Bonum Certa Men Certa

Links 10/7/2021: IBM Buying Another Company, More European Patents Perish



  • GNU/Linux

    • Server

      • Best CentOS Alternatives for Large Companies

        The system of most of the top companies is based on CentOS distribution, which includes Verizon, Toyota, Disney, etc. Other major technology companies utilize this Linux distribution for creating various products. What can these and other companies that use CentOS daily do? They try to find out different Linux distributions. But, you don’t have to roam around cause you are at the right place. This post is all about the Best CentOS alternatives for larges companies. So, let’s this journey started:

    • Audiocasts/Shows

    • Kernel Space

      • AMD VanGogh APUs Get New Audio Driver For Linux - Phoronix

        Since last year AMD has been working on VanGogh APU support for Linux initially with their graphics driver support and that has spread to other areas. It also turns out now that with VanGogh APUs will be a new Linux audio driver.

      • Graphics Stack

        • Mike Blumenkrantz: At Last

          Zink(-wip) now fully supports GL_KHR_blend_equation_advanced, which means ES 3.2 is a go (once my local CI clears me to push today’s snapshot).

        • Zink Now Supports OpenGL ES 3.2 Over Vulkan - Phoronix

          The latest achievement for Mesa's generic OpenGL implementation atop Vulkan is being able to handle OpenGL ES 3.2.

          Within the "zink-wip" development code, today's work now allows for OpenGL ES 3.2 to be exposed with KHR_blend_equation_advanced being the last extension necessary for this embedded OpenGL version. On the desktop side Zink has supported OpenGL 4.6 while for those making use of GLES there is now v3.2 support. OpenGL ES 3.2 mandates KHR_debug, KHR_robustness, OES_geometry_shader, OES_gpu_shader5, OES_texture_buffer, OES_tessellation_shader, and other extensions.

        • Intel's Linux Compute Stack Now Boasts Production-Ready OpenCL 3.0, Integrates IGSC FU - Phoronix

          Shortly after OpenCL 3.0 was finalized last year it was enabled for Intel's open-source Compute Runtime stack (and even earlier with their Tiger Lake enablement). But since last year that OpenCL 3.0 support was marked as "beta" while last week was quietly promoted to being "production" grade.

          With last week's Intel Compute-Runtime 21.26.20194 build and carried forward with today's 21.27.20266 build, the OpenCL 3.0 support is marked as production ready. This is a subtle change in noticing the difference from the version tables and just seems to reflect the good state of Intel's open-source OpenCL support. Even in the months of the "beta" support, OpenCL 3.0 with the Intel Compute-Runtime has been working well for me from Gen9 Skylake graphics through Gen12 Tiger Lake.

    • Applications

      • [Older] Audacity 'Spyware' Claims Follow Privacy Policy Changes By New Owner

        Popular open-source audio editing software Audacity is facing "spyware" allegations from users for recent privacy policy changes that suggest the desktop app is collecting user data and sharing it with third parties, including state regulators where applicable.

        Two months ago, Audacity was acquired by Muse Group, which owns other audio-related projects including the Ultimate Guitar website and the MuseScore app. According to Fosspost, changes to the privacy policy section on the Audacity website indicate that several personal data collection mechanisms have since been added by the parent company.

        The type of data collected now includes the computer's processor, operating system and version, the user's IP address, and any crash reports, fatal error codes and messages generated by their machine. More concerning perhaps is the inclusion of a vague section listing data that must be collected "for legal enforcement, litigation, and authorities' requests (if any)."

      • The Audacity! How to wreck an open-source project and anger a community

        Audacity. Surely, you've heard of it. It's one of the most widely used apps by podcasters everywhere. It's one open-source project that has managed to strike the perfect balance between feature list and usability. It has everything you could possibly need to record podcasts, music and just about any type of audio, and it does this while maintaining a level of user-friendliness that few software titles can touch. It's as easy to use as it is feature-rich.

        [...]

        Here's what happened. A company acquired Audacity. Now, prior to this, you may or may not have heard that the Audacity developers were toying around with adding telemetry to collect data from users. After a public outcry, it seemed that idea was sent to /dev/null to die a timely death.

        [...]

        Then they continue that they might share data with anyone they classify as a "third-party" or even "potential buyers." The actual verbiage of the new privacy policy describes those entities they might share your data with as such (taken directly from the official privacy notice that was posted July 2...

      • Users suspected that the successful audio software was spying on them, so they created a new version of it. [Ed: Seems like automated mishmash]

        Over the years, Audacity has developed a large and loyal user base in line with successful open source software – which some would define as the “default” for sound editors and podcasts. But since the software has changed hands in recent months, it hasn’t stopped bothering users – and this time they’re no longer just protesting and moving on.

      • What’s The Deal with the New Audacity Privacy Policy?

        The popular audio editing platform has come under fire for new privacy policies, so what’s the fuss all about?

        Audacity sparked controversy this week amid claims that its new privacy policy essentially turns the platform into ‘spyware’.

        The allegations, first published by tech site Fosspot, have raged on social media and prompted the company to revise the new privacy Ts & Cs.

        Audacity is among the most popular audio editing software tools available, boasting at least 100 million users globally.

      • Audacity clarifies privacy policy over spyware allegations

        The first version of the privacy policy mentioned sharing data with potential buyers, governments and law enforcement Popular open-source audio-editing software Audacity has promised to revise its privacy policy, following allegations that it is being transformed into 'spyware'.

      • Audio Recording And Editing Software ‘Audacity’ Is Not Spyware, Reports Said

        Early July, numerous reports from tech websites said that the popular audio recording and editing software Audacity is now considered spyware as it claims to collect sensitive data from the users that installed it in their PCs. Since this information was released, many users have already said that they are uninstalling their software and use other alternative software instead.

        However, it is said that this case has already been addressed two months ago.

        According to a recent report, although the software is free and open-source, its new owner Muse Group can create "pretty damaging changes" especially on its telemetry features and privacy policy which many people think is too vague and overarching.

        The new privacy policy released on July 2 mentioned the five bullet points that are not really broad. It's actually just similar to the collected data that was mentioned in FOSSPost's own privacy policy which is the following: browser cookies you may provide, browser user-gent, IP address, and your geographical location, cookies for other websites you visited or any other information your browser can give about you. The last row covers the "data necessary for law enforcement, litigation and authorities' requests (if any)" that is actually broad and not well-defined for its users. The other one is the fact that Audacity is not allowed to be used for users age 13 and below, requesting them to not use the app in order to avoid the expense of dealing with laws related to collecting personal data from children.

    • Instructionals/Technical

      • rsync over SSH

        I’ve migrated a few rsync pages yesterday and realised there’s been something I’d wanted to document for some time: using rsync over ssh.

        rsync initially started as a tool for synchronising local folders, then expanded to also working with external drives, then progressed to working with networking folders and eventually started working with remote servers using its own native rsync protocol.

      • How to Install Libinput-gestures to Enable Multi-Touch Gestures in Ubuntu | UbuntuHandbook

        For laptop users, the built-in touchpad can do more magic by enabling multi-touch gestures. And libinput-gestures is a popular solution besides touchegg.

        Libinput-gestures is a free open-source utility that reads libinput gestures from your touchpad and maps them to user customized gestures. Each gesture can be configured to activate a keyboard key combination via xdotool utility.

      • IP Address Classes Explained – Linux Hint

        This tutorial explains IP address classes or classful networks, their classification and their use. An IP address is a 32 bits unique binary number used to identify networks and devices or hosts, the result of the conversion of the binary number to decimal is what we know as IP address.

        In decimal format this address consists of 4 numbers ranging from 0 to 255 separated by a dot. For example: 240.34.87.22 is an IP address (in binary format: 11110000.00100010.01010111.00010110).

        Each one of those numbers separated by dots is called octet. In the previous example 240 is an octet, 34 is another octet, 87 the third octet and 22 the fourth octet. Each octet consists of 8 bits. Some bits are used to identify a network, while the rest are used to identify hosts within a network.

      • How to install Nitrux 1.5.0

        In this video, I am going to show how to install Nitrux 1.5.0.

      • Bash Cut Command with Examples – Linux Hint

        The cut command is used to extract the specific portion of text in a file. Many options can be added to the command to exclude unwanted items. It is mandatory to specify an option in the command otherwise it shows an error. In this article, we will throw light on each option of the cut command.

      • UEFI Shell Scripting Tutorial

        UEFI (Unified EFI – Extensible Firmware Interface) is a software specification used to interface between the operating system and the firmware of your computer’s hardware.

        UEFI has a built-in shell program called UEFI Shell or EFI Shell. You can use it to run EFI Shell commands and run your own EFI scripts.

        This article will show you how to write UEFI/EFI Shell scripts and run them from the UEFI/EFI Shell. So, let’s get started.

      • How to Map a Host Port to a Container Port? – Linux Hint

        The Docker open-source platform has completely changed how we build, deploy, and handle containerized apps. You will need to construct a Dockerfile to containerize an application, which contains the instructions Docker needs to generate and run images. To allow seamless communication among containers in multi-container applications and making your Docker ports available by services with the outside world, you may have to set certain networking rules.

        When you start a container with Docker, all of the applications in the container run on specific ports. If you wish to use a port number to access a specific application, you must first map the container’s port number to the docker host’s port number. Containers can use port mappings to send and receive traffic through ports on the host container instance. The container’s port mappings are defined as part of the container definition. The port number on the container that is connected to the host port was either chosen by the user or allocated automatically.

        Containers in Docker can have their applications running on ports. When running a container, you must map the container’s port number to the Docker host’s port number if you would like to connect the container’s application via a port number. In this tutorial, we will explain you about mapping a host port to a container port in docker.

      • Sort Command in Linux with Examples – Linux Hint

        SORT command in Linux is used to arrange the record in a specific order according to the option used. It helps in sorting the data in the file line by line. SORT command has different features that it follows in the resultant of commands. First is that the lines having numbers will come before the alphabetic lines. Those lines having lower case letters will be displayed earlier than the lines having the same character in uppercase.

      • Linux Tail Command with Examples – Linux Hint

        As the name implies, the tail command is used to display the last values of the content of the file. By default, the last 10 lines are selected. Whereas, we can customize the number of lines by providing the number in the command.

      • Linux Head Command with Examples – Linux Hint

        As the name shows, the head command displays the first N lines of data. By default, it is a 10 number but can be customized. It is opposite to the tail command because the tail command helps in displaying the last N lines from the file.

      • How to Run Virtual Machines Using GNOME Boxes in Linux – Linux Hint

        This article will cover a guide on installing and using “GNOME Boxes” application in Linux. You can use it to create and manage local or remote virtual machines. You can run many supported operating systems in these virtual machines by saving content in virtual hard drives.

        [...]

        Developed by the GNOME team, GNOME Boxes is a part of the official GNOME software suite. It is a graphical frontend for creating and managing QEMU virtual machines. QEMU is a command line tool that can emulate hardware components and run virtual machines containing full installation of various operating systems available out there. A graphical utility called, “virt-manager” is available that can be used to manage QEMU virtual machines. However, its user interface can be a bit overwhelming with its numerous built-in configuration options. GNOME Boxes aims to simplify the interface by only exposing necessary features to end users. It is more oriented towards casual desktop users who want to manage virtual machines for day to day tasks and want to run virtual machines quickly without much hassle. Advanced users, specially those who manage QEMU virtual machines for businesses and organizations, can always use the virt-manager graphical frontend.

      • How to Mount CD-ROM on CentOS 8 – Linux Hint

        CDs and DVDs are slowly becoming irrelevant, but they are still efficient data storage devices. They can store data in a large quantity for long periods of time. In this article, we will discuss the mounting process of CD-ROM on CentOS 8 step-by-step. The method we will perform in this article will also work if you want to mount an ISO file on CentOS 8 system.

      • How to Install and Use CentOS Web Panel on CentOS 8 – Linux Hint

        CentOS Web Panel (CWP) is a control panel for web hosting. It is a free alternative to cPanel. It has an easy-to-use interface and several other features for newbies who want to create and manage hosting servers. Using CWP is easy and convenient as you don’t have to access the server with SSH for every small task that needs to be completed.

        This article provides a detailed guide on installing and using the CentOS Web Panel on CentOS 8.

      • How to Install and Use Vagrant on CentOS 8 – Linux Hint

        A vagrant is an open-source tool that helps create, maintain and manage virtual environments. Vagrant has an easy-to-use workflow and focuses on automation. It decreases setup time and increases productivity. On Vagrant, it is straightforward to share setups between team members, enabling everyone to have the same setup.

        This article provides an extensive guide on how to install Vagrant on CentOS 8. We will also discuss how to create virtual development environments.

      • How to Delete Old Unused Kernels on CentOS 8 – Linux Hint

        The kernel is the bridge between software and hardware, and it is part of an operating system that interacts with the hardware.

        In normal circumstances, the number of installed kernels does not affect the system’s performance, but it is still recommended to remove old unused kernels as it frees up space. Before we start removing old unused kernels, it is essential to note that you should always have at least two kernels on your system at any time.

      • How to Pass Environment Variables to a Docker Container – Linux Hint

        Docker is an open-source program that executes server applications using containers rather than virtual machines. Docker is a development and hosting configuration that utilizes fewer resources, so it’s no surprise that it is sweeping the development world. Docker environment variables are significant to this procedure because they store data that is unique to each user account accessing the software.

        Using any modern JavaScript framework to create a container for a single app, you may discover that the configuration settings vary depending on where the container will execute. The basic URL for your API, for example, can vary based on whether you are testing or publishing the app. Environment variables are commonly used by developers to tackle this problem because code operates on the backend, environment variables are usually used there.

        During the image construction, we may need to pass environment information to the operating container. To do so, we employ both ENV and ARG commands. The ARG command creates a variable that can be provided during the build process. Once it’s defined in the Dockerfile, you can use the parameter —build-arg to provide it to the image builder. In the Dockerfile, we can have numerous ARG instructions. In the Dockerfile, the ARG command is the only one that can come before the FROM instruction.

        However, The ENV instruction sets the environment variable, which in turn specifies the environment for the construction instructions that follow. The ENV instruction is accessible during the construction process as well as when the container is started with the —env flag. However, we are unable to pass the ENV instruction while constructing the image. The ARG directive has the drawback of being unable to persist after the image has been built. To pass the environment data inline when creating the image, we will just utilize both ENV and ARG. In this guide, we will teach you how to pass an environment variable to a docker container.

      • How to download and extract a .deb package on Ubuntu or Debian Linux

        Sometimes you require a certain file from a Debian .deb package. For example, because you accidentally deleted a file. Or because the package's installation is faulty and it can't be restored without first adding the missing file. This FAQ explains how to extract the contents of a.deb file downloaded from the Debian or Ubuntu repository.

      • How to Enable SSH in Ubuntu 20.04 Step by Step Tutorial

        Do you know what is SSH? If yes then move to the next step how to enable ssh in ubuntu. If you don’t know, listen to my words.

        SSH (Secure Shell) is a cryptographic network protocol used to establish a secure connection between the client and a server, and both can communicate securely on an encrypted channel.

        It allows the client to transfer files securely and perform the administrative task on the server remotely by accessing the command line interface on the client machine. The client machine may have an operating system like Windows, Linux, MAC and other.

      • How to Use Maltego Kali Linux a Complete guide for beginners

        Welcome you, I am glad you are here and continue reading my notes on Penetration Testing Tutorial and this post is part of Information Gathering and This article will cover How to use Maltego Kali Linux tutorial is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.

      • Cain and Abel software for cracking hashes Guide for Beginners

        According to the official website http://www.oxid.it/cain.html , Cain and Abel software is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking hashes passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analysing routing protocols.

        The latest version is faster and contains a lot of new features like APR (ARP Poison Routing) which enables Sniffing on switched LANs and man in the middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

      • Maxim Burgerhout: Building a load balanced Ansible Tower cluster

        As you might know, I do a bit of YouTubing. One video request I got a couple of times, was to do a video about clustering Ansible Tower behind a load balancer.

        As I had never done that before myself, it sounded interesting, so I did it.

      • 7 steps: Learn how to migrate to Linux desktop - TechRepublic

        Many businesses depends on Linux and open source in the data center or any number of Linux-based virtual machines hosted on a third-party cloud service. So why are you continuing to ignore Linux on the desktop? Is it because Windows is simply the desktop operating system you’ve always used and can’t figure out a reason to make the switch? Or are you afraid your end-users won’t be able to accept that drastic change? Given that so much of what users do these days happens within a web browser, using a less-than-reliable and easily broken OS as Windows should be a no-brainer of a switch.

    • Distributions

      • IBM/Red Hat/Fedora

        • CentOS Stream: 'I was slow on the uptake, but I get what they are doing now,' says Rocky Linux founder

          Last December Red Hat announced that it would cease work on CentOS Linux, switch its focus to CentOS Stream, and sunset CentOS 8 in December 2021 instead of 2029. It was a change that shook the Linux community. CentOS is hugely popular: exact figures are difficult, but W3techs suggests that CentOS has 10.6 per cent of the websites running Linux, versus 0.9 per cent for Red Hat Enterprise Linux (RHEL). CentOS is a community build of RHEL whereas CentOS Stream is an upstream project, "a preview of upcoming Red Hat Enterprise Linux minor and major releases," as described by Red Hat.

          "The end of life of CentOS as we know it had a negative effect on my company and my company's customers as well as pretty much everybody in the industry," Kurtzer told The Register. "I felt it was important to take the lessons learned from CentOS and bring that into a new project... and I enjoy operating systems."

        • IBM Plans To Acquire Hybrid Cloud Consulting Firm BoxBoat

          IBM has announced plans to acquire BoxBoat Technologies, a DevOps consultancy and enterprise Kubernetes certified service provider. BoxBoat will extend IBM’s container strategy and implementation services portfolio to further advance IBM’s hybrid cloud strategy and accelerate Red Hat OpenShift adoption globally.

        • You asked, we acted: How Red Hat has acted on customer feedback [Ed: But Red Hat, you still killed CentOS (as it was) in spite of popular demand]

          At Red Hat, we take customer feedback seriously. At the end of projects with our clients, formal training, purchases of software or solutions, and even technical support, we regularly hold feedback sessions. In doing so, this feedback loop can help identify points of improvement in various aspects and areas of the company to provide an improved customer experience.

          In our Customer Portal, you will find a page dedicated to showing the actions we’ve implemented based on feedback we’ve received called "You Asked. We Acted."

          This is one of the ways that we show how Red Hat is taking action to implement changes based on feedback we’ve received.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Events

        • Linux Plumbers Conference: Testing and Fuzzing Microconference Accepted into 2021 Linux Plumbers Conference

          We are pleased to announce that the Testing and Fuzzing Microconference has been accepted into the 2021 Linux Plumbers Conference. In spite of the huge number of products shipping with the Linux kernel which are being thoroughly tested by OEMs and distribution providers, there is still no enforced quality standard upstream. How can we make best use of all the publicly available infrastructure and test frameworks in order to fill this gap? Testing and fuzzing upstream as well as gathering results from products is crucial to keeping a project that has over 5,000 commits every month stable for all to use.

        • Practical Open Source Needs You!

          This is the first such event we’ve planned, so to get the word out, we’ve been reaching out directly to a wide array of open source community members of all stripes -- strategists, activists, lawyers, developers -- to spread the word about our Call for Speakers, which closes on July 15th, 8:00 EDT. We want this event to be a place where folks can find an accessible entry point into open source practices, learning from community members about best practices, common mistakes, and answers to topics as deceptively simple as choosing the right license for a project, so if that’s something you know about, we want to hear from you!

        • Florence to host International FOSS4G Conference 2022

          The 16th annual congress of the Open Source Geospatial Foundation (OSGeo), the non-profit organisation that supports and promotes the collaborative development of free and open source geographic technologies and open geospatial data, will be held in Florence at the Palazzo dei Congressi, Palazzo degli Affari and the University of Florence, 22-27 August 2022.

  • Leftovers

    • Science

      • The evolution of POS (Point of Sale) Systems

        The first computer-driven cash register, which resembles what we have today, was developed by IBM in 1973 – and it marked the first commercial use of a computer-based system used by the restaurant industry.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Friday

            Security updates have been issued by Debian (apache2 and scilab), Fedora (chromium and perl-Mojolicious), Gentoo (inspircd, redis, and wireshark), and Mageia (fluidsynth, glib2.0, gnome-shell, grub2, gupnp, hivex, libupnp, redis, and zstd).

          • Linux kernel Livepatching

            Canonical livepatch is the service and the software that enables organizations to quickly patch vulnerabilities on the Ubuntu Linux kernels. Livepatch provides uninterrupted service while reducing fire drills during high and critical severity kernel vulnerabilities. It is a complex technology and the details can be confusing, so in this post we provide a high level introduction to Ubuntu Linux kernel livepatching and the processes around it.

          • Increased security: Open Policy Agent reaches version 0.30 [Ed: Automated translation]

            Designed as an open source general-purpose policy engine, the Open Policy Agent (OPA) is used to program, provision, enforce and monitor context-related policies. The team behind the open source project managed by the Cloud Native Computing Foundation (CNCF) has now presented OPA 0.30.0 – immediately followed by the bug fix release 0.30.1, which contains an error in the behavior of indexof fixes.

    • Internet Policy/Net Neutrality

      • Biden’s new executive order urges FCC to restore net neutrality

        President Joe Biden will urge the Federal Communications Commission (FCC) to reinstate net neutrality rules in an executive order he’s expected to sign Friday.

        Biden’s call will be part of a larger sweeping executive order attempting to promote competition in the country’s economy and combating corporate consolidation.

        Net neutrality rules were adopted by the FCC in 2015 and prevent internet service providers (ISPs) from blocking, throttling, or using paid prioritization on internet speeds. The rules also classified ISPs under Title II of the Communications Act, which gave the FCC authority over the providers.

        All of that was undone in 2017 by the Republican-led FCC, which repealed the rules.

    • Monopolies

      • Patents

        • News from Abroad: European CVC CRISPR Patent Revoked Because of Invalid Priority Claim [Ed: More fake patents, including patents on life]

          While many patiently await developments in the pending U.S. interference proceedings relating to the CRISPR patents in the U.S., matters are progressing in Europe. The Opposition Division (OD) of the European Patent Office (EPO) has just issued (on June 29, 2021) its written decision in the case of EP3241902, owned by the University of California/Berkeley, the University of Vienna, and Emmanuelle Charpentier (collectively termed "CVC"). While the headline decision of the OD to revoke the patent was delivered orally at the hearing on April 13, 2021, the OD has now provided its detailed reasoning behind the decision.

          Formally, EP3241902 was revoked for lack of inventive step. However, pivotal in this decision was the finding by the OD that the patent was not entitled to priority from at least the first priority claim of May 25, 2012 (US 61/652,086; "P1"). In view of this, the inventors' own landmark publication from June 28, 2012 ("Jinek 2012") became prior art.



Recent Techrights' Posts

Microsofters' SLAPP Censorship - Part 2 Out of 200: Detailed Timeline From 2012 (Attack on Reporters That Question Restricted Boot) to 2024 (Lawsuit Against Reporter and His Wife in Another Continent)
we reproduce a document produced 2 years ago to give people more context and more facts
GNU/Linux in Laptops/Desktops Still Matters, It's Likely the Only Way to Achieve Software Freedom
Software Freedom requires all sorts of things at the "OS level"
Madame Streisand Wanted to Censor The Web, Instead She 'Created' a New Term, "Streisand Effect"
It is basically an own goal
Defending Women Isn't a Crime, Everybody Can Agree on That
Their culture is unlike ours
EPO "Cocaine Communication Manager" - Part VI - Influx of Spaniards and Portuguese Workers (+77%) at Europe's Second-Largest Institution, Led by the 'Alicante Mafia'
There is now data supporting this assertion, new and complete data in fact
Nobody is Safe at IBM (or Red Hat)
There is no job security at IBM
Bad faith: Hugo Roy knew FSFE impersonating FSF before French tribunal, colleagues deceived
Reprinted with permission from Daniel Pocock
 
Links 04/03/2026: "The EU moves to kill infinite scrolling" and a call to "Nationalize Amazon"
Links for the day
Coming Soon: Evidence of Abuse in Our IRC Network
IRC's freedom can sometimes be its 'weakness' if not properly guarded
High GNU/Linux Adoption in Brunei Darussalam
It's worth noting (or at least noticing) that Microsoft loses ground in some of the countries where the government contracts paid the most
Media Blackout Reducing or Preventing Press Coverage of Microsoft Layoffs in 2026
Worse yet, there will be gaslighting and deceit
Gemini Links 04/03/2026: The Garnet Star, The Hunt, The SYN Attacks
Links for the day
The EPO's General Consultative Committee (GCC) Discussion Illuminates How Much Worse Things Have Gotten ("on Strike and Participated in the 'Meeting'")
a videoconference - not a physical meeting - discussed EPO policies
Free Software Foundation Supports Its Founder, Advertises His Talks in Switzerland
When you suppress voices, assuming the reasons for suppression are bunk, it is always bound to backfire very badly
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, March 03, 2026
IRC logs for Tuesday, March 03, 2026
Over 1,500 EPO Workers Went on Strike Last Week
a new publication which celebrates some accomplishments of industrial actions and calls for further actions
Solicitors Regulation Authority (SRA) Failed to Detect Fraud in Law Firms... Until It Was Too Late
Earlier today we contacted some more politicians about this and received mail from them as well
Our EPO and IBM Coverage Bears Fruit
In case insiders want to get in touch with us, please ensure or at least try doing so securely
Links 03/03/2026: "Scam Altman in Damage Control" and Oil Traffic Disrupted
Links for the day
Gemini Links 03/03/2026: Phones, LLMs, and Changes on the Web
Links for the day
Richard Stallman Confirms Talk in Bern Next Week
Dr. Stallman has just formally confirmed his third talk this month in Switzerland
GNU/Linux at All-Time High in Guam
there are many computers in that island
Microsofters' SLAPP Censorship - Part 1 Out of 200: Claim No. KB-2024-001270 in a Nutshell
abuse of process by a law firm working for an American who was arrested for strangling women and another American whose own spouse calls a "rapist"
When EPO Team Managers (TMs) Are Harassing People Who Strictly Apply the European Patent Convention (EPC) in Patent Examination
There are two strikes planned for this month
Confirmed: Using Slop Gets You Fired
Let the story of Benj Edwards be a cautionary tale
Links 03/03/2026: "No one wants to read your AI slop" and "chatbots in the kill chain"
Links for the day
EPO and "Equivalent to More Than 100 Days of Strike"
The industrial actions continue and already have a positive effect
Streisand Effect, the Microsoft Way
Microsoft has once again proven the Streisand Effect
Keeping Track of IBM Layoffs in March 2026
IBM depends on bribery
GNU/Linux Measured at 7% in Yemen
Windows is too hostile and dangerous
Links 03/03/2026: Security Breaches, Iceland Wants EU Membership, and "Wall Street–Backed Lawmakers Want to Help Banks Gouge You"
Links for the day
Queensland Health Payroll System: IBM billion-dollar-blowout inquiry
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 02, 2026
IRC logs for Monday, March 02, 2026
Gemini Links 03/03/2026: GrapheneOS and Keyboard Shortcuts
Links for the day
Tomorrow should be sunny (at long last!) and a generally productive dayProductive Week Ahead
Tomorrow should be sunny (at long last!) and a generally productive day
Only One Slopfarm Seems to Have Targeted "Linux" Today
It certainly does feel like the slop hype is reaching the "late life crisis" and companies that benefited from this bubble are overdue for a day of reckoning
Microsoft Mass Layoffs: Being Sacked at 1AM in the Morning
Watch what happens to Microsoft employees who get pregnant
Links 02/03/2026: More Social Control Media Bans, Climate Change Woes, and "Journalist With Germany's Deutsche Welle Arrested in Turkey"
Links for the day
Gemini Links 02/03/2026: Small Phones, "I 3D Printed My Brain", and "Managing 5 Servers at Once with tmux"
Links for the day
IBM is Trying to Hide Mass Layoffs, Not Only With NDAs and 'Scripted' LinkedIn Posts
From what we can gather (screenshot above), today many people leave IBM and Red Hat
Richard Stallman is Giving a Public Talk This Week (Friday in Lucerne School of Computer Science and Information Technology)
His birthday is just around the corner.
Windows Falls to New Low in World's Largest Population (India)
Windows is now down to 7%
Never Miss a Good Opportunity to Shut Up and Drink Coffee
Threats come at a cost; each time you issue a threat you stigmatise yourself as a bully
Last Month Matthew Garrett Said Ridiculous Things After His Spouse Had Called Him a "Rapist", Now He's Trying to Take the Site Offline and Put My Family in Prison
The real issue of concern to him (and his alleged reputation) is the spouse and the matter is to be dealt with in America, not the UK
Machine-Generated Legal Documents, Over 2,000 Pages Sent to Us Today Alone
We now know that the papers we receive are produced using bots (algorithms)
Reporting to Our Politicians/MPs the Failure of the SRA to Stop Hired Guns Who Help Americans (Men Who Attack Women and Nowadays Also Attack British Reporters)
About a month ago my wife wrote to politicians to get the ball rolling
The Topic Many People Don't Want to Talk or Write About
"DEI" is inherently about making racial and gender patterns better reflect society's
XBox is Virtually Dead Already, What Next Will Die at Microsoft?
Now that there are mass layoffs at Microsoft datacentres it is not premature to speculate about what dies after XBox
For the First Time, statCounter Measures Internet Explorer at 0.01% "Market Share"
What Microsoft replaced it with is just a Chrome clone with extra spyware
Was a Lot of "Windows" and "Unknown" in Iran Just GNU/Linux in Disguise?
more than 1 in 10 desktop/laptop requests is estimated to be GNU/Linux
"Here in the UK, GNU/Linux rose to all-time high at Windows' expense"
Will this entail Software Freedom as well? This depends on all of us
Links 02/03/2026: Claude Code Causes a Mexican Government Cyberattack, "London Repair Week" Noted
Links for the day
2026 Microsoft Mass Layoffs in So-called 'AI' Datacentres, Why Doesn't the Mainstream Media Cover The News?
What does this tell us about the state of the media?
Don't Fall for "Top X Law Firms" in "Discipline Y", They Pay $Z to Get False Endorsement/s
It's a scheme, a scam, an elaborate fraud
More Publishers Have Turned From Slop Boosters Into Slop Sceptics and Critics
There's a "hidden cost" when one participates (for profit) in "pump and dump" schemes
TeX Live Has New Release, But Planet Debian Won't Tell You That
It 'unpersoned' the developer
LLM Slop Does Not Know People (It Knows Nothing) and Cannot Distinguish Between People. It's a Recipe for Disaster.
no way of knowing who's who
"Over 1,100 Law Firms Gone in Five Years" in the United Kingdom (UK) Alone
There are basically way too many lawyers (looking for "business", e.g. threats and lawfare) and not enough positions to fill
Microsoft FUD From Microsoft Site Helps Distract From Actual Microsoft Back Doors
Published on a Sunday
Free Software Foundation Needs to Become More Active in Europe to Avoid Impersonation by Microsoft-Sponsored Groups
So far we've hardly seen the FSF saying anything at all about the US president
Links 02/03/2026: "Not Envious of Billionaires" and Palantir SLAPPs "Swiss Magazine For Accurately Reporting That The Swiss Government Didn't Want Palantir"
Links for the day
There Has Never Been a Better Time to Quit Social Control Media
Those networks are selling something. And that something is not peace because peace does not sell "attention".
Microsoft Users Drowning in Slop, If They Complain Microsoft Censors Them
Like an authoritarian regime
IBM is Killing Red Hat's Portfolio - Including Linux - to Prop Up Ponzi Scheme ("AI")
IBM is killing Red Hat
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, March 01, 2026
IRC logs for Sunday, March 01, 2026
Speed of Sites Matters
Being easily accessible all the time matters to us
Gemini Links 02/03/2026: Weird Phone Calls, Small Phones, and Exploring Racket
Links for the day
Dr. Andy Farnell on "Good Tech"
in the age of "rent everything" and "own nothing"