Links 19/09/2022: Firefox 105 and OpenMandriva on Ampere Altra

Posted in News Roundup at 1:00 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • ZDNetLinus Torvalds: Rust will go into Linux 6.1 | ZDNET

        The Rust in Linux debate is over. The implementation has begun. In an email conversation, Linux’s creator Linus Torvalds, told me, “Unless something odd happens, it [Rust] will make it into 6.1.”

      • A journey in the RTC subsystem – Bootlin’s blog

        As part of a team effort to improve the upstream Linux kernel support for the Renesas RZ/N1 ARM processor, we had to write from scratch a new RTC driver for this SoC. The RTC subsystem API is rather straightforward but, as most kernel subsystems, the documentation about it is rather sparse. So what are the steps to write a basic RTC driver? Here are some pointers.


        RTC counters rely on very precise clock sources to deliver accurate times. When the source is not matching the expected precision, which is the case of most cheap oscillators on the market. Some RTCs have a mechanism allowing to compensate for the frequency variation by incrementing or skipping the RTC counters at a regular interval in order to get closer to the reality.

      • Web Pro News[Older] Debian May Change How It Handles Non-Free Firmware

        Debian is currently investigating the possibility of changing how it handles non-free firmware, moving the discussion to a general resolution process.

      • Web Pro News[Older] What’s In a Name? Linux Kernel 6.0 RC-1 Is Here
      • Web Pro News[Older] Linus Torvalds Is Using an M2 MacBook Air
    • Instructionals/Technical

      • Red Hat OfficialHow to encrypt etcd and use secrets in OpenShift | Enable Sysadmin

        Secrets contain sensitive information, but they aren’t encrypted by default. Learn how to encrypt an etcd database to manage vital information in OpenShift.

        A secret in OpenShift is any critical resource or object type that provides a mechanism to hold sensitive information, such as a password, sensitive configuration file, Transport Layer Security (TLS) certificate, Secure Shell (SSH) credential, or OAuth token.

        A secret is used in internal connections between different resources. For example, applications and services can share secret data within a namespace.

      • AddictiveTipsHow to install Parrot OS 5 Home Edition

        Parrot OS 5 is out, and a new Home Edition release comes with it. Home Edition 5 is packed with new stuff, like Pocsuite3, Findmyhash 2.0, version 5.16 of the Linux kernel, and much more. Here’s how to get Parrot OS 5 Home Edition working on your computer.

        Where to download Parrot OS 5 Home Edition

        Parrot OS 5 Home Edition can be downloaded from the official Parrot Linux website. “Home Edition” is a general-purpose operating system and can be used as such. However, users can still use it for security and pen-testing like traditional Parrot OS.

        Go to the website to get your hands on the latest Parrot OS 5 Home Edition ISO. Once there, click on the download button. When you select the “Download” button, the “Home Edition” should be the first edition that appears.

        Select the “Download” button to start the Parrot OS 5 Home Edition download process. Alternatively, select the “Torrent” download link. Torrenting Parrot OS helps developers save on bandwidth costs.

      • OSTechNixFind Default Gateway IP Address In Linux And Unix – OSTechNix

        A gateway is a node or a router that allows two or more hosts with different IP addresses to communicate with each other when connected to the same router. Without gateway, devices connected on the same router won’t be able to communicate with each other. To put this another way, the gateway acts as an access point to pass network data from a local network to a remote network. In this guide, we will see all the possible ways to find default gateway in Linux and Unix from commandline.

      • How to Enable VLC Dark Mode in Linux, Windows and Android
      • OSNoteHow to Install XWiki with Nginx Reverse Proxy on Ubuntu – OSNote

        XWiki is an easy, compact, and efficient wiki platform that enables you to tailor the wiki to fit unique requirements. It is implemented in Java & operates on JBoss or Tomcat-based servlet containers. XWiki is an easy and intuitive online frontend that allows you to generate and organize data from every gadget or search engine. WYSIWYG edit, OpenDocument-based file import/export, tagging, version control, sophisticated wiki syntax, comprehensive search capability, and much more are just a few of the tools included. We’ll demonstrate how to set up XWiki on Ubuntu 20.04 throughout this guide.

      • H2S Media4 ways to install Spotify App on Ubuntu 22.04 LTS Linux

        Spotify is one of many Music Streaming Services over the Internet, you can listen to songs via stream legally on your smartphone and PC. Meanwhile, Spotify is also available as an app on many TVs. Thanks to providers such as Spotify, Deezer, Tidal, and Co., the download of music is no longer necessary. The music is streamed over the Internet, i.e. only temporarily cached. On request, however, a download of individual songs is also possible.

        Due to the cooperation with the major music labels such as Universal, Warner, and Sony, almost all artists are represented on Spotify. Only very small artists without a label can often not be reproduced. Using the search function, you can always search for your favorite songs, albums, and artists. If you listen to certain songs over and over again, you can create your own playlists and share them with friends.

        If you don’t want to put together your own music, you can take a look at Spotify’s numerous ready-made playlists. From the workout to the shower playlist, Spotify offers the right music for every occasion. In addition to music, Spotify is also offering more and more audiobooks and podcasts, for which Spotify has now created a separate category.

      • HowTo ForgeHow to Install vTiger CRM Open Source Edition on Debian 11

        vTiger is an all-in-one CRM (Customer Relationship Management) solution for your business. It is suitable for small and medium businesses. In this tutorial, we will show you how to install vTiger CRM on the Debian 11 server with the LAMP Stack. This guide will be using the open-source version vTiger CRM.

      • HowTo ForgeHow to Install TIG Stack (Telegraf, InfluxDB, and Grafana) on Ubuntu 22.04

        The TIG (Telegraf, InfluxDB, and Grafana) Stack is an acronym for a platform of open-source tools to make the collection, storage, graphing, and alerting of system metrics easier. You can monitor and visualize metrics such as memory, disk space, logged-in users, system load, swap usage, uptime, running processes, etc. from one place.

      • ID RootHow To Install Graylog on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install Graylog on Rocky Linux 9. For those of you who didn’t know, Graylog is an open-source project for a solution that can be used for centralized log analysis. It’s written in Java and built on top of other open-source software like MongoDB and Elasticsearch. With Graylog, we can easily gather logs to one place, analyze them using Elasticsearch and visualize them on the Graylog dashboard.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Graylog on Rocky Linux. 9.

      • Trend OceansHow to Limit the HTTP Bandwidth in NGINX

        If you have a website that provides downloadable materials like movies, games, etc., or a streaming website, then you need to limit your HTTP bandwidth RIGHT NOW.

    • Games

      • VideoRockstar Games [Cracked] | GTA 6 Videos Leaked – Invidious

        What’s up, guys!!! In this video, we cover an article on how Rockstar Games was hacked and GTA 6 source code and videos leaked online.

      • Best 12 Linux ASCII Games That are Modern Looking For 2022 – DekiSoft

        A decade back terminal-based games were quite popular when you did not have visual masterpieces such as Red Dead Redemption 2, Spiderman, and God of War, or Grand Theft Auto 5. Most were played on DOS or hacker-like screens.

        The Linux platform carries its own share of good games but keeps in mind that these are not always the “latest and the greatest”, there are ASCII games to which we can never say no or turn our back. Most of the collection below can also be played online or in the browser depending on your setup.

        Please remember: Installing such games is time-consuming and you may encounter some games which require building from source.

      • Boiling SteamThe Steam Deck’s Sales Pitch for Japan: It Could Have Been Better, To Say the Least

        The launch of the Steam Deck in Japan, with a large presence at the Tokyo Games Show 2022 (TGS 2022) is yet another chance for us to discover how Valve is doing its sales pitch over here. There was hardly much advertising in other geographies so far, and Japan is a very big market when it comes to handheld gaming. Product positioning is crucial to make a dent into Nintendo’s turf.

        A video displayed at Valve/Komodo’s booth during the show explains to Japanese gamers what the Steam Deck is all about. Here’s an edit we just made (based on this original video) to help you see the points they make and the visuals they attach to it.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Web Pro NewsLinux Distro Reviews: KDE Plasma — The One That Could Be King

          While Plasma looks very similar to Windows out of the box, all it takes is a few clicks to make it look like macOS or virtually any type of operating system (OS) or DE you can imagine.

          Plasma also includes a full suite of applications that round out its features, including an Outlook-style PIM suite, powerful text editor, image viewer, file manager, music player, and literally dozens of other applications. Obviously, different distros package different KDE apps for their users, but anyone can download any applications their distro doesn’t include by default.

          One of the standout KDE apps is KDE Connect, an app that connects your Android phone with your Plasma desktop. This gives you the ability to get SMS notifications on your computer, share files, and even use your phone as a trackpad for Plasma.

        • Carl SchwanPromo sprint in Saumur

          Last month, I was in Saumur (France) to attempt a KDE Promo sprint. This was my first sprint since the pandemic, actually this might even be my first ever official KDE sprint as before the pandemic I primarely attended conferences (Akademy, Fosdem, Libre Graphics Meeting, Linux App Summit, …) but no official sprint.

          The sprint took place during the weekend and was a great occassion to meet Allon, Aron and Neophytos for the first time. Aside from them I also meet Claudio, Paul, Joseph and Aniqua would I had already had the chance to meet before.

        • KritaIntel Becomes First Krita Development Fund Corporate Gold Patron

          The Krita Foundation is very happy to announce that Intel is the first Patron Member of the Foundation’s Development Fund Intel and Krita have a long history together of successful collaboration on projects like Krita Sketch, improving multithreading and HDR painting.

        • Web Pro News[Old] Latte Dock Developer Steps Away From Popular KDE Project

          Fans of the popular KDE panel Latte Dock are in for a disappointment, with the developer announcing he will no longer be maintaining the project.

          Latte Dock is a launcher for the KDE Plasma desktop that looks and functions much like the dock in macOS, albeit with more features and customization options. The launcher features prominently in many videos showcasing KDE Plasma and the degree to which it can be customized, including in Nick’s video for The Linux Experiment (below).

  • Distributions and Operating Systems

    • LinuxiacMakuluLinux: A Lot of Fun for Distro Hoppers

      We’ve always maintained and believed that one of the most powerful and essential aspects of Linux is the diversity and choices it offers its users. MakuluLinux is living proof of this. But first, let’s give readers a quick overview of this Linux distribution.

      MakuluLinux is a distribution focused solely on desktop Linux users and gamers. It is available in two free-to-download editions: MakuluLinux Shift and MakuluLinux Gamer.

      However, both have their own PRO editions with extra features, which we will review later in this article. So, understandably, MakuluLinux Shift Pro and MakuluLinux Gamer Pro are paid, priced at $30.

    • Barry KaulerVincent has died age 16

      Vincent was a logo and avatar in Puppy Linux. Died at age 16½, over 110 in human years!

    • Vincent has died, age 16 – Puppy Linux Discussion Forum

      Many of the Puppy old-timers will remember Vincent.
      My daughter and partner had two little dogs, Vincent and April.
      Vincent became the mascot for some Puppy-derivatives, and also the avatar for some members on the old Puppy Forum.

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • 9to5LinuxFirefox 105 Is Now Available for Download, Brings Better Performance on Linux Systems

          Firefox 105 was yet another attempt for Mozilla to implement the long-anticipated two-finger swipe horizontal gesture on Linux systems for navigating back and forward on a website without having to hold down the Alt key. Unfortunately, while the feature worked well during beta testing, it’s missing in the final release.

          Instead, Linux users get more performance improvements with the Firefox 105 release, ensuring that the web browser is less likely to run out of memory when memory is running low. This also ensures that Firefox is more reliable and will perform better.

    • Programming/Development

      • Jussi PakkanenNibble Stew: Diving deeper into custom PDF and epub generation

        In a previous blog post I looked into converting a custom markup text format into “proper” PDF and epub documents. The format at the time was very simple and could not do even simple things like italic text. At the time it was ok, but as time went on it seemed a bit unsatisfactory.

      • The New StackThe Different Token Types and Formats Explained – The New Stack

        When building security solutions using OAuth and OpenID Connect (OIDC), we frequently discuss tokens. Sometimes these systems are even referred to as token-based architectures.

        Tokens play a core role in authorizing access to applications, services and APIs. They also enable secure, flexible and scalable access management. Using tokens means applications don’t have to maintain a static API key or, even worse, hold a username and password.

        The type of token used in a given scenario is often not explicitly outlined, but more or less assumed. Different tokens have different purposes and should be used appropriately for each use case.

      • QtConan package manager pilot to end in December

        We have piloted a Conan-based package manager as an alternative way to get the Qt binaries since the beginning of this year. While we have gotten a lot of good feedback and some users have found this approach valuable, overall, there has not been as much interest in Conan as we expected. We, therefore, plan to end the pilot by December 2022. No new Qt versions will be offered via Conan package manager, and we will take the experimental Conan server offline by the end of the year. Note that this does not affect the recipes on ConanCenter, which are maintained independently.

      • Barry KaulerIntroduction to Nim language
      • Rust

        • What I meant by the “soul of Rust”

          Re-reading my previous post, I felt I should clarify why I called it the “soul of Rust”. The soul of Rust, to my mind, is definitely not being explicit about allocation. Rather, it’s about the struggle between a few key values — especially productivity and versatility in tension with transparency. Rust’s goal has always been to feel like a high-level but with the performance and control of a low-level one. Oftentimes, we are able to find a “third way” that removes the tradeoff, solving both goals pretty well. But finding those “third ways” takes time — and sometimes we just have to accept a certain hit to one value or another for the time being to make progress. It’s exactly at these times, when we have to make a difficult call, that questions about the “soul of Rust” starts to come into play. I’ve been thinking about this a lot, so I thought I would write a post that expands on the role of transparency in Rust, and some of the tensions that arise around it.

  • Leftovers

    • Linux Foundation

    • Security

      • LWNSecurity updates for Monday [LWN.net]

        Security updates have been issued by Debian (connman and e17), Fedora (curl, open-vm-tools, pcs, and python-lxml), Mageia (curl, dpkg, freecad, gimp, libtar, libtiff, mediawiki, ostree, python-lxml, schroot, SDL12, sdl2, wireshark, and zlib), Oracle (kernel and php:7.4), Red Hat (php:7.4), Slackware (vim), SUSE (chromium, kernel, libarchive, libtirpc, mupdf, python-rsa, ruby2.5, and virtualbox), and Ubuntu (linux-intel-iotg).

      • MakeTech EasierHoliday Inn Parent Company Hacked Through Weak Password

        If you’ve wondered why having a strong password is necessary, this recent trouble is the reason. Intercontinental Hotels Group, the parent company of the Holiday Inn and other hotel chains, was hacked, and a Vietnamese couple is claiming responsibility for deleting the chain’s data, saying they did it through a week password.


        A Vietnamese couple came forward and admitted to the BBC that they were behind the ICG cyberattack, yet deleting a large amount of data wasn’t the original plan. Initially, the plan was to launch a ransomware attack after they gained access to the company’s databases through a very weak password: “Qwerty1234.”

        The couple, going by the name of TeaPea, reached the BBC through Telegram and supplied screenshots, which IHG confirmed were authentic, that showed them gaining access to ICG’s Outlook emails, Microsoft Teams chats, and server directories.

      • NSA Security Best Practices for Kubernetes [Ed: But NSA is anti-security and pro-back doors (which it hilariously redefines as "security"]
      • LinuxSecurityDoes Linux Need a Firewall – How To Configure the Linux Firewall with firewall-cmd?

        The only time you’d need a firewall is if you’re running some kind of server application on your system most of the time. In this case, a firewall will restrict incoming connections to certain ports, making sure that they can only interact with the proper server application. Again, there is no harm in not having a firewall activated on your Linux machine. All we are saying is that you should think about implementing a firewall using firewall-cmd for increased security!

      • Privacy/Surveillance

        • Bruce SchneierLarge-Scale Collection of Cell Phone Data at US Borders – Schneier on Security

          The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as many as” 10,000 phones per year, including an unspecified number of American citizens. This is done without a warrant, because “…courts have long granted an exception to border authorities, allowing them to search people’s devices without a warrant or suspicion of a crime.”

        • Customs Officials Have Copied Americans’ Phone Data

          “U.S. government officials are adding data from as many as 10,000 electronic devices each year to a massive database they’ve compiled from cellphones, iPads and computers seized from travelers at the country’s airports, seaports and border crossings,” the Washington Post reports.

        • GizmodoLarge-Scale Collection of Cell Phone Data at US Borders
    • Civil Rights/Policing

      • AccessNowAuthorities in Iran must keep the [I]nternet accessible in Saqqez

        As civil society organizations, and members of tech communities, we are alarmed by the internet shutdown in the city of Saqqez, Kurdistan Province. This is Iran’s third internet shutdown in less than 12 months, and the repressive, knee-jerk response to recent protests seriously interferes with people’s right to freedom of expression and assembly.

        On September 16, 2022, in protest over the death of Mahsa Amini, dozens of people came to the streets of her hometown, Saqqez, Kurdistan Province, to mourn. During this protest, authorities cut off mobile data, and reportedly disrupted Instagram and WhatsApp. The order was given by the Provincial Security Council (شورای تامین استان in Farsi) — the provincial-level division of the National Security Council chaired by the governor.

        On September 14, Iran’s so-called morality police arrested Mahsa, 22 years old, in Tehran for what the government described as “improper” hijab. Two hours later, authorities informed Mahsa’s family that their daughter had been taken to a hospital. She died the next day after falling into a coma.

  • Gemini* and Gopher

    • Personal

    • Politics

      • RE: Technology and Conscience

        Technology does seem to me to be neutral — it doesn’t know right or wrong and doesn’t care whether it’s nailing a nail or hammering a fly. On the other hand, users aren’t neutral, because they can choose what to do with the tools at hand.

    • Technical

      • Programming

        • Oh god, Python! …I mean the programming language.

          So funny story, a couple days ago I was sitting down in class, we were allowed to use our phones for the moment, and I was chatting on a particular Discord server.

          Now I know, Discord is kind of terrible, but it would be too much of a hassle to get all my friends to move over to Matrix. That, plus the servers we’ve created have a lot of history we would rather not lose.


          I should probably explain, I have a deep-seeded hate for Python, but I don’t even remember why at this point. I only remember a lot of headaches, but those are constant.

          And since Python’s syntax is similar enough to Lua’s, looks like I don’t got much of a choice. I’m learning Python again.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Slashdot Adding Microsoft GitHub to All Linux Pages in Order to Shill Proprietary Code Hosting

Posted in Deception, GNU/Linux, Microsoft at 8:35 am by Dr. Roy Schestowitz

Slashdot GitHub

Summary: Slashdot used to be a pro-GNU/Linux site; now it’s run by very different people, but many make wrong assumptions about what the site actually is

(“Schneier on Security” seems to have become “Slashdot on Security” lately)

[Meme] Only Fools and Horses Work for Microsoft Without a Salary

Posted in Microsoft, Security at 8:18 am by Dr. Roy Schestowitz

Recent: Microsoft is Trying to Hire (Read: Pay Salaries to) Matthew Garrett

You... gave Microsoft control over the computer

Summary: We’re meant to think that Microsoft controlling the computers of BSD and GNU/Linux users means greater safety and security; to some people, April 1st is every day

Software Freedom is Not a Disaster and Those Who Oppose B.Y.O.D. Are a Monarch’s Dream

Posted in Deception, Free/Libre Software, Microsoft, Security at 8:04 am by Dr. Roy Schestowitz

Video download link | md5sum 5a2a7550c3dc497d9a1e0af501abb91c
Opposing Device Freedom
Creative Commons Attribution-No Derivative Works 4.0

Summary: Mr. Shim (Matthew Garrett, Microsoft 'asset') is telling us that people owning the electronic devices they use at work is a “disaster”; when it comes to security, being compromised (breached by a remote party) is part of that “security” as they define it, for “security” means the “trusted ones” control you, i.e. imperialism spun as “national security” or “war on terror”

THE video above is a response to this morning’s post from Mr. Shim, “mjg59″, who is best known for his contributions to Microsoft inside Linux, notably (notoriously) UEFI ‘secure’ boot. Aside from being Stalin's Dream, UEFI ‘secure’ boot is means by which to remotely sabotage other people’s computers. Mr. Shim will never understand that. He refuses to understand that. Don’t tell that to him. He is extremely sensitive and, in spite of being naturalised as US citizen, he does not or cannot grasp the First Amendment. So the video is probably a lot more polite than it ought to have been.

“It seems like fake security is a religion now; it’s practiced not by security experts but failed biologists.”This issue was also discussed for a bit in IRC, though one might need to wait for tomorrow’s IRC logs (published for today — the past 24 hours). Mr. Shim’s arguments are full of holes (more of that was explained in IRC) and the gist of some of these misconceptions is that security is mistaken for control, where the control does not belong to the device’s user but to some company like Microsoft or a Big Boss. The meaning of security has spectacularly been inverted! We’re meant to think that oppression is freedom and security, but the Queen would not turn in her grave today (had she heard that). That’s the sort of thing monarchs (dictators) have always fancied. They also seek to silence people who criticise them, just like Mr. Shim. Apparently in ‘democratic’ Britain it is now an arrestable offence to ask who elected ‘King’ Charles (nobody elected him).

In the video above I use the analogy of hotdesking; you own nothing, as everything is both temporary and rented. I explained why happy employees (hence, staff retention) is good for security and I reject pretty much all the straw man arguments from Mr. Shim. It seems like fake security [1, 2] is a religion now; it’s practiced not by security experts but failed biologists. We’ve seen lots of this in the EPO — a deeply corrupt institution where most managers aren’t qualified for the positions they occupy, they’re just imposters with connections.

Links 19/09/2022: pg_activity 3.0.0 Released, Microsoft Teams a Security Hole

Posted in News Roundup at 5:57 am by Dr. Roy Schestowitz

  • GNU/Linux

    • 9to5Linux9to5Linux Weekly Roundup: September 18th, 2022

      This week has been slow in Linux news, most probably because of the various Linux and Open Source events that took place in Dublin, Irland, such as Open Source Summit, Linux Plumbers Conference, and Linux Kernel Maintainer Summit.

      Fans of the KDE Plasma desktop environment got a new KDE Frameworks release with more improvements for their favorite KDE apps and the chance to test drive the beta version of the upcoming KDE Plasma 5.26 release, Fedora Linux fans were able to take the beta version of Fedora Linux 37 for a spin to explore the new features, and EndeavourOS got a new ISO release.

      Below, you can enjoy these and much more in 9to5Linux’s Linux weekly roundup for September 18th, 2022.

    • Audiocasts/Shows

    • Kernel Space

    • Graphics Stack

      • ArtemiseverfreeAn X11 Apologist Tries Wayland

        I think it’s only fair to call me an X apologist. I get incredibly frustrated when people talk about dropping support for X11. I fight back against the notion that some day X11 will be dead and unmaintained, a curiosity of a time before. I’ve spoken to people in my circles at-length about the accessibility tools that Wayland simply hasn’t been capable of supporting that X11 has. A lot of times, I’ve ended this conversation with “Maybe 5 years from now it’ll be good”. Well it’s 5 years in since I first said those words, and you know what, I’m actually pleasantly surprised.

        I’ve been using sway for most of my testing, since I already had an i3 config handy. Basically all I had to do was copy my config to .cofig/sway/config, change some of the services it was launching to get rid of X11-specific stuff, and add some output configuration. It’s pretty great how painless it was (and the default configs are just fine too, but I’m particular).

      • LWNAn X11 Apologist Tries Wayland (artemis.sh)

        The artemis.sh blog has a detailed review of the state of Wayland compared to X.org.

    • Applications

      • Medevel13 Free and Open Source Webpage and HTML editors

        Web designers and developers often need a visual editor that aid them in visualizing and building HTML web pages.

        Well, that was the case years ago, now the process took a different turn. However, many web designers and developers are still using HTML and CSS editors to design their static pages.

        Nowadays, web designers require mockup, wireframing and prototyping tools, which we covered in several topics in this site. Many front-end designers use code editors and live-reload server for web design.

        However, this article is about the old school classical webpage HTML editors.

        In this article we offer you a list of the best open source free web page editors that you can install as standalone applications on your computer.

    • Instructionals/Technical

      • Tom’s HardwareHow to Set Up a Raspberry Pi for the First Time

        So you’ve just gotten a new Raspberry Pi, perhaps even the Raspberry Pi 4 or Raspberry Pi 400, and taken it out of the box. Now what? There are a million things you can do with your mini computer, from using it as a web server to turning into a retro arcade, but first you need to set up the Raspberry Pi. Note that, if this is a Raspberry Pi Pico microcontroller, the setup process is completely different so see our article on how to set up Raspberry Pi Pico.

      • TecMint10 Most Dangerous Commands – You Should Never Execute on Linux

        The command-line interface is a powerful and handy utility for administering a Linux system. It provides a fast and versatile way of running the system, especially when managing headless systems which do not have a graphical interface.

        While useful in managing your system, the command line is fraught with risks. Running bad commands can cause harm and irrecoverable damage to your system. In this guide, we have compiled a list of some of the riskiest commands that you should not think of executing on your system.

      • Tom’s HardwareHow To Use The New Arduino IDE 2.0

        Arduino IDE 2.0 brings a number of improvements to the original IDE. Most notably a refreshed user interface. Here are a few more end user improvements.

      • H2S MediaTop 10 popular Linux Distros in September 2022 – Linux Shout

        Along with macOS and Windows, Linux is one of the three largest operating systems. However, Linux is available in different versions, although the best version is not so easy to identify. It is because the associated developers do not distinguish their distributions clearly enough from each other. Often it comes down to a blind “trial and error” for users until they have found their favorite Linux where they can reside for a long time.

        The 10 most interesting Linux distributions and their main features listed here are sourced and ranked with help of Distrowatch.com. However, the data there is only partially representative. Because Linux distributions, unlike Windows, do not collect user data by default, no one knows how many and which Linux distributions are used by how many people. The ranking is therefore based on how often a particular distribution has been downloaded.

      • Chrome UboxedHow to tell Web apps and Android apps apart on your Chromebook

        ChromeOS is one of the few operating systems that allows you to install applications from other operating systems, as is the case with Linux and Android apps that run in their own separate containers. However, having a combination of web app shortcuts, PWAs, Android apps, and Linux apps running on the same device can sometimes cause confusion if you’re trying to figure out where the app came from.

      • Linux Shell TipsHow to Install and Use Docker on Alpine Linux

        Docker is a popular open-source containerization platform that makes it possible for developers to build, ship, and deploy their applications inside isolated environments called containers. Unlike virtual machines, containers are lightweight environments that ship with all the libraries, dependencies, and files required by an application to run.

        In this guide, we will demonstrate how to install Docker on Alpine Linux

      • Trend OceansHow to Limit the Number of Connections in NGINX

        A modern web application is a constant target of attackers with attacks like DDOS. However, you can mitigate this type of attack by limiting the number of requests on your server if you are using NGINX as a web server.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • DebugPointGNOME Files Introduces Most-Requested Feature: New File Menu

          No more tweaking in the backend. The most anticipated feature of creating a new document / new files via the context menu in Files (aka Nautilus) finally arrives.

          Developed as part of the Google Summer of Code 2022 (by Ignacy Kuchciński), the change was recently reviewed and merged into the main branch of Files.

  • Distributions and Operating Systems

    • Red Hat / IBM

      • Enterprisers ProjectIT jobs: 3 essential AI roles to hire now

        In almost every industry, artificial intelligence (AI) is no longer a “nice-to-have” technology but a mission-critical solution to address urgent business needs – allowing companies to remain agile, increase productivity, and fuel insights. But to achieve that and set your organization up for AI success, you need a solid team of technologists, data scientists, and product specialists as the foundation.

        Whether you’re building a team from scratch or growing an existing AI team – or simply want to improve workflows and cross-functional collaboration – this practical guide will break down some of the key components needed to bring together the right team.

      • Enterprisers ProjectUpdating your core banking strategy: 9 lessons

        The decision to update your core banking infrastructure isn’t always clear-cut – if it’s worked for decades, why change it?

        The problem is your competitors are offering faster, easier services. In addition, the skills needed to maintain your system will become increasingly obsolete, and eventually, your team will no longer have the legacy knowledge it needs to continue operations.

      • Red HatBest ways to learn about Linux from Red Hat Developer | Red Hat Developer

        Looking for tips and deep dives on Linux, including Red Hat Enterprise Linux? Red Hat Developer has a wide range of content for you. These are some of our favorite and most popular articles, cheat sheets, and lessons to help you get the most out of Linux, along with underlying tools like GCC and Linux-based platforms like Docker…

      • OpenSource.comI got my first pull request merged! [Ed: A "pull request" is usually Microsoft term (GitHub), i.e. an attack on Git itself]
    • Devices/Embedded

      • peppe8oPawns.app with Raspberry PI: passive income by sharing internet bandwidth

        Earning with your Raspberry PI running all day for other services is possible by sharing your internet bandwidth with service providers and granting IP proxies to other customers for works like marketing research and similar stuff. For your Raspberry PI, Pawns.app (previously IProyal) is one of the most famous and established providers in this perspective

        In this tutorial, I’m going to show you how to install IProyal in your Raspberry PI in a way that assures your privacy with the help of Docker.

    • Open Hardware/Modding

      • CNX SoftwareOpenHarmony development board borrows BBC Micro:bit edge connector – CNX Software

        HopeRun’s HiHope development board features a HiSilicon Hi3861V100 32-bit RISC-V microcontroller compatible with OpenHarmony OS and looks very much like the BBC Micro:bit educational board notably with its edge connector.

        The board is also designed for youth education (in China) and comes with similar sensors, but there are some differences such as a 0.96-inch OLED instead of an LED matrix and support for offline voice recognition. There’s no wireless connectivity apart from NFC support.

      • CNX SoftwareOchin Raspberry Pi CM4 carrier board is made for drones and robots – CNX Software

        There are plenty of carrier boards for Raspberry Pi CM4, but the Ochin looks a bit different, as it is specifically designed for drones and robots, and the compact carrier board exposes most interfaces through low-profile GHS connectors instead of standard ports or headers.

        About the size of the Raspberry Pi CM4 itself, the board also comes with a USB Type-C port to flash the eMMC flash, two MIPI CSI connectors and four USB 2.0 GHS connectors to add cameras to your robotics projects, and supports LiPo batteries.

      • Linux GizmosGPS-RTK Raspberry Pi Hat offers high precision positioning in real-time

        SB-Components recently launched a Raspberry Pi Hat integrating the ZED-F9P module which is a GNSS receiver that can simultaneously measure signals from constellations such as GLONASS, GPS, Galileo and BeiDou with 0.2 meters accuracy. 

  • Free, Libre, and Open Source Software

    • SaaS/Back End/Databases

    • Productivity Software/LibreOffice/Calligra

    • Content Management Systems (CMS)

      • Linux Links4 Best Free and Open Source Groovy Static Site Generators – LinuxLinks

        LinuxLinks, like most modern websites, is dynamic in that content is stored in a database and converted into presentation-ready HTML when readers access the site.

        While we employ built-in server caching which creates static versions of the site, we don’t generate a full, static HTML website based on raw data and a set of templates. However, sometimes a full, static HTML website is desirable. Because HTML pages are all prebuilt, they load extremely quickly in web browsers.

        There are lots of other advantages of running a full, static HTML website.

    • Programming/Development

      • Python

        • OpenSource.comPyLint: The good, the bad, and the ugly

          Hot take: PyLint is actually good!

          “PyLint can save your life” is an exaggeration, but not as much as you might think! PyLint can keep you from really really hard to find and complicated bugs. At worst, it can save you the time of a test run. At best, it can help you avoid complicated production mistakes.

  • Leftovers

    • Hardware

      • HackadayA Vacuum Pick Up Tool For Not A Lot

        When working with grain-of-dust surface-mount components, one of the tools which makes a huge difference is a vacuum pickup pen. Instead of trying to move the part with tweezers and succeeding only in flicking it into the middle distance, a tiny rubber suction cup with a vacuum feed allows you to pick it up and place it exactly where it is required. Unfortunately, good vacuum pickup tools come at a price, and very cheap ones aren’t worth the expenditure.

      • HackadayBanana Split Macropad Is Dessert For Your Desk
    • Health/Nutrition/Agriculture

      • Common DreamsOpinion | The Stench of a Moocher Launched Into Yet Another Health Mess

        Over Labor Day weekend this year, I launched into yet another damned health mess. As soon as I woke violently ill in the wee hours of Saturday morning, I began worrying about money. It’s always the money. Of course I wondered about what it was this time making me sick. Yet I worried so much more about how much damage I would do this time to our finances. It was enough to turn my suicidal ideation into a full blown chorus of, “Whatever it is, please let me die before the bills rise and rise and rise.” That’s what being an insured American who has fought for her life through cancer three times, abdominal hernias, gastric bleeds, Covid-19, MRSA, sepsis, and beyond generates. It isn’t conducive to much positive thinking or feeling even as people urge me to stay positive, focused on recovery, and allow time for healing.

      • HackadayLoad Cells To Get The Right Pet The Right Food

        If you have more than one pet, you may know how hard it is to tell how much each furry friend is eating. If you introduce prescription foods, then this minor annoyance can have a major impact on your pet’s health. Facing this dilemma, [tomasdiazwahl] set out to make a pet feeder that feeds his pets exactly what they need when they approach the feeder.

    • Linux Foundation

    • Security

      • HackadayRobot Opens Master Combination Locks In Less Than A Minute

        A common trope in bank heist B-movies is someone effortlessly bypassing a safe’s combination lock. Typically, the hero or villain will turn the dial while listening to the internal machinery, then deduce the combination based on sounds made by the lock. In real life, high-quality combination locks are not vulnerable to such simple attacks, but cheap ones can often be bypassed with a minimum of effort. Some are so simple that this process can even be automated, as [Mew463] has shown by building a machine that can open a Master combination lock in less than a minute.

      • Android PoliceMicrosoft Teams deemed unsafe to use by security researchers

        And it’s really all Microsoft’s own fault

    • Defence/Aggression

    • Environment

      • Energy

        • Silicon AngleWhite House releases framework for regulating digital assets

          The White House today released a regulatory framework designed to address risks in the cryptocurrency ecosystem, as well as support the development of new digital asset technologies.

          The release of the framework comes six months after President Joe Biden signed an executive order that directed the government to address the risks and harness the benefits of digital assets. As part of that effort, multiple government agencies have produced reports about the digital asset ecosystem. The agencies’ reports form the basis of the regulatory framework that the White House released today.

        • USAFACT SHEET: Climate and Energy Implications of [Cryptocurrency]-Assets in the United States

          [Cryptocurrency]-assets are digital assets that are implemented using cryptographic techniques. [Cryptocurrency]-assets can require considerable amounts of electricity usage, which can result in greenhouse gas emissions, as well as additional pollution, noise, and other local impacts to communities living near mining facilities. Depending on the energy intensity of the technology and the sources of electricity used, the rapid growth of [cryptocurrency]-assets could potentially hinder broader efforts to achieve U.S. climate commitments to reach net-zero carbon pollution.

        • ReutersEthereum blockchain slashes energy use with ‘Merge’ software upgrade

          The new system will use 99.95% less energy, according to the Ethereum Foundation. The upgrade, which changes how transactions occur and how ether tokens are created, could give Ethereum a major advantage as it seeks to surpass rival blockchain bitcoin.

    • Finance

      • Pro PublicaLake Charles Still Waits for Long-Term Disaster Aid

        She didn’t have the money to finish repairs on the home, which she couldn’t afford to insure. The Federal Emergency Management Agency had lent her the trailer as a temporary solution, but the deadline to return it was approaching, and she was facing the possibility of being forced to pay steep rent to keep living in it.

      • Common DreamsFirst Hit by Privatization, Puerto Rico in ‘Total Blackout’ as Fiona Makes Landfall

        Weather forecasters said the rainfall is likely to produce devastating landslides and severe flooding, with up to 25 inches (64 cm) expected in some areas. A Category 1 storm, with sustained winds of 85 mph, Fiona is nowhere near as powerful as Hurricane Maria which slammed the island in 2017, nearly five years to the day, as a Category 4 monster.

      • ScheerpostCorporate Media Is Trying to Convince People Student Debt Forgiveness Is Bad

        Luca Goldmansour critiques corporate media’s narratives about student debt relief.

      • ScheerpostShift from Fossils to Renewables Will Save $12 Trillion by 2050

        Mitchell Beer summarizes a report that reveals a green transition comes with huge savings.

      • Counter PunchRoyal Money: Charles III and the Wealth Dimension

        In June 2022, accounts for the Sovereign Grant, which cover funds for the official monarch and the household’s official expenses, was £86.3 million for the 2021-22 year.  Official expenditure came in at greater than the Sovereign Grant and supplementary income earned – a net expenditure amount of £102.4 million.  This registered an increase of 17% from the previous year.  Much of the inflation came from the reservicing of Buckingham Palace.

    • AstroTurf/Lobbying/Politics

      • YLEFirst lady to defend doctoral thesis

        Her thesis is entitled, “From the ideal of open dialogue to the reality of internal mobilisation—the strategic dimensions and dilemmas of parties’ digital campaigns.”

        Åbo Akademi political science professor Kim Strandberg, who will serve as Haukio’s opponent, took to Twitter to share the news.

      • Counter PunchWhy Our Electricity Prices Can’t Be Left to Bogus ‘Free Markets’

        It was the Chilean model that Margaret Thatcher copied in the UK, which then the EU copied. The UK dismantled its Central Electricity Generating Board (CEGB) that ran its entire electricity infrastructure: generation, transmission, and bulk distribution. This move also helped the UK shift away from domestic coal for its thermal power plants, breaking the powerful coal miners’ union. These were also the Enron market ‘reforms’ in California, leading to the summer meltdown of its grid in 2000-2001.

      • Counter PunchUK: Fragmentation and Decline Under Conservative Rule

        She was voted in, in a country of around 69 million people, by 81,326 (57.4% of the total gaggle) Conservative members. A tiny group, overwhelmingly old, posh, white, male, anti-Europe, anti-immigrant, anti-environment – pro-fossil fuels, backward-looking nationalists. A crazy bunch operating within a dysfunctional system that, like much of the UK parliamentary structure and the primordial electoral model, desperately needs reforming.

      • Counter PunchChina is the World’s Largest Economy: Get Over It

        Here’s the picture.

      • Common DreamsAs Migrants Confirm They Were Misled, Calls for Prosecution of DeSantis and Abbott Grow

        Amid confirmed reports that many of the migrants sent to Martha’s Vineyard last week by DeSantis had been misled by officials in Florida about the nature of their trip, immigration rights legal aides have said they intend to push for legal action to stop such abuses. As the New York Times reports:

      • Misinformation/Disinformation

        • New York TimesHow Russian [Astroturfers] Helped Keep the Women’s March Out of Lock Step

          More than four million people around the United States had taken part, experts later estimated, placing it among the largest single-day protests in the nation’s history.

          But then something shifted, seemingly overnight. What she saw on Twitter that Monday was a torrent of focused grievance that targeted her. In 15 years as an activist, largely advocating for the rights of Muslims, she had faced pushback, but this was of a different magnitude. A question began to form in her mind: Do they really hate me that much?

          That morning, there were things going on that Ms. Sarsour could not imagine.

          More than 4,000 miles away, organizations linked to the Russian government had assigned teams to the Women’s March. At desks in bland offices in St. Petersburg, using models derived from advertising and public relations, copywriters were testing out social media messages critical of the Women’s March movement, adopting the personas of fictional Americans.

        • Counter PunchErasing QAnon Fascism: A Case Study in Black Comedy

          In sum, Trump has posted QAnon related content more than 150 times between 2020 and 2022, and across multiple social media venues. It strains credulity to argue that one can accidentally post QAnon content 150 times. These posts are deliberate, and Trump is clearly part of a political community that’s committed to normalizing the QAnon movement and its values.

    • Censorship/Free Speech

      • Counter PunchBanned in the USA

        Most efforts to curtail access to books involves younger readers at schools and public libraries. There are recurrent themes to such challenges that result in the muting of voices from outside the so-called “mainstream” of American society. According to the ALA’s Office for Intellectual Freedom, the top ten most challenged books in recent years are by or about marginalized peoples, including BIPOC and LQBTQIA+ authors and characters; these books typically address complex, challenging issues such as sexuality, abuse, and violence; or they simply use profanity. Some of the books reference traumatic realities in people’s lives, others question the societal status quo on issues from police violence to heteronormativity or identity politics. Regardless, all are important works of literature, including many artistic and broadly appealing comics that have something to teach us, especially in educational settings. However, increasingly, parents and local community members around the country disagree.

    • Civil Rights/Policing

    • Digital Restrictions (DRM)

      • CoryDoctorow[Repost] Spotify steals from artists, a Spotify exclusive: More Chokepoint Capitalism stunt-publishing.

        You’ve probably heard about the pathetic sums that creators earn from the Spotify streaming, often blamed on the tech industry’s unwillingness to pay creators what they’re worth. Maybe you’ve also heard the rebuttal – that Spotify pays plenty to entertainment companies, but they intercept this money before it can get into creators’ pockets.

        That right there is the false binary – either Spotify is cheap, or the Big Three record labels are greedy. But what if – and hear me out here – Spotify is cheap and the Big Three are greedy? What if Spotify and the labels are actually colluding to rip off the “talent”? What if neither kind of monopolist is good for artists, and no matter how much we love them, they’ll never truly love us back?

      • [Old] Security Analysis of Remote Attestation [PDF]

        Remote attestation is a method by which a host (client) authenticates it’s hardware and software configuration to a remote host (server). The goal of remote attestation is to enable a remote system (challenger) to determine the level of trust in the integrity of platform of another system (attestator). The architecture for remote attestation consists of two major components: Integrity measurement architecture and remote attestation protocol.

        The remote attestation protocol proposed by IBM [3] is vulnerable to Man-In-The-Middle attack.

        We propose a modified version of the protocol that is secure. We have implemented a model of our proposed protocol on Murphi [7] to analyse the security properties of the protocol. This report describes the design of our protocol and it’s analysis using Murphi. We conclude that our proposed protocol is secure under certain assumptions of trust and can be used for remote attestation.

    • Monopolies

      • Cory DoctorowStructural Adjustment
      • [Old] Locus MagazineCory Doctorow: Tech Monopolies and the Insufficient Necessity of Interoperability

        The modern epidemic of tolerance for monopolies began 40 years ago, in the Reagan years, and every administration since has waved through blatantly anticompetitive mergers and turned a blind eye to grossly anticompetitive acts. The story of how this came to pass is tawdry and oft-told: it’s the tale of how switching competition law’s enforcement to focus on “consumer welfare” (low prices) destroyed labor markets, national resiliency, and the credibility of democratic institutions. It’s the story of how control over industries dwindled to a handful of powerful people who captured their regulators and got themselves deputized as arms of the government.

        That’s the story of how we got here. Now let’s talk about where we’re going.

      • TruthOutGoogle and Amazon Workers Demand End to Contract That Fuels Israeli Apartheid
      • Copyrights

        • [Old] Gizmodo20 Years Of Copyright Wars

          P2P users didn’t care. They just moved from “platforms” to “protocols”, switching to increasingly decentralized systems like Gnutella and BitTorrent – systems that, in turn, eliminated their own central points of failure in a relentless drive to trackerlessness.

          P2P users interpreted the law as damage and routed around it. What they didn’t do, for the most part, was develop a political consciousness. If “P2P users” were a political party, they could have elected a president. Instead, they steered clear of politics, committing the original sin of nerd hubris: “Our superior technology makes your inferior laws irrelevant.”

          P2P users may not have been interested in politics, but politics was interested in P2P users. The record industry sued 19,000 kids, singling out young P2P developers for special treatment. For example, there was the college Computer Science major who maintained a free software package called FlatLAN, that indexed the shared files on any local network. The labels offered him a settlement: if he changed majors and gave up programming computers, they wouldn’t seek $150,000 in statutory damages for each track in his MP3 collection.

        • Creative CommonsBetter Internet for a Decentralized Web: Conversations from Camp

          A few weeks ago, Catherine Stihler and I had the opportunity to attend DWeb Camp, a conference focused on the decentralized web that brings together a community of people around a set of collaboratively developed principles. The camp was a mix of conference and extracurricular sessions with extremely diverse and rigorous programming, balanced by free time to enjoy the outdoors.

        • Torrent FreakUnsealed Court Records Unveil Columbia Pictures’ ‘Timeless’ Anti-Piracy Secrets

          In the wake of the Hotfile lawsuit, the Motion Picture Association asked the court to keep some anti-piracy information forever out of the public eye. That was too long for Judge Williams who, after a slight delay, unsealed the contested documents last week. Among other things, the information reveals that for infringing video content to be flagged, it must exceed a certain duration.

        • Torrent FreakPiracy Advertising Researchers Fall Victim to Ransomware Attacks

          New research shared by the entertainment industry-backed Digital Citizens Alliance finds that 12% of all ads on pirate streaming sites are linked to malware. The problem is so bad that the researchers fell prey to multiple ransomware attacks. Intriguingly, the findings also suggest that pirate sites are ‘safer’ than before, although that greatly depends on which studies you look at.

  • Gemini* and Gopher

    • Personal

      • A story about information and memory

        This is a story that I have encountered myself. I wrote about it in my journal, but for reasons that should be clear when reading this, the public version will be censored somewhat. However, it is not necessary to tell the story.

      • Frustrating weekend

        This weekend sucked. I had absolutely no reason to be at the dance performance on Saturday (i.e. it was a huge waste of my time), I’m dreading going to work because of my boss, and the cat dumped a glass of water on my laptop.

        My boss and I got off on the wrong foot, so I’ve been trying to compensate for the shite working relationship — it’s difficult to shrug it off when he berated me on my eighth day of employment for something that happened before I had signed an employment agreement. I’ll see what he has to say tomorrow, and if it’s more bulshytt• I’ll just roll my eyes.

        My boss and I got off on the wrong foot, so I’ve been trying to compensate for the shite working relationship — it’s difficult to shrug it off when he berated me on my eighth day of employment for something that happened before I had signed an employment agreement. I’ll see what he has to say tomorrow, and if it’s more bulshytt• I’ll just roll my eyes.

    • Technical

      • Science

        • HackadaySolar Flare Quiets A Quarter Of The Globe

          In the “old” days, people were used to the idea that radio communication isn’t always perfect. AM radio had cracks and pops and if you had to make a call with a radiophone, you expected it to be unreliable and maybe even impossible at a given time. Modern technology,  satellites, and a host of other things have changed and now radio is usually super reliable and high-fidelity. Usually. However, a magnitude 7.9 solar flare this week reminded radio users in Africa and the Middle East that radio isn’t always going to get through. At least for about an hour.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Sunday, September 18, 2022

Posted in IRC Logs at 2:52 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 Qme3aGgenKYCAJrew7HJ4adE4bjA6jUkjTunpxmSovvpqB IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmVt1DcybCqYRb3BBE7XZ1SnA57b6WgcK17qZ3Ydh7NBgW IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmRNWcjYbP9bxWe4xt9sm9BkwQjvk99qWp12yr7tLexAJy IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVJjcxgFN7aNZEUWAjjEJ91dTYWpMS4jWYZQRP6hXqB46 IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmS8E9zAXnTCgfUiVfibPsLmjZtV6G7qNJbo5Go5LAZQLj IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmRT8h3qJF58sQXatghorfuEBZ91aNe7QvgGx1kj9AQQdy IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmeLx37Ki6stTV5Jkehd85jhkC6BSQDLK5BNqzpUr846Ke IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmVQGxvgCGrhMQ3UobNWGxSxaRfKrFqAdsvktQ9Kb4zQ4p IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): Qmac6ycg4HgCXK32zmYm12JDmDQfL8BtJPF89Q129UbkCn

Free as in Finance/Money: Salary of SFC’s Chief Rose to $216,000 Per Year ($18,000 Per Month), or More Than Twice the FSF’s Chief

Posted in Finance, Free/Libre Software, FSF at 1:15 am by Dr. Roy Schestowitz

Related: Software Freedom Conservancy’s (SFC) Income Fell 63% After Working to Oust the Founder of the Free Software Foundation (FSF), Richard Stallman

SFC salaries

Like Jim Zemlin:

I double my salary every few years

“Pro bono” (1:52-2:06):

She never wrote any Free/libre software, but she has long hair. On another occasion (also on video), she told the audience that she uses his lawyer “superpowers” only for good. The GNOME Foundation became a lot like the Linux Foundation and it is connected to it.

Summary: The above video and the latest IRS filing reveal that 'splinter group' SFC is increasingly about money (F for finance) instead of freedom

There is something opportunistic if not parasitic going on here. Statement from Eben Moglen & Mishi Choudhary, who left this past summer or only weeks ago (CC-BY-SA 3.0):

Concerning a Statement by the Conservancy

On Friday, while we were putting on our annual conference at Columbia Law School, a puff of near-apocalyptic rhetoric about us was published by SFLC’s former employees, Karen Sandler and Bradley Kuhn, who now manage the Conservancy, which was originally established and wholly funded by SFLC, and still bears our name. We were busy with our conference when this happened, which seems to have been the point. We are glad to have the chance now, after a little much-needed rest, to help everyone avoid unnecessary hyperventilation.

What Has Happened?

At the end of September, SFLC notified the US Patent and Trademark Office that we have an actual confusion problem caused by the trademark “Software Freedom Conservancy,” which is confusingly similar to our own pre-existing trademark. US trademark law is all about preventing confusion among sources and suppliers of goods and services in the market. Trademark law acts to provide remedies against situations that create likelihood of, as well as actual, confusion. When you are a trademark holder, if a recent mark junior to yours causes likelihood of or actual confusion, you have a right to inform the PTO that the mark has issued in error, because that’s not supposed to happen. This act of notifying the PTO of a subsequently-issued mark that is causing actual confusion is called a petition to cancel the trademark. That’s not some more aggressive choice that the holder has made; it is not an attack, let alone a “bizarre” attack, on anybody. That’s the name of the process by which the trademark holder gets the most basic value of the trademark, which is the right to abate confusion caused by the PTO itself.

The holder of the junior mark causing the confusion has of course a full range of due process rights to defend the mark that it has registered, as it should have. So the result is very like a trial, and is conducted before an administrative tribunal called the Trademark Trial and Appeals Board. Its job is to decide whether the PTO wrongly registered a mark likely to cause confusion, which the PTO isn’t statutorily authorized to do. The process is formal, conducted under rules like the Federal Rules of Civil Procedure, and its records are publicly accessible. This is not a proceeding in which anyone is seeking an injunction or claiming damages. The only question being asked is whether the PTO should have issued the trademark.

The junior mark causing the confusion was applied for in November 2011, almost a year after SFLC ceased representing the Conservancy; the Conservancy had its own lawyer, who signed the trademark application.

By no means does this situation justify the tone of defensive overreaction we heard from the Conservancy management on Friday, which was like reading a declaration of war issued in response to a parking ticket.

Why Didn’t You Settle This Between the Organizations?

We too think this is a very good question. We have tried repeatedly for almost three years to get a meeting with Karen and Bradley in order to discuss this and other claims we have concerning their and the Conservancy’s activities. In all that time, they have never once agreed to meet with us to hear and discuss our concerns. They have presented transparently dilatory responses, such as being “too busy,” or even “always too busy” when we asked them to set their own time. Sometimes we have not been offered so much as the courtesy of a refusal.

We have asked intermediaries—friends, business associates, comrades in the free software movement, other alumni of SFLC—to stress to Bradley and Karen the importance of opening negotiations. One would think this unnecessary with people who talk so frequently about the importance of communication and opening connections with respect to “compliance enforcement.” But here, when the shoe is on the other foot, no efforts on our part have gotten us the slightest progress in bringing about discussions to resolve differences.

We think that waiting more than thirty months after initial contact—and after repeated efforts at both direct and mediated communication seeking to open negotiations—is not too little time to allow before beginning to bring our claims.

Safety For Others

Friday’s response from the Conservancy’s management is grossly disproportionate, and—in view of their long-maintained refusal to communicate with us—irresponsible. The first responsibility of asset managers, who have others’ rights and valuables in their keeping, is prudence. One would hardly associate the word “prudent” with either their statement on Friday or the course of conduct over the last three years that it culminates.

Special concern should be expressed about the aspect of their statement darkly suggesting that we are creating risks for projects associated with the Conservancy. The driver of any risk, it seems to us, is the reckless refusal of the Conservancy’s management to negotiate with us for settlement of our claims, which has left us to pursue last-resort approaches we have done everything we could to avoid.

But we absolutely agree that within the free software community we must protect projects producing software from any avoidable risks in the organizational or legal situation around them. That’s what our law practice at SFLC is always about. Any project working with the Conservancy that feels in any way at risk should contact us. We will immediately work with them to put in place measures fully ensuring that they face no costs and no risks in this situation.

What Should Happen Next?

Everyone observing this situation, we suspect, knows the answer to this question. But we cannot bring to the table counterparties who have so far refused to meet us, and who on Friday used their communications energies greatly and unnecessarily to increase polarization, thus making diplomacy harder. We recognize this pattern in their conduct from other situations. We have spent the last eighteen months preparing to bring our claims in the various relevant fora. We are now, as we have been throughout, fully prepared to meet immediately for a discussion of all outstanding issues without preconditions. Otherwise, it seems evident that more shoes will drop.

Please email any comments on this entry to press@softwarefreedom.org.

This isn’t unprecedented. See FSFE and FSF: Leak: FSF/FSFE Trademark Dispute (FSF Demanding That FSFE Should Change the Organisation’s Name)

Links 19/09/2022: MX Linux 21.2.1 and 4MLinux 41.0 Beta

Posted in News Roundup at 12:10 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Linux Made SimpleLinux Weekly Roundup #200

      Welcome to this week’s Linux roundup. What an exciting release, number 200! I can’t believe it myself.

      We had a wonderful week in the world of Linux releases with Fedora 37 Beta and EndeavourOS 22.9.

    • DebugPointDebugPoint Weekly Roundup #22.05: New Web Browser Ladybird, Plasma for TV and More

      Here’s the weekly roundup #22.05 for you across the GNU/Linux and tech world.

      Welcome to the DebugPoint Weekly roundup #22.05, where you can find all the happenings from this week, mainly from the Linux and open-source space. It’s been a quiet week in the distro and desktop space; however, most of the update is seen on apps.

    • Linux LinksLinux Around The World: Chile – LinuxLinks

      We cover events and user groups that are running in Chile. This article forms part of our Linux Around The World series.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 6.0-rc6
        So this is an artificially small -rc release, because this past week
        we had the Maintainers' Summit in Dublin (along with OSS EU and LPC
        2022), so we've had a lot of maintainers traveling.
        Or - putting my ridiculously optimistic hat on - maybe things are just
        so nice and stable that there just weren't all that many fixes?
        Yeah, I know which scenario I'm betting on, but hope springs eternal.
        Regardless, things look fine. I am expecting rc7 to be larger than
        usual due to pull requests having shifted one week later, and in the
        worst case that might mean that I might feel like we need an extra
        rc8, but for now I'm going to assume it's not going to be _that_
        noticeable and hope we'll just keep to the regular schedule.
        But it would be lovely if everybody gave this some extra tender loving
        care in the form of extra testing...
      • Linux 6.0-rc6
    • Graphics Stack

    • Applications

      • Axel BeckertAxel Beckert: wApua 0.06.4 released

        I today released version 0.06.4 of my WAP WML browser wApua and also uploaded that release to Debian Unstable.

        It’s a bugfix release and the first upstream release since 2017.

    • Instructionals/Technical

      • Linux at 1440p with the Gigabyte M34WQ Ultrawide Monitor | BIOSLEVEL

        Sometimes there simply isn’t enough screen real estate to multitask efficiently. There are tools out there to organize your workspace such as virtual desktops and workspaces, however that doesn’t always solve the problem based on how many open applications there may be. Without lowering the DPI on a 1080p monitor to an eye-straining level, the best option is upgrading to a larger monitor with a higher resolution.

        At the time of writing this article, Gigabyte’s M34WQ monitor can be found on Amazon and Newegg for around $400, making it very affordable compared to even a few years ago when a 34” monitor could go for a 50% or even 100% higher price. I was looking to replace my 29” ultrawide that was limited to a 1080p resolution, so I pulled the trigger. We filmed a brief unboxing video and I’ve now been using the monitor for about a week.

      • Linux HintHow to Delete Search Engine in Chrome

        A search engine is an internet tool through which we can search any information, content, and images from any website that is found on the internet. Every search engine has its algorithm. These algorithms are always changed according to the experience of the user. Search engines have special web crawlers for indexing the web information from the web pages. Whenever a user searches for specific information in the search engine, the ranked web pages appear first because they are useful for the users.

        We have many search engines whose main objective is to show the relevant pages based on keywords query. The most renowned and widespread search engine out of all of them is called “Google”. Google search engine offers good web results due to its advanced algorithms, efficient crawlers, and index ranking. Google shows the top-ranked pages, not in its search engine but also in other search engines. Every application has an option to customize the search engine. Here, we will see how to remove or delete the search engine from the Chrome web browser.

      • ID RootHow To Install SMPlayer on Debian 11 – idroot

        In this tutorial, we will show you how to install SMPlayer on Debian 11. For those of you who didn’t know, SMPlayer is a free media player for Windows and Linux with built-in codecs that can play virtually all video and audio formats. It uses MPlayer in the backend and adds some interesting features like the possibility to play youtube videos or download subtitles.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the SMPlayer on a Debian 11 (Bullseye).

      • Linux HintHow to Edit File in Linux

        If you’re new to the Linux operating system and want to learn some basic points, you’re in the right place. This tutorial is mentioning one of the general beginnings points you should know about.

        How to edit a file while using the Linux system is the question that arrives in every beginner’s mind. When executing programs on a system, sometimes we need to modify them in a timely manner. You can perform such tasks through two of the most used editors’ i-e, nano editor, and vim editor.

      • Linux Hint4 Ways to Find CPU Cores In Linux

        CPU Core or we call them CPU Processors are the ones who run machine code. Multiple cores in the system responsible for the execution of multiple program instructions at a time. Some of the systems contain dual-core, some quad-core (4 cores), and even the latest generation can have 18 cores.

        Similarly, in Linux operating systems, CPU cores work as processors that help to enhance system performance. While working with the system you must have information regarding processors and their performance.

      • ByteXDHow to Use Rsync with SSH Keys – ByteXD

        This tutorial teaches you how to sync files between two Ubuntu 22.04 desktop machines using rsync with SSH keys.

      • Linux HintHow to Execute Binary Files in Linux

        Binary files or bin files are executable files in the operating system also known as non-text files. These files can contain anything in it like images, compiled files, metadata, chain of sequential bytes or a text file having encoded binary data.

        In Linux and Unix-like operating systems, .bin files contain machine code in it and can be executed on the system. All the data encoded in binary files cannot be readable by humans. These files can store anything except text.

      • Linux CapableHow to Install SMPlayer on Debian 11 Bullseye

        SMPlayer is free, open-source software that can be used on any operating system. It has been localized in more than 30 languages, making it easy to enjoy your favorite videos no matter what language(s) are spoken around them! A front end called SMplayer offers graphics tools from Mpv (a forks version), along with its interface widgets provided by qt. This player also falls under the terms given out through GPL v2 or later versions which ensures freedom while providing access via financial means if desired so long as copyright restrictions aren’t violated during use. The best media players are also portable, so you can carry them around on a USB drive and use them without leaving traces behind. SMPlayer is worth trying for this reason alone!

        The following tutorial will teach you how to install SMPlayer Debian 11 Bullseye using a third-party repository with the command line terminal.

      • UNIX CopHow to perform a simple Debian monitoring using Monitorix

        In this post, you will learn how to perform a simple Debian monitoring using Monitorix.

      • Linux HintHow to go up a Directory in Linux

        While working on the system, we always work on different folders to save files or other data. In Linux and Unix-Like systems, these folders are known as directories. Directories are the location where we save our data in the form of different files.

        Sometimes, while working on a system, we need to switch our location and move to another directory. As all the work in the Linux system is done through commands. To move our location or change the current working directory, Linux has introduced the change directory command which is famous as the “cd” command in Linux. It is simple to use the cd command whether you want one level up directory, to navigate one level back, multiple directories navigation, or to navigate towards the root directory or home directory.

      • Linux CapableHow to Install mpv Media Player on Rocky Linux 9

        MPV is a free, open-source, highly versatile media player that supports various video and audio codecs. It has comprehensive playback, audio, and video control options, as well as support for different input URL types for reading input from a variety of sources other than disk files. MPV’s comprehensive control options allow users to customize their watching experience extensively, and the input URL support means that users can watch content from various sources. MPV is an excellent media player for those who want a high degree of control over their playback experience.

        The following tutorial will teach you how to install mpv Media Player on Rocky Linux 9 using the EPEL 9 repository or the natively installed Flatpak third-party package manager.

      • Linux CapableHow to Install FreeOffice on Debian 11 Bullseye

        FreeOffice is a free, open-source office suite with a word processor, spreadsheet application, and presentation program. The suite is compatible with Microsoft Office, making it an ideal choice for users who want an alternative to expensive proprietary software. FreeOffice offers all the features of a mainstream office suite, including support for complex documents, multimedia elements, and more. The suite also includes several unique features, such as the ability to open and edit password-protected files. Whether you’re looking for an affordable alternative to Microsoft Office or a free and open source option, FreeOffice is worth checking out.

        In the following tutorial, you will learn how to install FreeOffice on Debian 11 Bullseye desktop with the official SoftMaker APT repository using the command line terminal and instructions on how to update and remove the software in the future if required.

      • Linux HintHow to Install Clonezilla on Linux Mint 21

        Clonezilla is an open-source Linux distribution suite used for x86/amd64 based computers. Like other clone applications, Clonezilla is also a cloning program used for the deployment of operating systems. This cloning solution is powerful and reliable with the wide support of different operating systems like Windows, Chrome OS, MacOS and Linux file system. However, its support for users has limited but rich features.

      • Linux CapableHow to Install KeePassXC on Debian 11 Bullseye

        KeePassXC is an application that can be used by anyone who wants a high level of security for their data. The cross-platform feature can be used on any computer, and the light interface makes it easy to use. Additionally, the application is published under the GNU General Public License terms, which means that it is open source and free to download and use. KeePassXC uses a database format compatible with KeePass, making it easy to transfer data between the two applications. KeePassXC also offers many features, including creating multiple databases, encrypting databases with a master key, and generating strong passwords. In addition, KeePassXC provides support for plugin development, allowing users to extend the application’s functionality. As a result, KeePassXC is an ideal choice for anyone who wants a robust and secure password manager.

        In the following tutorial, you will learn how to install KeePassXC on Debian 11 Bullseye using a third-party repository for the latest version, along with tips on how to maintain the software in the future using the command line terminal.

      • Setting up FreshRSS on the Raspberry Pi – Pi My Life Up

        FreshRSS is a free and open-source RSS aggregator and reader that you can run locally on your Raspberry Pi.

        This software allows you to easily follow any website that provides an RSS feed and place it all into one easy-to-read feed. Even our website offers an RSS feed that you can use to see our latest tutorials.

        With the shutdown of many of the more prominent RSS aggregators having your own self-hosted service is a must. You won’t ever have to worry about hopping from service to service.

      • uni TorontoWhat’s lost when running the Prometheus host agent as a non-root user on Linux

        This is not quite true, although how much it is and isn’t true has varied over time, kernel versions, and also on what host agent information collectors you have enabled. Today, for my own reasons, I decided to get current information on what metrics you lose when you run the current version of the host agent as a non-root user, primarily on an Ubuntu 22.04 server.

        (As I write this, the current version of the host agent is 1.3.1, released December 1st 2021. The host agent doesn’t see much change.)

      • Running Changedetection.io on the Raspberry Pi – Pi My Life Up

        Changedetction.io is a service designed to detect whether changes have been made on a specific website. This is like a more advanced version of our Python website monitor project.

        This service works by grabbing a page’s output periodically. Then, anytime a change is noticed, the service can send you a notification, presenting you with an easy way of seeing what exactly changed since the last update.

        The Raspberry Pi makes an excellent choice for Changedetection.io as it is a relatively low-powered device that can be affordably left running 24/7.

        Please note for the best experience, you will need to use the 64-bit version of Raspberry Pi OS. However, Changedetection.io still works fine on 32-bit. You just won’t be able to detect changes on websites that require JavaScript to display.

      • DebugPointAdjust Color Temperature of Screen Using Terminal in Ubuntu

        In this quick guide, I will show how you can adjust the color temperature of your screen in Ubuntu using the terminal.

        No additional GUI installation is required, and you can enjoy the night light even if your desktop environment doesn’t provide a native one.

      • Linux HintRedirect URLs in NGINX

        NGINX is a slightly elevated, fully accessible, free IMAP/POP3 VPN, HTTP web service, and reverse VPN connection. NGINX attributes are good speed, reliability, functionality customization, easy setup, and low resource consumption. It has many features, and many more might be added as plugins during installation. The topics discussed in this article are changing insecure (port 80) URLs to encrypted versions, changing an IP request to a DNS server, and changing any other domains to the main domain.

      • ID RootHow To Install VeraCrypt on Debian 11 – idroot

        In this tutorial, we will show you how to install VeraCrypt on Debian 11. For those of you who didn’t know, VeraCrypt is a free open-source disk encryption software. It can encrypt whole partitions or storage devices and is also capable of creating Encrypted Virtual hard drives. It is a perfect solution for anyone who wants to keep their data safe and secure. VeraCrypt is available for Linux, Windows, and macOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the VeraCrypt on a Debian 11 (Bullseye).

      • DebugPointHow to Install VirtualBox Guest Additions in Fedora Linux

        The most simple way to install VirtualBox Guest additions in Fedora and related distros.

        When you install Linux on a virtual machine, it is often designated by the guest system. And the host system is where you install the VirtualBox application.

        Oracle’s VirtualBox provides a set of device drivers and apps which helps to achieve data and other communication between guest and host system. For example, if you want to share folders, drag and drop a from from host to guest and so on. Here’s some of the cool features of Guest Additions.

      • ID RootHow To Install Java on AlmaLinux 9 – idroot

        In this tutorial, we will show you how to install Java on AlmaLinux 9. For those of you who didn’t know, Java is a cross-platform, object-oriented, and multipurpose programming language that is primarily used for creating mobile, web, and cloud applications. Java was developed by Sun Microsystems (which is now the subsidiary of Oracle) in the year 1995.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Java programming language on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

      • How does Microservice Architecture work? – NextGenTips

        Microservice architecture is a distinctive method of developing software that focuses on building single-focused modules with well-defined interfaces and operations.

      • Linux HintInstall Multiple Domains NGINX server

        NGINX is open-source software that can be used for media streaming, caching, reverse proxies, web serving, and other functions. It originally began as a web server built for utmost speed and dependability. A request sent to one of the websites served by an NGINX server is handled by the virtual host whose domain name matches the one in the URL.

      • Linux HintIntrusion Detection with Snort

        This article explains how to install Snort and how to get started with Snort alerts and rules to successfully implement an Intrusion Detection System.

        Snort is an Intrusion Detection System which analyzes the traffic and packets to detect anomalies, such as malicious traffic, and report them. If you are not familiar with Intrusion Detection Systems, you may want to start reading the final conclusion on them. If you want to go straight to practical instructions, keep reading.

        After reading this article, you will be able to install Snort on Debian and RedHat based Linux distributions, set different Snort modes, define alerts and rules. The Snort usage instructions in this tutorial are valid for all Linux distributions.

        All instructions in this document contain screenshots to make it easy for all Linux users to understand and apply them.

      • AddictiveTipsHow to install Nginx on Ubuntu Server

        Nginx is an HTTP web server for Linux and other server platforms. It is considered the most complete alternative to the Apache web server. This guide will show you how to set up Nginx in Ubuntu Server.

      • DebugPointHow to Install Oracle VirtualBox in Fedora Linux

        A simple and easy-to-follow guide on how you can install Oracle VirtualBox in Fedora Linux.

        VirtualBox is an Oracle application which helps you to create virtual machines for any operations system. It’s a little more advanced and brings several features such as networking, USB, NVMe support, etc. between guest and host systems.

        Although, there are other free and open-source virtual machines are available, such as virt-manager or GNOME Boxes. And they are simple to install and use. But in this guide, I will talk about how to install Oracle’s VirtualBox which many wants to try it out.

    • Games

      • Boiling SteamHideo Kojima Trying out the Steam Deck at the TGS 2022, and His New Podcast called Brain Structure – Boiling Steam

        Hideo Kojima, the famous creator of the series Metal Gear Solid (with Konami) followed by the most recent Death Stranding, is a frequent visitor of the Tokyo Games Show 2022 (TGS 2022). When he used to work at Konami he led several sessions to talk about his upcoming games. This time around, there was no special booth for Kojima Productions, apart the ones dedicated to selling merch to guests.


        It would be fairly unlikely that Kojima has tried the Steam Deck for the first time. So why do it so publicly in front of the cameras? My educated guess is that this is some kind of promotion or endorsement of the Steam Deck by Kojima. Valve has probably secured the good will of most of the games shown at the show on the Deck from the publishers and developers themselves: at the end of the day it’s a win-win situation for everyone. The Steam Deck gathers attention, and their games end up being seen and played on the device.

      • Linux Links10 Fun Free and Open Source First Person Shooter Games: Part 2 – LinuxLinks

        This is a computer game genre focused on guns and other weapon-based fighting using a first-person perspective. They are a type of three-dimensional shooter game. Pick up your weapon, enter the battle arena, and take on your enemy in these fast and furious games.

        It’s sometimes claimed that the concept of a first-person shooter originated with the release of Doom, almost 30 years ago. While Doom was definitely not the first in this genre, although it was an important game in promoting the genre. One of the earliest FPS games was Spasim (“Space Simulation”) released in March 1974. The game included wireframe 3D graphics, local multiplayer, the first-person perspective, and ships and weapons based on Star Trek. The game was played on the PLATO computer system and was heavily influenced by another PLATO space multiplayer game Empire.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • DEV CommunityGSoC 2022 with GNOME: Final Report – DEV Community

          This post marks the ending of my GSoC’22 journey with GNOME. I worked on the database migration and managing user model for the GNOME Health Application. Let’s take a deep dive into the project.


          Health is a Health and Fitness Tracking application. It helps the user to track and visualize their health indicators better. That means a user can track down their activities and weight progressions. The project is created and maintained by Rasmus Thomsen, who is also the mentor of my GSoC project.

  • Distributions and Operating Systems

    • Reviews

      • Distro WatchReview: Porteus 5.0

        Porteus is based on Slackware, which may be the most old-fashioned, command line-driven distro in the Linux community, including and particularly for installation. Nevertheless, Porteus’ developers have come up with a live desktop distribution (with eight desktops for x86_64) that is portable and aims to be persistent. In other words, so much of what Slackware is not — and does not want to be.

        Does your brain hurt yet? Because mine does.

        I spent a couple of weeks with three of the desktops – Xfce, KDE, and Cinnamon – and found that, yes, a Slackware-based distro can offer a live desktop that is portable and snappy. But it’s far from straightforward to use or configure, and especially if you want to do more than marvel at how slick the desktop looks and acts. Package management, to quote from the Porteus forum, ain’t pretty: “Package management (and dependency resolution) is a perpetual issue in this Slackware based Porteus.”

        And getting persistence to work? Just writing that sentence made my brain hurt yet again; I was never able to do it. Maybe the best way to explain the difficulty is with this analogy: You may be able to troubleshoot how to save changes to a Porteus USB stick so they’ll be there the next time, but it’s like walking around the block four times in order to cross the street – a lot of effort for something that should take almost no effort at all.

    • New Releases

      • 4MLinux Blog4MLinux Releases: 4MLinux 41.0 BETA released.

        4MLinux 41.0 BETA is ready for testing. Basically, at this stage of development, 4MLinux BETA has the same features as 4MLinux STABLE, but it provides a huge number of updated packages.

      • OSMC’s September update is here with Debian 11 (Bullseye) – OSMC

        In May, we released test builds of Debian Bullseye for all supported OSMC devices. For the next four months, we’ve been working hard on a number of improvements and fixes to ensure that OSMC is released on the latest version of Debian with the best experience possible.

        We are still shipping Kodi v19.4, as a 19.5 point release has not yet been finalised. However we have updated the version we ship to the latest commit on the Kodi Matrix branch.

      • MX LinuxMX-21.2.1 ‘Wildflower’ released! – MX Linux

        Updated iso images

        We are pleased to offer MX-21.2.1 for your use.

        MX-21.2.1 is a special update of our MX-21.2 release. After so many users had issues with debian’s grub-pc update, we decided to update our official media so that fresh installs would not be confronted with the grub update right out of the box. If you already have MX-21 installed, there is no reason to get this iso, as all updates come through the regular channels.

        Highlights include:

        Debian 11.5 “bullseye” base, including the latest grub updates.

    • SUSE/OpenSUSE

      • SUSE is my new distribution (new job)

        This week I’ve started to work at SUSE. I’ll be working as Python Specialist, in the packaging team, so I will go back to work on packaging and distribution after more than ten years. My first job in 2008 was working on a Ubuntu based local distribution, Guadalinex, so packaging and distribution work is not something new for me.

    • Fedora Family / IBM

      • A Smorgasbord Of Power Systems Stuff – IT Jungle [Ed: Please note that Timothy Prickett Morgan and co are doing this IBM fluff on IBM's payroll, so it is not journalism per se]

        It is usually pretty quiet on the IT front in the wake of the American Labor Day holiday, especially with a lot of European countries also having bank holidays around that time and many schools just starting back up again. Here in 2022, it is no different, although IBM did uncharacteristically launch the full subscription entry Power S1014 server aimed at IBM i customers on September 6.

      • The Security Awareness Of People Is The Important Firewall In IT – IT Jungle

        This is not something that just happens to small and medium enterprises using IBM i platforms to run their critical systems. Just last week, ride sharing juggernaut Uber – known for the sophistication of its technology – was hacked in precisely this manner, and very embarrassingly and publicly. According to a report in the Wall Street Journal, the Uber hacker tricked an Uber employee into providing access to the company’s virtual private network, and from there was able to gain access to the privileged access management server, which houses access to all of Uber’s critical systems – it’s HackerOne security account, its Slack channels for developers, its internal VMware virtual infrastructure, and its cloud services on Amazon Web Services and Google Cloud. The hacker has not done anything except roam around and show off the access with screen shots, but it shows how important the human link is in this chain of security.

      • Pandora FMS Log Monitoring Solution Gets IBM i Hooks – IT Jungle

        Pandora FMS, an open source log monitoring solution that has been in use for decades, is being integrated with IBM i, the software’s commercial backer announced last week. Thanks to a partnership between Pandora FMS and the French company M81, organizations that use the software can add IBM i into the monitoring mix.

      • As I See It: Different Yet the Same

        It is among the most common of human yearnings: the desire to see oneself as special and distinct from the herd. Individualism, coupled with exceptionalism has long been ingrained in American mythology.

      • IBM i PTF Guide, Volume 24, Number 38
    • Open Hardware/Modding

      • CNX SoftwareAdd 18650 batteries underneath Raspberry Pi with the Red Reactor board (Crowdfunding) – CNX Software

        Pascal Herczog’s Red Reactor is a battery power supply project that adds two 18650 batteries to Raspberry Pi 4, Raspberry Pi 3, or Raspberry Pi Zero board using the pogo pins for connection. The pogo pin method means the Red Reactor is attached underneath the board, as such does not prevent the user to add a HAT expansion board on top of the single board computer. There’s also a headerless version for custom setup or compatibility with boards such as Arduino, Banana Pi, Orange Pi, etc… where some soldering is required.

      • Linux HintHow to Get Hex File from Arduino IDE

        Arduino IDE is a development platform used to upload code in Arduino boards. Arduino boards are based upon microcontrollers. To communicate with a microcontroller IDE is used. IDE is an editor for writing, debugging, and uploading sketches to Arduino boards. IDE is programmed in C or C++ with some additional methods and functions. Microcontrollers understand machine language. Once Arduino code is compiled, IDE converts C++ language program into a Hex file. Now, we will describe how to get this Hex file from Arduino.

      • Linux HintCan Arduino Damage (or Kill) Your Computer

        Arduino is an electronic development board designed for a wide range of applications. When we say electronic it means we have to deal with current and voltages. A question comes to the minds of many beginners: is Arduino harmful for my computer? Can Arduino burn or damage my laptop? Answers to all these questions will be covered in this Article.

      • Linux HintCan I Connect a 9V Battery to Arduino

        Arduino is an open-source development platform designed for beginners, hobbyists, teachers, and engineers. Arduino is popular due to its flexibility and ease of use. Arduino provides multiple ways to interact with it, especially when it comes to powering Arduino. Arduino boards can be powered up using three different methods: USB port, DC barrel jack and Vin pin. Here we will discuss how a 9V battery can be used in powering an Arduino.

      • Linux HintCan You Program Arduino Online

        Normally Arduino boards are programmed using Arduino IDE which is an offline tool but with changing time cloud IDEs are gaining momentum. Arduino Web Editor is one of the best examples as it allows users to write and save their sketch in Arduino Cloud. It helps Arduino users to access and share Arduino sketches from anywhere regardless of place and system. We just need a browser and an internet connection.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • GNU Projects

      • Mark J. Wielaard – Blog Archive » Sourceware Infrastructure / Conservancy / GNU Toolchain at Cauldron

        But when I said that at the end I also would like to discuss the recent Sourceware as Conservancy member project proposal and that I had asked both Conservancy and FSF members to call in to help with that discussion there was what felt like a shouting match. It was the first time I felt an in-person event was worse than an email discussion. Hopefully people will calm down and restart this discussion on the sourceware overseers list.

    • Programming/Development

      • Linux Made SimpleHow to install GoLand 2022 on a Chromebook

        Today we are looking at how to install GoLand 2022 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Using Mock is easy | FrostyX.cz

        There are a lot of articles and documentation pages explaining how to use Mock but I am hesitant to share them with new Fedora packagers because they make the tool look much scarier than it actually is. Using Mock is easy!

      • PHP Data Types – Pi My Life Up

        In this guide, we will touch on the different data types that you can use in the PHP programming language.

      • API as a package: Structure

        At Jumping Rivers we were recently tasked with taking a prototype application built in {shiny} to a public facing production environment for a public sector organisation. During the scoping exercise it was determined that a more appropriate solution to fit the requirements was to build the application with a {plumber} API providing the interface to the Bayesian network model and other application tools written in R.

        When building applications in {shiny} we have for some time been using the “app as a package” approach which has been popularised by tools like {golem} and {leprechaun}, in large part due to the convenience that comes with leveraging the testing and dependency structure that our R developers are comfortable with in authoring packages, and the ease with which one can install and run an application in a new environment as a result. For this project we looked to take some of these ideas to a {plumber} application. This blog post discusses some of the thoughts and resultant structure that came as a result of that process.

      • The broken bridge between biologists and statisticians | Multi-environment split-plot experiments

        Have you made a split-plot field experiment? Have you repeated such an experiment in two (or more) years/locations? Have you run into troubles, because the reviewer told you that your ANOVA model was invalid?

      • R Markdown Lesser-Known Tips – Tricks #4: Looks Better, Works Better – RStudio

        The R Markdown file format combines R programming and the markdown language to create dynamic, reproducible documents. Authors use R Markdown for reports, slide shows, blogs, books — even Shiny apps! Since users can do so much with R Markdown, it’s important to create high-quality documents that take advantage of available features.

      • JCSAmend 3.6 Released
      • A Review of Games Written in R on CRAN | Dr. Rick Tankard

        R is primarily designed for statistical computing and graphics, and that’s where I’ve spent most of my time in R. This includes developing an R package, exSTRa, for my PhD. R isn’t an ideal language for video games, without native support for reactive programming. Though where there’s computing, there are games.

      • Saturn Elephant – The ‘Reorient’ transformation

        If you follow my youtube channel then you have certainly seen the “ball” of twenty Hopf tori. Sometimes I call it the “Hopf flower”. How is it done?

        Well, firstly, I take twenty points on a ball: the twenty vertices of the compound of five tetrahedra. Then, I construct one Hopf torus, and for each of the twenty points I reorient it towards this point and I translate it to this point. This post is about the transformation used to reorient.

      • Matt RickardGraphQL Trades Complexity

        GraphQL decouples the frontend team’s data needs from the teams managing the API and data layers.

        GraphQL was first deployed for Facebook’s native mobile applications. Clients and backends had rapidly diverging data needs. Mobile clients were different than web clients. Some APIs didn’t even exist (e.g., hydrated serverside and sent as HTML). iOS applications might rarely (or never) be updated.

      • HaikuOSGSoC 2022 Final Report: Improving the Calendar Application

        A Calendar application is a must have application for any operating system and is beneficial for end users as well as developers. Having a feature-rich Calendar might not sound like a big deal, but it can drastically impact your performance at work and personal life.

      • HaikuOS[GSoC 2022] Ham: Final Report

        Hello everyone. Thank you for having me the past few months; it’s been a busy, fun ride. This is the final report for Ham, a replacement to the Jam build system.

        I’d like to thank Stephan Aßmus for taking the time to mentor me, and the rest of the Haiku community for being responsive and receptive to Ham’s development.


        This project is a continuation of Ingo Weinhold’s original Ham project, which paused development in 2013. Over the course of the GSoC period, I completed the evaluation portion of Ham, which converts a Jam build system into a series of commands to run.

      • PCIe CXL investigation

        I’ve been asked to look in to PCIe+CXL with an eye to supporting some subset of it in our future internal Linux Kernel. These are my notes.

        There is a cxl_test module the Linux tree under tools/testing/cxl/.

        There is a cxl command line tool. On Ubuntu and CentOS you install it via the ndctl package. This is short for libnvdimm, or Nonvoltile Memory. I think it is needed for CXL Kernel tests, but it is interesting in its own right, too.

      • Python

        • Linux HintPandas Vlookup

          “Pandas” is a great language to perform the analysis of data because of its great ecosystem of data-centric Python packages. That makes the analysis and the import of both factors easier. The “vlookup” stands for the “vertical lookup”. It is used to merge the two different tables in the DataFrame where there should be some common attributes between them (the two tables). As an output, we will get a single table that consists of the data from both the common tables. This is similar to the one lookup function used in “excel”. We will implement all of the possible methods in which the Pandas vlookup is used. For the execution of the codes, we will use the “Spyder” which is a software that is written in “Python” in a friendly language.

        • Linux HintPandas Check Version

          “Pandas” is an open-source “Python” library. It is utilized for the evaluation of data. The version is deployed each year. Sometimes, earlier, the changes and updates occur continuously. At times, it is kind of important to know the version that we use in the installed Pandas library. For example, if we install it a year ago, it won’t be of the same version as when we installed it. It would have been updated once for sure and maybe twice the possibility is there. So, how will we recognize the exact version that is currently used?

          For this, Pandas come up with a function that makes it easier for anyone to use it for the knowledge of the version used. It works for Linux, Windows users, and mac users as well. We will discuss all of the possible ways in which we can perform the check of the “Pandas version”. For the implementation of the code, we will use the “Spyder” software since it is a Python language based friendly software to perform the code.

      • C++

        • Linux HintFor Loop C++

          In C++, loop statements repeat a certain piece of code or statement. They are mostly used to shorten code by performing the same function more than once and to cut down on redundancy. For loops, while loops and do-while loops are only a few of the loop types supported by C++. Each has a unique syntax, benefits, and application. When we wish to run a block of code repeatedly, we utilize the programming control structure known as the loop. Typically, it keeps running and stops when a certain criterion is met. You will discover a crucial idea in this post, namely C++ For Loop.

        • Linux HintAtan C++

          Math, statistics, and computer programming languages work hand-in-hand. Formula used in stats or math sometimes need to be implemented in computer programming languages. These functions and formula work the same in all subjects. The only difference is the implementation. This article is designed to teach how to implement atan() function in the c++ programming language.

        • Linux HintC++ Modulus

          In many programming languages, we often use an operator named “modulus” with the symbol representation as “%”. This modulus operator is used to find the remainder when the two numerical integers or numbers are divided by each other. This operator takes the two operands: dividend and divisor. What is left after their division is done is the remainder, X % Y = R; where X and Y are dividend and divisors respectively and R is the remainder. We use this remainder as a piece of information if we want to know whether or not the two dividing numbers are factors of each or not. We also use the remainder to let us know if the number is even or odd.

        • Linux HintC++ Tuple

          Working with any programming language requires using tuples, lists, arrays, and etc. The arrays, lists, and tuples offer the same services with slight differences. A tuple is an object that holds an order list of items. It is just like an array and a list, however, they both are mutable, but the tuple is immutable. An immutable object cannot undergo any changes during execution. The list and array can easily be modified, sliced, or indexed since they are mutable. But a tuple cannot be modified, sliced, or changed since it is an immutable object. Moreover, the list and array can only store one type of data, but a tuple can have data of multiple types. In this guide, we will discuss the main function of a tuple and how it can be used in a c++ program.

        • Linux HintC++ Mutex Lock

          C ++ is known to be one of the fastest programming languages with good performance, high precision, and an adequate memory management system. This programming language also supports the concurrent execution of multiple threads with the sharing of multiple resources between them. In multithreading, the thread is only to perform the read operation that makes no issues since the thread does not get affected by what the other threads are doing at that time. But if these threads had to share the resources between them, one thread can modify the data at that time which makes the issue. To deal with this problem, we have the C++ “Mutex” which prevents the access of multiple resources towards our code/object by providing the synchronization which states that the access to the object/code can be provided to only one thread at one time, so that multiple of threads would not be able to access that object simultaneously.

        • Linux HintStol() Function in C++

          C++ is one of the most popular and oldest programming languages used for the development of high-performance applications. It is used among highly expert programmers and novice developers. It is mainly used in game development and is an ideal option for developing operating systems. When writing code in the C++ language, you may come across converting data from one type to another. In this article, you will learn to convert a string into a long integer. It is quite difficult to convert a string into any other format. However, the C++ programming language provides a quick and efficient way to convert strings into integers.

      • Redis

        • Linux HintRedis DECR

          The string type is the most fundamental data type that Redis offers. Redis strings are capable of storing texts, serialized JSON objects, images, audio, and even numerical values. In this guide, we will focus on the numerical values and the manipulation of integers. Redis doesn’t support the separate integer data types to hold the numerical data. If a Redis key contains a string that can be represented as an integer, Redis can interpret the number values as base-10 64-bit signed integers.

        • Linux HintRedis EXPIRE Hash Key

          Redis hashes are a special kind of data type which is a lot more similar to the JSON object, Java HashMap, or a Python dictionary. Furthermore, it is a collection of field-value pairs that can be used to model domain objects. Redis hash data structure is extremely memory efficient where each hash key can store up to four billion field-value pairs. Most importantly, the fundamental hash operations like HSET, HGET, HMGET, etc. operate on constant time complexity.

      • Rust

        • Dyn async traits, part 8: the soul of Rust

          In the last few months, Tyler Mandry and I have been circulating a “User’s Guide from the Future” that describes our current proposed design for async functions in traits. In this blog post, I want to deep dive on one aspect of that proposal: how to handle dynamic dispatch. My goal here is to explore the space a bit and also to address one particularly tricky topic: how explicit do we have to be about the possibility of allocation? This is a tricky topic, and one that gets at that core question: what is the soul of Rust?

  • Leftovers

    • Nicholas Tietz-SokolskyI’m taking a sabbatical and attending Recurse Center! | nicholas@web

      It’s been almost a decade since I graduated from college. In that time, I’ve worked at three startups, co-founded a non-profit immigration tech company, consulted for the United Nations, and noped out of grad school after one semester (twice!). I’ve also struggled with depression and anxiety, had three different therapists, and tried multiple different anxiety and depression medications. And I’ve adopted three cats, met and married my wife, and had two kids with her.

      During that decade, I’ve kept learning. On the job. On the weekends. In my evenings. I’m tired.

      During that decade, I’ve not had time to sit down and really dive deep into becoming a better programmer, a better software engineer. I’ve done a lot I’m proud of, but I haven’t had the chance to dive deep since college. It’s time to do that. I’m going to take a sabbatical from work to spend dedicated time becoming a better programmer and software engineer.


      I am taking the time off work, but why attend Recurse Center specifically?

      To benefit from the community, and to benefit the community. Going through this learning process with a group of peers who are also learning will help me stay on track and get unstuck when I inevitably run into barriers. And I’ll learn unexpected things by helping other people, too! I’ve long wanted to attend after hearing about the experiences of folks like Julia Evans.

    • Xe’s BlogMy Blog is Hilariously Overengineered to the Point People Think it’s a Static Site

      So you are aware: you are reading the written version of a conference talk. This is written in a different style that is more lighthearted, conversational and different than the content normally on this blog. The words being said are the verbatim words that were spoken at the conference. The slides are the literal slides for each spoken utterance. If you want to hide the non-essential slides, please install this userstyle: No fun allowed. If this isn’t enough, please edit it to also hide this CSS class: xeblog-slides-essential. Doing this may make the presentation page harder to understand.

    • Science

    • Health/Nutrition/Agriculture

      • CoryDoctorowAmerican healthcare did a fuckery

        My fellow Americans, I regret to inform you that our beloved health insurance industry has done a major fuckery. I know this is hard to believe, given the probity and honor we associate with our fine insurance companies, but the evidence is incontrovertible.

        Back in 2019, the Trump administration ordered insurers and hospitals to start disclosing their prices, despite tens of thousands of comments filed by employers, insurers and hospitals objecting to the proposal.

        This is one of those pox-on-all-your-houses/you-can’t-get-there-from-here situations. The Trump admin wanted to continue the fiction that the blame for America’s worst-in-class health care was the result of bad market dynamics. Without transparency on pricing and service, employers can’t shop for plans, hospitals can’t know if they’re getting a bad deal from insurers, and sick people are denied information needed for effective bargaining.

        That’s all true, as far as it goes. The stubborn, remarkable opacity of American health-care pricing is an enormous source of mischief. Two patients receiving the same procedure, medicine or service might see bills that are thousands of dollars apart, at the same hospital, delivered by the same personnel.

        Without price transparency, patients can’t know if they’re getting ripped off. But if you know that the hospital charged the person in the next bed $3 for the Tylenol tablet that you got charged $300 for, you can go to the hospital billing department and say, basically, “Oh, come the fuck on – seriously?” and maybe get $297 knocked off your bill.

    • Security

      • Privacy/Surveillance

        • FinnstatsThe Role of Data Science in Preventing Fraud – finnstats

          The Role of Data Science in Preventing Fraud, Since about 15 years ago, data mining has been dubbed the “new oil rush,” yet the techniques for processing the unprocessed, unrefined data and the devices we can power with it are still being developed.

          Many e-commerce businesses are accustomed to using the information they gather from incoming traffic for purposes like customer segmentation and targeted advertising.

          These suggestions are undoubtedly at the top of the profit yield checklist, but making a sizable profit also requires minimizing losses due to fraud, a problem that becomes worse every year.

        • Michael West MediaWho controls your data online? Hint: it’s not you!

          Big tech wants us to think we control our own data, but we don’t. Our relationship with technology begins with deceptions and lies, writes cyber security expert and human rights activist Manal al-Sharif.

          Every day, living our busy lives, we are lulled into a false sense of security about our privacy. It happens almost every time we “agree to the terms and conditions”. When they tell us they don’t sell our data, read the fine print. They do. When they tell us that “if you have nothing to fear, then you have nothing to hide”, they lie. It’s time we exposed the lies and took back our digital agency.

          Privacy is a fundamental human right and a precondition for exercising other rights. In 1948, the members of the United Nations declared privacy “an inalienable and universal human right.” In 1966, the International Covenant on Civil and Political Rights stressed that privacy plays a central role in democracy, which makes it imperative for all members of society – not just those with power or wealth – to be aware of their rights.

    • Environment

      • Overpopulation

        • teleSUROne Third of Developing Country Women Become Teen Mothers | News | teleSUR English

          While total fertility across the globe has fallen, the UNFPA report shows that women who began childbearing in adolescence had almost five births by the time they reached age 40 between 2015 and 2019.

          “When nearly a third of all women in developing countries are becoming mothers during adolescence, it is clear the world is failing adolescent girls,” said UNFPA Director Natalia Kanem. “The repeat pregnancies we see among adolescent mothers are a glaring signpost that they desperately need sexual and reproductive health information and services.”

    • Finance

      • The WireMaverick, Free and Believers in Hindu-Muslim Unity: How India’s Spiritual Masters Fought Orthodoxy

        Mukunda Rao makes it clear in his book that contrary to what is widely believed, India’s spiritual history is not all about Brahmanical beliefs, Sanskrit literature, the Upanishads, and the Gita, or even the caste system.

      • CoryDoctorowSurvival of the Richest

        The super-rich attendees at the conference were obsessed with “The Event” – civil unrest, environmental collapse, some other end-of-the-world scenario – and how to survive it: where to site their bunkers, how to command the loyalty of their mercenaries after money lost its value.

        Rushkoff realized that these guys were obsessed with outrunning the end of the world that they were creating through their drive to outrun the end of the world. They were singularly uninterested in preventing the end of the world, or even in surviving it through solidarity and mutual aid. They were committed to the Thatcher Doctrine that “there is no such thing as society” – and they were willing to destroy society to prove that it was true.

        Four years later, Rushkoff has turned his experience with the wealthy, the technology-addled, and the selfish-solutionist wing of Silicon Valley into a book called Survival of the Richest: Escape Fantasies of the Tech Billionaires. It’s great.


        Rushkoff doesn’t condemn all of this – he’s a product of it, as am I. Rather, he’s interested in how a movement that was once filled with people who decried greed and hubris incubated a movement that lionizes both. For Rushkoff, much of the blame can be traced to the “scientism” of materialism without ethics, the idea that the universe has no moral arc and any attempt to declare a morality is sentiment or cynical manipulation.

        I’m a pretty staunch materialist myself, and so some of this made for uncomfortable reading (Rushkoff is an old friend and we’re scheduled to appear on stage together later this fall to discuss this, and I’m looking forward to it). I think ideology can explain how we act, but I think it’s a mistake to view ideology as a weightless and immaterial thing. Our material circumstances are key to what we believe – and how important those beliefs are to how we live.

        But ideology is important, and I agree with Rushkoff that The Mindset is an ideology, and a bad one. I think he’s right that you can trace a line from a nihilistic scientism to Jeffrey Epstein’s plan to breed a race of superhumans by buying a private island and populating it with underage girls who would bear his children.

      • DaemonFC (Ryan Farmer)Geico told me I was a very safe driver and proceeded to raise my six month premium by over $150. | BaronHK’s Rants

        I reached the renewal for my Geico policy and they tell me I score 104 of 115 possible points and get a very big safe driver and telematics discount.

        Then they raised me rate from slightly above $410 to over $560. Same me, no accidents, no tickets. “Very good DriveEasy score”

        So I got quotes from other companies and they were either as bad or worse, so I went ahead and paid Geico again.

        I read that Geico is leading the industry with tate hikes in 2022 and they don’t need to do it to stay equally profitable according to their notes to shareholders. The entire industry has decided they just want more profit and has ganged up to raise rates on people 20 or 30 percent this year because it’s illegal to drive without insurance.

        Since you go to jail or at least have a criminal record if you don’t buy their product, they know that they can proceed to rape us all as badly as they want to and we have no recourse.

        I get a raise that takes my net pay up by $150 a month next year.

        I checked what my landlord is listing apartments in the building for and it’s gone up $200 more, and our lease expires next month.

        So I start out next year $50 a month in the hole and still have to figure out how to pay 20 or 30% more for groceries and everything else.

      • Michael West MediaWorkers’ share of the national income pie falls to all-time low – Michael West

        Pressure is growing for Labor to abandon the third stage of the tax cuts, due in 2024, because of pressure on the Budget. The tax cuts overwhelmingly favour high-income earning men and are a piece with the tilt against ordinary workers under the Morrison government, writes Alan Austin.

        One dismal legacy of the Coalition’s time in government is the greatest disparity in income between workers and corporations in Australia’s postwar history.

        Last week’s national accounts reveal that the share of the nation’s income going to employees fell in this year’s June quarter from 51% in June last year to an all-time low 48.5% per cent. That is a decline just in the last six years of 6.1 percentage points, down from 54.6% in June 2016 to 48.5% in the June quarter this year. (Back in the Whitlam and Fraser years this was above 60%.)

    • AstroTurf/Lobbying/Politics

      • Michael West MediaIs this the madness that comes with monarchy – or is it the disdain that’s over the top? – Michael West

        Are we royally stuffed by the coverage of the Queen’s death rites? Or should anyone who wants to carp stay under the couch? Analysis from MWM‘s man on the ground Callum Foote and one-time staunch republican Mark Sawyer.

        The ABC’s coverage of the death of Queen Elizabeth II is a bonanza for the national broadcaster. According to a spokesperson the ABC has seen “a daily peak so far of 2.9m users of the website and 741,000 users of the app” with “18 of the top 25 ABC News articles published between Thursday and Sunday related to the Queen’s death.”

        The broadcaster published 52 articles about the Queen’s death between last Thursday and Saturday which generated 16m page views – or “45% of total article page views over this period”.

        The ABC News listen app is getting as much traffic as it was on post-election day and ABC TV is experiencing a modest increase in viewership, a high of +3.9 points or a total of 2.8 million viewers reached on Sunday.

      • Michael West MediaTime for Australia to be the friend the Pacific needs  – Michael West

        Australia’s downgrading of relationships with the Pacific has left a broken regional diplomacy model in urgent need of repair, writes Sandi Logan.
        Another week where Australia’s relationships with its Pacific “family” go through the wringer. Somehow we have managed to have a stoush with the Solomon Islands, even when we offer to pay for their election.

        Is Australia really a member of the Pacific “vuvale” – a Fijian word slapped onto the region holus-bolus by former prime minister Scott Morrison as a branding exercise? Or is Australia the region’s historical “bad/distracted boyfriend?” or a mixture of both?

        Labor’s victory in this year’s federal election has unleashed a torrent of thinktank advice about Australia’s true ‘Pacific identity’, and what to do to repair our tattered relationships with the neighbours.

        The new government is giving signs of having listened and thought about how to be better friends with the island nations to our north – and south, if you count in the New Zealand cousins.

    • Internet Policy/Net Neutrality

      • James GAdding review support to Breakfast and Coffee | James’ Coffee Blog

        Breakfast and Coffee is a place to share information about breakfast and coffee shops you have visited, with a twist: where possible, contributions should come from personal websites rather than directly through the website editing interface. Breakfast and Coffee is a MediaWiki.

      • Jim NielsenBuilding Together – Jim Nielsen’s Blog

        It’s what I love about the story of the web. Individuals across the globe following their passions, finding each other in those passions, and fostering the birth of something new from their disparate stories — all enabled by great software whose output is something we construct together.

      • Jim NielsenGood Design – Jim Nielsen’s Blog

        Design is about purpose and intent. To answer, “Is this good design?” We must also answer: good for who?

        For the person who wants to prevent you from unsubscribing, this is “good design”. The design assigns a function which follows purpose and intent.

        For the person who wants to unsubscribe, this is devilishly bad design.

    • Monopolies

      • Copyrights

        • CoryDoctorowSpotify steals from artists, a Spotify exclusive

          In our next book, Chokepoint Capitalism, Rebecca Giblin and I set out to shatter the false binary that creative workers can only choose between rooting for Big Tech or Big Content, as if one flavor of monopolist will be better for us than the other. No company epitomizes the hopelessness of this approach more than Spotify.

          You’ve probably heard about the pathetic sums that creators earn from the Spotify streaming, often blamed on the tech industry’s unwillingness to pay creators what they’re worth. Maybe you’ve also heard the rebuttal – that Spotify pays plenty to entertainment companies, but they intercept this money before it can get into creators’ pockets.

  • Gemini* and Gopher

    • Personal

      • AZLOSUE Wordo: MAIMS
      • Allotment

        So here’s something I didn’t expect to happen this year. When we moved to the area, I put my name down for an allotment – there’s always a waiting list, and it’s usually very long. Somehow I got to the head of it in ~6 months, and was given a full-sized plot (~250M²) this week.

        The garden is much smaller, and while I’ve not maxed out potential growing space there yet (I’ve talked about ripping up the lawn before), I’d more or less given up on the “grow your own food” part of self-sufficiency while living here. The allotment brings it back to life!

      • My Raktajino headcanon

        In Star Trek: Deep Space Nine, the senior staff are often seen drinking Raktajino, whether in Quark’s Bar, the Replimat, or Ops. We know that Raktajino is Klingon coffee… but what does that mean, really? I have my own headcanon, which draws from common fanon and speculations from Marc Okrand, the creator of the Klingon conlang.

    • Technical

      • White space, punctuation, Whitespace and Forth

        I go some feedback via email oppositing my view fairly strongly because keeping things aligned adds noise to diffs. A fair point. My reply would be that I spend a lot of time looking at code and very little looking at diffs, and I can tell the diff tool to ignore white space differences if necessary. But each to their own.

        I also suggested as a thought experiment a language with no punctuation, and my correspondent pointed out Forth as a language that’s like that. I didn’t know anything about it, but on reading it is indeed just a stream of words. Well, “words” here means something like “tokens” and some of them look like punctuation, but you they’re just words.

      • Internet/Gemini

        • Technology and Conscience

          That’s an excellent point. I suppose the counterpoint would be made with nuclear weapons, which as of now have no use other than causing massive loss of life. Nuclear power is a different story, and it may be what helps mitigate climate change and eliminate fossil fuels. I don’t believe that technology and tools are always value-neutral, though this is frequently the case. Mustard gas and atomic bombs are my counter-propositions.

          I flirted with IPFS off and on since about 2015, and as of this summer, I’ve been using it heavily[1]. When I got back into IPFS this year, one of the first things that jumped out at me was just how much cryptogrift was associated with it. I don’t want to be involved with that. I’ve ranted against cryptocurrency multiple times in several public fora such as HN. So it was a real struggle for me. Do I stop using this really promising tool just because a bunch of people are doing things with it that I find harmful or threatening?


          I’ve been here before. About 15 years ago, I dabbled with Freenet. I stopped pretty quickly, because with the way that Freenet works, you have no control over what is hosted or exchanged using your resources. The hard drive space and network connectivity dedicated to Freenet may well be used for storing or transmission of kiddy porn without one’s knowledge. That was too much for my conscience to bear, so I noped right out of Freenet. That said, I do not condemn the good people using Freenet for good purposes.

        • Franken-Peugeot updates

          I am kind of burned out on writing more or less exclusively about my “big picture” thoughts on ideas at the intersection of computing technology and environmental sustainability. I’m still very much interested in and thinking about and reading about those issues, and rest assured you Shall Not Be Spared the future walls of text which will inevitably arise from this. But nobody wants to read that kind of stuff all the time. I don’t even want to *write* that stuff all the time, writing exclusively in negative tones, beating dead horses. Here on the small internet I’m largely preaching to the choir anyway. I miss how much more casual and varied and uncontrived my writing used to be in “the good old days” (my phlog is over five years old now, I missed the anniversary once again). So I’m going to try to kick myself back into that groove for a bit. Excluding my upcoming ROOPHLOCH entry, which is going to talk mostly about how the post was made, I’m setting myself the goal to write three posts this year which have nothing to do with computers, nothing to do with the internet, and nothing to do with the terrifying realisation that the sun isn’t going to die for another five billion years and even the greenest Utopian fantasy vision of future civilisation has no hope of lasting that long without running into some kind of problem.

        • The best way to organize the catalog

          I’ve been writing about some experiences with the small-net [fog of war]. I’m facing a permanent state of forgetting and excitement of finding the same things. The search engines aren’t providing the solution to this problem. Their results are almost always disappointing. There are also several catalogs, which try to organize things in an old-school way. The indexes are like it was used to be in the ’90s. But they are also like a walk in a disorderly maintained garden. Some information is in good order, and the rest is obscured by bushes and black weeds.

          And we have [Collaborative Directory of Geminispace] announced. What are the most modern achievements in the internet directories business? It seems that there aren’t many of them, and we are still in the ’90s. So we had failed with the [medusae.space Gemini directory], and we have only a promise that it will be better with the CDG. And it’s all.

        • The fog of war and the small-net search engines

          The more I browse the small net, the more I’m suffering from a lack of reliable search engines. We have several projects, which are aiming to build a search engine that could be the same as their big-net relatives. The truth is that they are not working too well. During the writing of this paragraph, I tried to search Gopher Lawn and Medusae Gemini Directory with them, and I failed. So the common result of current search engines is many entries in, what seems to be, random order. We are at the beginning of the path. It’s worth saying that during gathering answers about how Gophersphere was in the 90s’ one of the common answers was the problem with slow search engines!


          We are like in the fog of war. I’m repeatably discovering the same addresses, which I am forgetting later. The most information on what is trendy now on the small net I obtain on recent Gemlogs’ entries, and Blogrolls on various Capsules. On the one of the Gopherhole, I learned by accident that /taz.de/ (it’s one of the biggest newspapers) offers its sites on the small net (Gopher and Gemini). How can such information be found less randomly?

        • Fixing Gemini timeouts in Doom Emacs and Elpher

          If you’re a Doom Emacs user and you try using Elpher for the first time, you might get timeouts whenever you try to visit Gemini URLs, even if visiting Gopher/Finger URLs still works as expected. At least, that’s what happened when I first tried.

      • Programming

        • PSA: mktemp Isn’t POSIX

          I’ve noticed quite a few shell scripts recently that claim to be POSIX-compliant despite using mktemp, so I wanted to go over a compliant alternative and a few things you should know about writing POSIX shell (#!/bin/sh) scripts.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts