED lights.

      • Open Hardware/Modding

        • BeagleV RISC-V SBC reborn as VisionFive V1

          StarFive revealed details about a “VisionFive V1” SBC (formerly BeagleV) that runs Linux on a StarFive JH7100 SoC with dual 1.5GHz SiFive U74 cores and a 1-TOPS NPU based on RV64GC RISC-V. The Pico-ITX SBC has up to 8GB RAM and 40-pin GPIO.

          In January, BeagleBoard.org and Seeed launched an early access release of a BeagleV SBC (later referred to as the BeagleV – StarLight) that runs Linux on a RISC-V architecture StarFive JH7100 SoC with dual Cortex-A55 like SiFive U74 cores. BeagleBoard.org withdrew from the project over the summer, and StarFive is now prepping an updated version called the VisionFive V1.

        • Converting a Fat Cat cushion into a controller for Final Fantasy XIV | Arduino Blog

          Mounts in the video game Final Fantasy XIV act like how cars or horses do in our world since they allow players to travel around the map much faster than would otherwise be possible. But even better, mounts are ways to express personality and have some fun, which is especially evident with the infamous “Fatter Cat” mount, as it got so widely beloved that Square Enix, the game’s publisher, decided to start selling a plushie version of it in their store.

        • Unsurv offline open source, privacy friendly GNSS receiver with ESP32 & NFC

          “unsurv offline is a privacy friendly, small and lightweight PCB based on an ESP32 featuring a high quality GNSS receiver, accelerometer, and NFC capabilities. Using a combination of onboard features and OpenStreetMap (OSM) data, unsurv offline helps you collect and analyze location data in a privacy-friendly way. Originally conceived to better understand offline video surveillance, this fully open source project is here to help you find and develop a variety of custom use cases.”

    • Free, Libre, and Open Source Software

      • Open-Source Virtual Assistant Almond Renamed Genie

        Genie (and Almond) were designed as an alternative to Alexa, Google Assistant, and other common voice assistants. Stanford computer systems designer Dr. Monica Lam set up OVAL to create a decentralized virtual assistant that stored and shared information based on user preferences, without mandates from a company. Almond’s success led to discussions of a rebrand to go with making a commercial product out of the academic experiment. The group wanted to come up with a word that would be useful regardless of the language spoken, thus accommodating international users. The researchers considered other names, like Coco, Mario, and Nico, before settling on Genie as the best option, one unrelated to the Genie virtual assistant developed by Disney for its theme parks and resorts or Alibaba’s Tmall Genie voice assistant.

      • Programming/Development

        • [Old] Advantages of Functional Programming

          At present, functional programming is rather popular, and many imperative languages are adopting some FP concepts such as lambda functions, partial application (currying) and higher-order functions (map, filter, folding). Some of the adoptions blend seamlessly, but some make the syntax look rather weird and foreign. Nevertheless, a programming paradigm is an approach that exists in the programmer’s mind, and is generally not part of the language itself. To some extent, any language supports different paradigms, and its structures allow developing software in various styles. The question of whether it makes sense to develop software in the functional style can’t be answered easily, and each developer will answer it based on their preferences, capabilities of the language, and other considerations. We believe that using the functional style in imperative languages or, better still, the functional language, especially in combination with static typing, will help to improve many aspects of the code, namely: [...]

        • Shell/Bash/Zsh/Ksh

          • The fish shell is amazing

            I’ve been lurking the fish shell for a couple of years now (and the nushell but it is another story for another time). Not so long ago, I decided to try it, and it’s simply… amazing. If I had to state one feature that makes me like to use it, it’ll be the autocompletion, hands down. It’s the first time I just take a shell and without customization it’s pleasing to use.

  • Leftovers

    • Goodbye Shuffle

      These days a whole song let alone a whole album is hard to catch on. Songs often go viral based on ten-second TikTok clips. TikTok made me feel old for the first time. It was too fast for even a millennial like me. I heard an interesting critique of millennials from the left by some people from Gen Z which I thought was worth sharing. Millennials in their view were too focused on themselves. Millennials recognized the crisis we are in but ultimately longed for a capitalist life like their parents. The youngest people are always the most radical so it’s worth noting the continued evolution of revolutionary consciousness growing from anti-capitalist to collectivist as evidenced by the rise of mutual aid.

      Time itself is sped up these days. We have so much stimulus and little time for reflection. As time goes into hyper-speed it is space that is condensed amidst the stay-in-place nature of the lingering pandemic. At this point the pandemic is likely permanent for the poorest people in the world. For the rich space is condensed but for the poor space has spread out to chase capital as migration and delivery becomes key to a pandemic economy.

    • Who Is the University of Austin For?

      The University of Austin (UATX) was announced to great fanfare on Monday, November 8, on the popular Substack of former New York Times opinion editor Bari Weiss. “We got sick of complaining about how broken higher education is,” Weiss tweeted that morning, “So we decided to do something about it. Announcing a new university dedicated to the fearless pursuit of truth.” Headed by Pano Kanelos, the former president of St. John’s College in Annapolis, UATX boasted a roster of prominent academics and journalists known for pushing back against what they see as the hegemonic culture of “wokeness” that has supposedly undermined free expression and intellectual inquiry at America’s leading universities.

    • Reclaiming a Lost Sense of Community

      “It” amounted to this: It was Wednesday afternoon, I had finished my column early and walked out to my car, parked in the alley behind my house. I was on my way to an art show — very excited. I got in the car — hmmm, why is it so cold in here? — began backing out, what’s that? It looked like there was something on my rear window. I got out, walked around back. Oh my God! My rear window has been smashed in! What I saw was a fragment of broken glass dangling in a corner.

      Was this a robbery? I had two umbrellas in the back seat; they were still there. Nothing had been taken. Apparently it was plain old idiotic vandalism.

    • All Together Now

      This lack of authority to enforce global agreements necessary to human survival also sadly weakens the fragile international institutions that are intended to help us get beyond the scourge of war, especially nuclear war, and beyond our third great challenge, global pandemics. As the courageous Greta Thunberg bluntly put it, it’s mostly “blah blah blah,” rationalizing a status quo that isn’t working.

      With nuclear weapons, military force has reached a level of destruction which contradicts its own professed goals. Let alone that the arms race has become grossly irrelevant to our environmental and health crises, though it can still extinguish us even more rapidly than eco-degradation or plague. The deterrence system represents the utter opposite of the universal Golden Rule of interdependence found in all the world’s great religions: if you try to destroy me you will die trying.

    • Malcolm at the Audubon Ballroom

      Manhattan District Attorney Cyrus Vance, Jr., who ordered the belated reinvestigation, made a meaningless apology that might be the understatement of all time: “This points to the truth that law-enforcement over history has often failed to live up to its responsibilities. These men did not get the justice that they deserve.”

      Aziz and Islam spent a combined 42 years in prison, as the Times notes, “with years in solitary confinement… in some of New York’s worst maximum security prisons.” And knowing and maintaining all the while that they were innocent.

    • Cuba: Five Years After Fidel

      In five years, particularly in the last two years, incendiary slang has been unleashed on social media and international media networks, whose target is not only the Cuban government. They want to erase any trace of Fidel Castro. Since the news of the Cuban leader’s death, there have been hundreds of tributes for him from around the world; but simultaneously, a bombardment of calumnies have been launched against his memory to try to transform into ruins the sovereign, popular and democratic project of the revolution that he led.

      To present him as the symbol of defeat and failure, he is shown as a lonely idealist who led Cuba to ruin. They charge all his actions (real or invented) with negativity and perversity to villainize him and paint him as deserving of outrage. There are those who cynically excuse themselves in demystifying.

    • A Food for Thought Thanksgiving Weekend Side Dish

      Most whites are ignorant of all manner of massacres, lynchings and assassinations, let alone the countless other aggressions required to enforce the race/gender/economic hierarchy for more than 500 years. So that is one factor. Noting, however, for the record, that almost all of the ignorance is of the willful kind. The result, that is, of leaving out the bad stuff on purpose.

      What’s more impactful, however, is what happens when the engineered obliviousness doesn’t work properly and whites somehow do have access to information. This is where we can learn a lot about the resilience of the white supremacy way of thinking. Current resistance to the 1619 Project is a good example of how it works.

    • Death in Texas
    • Dennis Cooper’s Love Story of a Lifetime

      George Miles, when he first appears as a character in Dennis Cooper’s debut novel Closer (1989), is beautiful, nervous, and eerily vacant. A high school acidhead, George is plagued with a psychic pain that is only exacerbated by the way other people treat him; his cute looks and hyper-passivity make him a target for a range of obsession, lust, and cruelty. There is, for example, his friend John, who wants to be an artist and tries to paint him, but George “twitch[es] and tremble[s] so much” he makes John think of “a badly tuned hologram”; instead, he uses George’s body as a “prop,” to imitate the pornography he’s seen. Another man, Philippe, develops a drastically more debasing sexual routine with George that makes him (and others who witness it) puke. Tom, a murderer, mistakes George’s ambivalence about being alive for a death wish; he spares his life but badly maims his body. Only George’s friend Cliff (a stand-in for Cooper) shows him anything like tenderness. Unable to tell George how he feels about him (he can’t utter something as clichéd as the word “love”), Cliff can’t really console him either. Instead he reports on George, “Now there was nothing between him and ‘it,’ as he called what he currently felt…. I’d never grasp it…. Saying so wouldn’t help.”

    • Hardware

      • How WD-40 Became Rust’s Worst Enemy

        For a little more than a decade, I worked in a loud, dark room. Threading film through projectors, running movies, and repairing the mechanical components of the machines made the hours just fly by. Two of the most vital tools at my disposal were my trusty 7/16 wrench and a big can of WD-40. It’s been years since I worked around that equipment, but I still vividly remember that strange smell and how the substance seemed like a miracle cure for those crazy machines. These days, it seems like everyone has a can of the stuff on their workbench. But WD-40 is a veritable modern American institution and in this time of constant turmoil, it’s always nice to know it’s there on the workbench to help us solve some problems. In today’s Tedium, we’re looking at the unique story of America’s favorite all purpose product: WD-40…

    • Health/Nutrition/Agriculture

      • Not a Border Crisis: Harsha Walia on Why It’s Time for a New Political Project

        In today’s interview Harsha reframes the border and shows that bordering is not simply a wall but an expansive, omnipresent regime, one that is connected to capitalism and colonialism and that has racist roots. In this sense, she points out three things to keep an eye on with regard to the Joe Biden administration, and argues for the importance of a no borders political project. As she writes in Border and Rule, “Like the regime of private property, borders are not simply lines marking territory; they are the product of and produce social relations that we must emancipate ourselves from.”

        We owe Harsha a great deal of gratitude since she answered these questions under much duress, surrounded by floods and mudslides after torrential, record-breaking rains drenched her home in British Columbia, Canada.

      • The Right Is Hijacking Progressive Arguments to Undermine Public Health
      • Rich Countries Blamed as New COVID Variant Sparks Global Alarm
      • ‘It Was Entirely Avoidable’: Rich Countries Blamed as New Covid Variant Sparks Global Alarm

        The detection of a new, heavily mutated, and potentially vaccine-resistant coronavirus variant in Botswana and other nations is sending shockwaves worldwide as public health officials rush to understand the strain and its possible impact on the global pandemic response.

        “There have been countless warnings that super-variants could emerge if we do not remove artificial barriers to global vaccination.”

      • South African scientists detect new virus variant amid spike

        “Over the last four or five days, there has been more of an exponential rise,” he said, adding that the new variant appears to be driving the spike in cases. Scientists in South Africa are working to determine what percentage of the new cases have been caused by the new variant.

        Currently identified as B.1.1.529, the new variant has also been found in Botswana and Hong Kong in travelers from South Africa, he said.

      • Who’s a Hero? Some US States, Cities Still Debating COVID Hazard Pay

        When the U.S. government allowed so-called hero pay for front-line workers as a possible use of pandemic relief money, it suggested occupations that could be eligible, from farmworkers and child care staff to janitors and truck drivers.

        State and local governments have struggled to determine who among the many workers who braved the raging coronavirus pandemic before vaccines became available should qualify: only government workers, or private employees, too? Should it go to a small pool of essential workers such as nurses or be spread to others, including grocery store workers?

      • Instagram chief agrees to testify before Senate

        Adam Mosseri, the head of Instagram, will testify before the Senate early next month about the social media platform’s influence on children.

        The appearance in front of the Senate Consumer Protection Subcommittee is scheduled for the week of Dec. 6.

    • Integrity/Availability

      • Your Fingerprint Can Be Hacked For $5. Here’s How.

        To compromise your device or account, we don’t even need direct access to your fingerprint. A photo of a surface you’ve touched (from a table at the local library to the equipment at your nearest gym) will do.

      • Proprietary

        • Finnish authorities warn of new wave of malware text messages

          Clicking on the link does not immediately install the malware, though. Users are asked to allow the installation. The malware may also steal data from the device and send more malware-spreading scam messages.

        • [Old] So we could use a little help with systemd-shim…

          One of the unique features of MX has been the ability for the user to choose between systemd and sysVinit on installed systems. The magic sauce that made that work is a package called systemd-shim. However, development on systemd-shim stopped some time ago, and Debian recently dropped the package from the Buster repositories.

        • Security

          • Privacy/Surveillance

            • Caught in ‘porn wars’: backlash over [Internet] censor going on anti-porn podcast

              Emails obtained through a freedom of information request reveal the fallout from Inman Grant’s interview on the National Center on Sexual Exploitation (NCOSE)’s Ending Exploitation podcast to talk about her office’s initiatives.

              NCOSE is a not-for-profit that under its previous name, Morality in Media, was one of the main fighters in the religious right push to ban pornography or forms of obscenity. In 2015 it rebranded, but has stuck to claims that pornography is a “public health crisis” and has been criticised for making claims about the harms of pornography that go against peer-reviewed research.

            • Fears about real agenda behind Online Safety Bill after US podcast

              Inman Grant was given broad-ranging powers in an Online Safety Bill passed by the Federal Government in June, including the power to order the removal of material from the Internet within 24 hours, if said material was deemed to contravene provisions of the bill.

              But according to the report, Inman Grant appeared to have not carried out any background checks before she appeared on the National Centre on Sexual Exploitation’s (NCOSE’s) Ending Exploitation podcast to explain initiatives undertaken by the office she heads.

            • Apple gets hit by its second fine by Italian regulators in a week

              Apple and Google have each been fined €10 million (around $11.3 million) by Italy’s competition authority for not properly obtaining a user’s consent before using their data for commercial purposes, the AGCM has announced. Both are accused of not correctly informing users when their data will be used in this way, preventing customers from being able to give their informed consent.

            • Political advertising rules fail to stop personalised manipulation of elections and referendums

              „The Commission fails to heed the LIBE Committee‘s call for banning the personalised targeting of political messages. The personalised manipulation of elections and referendums by exploiting the user‘s individual preferences and fears is a special class of online threat because it influences the core mechanisms that enable the functioning of our democratic society. Has the Commission forgotten about Cambridge Analytica and the surprise election of Trump for President? The integrity of elections and referendums is of general interest and cannot be subject to individual choices. The targeting of individuals based on their personality, including their behaviour, needs to be banned!“

    • Defence/Aggression

      • Michael Moore: A Memorial to the Terrorists – When the Terrorists Are Us

        Information Clearing House — Eleven days ago on Veterans Day, while watching the cable news, I learned that our Congress, never missing a chance to ingratiate themselves with what they think Middle America wants — more money for the military, more flags flying everywhere, more fake patriotism and more pandering to the fake patriots — decided it was time to create a brand new national memorial on the already overcrowded National Mall in Washington, D.C., between the Lincoln Memorial and the U.S. Capitol building. The memorial will be called “The Global War on Terrorism Memorial.” I’m not making this up.

        And what patriotic politician or red-blooded American wouldn’t be in favor of that!

        Well, me. I’m not in favor of it. And I hope you won’t be, either.

        A memorial to the victims, the brave Americans who’ve died in The Global War on Terrorism. Is this an Onion prank? An Orwell novel? Because my first question is — the victims of whose terrorism? The scattered actions of a few crazed Muslims?

      • 5 Georgia officers are indicted on murder charges in death of 24-year-old man

        Arrest warrants were issued Monday for five Georgia police officers indicted on murder charges for the 2019 killing of a 24-year-old man. Fernando Rodriguez died of asphyxiation after being placed in a prone position while he was handcuffed and held down, allegedly in violation of state law.

        The indictment accuses Henry County Police Department officers Robert Butera and Quinton Phillips and former Hampton Police Department officers Mason Lewis, Marcus Stroud and Gregory Bowlden in Rodriguez’s death on September 20, 2019, following contact with police outside a concert at the Atlanta Motor Speedway.

      • Prosecutor drops charges against officer in rare case of restorative justice mediation

        Criminal charges against a St. Louis County police officer who shot a Black woman were dropped Monday after the victim requested a restorative justice mediation that focuses on repairing the harm caused by an offense.

        The St. Louis County Prosecuting Attorney’s Office said Ashley Fountain Hall asked that assault charges be dropped against former Ladue, Missouri, police officer Julia Crews, 39. The charges stemmed from a dispute that took place on April 23, 2019, outside a Schnucks grocery store.

        Crews mistakenly drew her firearm instead of using her Taser to restrain Hall and shot her in the torso, leading to critical injuries, the office said. Hall lost part of her spleen and suffers with post-traumatic stress disorder, prosecutors said.

      • Nashville DA Seeks to Vacate Claude Garrett Murder Conviction

        A reinvestigation of the case “dismantles every single piece of evidence previously believed to inculpate Garrett,” the director of the DA’s Conviction Review Unit wrote.

      • What Are The Prospects For Peace? An Interview with Finian Cunningham

        Finian Cunningham has written extensively on international affairs, with articles published in several languages. He is a Master’s graduate in Agricultural Chemistry and worked as a scientific editor for the Royal Society of Chemistry, Cambridge, England, before pursuing a career in newspaper journalism. He is also a musician and songwriter. For nearly 20 years, he worked as an editor and writer in major news media organisations, including The Mirror, Irish Times and Independent. Second-time recipient of the Serena Shim Award for Uncompromising Integrity in Journalism (December 2020). His prolific output of excellent political analysis and commentary can be accessed at Strategic Culture Foundation, Sputnik News, andRT. His responses below are exactly as he provided.

        The questions here are not philosophical or abstract. They focus on the realities of the international power struggle unfolding in real time. They directly address the role of the U.S. in the escalating tensions and its capacity to reduce them. We also probe the role of everyday citizens in affecting the relationship the U.S. now has and will have with the rest of the world community.

      • Ethiopia Conflict by US Design

        The impact of the year-long conflict is devastating. Perhaps as many as three million people are internally displaced, tens of thousands have been killed; women and girls raped, property trashed, land destroyed, livestock slaughtered by TPLF fighters. At this stage it is difficult to see how a peaceful resolution can be reached; the government has said it will not enter into negotiations until the TPLF withdraws to Tigray, and the TPLF, in no position to set any conditions, are demanding Prime-Minister Abiy Ahmed steps down.

        The conflict was initiated when the TPLF attacked the Ethiopian State on 4 November 2020 (perhaps with US approval): despite this, the US and her puppets (UK, EU etc) have, to the incredulity of many, stood behind the terrorists and not the government of Ethiopia, or the Ethiopian people. It is widely acknowledged that the Biden Administration is behind the movement to replace the Abiy government, and install the TPLF – a less independent (the US doesn’t tolerate independent governments), more malleable group that, in exchange for the freedom to do as they like, will once again provide the US with a foothold in the Horn of Africa.

      • The Delusional Commitment to the Doctrine of “Full Spectrum Dominance” is leading the U.S. and the World to Disaster

        For both classical liberals like Fukuyama and neoconservatives who would rise to power during the George W. Bush administration, it was asserted that the societies of the U.S. and Western Europe should be viewed as representative of the apex of collective human development that all should aspire to because history and objective rationalism had determined it so, and – “there is no alternative.”

        But human societies, even when they are claimed to be guided by objective scientific laws, have never emerged as a tabula rasa. What develops at any point in history is the outcome of the social and economic contradictions of the previous era with many of those unresolved contradictions still present in the new era.

      • Congress Forces Weapons Spending the Pentagon Wanted Cancelled

        These four committees have repeatedly kept hundreds of millions of tax dollars gushing into the coffers of the world’s biggest weapons contractors — for weapons declared unnecessary by the military. The committees can even refuse to reject the savings recommendations without saying why. Donnelly wrote, “None of the four defense panels provided CQ Roll Call an explanation for forcing the Pentagon to keep spending money on particular initiatives.”

        “The Pentagon had said it does not need the $500 million-plus that was appropriated for the fighter jets, helicopters, ships, vehicles, and bombs made by four of its top five contractors” (Lockheed Martin, General Dynamics, Boeing, and Northrop Grumman). But, Roll Call reports, “Congressional Appropriations and Armed Services committees, for reasons that none of them would divulge, insisted that the military spend the money anyway.”

      • From Anti-War Progressive to Pro-Drone Militarist: Tulsi Gabbard’s Odd Political Trajectory

        While many on the American left have denounced the acquittal of Kenosha shooter Kyle Rittenhouse as handing a get-out-of-jail-free card to racist militias, former Hawaii Representative Tulsi Gabbard openly celebrated the verdict. “The jury got it right — finding Rittenhouse not guilty on all charges,” said the 40-year-old lieutenant colonel, adding that the prosecution was so obviously politically motivated and his innocence so obvious that bringing charges against him should be considered “criminal” in itself.

      • Why Don’t We See Headlines Touting the Pentagon’s Hefty Price Tag?

        Compare this to President Joe Biden’s proposed military budget expenditure of $753 billion for the 2022 fiscal year. According to the Security Policy Reform Institute, “This amounts to an increase of well over $12 billion, meaning that Biden boosted Pentagon funding by an amount roughly equivalent to CDC’s entire annual budget.”

        Extrapolating this figure over 10 years while accounting for the projected yearly increases—a good assumption considering that the military budget almost never loses its annual raise—predicts that American taxpayers will be footing almost $8 trillion on the “defense” slice of our budgetary pie in the coming decade.

      • Meet Mansoor Adayfi: I Was Kidnapped as a Teen, Sold to the CIA & Jailed at Guantánamo for 14 Years

        We speak with Mansoor Adayfi, a former Guantánamo Bay detainee who was held at the military prison for 14 years without charge, an ordeal he details in his new memoir, “Don’t Forget Us Here: Lost and Found at Guantánamo.” Adayfi was 18 when he left his home in Yemen to do research in Afghanistan, where he was kidnapped by Afghan warlords, then sold to the CIA after the 9/11 attacks. Adayfi describes being brutally tortured in Afghanistan before he was transported to Guantánamo in 2002, where he became known as Detainee #441 and survived years of abuse. Adayfi was released against his will to Serbia in 2016 and now works as the Guantánamo Project coordinator at CAGE, an organization that advocates on behalf of victims of the war on terror. “The purpose of Guantánamo wasn’t about making Americans safe,” says Adayfi, who describes the facility as a “black hole” with no legal protections. “The system was designed to strip us of who we are. Even our names were taken.”

      • Roaming Charges: Fear is a (White) Man’s Best Friend

        Rittenhouse was there to help. But to help whom? From what? Rittenhouse came to the civil rights protests in Kenosha that night expecting to be needed. Expecting to be wanted. Expecting to be welcome. He also came expecting violence. What kind of violence? Perpetrated by whom? Not by the police. Rittenhouse felt safe where many others fear to tread–jaywalking down a street carrying a rifle in front of police, police who kill an average of three people a day for lesser offenses, safe enough to joke with them.  He was one of them. Sort of. A junior police cadet back in Grayslake, Illinois. He didn’t fear them, even though the police had fired thousands of rounds of plastic bullets into dense crowds of protesters. Rittenhouse didn’t fear the Kenosha Guard, a militia group also armed to the teeth that night, whose geared-up members pointed laser-sighted guns at the crowd, hoping to incite a panic.

        Fear was in the air that night in Kenosha. And some found it intoxicating, including the pudgy kid in the Army green t-shirt, combat boots and ballcap, who came to Kenosha with an assault rifle and medical kit to help. He’d use one, but not the other. Did he also come to spread fear? To instigate the carnage, he planned to treat? “If there’s somebody’s hurt,” he said. “I’m running into harm’s way.” It turns out: He was going to hurt somebody. He was harm’s way running.

      • Opinion | Congress Needs to Investigate the Pentagon’s Failure to Protect Civilians

        Pentagon leadership cannot — or will not — fix its civilian casualties problem. It’s long past time for Congress to step in.

      • Totalitarian Cyber-Creep: Mark Zuckerberg in the Metaverse

        Facebook, in particular, has been trying to push such a model using a tactic all companies in distress have sought to adopt: rebranding.  Be it the scandals disclosed by the Facebook papers, the scrutiny over the use of algorithms by the company, the inability to combat galloping misinformation on its platforms, or the stark amorality of the company’s founder, Mark Zuckerberg, the chance to seek the metaverse has presented itself.

        Enter, then, the world of Meta Platforms, aided by the virtual reality headset company Oculus, which was acquired by Facebook in 2014 for $2 billion.  Astute watchers then would have been the strategy afoot at the time; most, however, thought the decision misguided and destined to flop.

      • US History and its Ugly Truth

        Dunbar Ortiz, whose classic text An Indigenous People’s History of the United States details the history of that nation via the histories of the nations they encountered in North America and destroyed, begins her new book with a discussion of the Lin Miranda Broadway hit, Hamilton! The musical is based on the life of Alexander Hamilton, one of the founders of the United States, a slave trader and a proponent of continued expansion into indigenous lands by the new nation. The drama obfuscates the true nature of the United States by featuring Black and Latino actors playing white men and women and is scored to a hip hop soundtrack. By doing this, Miranda’s casting illustrates a key part of the immigrant myth dismantled in Not a Nation of Immigrants. That is, the US invites people from around the world into its borders, gives them opportunity and hope, and over time they become Americans, just like the English, German and other European settlers did in centuries past.

        Of course, this mythology is just that. In truth, there are other requirements to become a real American. Historically, foremost among those requirements was white skin. Despite the efforts of millions of US residents to end this (now) unmentionable requirement, the politics of our time prove almost daily that skin tone matters more than it should. The text describes the arrival of settlers and immigrants from different European nations—the Irish, Italians, Germans, and English—and the trajectory of each ethnicity as it traversed the path from non-white immigrant to white American. In discussing this social mechanism, Dunbar Ortiz describes the imaginary racial hierarchy based on skin tone and its concretization as fact by the most powerful (and in their minds, the whitest) men in the nation. It almost goes without saying that this whitewashing requires these migrants to dismiss the existence of those humans who lived on the continent before the first settler invasion. Likewise, each “new American” is also expected to forget the slave bodies that made up the wealth of so many of the families whose names are synonymous with their new country.

      • Carol Anderson on White Supremacy vs. Democracy

        This week on CounterSpin: What do we want? Multiracial democracy. When do we want it? Now. What stands in the way? White supremacy that has disregarded, derailed and violently defied that democracy at multiple turns.

      • Danish Navy kills four pirates in firefight in Gulf of Guinea

        Danish naval forces have killed four pirates during a firefight off the coast of Nigeria in the Gulf of Guinea.

        The Esbern Snare, a Danish frigate, came under fire in an incident yesterday, reports Forsvaret, the Danish armed forces.

        In returning fire, five of the assailants were hit – four fatally. No sailors on the Esbern Snare were injured.

      • American manufacturers race to relieve a pandemic-triggered ammo shortage

        Remington has been able to increase prices seven times. It has unfilled orders worth billions of dollars. Retailers of ammunition surveyed by the National Shooting Sports Foundation (NSSF), a trade group, said they could have sold three times more ammunition during the first half of 2021 had it been available. Vista, Remington’s new parent, has infused working capital and increased the size of its workforce. The unit’s operating profits this year are expected to be similar to the $81m that Vista paid for the business. As for Winchester Ammunition, its revenues for the third quarter nearly doubled year on year, to $400m, and its gross operating profits nearly quadrupled.

      • Migrant smuggler ‘butchers’ must be stopped, victim’s father tells France

        “I ask the French government to tighten their borders and stop those butchers. They are not smugglers, they are mafias. This is my only request.

        “Those boats that they are using are not made for that purpose. They treat those poor people like animals. Where were her human rights?

        “It is the role of the French government to have a strict procedure to stop those butchers to avoid further tragedies. And I hope our people stop even thinking about migrating using similar ways.”

    • Environment

      • Big Oil’s Big Lie About Who Caused the Climate Collapse

        The very problematic concept of one’s carbon footprint is the subject of Sami Grover’s new book, We’re All Climate Hypocrites Now. Who kicked the carbon-footprint-individual-responsibility-for-climate-change bandwagon into gear? None other than the guilty parties, the oil companies. BP to be exact. Fossil fuel companies love it when ordinary people blame themselves for the climate collapse, for an obvious reason: it gets them off the hook to keep raking in profits, receiving mega-subsidies from government and polluting the atmosphere with carbon without getting fined for it – as they would in any sane world.

        “BP’s championing of carbon footprints should be viewed not simply as a naïve and imperfect effort at corporate responsibility,” writes Grover, “but rather as a direct and calculated attempt to shape discussion of the problem in BP’s favor.” Oil companies, Grover notes “are actually all too happy to talk about the climate crisis. They just want you to know that it’s mostly your fault.” And they’ve succeeded remarkably with this subterfuge. Lots of people dither about eating a cup of yogurt when they could be joining Extinction Rebellion. Some benighted souls have even been hoodwinked into foreswearing children.

      • Tory MP Who Criticised Climate Action For Impact on World’s Poor Has Stakes in 18 Extractive Companies

        A Tory MP who suggested it is “morally wrong” to discourage poor countries from pursuing high-carbon growth on climate change grounds has a financial interest in numerous fossil fuel and mining companies.

        Among the 18 extractive companies listed under the MP’s entry in the parliamentary register of interests are Shell and the world’s largest oilfield services company, Schlumberger.

      • Climate tipping points: The Arctic is a bellwether for irreversible change

        Around the world, ecosystem tipping points loom as wildfire, human land use and biodiversity loss exponentially increase and magnify climate impacts. Expanding ocean dead zones, coral reef bleaching and rainforest loss are emblematic of system collapses — and are slowly combining to create global tipping points. There is very little time to alter the trajectory of Earth’s ecosystems, halting climate-driven collapse. To protect the Earth’s incredible diversity and stability, we must acknowledge that climate change is already permanently changing the planet — and we have little time to change course.

      • When Real Life Feels More Like Science Fiction

        Sadly enough, however, you can’t just blame Donald Trump and the Republicans for our increasingly endangered planet. After all, who needs giant Martians or monstrous human-destroying plants when carbon dioxide and methane will, in the long run, do the trick? Who needs aliens like Martians and Triffids, given the global fossil-fuel industry?

        Keep in mind that more representatives of that crew were accredited as delegates at the recent Glasgow climate-change talks than of any country on the planet. That industry’s CEOs have long been all too cognizant of climate change and how it could ravage this world of ours. They have also been all too willing to ignore it or even to put significant funds into climate-denial outfits. If, in 2200, there are still historians left to write about this world of ours, I have little doubt that they’ll view those CEOs as the greatest criminals in what has been a sordid tale of human history.

        Nor, sadly enough, when it comes to this country, can you leave the Democrats out of the picture of global destruction either. Consider this, for instance: After the recent talks in Glasgow, President Biden returned home reasonably triumphant, swearing that he would “lead by example” when it came to climate-change innovation. He was, of course, leaving behind in Scotland visions of a future world where, according to recent calculations, the temperature later in this century could hit 2.4 to 2.7 degrees Celsius (4.32 to 4.86 degrees Fahrenheit) above that of the preindustrial age. That, of course, would be a formula for destruction on a devastating scale.

      • Opinion | Why Big Oil’s Pivot to Carbon Capture and Storage—While It Keeps on Drilling—Isn’t a Climate Solution

        After decades of sowing doubt about climate change and its causes, the fossil fuel industry is now shifting to a new strategy: presenting itself as the source of solutions. This repositioning includes rebranding itself as a “carbon management industry.”

      • The Lesson Moby-Dick Has for a Warming World

        As an environmental historian and scholar of the 19th century, I spend a lot of time thinking about how the past can help us confront our current crises – especially climate change.

        And there’s a lot of help to be found in the 1800s, from the appreciation of wildness in Henry David Thoreau’s famous “Walden,” to the rise of ecology, the science of interdependence. “We may all be netted together,” Charles Darwin scribbled in his notebook.

      • Energy

        • The Big Industry That COP26 Failed to Tackle

          Lehner argues that most analyses exclude five unique sources of emissions from the farming sector: soil carbon (carbon released during the disturbance of soil), lost sequestration (carbon that would still be sequestered in the ground had that land not been converted into farmland), input footprints (carbon footprint for products used in agriculture, like the manufacturing of fertilizer), difficult measurements (it is harder to measure the carbon emissions of biological systems like agriculture than it is to measure the emissions of other industries that are not biological, like transportation), and potent gases (like methane and nitrous oxide).

          Regarding that last source: Focusing on carbon dioxide as the main greenhouse gas often ignores powerful planet-warming gases that are emitted by agriculture and that are even more potent than carbon dioxide. Methane, which is emitted by the burps and farts of ruminants like cows and sheep, has up to 86 times more global warming potential over a 20-year period than carbon dioxide (and also impacts public health, particularly in frontline communities). Nitrous oxide, a byproduct of fertilizer runoff, has 300 times more warming potential than carbon dioxide (and also harms plants and animals).

        • COP OUT 26
        • Opinion | California May Ban New Oil Wells Near Homes. Let’s Eliminate the Existing Problem While We’re At It

          A few months ago, the two of us joined California First Partner Jennifer Siebel Newsom at the Boys & Girls Club in Wilmington to show her places where oil wells are poisonously close to where children play, learn and live. Then late last month, Gov. Gavin Newsom heeded the demands of frontline residents when he stood at this same site and announced a plan to prevent new oil drilling operations within 3,200 feet of homes, schools, playgrounds and hospitals.

        • Black Friday is causing toxic traffic jams at US ports and warehouses

          As millions of Americans rush to take advantage of Black Friday deals this weekend, the shopping spree will add to a pollution crisis unfolding at America’s ports. For months, broken supply chains have saddled port-side neighborhoods with more pollution than they normally endure. The holiday season will make things even worse.

          The disaster is unfolding in spectacular fashion in Southern California, home to the busiest port complex in the western hemisphere (which includes the ports of Los Angeles and Long Beach). Here, cargo ships have piled up offshore as the pandemic wreaks havoc on global supply chains. The traffic jam extends to inland distribution hubs that attract trucks, trains, and planes shuttling goods from warehouses to consumers’ doorsteps.

        • Interior Dept. Report on Drilling Is Mostly Silent on Climate Change

          The department recommended higher fees for oil and gas leases, but there was no sign the government planned to take global warming into account when weighing new applications.

        • Biden Drilling Report Blasted as ‘Shocking Capitulation to the Needs of Corporate Polluters’

          Climate campaigners and other progressive critics on Friday called out the Biden administration for a new U.S. Interior Department report about leasing public lands and waters to oil and gas companies, slamming its proposals as far too weak given the need to keep fossil fuels in the ground.

          “These trivial changes are nearly meaningless in the midst of this climate emergency.”

        • With California’s OK, Chevron is selling oil from an illegal spill

          Chevron, the company responsible for the McPhee spill, appears to be violating a law prohibiting so-called surface expressions. But the California Geologic Energy Management Division (CalGEM), the regulating agency responsible for enforcing such rules, hasn’t issued penalties to Chevron, apart from a fine it levied against the company for a nearby spill that occurred in May 2019.

          More alarming, argue environmentalists, is that Chevron is selling the oil that it collects from the spill, even though it’s coming from a seep prohibited by regulations. CalGEM says it has yet to “assess” the amount of money Chevron has made off selling oil from this surface expression since November 2019.

        • Interior recommends imposing higher costs for public lands drilling

          The report, which was originally slated for an “early summer” release that didn’t materialize, is expected to inform the administration’s future oil and gas leasing policies.

          Specifically, the report calls on BLM, which governs public lands drilling, to raise minimum royalties paid for onshore oil and gas leases, increase minimum bids that companies can make on tracts of land and rental rates that companies pay before they begin producing oil and gas on the leased lands.

          It also calls for BLM to increase the surety bonds that companies pay the federal government as an assurance to make sure they are complying with their lease terms.

        • Biden administration approves second major offshore wind project, to provide power to N.Y.

          The approval from the Interior Department paves the way for the country’s second large-scale offshore wind farm after a similar project got underway in Massachusetts. The administration aims to put the U.S. on a path to generate 30 gigawatts of offshore wind energy by 2030, powering about 10 million homes.

        • Russian coal mine: Dozens killed in Siberia accident

          mong the dead were five rescue workers, although a sixth was found alive and taken to hospital in a serious condition.

          The blast happened at the Listvyazhnaya mine when coal dust caught fire in a ventilation shaft on Thursday.

      • Wildlife/Nature

      • Overpopulation

    • Finance

      • Raising the Standard of Living for Everyone Could Offset the Pains of Inflation
      • Opinion | Blowing Up a Few Myths About Inflation

        Inflation has been a bugaboo of right-wingers and even the political center since the 1970s. So it’s not surprising that with consumer prices rising, the national discourse has suddenly shifted from yesterday’s news to looming hyperinflation and fiscal ruin. But in order to understand what’s really going on, you need to understand what inflation is, what it isn’t, and where we actually are.

      • ‘They Do Not Tell Both Sides of the Inflation Story’
      • The Media’s War Against Biden on Inflation

        There, I said it in all caps so that everyone can see I recognize it as a problem. The question is how big a problem. After all, we have lots of problems, millions of children in poverty, a huge homeless population, parents without access to affordable childcare, among others.

        But none of these other problems has gotten anywhere near the same amount of attention from the media in recent months as inflation. These pieces have often been quite openly dishonest. The nonstop hype of “inflation, inflation, inflation” unsurprisingly leads many people to believe inflation is a really big problem, even if their own finances are pretty good, because they hear all those wise reporters at CNN, NPR, the NYT and elsewhere telling them it’s a really big problem.

      • Progressive US Lawmakers Mark Black Friday With Calls to Pass the PRO Act

        As workers worldwide took to the streets while shoppers flooded stores for Black Friday, progressive U.S. lawmakers used the event to pressure the Senate to pass sweeping, House-approved labor rights legislation.

        “The Senate should celebrate Black Friday by passing the PRO Act to protect the hardworking folks who are being underpaid and overworked this holiday season.”

      • DoorDash to pay $5.3 million to S.F. couriers over alleged violations of past benefits

        Restaurant-delivery company DoorDash will pay $5.3 million to settle allegations with San Francisco that it stiffed almost 4,500 delivery workers of the city’s mandated health care coverage and paid sick leave, The Chronicle has learned.

        The settlement being announced Monday represents substantial restitution for some couriers and marks another inflection point in the discord over whether gig workers should be classified as employees or independent contractors, although it does not set a precedent.

        DoorDash, which is headquartered in San Francisco, did not admit wrongdoing. Although the health care and sick leave requirements both apply to employees, DoorDash said that settling was not an acknowledgment that a judge could have found it to be an employer. DoorDash, like other gig companies, is adamant that its workers should be classified as independent contractors.

        But city officials involved in the case begged to differ.

      • Irving Wladawsky-Berger: The Evolution of Enterprise Architecture in an Increasingly Digital World

        “What does it take for traditional companies to create value with digital technology?,” asked a McKinsey article published in November of 2018. Based on its research, the article suggested that “successful digital reinventors – digital natives and digitally transformed incumbents – employ a range of approaches, such as investing boldly and adopting cutting-edge technologies at scale.” However, the article warned, such efforts can run into serious difficulties. “In our experience, a push to launch more digital applications can make a company’s technology landscape increasingly complex and difficult to manage, to the point that it impedes transformation programs.”

        A few months ago, I wrote about the evolving role of the CIO, based on a survey of over 500 CIOs and related technology leaders. Almost all of the surveyed CIOs agreed that their responsibilities will become more strategic in the coming years, uniting their company’s business and technology strategies and managing increasingly complex and difficult digital transformations.

        This strategic role of the CIO is in turn driving the evolution of their enterprise-architecture (EA) teams. Traditionally, enterprise architects have been responsible for translating business needs into IT requirements. A major part of their job is making sure that their company’s IT systems work together to enable and support the company’s overall digital strategy. And increasingly, EA teams have the primary responsibility for managing the technological complexity inherent in digital transformations.

    • AstroTurf/Lobbying/Politics

      • Everybody Knows: Corruption in America – A Book Review
      • Elitism is Not the Answer to Populism: On ‘Anti-Vaxxers’ and Mistrust in Government

        While it is true that populist, right-wing movements throughout Europe and elsewhere have actively exploited the anger, confusion and lack of trust in governments for years, it is still necessary to understand the roots of the mistrust, as opposed to readily contributing to the stifling division.

        A Gallup poll, published in 2013, revealed the extent of mistrust that Americans, for example, have in their own government, and the decline of that trust when compared to the previous year. According to the poll, only 10% of Americans trusted their elected Congress, only 19% trusted the country’s health system, 22% had trust in big business and 23% in news media.

      • Communications and Electronics Lobbying Skyrockets Amid Microchip Shortage
      • Opinion | Breaking News: AOC’s District Has Opinions

        The residents of New York Rep. Alexandria Ocasio-Cortez’s district, like all New Yorkers, love to argue. No one can agree which Colombian bakery has the best empanadas. Given that the district is in both the Bronx and Queens, it is home to both Mets and Yankees fans.The state’s 14th congressional district is well-known for its diversity. It’s the type of place where you might find a Bangladeshi woman in full body covering selling Korans next to a sex worker. Everyone has their differences, but for the most part people get along.

      • Opinion | Germany to Get Green Party Ministry of Economy, Energy, and Climate in Boost for President Biden

        Germany’s environmentalist Green Party, led by two popular politicians, nearly doubled its seats in parliament to become a swing party for the formation of a new government coalition. Their prospects were boosted when the center-left Social Democrats narrowly beat the conservative Christian Democrats in number of seats in the September 26 election.

      • Mystery Meat Congress; Clueless Mainstream Press

        A couple of decades ago, I complained to a Hill colleague, “It (Congress) can’t get any worse than this.”  How wrong I was.

        Based on my experience and outlook, I offer the following observations.

      • No Accounts
      • Jayapal’s Shrewd Gambit
      • Pramila Jayapal Has Made Her Case to Be Pelosi’s Successor

        The House’s passage of the infrastructure bill and the Build Back Better legislation was another example of Speaker Nancy Pelosi’s legendary ability to keep her caucus united. What made this time different, however, was the emergence of a new force in the House—the Congressional Progressive Caucus. The CPC and its chair, Representative Pramila Jayapal (D-Wash.), forced conservatives in the House caucus to pass the expansive BBB, and got the Senate’s prima donna—Democrat Joe Manchin III (W.Va.)—to embrace a framework that gives it some hope of surviving in the Senate. In doing so, the CPC and Jayapal displayed a new coherence, strategic sophistication, and collective discipline that bodes well for the future.

      • Georgia teens become unlikely warriors in redistricting fight

        Horton is one of the dozens of teenagers mobilizing and testifying in Georgia’s redistricting process this year, juggling finals and extracurriculars with special legislative sessions and injecting an unusual level of youth engagement into a typically wonky, insiders’ political routine.

        In the last few years, a surge of interest in redistricting has raised awareness about the effects of gerrymandering and propelled many states to revamp their map-drawing processes, prompting more young people to get involved around the country. Middle school students in New York created an algorithm for drawing maps, while North Carolina college students lobbied against the gerrymandering that split their campuses into multiple districts.

      • China steps up pressure on tech with draft online ad rules

        China’s market regulator proposed new rules on Friday that would increase online advertising oversight, including stipulating that adverts should not affect normal [Internet] use or mislead users.

        Authorities in China have tightened regulation across a range of industries this year, with an emphasis on technology.

      • AIT director lambastes China for destabilizing region

        The director pointed out that China’s provocative military operations near Taiwan destabilize the region and increases the risk of misjudgment. In addition, Beijing is attempting to minimize Taiwan’s international space by asserting pressure on Taiwan’s allies and interfering with Taiwan’s democratic system, CNA cited Oudkirk as saying.

    • Misinformation/Disinformation

      • Providing a European perspective…public service media allied to offer an innovative news sharing model across the continent

        In a world where audiences are overwhelmed by an avalanche of information that has no editorial or ethical guardrails, ‘A European Perspective’ will serve as a beacon of trust and integrity. Its content will be deeply rooted in core European values such as respect for human dignity, equality, inclusion and the rule of law.

        Through this initiative, EBU Members from Belgium (RTBF), Finland (YLE), France (France Télévisions), Germany (BR/ARD), Ireland (RTÉ), Italy (RAI), Portugal (RTP), Spain (RTVE) and Switzerland (SWI swissinfo.ch) as well as ARTE, the Franco-German broadcaster, are poised to reshape the European digital sphere by offering their online readers access to stories that explore the many facets of the European identity.

        The ten public media organizations are able to select and publish each other’s content through a bespoke digital news hub that uses AI technology to translate the reports into multiple languages. The service is underpinned by the EBU’s PEACH system for recommendations and the EuroVOX toolkit for automated language services.

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Murdoch and the IPA Politicise Freedom in Battlelines for Next Year’s Elections

        In addition to lording over a media empire known for making an art out of demonising enemies and panic-driven scapegoating, Rupert Murdoch has long been recognised as the kingmaker in federal elections. When a party leader visits Rupert Murdoch in the months before an election is announced, it is a predictable sign that he has bestowed his favour on the candidate. So when it emerged that Scott Morrison had dined with News Corp chief executive Robert Thomson in New York during his September trip to the US, political commentators took note.

        Election or not, Murdoch thrives on political instability. As Democrat Rahm Emanuel so infamously observed, one can never let a serious crisis go to waste. From the Tampa to terrorism, Murdoch’s process of turning ‘unwinnable elections’ into great victories follows the all-too-familiar pattern of the Scare Cycle, stirring up moral panic and overwhelming the public with fears of imminent existential threats.

      • ¡Basta! Sports Journalists in Spain Demand End to Abuse

        The article came out as a new law was going through the Spanish parliament that promises to tackle online sexual abuse for the first time.

        Due to come into effect next year, the legislation will class online abuse as sexual violence. Convicted offenders will face fines or even house arrest.

      • Cuban Journalists Say Facebook Curbs Ability to Work

        Facebook has been accused of blocking independent journalists in Cuba from sharing posts as opposition groups have called for protests to continue against the island’s communist government.

        The social media platform, whose parent company is now known as Meta, sends messages to journalists regularly, telling them that they cannot share messages, three different reporters told VOA. The journalists complain this prevents them from sharing information, which they say is crucial to their work.

    • Civil Rights/Policing

      • This Year I’m Thankful for the Revolt Against Two-Tier Hiring Practices
      • Social Theory in the Age of Catastrophes: Engaging Seyla Benhabib

        Benhabib informs us that she has not given up hoping. The famous slogan of the German student movement in the 1960s was “below the asphalt lies the beach.” She is still looking for it. The great theologian Paul Tillich wrote about the “courage to be” in the late 1950s. Today a new slogan is required: the “courage to critique” and “courage to keep on keeping on.”  Our age of catastrophe is knocking the stuffing out of us. It itself seems interminable, the challenges new, we’re tired. Are our conceptual resources (located in the Critical Theory tradition) up to the new-present-before-us?

        In a recent article, “Democracy, science and the state: reflections on the disaster(s) of our times, Philosophy and Social Criticism, vol. 47(4), 2021, the intrepid Benhabib ventures onto the terrain of a world radically disrupted by the global Covid-19 pandemic and damages inflicted upon by the Anthropocene on earth. She begins her meditative essay by asking whether humankind is facing a unique historical kairos moment when a monumental transformation is occurring within global civilization.

      • Malcolm at the Audubon Ballroom

        Manhattan District Attorney Cyrus Vance, Jr., who ordered the belated reinvestigation, made a meaningless apology that might be the understatement of all time: “This points to the truth that law-enforcement over history has often failed to live up to its responsibilities. These men did not get the justice that they deserve.”

        Aziz and Islam spent a combined 42 years in prison, as the Times notes, “with years in solitary confinement… in some of New York’s worst maximum security prisons.” And knowing and maintaining all the while that they were innocent.

      • ‘We Are Fighting Back’: Global Black Friday Strikes and Protests Seek to #MakeAmazonPay

        On Black Friday, more than 70 labor unions and progressive advocacy groups shut down workplaces and hit the streets in cities around the globe to demand—on Amazon’s most profitable day of the year—that the sprawling tech and logistics corporation pay a living wage to its employees and a fair share of taxes to compensate the societies in which it operates.

        “From oil refineries, to factories, to warehouses, to data centers, to corporate offices in countries across the world, workers and activists are rising up in strikes, protests, and actions to Make Amazon Pay,” reads the campaign’s website. While the international coalition held its first Black Friday day of action 12 months ago, opposition to Amazon’s abuses has only grown since then, and work stoppages and rallies targeting the e-commerce giant were expected in at least 20 countries on every inhabited continent this year.

      • Spotty Data and Media Bias Delay Justice for Missing and Murdered Indigenous People

        There are estimates. In 2019, 8,162 Indigenous youth and 2,285 Indigenous adults were reported missing to the National Crime Information Center, or NCIC, out of a total of 609,275 cases. But crimes against Native individuals often go unreported, and with American Indian and Alaskan Native cases, race is sometimes ignored or misclassified as white.

        The Centers for Disease Control and Prevention estimate that Native American women are murdered at a rate three times that of white American women.

      • Which Immigration Story Will Prevail?

        It’s a narrative as powerful as it is untrue, and it needs to be countered: not just for the sake of immigrants, but for the nation as a whole.

        On November 19, when House Democrats passed a $2.2 trillion social safety net and climate bill, they left out a signature Biden administration commitment: a path to citizenship for the 10.2 million undocumented immigrants living in the U.S. Instead, they included in the budget bill a provision for a temporary status called “parole,” a five-year protection from deportation along with eligibility for work permits. If the provision is passed in the Senate, it will also give immigrants an opportunity to renew the protected status for another five years. But even that development is iffy. Senate negotiations on the budget bill, particularly on immigration, may be more grueling than in the House.

      • The Indian Farmers Defend the Rights of Farmers Everywhere

        It seems likely that Modi will not give up on his policies to privatize agriculture, but rather will return to them with different packaging. “Our government has been working in the interest of the farmers and will continue to do so,” he insisted.

        Jubilation at the Victory

      • The Jury Selection Process Is Rigged in Favor of White Supremacy
      • Crossings to the UK: EU police to install hidden cameras on French and Belgian beaches

        With several police actions, the riparians of the English Channel want to prevent unwanted crossings of migrants. German authorities plan internet campaigns against the sale of inflatable boats and engines. After Brexit, the UK is taking part in these measures funded by the Council of the EU.

      • A Chink in My Privilege: When Being White and Jewish Isn’t Enough

        “I need a cell for a Jew,” the Israeli cops driving the jeep called into the jail. I was the Jew they were referring to and the jail was the infamous “Muskobia,” in the heart of West Jerusalem. This was the end of a long and tiring day that began with a protest in the village of Nabi Saleh in Palestine. I was covered in sweat, tear gas, dust, and quite a bit of the disgusting skunk liquid that the Israeli army sprays on protestors.

      • UNESCO Members Adopt First Global AI Ethics Agreement ‘To Benefit Humanity’

        Tech ethicists on Friday applauded after all 193 member states of the United Nations Educational, Scientific, and Cultural Organization adopted the first global framework agreement on the ethics of artificial intelligence, which acknowledges that “AI technologies can be of great service to humanity” and that “all countries can benefit from them,” while warning that “they also raise fundamental ethical concerns.”

        “It’s a good step, but there are a lot more steps that we need to take, like a ban on autonomous weapons, on killer robots.”

      • Facebook tells LA police to stop spying on users with fake accounts

        “Not only do LAPD instructional documents use Facebook as an explicit example in advising officers to set up fake social media accounts, but documents also indicate that LAPD policies simply allow officers to create fake accounts for ‘online investigative activity’,” wrote Facebook’s vice president and deputy general counsel for civil rights Roy Austin in a letter outlining Facebook’s policies.

        “While the legitimacy of such policies may be up to the LAPD, officers must abide by Facebook’s policies when creating accounts on our services. The Police Department should cease all activities on Facebook that involve the use of fake accounts, impersonation of others, and collection of data for surveillance purposes.”

      • China man claiming to know Peng Shuai says WTA head ignored her mail

        A man claiming to be an associate of Chinese tennis star Peng Shuai has accused the head of the Women’s Tennis Association of allegedly ignoring an email from her.

      • Tribes That Aren’t Federally Recognized Face Unique Challenges

        Being federally recognized means the U.S. government engages with a tribe in a government-to-government relationship, granting tribes sovereignty and access to resources such as federal funds. The Winnemem are not the only tribe who lack this status. In 2012, the Government Accountability Office counted around 400 unrecognized tribes in the U.S.

        Federal recognition may be an asset, but the process to acquire it is far from smooth. Ironically, the process means tribes must seek approval for recognition from the United States, a nation founded on Indigenous genocide. Tribes can gain federal recognition by taking their case to court, receiving a presidential executive order, petitioning the Bureau of Indian Affairs (BIA), or through an act of Congress.

      • Clashes as protesters demand end to violence against women

        The demonstration in Istanbul’s Taksim Square came just months after Turkey withdrew from an international treaty aimed at protecting women.

    • Internet Policy/Net Neutrality

      • The Internet is Held Together With Spit & Baling Wire

        Imagine being able to disconnect or redirect Internet traffic destined for some of the world’s biggest companies — just by spoofing an email. This is the nature of a threat vector recently removed by a Fortune 500 firm that operates one of the largest Internet backbones.

    • Digital Restrictions (DRM)

      • TV News’ Dangerous Bet: Hedging on a Streaming Future

        Does TV news have a future outside of the existing television ecosystem? The question is top of mind for news executives as the entertainment world dramatically shifts, with linear TV channels facing steady decline and streaming on the rise.

    • Monopolies

      • Nextcloud: Complaint to the Federal Cartel Office about Microsoft

        The German software company Nextcloud has applied to the Federal Cartel Office to check whether Microsoft has a dominant position. Company founder Frank Karlitschek announced this on Friday and confirmed a report by the news magazine “Der Spiegel”.

        Nextcloud competes with Microsoft products such as Office 365, OneDrive, Azure and Teams.

        The Stuttgart company’s complaint now states that the US group is using its power to sell package solutions for Microsoft Office. The Teams cooperation platform also has a significant market share, as does the OneDrive cloud solution. The complaint is primarily directed against the deep integration of the cloud solution. Nextcloud argues that the service is regularly displayed to users of the widespread Microsoft Windows operating system during relevant work steps.

      • Deutsche Softwarefirma beschwert sich beim Bundeskartellamt über Microsoft [Ed: A Bill Gates-bribed (repeatedly) 'news' site]
      • EU tech sector fights for a Level Playing Field with Microsoft

        Microsoft is integrating 365 deeper and deeper in their service and software portfolio, including Windows. OneDrive is pushed wherever users deal with file storage and Teams is a default part of Windows 11. This makes it nearly impossible to compete with their SaaS services. In the wider context, you see that over the last years, Microsoft, Google and Amazon have grown their market share to 66% of the total European market, with local providers contracting from 26% to 16%. Behavior like this is at the core of this growth of the tech giants and has to be stopped.

        This is a similar situation than in the late 90s when Microsoft bundled Internet Explorer with Windows to compete with Netscape. This is not an incident. Other Big Tech firms like Google and Amazon are doing the same thing and the EU should take a stand.

      • Copyrights

        • Pass the American Music Fairness Act, Says GRAMMY U

          To do that, artists and musicians like us need to be compensated fairly for the hard work that goes into our music — but unfortunately, that’s not how it is right now. Songwriters get paid for radio play, but performers do not. For decades, big corporations that own and control thousands of radio stations in the United States have refused to pay performers when they play their music on AM/FM radio. That’s right, they take our product and use it to make billions of dollars from advertising — and then don’t give us a single cent.

        • North Korean sentenced to death after students caught watching Squid Game

          North Korea has sentenced to death a man who smuggled and sold copies of the Netflix series “Squid Game” after authorities caught seven high school students watching the Korean-language global hit show, sources in the country told RFA.

          The smuggler is said to have brought a copy of Squid Game into North Korea back from China and sold USB flash drives containing the series. Sources said his sentence would be carried out by firing squad.

        • IFPI & MPA Oppose ‘New Safe Harbors’ in Digital Services Act

          The European Council’s adoption this week of the General Approach on the Digital Services Act has been met with disappointment by a coalition of rightsholders including IFPI and the MPA. Their concerns include the introduction of a “safe harbor” for search engines and the apparent detachment of due diligence obligations from liability for infringing content.

        • Dubious Outfit Uses Copyright Claims for Black Hat SEO Scheme

          A few days ago, we were accused of copyright infringement by a company that says it acts ‘on behalf’ of photographers whose work is shared without permission. To resolve the dispute, we only had to add a link to an entirely unrelated website. We denied this request but this black-hat SEO scheme is quite successful at other sites, including news outfits and even a university.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts