Bonum Certa Men Certa

Links 15/11/2021: Reviving Old PCs, Red Hat Software Collections 3.8



  • GNU/Linux

    • Desktop/Laptop

      • Revive Your Old Computer with GNU/Linux Made Easy

        Do you have an old desktop PC or laptop? We have happy news to you. You can reuse it, rather than throw it away or leaving it unused. To revive your computer, install a GNU/Linux operating system that supports old computers and is actively supported. This will give your old computer a fresh life once again, for general purpose, as well as for specific purpose like multimedia creativity and programming. You can receive latest software and security updates by using one of them on your old machine. Finally, we compile these choices in alphabetical order from antiX to Zorin OS that still support up to 15 years old computers a.k.a. 32-bit PCs with tens of thousands latest software packages. Happy computing!

    • Kernel Space

      • Graphics Stack

        • Dave Airlie: h264: more AMD hw worked on

          Previously I mentioned having AMD VCN h264 support. Today I added initial support for the older UVD engine[1]. This is found on chips from Vega back to SI.

          I've only tested it on my Vega so far.

          I also worked out the "correct" answer to the how to I send the reset command correctly, however the nvidia player I'm using as a demo doesn't do things that way yet, so I've forked it for now[2].

    • Instructionals/Technical

      • Command to add folder in linux path permanently - Linux Shout

        What is Environment Variable in Linux? The variable is a path of the executable files that Linux systems can recognize globally on the Command terminal or by any other application. For example, We can open firefox via the command terminal by simply typing its name rather than the whole path of the actual executable file where it resides. In the same way when we install Java its executable binary can be used by other applications easily even GUI ones.

      • Linux tips for using cron to schedule tasks | Opensource.com

        Making things happen on a regular and predictable schedule is important on computers. It's important because, as humans, we can sometimes be bad at remembering to do things reliably because we get distracted, have too much on our minds, or we're on holiday. Computers are really good at doing things on a schedule, but a human has to program the computer before the computer takes action.

        In a way, the cron system is an easy and rudimentary introduction to programming. You can make your computer do what you want it to do just by editing a file. You don't even have to know where the file is kept. You have only to type in a simple command, enter the "recipe" you want your computer to follow, and save your work. From then on, your computer executes your instructions at the specified time until it is told to stop.

        By design, cron is not a complex system. Here's what you need to know about it.

      • Running Jenkins with Docker Compose - Unixcop the Unix / Linux the admins deams

        Hello, friends. We really like Docker and Jenkins so I thought why not make a post about both? Yeah, that’s a good idea. So, in this post, you will learn how to run Jenkins with Docker Compose. The process is simple and quick to do.

      • How To Install CUDA on Linux Mint 20

        In this tutorial, we will show you how to install CUDA on Linux Mint 20. For those of you who didn’t know, The Nvidia CUDA toolkit is an extension of the GPU parallel computing platform and programming model. It allows your applications to use different types of GPUs very conveniently.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a CUDA Nvidia on a Linux Mint 20 (Ulyana).

      • How To Install Python 3.10 on Ubuntu, Debian & Linux Mint – TecAdmin

        Python is an object-oriented, high-level programming language. As of today, Python 3.10 is the latest stable version available for productions environments. Most of the Debian-based Linux distribution includes older versions of Python in software repositories. Also, the Debian packages are not available for all distributions. This tutorial has been tested on Ubuntu 20.04 Linux system.

        This tutorial will help you to how to install Python 3.10 on Ubuntu, Debian, and LinuxMint systems using source code. T

      • How to Install / Enable RPM Fusion on Fedora 35 - LinuxCapable

        RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL that a group of community volunteers maintains. RPM Fusion is not a standalone repository but an extension of Fedora’s default packages that could not be included due to Fedora being bound by the same legal restrictions as Red Hat.

        The RPM Fusion repository comes in two flavors, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.

        In the following tutorial, you will learn how to install RPM Fusion on your Fedora 35 operating system.

      • How to Uninstall Android Bloatware Without Root On Ubuntu Linux? - Fosslicious

        When buying an Android smartphone, users may notice that there are some unwanted applications (bloatware), which are installed but cannot be removed, because these applications are installed in the system. And in order to change the system rules and be able to remove the default apps installed in the system, the user needs root privileges.

        But, rooting in android in my country, can void the warranty if the smartphone was recently purchased. So I don't recommend doing this. If you don't like some of the default applications on your smartphone, users can actually disable them. But sometimes some default applications cannot be disabled.

      • How to install KernelCare and clear Kernelcare Cache in Linux - Unixcop the Unix / Linux the admins deams

        KernelCare is fabulous kernel update tool by CloudLinux. We started testing this kernel patch in a few servers and the result has been truly amazing, allowing us to avoid server downtime after kernel updates because of each server reboot we had to apply after the kernel was updated. Today we will show you how to run a KernelCare installation.

      • How to install and use Podman in Fedora 34/35

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • How to install and use Podman in OpenSUSE Leap 15.3

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • Use Ansible tags to save time on playbook runs | Enable Sysadmin

        As a frequent Ansible user, I'm always looking at ways to simplify my playbooks and save time during playbook debugging. One of my favorite features for writing robust Ansible playbooks is its support for tags. This article introduces tags, walks through some common tag scenarios, and outlines more advanced usage.

      • How to Rename Multiple Files in Linux

        In a Linux system, you can easily rename a file using mv command. But, if you have multiple files which you want to rename, in this situation you need some extra tools or built-in Linux utilities for solving this problem.

        In this tutorial, we learn the different methods to rename multiple files in a Linux system at once.

      • How to Build an E-Paper To-Do List with Raspberry Pi | Tom's Hardware

        I’ve often struggled with procrastination, and to-do applications have been lifesaving. I sometimes find myself needing a reminder to just focus on getting the most important task done before working on anything else.

        With that in mind, I created a simple photo frame to sit on my desk and remind me of my most important task of the day using e-paper and a Raspberry Pi. I wanted to use e-Paper specifically since it’s low-power and not as distracting as a standard display would be. If you’re the kind of person who likes a simple reminder of your most important tasks, here’s how to build it for yourself.

      • Install Apache JMeter on Ubuntu 20.04 LTS Focal Fossa

        Apache JMeter is open-source like any other Apache foundation project. It is meant to analyze system functional behavior by running performance tests, regression tests, stress tests, and database servers based on different technologies. However, earlier it was designed to test only web applications.

        JMeter is Java-based, hence can be used to know what would be the performance of various applications and software. It sends a request to web or application servers for different loads by simulating browser behavior. The scripting language for JMeter is Groovy (an object-oriented programming language used for the Java platform). Browser plugins are also supported in this testing platform.

      • How to View Hardware Information in Linux

        Being a Linux enthusiast implies that you are familiar with both the hardware and software entities of your system.

      • How to Run Linux Shell Command / Script in Background

        The usual style of executing a command on a Linux terminal is to simply run it and wait for it to gracefully exit. Once the command exits, you can then proceed to execute other commands in succession. This is what is known as running commands in the foreground. As the word suggests, you can visually see the output of the command on the terminal.

        Sometimes, however, running commands in the foreground can present a set of challenges. The command can take too long to exit causing you to waste precious time and other times, it can be totally attached to the shell session leaving you stuck.

        In such cases, running a command in the background is your best bet. You can send a command(s) to the background as you concurrently execute other commands in the foreground. This improves the efficiency of working on the terminal and saves you time.

        In this guide, we focus on how you can run Linux shell command or script in the background.

      • How to Capture top command output to a file

        Linux top command is widely used by Linux system administrators in real time to check system resources utilization such as CPU, disk I/O, system load average, running processes and memory utilization.

        I usually use Oracle OSWatcher Black Box (OSWbb) to collect various system data to diagnose performance issues for a period of time.

        But if you want to collect a list of processes that consume high CPU and memory on your system for a specific period of time, you can do this using the top command.

        To redirect the top command output to a text file, the top command must be executed in batch mode.

        In this guide, we will show you how to capture the top command output in files for a specific duration for troubleshooting performance issues.

    • Distributions

      • IBM/Red Hat/Fedora

        • Automation by the numbers: 11 stats to know | The Enterprisers Project

          Automation pervades most other contemporary IT trends. Cloud and cloud-native? You’re talking about automation. Security and DevSecOps? Again, you’re talking about automation. Talent and culture? Yep, you’re still talking about automation.

          IT is both in the midst of its own automation transformation and also an indispensable catalyst of organization-wide automation strategies. It’s actually difficult to exaggerate the role that automation is playing in businesses and industries of all kinds today. (The “automate all the things” meme has a kernel of truth to it.)

        • Change management: 9 ways to build resilient teams

          Resilience, in the context of psychology, refers to ability to adapt well to adversity, trauma, tragedy, or other sources of significant stress. Being resilient has benefits for both individuals and organizations – as has clearly been on display over the last two tumultuous years.

          CIOs know well how their team members’ capacity to adjust positively to workplace pressures, changes, and setbacks contributes to the IT function’s performance.

          Because resilience is a set of learnable skills and approaches rather than a fixed characteristic, there are ways that IT leaders can help to build and hone resilience among their people. “Just as with ourselves, fostering resilience in our teams is a matter of helping them build skills and mindset that support a hopeful, solution-oriented response to obstacles, challenges, and unanticipated change,” says Erika Andersen, leader readiness consultant and author of Change from the Inside Out.

          However, doing this well requires a nuanced understanding of what constitutes resilience and a deft touch in encouraging this critical capability in healthy ways. Here are some ways IT leaders can help their team members develop and deploy their resilience:

        • Red Hat Software Collections 3.8 and Red Hat Developer Toolset 11 now generally available

          The latest versions of Red Hat Software Collections and Red Hat Developer Toolset for Red Hat Enterprise Linux (RHEL) 7 are now generally available. Software Collections 3.8 delivers the latest stable versions of many popular open source runtime languages, web servers, and databases natively to the world’s leading enterprise Linux platform. These components are supported for up to five years, helping to enable a more consistent, efficient, and reliable developer experience.

          Here's a quick overview of the updated development tools and collections you'll find in this release.

        • Announcing the 2021 Call for Code Engagement Awards

          Since 2019, the Call for Code Engagement Awards have recognized organizations that have answered the call and exhibited a deep commitment to Call for Code.

          Call for Code inspires a community of change agents to build, contribute to, and deploy solutions for the most pressing global social issues and humanitarian causes. As Call for Code has grown over the last few years, so have the ways corporations and universities have stepped up and engaged with us to help drive tech-for-good solutions. These organizations help us make Call for Code solutions tangible and scalable. Some have provided pathways for their employees to participate in our global challenge. Others have hosted spot challenges to address causes that align with both their own corporate responsibility goals as well as the issues of focus for Call for Code, such as natural disasters, climate change, COVID-19, and racial justice. Whether they provided technology or data sets for challenge participants to use in their solutions, or offered deployment support for winning solutions, or brought Call for Code initiatives into the classroom as a way to engage university students, every one of our sponsors and partners has been instrumental in the success of Call for Code initiatives.

          This year a new Call for Code Ecosystem Engagement Award has been added, providing us the opportunity to also recognize non-profit organizations that are essential in ensuring Call for Code solutions are applicable to real-world problems and adopted by impacted communities to create real change.

          We’re pleased to announce the full list of 2021 Call for Code Engagement Award winners. The Call for Code team is so grateful for the collaboration and commitment from all of this year’s award recipients, as well as our dedicated sponsors.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Programming/Development

        • How to Use std::array

          The std::array notation in C++ is an alternate method of declaring and initializing the arrays in C++. However, a question might arise in your mind that when we can declare and initialize the arrays already, then why do we even need this notation in the first place? In this article, we will try to explore the answer to this question. After that, we will share some examples with you to demonstrate the usage of the std::array notation in C++ in Ubuntu 20.04.

          The std::array Notation in C++:

          We have already stated that the std::array notation in C++ is an alternate method of declaring and initializing the arrays. However, we still need to figure out the need to use this notation. Generally, there are two types of arrays in C++, i.e., static and dynamic. Both these types of arrays have their pros and cons. The static arrays lose all the information regarding their size once they are passed to a function as a pointer, whereas the dynamic arrays’ deallocation is very problematic.

          Therefore, the std::array notation is used to make the best usage of both of these types, i.e., using this particular notation, a static array never loses the information that it contains even when it is passed to a function. This is exactly why we use this notation in C++. You will learn more about the usage of this notation in C++ by going through the next section of this article.

        • Perl/Raku

        • PHP

          • PHP file_get_contents() Function

            PHP contains many built-in functions to read the content of any existing non-empty file. The file_get_contents() is one of the built-in functions of PHP to read the entire content of an existing file as a string. The syntax of this function is given below.

          • PHP in_array() Function

            Array variables are used to store multiple values where each value is accessed by using the index value. Sometimes we need to search a particular element in an array for programming purposes. The in_array() is a built-in function of PHP to search specific elements into an array. It searches data in a case-sensitive manner. The way to use this function for searching value in an array has been described in this tutorial.

          • PHP json_encode() Function

            The JSON is a popular data format that is used to serialize and transmit structured data between the web server and application because the JSON file is human-readable and lightweight. The json_encode() is a built-in function of PHP that converts the array or object into JSON data for various purposes. The various uses of this function have shown in this tutorial.

          • PHP password_verify() Function

            The password_verify() function is used to match the hash password with the original password. Another function, password_hash() is used to generate the hash value based on the hashing algorithm, cost, and salt value. The password_verify() function contains all hashing information to verify the hash with the password. The uses of this function have been shown in this tutorial by using multiple examples.

          • PHP require_once() Function

            When a PHP script is used in multiple files for programming purposes, then it is better to write the script in one file and include the file in those files without writing where the script is required. PHP has many built-in functions to include any existing file in a script. These are require(), require_once(), include(), and include_once().

            The task of require() and require_once() are the same, but the one difference is that the require() function does not check the file has been included before or not but the require_once() function check the file has been included before or not. If the file has been included in the script before, then the require_once() function will not include the same file again. How the require_once() function is used to include files in PHP has been shown in this tutorial.

          • PHP unset() Function

            The unset() function is used to reset any variable that has been defined earlier. Two types of variables are used in any programming language. One is a global variable and another is a local variable. The variable defined outside the function is called a global variable that is accessible from anywhere in the script. The variable defined inside the function is called a local variable that is accessible inside the function only.

            If the unset function is used for the local and global variables, then it resets both variables locally. That means the value of the global variable remains unchanged that was defined before changing inside the function. The $GLOBALS array or global keyword can be used to unset the global variable permanently. The uses of this function to reset PHP variables have shown in this tutorial.

          • PHP var_dump() Function

            The var_dump() function is a built-in function of PHP to find out the information about the value and data type of one or more variables. It also provides information about the length of the data for the string variable. The information about both scalar and compound variables can be retrieved by using this function. Different uses of this function have been shown in this tutorial.

  • Leftovers

    • Education

    • Health/Nutrition/Agriculture

    • Integrity/Availability

    • Defence/Aggression

    • Environment

      • Opinion | As Climate Emergency Worsens, Freak Storm Sends Snow, Scorpion Plague on Egypt's Aswan

        How freakish and biblical our climate emergency could become was illustrated this week in the Upper Egyptian city of Aswan, which was struck in November by rolling lightning storms, downpours, snow, and a plague of scorpions. High winds blew the deadly Egyptian black, fat-tailed scorpions from the surrounding desert into the city and into people’s homes. The scorpions killed three persons with their venom and left hundreds sickened, as Egyptian rescue crews tried to distribute the antidote.

      • Opinion | Biden-Xi Summit Seeks to Avoid 'Clash of the Titans' Moment

        U.S. President Joe Biden and Chinese President Xi Jinping are expected to hold a virtual summit on Monday evening, their most high-profile meeting yet following phone calls in February and September. It comes at a moment of immense uncertainty and flux in the U.S.-China relationship, and its outcome has the potential to set the two sides on a course they will follow for the remainder of Biden's presidency, for better or for worse.

      • Energy

        • Stately Deception: Obama at COP26

          “Collectively and individually we are still falling short,” bellowed Obama, in his signature manner. “We have not done nearly enough to address this crisis. We are going to have to do more. Whether that happens or not to a large degree is going to depend on you.”

          The crux of Obama’s speech was directed at the world’s youth, placing the burden of curtailing climate change on their shoulders. No doubt, if the planet's young people were in charge of COP26, there wouldn’t be empty pledges and sneaky cop-outs (like the US/India/China/Russia refusing to end their coal production), there would be tangible goals, and harsh, real-world consequences for not abiding by these agreements.

        • Why China’s cryptocurrency ban is an opportunity for India?

          China’s latest blanket ban did send the [cryptocurrency] space in a tizzy for a while. But then, don’t we already know that Bitcoin and Altcoins are particularly good at ‘bouncing back’.

          Speculations and possibilities aside, China’s [cryptocurrency] crackdown in 2021 has been rather uncompromising. Despite being considered a running joke by experts, which is to fade out in time, the tough approach hasn’t been all that pleasant for the traders. With the latest announcement coming in with disparate figures, exchanges like CoinSwitch Kuber reported an almost 30 per cent fall in weekend transactions immediately after the ban was reported.

        • Karnataka Bitcoin scam: Arrested accused hacked Bitfinex exchange twice

          Meanwhile, former Karnataka chief minister and Congress leader Siddaramaiah alleged that politicians and officials were involved in a Bitcoin scam in the state. Siddaramaiah has also claimed that there was an effort to cover up the alleged scam but did not mention who the politicians were.

          However, the Karnataka government has referred 'bitcoin scam' to the Enforcement Directorate (ED) and Central Bureau of Investigation (CBI) because of the international nature of transactions.

    • Finance

    • AstroTurf/Lobbying/Politics

      • If You Don’t Give People a Reason to Vote, They Won’t

        Finding reasons for local or state elections in national politics won’t necessarily produce a full picture, particularly in New Jersey, where voters have the habit of electing Democratic congressional and state legislative delegations, consistently voting Democrat in presidential elections but often voting for Republican governors. This time around, particularly in the New York City mayoral race and local races in the city’s Long Island suburbs, unfounded fears of crime waves that largely existed only in the feverish imaginations of right-wing commentators seemed to have tipped more than a few votes. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Do Not Underestimate Evangelical Politicians In Latin America

        In the past two decades evangelicals in Latin America have gone from being marginalised foreign missionaries to powerful political mouthpieces. Explaining their rise as a religious phenomenon in which the lively “garage churches” of poor urban neighbourhoods displaced the theologically stick-in-the-mud Catholic church isn’t very enlightening. In quantitative terms, it seems simple enough: they’ve turned their numerical heft into political capital. But the important point is that the political arena in which they operate is neoliberalism for which, as a kind of theological superstructure or at least justification, they’ve become one of the Hydra’s many monstruous heads.

        To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • Opinion | We Need to Shut Down ICE's Mass Immigration Detention Machine

        Every day, ICE locks up over 20,000 people in a sprawling nationwide network of more than 200 detention facilities. The ACLU believes that this system of mass incarceration of immigrants should be dismantled—it's unnecessary and inhumane. For as long as ICE maintains its detention network, though, it has a responsibility to create an oversight system that is actually effective at detecting, addressing, and deterring abuse of detained people. Our analysis of recent ICE inspection documents shows that ICE's inspection system remains ineffective at identifying violations by detention facilities and ensuring compliance with detention standards, allowing facilities with clear records of poor conditions, including some of the deadliest facilities, such as the Stewart Detention Facility in Georgia, to evade accountability.

      • Inside Nicaragua’s 2021 elections – and the latest US/OAS coup attempt
      • Tech disputes at Rittenhouse trial not new issue for courts

        Rittenhouse's defense, though, argued that the method used by a state investigator to enlarge the photos couldn't be trusted to accurately show Rittenhouse's actions.

        James Armstrong, a senior forensic imaging specialist with the Wisconsin State Crime Lab, acknowledged on the stand Thursday that enlarging an image requires the addition of pixels. But prosecutors said the software Armstrong used is widely accepted - as is the method he used to enlarge the photos.

        Software programs used to analyze video evidence provide several ways to enlarge photo or videos, based on algorithms. The attorneys' debate over which is more accurate created a technical slog as testimony wound down this week.

    • Misinformation/Disinformation

      • WTF happened to The BMJ?

        The British Medical Journal€ (now€ The BMJ) is one of the oldest and most respected medical journals in the world that also has a history of publishing some excellent investigative journalism. For instance, over a decade ago, it was€ The BMJ€ that published investigative journalist Brian Deer’s articles€ recounting the strong evidence indicating that Wakefield’s case series published in€ The Lancet€ that linked the measles-mumps-rubella (MMR) vaccine to autism was based on fraud. That study launched the modern iteration of the antivaccine movement and is, as I like to say, the study that launched a thousand quackeries directed at autistic children to “cure” them of their “vaccine-induced autism.” The headline of Deer’s accompanying commentary after his account of how the “case against the MMR was fixed” even referred to Wakefield’s study as “Piltdown medicine“, after the€ infamous Piltdown Man fraud.€ 

    • Civil Rights/Policing

      • Infiltrating Amazon: What I learned going undercover at the corporate giant

        I thought this was a critical moment to stop merely reading about the abuses Amazon workers face, and to work there myself, while hiding my identity as an organizer who advocates for workers’ rights. I wanted to understand on the ground level what the work environment is like. Most importantly, I wanted to understand what kind of organization we will need to challenge and confront not only Amazon, but the entire system of just-in-time delivery and logistics, which has become central to our contemporary economy and its accompanying inequalities.

    • Monopolies

      • Copyrights

        • Piracy Release Group EVO 'Blames' Movie Industry For Its Popularity

          P2P release group EVO has built quite a reputation in recent years by being the first to release pirated copies of screeners and popular movies. But what drives the group to take such an immense risk? Talking to TorrentFreak, EVO says that it's mostly fun and partly motivated by Hollywood's profit focus.



Recent Techrights' Posts

[Meme] The Heart of Staff Rep
Rowan heartily grateful
Microsoft's Windows Falls to All-Time Low and Layoffs Reported by Managers in the Windows Division
One manager probably broke an NDA or two when he spoke about it in social control media
 
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day
North America, Home of Microsoft and of Windows, is Moving to GNU/Linux
Can it top 5% by year's end?
Management-Friendly Staff Representatives at the EPO Voted Out (or Simply Did Not Run Anymore)
The good news is that they're no longer in a position of authority
Microsofters in 'Linux Foundation' Clothing Continue to Shift Security Scrutiny to 'Linux'
Pay closer attention to the latest Microsoft breach and security catastrophes
Links 17/04/2024: Free-Market Policies Wane, China Marks Economic Recovery
Links for the day
Gemini Links 17/04/2024: "Failure Is An Option", Profectus Alpha 0.5 From a Microsofter Trying to Dethrone Gemini
Links for the day
How does unpaid Debian work impact our families?
Reprinted with permission from Daniel Pocock
When you give money to Debian, where does it go?
Reprinted with permission from Daniel Pocock
How do teams work in Debian?
Reprinted with permission from Daniel Pocock
Joint Authors & Debian Family Legitimate Interests
Reprinted with permission from Daniel Pocock
Bad faith: Debian logo and theme use authorized
Reprinted with permission from Daniel Pocock
Links 17/04/2024: TikTok Killing Youth, More Layoff Rounds
Links for the day
Jack Wallen Has Been Assigned by ZDNet to Write Fake (Sponsored) 'Reviews'
Wallen is selling out. Shilling for the corporations, not the community.
Links 17/04/2024: SAP, Kwalee, and Take-Two Layoffs
Links for the day
IRC Proceedings: Tuesday, April 16, 2024
IRC logs for Tuesday, April 16, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Inclusion of Dissent and Diversity of Views (Opinions, Interpretations, Scenarios)
Stand for freedom of expression as much as you insist on software freedom
Examining Code of Conduct violations
Reprinted with permission from the Free Software Fellowship
Ruben Schade's Story Shows the Toxicity of Social Control Media, Not GNU/Linux
The issue here is Social Control Media [sic], which unlike the media rewards people for brigading otherwise OK or reasonable people
Upgrading IRCd
We use the latest Debian BTW
The Free Software Community is Under Attack (Waged Mostly by Lawyers, Not Developers)
Licensing and legalese may seem "boring" or "complicated" (depending on where one stands w.r.t. development), but it matters a great deal
Jonathan Cohen, Charles Fussell & Debian embezzlement
Reprinted with permission from disguised.work
Grasping at Straws in IBM (Red Hat Layoff Rumours in 2024)
researching rumours around Red Hat layoffs
GNU/Linux Continues to Get More Prevalent Worldwide (Also on the Desktop)
Desktops (or laptops) aren't everything, but...
Who is a real Debian Developer?
Reprinted with permission from Daniel Pocock
Links 16/04/2024: Many More Layoffs, Broadcom/VMware Probed (Antitrust)
Links for the day
Links 16/04/2024: Second Sunday After Easter and "Re-inventing the Wheel"
Links for the day
Upcoming Themes and Articles in Techrights
we expect to have already caught up with most of the administrivia and hopefully we'll be back to the prior pace some time later this week
Links 16/04/2024: Levente "anthraxx" Polyák as Arch Linux 2024 Leader, openSUSE Leap Micro 6 Now Alpha, Facebook Blocking News
Links for the day
Where is the copyright notice and license for Debian GNU/Linux itself?
Reprinted with permission from Daniel Pocock
Halász Dávid & IBM Red Hat, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Apology & Correction: Daniele Scasciafratte & Mozilla, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Next Week Marks a Year Since Red Hat Mass Layoffs, Another Round Would be "Consistent With Other Layoffs at IBM."
"From anon: Global D&I team has been cut in half."
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, April 15, 2024
IRC logs for Monday, April 15, 2024