Links 31/07/2022: Linux Kernel 5.19 is Released

Posted in News Roundup at 5:34 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Videos/Audiocasts/Shows

    • Kernel Space

      • Linux HintIs Linux Unix? [Ed: They should ask if GNU is UNIX (it's not unix), not if Linux is]

        Linux is an open source and freely available kernel that can be obtained from the internet. Hundreds of distributions have been invented that are inspired by the Linux kernel, such as Debian, Ubuntu, CentOS, Arch Linux, Manjaro, etc. There is an open-source community of Linux to provide rapid runtime support services. Additionally, Linux-based distributions provide an interactive Graphical User Interface which is the primary reason that Linux is used by simple as well as advanced computer users.

        In 1969, a group of collaborators and a Non-Profit Organization invented the UNIX operating system at Bell Labs. Primarily, UNIX serves the community that uses servers, workstations, or mainframe computers. It was a dedicated CLI operating system. Later, UNIX also started offering GUI support as well.

      • Linux 5.19
        So here we are, one week late, and 5.19 is tagged and pushed out.
        The full shortlog (just from rc8, obviously not all of 5.19) is below,
        but I can happily report that there is nothing really interesting in
        there. A lot of random small stuff.
        In the diffstat, the loongarch updates stand out, as does another
        batch of the networking sysctl READ_ONCE() annotations to make some of
        the data race checker code happy.
        Other than that it's really just a mixed bag of various odds and ends.
        On a personal note, the most interesting part here is that I did the
        release (and am writing this) on an arm64 laptop. It's something I've
        been waiting for for a _loong_ time, and it's finally reality, thanks
        to the Asahi team. We've had arm64 hardware around running Linux for a
        long time, but none of it has really been usable as a development
        platform until now.
        It's the third time I'm using Apple hardware for Linux development - I
        did it many years ago for powerpc development on a ppc970 machine.
        And then a decade+ ago when the Macbook Air was the only real
        thin-and-lite around. And now as an arm64 platform.
        Not that I've used it for any real work, I literally have only been
        doing test builds and boots and now the actual release tagging. But
        I'm trying to make sure that the next time I travel, I can travel with
        this as a laptop and finally dogfooding the arm64 side too.
        Anyway, regardless of all that, this obviously means that the merge
        window (*) will open tomorrow. But please give this a good test run
        before you get all excited about a new development kernel.
      • 9to5LinuxLinux Kernel 5.19 Officially Released, This Is What’s New

        After being in development for more than two months, Linux kernel 5.19 is finally here and introduces support for ZSTD-compressed firmware files, support for AMD’s Secure Nested Paging feature, a new user-space API for managing MultiPath TCP (MPTCP) flows, initial support for Loongson’s “LoongArch” RISC ISA CPU architecture, as well as support for the ARM Scalable Matrix Extension (SME).

      • LinuxTLS 1.3 Rx improvements in Linux 5.20 — Jakub Kicinski

        The first implementation of kTLS was designed in the good old days of TLS 1.2. When TLS 1.3 came into the picture the interest in kTLS had slightly diminished and the implementation, although functional, was rather simple and did not retain all the benefits. This post covers developments in the Linux 5.20 implementation of TLS which claws back the performance lost moving to TLS 1.3.

      • LWNKicinski: TLS 1.3 Rx improvements in Linux 5.20 [LWN.net]

        Jakub Kicinski provides an overview of some changes to the in-kernel TLS implementation coming in the next development cycle…

    • Instructionals/Technical

      • Linux HintHow to Animate GIF in ImageMagick

        An animation is pretty cool. I mean, it’s animated, how can you not like it, right? But did you know that an animation is nothing more than a bunch of pictures put together and played one after the other, super fast? When you see an animation, it’s nothing more than a bunch of pictures that are played fast enough such that your eyes can’t tell that they’re pictures. Your eyes interpret them as a small movie. Now, that we know how an animation is made, let’s get to it and make some.

        In this tutorial, we will show you how to animate using the ImageMagick. Please note that ImageMagick is a very thorough package, and you can do a lot. So, we will only cover the basics of animation.

      • ID RootHow To Install OpenCart on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install OpenCart on Ubuntu 22.04 LTS. For those of you who didn’t know, OpenCart is an open-source PHP-based online e-commerce solution. It offers a lot of plugins that help you to extend the platform’s functionality and includes features like user management, multi-store functionality, affiliates, discounts, multiple payment gateways, product reviews, and more.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the OpenCart free open source ecommerce platform on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Jack FranklinRunning command line tasks in Neovim

        My daily workflow often involves repeatedly running tasks, whether that be build commands, unit tests, or some other scripts. My ideal workflow is to have a terminal split on the right hand side, and then be able to send tasks to it.

      • Linux HintWhat Are Linux NIS and NIS+

        NIS and NIS+ share as many differences as they share their similarities. These programs, commonly known as Network Information Service and Network Information Service Plus, deliver a simple network lookup and check of the processes and databases.

      • Linux HintHow To Flush the DNS Cache on Ubuntu 22.04

        In the world of computers, machines don’t use names as humans do. They go by a string of numbers. Computers, phones, and all these devices can identify and talk with each other using these numbers, also known as IP addresses. In contrast, humans recognize each other by their names, and it’s difficult for us to remember strings of numbers. Thus, architects have developed a naming system known as Domain Name System or DNS to bridge this communication gap between machines and humans.

        The objective of DNS is to resolve names to numbers. To be more specific, it resolves URLs to IP addresses. If someone types google.com in the address bar of their browser window and hits enter, the DNS will resolve this URL to “” by checking within its database and matching the URL with the IP address. Once your machine has this IP address, it can connect with Google and display the website’s contents. To avoid the communication between your computer and the server and minimize the load times, these entries are stored on your computer in a local cache, i.e., DNS cache.

      • Linux HintHow To Install Terminator on Ubuntu 22.04

        Anyone who uses a Linux system knows that the terminal is at the center of the Linux Ecosystem. Though you can control everything from the terminal, many emulators have been released, providing you with many extra features on top of the basic terminal. This guide will look at Terminator, one such emulator, and how you can install it on Ubuntu 22.04.

        As discussed, the terminal itself is pretty powerful. However, Terminator provides extra productivity features that can help you make your time with the terminal more efficient and effective. For instance, it allows you to arrange the terminals in a grid-like setting and gives you tabs to handle multiple commands in a single window. You can also drag and drop the tabs. There are many keyboard shortcuts for you, and you can save the layouts for future uses and add plugins for even more functionality. So, how can you get it installed? Let’s start.

      • Linux HintHow to Install AnyDesk on Ubuntu 22.04

        “AnyDesk is a small but powerful application that gives the users facility to establish a connection to access a remote computer, and you can use that system from your system. It became even more famous during the COVID-19 era as it provides a simple and secure work-from-home facility thanks to its military-grade encryption.

        It is free for everyone except the commercial users who are required to buy licenses. AnyDesk is available on all the platforms like Linux, Windows, Android, iOS, Raspberry Pi, and many other operating systems.

        It is not available on the official Ubuntu repository, and we will have to manually install it, so we will go through all the steps required to install it on Ubuntu 22.04 Jammy JellyFish.

      • VideoHow to install Discord on Pop!_OS 22.04 – Invidious

        In this video, we are looking at how to install Discord on Pop!_OS 22.04.

      • Linux Made SimpleHow to install Vita3K on a Chromebook

        Today we are looking at how to install Vita3K on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • CitizixHow to use External Secrets with AWS Secrets manager

        In most enterprise systems where software release cycles consist of separate environments like dev, stage, live, having multiple environments that can be dynamically configured is common. An application may have three different sets of database credentials for authentication. Each set of credentials would be respective to an instance for a particular environment. This approach essentially allows software developers to interact with a developer-friendly database when carrying out their day-to-day coding.

      • Linux HintUbuntu MacOS Theme

        If you’re using a macOS, you’ll be aware of the operating system’s ability to do some amazing things. It’s fast, it’s powerful, and it has a plethora of tools built right in to help you work smarter and more efficiently. Many of these tools aren’t available directly on other operating systems such as Ubuntu — however there is still a lot that can be done with the help of other applications inside Ubuntu. So, what are the themes on the operating system and what can you do with them?

        As we all know that macOS is the most well organized and aesthetically well looking operating system. So, many of you would prefer to have a similar interface on Ubuntu operating system. Linux is famous because of its limitless customization options it offers. If you have just switched from macOS to Linux and are looking to change your Ubuntu interface like macOS, then you are in the right place. So, how can you change the appearance of Ubuntu look like macOS, let’s find out in the following section:

    • Games

      • Bryan Lundukexscorch : A faithful Scorched Earth clone for Linux

        Back in High School, in the 1990s, I was taking a class on Architectural Drafting. One of my absolute favorite classes — and one of the best perks of the class is that we had PC’s, running MS-DOS, that we could use with AutoCAD (a drafting application).

        Now. What happens when you put a bunch of nerdy teenagers in front of a row of DOS PCs?

        We bring in floppy disks. With games. Naturally.


        And, what’s more, xscorch seems to be in the repository of nearly every Linux distribution on planet Earth.

        sudo apt install xscorch

        Try that on a Debian based system (or Ubuntu) and you should be ready to relive your 1990s DOS gaming dreams!

      • Boiling SteamValve Has Unloaded a Truckload of Games for the Deck in the Past Week – Boiling Steam

        Valve is not just speeding up the production of the Steam Deck – they have just announced that everyone who has pre-ordered until now should get their Steam Deck within this year – but also the number of games validated for the platform. We have passed not long ago the 4000 games milestone, and in just a few days they have added a truckload of games – more than 300.

      • Linux Links10 Free and Open Source Game Engines – Part 2 – LinuxLinks

        Game engines offer huge benefits to game developers. The main functionality they provide is the library of core functions used in a computer game. This often includes a realtime rendering engine for 2D or 3D graphics, physics engine with collision detection, a character animation system, scene graph, sound, artificial intelligence, threading, networking, input, streaming localization support, debugging tools, integration with languages, and the provision of performance monitoring and optimization tools.

        Game engines play a crucial role in the fast creation and development of computer games. As they offer a collection of visual development tools, and are often presented in an integrated development environment, they vastly accelerate the development of games. Game engines are referred to as “game middleware” because they provide a flexible and reusable software platform.

        We covered game engines in this article. This article recommends more great game engines.

        Let’s explore these additional 10 game engines. For each engine we have compiled its own portal page, a full description with an in-depth analysis of its features, a screen shot of the program in action, together with links to relevant resources.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • New version of The GLib/GTK Development Platform – A Getting Started Guide :: Sébastien Wilmet’s blog

          I’ve finally released a new small version of glib-gtk-book.

          What triggered my motivation for releasing a new version is a contributor showing up. It stirred up my will to dust a bit the project.

          An appendix will probably be written, in which case another new version will be released, once ready. So … be ready!

        • Adopt a gedit plugin! :: Sébastien Wilmet’s blog

          First a good news, gedit is back on the road. After doing a long break, I feel energized again to develop gedit and related projects.

          The next version of gedit will be released when ready, like Debian.

          And here comes where you can help! Especially by adopting the development and maintenance of a gedit plugin. Be it part of the main gedit repository, or gedit-plugins, or … a removed plugin (the small bad news).

          First and foremost, nothing is set in stone, a long-term project like gedit grows organically. A removed plugin doesn’t mean the end of the world, it can be re-added later, or someone can give it a new life by developing it in its own repository. And, remember, the next version will be released when ready.

        • Pitivi GSoC: 3rd Update

          This is now the third blog, and this time I will like to keep it a bit different, owing to the suggestions I got :D


          So, as usual, we will start with updates, we are still in the breaking phase, but most big errors are gone, there are some things that need to be sorted out, but we can do that once we can at least open the application.

  • Distributions and Operating Systems

    • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

    • Linux Mint 21

      • Linux Made SimpleLinux Weekly Roundup #193

        We had a good week in the world of Linux distrobution releases with Bluestar Linux 5.18.14 and Linux Mint 21.

        We hope you have a wonderful week and enjoy the last month of summer!

      • LWNLinux Mint 21 released [LWN.net]

        Version 21 of the Ubuntu-based Linux Mint distribution is out; it is available in the Cinnamon, MATE, and Xfce flavors. This is a long-term-support release that will receive updates until 2027.

      • LinuxiacLinux Mint 21 (Vanessa) Is Here as a Long Term Support Release

        On the last day of July, the Linux Mint project delighted its fans by announcing the general availability of version 21, “Vanessa.”

        Linux Mint is a well-known distribution in the Linux community. It is often associated with what Ubuntu, on which it is based, is supposed to represent.

        The distribution includes all the characteristics that the average Linux user seeks, including a beautiful and functional desktop environment, ease of use, and reliability and stability. But unlike Ubuntu, Linux Mint provides predictability, with no unexpected moves or experiments with its userbase.

      • SlashdotWhat’s New in Linux Mint 21 Cinnamon – Slashdot

        Today saw the release of Linux Mint 21 “Vanessa” Cinnamon Edition, a long term support release (supported until 2027).

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • Ubuntu HandbookFirefox Snap Finally Support Installing Gnome Extensions in Ubuntu | UbuntuHandbook

          The pre-installed Firefox browser in Ubuntu 22.04 finally to add back the ability to install Gnome Shell Extensions.

          As you may know, Firefox in Ubuntu 22.04 defaults to Snap package that runs in sandbox. It however lacks the feature to exchange messages with native applications. So, you’ll find that the password manager integration (e.g., KeePassXC and 1password) with Firefox does not work. And, there’s no ON/OFF switch when you trying to install extensions from Gnome website.

          For those sticking to the default Firefox package in Ubuntu 22.04, the new WebExtensions XDG desktop portal and its Firefox integration is present now to add back the native messaging support, though it’s in Beta stage at the moment for testing!

    • Programming/Development

      • Linux HintDlsym() 3 C Function

        “Linux has come up with many of its unique functions to perform routine tasks. The dlsym() function is one of them. The dlsym() function goal is to find the address of a defined symbol specified in a DLL (Dynamic Link Library) that has been made accessible via a dlopen() function call. After loading the dynamic shared object (common link library) file indicated by the null-terminated string filename, the function dlopen() outputs an anonymous “connection” for the loaded object. The named symbol is looked up in the dynamic link library (DLL) that has been fetched by the dlopen() method. In this article, we will talk about the use of dlsym().

        If the desired symbol is not present in that DLL, the dependent DLLs of that DLL will be searched for it, after by any dependencies of those, and so on in a breadth-first fashion until the desired symbol is found or all the DLLs have been searched for this purpose. Although the sequence in which dependent DLLs at the same level are searched is undetermined, this search order determines how duplication symbols in distinct DLLs will be identified. Be aware that unloaded dependent dynamic libraries won’t be loaded as a consequence of a dlsym() search for dependent DLLs. Only the DLLs that were loaded as a component of the dlopen() call’s dependent DLLs will be scanned.”

      • Linux HintBzero 3 C Function

        “The basic memory structure of a computer may be easily accessed by programmers or users in C or other programming languages. They can interact and perform numerous commands on memory using registers and other tools. Memory management is thus one of the primary functions of the C programming language. Thus, the typical operation applied in many scenarios involved zeroing out the region of computer memory. Dynamic memory should occasionally be filled with zeros to purge garbage entries.

        Some structs often need to have their multiple bit-mask values explicitly replaced with zeros before their members are initialized. For this, the C language came up with the bzero 3 functions to be utilized in the program. Thus, we have decided to implement the use of the bzero 3 C function in our C program. Let’s get started.”

      • Linux HintCounting Sort Complexity

        Counting sort is best illustrated with the sorting of integers. In C/C++ and Java, the characters are integers and can be sorted in the way the integers are sorted.

      • Linux HintEpoll 7 C Function

        The C language is a very vast language when it comes to the use of different technologies or APIs. It is also very usable when we want to use the socket programming. Just like this, it comes up with the epoll 7 functions. Poll(2) and the epoll API both observe the various document descriptors to determine whether I/O is feasible on every one of them. The epoll API extends very well with the great numbers of monitored document descriptors and may be used as being either a level-prompted or edge-prompted gateway.

        The epoll entity, an in-kernel information model that may be seen from the user-space as a wrapper for two sets, serves as the foundational idea of the epoll API. Within this guide, we’ll discuss the use of the epoll function in the C language.

      • Daniel LemireComparing strtod with from_chars (GCC 12) – Daniel Lemire’s blog

        A reader (Richard Ebeling) invited me to revisit an older blog post: Parsing floats in C++: benchmarking strtod vs. from_chars. Back then I reported that switching from strtod to from_chars in C++ to parse numbers could lead to a speed increase (by 20%). The code is much the same, we go from…

      • Rakudo compiler, Release #157 (2022.07) – Rakudo Compiler for Raku Programming Language

        On behalf of the Rakudo development team, I’m very happy to announce the July 2022 release of Rakudo #157. Rakudo is an implementation of the Raku1 language.

      • LaTeX

        • Jussi PakkanenNibble Stew: Implementing a “mini-LaTeX” in ~2000 lines of code

          The input text file for War of the Worlds is about 332 kB in size and the final PDF contains 221 pages. The program generates the output in 7 seconds on a Ryzen 7 3700 using only one core. This problem is fairly easily parallelizable so if one were to use all 16 cores at the same time the whole operation would take less than a second. I did not do exact measurements but the processing speed seems to be within the same order of magnitude as plain LaTeX.

          The really surprising thing was that according to Massif the peak memory consumption was 5 MB. I had not tried to save memory when coding and just made copies of strings and other objects without a care in the world and still managed to almost fit the entire workload in the 4 MB L2 cache of the processor. Goes to show that premature optimization really is the root of all evil (or wasted effort at least).

          Most CPU cycles are spent inside Pango. This is not due to any perf problems in Pango, but because this algorithm has an atypical work load. It keeps on asking Pango to shape and measure short text segments that are almost but not entirely identical. For each line that does get rendered, Pango had to process ~10 similar blocks of text. The code caches the results so it should only ask for the size of any individual string once, but this is still the bottleneck. On the other hand since you can process a fairly hefty book in 10 seconds or so it is arguable whether further optimizations are even necessary,

      • Python

        • Linux HintPython os.system

          “Integrating repetitive tasks is a great idea. Shell scripts are frequently used by programmers and software operators to handle some recurring processes. But, shell scripts could get more difficult to manage because these processes get a little more complicated. However, the Python programming language could be utilized for automated processes rather than terminal commands. The same feature as those terminal commands is available in Python through some functions for executing operating system commands.

          We can handle computer operations in a systematic and organized manner by acquiring how to execute the command line in Python. The OS package of a python programming language offers tools for cooperating with any operating system of the computer. OS is included in the basic utility packages for Python. This package includes a compact approach of using additional features that rely on the operating system.

          The instruction as a string is implemented by the os.system() function in a terminal. The same restrictions apply to this procedure, which would be accomplished by using the system() method of C Programming language. If an instruction produces any outcome, the standard output source of the programmer receives it. When this function is employed, the corresponding operating system terminal is going to open, and the instructions are run there.”

        • Linux HintChange the View of PyTorch Tensor

          “In this PyTorch tutorial, we will see how to change the view of a tensor in PyTorch. PyTorch is an open-source framework available with a Python programming language.

          A tensor is a multidimensional array that is used to store the data. So for using a Tensor, we have to import the torch module.

          To create a tensor, the method used is tensor()”

        • Linux HintCompute the Logarithm of Elements of a Tensor in PyTorch

          “In this PyTorch tutorial, we will see how to perform logarithmic functions on a given tensor.

          PyTorch is an open-source framework available with a Python programming language.

          A tensor is a multidimensional array that is used to store the data. So for using a Tensor, we have to import the torch module.

        • Linux HintHow To Exit a Function in Python

          As most of us might know, a function in Python is a chunk of code that can be reused when required without having to write it repeatedly.
          Each program has a particular “flow”. Flow refers to the order in which a program gets executed. In a program, we have lines of code where we initialize variables, take inputs and outputs, and often create and call functions.

          We can have one or more functions to perform particular tasks or operations. These functions might or might not return some value or result. However, we need to make a function call for these functions to run and execute. This is necessary.

          Once the function has run completely, the next step is to exit the function. For this, we have the “return statement”. The return statement is used (implicitly or explicitly) to exit the function.

        • Linux HintHow to if the Object is a PyTorch Tensor and Return the Metadata of a Tensor in PyTorch?

          “In this PyTorch tutorial, we will see how to get the information from the given tensor in PyTorch.
          PyTorch is an open-source framework available with a Python programming language.

          A tensor is a multidimensional array that is used to store the data. So for using a Tensor, we have to import the torch module.

          It is possible to check whether the given object is a tensor or not.

          torch.is_tensor() is used to check whether the given object is tensor or not.

          If the object is a tensor, it will return True otherwise, False.”

        • Linux HintLogical NOT in PyTorch

          “In this PyTorch tutorial, we will see how to perform a logical NOT operation on a tensor using logocal_not().
          PyTorch is an open-source framework available with a Python programming language. We can process the data in PyTorch in the form of a Tensor.

          A tensor is a multidimensional array that is used to store the data. So for using a Tensor, we have to import the torch module.

          To create a tensor, the method used is tensor()”

      • Shell/Bash/Zsh/Ksh

        • Linux HintGawk Scripting Usage Examples

          One way of working with files in Linux is using a scripting language to manage the automation of repeated tasks. An example of a good scripting language is awk which makes the extracting of data and working with patterns easy. The GNU implementation of the awk scripting language is gawk. If you are yet to come to terms with its usage, you are in luck. This post presents the different examples of the use of gawk in Linux, and by the end of this guide, you will have a solid understanding of working with it.

      • Java

        • Linux HintCreate First Spring Boot Application

          All these tools are used by the developers to create the spring applications.

          Since the Spring Initializer is a mostly used tool, we will start with this first and then we will discuss the other tools in our next articles.

          We will use the Eclipse for the development/coding. Eclipse is an IDE that is primarily used to create the java-based applications.

          If you are not familiar with Eclipse, don’t worry because it’s a simple code editor. We will help you understand it in this article. To get it, visit the official site https://www.eclipse.org/downloads/ and install it to your local system.

  • Leftovers

    • SICPPhrases in computing that might need retiring

      The upcoming issue of the SICPers newsletter is all about phrases that were introduced to computing to mean one thing, but seem to get used in practice to mean another. This annoys purists, pedants, and historians: it also annoys the kind of software engineer who dives into the literature to see how ideas were discussed and used and finds that the discussions and usages were about something entirely different.


      This one used to mean “psychologist/neuroscientist developing computer models to understand how intelligence works” and now means “an algorithm pushed to production by a programmer who doesn’t understand it”. But there is a potential for confusion with the minor but common usage “actually a collection of if statements but last I checked AI wasn’t a protected term” which you have to be aware of. Probably OK, in fact you should use it more in your next grant bid.

    • Tim Brayongoing by Tim Bray · False Creek Friend

      I want to share a project I’ve been helping out with for the last couple of years; the False Creek Friends Society. I haven’t wanted to write about it before now because it was just big-ideas talk. But there’s some science starting up and if you’re nearby you might want to get involved.

    • Jim NielsenBook Notes: “On Writing” by Steven King – Jim Nielsen’s Blog

      I recently finished reading Steven King’s On Writing: A Memoir of the Craft (it’s a good ‘un).

      If you haven’t noticed from my recent posts, there were a number of excerpts from the book which spurred some blog posts.

      Additionally there are a number of miscellaneous excerpts I want to keep around as notes, so I’m adding this dump of quotes to my collection of #bookNotes posts.

    • Matt Rickard
      Choosing Esoteric Technology

      Every so often, I come across a promising new project only to find out it’s written in an esoteric language or framework.

      You only get a few innovation tokens when you’re building something new. Sometimes, an off-the-beaten-path is warranted – e.g., WhatsApp using Erlang to scale chat. Or it becomes a selection mechanism for a particular type of developer (e.g., Jane Street and functional programming)1.

      However, for the most part, it will make hiring more difficult and expensive. For open source projects, it can drastically reduce the pool of potential contributors (or users).

    • Hardware

      • Ruben SchadeRubenerd: Number pads

        I’ve been getting more into personal accounting stuff, and extending how I track income, expenses, and virtual budget envelopes. I love spreadsheets more than I’m probably supposed to, but I’m also working on an sqlite3 system that will let me ingest CSVs and build reports for envelope forecasts and tax.

        There are plenty of open source software packages, but I like building a data model for exactly how my mind works. This, coupled with the joy I feel seeing reconciled numbers match up, perhaps says more about how my mind works than I care to admit.

        I belabour all of this on account (HAH!) of being insufferable, and because I’ve been looking at number pads again. Turns out, IBM was onto something when PC keyboards came bolted with number pads. Typing strings of numbers vertically is so much easier and faster than using the top row of a regular keyboard.

      • Stacy on IoTInfineon has created a battery-free NFC lock – Stacey on IoT | Internet of Things news and analysis

        Infineon is showing off a new chip designed to provide lock/unlock abilities to a lock without requiring a battery. The key to the tech is near-field communication, or NFC, which can transmit small bits of power along with the credentials that unlock the lock.

        For a user, the experience is similar to using a phone to pay for something. Hold your phone next to the lock and it pops open. The market for this is lockboxes, safes, lockers at a gym or spa, or even office furniture. I’m excited about it because it takes tech and strips it down to a core function, making it better without adding anything to make it worse.

    • Security

      • ACMDefending the Enterprise

        “It’s important to see how your system behaves” under such circumstances, “so you see those minor differences between standard behavior and the unexpected,” says Bergstrom.

        Specific attacks create lots of chaos. “The main attack space for security chaos is ransomware, even though its goal is to make money,” says Shortridge. However, ransomware causes more security failures than encrypting critical data. It locks enterprises out of systems and machines, and leads to downtime until an organization pays the ransom or restores from backups.

      • WiredThe Hacker Gold Rush That’s Poised to Eclipse Ransomware [Ed: Ransomware is predominantly a Microsoft problems, statistics have shown repeatedly]

        RANSOMWARE ATTACKS, INCLUDING those of the massively disruptive and dangerous variety, have proved difficult to combat comprehensively. Hospitals, government agencies, schools, and even critical infrastructure companies continue to face debilitating attacks and large ransom demands from hackers. But as governments around the world and law enforcement in the United States have grown serious about cracking down on ransomware and have started to make some progress, researchers are trying to stay a step ahead of attackers and anticipate where ransomware gangs may turn next if their main hustle becomes impractical.


        “So much attention is being paid to ransomware, and governments all over the world are taking action to disrupt it, so eventually the return on investment is going to be impacted,” says Hassold, who is director of threat intelligence at Abnormal Security and a former digital behavior analyst for the FBI. “And ransomware actors are not going to say, ‘Oh, hey, you got me’ and go away. So it’s possible that you would have this new threat where you have the more sophisticated actors behind ransomware campaigns moving over to the BEC space where all the money is being made.”

      • Privacy/Surveillance

        • CNETRing, Google and the Police: What to Know About Emergency Requests for Video Footage

          The law lets Ring and Google share user footage with police during emergencies without consent and without warrants. Here’s everything you should know.

          Ring, the Amazon-owned video doorbell and home security company, came under renewed criticism from privacy activists this month after disclosing it gave video footage to police in more than 10 cases without users’ consent thus far in 2022 in what it described as “emergency situations.” That includes instances where the police didn’t have a warrant.

          “So far this year, Ring has provided videos to law enforcement in response to an emergency request only 11 times,” Amazon vice president of public policy Brian Huseman wrote. “In each instance, Ring made a good-faith determination that there was an imminent danger of death or serious physical injury to a person requiring disclosure of information without delay.”

        • RetailWireIs Amazon on the verge of reinventing American healthcare? – RetailWire

          Amazon.com yesterday said that it has reached a deal to acquire One Medical, a “technology-powered national primary care organization” that combines in-person, digital and telehealth services to care for patients.

          The $3.9 billion all-cash deal, if approved by One Medical’s shareholders and federal regulators, makes clear that Amazon is serious about being a major disruptive force in the consumer healthcare market. One Medical CEO Amir Dan Rubin will remain in that position should Amazon take control.

          “We think health care is high on the list of experiences that need reinvention,” said Neil Lindsay, SVP of Amazon Health Services. “Booking an appointment, waiting weeks or even months to be seen, taking time off work, driving to a clinic, finding a parking spot, waiting in the waiting room then the exam room for what is too often a rushed few minutes with a doctor, then making another trip to a pharmacy — we see lots of opportunity to both improve the quality of the experience and give people back valuable time in their days.”

        • Scientific AmericanPolitical Affiliation Influences Our Fear of Data Collection – Scientific American

          Throughout history, governments have exploited or collected data on their citizens—from benign data, like salary information and census records, to creepy data, like biometric records for law enforcement activities. With abortion rights under attack in the U.S., privacy experts are warning about the potential for the government to collect and use cell phone data to target and prosecute pregnant people and those seeking abortion. Over the past year the FBI made more than three million warrantless queries on the data of U.S. residents collected by both the government and private companies.

          A shrinking share of Americans support such warrantless government surveillance. Yet we have not effectively advocated against the growing surveillance of our personal data. That’s because we aren’t taking a principled view on government surveillance as a whole. Instead, we are starting to see viewpoints devolve into ostracization and hatred of the “other.”

    • AstroTurf/Lobbying/Politics

      • Michael West MediaWhat chance a changing of the guard in both Macquarie and Spring streets? – Michael West

        Within eight months, it’s possible that the long-serving governments of Australia’s two biggest states will have been put to the sword. The cause: internal corruption.

        A joint investigation by Victoria’s corruption commission IBAC and the ombudsman has revealed nepotism and branch-stacking by some Labor MPs.

        Premier Daniel Andrews has accepted all responsibility and pledged to implement all the report’s recommendations. The scandals come on top of a wearisome Covid lockdown that hit hardest among Labor’s natural constituency. Melbourne was among the worst affected cities in the world. The integrity crisis makes some Labor seats vulnerable to the sort of Teal independent challenge that until now has only targeted Coalition MPs.

    • Civil Rights/Policing

      • On Juneteenth, Indians Must Learn About this Iconic Anti-Racism Song | NewsClick

        As a student, I enjoyed singing revolutionary songs and shouting slogans in meetings and demonstrations. But I do not remember being moved by any song as I have been by “Strange Fruit”. The lyrics of this song have haunted me ever since I heard it a few months back. Each word is written with deep pain and sung with anguish rooted in suffering and anger.

        I came across the song while idly surfing the net. Immediately, it struck a deep chord in my heart. It would be appropriate to remember the song’s history on 19 June or Juneteenth, the national Independence Day commemorating the end of slavery in the United States of America. It was only last year that America recognised the day as a federal holiday.

        Written in the context of the lynching of African Americans, “Strange Fruit” has an iconic status for it is considered the first protest song of the civil liberties movement in the United States. The song was made famous by Billie Holiday, who sang it in 1939. Getting the song on record was difficult because Columbia Records would not touch it.

    • Internet Policy/Net Neutrality

      • GeshanHow I run one of the world’s top 370K websites for exactly $0 a month

        Years back, being in the top 1 million websites worldwide was one of the gaols for this blog when I saw that on Alexa.com. I am not sure when that milestone was hit, it looks like it was before 2019 as per Web archive.


        As this is primarily a static website (HTML, CSS, and some JavaScript – mostly vanilla), there is no database, no server, no image hosting, or S3 bucket equating to 0 recurring operational costs. On the flip side, this blog is a PWA where you can browse all/most of the content offline.

    • Monopolies

      • Patents

      • Copyrights

        • Michael GeistThe Law Bytes Podcast, Episode 136: Jeremy de Beer on SOCAN v. ESA, the Supreme Court’s Latest Endorsement of Copyright Balance and Technological Neutrality – Michael Geist

          The Supreme Court of Canada’s latest copyright decision – SOCAN v. Entertainment Software Association – affirms yet again that technological neutrality is a foundational element of the law and notably emphasizes that “copyright law does not exist solely for the benefit of authors.” My colleague Jeremy de Beer was an active participant in the case, writing an expert opinion during the Copyright Board phase of the case which reflects the approach that the court ultimately adopted. He joins the Law Bytes podcast to discuss the evolution of music distribution online, this latest case and the court’s commitment to copyright balance, as well as what might come next in the seemingly never-ending battle over Canadian copyright law.

  • Gemini* and Gopher

    • Personal

      • ABOEKNC Wordo: SPIER
      • You think your life is bad? [Schadenfreude]

        Whenever I start thinking that my life sucks (rats ate my car, can’t focus, vision deteriorating, etc…), I often come across something so much worse that it knocks me straight, at least for a while.

        Schadenfreude: (n): enjoyment obtained from the troubles of others

        This is not quite right, because there is little ‘enjoyment’ to be had with what follows. Just putting things into a different perspective, seeing things from a different point of view.

        There is so much horribleness in the world, that you’d have to be incredibly self-centered not to see something. In case you need inspiration, here is some.

    • Technical

      • request timeout

        yesterday i went
        for a walk without my phone
        i felt naked
        from all the

      • Science

        • Technical Perspective: Model Structure Takes Guesswork Out of State Estimation

          Communication can often be exchanged with computation in control systems. A car’s computer needing to know the speed can either get the data from the speed sensor over the vehicle’s communication network (bus); or it can calculate the speed from the initial speed, the history of throttle commands, using the laws of physics driving the car. In a fully deterministic world with powerful enough computers, communication may be redundant. In the real world, the degree of uncertainty in the physics can say something about the level of communication necessary. Quantifying this communication need can help principled design and allocation of network bandwidth and other resources in vehicles and other control systems.

          Uncertainty or lack of information is usually measured by entropy of some flavor. Claude Shannon developed a definition of entropy in the context of engineering telephone networks. That definition uses probability distributions, not coincidentally, capturing noise in telephone channels. In contrast, topological entropy, used in studying evolution of worstcase uncertainty in safety-critical systems, does not use probabilities at all. Instead, it measures the rate of growth of uncertainty in a system’s state with time. Topological entropy of a stable system like a pendulum will be smaller than that of an unstable system like an inverted pendulum.

      • Internet/Gemini

        • Hello, I Lurk No More!

          Greetings, geminauts! I go by Sam or my handle ‘oaktal’. I’ve been interested in Gemini since early 2021 and have been lurking around since then. I thoroughly enjoyed reading Joneworlds, listening to Konpeito, and reading logs or essays from all you wonderful people with a similar appreciation for the ‘smolnet’.

          I also had intentions of participating in the conversation since I first started reading, but got grabbed by what I’ll call the Lurker Effect. It’s this anxious tendency I have to view anybody whose work I consume as somehow ‘other’ than me, or somehow on a higher social ring. My best guess is that it’s a holdover from my experiences on the regular Web, where it’s normal to assume that a big-name blogger or Youtuber might not have time for all their fans.

          It took me a little while to grapple with the Lurker Effect, but eventually I managed to convince myself that people use Gemini to form a community and participate in discussion. It’s fine to lurk, of course, but if I want to join in then I shouldn’t let my regular Web conditioning stop me.

        • Hosting a Gemini Server with Fly.io

          In the long tradition of “How I Rebuilt My Blog” developer posts, here’s my humble entry. I did not set out to build a new website, but here I am.

          Before we get started let’s go over a few questions you might have from the title:

          Gemini is a new(ish) protocol for content, a successor to Gopher that is like a stripped down version of the Web.

        • Running small-web servers on small servers

          I recently bought a small single-board computer to set up Pi Hole, only to find that the 256 MB of on-board memory was insufficient to run the admin interface without constant crashes.

          The computer does not have any video output, but does have ethernet. Its CPU is weak, but quad-core. Power consumption is very low. I was thinking about how feasible it would be to run a smallweb server on this device, to give it new purpose after a web server proved too expensive.

          I started benchmarking the Gemini server I wrote but haven’t yet set up in a production environment, egalayxd. The server is highly concurrent and will use all available cores to reach peak efficiency, so I was worried it may use a lot of memory especially when a lot of requests come in at once.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 31/07/2022: Xfce’s Software Refresh, Cory Doctorow on DRM

Posted in News Roundup at 11:35 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Instructionals/Technical

      • How to Connect to a VPN on Ubuntu – Linux Stans

        In this tutorial, we’re going to show you how to connect to a VPN on Ubuntu. Beginner-friendly, step-by-step instructions with screenshots.

      • Make Use OfHow to Install Manjaro Linux on PC

        Virtual machines are a great way to run new operating systems without installing them directly on your computer. You can try out your favorite Linux distributions before switching to them permanently, given the isolated, yet easy-to-install procedures.

        If you are sure about installing Manjaro directly on your PC, you can create a bootable USB/CD and use it to boot your computer. On the contrary, if you want to try Manjaro Linux before installing it on your system, you can use a virtual machine.

        Here’s how to install Manjaro Linux on your PC, both directly and using VirtualBox.

      • uni TorontoTo be fully useful, Prometheus histograms want their cumulative sums

        True Prometheus histograms have a specific set of metrics and time series that they’re made up of. As covered in the documentation, there are a bunch of ‘<basename>_bucket’ time series, a ‘<basename>_count’ time series, and a ‘<basename>_sum’ time series that’s the cumulative sum of all of the observations that are in the histogram. How all of this works is covered in, eg, How does a Prometheus Histogram work?.

        However, not all external sources of histogram data provide a cumulative sum. For example, ZFS IO statistic histograms just give you histogram bucket counts. When generating Prometheus histogram metrics from such histogram sources, it seems common to generate a _sum metric (well, time series) that’s just 0. This gives you something that will work in many situations, but after having wrestled with histograms built this way I’ve come to feel that you want to avoid it if possible. Prometheus histograms are more useful with their cumulative sums, and you can’t rebuild an approximation of this information in PromQL as far as I know.

      • CitizixHow to set CORS headers on your S3 bucket

        Cross-Origin Resource Sharing (CORS) is an HTTP-header based mechanism that allows a server to indicate any origins (domain, scheme, or port) other than its own from which a browser should permit loading resources. CORS also relies on a mechanism by which browsers make a “preflight” request to the server hosting the cross-origin resource, in order to check that the server will permit the actual request. In that preflight, the browser sends headers that indicate the HTTP method and headers that will be used in the actual request.

        The CORS standard describes new HTTP headers which provide browsers a way to request remote URLs only when they have permission. Although some validation and authorization can be performed by the server, it is generally the browser’s responsibility to support these headers and honor the restrictions they impose.

      • AddictiveTipsHow to use the Pamac GUI package tool in Arch Linux

        Arch Linux users love the terminal, however, it’s not the only way to use the operating system. Introducing Pamac, the default package tool for Manjaro Linux. With it, users can install everything from native Arch Linux packages, AUR packages, and even Snap and Flatpak if they choose.

        If you’re on Arch Linux, or an operating system based on it (Garuda, BlackArch, etc.) and want a nice GUI to install packages, this guide is for you. Follow along as we show you how to install and use Pamac.

      • AddictiveTipsHow to Install Java on Pop!_OS 22.04

        Despite most of the web moving away from Java applications and towards browser-integrated apps, there are still some things that require the Java runtime. If you’re on Pop_OS Linux and need the latest version of Java for an app, we can help you.

        This guide will go over the various ways you can get the Java runtime environment working on Pop_OS 22.04 (and newer).

      • AddictiveTipsHow to sync your sticky notes to Evernote on Linux

        If you use virtual sticky notes on Linux, you’ve probably wondered if it is possible to sync them across desktops via the internet. Well, if you have an Evernote account, you can do this with Eversticky.

        Eversticky is a sticky notes application with Evernote integration. With this, you can create stickies on your desktop and ensure they get backed up to your Evernote account. Here’s how to use Eversticky on your system.

    • Games

      • ‘The Excavation of Hob’s Barrow’ coming to PC, Mac and Linux this year – Entertainment Focus

        ‘The Excavation of Hob’s Barrow’, developed by Cloak & Dagger Games and published by Wadjet Eye Games, is set for release later this year.

        The folk horror adventure is set within the isolated moors of rural Victoria England and it was previously known as ‘Incantamentum’.

        Antiquarian Thomasina Bateman is writing a book on the barrows of England, documenting the treasures she finds buried within. When an intriguing letter summons her to the small village of Bewlay, tucked away in the remote countryside, she sets off by train with her assistant a day behind.

    • Desktop Environments/WMs

      • 9to5LinuxXfce’s Apps Update for July 2022: New Releases of Mousepad, Ristretto, Catfish, and More

        In July 2022, Xfce 4.16 users received a new version (4.16.3) of Xfce Settings, which is probably the most important component of the lightweight desktop environment as it lets you manage all the settings, that brought a few bug fixes and several language translations.

        Mousepad 0.5.10 simple text editor for Xfce was released as well in July 2022 with improvements to encoding conversion when saving or opening files, the ability to update the charset when a byte order mark is detected, and several bug fixes, including one for a memory leak in menu item realignment.

      • GNOME Desktop/GTK

        • Liam Provenliam_on_linux | Everyone seems to forget why GNOME and GNOME 3 and Unity happened

          Microsoft invented the Win95 desktop from scratch. Its own previous Ones (e.g. Windows for Workgroups 3.11, Windows NT 3.51 and OS/2 1.x) looked nothing like it.

          The task bar, the Start menu, the system tray, “My Computer”, “Network Neighbourhood”, all that: all original, *patented* Microsoft designs. There was nothing like it before.

          (The closest was Acorn’s RISC OS, with an “icon bar” that works very differently, on the Archimedes computer. A handful of those were imported to North America, and right after, NeXT “invented” the Dock, and then Microsoft invented the task bar which is quite a bit more sophisticated.

  • Distributions and Operating Systems

    • Canonical/Ubuntu Family

      • DebugPointLinux Mint 21 “Vanessa” Arrives. And It Looks Minty-Fresh

        Release highlights of Linux Mint 21 “Vanessa” with details about the new features, updates and download details.

      • Linux MintMonthly News – July 2022

        Linux Mint 21 is coming out today!

        Many thanks to all the people who participated in the BETA. 152 issues were reported in the last 15 days and this allowed us to fix many bugs in preparation for the STABLE release.

        Many thanks also to people who donate to our project and to our sponsors for backing Linux Mint.

        Although Linux Mint 21 is now stable, we still have a few fixes and improvements planned post-release. These will come as software updates.

        We’re also focused on opening the upgrade path from Linux Mint 20.3 to Linux Mint 21. We’ll make announcements when this is ready.

        Early August LMDE 5 will receive the new Cinnamon 5.4 along with the new features from Linux Mint 21.

      • Its FOSSThe Much Awaited Linux Mint 21 is Released and Available to Download – It’s FOSS News

        Linux Mint is one of the most popular Linux distros out there. Moreover, it uses Ubuntu as its base and particularly the Long Term Support releases for up to 5 years of software support.

        Now, we have a new version upgrade, i.e. Linux Mint 21 “Vanessa” based on the latest Ubuntu 22.04 LTS release, which was released in April. Thus, users can expect security updates until 2027.

        Let’s take a look at the highlights of this release.

      • Beta NewsUbuntu-based Linux Mint 21 ‘Vanessa’ now available for download

        Just yesterday, we told you 4MLinux 40 was available for download. We also stated 4MLinux was an operating system that simply didn’t need to exist. Another such distribution that isn’t necessary anymore is Linux Mint. While Mint is a very solid OS, the brutal truth is, users would be wise to just use the operating system on which it is based — Ubuntu.

        But OK, many people have been using Linux Mint for years and they are not interested in changing their ways. Fair enough. If you are such a person that is prepared to “ride or die” with Linux Mint, today, the latest version of the operating system is officially released. Code-named “Vanessa,” Linux Mint 21 can be downloaded immediately.

      • OMG UbuntuLinux Mint 21 Released, This is What’s New – OMG! Ubuntu!

        The stable release of Linux Mint 21 “Vanessa” is now available to download.

        This is the latest version of the Ubuntu-based distro, and it carries a sizeable set of changes compared to the Linux Mint 20.3 release we saw at the start of the year.

        In this post I show you what’s new in Linux Mint 21, where to download it, and recap how to upgrade to Linux Mint 21 from an earlier version should you be running one.

        As ever, Linux Mint 21 is available in three distinct distillations: the flagship Cinnamon edition (which uses the Cinnamon desktop environment by default), an Xfce variant (using the Xfce desktop), and a MATE option (which ships with the MATE desktop by default). In this post I focus primarily on the Cinnamon version.

      • UbuntuCanonical talks cloud native and career development at community meetup in Manila [Ed: Canonical doing the buzzwords game]

        The Cloud Native Computing Foundation (CNCF) defines Cloud Native as a technology that empowers organisations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, service meshes, microservices, immutable infrastructure, and declarative APIs exemplify this approach.

        These techniques enable loosely coupled systems that are resilient, manageable, and observable. Combined with robust automation, they allow engineers to make high-impact changes frequently and predictably with minimal toil.

        Cloud native is about speed and agility.

    • Open Hardware/Modding

      • SparkFun ElectronicsUser Success Story: Caving with RTK – News – SparkFun Electronics

        The Search For Inexpensive and Portable Positional Accuracy As both a caver (a person who explores caves, often referred to as spelunking) for more than 30 years and an ambitious contributor to an open-source map project (OpenStreetMap (OSM)) since 2009, Eric Sibert has a long-standing passion for positional accuracy. In all that time, Sibert has been on a quest to find an accurate and portable tool that allows him to easily switch between these tasks – a quest that has proven to be not so simple.

      • SparkFun ElectronicsToe the 9DoF – News – SparkFun Electronics

        Hello everyone, and welcome back to another Friday Product Post here at SparkFun Electronics!

  • Free, Libre, and Open Source Software

    • SaaS/Back End/Databases

      • Geeks For GeeksWhich Database You Should Choose For Web Developement?

        Millions of data are being generated daily. And companies store their valuable data in databases. A database is organized information stored in a dedicated system. To process the data stored in the system, the role of the database management system comes into the picture. Analogically, it’s like an office with the number of files stored in it.

    • Programming/Development

      • R

        • RlangComments on the New R OOP System, R7

          Object-Oriented Programming (OOP) is more than just a programming style; it’s a philosophy. R has offered various forms of OOP, starting with S3, then (among others) S4, reference classes, and R6, and now R7. The latter has been under development by a team broadly drawn from the R community leadership, not only the “directors” of R development, the R Core Team, but also the prominent R services firm RStudio and so on.

          I’ll start this report with a summary, followed by details (definition of OOP, my “safety” concerns etc.). The reader need not have an OOP background for this material; an overview will be given here (though I dare say some readers who have this background may learn something too).

          This will not be a tutorial on how to use R7, nor an evaluation of its specific features. Instead, I’ll first discuss the goals of the S3 and S4 OOP systems, which R7 replaces, especially in terms of whether OOP is the best way to meet those goals. These comments then apply to R7 as well.

        • RlangNew Package yfR

          Package yfR recently passed peer review at rOpenSci and is all about downloading stock price data from Yahoo Finance (YF). I wrote this package to solve a particular problem I had as a teacher: I needed a large volume of clean stock price data to use in my classes, either for explaining how financial markets work or for class exercises. While there are several R packages to import raw data from YF, none solved my problem.

          Package yfR facilitates the importation of data, organizing it in the tidy format and speeding up the process using a cache system and parallel computing. yfR is a backwards-incompatible substitute of BatchGetSymbols, released in 2016 (see vignette yfR and BatchGetSymbols for details).

        • RlangR Ladies Philly is Making a Difference with its Annual Datathon Focused on Local Issues

          Alice Walsh and Karla Fettich of the R Ladies Philly talked to the R Consortium about the thriving R Community in Philadelphia. The group has broadened its reach both locally and internationally during the pandemic. However, they have a deep commitment to the local community and remain focused on local issues. Every year, the group partners with local non-profit organizations to host a Datathon to promote learning while contributing to the local community.

        • RlangAnnouncing Quarto, a new scientific and technical publishing system

          Today we’re excited to announce Quarto, a new open-source scientific and technical publishing system. Quarto is the next generation of R Markdown, and has been re-built from the ground up to support more languages and environments, as well as to take what we’ve learned from 10 years of R Markdown and weave it into a more complete, cohesive whole. While Quarto is a “new” system, it’s important to note that it’s highly compatible with what’s come before. Like R Markdown, Quarto is also based on Knitr and Pandoc, and despite the fact that Quarto does some things differently, most existing R Markdown documents can be rendered unmodified with Quarto. Quarto also supports Jupyter as an alternate computational engine to Knitr, and can also render existing Jupyter notebooks unmodified.

      • Python

        • uni TorontoPython is my default choice for scripts that process text

          Every so often I wind up writing something that needs to do something more complicated than can be readily handled in some Bourne shell, awk, or other basic Unix scripting tools. When this happens, the language I most often turn to is Python, and especially Python is my default choice when the work I’m doing involves processing text in some way (or often if I need to generate text). For example, if I want to analyze the output of some command and generate Prometheus metrics from it, Python is often my choice. These days, this is Python 3, even with its warts with handling non-Unicode input (which usually don’t come up in this context).

          (A what a lot of these programs do could be summarized as string processing with logic.)

          In theory there’s no obvious reason that my language of choice couldn’t be, say, Go. But in practice, Python has much less friction than something like Go while still having enough structure and capabilities to be better than a much more limited tool like awk. One part of this is Python’s casualness about typing, especially typing in dicts. In Python, you can shove anything you want into a dict and it’s completely routine to have dicts with heterogenous values (usually your keys are homogenous, eg all strings). This might be madness in a large program, but for small, quickly written things it’s a great speedup.

  • Leftovers

    • Joachim Breitner: The Via Alpina red trail through Slovenia

      We did not use any paper maps, and instead relied on the OpenStreetMap data, which is very good, as well as the official(?) GPX tracks on Komoot, which are linked from the official route descriptions. We used OsmAnd.

      In general, trails are generally very well marked (red circle with white center, and frequent signs), but the signs rarely tell you which way the Via Alpina goes, so the GPS was needed.

      Sometimes the OpenStreetMap trail and the Komoot trail disagreed on short segments. We sometimes followed one and other times the other.

    • Daniel MiesslerA Bourgeoisie Primer – Daniel Miessler

      In most things that interest me, the term (and concept) Bourgeoisie comes up so often that I cannot afford to have light grasp of it. I have learned, mis-learned, forgotten, and relearned its definition so many times that I’m forced to create this page to remind myself.

    • Bert HubertMCH2022: DNA and GPS/Galileo/GNSS Talks – Bert Hubert’s writings

      As I write this I’m suffering from severe post-camp blues. Every four years the Dutch hacker community organizes a stupendously large multi-day campsite event, with ample international help. To a large extent, “everyone” is there. And this time, like every time, people who originally decided they could not make it.. show up by day two. Because the pull is just too strong. Over 3500 people attended the event.

    • Bryan LundukeLinux, Alternative OS, & Retro Computing News – July 31, 2022
    • Hardware

      • MACCHIATObin Single Shot first impressions

        I’ve played with a MACCHIATObin Single Shot board for the last month. I decided to pick this up instead of a different board because of its sheer connectivity. This board has 1x1GbE, 1×2.5GbE, and 2x10GbE, which is very rare for those kinds of boards. I was most interested in the two 10GbE due to some projects I have in mind.

        I was interested in installing Fedora, which proved very easy. The first time I created a bootable micro-SD card with Fedora, it worked perfectly out of the box. After a few tests, I decided to install Fedora on a SATA drive. The SATA installation proved a bit more complex because I assumed it could boot from USB, but I did not manage to do so. I then moved the Fedora ISO to a micro-SD card and installed it from there, which proved to work flawlessly.

      • Russell CokerWorkstations With ECC RAM « etbe – Russell Coker

        The last new PC I bought was a Dell PowerEdge T110II in 2013. That model had been out for a while and I got it for under $2000. Since then the CPI has gone up by about 20% so it’s probably about $2000 in today’s money. Currently Dell has a special on the T150 tower server (the latest replacement for the T110II) which has a G6405T CPU that isn’t even twice as fast as the i3-3220 (3746 vs 2219) in the T110II according to passmark.com (AKA cpubenchmark.net). The special price is $2600. I can’t remember the details of my choices when purchasing the T110II but I recall that CPU speed wasn’t a priority and I wanted a cheap reliable server for storage and for light desktop use. So it seems that the current entry model in the Dell T1xx server line is less than twice as fast as fast as it was in 2013 while costing about 25% more! An option is to spend an extra $989 to get a Xeon E-2378 which delivers a reasonable 18,248 in that benchmark. The upside of a T150 is that is uses buffered DDR4 ECC RAM which is pretty cheap nowadays, you can get 32G for about $120.

    • Environment

      • Energy

        • Stacy on IoTOK, let’s talk about that big Helium story

          First, a refresher. Nova Labs, which changed its name earlier this year in an attempt to distance itself from the low-power long-range Helium Network, has a long history in the IoT sector. The company was started in 2013 and went through several pivots before settling on the idea of using tokens to incentivize people to place Helium hotspots in their homes. The hotspots act as wireless gateways, receiving LoraWAN or Helium’s own proprietary LongFi radio signals and using the hotspot owner’s broadband network to transfer the data to the internet.

          To reward users who put the hotspots in their homes, Nova Labs established the Helium Network Token (HNT). A hotspot owner generates HNTs by providing both coverage and transferring data. And companies that want to buy data on the network use the HNTs to buy data credits. Each data credit is worth $0.00001. So the June revenue reported by Nova Labs from data transfers represents 650 million data packets.

          As a point of disclosure, I run a Helium hotspot in my home, and have since 2020. I made about $20,000 by selling HNTs in 2021 and currently have 126 HNTs worth about $1,195 at the current price of roughly $9. In the time I’ve had the hotspot, the price of HNTs has ranged from less than $1 to a high of around $55, peaking as interest in cryptocurrency peaked.

        • NFT collector loses 100 ETH (~$150,000) in a joke gone wrong

          Meanwhile, he had forgotten to cancel his joke 100 ETH offer, which remained active. The new buyer accepted the offer and sold the NFT back to him, pocketing 98 ETH in the process. Franklinisbored wrote on Twitter, “I was celebrating my joke of a domain sale, sharing the spoils, but in a dream of greed, forgot to cancel my own bid of 100 ETH to buy it back. This will be the joke and bag fumble of the century. I deserve all of the jokes and criticism.” He also sent the 1.9 ETH back to the other person, with a message asking them to reverse the transaction. The other person replied, “No, thank you for the money though.”

        • John Gruber‘No, Thank You for the Money Though’

          Molly White reports on an NFT “joke gone wrong” — but I read it as a joke gone right. Delicious.

        • The biggest crypto lending company is a massive ponzi scheme

          With over $20b in assets under management Celsius Network is the biggest centralised lending platform in the crypto space. Its flagship product: 10 to 12.68% annual returns on USD stable coins and this with little to no risks.

          Sounds too good to be true? It certainly is!

    • Finance

      • Daniel MiesslerPrincipals vs. Agents | Sam Harris and Marc Andreessen – Daniel Miessler

        Sam Harris just had Marc Andreessen on his show and I heard a concept in the episode that intrigued me.

        They were talking about their current politics and Marc said he’s now seeing things according to James Burnham’s model of Managerial Capitalism, which is an instance of the Principal-Agent problem.

        The Principal-Agent problem is where owners (Principals) put managers (Agents) in charge of their businesses or assets, and there are misaligned incentives between the agent and the principal.

    • Digital Restrictions (DRM)

      • CoryDoctorowPluralistic: 25 Jul 2022 – Pluralistic: Daily links from Cory Doctorow

        I love audiobooks. When I was a high-school-aged page at a public library in the 1980s, I would pass endless hours shelving and repairing books while listening to “books on tape” from the library’s collection. By the time iTunes came along, I’d amassed a huge collection of cassette and CD audiobooks and I painstakingly ripped them to my collection.

        Then came Audible, and I was in heaven – all the audiobooks, none of the hassle of ripping CDs. There was only one problem: the Digital Rights Management (DRM). You see, I’ve spent most of my adult life campaigning against DRM, because I think it’s an existential danger to all computer users – and because it’s a way for tech companies to hijack the relationship between creators and their audiences.


        As I said then, computers are stubbornly, inescapably “general purpose.” The only computer we know how to make – the Turing-complete von Neumann machine – is the computer that can run all the programs we know how to write. When someone claims to have built a computer-powered “appliance” – say, a smart speaker or (God help us all) a smart toaster – that can only run certain programs, what they mean is that they’ve designed a computer that can run every program, but which will refuse to run programs unless the manufacturer approves them.

        But this is also technological nonsense. The program that checks to see whether other programs are approved by the manufacturer is also running on an untrusted adversary’s computer (with DRM, you are the manufacturer’s untrusted adversary). Because that overseer program is running on a computer you own, you can replace it, alter it, or subvert it, allowing you to run programs that the manufacturer doesn’t like. That would include (for example) a modified DRM program that unscrambles the manufacturer-supplied video, audio or text file and then, rather than throwing away the unscrambled copy when you’re done with it, saves it so you can open it with a program that doesn’t restrict you from sharing it.

        As a technical matter, DRM can’t work. Once one person figures out how to patch a DRM program so that it saves the files it descrambles, they can share that knowledge (or a program they’ve written based on that knowledge) with everyone in the world, instantaneously, at the push of a button. Anyone who has that new program can save unscrambled copies of the files they’ve bought and share those, too.

        DRM vendors hand-wave this away, saying things like “this just keeps honest users honest.” As Ed Felten once said, “Keeping honest users honest is like keeping tall users tall.”

    • Monopolies

      • Copyrights/Cable

        • Michael GeistThe Staffieri or Scott Quiz: Can You Tell the Difference Between the Rogers CEO and the CRTC Chair? – Michael Geist

          The Standing Committee on Industry, Science and Technology hearing into the Rogers outage was notable for how similar Tony Staffieri, the Rogers CEO, and Ian Scott, the Chair of the CRTC, sounded on key issues related to the outage and the state of Canadian telecom regulation. In fact, Conservative MP Tracy Gray noted during the hearing that “listening to the answers from the executives at the CRTC, I felt like I was actually questioning senior telecom executives not the regulator.” Ms. Gray wasn’t wrong. While it is obviously the role of the CRTC to regulate the industry, the two were often indistinguishable, leading me to create this quiz with actual quotes from the hearing from Staffieri and Scott. Can you tell the difference?

        • Michael GeistThe CRTC Shrugged: A Special Law Bytes Podcast on the Industry Committee Hearing Into the Rogers Outage – Michael Geist

          The Rogers outage came to Parliament Hill yesterday as the Standing Committee on Industry, Science and Technology conducted four hours of hearings into the issue. The day started with Innovation, Science and Industry Minister Francois-Philippe Champagne, followed by Rogers CEO Tony Staffieri, CRTC Chair Ian Scott, and a panel of consumer and public interest voices. I was pleased to be part of the final panel and I’ve posted my opening remarks below and created a special Law Bytes podcast featuring my opening remarks and the question and answer session with MPs.


          Indeed, perhaps the most disappointing aspect of the hearing is how it quickly became readily apparent that any prospect that the massive Rogers outage affecting millions of Canadians might become the much-needed wake-up call for reform has already largely passed. The MPs from all parties seemed to get the anger and frustration among Canadians, but it is pretty much business as usual for the Minister, CRTC, and even Rogers. In fact, all three sounded more or less the same on the key issues as they all sought to downplay suggestions that there were broader concerns with Canada’s communications system at work.

          Minister Champagne kept talking about demanding action from Rogers, but when the questions turned to competition or the proposed Rogers-Shaw merger, he was quick to change the subject. In fact, when pressed he downplayed the role that competition might have played in the outage, noting it might help network resilience but seeking to treat the outage a one-off limited to a single company. By the end of the hour, Champagne had said little about competition, the merger, legislative reform, and the weakness of the CRTC. However, there were no shortage of references to “demanding” action or being in “solution mode.”

  • Gemini* and Gopher

    • Personal

      • Summer Sickness

        To my imaginary readers, I apologize for not being able to write anything for so long. I’ve gotten a job!

        My first job. At a restaurant. But it’s only part time, and when I’m not working, I’m probably sitting at my desk. Despite this, writing an entry for this log was a huge hurdle to leap. It was really intimidating since it takes so long to get my words down in text, when I could be using that time to do more “productive” things.

        Anyway enough of that. I’ve done a lot since my last post! But my sense of time is really bad and I don’t actually know what those things are…


        I bit the bullet and installed Fedora on my PC. No more valorant. I hate that game anyway. Sucks that I can’t play Dead by Daylight now though, I wish behavior games would FIX THEIR ANTICHEAT

    • Technical

      • Science

        • FortuneGoogle A.I. researcher’s ‘sentient’ chatbot claims shows it’s time to scrap the Turing Test | Fortune

          What to make of the strange case of Blake Lemoine? The Google A.I. engineer made headlines this past week when he claimed one of the company’s chatbots had become “sentient,” which, if it were true, would be an earth-shattering achievement meaning the technology had become conscious or self-aware. Furthermore, he said that he had been suspended from his job for raising ethical concerns internally about the bot’s treatment.

      • Internet/Gemini

        • neil in gemini space

          a kind chap gifted me a DeWalt DW701 chop saw. it has seen much use but still works.

          DW701 was missing one of it’s five adjustable leveling feet.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Turning Linux.com Into a Shrine for Microsoft

Posted in Deception, GNU/Linux, Microsoft at 10:04 am by Dr. Roy Schestowitz

Best bias money can buy?

Linux.com on Microsoft

Journalists all replaced by PR. After sacking all the writers and editors at Linux.com, James Zemlin and Sheela Microsoft let a “former” Microsofter run the site.

Summary: Search results in a domain 2.5 decades old prioritise stuff published after Microsoft bought Linux Foundation shares (and several board seats, exercising control over Torvalds)

“Linux infestations are being uncovered in many of our large accounts as part of the escalation engagements.”

Microsoft Confidential

Inside the Minds of Microsoft’s Media Operatives — Part IV — “Same Sort of Journalistic Bias Infecting Russia at the Moment”

Posted in Deception, Microsoft at 9:36 am by Dr. Roy Schestowitz

Series parts:

  1. Inside the Minds of Microsoft’s Media Operatives — Part I — Bishops in Rooks
  2. Inside the Minds of Microsoft’s Media Operatives — Part II — Justifying a Career as a Microsoft Mouthpiece That Destroys Lives of People With Actual Facts
  3. Inside the Minds of Microsoft’s Media Operatives — Part III — Attacking Real Security, Promoting Lies and Fake ‘Security’
  4. YOU ARE HERE ☞ “Same Sort of Journalistic Bias Infecting Russia at the Moment”

Frank X. Shaw
He came from the military and Waggener Edstrom, like many others who work for Microsoft from the outside (even Connie Snyder, Steve Ballmer’s wife), aggresively censoring and trolling comments, censoring Wikipedia etc.

Summary: The military-grade propaganda of Microsoft is still, as of this moment, spearheaded by a person from DINFOS (Department of Defense Information School)

A BIT less than a week ago, in Part 3, we showed that Microsoft boosters disguised as “journalists” or “reporters” show no remorse about their professional misconduct. They misuse terms like “journalism” to give the profession a really terrible name or a stigma.

Here’s how one of them tried to buy sympathy or paint himself as a victim after burning sources. He wrote (almost a week late): “Want you to know this hasn’t fallen off my radar. Ended up in the ER in California last week (all good now) and now headed to Las Vegas for work (not sure which is worse) so I’m behind on things. I’ve started going through your past articles and want to take the time to read closely and understand them.”

As we said before, he hardly even bothered clicking on links proving he had been lying at the behest of Microsoft. These people only pretend to be nice, but their sole agenda is Microsoft marketing. They’re devoted to PR, not journalism. They’re shameless about this. We showed more to that effect in the first couple of parts.

The sources (Microsoft whistleblowers) aren’t amused; the media is infested with people whose sole goal seems to be catching dissidents and reporting them to Microsoft, ending a career for merely saying the truth.

Here’s how the burned Microsoft whistleblower responded to the person who burned him — the person who now claims to be ill and poor:

Hey █████████████,

I hope you haven’t succumbed to Vegas.

I’ve slowly been realizing that the sort of journalistic bias that I’m describing to you in big tech was employed during both Iraq wars to spin the US’s various failings as victories and have subsequently been well-documented in its wake. In short, journalists were only given privileged access in exchange for fostering support for the invasion narrative while giving the military further editorial rights; high end living quarters, protection details, exclusives, and all. Meanwhile, these same narratives run contrary to international/expert opinions.

We can actually see this same sort of journalistic bias infecting Russia at the moment with similar narratives from their state run news outlets running almost contrary to all external expertise and coverage; the same was true of the US during our sieges in Iraq.

More about this bias here:

Similarly and with regard to big tech, it’s not hard to see them fostering the same dynamic. For example, it’s not a coincidence that Frank Shaw from Microsoft is an ex marine that graduated from DINFOS (Department of Defense Information School) where soldiers literally learn to foster such dynamics locally and abroad.

It’s not a coincidence that you will find countless journalists that adhere to Microsoft’s narrative while receiving all matter of perks. At events for example you can often find exclusive digs, staff dedicated to them, exclusive access to execs, extravagant food and drink menus; and that’s just at events.

It’s not a coincidence that the narratives emanating from the outlets partaking in this dynamic run almost contrary to the opinions of experts screaming into voids on their blogs

And it’s not a coincidence that people who popularize narratives that run contrary are doxxed, blacklisted by these companies, met with extreme prejudice, even doxxed by compromised outlets, and often forced to make a career change.

It’s not a coincidence that big tech is a major landing spot for spooks after they leave the DOD.

It’s not a coincidence that tech journalism outlets tend to refer to blatant monopolies as behemoths, giants, and big tech too.

That aside,

I also saw a good infographic on the spectrum of the media’s political bias and I think you’d see my point more clearly if similar was done with regard to bias/tone towards technology and tech monopolies. For example and if this were technology and the fields were Critical, Neutral, Praising, we’d likely have to scrape the internet for independent blogs from experts to fill in the critical column.

Media infographic
The infographic in question

All of which would be concerning in itself if experts and veterans are writing narratives that are essentially polar to major journalist outlets comprised of mostly non-experts that are heavily influenced by tech monopolies; from privileged treatment at events to exclusive access that critical journalists oddly don’t receive. Sure, we can find critical articles from each outlet from traditional journalists. But they are too uncommon to be effective seem to do little else than create a thin veil of unbiased objectivity and are still far out of step with critical articles from experts both in content and consistency which is all I would have to exhibit in order to prove bias.

Notice how the person who burned a source (burned for saying the truth!) pretends to be the victim in all this, using some medical condition as an excuse for receiving a “soft” treatment. This may be an attempt to invert the narratives. As we’re going to show later in this series, he’s just buying himself Microsoft “access”.

António Campinos: Portuguese in Absentia (Exile)

Posted in Deception, Europe, Patents at 8:37 am by Dr. Roy Schestowitz

From an official Campinos CV in Spanish.

Campinos CV
Born in France, dual-national French

Campinos CV: schools
Studied in France

IAM: I sell awards to corrupt officials to legitimise them and their agenda
Blessed by liars

Boarding in Portugal
That’s me in Portugal in the 1980s

Summary: The EPO‘s “f***ing president” (this is what he calls himself) António Campinos, sometimes known as António the Pretender [1, 2], recently referred to himself as a “nomad”; it seems possible I was in Portugal at a younger age (and year) than he was

Anguish of Monopolies

Posted in Antitrust, Microsoft at 8:01 am by Dr. Roy Schestowitz

“We need to slaughter Novell before they get stronger….If you’re going to kill someone, there isn’t much reason to get all worked up about it and angry. You just pull the trigger. Any discussions beforehand are a waste of time. We need to smile at Novell while we pull the trigger.”

Jim Allchin, Microsoft VP

And you are here: 'First they ignore you, then they ridicule you, then they fight you, then you win.' - Mahatma Gandhi
Original from Nicholas Klein. They are fighting us while smiling (schmoozing) at us.

Summary: Government bailouts for Microsoft (passing money or national debt from taxpayers to Microsoft’s tax-evading management) won’t last forever; Microsoft as a business is becoming unsustainable or barely sustainable

THE people who have sympathy for Microsoft are either working for Microsoft or they might simply be mentally weak. Some are exceptionally gullible.

This past week we saw several US “tech” giants falling on their sword; Microsoft too isn’t doing well, it has been faking its performance for decades while taking de facto bailouts from the US taxpayers. Nowadays the levels of bailout are unprecedented and barely sustainable.

“Microsoft’s influence in the Web has never been more meager.”Seeing the rapid demise of Windows (relative to Android in particular), Microsoft resorts to illegal tactics again, this time tightening the screws on Linux and BSD [1, 2, 3, 4] while even bigger things happen at the ‘sidelines’.

Microsoft’s influence in the Web has never been more meager. In spite of plenty of acquisitions, Microsoft descended into oblivion on the server side. Its Web browser, even when almost imposed on Windows users, continues to lose market share. The same is true for Microsoft’s search engine, which Microsoft now markets by proxy in DuckDuckGo (DDG). Yes, DDG is like a Microsoft-hosted Bing proxy that allows Microsoft to spy on everybody. DDG’s management now openly admits this while refusing to spill all the beans, citing an NDA. We won’t even mention “Azure” being an utter failure because it’s not even clear what that brand is; like “clown computing”, everything gets rebranded to fake growth while Azure itself quietly lays off staff. It’s not growing. It’s technically hopeless. Military (“defence”) budget cannot eternally bail out “Azure”. Sooner or later taxpayers will realise who’s causing inflation and why. The shareholders are being conned and a lot of the money in this game is people’s pension funds. They’re going to lose it. It’s like a pyramid scheme, gambling and riding totally fictional valuations.

“The shareholders are being conned and a lot of the money in this game is people’s pension funds. They’re going to lose it. It’s like a pyramid scheme, gambling and riding totally fictional valuations.”Mentioned in passing the other day was Netcraft’s report for the end of July. The latest Netcraft report, showing sharp decreases for Microsoft yet again, isn’t mentioned by the mainstream or “tech” media. Microsoft barely registers in the charts anymore. From what we can gather, a lot of businesses appear to have moved to apache/nginx during the pandemic. Some chose third-party (not locally-hosted, e.g. with Varnish) caches and CDNs. For some that meant “clown computing” or Clownflare, which isn’t so good either (Clownflare loses money, it’s not really a viable business). Not “so good” to say the least or to put it very politely… they view the “customers” as products and site visitors as something to be sold.

On the desktop (“client”) side, Microsoft is throwing wrenches at the cogwheels at hardware level. This whole UEFI thing is obnoxious and they’ve infiltrated a lot of organisations such as OSI and the Linux Foundation, rendering them Microsoft advocacy groups, i.e. the very antithesis of their original purpose/s.

“When Microsoft goes under we’ll have a new (another) problem to deal with: staff from Microsoft that ends up in a lot of other companies, spreading unfit-for-purpose pseudo-engineering.”Microsoft is definitely fighting us. It is using the tactics of Nicolo Machiavelli, but a lot of people aren’t familiar with Machiavellian tactics, so they just aren’t seeing it. As Machiavelli himself put it: “Men rise from one ambition to another. First they seek to secure themselves from attack, and then they attack others.”

Maybe Microsoft was “underdog” in the 1980s, but back then it already sabotaged the rivals and broke the law. By the 1990s Microsoft was already on a killing expedition. Sadly, many of today’s young people don’t know this. The media distorts their perception and lies to them about the past.

When Microsoft goes under we’ll have a new (another) problem to deal with: staff from Microsoft that ends up in a lot of other companies, spreading unfit-for-purpose pseudo-engineering. That has already happened in some companies, including Nokia and Canonical.

“…yesterday we were notified that the Microsoft representative in charge with the education strategy had requested the organizers to pull the Ubuntu presentation because it is ‘unfair competition’ to hold such a presentation at an event sponsored by them. They are indeed co-sponsors but the conference is organized by the Ministry of Education and its local office, and is being held on the premises of a public University.”

“Then, they fight you,” May 2008

Links 31/07/2022: Linux Mint’s 3 Releases

Posted in News Roundup at 5:45 am by Dr. Roy Schestowitz

  • GNU/Linux

    • New Release of Linux Mint (3 Flavours)

    • Applications

    • Instructionals/Technical

      • TecAdmin(Resolved) Key is stored in legacy trusted.gpg Keyring – TecAdmin

        To enhance the security of your system, the Debian developers have updated the policy of using GPG keys. The Ubuntu 22.04 and Debian 11 prompted to manage OpenPGP as keyring files instead.

      • Trend Oceans2 Ways to Create an ISO Image File in Linux – TREND OCEANS

        An ISO image file is an archive of files and directories compressed using the ISO 9660 format. It is suitable for writing CD or DVD discs, sector by sector.

        When you download an operating system or even some games, they give you their ISO image file. Either you can uncompress/mount them on your system or burn a CD/DVD disc using the ISO image file.

        However, we have already written a detailed guide on how to mount and unmount an ISO image on Linux. Therefore, today’s focus will be on creating an ISO image file from a collection of files or media devices in Linux.

      • ID RootHow To Install Xtreme Download Manager on Ubuntu 22.04 LTS

        In this tutorial, we will show you how to install Xtreme Download Manager on Ubuntu 22.04 LTS. For those of you who didn’t know, Xtreme Download Manager (XDM) is a free and open-source download manager. XDM seamlessly integrates with Google Chrome, Mozilla Firefox Quantum, Opera, Vivaldi and other Chroumium and Firefox based browsers, to take over downloads and saving streaming videos from web. It is available cross-platform for Linux, Windows and macOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Xtreme Download Manager on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Linux HintHow to Use AWS IAM PassRole Permission

        In AWS, an IAM Role is an AWS identity like an IAM user. AWS IAM service is a very intricate service which, if not configured wisely, can lead to potential security issues. They are attached with policies which decide what this identity is allowed to do and not allowed to do. It is not attached to a single person, but can be assumed by anyone who requires it. Instead of long term credentials (password or access keys) like an IAM user, an IAM role has temporary security credentials. When a user, application, or a service needs access to AWS resources for which they do not hold permissions, they use/assume a specific role for this purpose. Temporary security credentials are then used for this task.

  • Distributions and Operating Systems

    • New Releases

      • Barry KaulerEasyOS Dunfell 32-bit works

        I posted recently that built a Dunfell-series i686 (32-bit) EasyOS, but got a kernel panic:


        Didn’t want to put much time into it. Didn’t like to leave it at that state though, so have fixed the kernel panic, and now get a desktop.

        The Xorg ‘modesetting’ driver just gave a black screen, but the ‘intel’ driver works.

        Need to recompile the kernel, I think need to remove EFI and maybe KMS capabilities.

    • BSD

      • FreeBSDAdvocating for FreeBSD in 2022 and Beyond | FreeBSD Foundation

        Now for many folks, advocacy is also conflated with the dreaded M word. Marketing. I know, I know, it’s even in my title. In the course of my 20+ years in this industry, I’ve heard the words sleazy, untrustworthy and useless thrown around when discussing marketing departments. Many communities, especially those in open source, see very little value in the “non technical” people selling their work. The thing is, I firmly believe marketing gets a bad rap. Of course, there are always a few bad apples. Marketers who focus on fantasy rather than fact. You know the type. Those folks make defending the role incredibly difficult. However, the reality is, marketing is essential for any open source project and I’ve had the good luck to work with some of the best in the business. In fact, the team of marketing folks at the Foundation work extremely hard to remain true to the heart of FreeBSD. We don’t make up statistics. We don’t oversell the features or make up something out of nothing. You can be sure that when we speak about the value FreeBSD brings, or the work we’re doing to support the Project, we’re not spreading propaganda. We’re instead speaking to the benefits of using the operating system and becoming part of the community.

      • Arca NoaeArca Noae releases new MultiMac NIC driver package

        Arca Noae is pleased to announce the immediate availability of a new release of our MultiMac NIC driver package.

        This is a maintenance release of the MultiMac drivers. The E1000B, MMIGB, and MMLEM drivers have been updated to the latest FreeBSD sources. This adds a few new supported devices for the E1000B driver. The remaining drivers are simply rebuilt with the current system libraries to pickup changes from there. This update is recommended for all users.

        As always, please read the .txt file that comes with each driver and also provided on the wiki. If you have problems with any of the drivers in this release, please read the Debugging Guide in the wiki first. If your problem cannot be resolved with the Debugging Guide, then the problem should be reported to the ticketing system.

        More information about the MultiMac NIC drivers may be found in the wiki.

      • DragonFly BSD Digestfetch and timeouts – DragonFly BSD Digest

        This will matter most to you if your connection to the Internet is poor: fetch(1) now will time out on data transfers too.

      • DragonFly BSD DigestIn Other BSDs for 2022/07/30
      • DragonFly BSD DigestBSD Now 465: Deep Space Debugging – DragonFly BSD Digest

        The lead link in this week’s BSD Now is the sort of thing I like to link to: debugging Lisp in space. There’s more than that.

    • Devices/Embedded

      • Linux GizmosRISC-V based HydraUSB3 board is open source and supports high-speed protocols

        The HydraUSB3 V1 is a development kit that accommodates the WCH CH569 microcontroller. This device was designed to create projects that involve streaming or high speed protocols (i.e. SerDes and HSPI) via USB3.0.

        As previously mentioned, the MCU compatible with this development kit is the WCH CH569 which is based on the 32-bit RISC-V3A core. According to the datasheet, this chip “integrates super-speed USB3.0 host and device controller (built-in PHY), GbE controller, dedicated high-speed SerDes controller (built-in PHY, can drive optical fiber directly), high-speed parallel interface (HSPI), digital video port (DVP), SD/EMMC interface controller and encryption/decryption module.”

      • Linux GizmosTechbase offers Remote Raspberry Pi CM4 Program

        Techbase is a Polish-based company tackling global chip shortage and supply chain issues with a remote platform to speed up development. As of now, the devices offered for remote access are the ModBerry 500 CM4 and the ClusBerry-2M.

        The ModBerry 500 CM4 is an industrial computer based on the Raspberry Pi CM4 powered by the quad-core Cortex A72. This device can be highly customized with upgraded RAM, eMMC flash and other peripherals. LinuxGizmos covered this device last year, however the specs will also be listed at the end of the article for reference. 

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Standards/Consortia

      • The HillStandardization vs innovation in tech: The curious case of USB-C

        And this lies at the heart of the emerging debate over whether the U.S. should follow the EU’s lead and mandate USB-C for electronic devices. Since the machinery of government moves slowly, once an electronic charging standard is locked in by law, and vendors and customers build expectations around it, it will take years or decades to change. This clearly does not mean the end of innovation in electronics charging, any more than it did for electric plugs. But it means that the precise definitions in any electronic charging law will define whatever innovation will be channeled outside of it.

  • Leftovers

    • The EconomistHow magicians won the attention economy

      Before I started looking into this corner of the content economy I assumed that the videos that went viral were made by Gen Z-ers playing around and occasionally surfing a serendipitous wave. But it turns out that there’s a formula to getting people to watch you on social media.

      Though that formula isn’t perfect – you never quite know what the algorithms of the different platforms will favour or what will strike a chord with viewers – a group of people have come as close as anyone to creating a method for going viral. And that method is designed by magicians.

    • Counter PunchNothing to be Afraid of in Here
    • Counter PunchThe Resounding Right of Mutulu Shakur to Die in Freedom
    • HackadayWhat’s The Time? It’s Casino’clock!

      As the saying goes, nothing can be said to be certain, except death, taxes, and the never-ending inventiveness of clock hacks. No matter how tried and proven a concept is, someone will always find a new twist for it. Case in point: notorious clock builder [Shinsaku Hiura] took the good old split-flap display approach, and mixed things up by using a deck of playing cards to actually represent the time.

    • HackadayUpgraded Film Scanner Handles Bigger Formats At No Cost

      Film scanners are a useful tool for digitizing slides and negatives, and the Plustek 8100 that [Christian Chapman] had was capable, but limited to small format film only. Rather than pay for a much more expensive medium format scanner that could handle 120 film, he modified his 8100 to accomplish the same thing with a combination of good old software and hardware tampering.

    • HackadayHackaday Prize 2022: Soviet Geiger Counter Gets WiFi

      [Marek] has an impressive collection of old Soviet-style Geiger counters. These are handy tools to have in some specific situations, but for most of us they would be curiosities. Even so, they need some help from the modern world to work well, and [Marek] has come up with some pretty creative ways of bringing them into the 21st century. This version, for example, adds WiFi capabilities.

    • Hardware

      • HackadayDemonstrate Danger, Safely

        Dan Maloney and I were talking about the chess robot arm that broke a child’s finger during the podcast, and it turns out that we both have extreme respect for robot arms in particular. Dan had a story of a broken encoder wheel that lead to out-of-control behavior that almost hit him, and I won’t even get within striking distance of the things unless I know they’re powered off after seeing what programming errors in a perfectly functioning machine can do to two-by-fours.

      • PC WorldIntel confirms it will raise CPU prices after losing $500 million this quarter

        Intel dropped several bombshells on Thursday afternoon: confirming it will raise prices, formally discontinuing Optane, and reporting an unexpected half billion dollar loss in the wake off poor PC demand amid poor execution.

        Intel has already been rumored to be preparing price hikes of between 10 to 20 percent later this year, according to the Nikkei news service and subsequently confirmed by Dylan Martin of the Register. But Intel chief financial officer David Zinsner said that Intel had been suffering from inflationary pricing, and that it would now pass along those costs along to its customers.

      • HackadayUSB Drive Keeps Your Secrets… As Long As Your Fingers Are Wet?

        [Walker] has a very interesting new project: a completely different take on a self-destructing USB drive. Instead of relying on encryption or other “visible” security features, this device looks and works like an utterly normal USB drive. The only difference is this: if an unauthorized person plugs it in, there’s no data. What separates authorized access from unauthorized? Wet fingers.

      • HackadayRe-reclaimed From Nature: Resurrecting A DT80 Terminal

        When Datamedia announced their new DT80 terminal as a VT100 killer back in 1979, they were so confident of its reliability, they threw in a full one-year warranty. Now, decades later, that confidence is once more put to the touch after [RingingResonance] fished one such terminal out of a creek by an old illegal dumping site. Not knowing what to expect from the muck-ridden artifact, his journey of slowly breathing life back into the device began.

      • HackadayFix Old Caps, But Keep That “Can Capacitor” Look

        Vintage electronics and capacitor replacements tend to go hand-in-hand. Why? Because electrolytic capacitors just don’t last, not the way most other components do, anyway.

    • Health/Nutrition/Agriculture

    • Proprietary

      • YLECyber attack targets Finnish news agency STT [iophk: Windows TCO]

        STT told Yle it was investigating the possibility of an information leak, with STT CEO Kimmo Laaksonen saying the organisation had been in touch with the authorities since the breach.

    • Security

      • Tom’s Hardware32-Bit Linux Won’t Get Patched for Latest Intel Vulnerabilities [Ed: The issue is Intel and x86, not Linux]]

        The amount of work involved in fixes means that the 32-bit Linux kernel won’t be getting the same treatment as the 64-bit version of the OS.

      • Light Blue TouchpaperFormal CHERI: rigorous engineering and design-time proof of full-scale architecture security properties | Light Blue Touchpaper

        Over the last twelve years, the CHERI project has been working on addressing the first two of these problems by extending conventional hardware Instruction-Set Architectures (ISAs) with new architectural features to enable fine-grained memory protection and highly scalable software compartmentalisation, prototyped first as CHERI-MIPS and CHERI-RISC-V architecture designs and FPGA implementations, with an extensive software stack ported to run above them.

        The academic experimental results are very promising, but achieving widespread adoption of CHERI needs an industry-scale evaluation of a high-performance silicon processor implementation and software stack. To that end, Arm have developed Morello, a CHERI-enabled prototype architecture (extending Armv8.2-A), processor (adapting the high-performance Neoverse N1 design), system-on-chip (SoC), and development board, within the UKRI Digital Security by Design (DSbD) Programme (see our earlier blog post on Morello). Morello is now being evaluated in a range of academic and industry projects.

      • Privacy/Surveillance

        • [Old] News AUConsumers warned about sneaky WiFi tracing technique used by companies to track movements

          Mr Jabrayilov said whether the technique was considered PII (personal identifyable information) under the privacy act was “arguable”, given it only offered device information.

          He argued it was problematic however when used in conjunction with facial recognition technology, given that together they exposed a significant volume of personal information.

      • Confidentiality

        • VOA NewsNavajo Code Talker Samuel Sandoval Dies; 3 Code Talkers Remain

          The Code Talkers took part in every assault the Marines conducted in the Pacific, sending thousands of messages without error on Japanese troop movements, battlefield tactics and other communications critical to the war’s ultimate outcome. The code, based on the then-unwritten Navajo language, confounded Japanese military cryptologists and is credited with helping the U.S. win the war.


          Sandoval served in five combat tours and was honorably discharged in 1946. The Code Talkers had orders not to discuss their roles — not during the war and not until their mission was declassified in 1968.

    • Defence/Aggression

    • Environment

      • Project CensoredCensoring How We Teach the Past Threatens our Present and Future; and Understanding Food Waste and Climate Change in a Global System – The Project Censored Show
      • Common DreamsOpinion | Declare Your Climate Emergency Today

        We are declaring a climate emergency. Everyone can, in whatever place on Earth they call home. No one needs to wait for politicians any more – we have been waiting for them for decades. What history shows us is that when people lead, governments follow. Our power resides in what we are witnessing. We cannot deny that Great Salt Lake is vanishing before our eyes into a sun-cracked playa of salt and toxic chemicals. Nor can we deny that Lake Mead is reduced to a puddle. In New Mexico a wildfire that began in early April is still burning in late July. Last August, the eye of Hurricane Ida split in two – there was no calm – only 190mph winds ripping towns in the bayous of Louisiana to shreds; and 7m acres in the American west burned in 2021. The future the scientists warned us about is where we live now.

      • Common DreamsOpinion | Corporate Media Fails to Connect Gas Price Surge and Climate Crisis

        Gas prices hit an all-time high in June, with the national average surpassing $5 per gallon. A shortage of Russian oil due to sanctions imposed by the European Union, United States and others is largely to blame, and in response President Biden has urged US oil companies and other producers—like Saudi Arabia and the United Arab Emirates—to increase their production to fill the gap.

    • Finance

    • AstroTurf/Lobbying/Politics

      • The VergeIndonesia bans access to Steam, Epic Games, PayPal, and more

        In line with the rules, companies deemed “Private Electronic System Providers” must register with the government’s database to operate in the country, or otherwise face a nationwide ban. Indonesia gave companies until July 27th to comply and has since banned those that haven’t. “The requirement is part of an overarching law, called MR5″

        The requirement is part of an overarching law, called MR5, which was first introduced in 2020. As noted by Reuters, the laws give the Indonesian government the ability to obtain data about specific users, as well as coerce companies into removing content that “disturbs public order” or is considered illegal. Platforms have four hours to take action on “urgent” removal requests, or 24 hours in the case of any other content.

      • Craig MurrayIndependence, Justice and the Unionist Lord Advocate

        The Lord Advocate’s “reference” to the UK Supreme Court on whether the Scottish Parliament has the power to instigate an Independence Referendum is carefully wrought to get the answer “No”.

      • TruthOutRight-Wing Groups Are Turning Election Denialism Into an Organized Force
      • TruthOutGOP Officials in at Least 3 States Have Refused to Certify Primary Results
      • Common DreamsAt Michigan Rally for Levin and Tlaib, Sanders Warns AIPAC It ‘Cannot Buy Our Democracy’

        Days before the Democratic House primary in Michigan, Sen. Bernie Sanders told hundreds of voters gathered in the Detroit suburb of Pontiac Friday night that a vote for Rep. Andy Levin would send a vital message to billionaires and corporate PACs, including one controlled by the powerful anti-Palestinian rights lobby, that “they cannot buy our democracy.”

        “The billionaire class is saying, ‘We own this country; we own the political system, and we will not tolerate dissent. Either you work for us, or get out of here.’ And Andy has chosen not to work for them.”

      • Common DreamsAfter House Passes Assault Weapons Ban, Advocates Say Senate Opponents Must Be Forced to Vote

        With little hope that the evenly divided U.S. Senate will approve the historic, long-awaited assault weapons ban that passed in the House Friday, gun control advocates called on Democratic leaders to hold a vote on the legislation and on filibuster reform, a move one campaigner said would force opponents to go on the record as being tolerant of “random slaughter.”

        “Leader [Chuck] Schumer needs to get his caucus in line and if not, make Manchin and Sinema go on record that they’re okay with children being slaughtered.”

      • TruthOutMedia Mogul Murdoch Dumps Trump for DeSantis. How Will This Impact the Election?
      • ScheerpostKatie Halper: Trump ‘Broke Liberals’ Brains’

        The comedian and host of two popular progressive podcasts offers her take on why the American left keeps getting things wrong.

    • Censorship/Free Speech

    • Civil Rights/Policing

    • Monopolies

      • Copyrights

        • Hollywood ReporterNetflix Sues Co-Creators of ‘The Unofficial Bridgerton Musical’ Over “For-Profit” Performances

          Shonda Rhimes and Julia Quinn have also commented on the lawsuit, filed in a D.C. district court on Friday, in which Netflix alleges songwriters Abigail Barlow and Emily Bear have committed “blatant infringement of [copyright].”

        • The VergeNetflix sues creators behind The Unofficial Bridgerton Musical following sold-out show

          After Bridgerton’s 2020 debut, Barlow and Bear began creating music based on the Netflix original series and promoting the endeavor on TikTok, where it quickly gained popularity. As fans requested more content, Barlow and Bear soon had enough to create a 15-song album that went on to win a Grammy in April, a first for music originating on TikTok. On July 26th, Barlow and Bear held a concert at the Kennedy Center in Washington, DC, featuring live performances and music from the National Symphony Orchestra.

        • Torrent FreakSmoothStreams IPTV Shut Down By MPA/ACE After Secret Legal Process

          SmoothStreams – one of the most reliable and well-known pirate IPTV providers – suddenly went offline this month. A two-week TorrentFreak investigation has determined that members of MPA-Canada and ACE, including Bell and Rogers, have been tracking the service’s operators for years. Legal action is already underway, but the process isn’t going exactly to plan.

  • Gemini* and Gopher

    • Technical

      • Battery Notifications with udev

        My laptop’s charging cable is 7 meters long. When I first left the US I needed to buy a new AC cable so I could plug my laptop in without an adapter. I dropped by the old electronics store and picked up a simple 5ft power cable. Turns out it was 5 meters and I’m an idiot. As a result I tend to always have my laptop plugged in while at home since I never struggle to find a close enough port.

        I don’t have any sort of task bar on my computers. I stopped using one years ago for the extra screen real estate and to minimize distractions. Instead I press super+escape to open a notification that displays various important vitals.

      • Internet/Gemini

        • We’re finally live!

          In my last gemlog article about the subject, I mentioned that I had set up a VPS on DigitalOcean running Molly Brown. In doing so I was reminded how much maintenance a VPS requires, and how broad the attack surface is. Around the same time a number of interesting articles about the new platform-as-a-service Fly appeared on Hacker News, and I noticed that they supported non-HTTP applications. When DigitalOcean increased their prices, I decided to take down the VPS and start over on Fly.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Saturday, July 30, 2022

Posted in IRC Logs, Site News at 2:15 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmVnscDwd8xfjPoxo8e6qkVk5NCmmeKpFqR1UCrVVZSSxi IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmamTJXFFWqbk37LYmk3AXNQ3spryA8LgMfaYpXttjbfmt IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmdSQpz8zJyCYxtPXo4cw6PHCBmCVknRem733jbSemL9Xj IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmYyvWBZQcFsAMfyCv1h4y996kRrVrsMNWTt2H66sHibfr IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmRRxucLZvV524Ys7FyKawD6nbVsk1SRetnCRKgywUKcWt IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmPkqJ6hL4hE8MY6hBRS1sEAsc53z6J9k1JRt4oXbB8dgA IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmUerCyPXv8Ko3k6gdHGufn2xK2sWHVUt4XLRWsZ8F2ksB IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmTj8UYfhtpeM7EYbd5x5aMa92Au1tVUw2ouN6jTQbQK2z IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmfVCS2T3FrMdyAu49nSsRJYhD12dUhVKKQJZAqUMECiet

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts