Passing Corporate Money Instead of Just ‘Gifts’

Posted in Marketing at 9:02 pm by Dr. Roy Schestowitz

Related: Techrights Statement on Phoronix

Phoronix Oktoberfest Special Begins, Premium Now Accept Stripe & Corporate Subscriptions Available

Summary: These sorts of sponsorships (“subscriptions”) are a classic way for corporations to inject money into publishers in exchange for favours (we’ve given many examples of this modus operandi over the years)

Phoronix comment

Links 17/09/2022: Release Candidate (RC 2) of SUSE Linux Enterprise Micro 5.3

Posted in News Roundup at 8:43 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • LinuxiacCloudflare’s New Proxy Server, Pingora, Has the Potential to Dethrone Nginx

        Pingora is a new HTTP proxy server built in-house by Cloudflare with plans to make it open-source in the future.

        Few companies can compete with Cloudflare’s experience in serving massive web traffic.

        To make things more precise, we’ll say this: Cloudflare handles more than 10% of all HTTP/HTTPS world Internet traffic. Moreover, globally, the Cloudflare network serves over 25 million HTTP requests each second and is used by almost 80% of all the websites that use reverse proxy services.

    • Audiocasts/Shows

    • Kernel Space

      • The Register UKNext magic Linux program to will change the world? Io_uring • The Register

        A few years ago developers knew eBPF as a handy way to build firewalls yet now it’s used everywhere for everything. Get ready for io_uring to do the same.

        Most people don’t know the first thing about Linux programming. Why should they? Linux, more so than most operating systems, just works. But under the surface, there are programs such as eBPF that are transforming the infrastructure under the operating system we use every day.

        As revealed this week, Microsoft chose to port eBPF into Windows rather than try to duplicate its functionality with its own program. io_uring may become the next Swiss-Army tool for Linux developers.

        Io_uring allows Linux to launch an operation asynchronously and wait for its completion. Unlike its asynchronous I/O (AIO) subsystem, its predecessor, io_uring uses a memory ring buffer shared between user space and the Linux kernel. This enables it to submit operations and collect the results without needing time-expensive Linux kernel calls. Its API is complex, but if your applications require lots of I/O, you get rewarded with vastly improved increased performance.

      • The Register UKRust is coming to the Linux kernel • The Register

        Both Linus Torvalds’ Open Source Summit keynote and Jonathan Corbet’s “Kernel Report” discussed efforts to allow Rust modules in Linux.

        The next version of the kernel will be 6.0, but as ever, the change of major version number doesn’t denote any major technical changes. Torvalds acknowledged that it might have been desirable to have a headline feature such as “now you can develop drivers in Rust,” but this probably won’t happen until kernel 6.1.

        So far, there is a working group, and a preliminary patch has been submitted. There are also two preliminary drivers implemented in the new language, which are discussed in depth over on LWN: a driver for NVMe drives, and an in-kernel server for the 9P network protocol from the Plan 9 operating system.

    • Graphics Stack

      • Dave AirlieDave Airlie (blogspot): LPC 2022 Accelerators BOF outcomes summary

        At Linux Plumbers Conference 2022, we held a BoF session around accelerators.

        This is a summary made from memory and notes taken by John Hubbard.

        We started with defining categories of accelerator devices.

        1. single shot data processors, submit one off jobs to a device. (simpler image processors)

        2. single-user, single task offload devices (ML training devices)

        3. multi-app devices (GPU, ML/inference execution engines)

        One of the main points made is that common device frameworks are normally about targeting a common userspace (e.g. mesa for GPUs). Since a common userspace doesn’t exist for accelerators, this presents a problem of what sort of common things can be targetted. Discussion about tensorflow, pytorch as being the userspace, but also camera image processing and OpenCL. OpenXLA was also named as a userspace API that might be of interest to use as a target for implementations.

      • Dave AirlieDave Airlie (blogspot): LPC 2022 GPU BOF (user console and cgroups)

        Currently most mainline distros still use the kernel console, provided by the VT subsystem. We’d like to move to CONFIG_VT=n as the console and vt subsystem have historically been a source of bugs but are also nasty places for locking etc. It also can be the cause of oops going missing when it takes out the panic path with locking bugs stopping other paths from completely processing the oops (like pstore or serial).

        The session started discussing what things would like. Lennart gave a great summary of the work David did a few years ago and the train of thought involved.

        Once you think through all the paths and things you want supported, you realise the best user console is going to be one that supports emojis and non-Latin scripts. This probably means you want a lightweight wayland compositor running a fullscreen VTE based terminal. Working back from the consequences of this means you probably aren’t going to want this in systemd, and it should be a separate development.

        The other area discussed was around the requirements for a panic/emergency kernel console, likely called drmlog, this would just be something to output to the display whenever the kernel panics or during boot before the user console is loaded.

      • Mike Blumenkrantz: Meatballs

        Let’s talk about Intel.

        I know what you’re thinking.

        If you work for Intel, you’re thinking Oh no.

        If you don’t, you’re thinking Oh no. Or possibly getting ready to post some comments about ANV not supporting features, or having bugs, or any of the common refrains that I’ve seen so often around the internet.

        The fact remains, however, that ANV is the reference zink hardware driver. It has been ever since I started working on zink. The reason for this is simple: it’s what I have on the machine I develop with, and when I started working on zink, it was the driver that was furthest along.

        It’s therefore no exaggeration to say that without everything ANV and the Intel Mesa team brings to the table, zink wouldn’t be nearly as far along as it is.

    • Applications

    • Instructionals/Technical

      • FOSSLinuxHow to install Vagrant on Ubuntu 22.04 | FOSS Linux

        Vagrant is an open-source software used to manage and generate different virtual environments using virtualization techs such as VirtualBox, VMware, and more. It simplifies the config management of virtual machines to boost productivity with the aid of provisioners. Provisioners fundamentally permits the customization of the configuration of virtual machines.

        Vagrant gives many development environments to DevOps, allowing the developers to work beyond several operating systems. One exciting feature of Vagrant is that you can install this tool on nearly all Linux distros. It is essential to know that Vagrant is a command-line generated tool.

        Also, you must ensure that you have a virtualization engine like Hyper-V, VirtualBox, or Docker setup on your system since you cannot run the Vagrant tools without virtualization software. The Vagrant plugin system also supports KVM and VMware.

      • FOSSLinuxHow to install TeamViewer in Ubuntu 22.04 LTS | FOSS Linux

        TeamViewer is proprietary software that permits a user to remotely access another user’s desktop, share the desktop and even facilitate file transfer between the PCs over an internet connection. It is a well-known app among helpdesk support staff and comes in handy when aiding remote users who are stuck and can also not get worthwhile assistance.

        Better yet, the program works well with all major platforms: macOS, Windows, and Linux (also in limited forms on android and iOS). Besides file transfer, TeamViewer lets you chat with its users in real-time, sync clipboard contents, and much more.

        The complexity of the application does not, however, compromise the program’s simplicity. As such, it is a pretty straightforward app as you only need to install it on both PCs required for connection, then interlink them using the unique ID and password it auto-generates. While this app’s core feature is skewed more towards the IT professionals, DevOps, and support agents, it is free for one’s use (and comes in handy for helping a frustrated friend or relative).

      • Linux Made SimpleHow to install The King Of Fighters Memorial Lvl 2 Super Edition on a Chromebook

        Today we are looking at how to install The King Of Fighters Memorial Lvl 2 Super Edition on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • H2S MediaHow to install ThinkorSwim on Ubuntu 22.04 LTS Linux

        Thinkorswim was launched in 1999 as an options brokerage platform. However, later it was acquired by TD Ameritrade, although Thinkorswim’s brokerage services were shut down, the trading platform is still active and distributed by TD Ameritrade for its clients. Besides the trading feature, Thinkorswim users also have access to trading and analysis tools, online courses, etc.

        Unlike TradingView which can be linked to the trading accounts of many different brokers, Thinkorswim is only used by TD Ameritrade clients.

        Thinkorswim allows users to freely set alerts based on parameters of technical indicators and price movements. Meanwhile, TradingView allows users to receive only 12 different alert conditions. However

        Thinkorswim is a bit more complicated for beginners. It is confusing even for many experienced traders. However, the platform has a fairly detailed and comprehensive system of study guide documents that users can use when they need to study.

        Thinkorswim is completely free for customers, which is a big plus. For traders with TD accounts, Ameritrade has provided extensive knowledge for traders who want to learn about trading and investing.

      • MakeTech EasierHow to Install Puppy Linux On a USB Flash Drive – Make Tech Easier

        Puppy Linux is a family of distributions that provide a simple way to use Linux on lower-end machines. Unlike regular distros, Puppy Linux uses popular versions of existing distributions and it modifies them to run with lower system requirements.

        This allows you to install this distribution on just about any system and storage medium possible. For example, you can install and boot a working copy of the latest version of Puppy Linux on a 512MB flash drive. This article shows you how you can do just that.

      • TecMintHow to Show Warning Message to SSH Unauthorized Users

        SSH banner warnings are crucial when companies or organizations want to show a strict warning message to discourage unauthorized users from accessing a Linux server.

        These SSH banner warning messages are displayed just before the SSH password prompt so that unauthorized users who are about to gain access are made aware of the aftermath of doing so. Typically, these warnings are legal consequences that unauthorized users can suffer should they decide to ahead with accessing the server.

        Be cautious that a banner warning is by no means a way of blocking unauthorized users from logging in. The warning banner is simply a warning meant to warn unauthorized users from logging in. If you want to block unauthorized users from logging in, then additional SSH configurations are required.

      • HowTo GeekHow to Tell If a Bash String Contains a Substring on Linux

        Sometimes in Linux scripts, you want to know if a string of text contains a specific, smaller string. There are many ways to do this. We show you some simple, reliable techniques.

        Why Is This Useful?

        Searching a string for a smaller substring is a common requirement. One example would be reading text from a file or from human input and searching the string for a specific substring so that your script can decide what to do next. It might be looking for a label or device name in a configuration file or a command string in a line of input from a user.

        Linux users are blessed with any number of utilities for manipulating text. Some are built into the Bash shell, others are provided as standalone utilities or applications. There’s a reason Unix-derived operating systems are richly served with string manipulation capabilities.

      • ID RootHow To Install KiCad on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install KiCad on Linux Mint 21. For those of you who didn’t know, KiCad is an open-source software used to capture and design printed electronic circuit boards. It has an integrated environment for schematic capture, PCB layout (including 3D rendering), manufacturing file viewing, and SPICE simulation, all in one place.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a KiCad on Linux Mint 21 (Vanessa).

      • ID RootHow To Install Python on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install Python on Rocky Linux 9. For those of you who didn’t know, Python is a popular, powerful programming language that is easy to get started and understand. It supports multiple programming paradigms, including structured, object-oriented, and functional programming. Python has been around since the late 1980s and continues to be one of the most popular languages in use today.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of Python 3.10 on Rocky Linux. 9.

      • Trend OceansHow do I Copy a Particular File to Multiple Directories on Linux – TREND OCEANS

        Whenever I have to copy a particular file to multiple directories, I literally feel what a clunky job I have to do. Manually copying a single file to multiple locations is a total waste of time when you know you have to move this file across hundreds of directories.

        Anyway, I need to do this, so there is no way to escape from this, so let’s be brave and find the solution to overcome this hurdle in the following article.

        As you know, bare usage of cp or mv commands is not reliable for copying or moving content to multiple locations at once. However, with a little tweak, you can use the mv or cp command to move or copy files at multiple locations, which we will see in the subsequent section. Apart from that, you can also use find, tee, and usage of echo and xargs commands to achieve your desired result.

      • HowTo ForgeHow to Install Graylog Centralized Log Management System on Rocky Linux

        Graylog is a free and open-source log-management platform for capturing, storing, and enabling real-time analysis of your data and logs. It’s written in Java and built on top of other open-source software like MongoDB and Elasticsearch. Graylog provides one of the most efficient, fast, and flexible centralized log management platforms. With Graylog, you can send and analyze both structured and unstructured data from almost any data source.

        In this tutorial, you will set up the Centralized Log Management using the Graylog on the Rocky Linux server. This tutorial includes the basic installation of some Graylog dependencies such as Elasticsearch and MongoDB. Additionally, you will also set up the Graylog Input and send logs from the Linux machine to the Graylog Server via the Syslog Ingest.

      • LinuxTechiHow to Install Kubernetes Cluster on Debian 11 with Kubeadm

        Are you looking for an easy guide for installing Kubernetes Cluster on Debian 11 (Bullseye)?

        The step-by-step guide on this page will demonstrate you how to install Kubernetes cluster on Debian 11 with Kubeadm utility.

        Kubernetes (k8s) cluster contains master and worker nodes which are used to run containerized applications. Master node works as control plan and worker nodes offers environment for actual workload.

      • H2S Media3 ways to install Emacs text editor on Ubuntu 22.04 LTS

        There are multiple ways to install Emacs on Ubuntu 22.04 Jammy JellyFish Linux using the command terminal and graphical user interface.

        GNU Emacs is a programmable text editor suitable for development. It is a very comprehensive and platform-independent editor that can be expanded with its own Lisp dialect (Emacs Lisp). GNU Emacs makes it easier to write source code through syntax highlighting and can be adapted by the user. Since its control is mainly based on keyboard shortcuts, it requires some training in order to be able to use all its possibilities intensively. Thanks to a large number of plugins, the editor can be used in almost all areas. There are, for example, extensions for file management, email and news, IRC, compilations, web surfing, and much more. Furthermore, it can also be used to create text documents based on LaTeX.

      • Clone your Debian packages to a new system

        Apt-clone is a simple tool that can scan your Debian Linux system for installed packages, software repositories, and third-party DEB packages and pack them away to install on another computer. Here’s how to use Apt-clone on your Linux system.

      • HackadayLinux Fu: Eavesdropping On Serial | Hackaday

        In the old days, if you wanted to snoop on a piece of serial gear, you probably had a serial monitor or, perhaps, an attachment for your scope or logic analyzer. Today, you can get cheap logic analyzers that can do the job, but what if you want a software-only solution? Recently, I needed to do a little debugging on a USB serial port and, of course, there isn’t really anywhere to easily tie in a monitor or a logic analyzer. So I started looking for an alternate solution.

        If you recall, in a previous Linux Fu we talked about pseudoterminals which look like serial ports but actually talk to a piece of software. That might make you think: why not put a piece of monitor software between the serial port and a pty? Why not, indeed? That’s such a good idea that it has already been done. When it works, it works well. The only issue is, of course, that it doesn’t always work.

      • Red Hat OfficialManage containers at the edge with Linux | Enable Sysadmin

        I often hear the question: “How do I manage containers with RHEL?” I think there’s a knowledge gap here because many users never took docker run [image] beyond a laptop and into production. This is a good thing for many environments, as using an orchestration platform like the industry default Kubernetes provides almost endless capabilities and benefits.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.26 Beta Testing

          Plasma 5.26 Beta was released yesterday


          And now we need your help testing it. Download KDE neon Testing edition and install it on a machine (do backups etc or use a spare computer if you can).

        • NeowinKdenlive 22.08.1

          Kdenlive is an acronym for KDE Non-Linear Video Editor. It works on GNU/Linux, Windows and BSD. Through the MLT framework, Kdenlive integrates many plugin effects for video and sound processing or creation. Furthermore Kdenlive brings a powerful titling tool, a DVD authoring (menus) solution, and can then be used as a complete studio for video creation.

          Kdenlive supports all of the formats supported by FFmpeg or libav (such as QuickTime, AVI, WMV, MPEG, and Flash Video, among others), and also supports 4:3 and 16:9 aspect ratios for both PAL, NTSC and various HD standards, including HDV and AVCHD. Video can also be exported to DV devices, or written to a DVD with chapters and a simple menu.

      • GNOME Desktop/GTK

        • This Week in GNOME#61 Overview Tabs – This Week in GNOME

          Update on what happened across the GNOME project in the week from September 09 to September 16.

        • Jakub SteinerEven Mo’ Pixels – Even a Stopped Clock

          To keep the habbit alive, I continue to do a daily pixel routine, now covering almost all of the GNOME Circle apps.

        • GUADEC and App Organization BoF – Sophie’s Blog

          Before GUADEC there was an astonishing Covid wave in Germany, so I finally somehow caught it despite not even really leaving my flat around this time. I was still feeling quite weak around GUADEC and also had to catch up with my preparation for the BoF I was hosting. More about the BoF below. I still managed to drop by for one evening, seeing some new faces and attending Tobias’ talk in person.

          Despite still being pretty much a greenhorn within the GNOME community I was awarded this year’s Community Appreciation Award (aka “Pants of Thanks”.) I was very thankful that this year’s general assembly included a huge block of attributions to a lot of initiatives and contributions within the GNOME project. We have so many wonderful projects and contributors within the project that a single award is not nearly enough to cover everything that’s going on. I can’t deny that though felt flattered to receive an award for my work😊 I also had a pretty huge smile on my face when reading the hints as to who will be getting this year’s award.

  • Distributions and Operating Systems

    • SUSE/OpenSUSE

    • Arch Family

      • Arch Linux mailing list changes

        As part of dropping Python 2 which is EOL, we have migrated our mailing lists from mailman2 to mailman3. Rewriting of the “From” header and subject (to prepend the list name) have been disabled to keep the DKIM signature intact. This means “reply to mailing list” must be used when replying to the list and you may need to update your filters and rules matching the “From” header. All existing subscriptions are migrated and you do not need to re-subscribe.

    • Fedora Family / Red Hat

      • PHP version 8.0.24RC1 and 8.1.11RC1 – Remi’s RPM repository – Blog

        Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS / Alma / Rocky and other clones) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests, and also as base packages.

      • Fedora ProjectFriday’s Fedora Facts: 2022-37 – Fedora Community Blog

        Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! F37 Beta was released on Tuesday.

        I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

      • Fedora ProjectHow to rebase to Fedora Silverblue 37 Beta – Fedora Community Blog

        Silverblue is an operating system for your desktop built on Fedora Linux. It’s excellent for daily use, development, and container-based workflows. It offers numerous advantages such as being able to roll back in case of any problems. Let’s see the steps to upgrade to the newly released Fedora 37 Beta, and how to revert if anything unforeseen happens.

        Before attempting an upgrade to the Fedora 37 Beta, apply any pending upgrades.

      • Enterprisers Project9 of our most popular articles of all time
      • Enterprisers ProjectMotivate your IT team using this leadership advice

        If there’s anything business leaders can count on over the last few years, it’s that you can’t count on anything. With a volatile job market, changes in employee priorities, and the lasting effects of COVID-19, there’s no way leaders can guarantee employee satisfaction, motivation, and retention.

        Company executives learned quickly that their efforts to retain and motivate employees must be continually addressed and shifted to succeed in today’s climate. With hybrid or fully remote work options being the new norm, knowing the feelings, needs, and motivators of employees has become even more critical.

      • Red HatMy advice for updating Docker Hub’s OpenJDK image | Red Hat Developer

        The Java runtime environment in your containers could stop receiving updates in the coming months. It’s time to take action. This article explains the decisions that led to this issue and proposes a solution.

      • Red HatRegex how-to: Quantifiers, pattern collections, and word boundaries | Red Hat Developer

        Filtering and searching text with regular expressions is an important skill for every developer. Regular expressions can be tricky to master. To work with them effectively, you need a detailed understanding of their symbols and syntax.

        Fortunately, learning to work with regular expressions can be incremental. You don’t need to learn everything all at once to do useful work. Rather, you can start with the basics and then move into more complex topics while developing your understanding and using what you know as you go along.

        This article is the second in a series. The first article introduced some basic elements of regular expressions: The basic metacharacters (.*^$\s\d) as well as the escape metacharacter \.

        This article introduces some more advanced syntax: quantifiers, pattern collections, groups, and word boundaries. If you haven’t read the first article, you might want to review it now before continuing with this content.

        These articles demonstrate regular expressions by piping string output from an echo command to the grep utility. The grep utility uses a regular expression to filter content. The benefit of demonstrating regular expressions using grep is that you don’t need to set up any special programming environment. You can execute an example of a regular expression immediately by copying and pasting the code directly into your terminal window running under Linux.

    • Canonical/Ubuntu Family

      • OMG UbuntuThat ‘Unofficial’ Snap Store We Loved? It’s Becoming More Official

        Switching to the preview/edge channel for the official Ubuntu Snap Store — Snap Store is the GNOME Software fork Ubuntu ships with, with the Flatpak goodness stripped out and Snap stuff bolted on — now installs the unofficial without-a-name Flutter-based store.
        It seems the unofficial Snap Store is set to become the official Snap Store!

      • UbuntuFAQ: MLOps with Charmed Kubeflow

        Charmed Kubeflow is Canonical’s Kubeflow distribution and MLOps platform. The latest release shipped on 8 September. Our engineering team hosted a couple of livestreams to answer the questions from the community: a beta-release webcast and a technical deep-dive. In case you missed them, you can read the most frequently asked questions (FAQ) about MLOps and access helpful resources in this blog post.

      • UbuntuJoin us at Operator Day, hosted by Canonical at Kubecon NA 2022

        Software operators are crucial in the Kubernetes landscape. A software operator encapsulates the knowledge and expertise of a real-world operations team and codifies it into a dedicated piece of software. Software operators help human operators and administrators run their applications efficiently and effectively. Canonical provides an OSS-based platform and framework for building and running operators.

      • Check The Ubuntu Version You’re Running – Linux Stans

        This tutorial will show you how to check what version of Ubuntu you’re running/using. We’ll show you a method of doing it via the command-line interface (CLI) and one via the graphical user interface (GUI).

      • The Fridge: Call for Ubuntu Community Council nominations

        The Community Council is looking for nominees for the upcoming election.

        We will be filling all seven seats this term, with terms lasting two years. To be eligible, a nominee must be an Ubuntu Member. Ideally, they should have a vast understanding of the Ubuntu community, be well-organized, and be a natural leader.

        The work of the Community Council, as it stands, is to uphold the Code of Conduct throughout the community, ensure that all the other leadership boards and council are running smoothly, and to ensure the general health of the community, including not only supporting contributors but also stepping in for dispute resolution, as needed.

    • Devices/Embedded

      • HackadayA RPI HAT For Synchronized Measurements

        A team from the Institute for Automation of Complex Power System (ACS) at RWTH Aachen University have been working for a while on the analysis of widely distributed power systems. In a drive to move away from highly specialised (and expensive) electronics platforms, they have produced some instrumentation designed to operate with the Raspberry Pi platform, and an open source software stack. They call the platform the SMU (Synchronised Measurement Unit.) The SMU consists of a HAT sitting on an RPi3, inside a 3D printed box that is intended to attach to a DIN rail. After all, this is supposed to be an industrial platform.

      • peppe8oBest Raspberry PI Projects with Tutorials

        One of the most searched topics on the internet regarding Raspberry PI is about projects to realize. Many of these results bring you to simple lists linking to not tested procedures. In this post, I’m going to summarize the best projects I have personally tested with Raspberry PI Foundation boards.

      • Raspberry PiTake part in Moonhack 2022: Community, culture, coding

        In 2016, Code Club Australia launched the Moonhack online coding event and broke the world record for the most children coding in one day. Then in 2017 they broke the record again. By now, more than 150,000 young learners from 70 countries have participated in Moonhack.

    • Open Hardware/Modding

      • ArduinoArduino Cloud extends ESP32 support to S2/S3/C3 devices | Arduino Blog

        Arduino Cloud is Arduino’s integrated platform to develop, deploy, and manage IoT devices in an easy way. It supports a broad list of hardware including not only Arduino boards but also ESP32 and ESP8266-based boards. Arduino is committed to making this list of devices grow and as a result of this effort, ESP32-S2, S3, and C3 families of chipsets have been added to the list of supported devices.

      • ArduinoThe Things Conference 2022: catch up with us and all things LoRaWAN® | Arduino Blog

        We are excited to announce our team will be traveling to Amsterdam for The Things Conference on September 22nd-23rd, where Arduino will be among select exhibitors.

        The Things Conference is the world’s largest conference about LoRaWAN®, bringing together the industry’s major players contributing to this technology’s development in a two-day deep dive dedicated to making business operations smarter. This year’s edition will focus on the main topic of digital transformation – as seen through the lens of LoRaWAN®, of course!

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Programming/Development

      • Barry KaulerBlender 3D modeler SFS created

        I downloaded the tarball and converted it to an SFS. Just click on the “sfs” icon to download. I recommend install to the main desktop, not in a container, as with the latter choice it seems to be running openGL with software rendering only.

        On the main desktop, Blender runs as user ‘blender’. This does create one little problem; it has menu entries to run the web browser to see online documentation, which doesn’t work. I have fixed it, but that fix will be in the next release of EasyOS. You can still view online documentation of course, just not via the menu in Blender.

      • QtDeveloping Safety Application

        We initially developed Qt Safe Renderer to show warning indicators in problem situations, such as car dashboards. Along the way, we have added features, and with the new upcoming 2.0 release, you can create even more complex user interfaces for safety-critical applications.

        Since making safety-critical software is usually a serious business, we decided to have fun during the traditional Qt Company’s Hackathon days. We made a little game with Qt Safe Render. The purpose of the demo was to test the upcoming 2.0 release and try out how end users can create applications with a safe render.

      • [Development] Qt 6.4.0 RC released

        Hi all!

        We have released the Qt 6.4.0 RC. As earlier you can get it via online installer. Src packages are also available in the Qt Account and download.qt.io. Delta to the beta4 attached. Please make sure you report all findings in Jira.

        The target is to release Qt 6.4.0 in two weeks so please inform me immediately if you find something new which should be fixed before the release.

        Jani Heikkinen
        Release Manager

      • LinuxConfigEEPROM CH341A programmer – Read and write data to chip on Linux

        In this tutorial we will use CH341A programmer to read, write and erase data/firmware on attached chip. This is your getting started guide to CH341A programmer. CH341A programmer allows users to attach variety of chips in order to read or backup firmware or overwrite the exiting firmware.

      • The Little Things: My “radical” opinions about unit tests
      • Jacob Kaplan MossQuality Is Systemic – Jacob Kaplan-Moss

        Software quality is more the result of a system designed to produce quality, and not so much the result of individual performance. That is: a group of mediocre programmers working with a structure designed to produce quality will produce better software than a group of fantastic programmers working in a system designed with other goals.

      • Perl / Raku

        • PerlType::Tiny v2 is Coming | Toby Inkster [blogs.perl.org]

          Eagle-eyed watchers of CPAN may have noticed that I’ve recently been releasing Type::Tiny development releases with version numbers 1.999_XYZ.

          Type::Tiny v2 is intended to be compatible with Type::Tiny v1. If you’ve used Type::Tiny v1, you shouldn’t need to change any code, but Type::Tiny v2 has a few new features which may make your code simpler, more maintainable, and more readable if you adopt them.

      • Python

        • Fedora MagazineUsing Python and NetworkManager to control the network – Fedora Magazine

          NetworkManager is the default network management service on Fedora and several other Linux distributions. Its main purpose is to take care of things like setting up interfaces, adding addresses and routes to them and configuring other network related aspects of the system, such as DNS.

          There are other tools that offer similar functionality. However one of the advantages of NetworkManager is that it offers a powerful API. Using this API, other applications can inspect, monitor and change the networking state of the system.

          This article first introduces the API of NetworkManager and presents how to use it from a Python program. In the second part it shows some practical examples: how to connect to a wireless network or to add an IP address to an interface programmatically via NetworkManager.

      • Rust

        • Learning asynchronous programming in Rust – Martin Pitt

          I recently found myself needing to write a dynamic reverse HTTP/websocket proxy. After some prototyping it is now time to write something real. To prepare myself for that, I devoted today’s Red Hat Day of Learning to another aspect of Rust: asynchronous programming, and learning about tokio. There is really no getting around tokio in the Rust world of networking.

          I started with the small book “Asynchronous Programming in Rust”. Honestly I found this a bit hard to follow, as it quickly dives into a lot of technical details, which I don’t have yet. But I understand the basics now: futures, async/.await, and an overview about available runtimes. As JavaScript developer I’m of course very familiar with async programming in general (a JS Promise is more or less the same as a Rust Future), but due to Rust’s much stricter typing and borrowing rules and multi-threading capabilities there are a lot of extra details to consider.

          Moving on to tokio, I found a nice blog post from Jakub Barszczewski that explains the basics of tokio on a simple web service example. That was very well written, easy to follow and understand. It only took an hour or so to work through, including copious excursions to API docs.

  • Leftovers

    • HackadayMechanical Relay Percussion In A Eurorack Format

      There are plenty of analog and digital synthesis modules available in Eurorack format. But how about one that actually does physical percussion while capturing the output at the same time? The VU Perc Relay module does just that.

    • Counter PunchCan Kindness Curb Conflict? The Science of the Smile

      Fifteen minutes later, the woman reappeared. She hopped out of her SUV with a tray of Starbucks hot chocolates. “You all look cold, and I wanted to thank you.”

    • Counter PunchRunning Out of Boundaries
    • Counter PunchBob’s Rhubarb Lounge

      Why not? The point of the lounge would be to serve as a place where people can explore the meaning of life, just as I once explored the meaning of rhubarb. The imagination has no limits! At the same time, it has all sorts of limits, some of which are deeply painful.

    • The NationElegy for a Poet Who Loved Sneakers

      I didn’t know who you were, and then you died. I went searching for your poems online devouring one after another then reading your Twitter feed backwards, your voice getting younger and younger, and that’s where I found the last pair of sneakers you ever bought: all-black AirMax 90s. I have a black pair, too, and a pair that are pink and teal. I don’t wear either of them enough, and that’s one problem with loving sneakers. The more you obsess over them, the more you buy, and the less you wear each pair. In college my friend Arshad told me that every year you add to your life, the shorter each one is in relation to the total, the significance of each day diminishing as you collect them. Goddamn, I said, but kept wanting days to be over so I could get to the next one. If I had found your poems just a few months earlier I could have emailed you. You asked people to do that. You’d worked in a casino and said you’d teach them the right way to play blackjack. We could have talked about cards and then shoes and then basketball. We would have gotten to poems eventually, or we wouldn’t have. There’s nothing new about poems, and no one knows the right way to write them. Now I’m watching a craft talk you gave about the body— how we feel it before we know it’s failing— and that’s what it is about sneakers, isn’t it? They’re part of the body, but they come off.

    • The NationThe Indefatigable Bill McKibben

      Back in 1989, when most important political people were still dithering about carbon dioxide’s true effects on the planet, journalist and activist Bill McKibben published The End of Nature, a book that predicted that life as we knew it was about to change, catastrophically and irrevocably, unless radical action was taken. He was just 27 when he wrote that book. It’s not apparent that McKibben, now 61, has had many vacations since then. He’s the author of numerous other books and articles, the founder of the environmental organization 350.org, and the instigator of a new project, Third Act, which mobilizes older adults for progressive change, including on global warming.

    • Counter PunchJacobin, Air-Conditioning, and Productivist Nonsense

      One of them was the 19-year-old Bhaskar Sunkara who unsubbed from the list to get away from all the nasty digs against Barack Obama…

    • Counter PunchA Compassionate Spy: What Happened Next?

      There was a lot of angst in our family about what should be the title of this film.  We wanted, “Something I Need to Tell You”.  Or “A Secret Shared” or …   

    • Counter PunchA Crash Course in the Works of H. Bruce Franklin … with H. Bruce Franklin

      DS: You say we lost by how we fought it. How you fight a war the right way may be a problem.

    • How management by metrics leads us astray
    • Senior Engineers are Living in the Future

      Imagine for a moment that, by some quirk of the universe, you are sharing your workspace with a time traveller. Specifically, yourself from 1 year in the future. How will you react to your new co-worker?11 If you find this exercise difficult, try instead imagining how your past self of a year ago would react to your present self. Despite being no more intelligent than you and coming from a similar background, they always seem to be one step ahead. Everything you accomplish, they have already accomplished a year ago.

      As intolerable as this situation is, the universe has been relatively kind to you because things could get much worse. What if, instead of a one year jump, this chronoscopic portal delivered up your future self from only a week or two away? This new colleague is not even more experienced than you in any meaningful sense, yet somehow has all of the answers. That bizarre compiler error you have been fighting with all day that seems to be independent of the actual code being compiled? It was caused by an invisible Unicode character. Right there.22 It was a long time ago and I am over it now. Thank you. Your neighbour’’s insufferability peaks whenever they have just found the solution to your current problem.

      We can dispense with the thought experiment now, because in reality you probably already work with engineers from the future: the more-senior members of your team.33 Unless you are already on the top rung of the career ladder, this is broadly true at all levels of seniority. It should be obvious that it is a mistake to compare your own present accomplishments unfavourably with those of more experienced engineers. Your future accomplishments may, in time, match or even exceed theirs. At times we all commit this error nonetheless. What is less obvious are the smaller-scale effects of seniority on time travel.

    • Education

    • Hardware

      • Hackaday2022 Cyberdeck Contest: The Galdeano Is More Than A Graphing Calculator

        Graphing calculators have evolved from expensive playthings for rich nerds to everyday tools for high schoolers worldwide. Even though teenagers nowadays carry powerful internet-connected computers in their pockets, math teachers often prefer them to use a clunky Z80-powered calculator in class, if only because their limited performance reduces the potential for distraction. The worst thing a lazy student can do is play a simple game like Snake or Tetris.

      • HackadayA 2D Image Makes A 3D Print

        When you imagine 3D printed art, it’s easy to envision the different kinds of sculptures and figurines posted online. While these projects take plenty of time and creativity on their own, [César Galera] shows us a different way to make 3D printed art by turning 2D images into fully textured 3D prints.

      • HackadayMaking Variable Capacitors By Stretching Aluminium Cans

        Sometimes when you need a component, the best way to get it is by building it yourself. [North Carolina Prepper] did just that, creating his own trombone-style variable capacitor by stretching some aluminium beverage cans. 

    • Health/Nutrition/Agriculture

      • Counter PunchClose the Medicaid Coverage Gap

        I’ve worked hard for decades and saved for my retirement, but I currently don’t have enough income to get covered through an Affordable Care Act marketplace plan. I also don’t qualify for the Medicaid program in my state of Texas, since it doesn’t offer any health insurance options to adults like me who aren’t yet 65 years old, aren’t pregnant or caretakers of young children, and don’t meet the state’s very narrow definition of disability.

      • Counter PunchMaskless Dystopia

        I’m referring to COVID, of course, an infectious disease known to be airborne since January 7, 2020, and to the low number of people who wear masks in public although COVID’s spread can be greatly curtailed by doing so.

      • Counter PunchThe Last Mile Vaccination

        It may be noted that Kalahandi district is among the most backward districts of the country with a huge population from the indigenous communities having low awareness levels. The district is also covered by hills which are not well connected with the plane areas. Such areas are likely to be left behind in the process of vaccination.

      • Counter PunchOn the Shambles of the American Health Care System and the Need for Medicare-for-All

        But the American people remain deeply concerned about an issue that by definition touches every single one of us – and that is our collapsing and dysfunctional healthcare system.

      • Counter PunchCovid Vaccines: Viral Evolution, Political Revolution

        Unfortunately, the legitimate distrust of Big Pharma has become no more than a reactive habit among some people who have indeed been treated poorly by the medical establishment. (Note that Pfizer and Moderna are engaged in legal disputes which concern charges of plagiarism and medical patents. The problems in the manufacture and distribution of vaccines is an ongoing story which is, in some respects, all too familiar from earlier chapters in pandemics and medical marketing.)

    • Linux Foundation

      • The Register UKOpen standards body for digital wallets announced [Ed: Linux Foundation continues to 'legitimise' unethical things like surveillance and even outright frauds by lending the Linux Mark to them; it harms Linux]

        The Linux Foundation is backing a new trade body, the OpenWallet Foundation, to create an open standard for digital wallets.

        No, really, hang on… this announcement genuinely is good news for once. We’re not talking about digital payments or anything like that – although it can help with those, if you choose to trust them. And we’re definitely not talking about storing your imaginary internet play money.

      • The Register UKFood security group, Linux Foundation to work on crop data • The Register

        Food security group CGIAR is working with the Linux Foundation to standardize data sharing about agricultural fields on a global scale.

        The partnership aims to unify data standards and operating procedures to support the sharing and use of field boundary data, which they suggest could deliver benefits for the 500 million smallholder farmers that produce about a third of the world’s food.

        Sumer Johal, exec director of The AgStack Project at the Linux Foundation, said: “CGIAR and the Linux Foundation are natural partners. Both are trusted intermediaries with global partner networks, facilitating pre-competitive collaboration and products for the public good. Together we can help remove the blockages around working with field data in a community-driven way.”

    • Security

      • LWNSecurity updates for Friday [LWN.net]

        Security updates have been issued by Debian (bzip2, chromium, glib2.0, libraw, mariadb-10.3, and mod-wsgi), Fedora (kdiskmark, wordpress, and zlib), Oracle (.NET 6.0, .NET Core 3.1, mariadb:10.3, nodejs:14, nodejs:16, ruby:2.7, and ruby:3.0), Red Hat (.NET 6.0, php:7.4, and webkit2gtk3), SUSE (389-ds, flatpak, kernel, libgit2, and thunderbird), and Ubuntu (sqlite3, vim, and wayland).

      • Bruce SchneierMassive Data Breach at Uber

        It looks like a pretty basic phishing attack; someone gave the hacker their login credentials. And because Uber has lousy internal security, lots of people have access to everything. So once a hacker gains a foothold, they have access to everything.

      • Bleeping ComputerUber hacked, internal systems breached and vulnerability reports stolen

        Uber suffered a cyberattack Thursday afternoon with an allegedly 18-year-old hacker downloading HackerOne vulnerability reports and sharing screenshots of the company’s internal systems, email dashboard, and Slack server.

        The screenshots shared by the hacker and seen by BleepingComputer show what appears to be full access to many critical Uber IT systems, including the company’s security software and Windows domain.

        Other systems accessed by the hacker include the company’s Amazon Web Services console, VMware vSphere/ESXi virtual machines, and the Google Workspace admin dashboard for managing the Uber email accounts.

        The threat actor also breached the Uber Slack server, which he used to post messages to employees stating that the company was hacked. However, screenshots from Uber’s slack indicate that these announcements were first met with memes and jokes as employees had not realized an actual cyberattack was taking place.

      • Bleeping ComputerMicrosoft 365 now auto-updates apps on locked or idle devices [Ed: What next? Microsoft mining "cryptocurrencies" off your power bills? Microsoft does not even care about security, it actively undermines it for the NSA.]

        Microsoft says customers will see fewer Microsoft 365 update notifications because Office apps will update automatically while their computers are locked or idle.

      • IT World CACyber Security Today, Sept. 16, 2022 – Queen’s death exploited by phishing scam, new Linux backdoor found, and more [Ed: No, it's not "Linux backdoor", it's malware that targets systems and, if it gets past defences through weak passwords or dumb administrators, then it allows remote control by malicious entities. Backdoors is what Microsoft does.]
      • Dark ReadingSparklingGoblin Updates Linux Version of SideWalk Backdoor in Ongoing Cyber Campaign [Ed: Same as above]
    • Defence/Aggression

      • Common DreamsOpinion | Veteran’s Letter to Biden—Negotiate Don’t Escalate in Ukraine

        Dear President Biden,

      • Common DreamsUS Announces Fund to Benefit Afghan Economy—Using Stolen Afghan Bank Reserves

        “We urge the U.S. government, the Afghan Fund, and DAB to work closely together to ensure that the money from the Afghan Fund is channeled to the Afghan Central Bank as soon as possible.”

      • Common DreamsAnti-War Voices Warn US Bill on Taiwan ‘Will Make War Much More Likely’

        “The U.S. should not go to war for Taiwan independence.”

      • Common DreamsReport Warns US Militarized Response to Russia Could Provoke Nuclear War

        “If the U.S. and NATO increase their military spending and conventional forces in Europe, the weakness of Russian conventional military forces could prompt Moscow to rely more heavily on its nuclear forces.”

      • Common DreamsOpinion | The United States of America as a Sacrifice Zone

        In the American ethos, sacrifice is often hailed as the chief ingredient for overcoming hardship and seizing opportunity. To be successful, we’re assured, college students must make personal sacrifices by going deep into debt for a future degree and the earnings that may come with it. Small business owners must sacrifice their paychecks so that their companies will continue to grow, while politicians must similarly sacrifice key policy promises to get something (almost anything!) done.

      • MeduzaMass grave containing approximately 440 bodies found in Izyum — Meduza

        The news network Current Time has published photos of a mass grave in Izyum, a city in Ukraine’s Kharkiv region that was recently liberated by the Ukrainian army.

      • Meduza‘They’ve taken to the bottle’: The war in Ukraine has caused Russian officials to start drinking more than ever — and Putin’s not pleased — Meduza
      • Meduza‘You are weaklings waging a war against civilians,’ says Zelensky in response to Russian missile strikes in Kryvyi Rih — Meduza

        On September 14, the Russian military launched a missile attack on Kryvyi Rih, the head of the city’s military administration, Oleksandr Vilkul wrote. As a result, the water level in the Inhulets river rose by two or three meters. In a video address, Vilkul said that 112 private houses and summer cottages had been flooded. Controlled blasting of the dam took place overnight to increase the flow capacity of the river. By the morning of September 15, the flow of water in the river had decreased and its level began to decline.

      • MeduzaZelensky’s motorcade involved in accident in Kyiv — Meduza

        The Ukrainian president’s motorcade was involved in an accident in Kyiv on the night of September 15, 2022.

      • The Gray ZoneZelensky quietly deletes photo of his bodyguard’s pro-Hitler patch
      • Meduza‘The special military operation turned into warfare long ago’ Chechen leader Ramzan Kadyrov calls for Russia’s regions to declare mobilization individually — Meduza

        Chechen leader Ramzan Kadyrov said in a video posted Wednesday that Russia’s regional governments should announce mobilizations to help the Russian army with its “special [military] operation” in Ukraine. On his Telegram channel, he told his subscribers the following:

      • Counter PunchNo, MAGA Republicans Are Not Anti-War Allies


      • Counter PunchYou Can’t Fight MAGA Fascism Without Smashing Biden’s Republic

        It’s at this moment when you catch your breath and realize that you’ve been terrorized into another pledge drive for America’s other imperialist party. “With just three easy payments of 99.99 you too can save American democracy and advertise that fact to all the other bougie Karens in line at Starbucks with this stylish “I Fought the MAGA Republicans!” tote bag.” Goddamnit! You fuckers got me again. I’ll take two. But just because Biden’s midterm saber rattling is just a rather obvious if garish act of partisan theater doesn’t mean that the threat isn’t real. Donald Trump is a nefarious gangster with a devoted posse willing to get themselves shot in the face at the Capitol just to do his bidding. Hell, some of them may very well be deserving of that other F-word. But that poses a question that probably doesn’t get asked enough in hatchet country. What the fuck is fascism anyway?

      • Counter PunchNationalism: A Satanic Religion

        This presented a problem for me when I began siding with the national liberation forces in Vietnam, Angola and elsewhere around the world. After all, a fair amount of the propaganda in support of these struggles spoke about a national struggle—a struggle for a nation. While I never flew or carried a flag for any nation since I was a Boy Scout and once was enlisted to carry the US flag on the Fourth of July, I wasn’t offended when I marched alongside the flag of the Vietnamese NLF or other popular struggles. Yet, I couldn’t get a hundred percent behind these flags. Conversations and reading helped me realize that revolutionary struggles for national liberation were not the same as independence struggles that were not revolutionary. Still, to borrow a phrase from anarcho-communists Stuart Christie and Albert Meltzer: “If national liberation is said to be a good breakfast but a poor supper”, this meant that there must be a greater goal than the replacement of a colonial or occupation government with a government by the popular forces. In Christie and Meltzer’s understanding, that goal would be a genuine social revolution. Implicit in their statement regarding breakfast and supper is that such a revolution begins with a revolutionary struggle for national liberation. Yet, that beginning does not guarantee the social revolution. In fact, given the essential role economics plays in how society is structured, it becomes obvious that this social revolution requires the end of the existing economic system—precisely because it created and enforced that system.

      • Counter PunchOn War and Walking Away

        Which sounds remarkably like something straight out of A.M. Homes’ latest novel.

      • Counter PunchWhen Killers Become Choosers: Resurrecting the Thylacine and Other Species

        In the 1970s, San Diego’s Frozen Zoo gave us the God appraised concept that came to be known as de-extinction. The website notes the project as “the largest and most diverse collection of its kind in the world”, containing “over 10,000 living cell cultures, oocytes, sperm, and embryos representing nearly 1,000 taxa, including one extinct species, the po’ouli.”

      • Counter PunchLetter From Crimea: Averell Harriman and Alger Hiss at Yalta

        The 1945 Yalta conference still matters, as disputes over its legacy explain much of the current war between Russia and Ukraine.

    • Environment

      • Common DreamsExpert Groups Resign in Protest Over ‘Crass Greenwashing’ of EU Climate Panel

        The group of environmental and consumer NGOs—including the European Consumer Organisation (BEUC), Birdlife Europe and Central Asia, Environmental Coalition on Standards (ECOS), Transport & Environment, and the WWF’s European Policy Office—were part of the Platform on Sustainable Finance, a group established to help the European bloc set rules and financial guidelines to govern its transition to a renewable energy system.

      • Common Dreams‘That’s Fraud’: Explosive Docs Reveal Depth of Climate Lies by Big Oil Ahead of House Hearing

        “The committee’s investigation has shown that, rather than outright deny global warming, the fossil fuel industry has ‘greenwashed’ its record through deceptive advertising and climate pledges—without meaningfully reducing emissions,” Reps. Carolyn Maloney (D-N.Y.) and Ro Khanna (D-Calif.) wrote in a memo released hours before Thursday’s hearing, which major Big Oil PR firms have refused to attend.

      • Counter PunchHuman-Carbon Nature

        But changing the trajectory of the human relationship to the larger living world—that is, imagining new living arrangements consistent with the necessary worldwide down-powering—requires going beyond the obvious targets. We have to acknowledge that the dense energy of fossil fuels makes our lives easier in many ways that most people enjoy and will not want to give up, and that no combination of renewable energy sources can replace the work that coal, oil, and gas do for us.

    • Finance

    • AstroTurf/Lobbying/Politics

      • The NationLindsey Graham’s Abortion Ban Is a Joke—and We Should Be Terrified

        It is impossible to listen to Lindsey Graham’s new abortion ban proposal without being overcome by the hypocrisy of it all. On Tuesday, the senator proposed a nationwide ban on abortions after 15 weeks of gestation, with only a handful of exceptions. Graham has spent his entire political career saying abortion should be left up to the states. Now, at the very first opportunity to do so after the Supreme Court’s revocation of abortion rights, he’s proposing a bill that will override state laws and impose abortion restrictions at a national level.

      • TruthOutTrump Admits to Taking Government Docs, But Claims He Declassified Them
      • The NationLiar, Liar, Constitution on Fire
      • Common DreamsSenate Democrats Delay Same-Sex Marriage Vote Until After Midterms

        Sen. Tammy Baldwin (D-Wis.), the first openly gay person to be elected to the U.S. Senate and the lead Democratic negotiator for the Respect for Marriage Act, told reporters she remains “very confident” that the bill will ultimately pass after the high-stakes midterm contests.

      • Common DreamsOpinion | Can US Democracy Survive This Fall?

        The traditional horse race politics of Democrat versus Republican are being supplanted by a more fundamental confrontation between defenders of our democracy, flawed as it is, and those who call themselves patriots while pursuing authoritarianism. The Republican Party, in thrall to the cult of Donald Trump, is openly professing subversion of elections. Allied with armed militias, the GOP and its backers are working to bend or break the institutions of government.

      • TruthOutHow Can We Build Democracy in the South — in Electoral Politics and Beyond?
      • TruthOutDeSantis Sent Planes of Migrants to Martha’s Vineyard. Residents Welcomed Them.
      • Common DreamsMartha’s Vineyard Responds With Compassion After DeSantis Dumps Migrants in ‘Cruel Stunt’

        About 50 migrants, reportedly from Venezuela and Colombia, boarded a plane in San Antonio Wednesday and were told they would “receive housing and jobs immediately upon arrival” at their destination, Massachusetts state Rep. Dylan Fernandes told The Vineyard Gazette, but the community was not informed of the plan.

      • MeduzaSt. Petersburg court fines municipal deputies who called for Putin’s removal — Meduza

        A St. Petersburg court has fined five of the municipal deputies who called for Russian President Vladimir Putin to be charged with treason and removed from office. According to the legal aid organization Net Freedoms Project, the deputies were charged with “discrediting” the Russian army.

      • Telex (Hungary)Bills aiming to establish trust between Hungary and the EU to be submitted next week – Navracsics
      • TechdirtGavin Newsom Fucks Over The Open Internet, Signs Disastrously Stupid Age Appropriate Design Code

        This isn’t a surprise, but it’s still frustrating. Gavin Newsom, who wants to be President some day, and thus couldn’t risk misleading headlines that he didn’t “protect the children,” has now signed AB 2273 into law (this follows on yesterday’s decision to sign the bad, but slightly less destructive, AB 587 into law). At this point there’s not much more I can say about why AB 2273 is so bad. I’ve explained why it’s literally impossible to comply with (and why many sites will just ignore it). I’ve explained how it’s pretty clearly unconstitutional. I’ve explained how the whole idea was pushed for and literally sponsored by a Hollywood director / British baroness who wants to destroy the internet. I’ve explained how it won’t do much, if anything, to protect children, but will likely put them at much greater risk. I’ve explained how the company it will likely benefit most is the world’s largest porn company — not to mention COVID disinfo peddlers and privacy lawyers. I’ve explained how the companies supporting the law insist that we shouldn’t worry because websites will just start scanning your face when you visit.

      • Robert ReichSick of Manchin and Sinema’s Power Trip?

        Joe Manchin and Kyrsten Sinema are on a power trip, but we can make them irrelevant after this year’s election.

      • Robert ReichThe Republican War On Teachers

        There’s a war being waged on America’s teachers,  and we must stand up for them before it’s too late.

      • TruthOutMeadows Complies With DOJ, Hands Over Evidence Relating to Jan. 6 Inquiry
      • Common Dreams‘Never Seen Anything Like That’: AOC Blasts Male GOP Colleague for Treatment of Female Hearing Witness

        “Frankly, men who treat women like that in public,” said the New York Democrat, “I fear how they treat them in private.”

      • Common DreamsHouse Passes Bill That Would Thwart Trump Plot to Purge Federal Workers

        “The civil servants who make up our federal workforce are the engine that keeps our federal government running,” said Rep. Gerry Connolly (D-Va.), the bill’s sponsor. “We rely on their experience and expertise to provide every basic government service—from delivering the mail to helping families in the wake of natural disasters.”

      • Telex (Hungary)Fidesz reactions to the EP ruling: a disregard for the free will of the Hungarian people
      • Counter PunchWhy It’s Time to Declassify the Documents From Trump’s Basement

        I never revealed any classified information. I got into trouble after writing an article criticizing the government’s practice of classifying certain evidence above the security clearance level of the detainee’s lawyer, making it impossible to challenge. Following a hearing at the Department of Justice, I was allowed to keep my security clearance long enough to see my client released back to his home and his family after 12 years of unjust imprisonment.

      • The NationElection Deniers Are Gearing Up to Take Office

        Less than two months out from the 2022 midterm balloting, the national commentariat remains fixated on how the balance of power between the two major parties will shift, and how the ensuing convulsions will play out over the balance of Joe Biden’s term in office. But a far more ominous power shift has already taken place at the outset of this year’s election cycle. As FiveThirtyEight reports, election-denying candidates—i.e., Republican officials who claim without any evidence that the 2020 presidential election was rigged—are on the ballot for 60 percent of the American electorate. The site forecasts that in the House alone, 118 full-on election deniers, together with eight more equivocal “election doubters” are on track to take office next year.

      • Counter PunchQueen Elizabeth’s Boycott of Israel

        Sometime in early 1954 (I was 9 years old at the time) the entire Halaby family attended a special viewing of a black and white documentary film about Queen Elizabeth’s coronation. The setting was the famous Jerusalem, Palestine, YMCA structure, a landmark Jerusalem edifice whose suggestive phallic architectural design is a metaphor for the British Empire’s once-upon-a-time dominion over all the seas and over 65 per cent of the world’s land mass.

      • Counter PunchBiden’s Battle for the Soul of the Nation

        Campaign rally from the gates of hell

      • Counter PunchNo More Sacrifices

        In that context, consider recent policy debates on Capitol Hill as the crucial midterm elections approach. To start with, the passage of the Biden administration’s Inflation Reduction Act (IRA) promises real, historic advances when it comes to climate change, health care, and fair tax policy. It’s comprehensive in nature and far-reaching not just for climate resilience but for environmental justice, too. Still, the legislation is distinctly less than what climate experts tell us we need to keep this planet truly livable.

      • AccessNowTurn TikTok on: authorities in Azerbaijan and Armenia must not restrict access – Access Now

        Authorities in Azerbaijan and Armenia must ensure full access to the internet — including social media platform, TikTok — for all, particularly in times of crises.

        “Social media platforms like TikTok are legitimate channels for freedom of opinion and expression,” said Felicia Anthonio, #KeepItOn Campaign Manager at Access Now. “The governments of Azerbaijan and Armenia cannot shut down the platform and honestly think the world wouldn’t notice. Turn TikTok on.”

        TikTok became inaccessible in Azerbaijan around the time of a military offensive at the Azerbaijan-Armenia border on September 14. A message from the State Security Service of Azerbaijan stated that it filed a petition with the relevant authorities to restrict TikTok within the country due to it hosting information regarding Azerbaijan’s offensive “that casts a shadow on the successes of our army, contains military secrets, and aims to create a wrong opinion in the society.”

    • Censorship/Free Speech

      • TechdirtCourt To Public University: Yeah, It’s A 1st Amendment Problem When You Delete Comments You Don’t Like

        Just a somewhat periodic reminder: publicly-funded colleges are government entities. Almost every public university is. Sometimes, they seem to forget what they are and act in ways governments can’t — not without violating rights.

      • Public KnowledgeFifth U.S. Circuit Court of Appeals Decision Upholding Texas Social Media Law Jeopardizes Free Expression – Public Knowledge

        Today, in NetChoice v. Paxton, the Fifth U.S. Circuit Court of Appeals upheld a Texas law that would bar social media companies from engaging in many forms of content moderation. Public Knowledge condemns this panel’s ruling. The decision follows the Supreme Court’s May ruling ordering the Fifth Circuit to prevent the law from going into effect, and an Eleventh U.S. Circuit Court of Appeals finding that a similar social media law in Florida violates the First Amendment.

        Public Knowledge has argued that ordering platforms, as opposed to telecommunications companies, to be common carriers would be bad public policy as well as unconstitutional.

        The following can be attributed to John Bergmayer, Legal Director at Public Knowledge:

        “The Fifth Circuit has ignored decades of First Amendment and Supreme Court precedent – and contrary to recent Supreme Court orders – to reach a seemingly politically motivated decision that will have disastrous effects if it is not immediately reversed.

    • Freedom of Information / Freedom of the Press

      • Don’t Extradite AssangeJulian Assange receives Keys to Mexico City

        The Head of Government of Mexico City, Claudia Sheinbaum, named Julian Assange a Distinguished Guest and delivered the Keys to the City to the family of the founder of WikiLeaks, who is in Mexico at the invitation of the Presidency to the celebrations for the anniversary of the independence.

    • Civil Rights/Policing

      • TruthOutMinor League Baseball Players are Unionized for the First Time in History
      • Common DreamsRailway Workers Fight Shows Need for Paid Sick and Family Leave, Says Economist

        “Top brass at the railroads were willing to have a strike and plunge the nation back into supply chain hell.”

      • Common DreamsRail Unions Stress Tentative Deal Must Still Win Approval From Rank-and-File

        “This contract will not become final until our members have an opportunity to review its terms and approve it through a ratification vote,” said Jeremy Ferguson, president of SMART Transportation Division, and Dennis Pierce, head of the Brotherhood of Locomotive Engineers and Trainmen (BLET).

      • The NationAre Rail Workers on Track to Win Better Working Conditions?

        Early in the morning on September 15, negotiators from unions representing nearly 60,000 rail workers reached a tentative agreement with the nation’s rail carriers. The provisional accord avoided what would have been the first national rail shutdown since the early 1990s. The Biden administration released a statement hailing the agreement as an “important win for our economy and the American people” and a “victory for railway companies who will be able to retain and recruit more workers” with better wage-and-hour terms and improved conditions for sick days.

      • Counter PunchViolence Against Indigenous Women Grows in Vancouver Amid ‘Apathy and Injustice’

        Noelle O’Soup was found in an apartment approximately a year after she went missing from a group home in Port Coquitlam, while under the care of the Ministry of Children and Family Development (MCFD), British Columbia. Reports on the circumstances of her disappearance and the investigation into her death have revealed negligence by both the police and the government. “The major investigative oversight occurred despite multiple visits to, and apparent inspections of, the single room occupancy unit where Noelle O’Soup’s remains would finally be discovered,” statedGlobal News. Her case, unfortunately, is more the rule rather than the exception in Canada.

      • TruthOutAcross the Midwest, Counties Are Building New Jails on Toxic Land
      • TruthOutHuman Rights Groups Urge UN to Call for Abolition of “Death by Incarceration”
      • TruthOutNearly 6 in 10 Americans Back Legislation to Protect Marriage Equality
      • Telex (Hungary)The Invisible Migration
      • Counter PunchAttack on Religious Liberty?

        Were this claim valid, one would see moral decay paired with increased crime rates. But the data shows something very different. As religious belief has declined so too have crime rates. And Denmark, Sweden and other western democracies that are far more secular than the US, have much lower crime rates. The correlation may be coincidental, but the statistics imply that crime and religious belief go hand in hand.

      • Counter PunchWe Have a Violence Problem – Campaign Nonviolence Strives to Solve It

        In 2014, an effort named Campaign Nonviolence launched to ‘build a culture of peace and active nonviolence, free from war, poverty, racism, and environmental destruction’. Each year, they hold an annual week of actions, bringing together the many efforts to address violence. In all 50 states and dozens of countries, more than 4,000 actions and events will take place between September 21st, the International Day of Peace, and Oct 2nd, the International Day of Nonviolence.

      • Counter PunchRemember the Victims of Britain’s Monarchy and Empire

        Unquestioned reverence for the British monarchy is a slap in the face to indigenous peoples and denial of Canada’s role in crimes against humanity committed by the British Empire.

      • The NationHindu Nationalism’s Alarming Rise in the US Goes Beyond Texas

        On the morning of December 6, 1992, a crowd of 150,000 Hindus assembled outside the Babri Masjid, a 16th-century mosque in the North Indian city of Ayodhya. One by one, representatives of the country’s most prominent Hindu nationalist organizations took the stage to call for the construction of a Hindu temple on the site of the mosque, which they alleged had been built over the birthplace of the Hindu deity Ram.

      • Counter PunchWhere Sports and Deportation Meet: ICE Is Removing People on the Same Planes Used to Transport Teams

        The plane, as described in this video, is the team’s backup (they have two planes). But even though the Patriots seem to own the plane, they do not run it. It is run by a charter company called Eastern. And Eastern does business with Immigration and Customs Enforcement. The University of Washington Center for Human Rights, an organization that has been keeping a close eye on deportation flights for a few years, wrote about it in a Twitter thread in June.

      • Counter PunchMaking Your Hippie Life Matter

        In fact, at the level of our everyday social lives, morality has no authority. I imagine most preachers at the liberal end of the spectrum are sticking to the tried and true gospel themes, and to identity and minority causes, staying away from biblical fundamentalism but also from addressing the big Evil of the capitalist/neoliberal system that sacrifices people and ecologies to profits for “the good of the economy.” Just looking at all the high-level profiteering rascals with Yale degrees (Ron DeSantis, etc.) confirms that good education has nothing to do with noble behavior! So where can people on the left go – if not to church or to college – to find morally uncompromising ground?

      • The NationPrisoner Advocates Turn to the UN to End Extreme Prison Sentences

        “When I came to prison [in 1993], an officer told me the only way I would leave is in a pine box,” said 51-year-old Eileen Huber. “At the time, I believed him. I don’t believe that anymore.”

      • The NationVictory! Minor League Baseball Players Are Finally Unionized.

        It is a historic day in the annals of both sports and labor history. Minor League Baseball players, some of the most precariously positioned workers in this country, have voted to join the Major League Baseball Players Association. For the first time in the 120-year history of Minor League Baseball, the players are part of a union. This election is seismic for the lives of the players. Unions make working-class jobs better, and Minor League Baseball players could certainly use a dose of “better.” Their average salaries can run as low as $10,000 per year for the full season, and they are left with nothing if they are thrown on the scrap heap for a teenage prospect. These conditions in the minor leagues worsened as Major League Baseball secured record-breaking television contracts and profits galore.

    • Internet Policy/Net Neutrality

      • TechdirtUK Pressing Forward With Online Safety Bill

        Well, this is unfortunate.

      • TechdirtSurprise: Telecom Giants Are Exploiting State Corruption To Undeservingly Funnel A Disproportionate Chunk Of The Massive Broadband Infrastructure Stimulus To Themselves

        Between COVID relief and the new infrastructure bill there’s a massive, historic, $50+ billion taxpayer subsidy headed for the broadband industry that should do a lot of good in shoring up access in underserved locations. But we’ve also noted how the government still doesn’t have a great idea of where that money should be spent, because our broadband maps (while improving) are generally terrible.

      • Internet Freedom FoundationFor the public, by the public

        The Internet Freedom Foundation is a small, young, advocacy organization in India that works on digital rights. Due to its outsized impact, there are high expectations for IFF to deliver on its mission of being a public-centred organization. Since the start of 2022, we have been working to formulate consistent practices that bring high levels of governance, transparency and accountability while retaining our efficiency and ability for rapid response. There is a balance we have sought to achieve in which IFF remains nimble with the formulation of by-laws that have been adopted on 17 August 2022. We intend to improve them based on operational experience, feedback and yearly reviews.

    • Monopolies

      • Trademarks

        • TechdirtUK Restaurant Threatens Other UK Restaurant Over Trademark On ‘Taqueria’

          One of the cornerstones of trademark law in most countries is that you cannot trademark descriptive terms or words. The reason for this should be obvious. If I start a search engine and want to trademark my company name, calling it “Google” differentiates me from the rest of the market. But if I named my search engine “Search Engine” and then tried to trademark that, it would be rejected because trademark law isn’t meant to preclude competitors from identifying what their products are.

      • Copyrights

        • Torrent FreakU.S. Pressured Taiwan to Ban Pirate TV Boxes But China’s Not Too Interested

          When public figures in Taiwan were called out for watching the Olympics on pirate set-top boxes last year, it would’ve been no surprise to the U.S. that China was the supplier. But while Taiwan attempts to outlaw highly capable ‘Ubox’ devices, the source of the problem remains. In simple terms, Chinese authorities are only concerned when a crime occurs inside China.

        • TechdirtEven The Copyright Office Doesn’t Want What The JCPA Is Selling

          It should not be this hard to stamp out a bad idea, but here we are, with the JCPA continuing to haunt the country like a zombie that simply refuses to die. The JCPA, for those just tuning in, is a bill designed to create a link tax. Its supporters sometimes blanch at that description, but it is an apt one, rooted in the perversely censorial notion that no one should be able to link to material available on the Internet (or facilitate others linking to material available on the Internet) without paying for the privilege.

  • Gemini* and Gopher

    • Personal

      • TCJKOPA Wordo: CIVIL
      • The Toothpaste Argument

        The author seems to be too much into it to be thinking/expressing ideas clearly. There’s too much fluff and rainbows and “if only UBI was here”. I’m not into the subject and I barely know left from right, so ignore the sarcasm and bits of pedantry if you will, and enlighten me if you’ll please!

      • Star Log 2022-09-16 04:30 AKDT (Fairbanks, AK, US)

        ChillyWeather (OpenWeather) had forecast overcast skies until pretty much the end of time, so I went to bed last night without any plans to do star gazing. When I got up at 3:30am, as I usually do, I took a quick glance at ChillyWeather and was shocked to discover that current conditions were reported as “few clouds” i.e., pretty much clear skies. I scrambled to get dressed, gather my star gazing tools, and get outside, as I only had a little over an hour before I needed to get ready for work. Our weather conditions have been so bad, so much, for so long, I felt like a hunter who had been hunting for a week and sees nothing, only to have a bull moose walk into camp.

      • Entering The Nocturnal Aftermath

        Colfax is the kind of street that gets you.

        Last night, armed with nothing save my cheap plastic folding table and my keyboard wrapped up in a cheap plastic bag (it had rained earlier that day, pretty heavily, too) I made my way down to Lions’ Lair, which is the sort of establishment which has always for whatever reason eluded my eye and defied description. Maybe because of its ancient potential. It’s an anachronism, caught between a liquor store and a convenience store, a relic which persists despite all logic to the contrary.

    • Technical

      • Limiting distraction on my phone

        For the past year, I’ve been slowly but surely “decluttering” my phone by removing many applications as well as changing the way I’m using it/them. I consider myself lucky not to have fallen into the social media trap too much, as I’m limiting social media to only the fediverse[1], where I barely post and interact sporadically. The other social media I’m on are services that includes social media capabilities that I don’t use, mainly Github and Youtube (yes, they are partly social media) and linkedin that I don’t really use… but I do receive interesting offer from time to time, so I’m keeping it open.

      • Using Netdata on NixOS and connecting to Netdata cloud

        I’m still playing with monitoring programs, and I’ve been remembered about Netdata. What an improvement over the last 8 years!

        This tutorial explains how to get Netdata installed on NixOS, and how to register your node in Netdata cloud.

      • Not a good fit

        /u/Awadara89 asked on /r/AskGameMasters about dealing with a player that keeps arguing about things that work differently in the real world. I’ve had players with endless discussions about character build options and optional rules to add to the game, and recently I’ve had a player relentlessly lobbying for a particular kind of familiar that I didn’t fancy. My approach is to be blunt and cut down on the discussion since that’s the part I enjoy the least, but also add a message about your own feelings to let them know that they are overstepping if they pursue the issue. And finally, be prepared to go separate ways.

      • Campaign preparations

        The map has locations. The locations have monster lairs or settlements. The settlements have two or three named NPCs with levels that could be important. This is the second layer.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 16/09/2022: Peropesis 1.7 and IPFire 2.27 – Core Update 170

Posted in News Roundup at 6:12 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Chrome UboxedCamera access for Linux on ChromeOS may be very close [Ed: Just delete ChromeOS, install a 'proper' GNU/Linux on that]

        Four long years. That’s how long I have been tracking this bug report. With every Canary update, the first thing I check is whether or not I can access a camera via the Linux container on my Chromebook. Sadly, I still can’t access a webcam via Crostini but I have every reason to believe that this could soon change. For starters, the original bug report/feature request is still open. If Google had no intention of bringing camera access to Linux, developers would have marked this “wontfix” and moved on. Four years later and this bug has been starred by 230 users. It seems clear to me that Google understands that this is a feature that is needed.

      • Its FOSSFOSS Weekly #22.34: Books to Master Linux, Dangerous Commands, Torvalds on Apple M2 and More

        By the way, would you like some crosswords and word puzzles about Linux?

        Just reply to this email and let me know. We can work on some if we get positive interest from enough people ;)

    • Server

      • Kubernetes BlogKubernetes 1.25: Two Features for Apps Rollouts Graduate to Stable

        This blog describes the two features namely minReadySeconds for StatefulSets and maxSurge for DaemonSets that SIG Apps is happy to graduate to stable in Kubernetes 1.25.

        Specifying minReadySeconds slows down a rollout of a StatefulSet, when using a RollingUpdate value in .spec.updateStrategy field, by waiting for each pod for a desired time. This time can be used for initializing the pod (e.g. warming up the cache) or as a delay before acknowledging the pod.

        maxSurge allows a DaemonSet workload to run multiple instances of the same pod on a node during a rollout when using a RollingUpdate value in .spec.updateStrategy field. This helps to minimize the downtime of the DaemonSet for consumers.

        These features were already available in a Deployment and other workloads. This graduation helps to align this functionality across the workloads.

    • Audiocasts/Shows

      • Tux DigitalUltra Lab Refresh – Sudo Show – TuxDigital

        The Sudo Show covers topics ranging from Enterprise Open Source to Cloud Management, but we don’t just talk about the technology. We discuss methodologies like DevOps and how to change your team and company cultures to build and grow your people! Need to get more done? Join us as we share our years of experience working from home including our tips and tricks for better productivity!

    • Applications

    • Instructionals/Technical

      • Linux HintInstall Get Started Nginx

        Nginx, read as “Engine-x”, is an open-source Linux software that serves as a web server for HTTP caching, reverses proxy, and balances the load. Nginx is designed mainly for maximum performance stability since it provides us with capabilities for the HTTP server. It also functions as a proxy server for email (IMAP, POP3, SMTP). In the most straightforward explanation, we can define Nginx as a web server that allows us to reduce the page load time to avoid long web page waits. The architecture of the Nginx is based on the master-slave approach for non-blocking, asynchronous and event-driven support.

      • FOSSLinuxHow to install Skype for Linux in elementary OS | FOSS Linux [Ed: It's Microsoft/NSA spyware; better avoided completely]

        Skype is a proprietary telecommunications app operated by Skype Technologies, a division of Microsoft, well-known for videoconferencing, videotelephony, and voice calls. The software supports file transfer, debt-based calls to landlines, instant messaging, and mobile telephones (traditional telephone networks). Skype is a cross-platform software available on various desktop video games console platforms, mobile, Linux, Windows, and macOS.

      • UNIX CopHow to Enable BBR on Debian 11 / Ubuntu 22.04

        In this post, you will learn how to enable BBR on Debian 11 / Ubuntu 22.04. The goal is to improve the web experience.

      • Make Use OfHow to Quickly Remove Metadata From Files on Linux

        All files contain some additional information about the data stored in them, also known as metadata. Here’s how to remove file metadata on Linux.

        When you create a file, all kinds of supplementary metadata get added to it. Anyone with access to the file can read this information, which may include details you may not want anyone else to know.

        Here’s how to clear metadata from files on Linux.

      • Setting up Uptime Kuma on the Raspberry Pi – Pi My Life Up

        Uptime Kuma is a free and open-source uptime monitor tool that you can easily install on a Raspberry Pi.

        Using this software, you can measure the uptime and response time of various services.

        Some of the services that Uptime Kuma can monitor are HTTP(s), TCP, PING, DNS Record, Steam Game Servers, docker containers, and more.

        If your Raspberry Pi detects an outage, Uptime Kuma can send a notification to various services. These services include Discord, Telegram, Slack, and Email.

      • Make Use OfHow to SSH Into a VirtualBox Ubuntu Server

        Setting up virtual machine servers is quick and easy. But is there a way to access your virtual machines remotely using SSH?

        Virtual machines provide engineers and admins with a good platform to test software, set up IT environments, and maximize the utilization of server hardware resources.

        VirtualBox is one of the most popular virtualization software on the market today. It’s open source and is packed with lots of nice features. Let’s take a look at how to SSH into an Ubuntu server or desktop running in VirtualBox.

      • Linux Made SimpleHow to install Dofus on a Chromebook in 2022

        Today we are looking at how to install Dofus on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux Host SupportHow to Install and Configure CSF on AlmaLinux | LinuxHostSupport

        In this tutorial we are going to install and explain in step-by-step detail how to configure CSF on AlmaLinux OS.

        Config Server Firewall or CSF is a free and advanced firewall for most Linux distributions. CSF can be easily installed on a server with control panels such as DirectAdmin, WHM/cPanel and etc. It includes security features such as login, intrusion, flood detections, and many more. With CSF we can easily block IP addresses, whitelist IP addresses, open and close ports and etc.

        Installing and configuring CSF on AlmaLinux is a straightforward process that may take up to 10 minutes. Let’s get started!

      • ID RootHow To Install HandBrake on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install HandBrake on Linux Mint 21. For those of you who didn’t know, HandBrake is a tool for converting video from nearly any format to a selection of modern, widely supported codecs. Just select the preset that matches your device and start encoding videos. It encodes and reduces the size of your movies up to five times (maybe more) smaller than your original movies. HandBrake is available for macOS, Linux, and Windows.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a HandBrake video transcoder on Linux Mint 21 (Vanessa).

      • Linux Cloud VPS10 Basic Find Commands in Linux With Examples | LinuxCloudVPS Blog

        In this tutorial, we are going to explain the most used 10 find Commands in Linux with real examples.

        Find command is one of the most used commands in Linux since with the find command we can easily locate files and folders on our server. The find command is executed with a couple of arguments and conditions that can easily locate files by users, groups, size, date and etc.

        In this tutorial, we are going to use the latest Ubuntu 22.04 as OS, but you can choose any Linux distro to practice these examples by the “find” command. Let’s get started!

      • Build and Install OpenLens on Linux

        We are migrating from Lens to OpenLens.

        OpenLens provides insight into everything that runs in Kubernetes. If you use Kubernetes on a day-to-day basis, OpenLens is for you.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • DebugPointKDE Announces “Plasma Bigscreen” for TV UI, Brings 5.26 Beta

          KDE Plasma 5.26 desktop BETA is now out for testing and the final release is due on Oct 6, 2022.

          Plasma 5.26 brings a huge set of new features across the Plasma shell, widgets, Kwin and other desktop components. In the announcement, the team also introduces a new Plasma user interface (UI) for large screen displays such as Smar TVs – called “Plasma Bigscreen”.

      • GNOME Desktop/GTK

        • LinuxiacGNOME’s Libadwaita 1.2 Released with Exciting Improvements

          Some of the new features of Libadwaita 1.2 include messages adaptive layout and a new type of boxed list rows containing an inline entry.

          Over the last year, Libadwaita has been exciting and contentious in the Linux community, particularly among GNOME Desktop devotees. And, of course, not without cause, as it is the new path that the GNOME Project has followed since its version 41.

          But first, for those not in the know, let me explain what exactly Libadwaita is. In short, Libadwaita is a GTK 4 library that complements GTK by implementing the GNOME Human Interface Guidelines (HIG). Or in other words, Libadwaita separates GNOME and GTK.

  • Distributions and Operating Systems

    • New Releases

      • Peropesis 1.7: odyssey continues

        The Peropesis Linux project is moving forward in small steps, new edition 1.7 released. In the new edition part of the existing software was updated and new software was added. Thanks to the newly added software, the Peropesis operating system now has the ability to download files from the Internet using the wget tool. It also became possible to store multiple files in archive, and extract archived and compressed files using tools such as tar, gzip, xz and bizp2.

      • IPFire Official BlogIPFire 2.27 – Core Update 170 released

        The next Core Update is released: IPFire 2.27 – Core Update 170. It features new IP blocklists for the firewall engine, significant improvements to Pakfire, modernizes the default cryptographic algorithm selection for IPsec connections, as well as a new kernel, and a plethora of bug fixes and security improvements under the hood.

        Based on prior development by Tim FitzGeorge, Stefan brought a new feature to the firewall engine, which allows the easy activation of various public IP-based blocklists, just by a single click.

    • BSD

      • Mailing list ARChivesOpenBGPD 7.6 released

        [...] * Speedup bgpctl show rib 10/8 or-longer and show rib 10/8 or-shorter [...]

    • Arch Family

      • TecMintGaruda Linux – A Rolling Release Distribution Based on Arch Linux

        Arch Linux has a reputation for being an intimidating operating system to use, especially for beginners. Unlike popular Linux distributions such as Ubuntu and Fedora which provide a graphical installer, installation of Arch Linux is a tedious and time-consuming process.

        You have to set up everything from the command line, which includes configuring the timezone and local settings, keyboard, and partitioning the disk partitions to mention a few. This can be daunting and time-consuming. Even after installation, you still have to go to great lengths to configure everything to your preference.

    • Red Hat / IBM

      • Red Hat OfficialStack/Unstuck: Frameworks And Fundamentals

        Frameworks exist to make building apps easier, and there are a lot to choose from. We hear from one long-time Java developer about his passion project, an app designed to remind users of important deadlines and appointments. We explore his app’s framework—How he chose it, and how things changed along the way.

        While they are there to help developers build applications very quickly, frameworks shouldn’t be seen as a salve or a substitute for basic knowledge. When things go awry, that’s where knowing the fundamentals can help, whether you are building applications on your own, or working on a larger team.

      • IT ProRed Hat adopts a remote-first policy, with offices turned into “neighbourhoods” | IT PRO

        If they choose to return to the office, however, employees will find a redesigned space and collaborative “neighbourhoods” awaiting them, according to chief people office Jennifer Dudeck.

        More than 30% of Red Hat staff worked remotely before the pandemic, Dudeck wrote in a blog post. However, the software provider is expanding that flexibility to offer its employees the freedom to be ‘office-flex’ and choose the amount of time they spend in the office. Senior leaders, though, are still encouraged to work from one of the company’s offices to “interact and learn more”, Dudeck said.

    • Canonical/Ubuntu Family

      • UbuntuWhy Enterprises Choose Canonical Ubuntu on AWS

        As the publisher of the Linux distribution Ubuntu, Canonical support, secure, and manage Ubuntu infrastructure and devices for thousands of businesses. Ubuntu runs from cloud to edge. It is the platform that everybody uses on the public cloud including AWS, and the preferred workstation experience for builders all over the world!

      • UbuntuASUS IoT and Canonical partner on Ubuntu Certification for IoT Applications

        TAIPEI, Taiwan, September 14, 2022 — ASUS IoT, a global AIoT solution provider, today announced a partnership agreement with Canonical to certify the device manufacturer’s boards and systems with Ubuntu 20.04 LTS. ASUS IoT devices are used in a wide range of edge computing applications. New devices like the PE100A will be certified for optimised performance with Ubuntu, ensuring faster development times and ease of configuration. 

        This collaboration between ASUS IoT and Canonical ensures that individual hardware I/O functions conform to industrial-grade standards and to the version of Ubuntu running on the device. Moreover, security updates for the Ubuntu base OS, critical software packages and infrastructure components are provided for up to 10 years with Canonical’s Extended Security Maintenance. The solution is ideal for companies in industrial manufacturing, smart retail, smart transportation and many other sectors.

      • Asus IoT, Canonical partner on Ubuntu Linux certification for IoT apps
    • Devices/Embedded

      • CNX SoftwareBeetle RP2040 is a tiny Raspberry Pi RP2040 board with easily solderable pads – CNX Software

        DFRobot Beetle RP2040 joins other miniature Raspberry Pi RP2040 developments boards such as Pimoroni Tiny 2040 & Adafruit QT Py RP2040, but with only eight GPIOs accessible through larger pads that are easier to solder.

        The tiny 27 x 20 mm board comes with a USB Type-C port, BOOT and reset buttons, and twelves pads with a through hole each comprised of eight GPIOs, plus VCC, 3.3V, and GNS pads. The Beetle RP2040 is designed to be embedded into small devices or projects, and the company selected I/Os that can be configured as I2C, UART, SPI, GPIOs, analog input, etc…

      • Raspberry PiThe Official Raspberry Pi Handbook 2023 – your definitive guide to everything Raspberry Pi

        What can you expect to find inside? Well, we’ve taken as many of the very best projects, guides, tutorials, and reviews as we could, and squeezed them into the book. We’ve included our definitive getting started guides and special features on Raspberry Pi Pico W, the wireless microcontroller built on Raspberry Pi silicon.

      • Using Vulkan SC for Safety-Critical Graphics and Real-time GPU Processing | NVIDIA Technical Blog

        NVIDIA helped lead the creation of the Vulkan SC 1.0 API and is now shipping production drivers on its NVIDIA DRIVE and NVIDIA Jetson platforms.

      • Linux GizmosRK3588 SoC based TV Box supports 8K@60fps resolution

        The H96 MAX V58 is a TV Box equipped with the octa-core Rockchip RK3588 System on Chip (SoC) which features up to 8GB of RAM and up to 64GB of eMMC storage. The device supports dual band Wi-Fi 6 and a single GbE LAN port for fast connectivity.

        The H96 MAX V58 base model comes with 4GB of RAM and 32GB of eMMC storage. The upgraded model ships with 8GB of RAM and 64GB of eMMC. The product page on AliExpress mentions an SD card slot, but the TV Box doesn’t seem to include one from the images featured.

    • Open Hardware/Modding

      • CNX SoftwareSiFive unveils Automotive E6-A, X280-A, and S7-A RISC-V processors – CNX Software

        RISC-V is coming to your car too, with the introduction of SiFive Automotive E6-A, X280-A, and S7-A RISC-V processors designed for automotive applications such as infotainment, cockpit, connectivity, ADAS, and electrification.

        Those are built on the existing SiFive Essential 6-series E6 32-bit real-time cores, SiFive Intelligence X280 64-bit RISC-V processor with AI extensions, and SiFive S7 64-bit real-time cores (equivalent to Cortex-R7/R8), but adds safety, security, and performance required by the automotive market such as ASIL compliance.

      • PurismAuto Contrast on Librem 5 smartphones – Purism

        Using Librem 5 outdoors is easier now! Because the Librem smart phones have more sensors than an ordinary computer, and we can use these extra sensors to improve ease of use and accessibility. The most recent release of Phosh (our user interface), has added a feature to automatically switch to a high contrast theme when in direct sunlight. It can really come in handy, especially on bright days.

      • HackadayThis Simple Light-Controlled Synth Has A Surprisingly Rich Sound

        Audio synthesizers can range from vast racks of equipment with modules stitched together by a web of patch cords to a couple of 555s wired together in an Atari punk arrangement. This light-controlled synth comes in closer to the lower extreme of that range, but packs a sonic punch that belies its simplicity.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • MozillaMozilla Performance Blog: A different perspective [Ed: Mozilla is heavy and bloated already, as the Web itself has come to require very heavy and bloated browsers that act more like VMs, not rendering engines; there's no way to "fix" the Web; it needs to be abandoned and we need to start over]

          Usually, in our articles, we talk about performance from the performance engineer’s perspective, but in this one, I want to take a step back and look at it from another perspective. Earlier this year, I talked to an engineer about including more debugging information in the bugs we are filing for regressions. Trying to make a context out of the discussion, I realized the performance sheriffing process is complex and that many of our engineers have limited knowledge of how we detect regressions, how we identify the patch that introduced it, and how to respond to a notification of a regression.

        • MozillaMozilla Privacy Blog: Mozilla Responds to EU General Court’s Judgment on Google Android [Ed: Mozilla fails to note that it is taking a lot of money (surveillance money) from Google; Mozilla “valuing privacy” should actually be considered a joke]

          This week, the EU’s General Court largely upheld the decision sanctioning Google for restricting competition on the Android mobile operating system. But, on their own, the judgment and the record fine do not help to unlock competition and choice online, especially when it comes to browsers.

    • Programming/Development

      • Simon Ser: Status update, September 2022

        This month I’ve been working on stuff I’d usually not work on willingly. And by that I mean Rust and screen tearing of course.

        I’ve been randomly typing keys on my keyboard and before I knew it, a wlroots-rs repository was created. Everybody is saying how difficult (or even impossible) it is to write Rust bindings for wlroots so I wanted to see for myself and give it a try. One thing is clear: these people weren’t wrong. The first step was to wire up bindgen to automatically generate Rust declarations from the wlroots headers, and that was easy enough. Then I needed to figure out how to use libwayland’s intrusive linked lists (wl_list, wl_signal and wl_listener) from Rust. I took a while to build a basic example where a fixed wl_signal is listened to. Then it took more time to figure out a (hacky) way to abstract that into a re-usable helper. And now I’m stuck at trying to figure out a reasonable Rust API.

        The main issue is that Rust lifetime concepts don’t map well to wlroots/Wayland. I’ve taken some inspiration from Smithay and introduced a BackendHandler trait which can be implemented by a compositor, and which has its methods called when a wlroots signal is emitted. This works nicely for simple cases, but sometimes signals are used to introduce new objects to the compositor (e.g. wlr_backend.events.new_output). Sometimes signals reference an existing object. If the compositor owns all wlroots objects, then wlroots can’t fire a signal referencing these objects. Also, the compositor would like to listen to signals on objects created by wlroots, e.g. wlr_output.events.destroy. My next try will maybe introduce some kind of wlroots object handle (and there can be multiple handles referencing the same wlroots object), but not sure how it’ll turn out. If you have any good ideas, please share! My latest work is sitting in the handler-v2 branch.

      • Perl / Raku

        • PerlHacktoberfest 2022 is near! | itcharlie [blogs.perl.org]

          Every year in the month of October a company named DigitalOcean hosts an event named Hacktoberfest.

          If you ever wanted to contribute to a Perl project now is a good time to give it a go!. Here are a few beginner friendly projects that are up-for-grabs.

      • Python

        • [Old] nGauge: Integrated and extensible neuron morphology analysis in Python

          The study of neuron morphology requires robust and comprehensive methods to quantify the differences between neurons of different subtypes and animal species. Several software packages have been developed for the analysis of neuron tracing results stored in the standard SWC format. However, providing relatively simple quantifications and their non-extendable architecture prohibit their use for advanced data analysis and visualization. We developed nGauge, a Python toolkit to support the parsing and analysis of neuron morphology data. As an application programming interface (API), nGauge can be referenced by other popular open-source software to create custom informatics analysis pipelines and advanced visualizations. nGauge defines an extendable data structure that handles volumetric constructions (e.g. soma), in addition to the SWC linear reconstructions, while remaining light-weight. This greatly extends nGauge’s data compatibility.

        • Fedora MagazineUsing Python and NetworkManager to control the network

          There are other tools that offer similar functionality. However one of the advantages of NetworkManager is that it offers a powerful API. Using this API, other applications can inspect, monitor and change the networking state of the system.

          This article first introduces the API of NetworkManager and presents how to use it from a Python program. In the second part it shows some practical examples: how to connect to a wireless network or to add an IP address to an interface programmatically via NetworkManager.

        • Linux Shell TipsPython Package Manager PIP Cheat Sheet for Linux

          If you are new to the Python programming language or have some experience in navigating around popular programming languages, then you must have crossed paths with PIP.

          The Python module installed on your Linux operating system distribution is associated with numerous packages and libraries that help lessen common hurdles affecting your Python projects.

          To install such packages and libraries, we need the aid of Python PIP, which is a useful Python package manager that is effective in fetching, installing, and configuring needed Python packages and libraries.

          The usage of the PIP Python package manager is not always clear and might require continuous internet searches to find the appropriate command syntax associated with it.

        • Linux HintPython Command Line Parsing Tutorial

          The parsing for command line arguments was formerly included in the default Python library “argparse”. By enabling user input values to be somehow parsed and then used, “argparse”. It offers flexibility and reuses your code in place of manually setting variables as part of the code.

      • Shell/Bash/Zsh/Ksh

        • FOSSLinuxBASH while loop explained with examples | FOSS Linux

          Programming languages are built on a foundation of many core concepts, including loops. Loops come in handy when you need to execute a set of commands several times until a particular condition is met. Loops are a valuable tool for automating repetitive tasks and can be found in scripting languages such as Bash. The for loop, the while loop, and the until loop are the three fundamental iteration constructs in Bash scripting.

          This guide will walk you through the fundamentals of using while loops in Bash. In addition, we will demonstrate how to change the course of a loop by utilizing the break and continue statements in the appropriate places.

          In a Linux Bash script, the while loop ensures the script will continue to run so long as the condition that was programmed remains accurate. When you need to repetitively execute a set of commands a certain number of times, or when you desire to create an infinite loop, while loops are valuable tools to have at your disposal. To teach you how while loops in a Bash script are written and what kind of functions they perform, this tutorial will walk you through several example scripts that contain while loops.

  • Leftovers

    • Education

      • Times Higher EducationRise of Swedish right tipped to turn off international scholars

        Mats Benner, dean of Lund University’s School of Economics and Management, told Times Higher Education that immigration policy was “a nuisance for universities already as it is, and I would not expect it to become easier”.

      • Common DreamsOpinion | Teachers Should Carry Books, Not Guns—And Politicians Should Do Their Jobs

        I will never forget the afternoon before my very first day as a middle school teacher in central New Jersey. Textbooks and worksheets sat strewn across my bed in the house I shared with my father. I was 25 years old and had just received my teaching license. My nerves were frayed—as every novice teacher knows, there is absolutely nothing more terrifying than a new classroom full of young people.

    • Hardware

      • HackadayFork And Run: The Definitive Guide To Getting Started With Multiprocessing

        Since the early 2000s, the CPU industry has shifted from raw clock speed to core counts. Pat Gelsinger famously took the stage in 2002 and gave the talk the industry needed, stating processors needed specialty silicon or multiple cores to reduce power requirements and spread heat. A few years later, the Core series was introduced with two or four-core configurations to compete with the AMD Athlon 64 x2.

      • CNX SoftwareDeNova Detect natural gas alarm works with Amazon Sidewalk network – CNX Software

        New Cosmos’ DeNova Detect is a wireless natural gas alarm that works with the Amazon Sidewalk network designed for low-power, low-bandwidth IoT devices in and around the house, benefiting from free connectivity thanks to the installation base of Amazon devices such as the Echo Show acting as gateways.

        DeNova Detect does not require wiring to mains, and the device is expected to achieve an extended battery life of seven years, so customers can choose the optimal location for a gas alarm in their homes without needing to be close to an electrical outlet. There’s no need to have an additional gateway such as with LoRaWAN solutions as well as the customer owns one or more Sidewalk-compatible device.

    • Health/Nutrition/Agriculture

    • Proprietary

    • Security

      • USCERTCISA and NSA Publish Open Radio Access Network Security Considerations [Ed: But NSA is pursuing back doors in everything, which is the exact opposite of security]

        CISA and the National Security Agency (NSA) have published Open Radio Access Network Security Considerations. This product—generated by the Enduring Security Framework (ESF) Open Radio Access Network (RAN) Working Panel, a subgroup within the cross-sector working group— assessed the benefits and security considerations associated with implementing an Open RAN architecture. Focusing on current designs and specification standards, the ESF Open RAN Working Panel examined how security compares with, and is distinct from, traditional, proprietary RANs.

      • Rust BlogThe Rust Programming Language Blog: Const Eval (Un)Safety Rules [Ed: Rust is not about security; Rust itself is a security risk. More complexity, more bugs, more threats to security.]

        In a recent Rust issue (#99923), a developer noted that the upcoming 1.64-beta version of Rust had started signalling errors on their crate, icu4x. The icu4x crate uses unsafe code during const evaluation. Const evaluation, or just “const-eval”, runs at compile-time but produces values that may end up embedded in the final object code that executes at runtime.

        Rust’s const-eval system supports both safe and unsafe Rust, but the rules for what unsafe code is allowed to do during const-eval are even more strict than what is allowed for unsafe code at runtime. This post is going to go into detail about one of those rules.

      • Department of Commerce Gives Industry What it asked for Regarding the Entity List – ConsortiumInfo.orgConsortiumInfo.org

        The U.S. Department of Commerce Bureau of Industry and Security (BIS) added Chinese 5G technology giant Huawei to its Entity List more than three years ago. The immediate result was the spread of uncertainty and doubt among the hundreds of standards setting organizations (SSOs) in which Huawei participated as well as throughout the multitudes of U.S. companies who participated in those organizations. The reason was that the rules bar U.S. companies from disclosing a broad array of technology to Entity List companies, and that’s what can happen in standards working groups. Many SSOs either refused or failed to make adequate changes to their operations to fit within the vague exemptions available to avoid the concern. In consequence, many American companies believed they needed to drop out of SSOs creating the standards those companies most wanted to influence.

        On September 9, following several prior BIS releases of interim guidance and the submission of ongoing comments and requests for relief from industry (many of which we facilitated), the Department of Commerce and BIS have finally released a new Interim Final Rule that provides virtually everything commenters have asked for, and in language that in most cases is clear and actionable. While complexities and nuances remain (e.g., relating to the type of technical work being undertaken) that will still require legal analysis, the good news is that the way is clear for most SSOs to allow any Entity List company to fully participate in standards development, as well as in related activities such as conformance assessment.

      • USCERTCISA Adds Six Known Exploited Vulnerabilities to Catalog

        CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates. 

      • It’s Time to PuTTY! DPRK Job Opportunity Phishing via WhatsApp

        The techniques used by UNC4034 in this compromise, along with the techniques used in countless intrusions investigated by Mandiant, are used to continuously develop and refine threat hunting hypotheses within Managed Defense. These provide high fidelity and actionable leads that are informed by evolving threat actor tradecraft.

      • Bunnie HuangFully Oxidizing `ring`: Creating a Pure Rust TLS Stack Based on `rustls` + `ring`

        I really want to understand all the software that runs on my secure devices.

        It’s a bit of a quixotic quest, but so far we’ve made pretty good progress towards this goal: I’ve been helping to write the Xous OS from the ground up in pure Rust – from the bootloader to the apps. Xous now has facilities like secure storage, a GUI toolkit, basic networking, and a password vault application that can handle U2F/FIDO, TOTP, and plaintext passwords.

        One of the biggest challenges has been keeping our SBOM (software bill of materials) as small as possible. I consider components of the SBOM to be part of our threat model, so we very selectively re-write crates and libraries that are too bloated. This trades off the risk of introducing new bugs in our hand-rolled code versus the risk of latent, difficult-to-discover bugs buried in more popular but bloated libraries. A side benefit of this discipline is that to this day, Xous builds on multiple platforms with nothing more than a default Rust compiler – no other tooling necessary. It does mean we’re putting a lot of trust in the intractably complicated `rustc` codebase, but better than also including, for example, `gcc`, `nasm`, and `perl` codebases as security-critical SBOM components.

      • EFFEFF’s DEF CON 30 Puzzle—SOLVED

        For EFF’s lucky 13th member t-shirt at DEF CON 30, we had the opportunity to collaborate with iconic hacker artist Eddie the Y3t1 Mize and the esteemed multi-year winners of EFF’s t-shirt puzzle challenge: Elegin, CryptoK, Detective 6, and jabberw0nky of the Muppet Liberation Front.

      • Integrity/Availability/Authenticity

        • India TimesEU wants tough rules on ‘internet of things’ products

          “Computers, phones, household appliances, virtual assistance devices, cars, toys… each and every one of these hundreds of million connected products is a potential entry point for a cyberattack,” said Internal Market Commissioner Thierry Breton.

      • Privacy/Surveillance

        • EFFMembers of Congress Urge FTC to Investigate Fog Data Science

          Eshoo also pointed out the new threat that Fog’s surveillance tool poses to people seeking reproductive healthcare. In a state where abortion has been criminalized, Fog’s Reveal tool could potentially allow police, without a warrant, to draw a geofence around a health clinic over state lines in a state where abortion is not criminalized, allowing them to see if any phones there return to their state. “In a post Roe v. Wade world., it’s more important than ever to be highly mindful of how tools like Fog Reveal may present new threats as states across the country pass increasingly draconian bills restricting people’s access to abortion services and targeting people seeking reproductive healthcare,” Eshoo wrote.

      • Confidentiality

        • Thomas KarpiniecA taxonomy of hosting options, for personal data security

          People often talk about “self-hosting” as a singular concept when in reality it’s a spectrum of options with very different trade-offs. In this post I propose to set out a more useful classification and describe some of the pros and cons of each. The scenario I have in mind is where you want to keep some data private to yourself, maybe across multiple devices, and perhaps share that data with specific people. Concretely: cloud file storage, email; that sort of thing.

          In my mind the spectrum looks like this: [...]

    • Defence/Aggression

      • NPRZaporizhzhia nuclear reactors won’t restart until Russians leave, its operator says

        Ukrainian workers powered down the war-damaged plant last weekend for safety reasons amid continued shelling. On Tuesday, workers finished restoring all three backup power lines — a sliver of good news at the plant that officials and energy experts have warned could face a catastrophe as fighting continues around it.

      • ScheerpostSenate Panel Advances Bill That Would Radically Change US Taiwan Policy

        The legislation would give Taiwan $6.5 billion in military aid through 2027.

      • Democracy Now“In the Shadow of Invasion”: Artist Molly Crabapple & Ukrainian Journalist Anna Grechishkina Document Ukraine War

        Ukraine has accused Russia of bombing a dam in the southern city of Kryvyi Rih — where Ukrainian President Volodymyr Zelensky was born — forcing evacuation in parts of the city due to flooding. The bombing is the latest Russian attack on civilain infrastructure since Ukrainian forces recaptured over 3,000 square miles of territory from Russia during a counteroffensive this past week. For more, we speak with New York-based artist and author Molly Crabapple, who just published a series of sketches documenting her recent travels across Ukraine alongside Ukrainian journalist and motorcyclist Anna Grechishkina. “I wanted to see with my own eyes how Ukrainians were writing and defining their own future,” says Crabapple. Her new piece is titled “In the Shadow of Invasion.”

    • Environment

      • New York TimesBillionaire No More: Patagonia Founder Gives Away the Company

        Rather than selling the company or taking it public, Mr. Chouinard, his wife and two adult children have transferred their ownership of Patagonia, valued at about $3 billion, to a specially designed trust and a nonprofit organization. They were created to preserve the company’s independence and ensure that all of its profits — some $100 million a year — are used to combat climate change and protect undeveloped land around the globe.

        The unusual move comes at a moment of growing scrutiny for billionaires and corporations, whose rhetoric about making the world a better place is often overshadowed by their contributions to the very problems they claim to want to solve.

        At the same time, Mr. Chouinard’s relinquishment of the family fortune is in keeping with his longstanding disregard for business norms, and his lifelong love for the environment.

      • NPRThe founder of Patagonia is giving his company away to help fight climate change

        The Patagonia Purpose Trust will control all voting stock of the company (2%), while the Holdfast Collective, a climate change nonprofit, will own all nonvoting stock (98%).

      • Teen VoguePatagonia Founder Gives Away $3 Billion Company to Fight Climate Change

        “Instead of extracting value from nature and transforming it into wealth, we are using the wealth Patagonia creates to protect the source. We’re making Earth our only shareholder. I am dead serious about saving this planet,” Chouinard said in a statement.

      • ScheerpostPatagonia’s Founder Found the Only Way to Be a Good Billionaire

        Jessica Corbett reports on Patagonia founder Yvon Chouinard’s radical decision.

      • Democracy Now“Infuriating”: A Third of Pakistan Is Underwater. Calls Grow for Climate Reparations and Debt Cancellation

        Nearly 1,500 people have died and tens of millions have been displaced in Pakistan, where catastrophic flooding has left a third of the country underwater, washing away homes, farmlands, bridges, hospitals and schools. “People have lost everything,” says Zulfikar Ali Bhutto, a Pakistani artist and the grandson of Pakistan’s former Prime Minister Zulfiqar Ali Bhutto. Bhutto says the flooding has caused an epidemic of malaria and dengue fever, and calls on the International Monetary Fund to cancel the country’s debts and commit to climate reparations.

    • Finance

    • AstroTurf/Lobbying/Politics

      • VOA NewsYouTube, Meta Will Expand Policies, Research to Fight Online Extremism

        A report by the Tech Transparency Project in May found 435 pro-militia videos on YouTube, including 85 posted since Jan. 6. Some of the videos gave training advice, like how to carry out guerilla-style ambushes.

      • The HillSenate confirms first-ever cyber ambassador

        Fick will be the bureau’s first-ever ambassador-at-large following its launch in April. The bureau was established to deal with international issues related to cyber and emerging technologies.

        It has three policy units: international cyberspace security, digital freedom, and international information and communications policy.

      • The RecordSenate confirms Fick as first U.S. cyber ambassador

        Fick will head the State Department’s Bureau of Cyberspace and Digital Policy, an office that opened in April and is intended to address gaps in the government’s global cyber response.

      • [Old] Cyber security and the cyber domain

        The aim of Finland’s national cyber security strategy is to respond to cyber threats, strengthen the overall security of society and ensure the smooth functioning of the cyber domain in all circumstances.

        The Strategy presents ten objectives that, when implemented, provide Finland with the capability nationally to control the intentional and unintentional adverse effects of the cyber domain as well as to respond to and recover from them.

      • Misinformation/Disinformation

        • Teen VogueCrisis Pregnancy Centers Are Running Ads on TikTok, Snapchat, and Instagram

          Research shows that teenagers consume news [sic] differently. Social media and messaging apps are some of the first places they turn to and crisis pregnancy centers know it. The centers reportedly spend hundreds of thousands of dollars on advertising on social media platforms to reach teens in their most vulnerable moments.

          The ad tactics range from subtle to direct. Some crisis pregnancy centers use words like “choice” or “options” in their name to appear abortion-friendly, while other ads directly attack abortion providers by name.

        • Rolling StoneHe Killed a Stranger He Thought Was a Werewolf. A Judge Just Banned Him From Social Media

          One year later, a jury was unable to reach consensus on if Bhasin was mentally fit to stand trial. He was subsequently found not guilty by reason of insanity and served three years in a mental health facility before his release this past June. On Thursday, a judge banned Bhasin from nearly all social media apps after Bhasin’s online dating profile raised concerns among Jackson’s friends. (Bhasin is still allowed to have a LinkedIn account for his job search.)

        • Judge Orders Alexandria ‘Werewolf’ Killer Off Social Media After Dating Profile Sparks Concern

          Bhasin appeared in court Thursday. A prosecutor called his Facebook dating profile intentionally misleading and asked the judge to either bar him from social media or set up software to monitor his activity.

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

      • VOA NewsMyanmar Sentences Journalist with BBC to Three Years Labor

        A court in the Bahan Township in Yangon convicted the journalist of incitement under Section 505(a) of the Myanmar penal code. Her sentence: three years in prison with labor.

        A lawyer who represents journalists and is familiar with the case told VOA Burmese that the prosecutor did not provide evidence.

      • IT WireiTWire – Mexico more concerned about Assange than Australia, says brother

        Mexico has awarded WikiLeaks founder and publisher Julian Assange the keys to its capital, Mexico City, in its latest move to celebrate the Australian’s journalism and pressure the Biden administration to act on the pending extradition case.

        But while a country so far away, and on the US border too, is doing this, it is passing strange that Australia, the country of which Assange is a citizen, is doing little or nothing to push for his freedom, his brother, Gabriel Shipton told iTWire on Friday.

        Shipton, who is in Mexico at the moment, said there had been conflicting messages from the Albanese government which had, prior to being elected, hinted that quiet diplomacy would be undertaken to gain Assange’s freedom.

        Prime Minister Anthony Albanese hinted before the election that Assange’s protracted judicial proceedings should be ended. When he was asked about it after the election, he responded that diplomacy was not conducted over a megaphone.

        {loadposition sam08}Shipton said Albanese’s words about his brother were more or less “an election promise”. But at the beginning of August, when Labor Senator Don Farrell had been contacted to inquire if any moves had been made towards freeing Assange, he had said Australia could not interfere in court proceedings of other countries, a similar statement to that which was made by the previous Morrison government on more than one occasion.

    • Civil Rights/Policing

      • Hubbard BroadcastingNews10NBC Exclusive: Body-worn camera video shows moments after EMT was arrested in Strong Emergency Room

        Smith had opened the door of the ambulance into the door of the unmarked police car LoTiempo had parked in the emergency vehicle bay at Strong Memorial Hospital. LoTiempo asked for Smith’s name and identification, at first she didn’t think she hit the car and then told him she would handle it after she got her patient inside and unloaded.

        The body-worn camera video provided by a source to News10NBC Investigative Reporter Jennifer Lewke shows the moments following LoTiempo’s arrest of Smith inside the Emergency room.

      • The NationRail Workers, Nurses, Teachers Are Fighting From the Bottom Up

        It seems right now that the railway workers might be in a position similar to that of their sisters and brothers in IATSE. At the core of their fight has been a grueling just-in-time scheduling system used by the bosses of the biggest rail freight companies to keep costs down at the expense of workers’ lives. In this system, workers are essentially always on call except during short, pre-booked vacation times, and are punished if they aren’t immediately available when called into work because they, God forbid, have to do something like go to the doctor. The only thing that changed overnight (literally) in the proposed tentative agreement was that these workers would not be disciplined for getting sick on a Tuesday, Wednesday, or Thursday. They still have to be available at a moment’s notice for the majority of the week, with no excuses—so they’ll still have to plan their illnesses carefully.

      • Democracy Now“30 Years in the Making”: U.S. Rail Strike Averted by Tentative Deal as Workers Decry Grueling Conditions

        Railroad workers have reached a new tentative union contract with rail companies, averting a potential strike set to start on Friday that could have shut down rail service across the United States. The deal, which has yet to be released in writing and ratified by union members, is said to grant one paid sick day to workers, allow workers to attend medical appointments without being subject to attendance policies, and give a “semblance of a schedule” to rail workers, who are currently on call to work 24/7. Locomotive engineer Ron Kaminkow, the organizer for Railroad Workers United, says the railway crisis is “30 years in the making,” and describes how resentment has grown among workers as rail company executives slash resources for their employees while raking in record profits.

      • EFFSan Francisco Police Must End Irresponsible Relationship with the Northern California Fusion Center

        Fusion centers were started in the wake of 9/11 as part of a Department of Homeland Security program to improve data sharing between local, state, tribal, and federal law enforcement agencies. There are 79 fusion centers across the United States, each with slightly different missions and responsibilities, ranging from generating open-source intelligence reports to monitoring camera networks. NCRIC historically has served as the Bay Area hub for sharing data across agencies from automated license plate readers (ALPRs), face recognition, social media monitoring, drone operations, and “Suspicious Activity Reports” (SARS).

      • ScheerpostCNN’s New Police Expert—Formerly of the NYPD and FBI—Misleads Audience With Crime Claims
      • ScheerpostFreight Workers Explain Why National Railroad Strike is Looming

        Years of cost-cutting, profit-maximizing policies have pushed workers to a breaking point. Here’s what you need to know.

      • Common DreamsTentative Deal Between Unions, Rail Carriers Reportedly Includes Sick Time Win for Workers

        The Biden White House on Thursday announced a tentative agreement between unions and rail carriers that reportedly includes a win for workers on sick leave, an issue central to the dispute that nearly resulted in a nationwide strike.

    • Internet Policy/Net Neutrality

      • Broadband BreakfastWhite House Presses Outreach Initiatives for Affordable Connectivity Program

        The Affordable Connectivity Program subsidizes internet service bill for low-income households. Monthly discounts of up to $30 are available for non-tribal enrollees, $75 for applicants on qualifying tribal lands. In addition, the ACP offers enrollees a one-time discount $100 on qualifying device purchases.

        To boost ACP enrollment, speakers encouraged schools to reach out directly to families. Bharat Ramanurti, deputy director of the National Economic Council, said text-message campaigns drive up enrollment in government programs. A Massachusetts text-message campaign doubled ACP enrollment rates in subsequent days, said Ramanurti.

    • Digital Restrictions (DRM)

    • Monopolies

      • Copyrights

        • VarietyBanking on Entertainment: A Special Report

          For investors who look to yield predictable, long-term returns from these revenue streams, that means being able to parse highly granular data generated by digital streaming. It requires transparency into transactions and market performance, not to mention acceleration of the increasingly complex web of payments attached to any intellectual property.

          In the new special report “Banking on Entertainment,” Variety Intelligence Platform (VIP+) digs deep into a fascinating new world that has transformed backroom bean-counting into sophisticated operations that impose clarity and efficiency on what would otherwise be a very messy process.

          The immense volumes of calculations, reporting and payments has put a premium on automation at a scale far beyond the capabilities of most legacy systems.

        • Torrent FreakCloudflare Vows to Fight Global DNS Blocking Orders

          Copyright holders are expanding their web-blocking horizons by going after DNS resolvers. Cloudflare is one of the key players that’s being targeted. While the Internet infrastructure company complies with targeted blocking orders related to the websites of its CDN customers, it believes that blocking domains on its DNS resolver goes a step too far.

  • Gemini* and Gopher

    • Personal

      • Gimme Knobs

        I started playing electric guitar again in earnest about a year ago. I’ve been practicing for 30 minutes to two hours every day since. It helped me stay sane during the pandemic and what with all the other catastrophies. It also made me listen to music differently, my left hand gained a lot of dexterity, and as a tech nerd, there was a lot of new terrain to explore. Signal chains, tubes, amplifiers, pedals. I soldered my own RAT clone distortion pedal, learned about clipping diodes, upgraded the pickups in my Squier Telecaster, and I watched a lot of Youtube videos about guitar theory and gear.

        One thing I’m not yet on board with is virtualizing the hardware. I get how a Kemper simplifies everything in a way. You simulate your amp and your pedals, it’s less stuff to haul and buy, and you can do whatever. Certainly makes sense for a professional musician. My gear sits around my desk, though, where I spend most of the day working as a project manager for a software company. As much as I love computers and technology, she sheer haptic pleasure of switching on a pedal and turning its knobs instead up pulling up a dialog on a screen is one of the things that makes playing guitar an escape for me that works.

      • covid is over…?

        The government is shutting down the corona tracking app, I guess because it never really worked as intended and keeping the servers up must be very costly. I only got a notification once and it wasn’t even very accurate (it stated way too much exposure time during a week I spent mostly at home).

    • Technical

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

[Meme] Gemini is Very Large Already, Now a Collaborative Directory of Geminispace (CDG) is Available to Mimic DMOZ or Yahoo! of the 1990s

Posted in Free/Libre Software, Protocol at 4:55 am by Dr. Roy Schestowitz

Gemini crowd

Gemini's size

Summary: Gemini’s impact soars and the Geminispace’s size is still growing; it’s very reminiscent of the Web of the 90s and now there’s this new and collaboratively-edited directory of Gemini capsules [1, 2] (the above counts over 2,100 but there are many more that are islands and aren’t known about; the crawling is limited to a maximum of 10,000 URLs, so there must be millions of pages in Gemini by now)

IRC Proceedings: Thursday, September 15, 2022

Posted in IRC Logs at 2:31 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 Qmaobf5J1XVX5CnESL894TfSkwehMzyLEbHm3Xv28Z1NiD IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmdWmS9srBgS6RGXwQACGr6YwbacPeBtRn3dMydZs44yyL IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmVvKqVcqh8gJM2ik1HnUA4xsWnpx7LnbqcedHYxx15CW7 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmbLrcBkip77UBy3ySCTmxbhZ5XLuStPDS6yXMsrR2jHh1 IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmTQDPJroPpFwWM5jN8ppafvRMQqSpE9d31rnLzNdPKZ2Z IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmTUBqqXUtRBmtYXFKAivP4R39auAs3quGyDDEAYX1CqyM IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmcsTsYwKaryRNZyKLwJRrf7EGcSAdGhc2hMMte3rgLMvr IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmcbUagQJwq1MVSb4pHsMbhwuhxLfphx5DAhY8M7XVmGpZ IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmYPR3iBujyTHUCpxPHwsMNXJiNSLgfQa4AuzchgiUJ3M8

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts