Links 27/09/2022: Bash 5.2 and LXD 5.6

Posted in News Roundup at 6:15 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Linux LinksSaving Money with Linux: Computer Off, No Power Usage? – LinuxLinks

        We often see statements such as “If something doesn’t need to be on, switch it off at the wall or unplug it”. How relevant is that statement for a computer?

        We took 5 computers of different types and age. To calculate the cost per year we assume each machine is left connected plugged into the wall for 365 days, and that a kWh is £0.34 (the (revised) price cap from October 2022 in the UK).

        Here are the results.

      • 9to5LinuxStar Labs Shares More Details on Its Upcoming StarFighter 4K Linux Laptop

        Featuring a micro-arc oxidized AZ291D alloy chassis and weighing only 1.4kg (3 pounds), the Star Labs StarFighter Linux laptop is powered by 45W 12th Gen Intel “Alder Lake” Core i3-1215U, i7-1255U, or i9-12900H, or AMD Ryzen 7 6800H processors with up to 64GB DDR5 RAM and up to 8TB SSD storage.

        But the best feature of Star Labs’ StarFighter Linux notebook is the 16-inch 4K 10-bit matte IPS display featuring a 16:10 aspect ratio, 1074M colors, 100% Adobe coverage, 600cd/m2 brightness, and FreeSync support. As a bonus, the screen turns 180 degrees to let you open and carry it flat like a tablet.

    • Server

      • LXD 5.6 has been released

        The LXD team is very excited to announce the release of LXD 5.6!

        This is another busy LXD release, coming with improvements all around, whether you’re using LXD to run some containers, virtual machines or are using clustering and projects.

      • LWNLXD 5.6 released [LWN.net]

        Version 5.6 of the LXD container manager is out. Changes include the ability to stream log messages to a Grafana Loki server, Infiniband support for virtual machines, a restricted network access mode, and more.

      • TechRepublicSuper Container OS is Great for Container Deployments | TechRepublic

        Containers are all the rage and show no signs of slowing down. Most enterprise businesses are leaning heavily on containers to do much of the heavy lifting for app and service deployment and for that, admins might tend to use their favorite operating system of choice. But sometimes, that’s like using a jackhammer when a scalpel is necessary.

      • You Can’t Afford To Not Be in the Cloud [Ed: Another fool shaming everyone into outsourcing their operations, pretending that rents are cheaper than ownership, aside from other issues]
      • StormForge Extends Kubernetes Autoscaling Capability – Container Journal [Ed: Seems like a corporate puff piece massages into an 'article']

        StormForge today announced it has expanded its ability to vertically or horizontally scale Kubernetes pods automatically using machine learning algorithms.

        Rich Bentley, product marketing manager for StormForge, says the latest version of StormForge Optimize Live provides IT teams with a bi-dimensional autoscaling capability to both right-size pods and horizontally set utilization rates without any contention. Previously, IT teams had to opt to either vertically or horizontally scale Kubernetes clusters but could not do both simultaneously, he noted.

      • Getting Started With Kubernetes at the Edge

        In this article, you will learn how Kubernetes is quickly becoming one of the most popular solutions used by businesses to incorporate edge computing. You will also learn about the benefits of edge computing, the specific benefits Kubernetes offers to assist with edge computing and how Kubernetes distributions could be used for edge computing.

    • Audiocasts/Shows

    • Kernel Space

      • The Register UKRemoving an obsolete AMD fix makes Linux kernel 6 quicker

        An ancient fix for power management issues on AMD systems has been reducing Linux’s performance since 2002. Now it’s gone.

        One of the joys of modern silicon chips is that power management is vitally important. It hasn’t been about saving power or extending battery life since the 20th century. Processor vendors survive by selling us more and more transistors, solely on the basis that most of them are turned off most of the time – otherwise the chips would rapidly incinerate themselves, no matter how good their cooling.

        This requires sophisticated interfaces between the OS and the hardware, and way back in 1996, a new standard called ACPI (Advanced Configuration and Power Interface) replaced the positively stone age APM (Advanced Power Management) from the Windows 3 era.

      • Gentoo-Sources: Experimental – ACPI: processor idle: Practically limit ‘Dummy wait’ workaround to old Intel systems – Mike Pagano’s Weblog

        I added the patch indicated above to gentoo-sources behind the ‘experimental’ flag, for now. This is to remove a 20 year old workaround for newer AMD processors. I expect this to propagate to lower kernels via upstream directly. This will be in gentoo-sources-5.19.12 (USE=experimental)

      • Pat Gelsinger Bestows Linux Creator Linus Torvalds With Intel’s First Innovation Award | HotHardware [Ed: Bribing Linus after he recommended AMD and ARM]

        Linus and Intel have not always seen eye-to-eye. In the past, Linus has rallied against Chipzilla for stifling error correcting memory support on desktop platforms and has accused the company of providing lackluster solutions to the Spectre and Meltdown CPU flaws. Nevertheless, Linus understands the importance of the x86 architecture and Intel clearly respects the tireless contributions Linus has made.

    • Graphics Stack

      • Mike Blumenkrantz: Preparation

        It’s been a while, but today’s blog is a zink blog. What’s been happening?

        Well, if you’ve been following prominent news sites, you might not think there’s too much happening on the performance front. And whew do I have news for you.

        Big news.

        With XDC next week, I’m throwing down the gauntlet.

        Mesa 22.3 is going to be the BIG PERF RELEASE.

        I said it.

    • Applications

      • Make Tech Easier5 of the Best Solutions for Monitoring Website Changes – Make Tech Easier

        One of the quickest ways to check a website for new updates is to add the site to your favorite RSS reader and let the tool notify you of any new content. However, an RSS reader can only check for updates within the confines of RSS-formatted code.

        This limitation means RSS readers won’t work on any static webpages or dynamic websites without RSS components. Fortunately, you can use third-party tools to monitor website changes and receive notifications for any new changes.

    • Instructionals/Technical

      • Barry KaulerFix broken video entry in Limine menu

        After moving from rEFInd and Syslinux boot managers, to Limine, the “Fix broken video” menu entry got left out. I introduced this here…

      • H2S MediaHow to check KVM is installed in Ubuntu Linux – Linux Shout

        KVM is an open-source virtualization technology, it falls under the Type-1 Hypervisor category. KVM stands for Kernel-based Virtual machine that is available in all modern Linux kernels as a virtualization module, it allows the Linux kernel to work as a bare metal Hypervisor. Hence, all the Linux distros whether Ubuntu, Debian, RedHat, OpenSUSE, etc. can be used as a full-fledged hypervisor system for providing virtualization. KVM works with Qemu which is another open source and free hardware emulator platform. With KVM, Qemu offers the emulation of hardware and peripherals of the system to the Guest operating system so that it can use them but the support of KVM and its direct interaction with the CPU helps the Guest OS to run almost at native speed.

        With the help of KVM, we can run multiple Virtual machines parallelly, however, make sure your Linux system’s CPU support virtualization extensions – Intel VT or AMD-V.

      • TechRepublicHow to change the drive location for GNOME Boxes VMs | TechRepublic

        Boxes is a great tool for easily spinning up virtual machines on Linux. With Boxes, you can create virtual machines from several pre-configured machines or even from your own ISO. Those VMs run smoothly and seamlessly, and can be spun up much faster than when using a tool like VirtualBox.

        But while Boxes is incredibly easy to use, it’s also not nearly as flexible as other solutions. Case in point, there isn’t even a Preferences option in the limited menu. All you can do is create virtual machines.

        That shouldn’t be a deal breaker for anyone. However, I recently ran into an issue. On my production machine, my primary drive was getting dangerously low on space. It turns out, a big part of that problem was Boxes. Why? Because Boxes stores the virtual machine files in ~/.local/share/gnome-boxes, which means it’s going to gobble up your local storage space fairly quickly. Given GNOME Boxes doesn’t have any preferences to speak of, what do you do?

      • ID RootHow To Install Tor Browser on Manjaro 21 – idroot

        In this tutorial, we will show you how to install Tor Browser on Manjaro 21. For those of you who didn’t know, The Onion Router a.k.a Tor browser is a free and open-source anonymous communication tool. It helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and security.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Tor Browser on a Manjaro 21.

      • Print nic name of current connection
      • Linux JournalPwndrop on Linode | Linux Journal

        When I first ran across PwnDrop, I was intrigued at what the developers had in mind with it. For instance, if you’re a white-hat hacker and are looking to share exploits safely with your client, you might use a service like PwnDrop. If you’re a journalist communicating with, well, just about anyone who is trying to keep their identity secret, you might use a service like PwnDrop.

      • HowTo GeekHow (and Why) to Disable Root Login Over SSH on Linux

        Logging in as the Linux root user is bad practice. Logging in as root over an SSH connection is even worse. We tell you why, and show you how to prevent it.

      • BoingBoingUnderstanding the “fork bomb” an 11 character string that can crash Windows, Mac, or Linux machines | Boing Boing

        In this video on Dave’s Garage, he discusses the “fork bomb,” a DoS (denial-of-service) attack where a process replicates itself until it depletes all system resources, slowing or crashing the system. The bomb is nothing more than an 11-character program that, when entered into a Bash prompt, will replicate itself until the computer crashes.

      • Make Tech EasierMPV Keyboard Shortcuts – Make Tech Easier

        MPV is a free, open-source command-line multimedia player. Unlike graphical players like VLC Media Player, MPV allows you to load any supported media file straight from your terminal. Furthermore, MPV also supports a wide range of codecs and formats. This means you can use MPV to play simple MP3 files as well as high-fidelity 4K HEVC movies.

      • LinuxTechiHow to Install Atom Text Editor on Ubuntu 22.04 [Ed: It is utterly dumb to promote Microsoft crap for Linux, more so bloated junk that Microsoft officially abandoned, which means it's abandoned and orphaned]

        In this guide, we will learn how to install Atom Text Editor on Ubuntu 22.04 LTS (Jammy Jellyfish).

      • TechRepublicHow to use Pop_!OS refresh install | TechRepublic

        Jack Wallen shows you how to return Pop!_OS to a brand new installation, without losing any of your user data and app configurations.

      • TechRepublicHow to install the GitHub Jira integration [Ed: Why does he shill proprietary software of Microsoft?]
      • Linux CapableHow to Install Microsoft Teams on Debian 11 Bullseye [Ed: How to infest Debian with Microsoft malware that has de facto back doors]
    • Games

      • Electronics WeeklyGadget Watch: Steam Deck, the Linux-powered games console

        Okay, I admit it, I’m late to the party, but I’m not a gamer. But even I’ve now heard about the Steam Deck, a Linux-powered handheld gaming device. It will be interesting to see the future developments that may unfold…

      • Ubuntu Handbook0 A.D. Alpha 26 Released! How to Install in Ubuntu 22.04 via PPA | UbuntuHandbook

        0 A.D., the free open-source RTS game of ancient warfare, got a new release update a few days ago.

        It’s 0 A.D. Alpha 26, code-name ‘Zhuangzi’, features new civilization: The Han, which was the second imperial dynasty of China. It has beautiful new art, unique technologies, buildings, as well as new gameplay strategies to explore.

        The release also introduced 2 new map: Tarim basin – an endorheic basin in Northwest China, Xinjiang region; and Yangtze (aka Chang Jiang) the longest river in Asia.

      • Boiling SteamKena Bridge of Spirits, Released on Steam Today, Runs Fine on Linux with Proton – Boiling Steam

        After a first release on the Epic Games Store in 2021, Kena Bridge of Spirits, is making its debut on Steam for the first time today on the 27th of September. I took it for a quick spin to see how well it would run on Linux. You have the answer below in video.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • 9to5LinuxPlasma Mobile Gear 22.09 Is Out for Your Phone and Tablet with a New Default Homescreen

          Plasma Mobile Gear 22.09 is here three months after Plasma Mobile Gear 22.06 and brings a new default Homescreen designed for simplicity and one-hand usage. The Homescreen’s configuration has been updated as well to make it easier to switch between the old homescreen (Folio) and the new one.

          Another exciting feature is a new default email client called Raven, which currently only works as a basic email reader, but the devs work on support for sharing components with Kalendar’s upcoming email support.

        • Plasma Mobile Gear ⚙ 22.09 is Out – Plasma Mobile

          The Plasma Mobile team is happy to announce the developments integrated into Plasma Mobile between July-September 2022. In this report you can also read about the release of Plasma Mobile Gear ⚙ 22.09.

  • Distributions and Operating Systems

    • ZDNetXeroLinux could be the most beautiful Linux desktop on the market | ZDNET

      Over the decades, I’ve witnessed countless Linux desktop distributions, each of which attempts to set itself apart from the competition. Some of them, such as ZorinOS and Deepin Linux, have done a fairly remarkable job of doing just that. Since I started covering Linux back in ’99, I’ve proclaimed distributions such as Elementary OS, ZorinOS, Deepin Linux, and Garuda Linux to be offering the most beautiful desktop on the market.

    • SDTimesBellSoft introduces Alpaquita Cloud Native Platform and Alpaquita Linux – SD Times

      BellSoft, creator of progressive Java runtime for a complete Java experience, Liberica JDK, and an OpenJDK contributor, today announced the release of BellSoft Alpaquita Cloud Native Platform and Alpaquita Linux.

      The company stated that these offerings are intended to address the growing demand for more efficient, secure, and supported Java software that performs well as well as reduces cloud computing costs.


      Additionally, Alpaquita Linux is a Linux distribution tuned specifically for a Java runtime. Based on Alpine Linux, it offers users performance and security enhancements as well as a smaller size and improved flexibility.

    • BellSoft Optimizes Java for Cloud-Native Platform – Container Journal

      BellSoft today is adding a BellSoft Alpaquita Cloud Native Platform to its portfolio that makes it possible to more efficiently run Java applications encapsulated in containers. As part of that effort, the company is making available an Alpaquita Linux distribution that is optimized for the BellSoft Alpaquita Cloud Native Platform.

    • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

      • OMG UbuntuONLYOFFICE 7.2 Released with Various New Features & Improvements

        An updated version of ONLYOFFICE is available to download for Windows, macOS, and Linux.

        ONLYOFFICE 7.2 ships with all of the latest changes to the online version, plus some ‘unique features’ exclusive to the desktop editors, including automatic light/dark mode on Windows and macOS (the feature is present on Linux builds but doesn’t, in my testing, do what it should).

        Such as? Well, the new version of the Document has ligature support in text files; lets you easily insert the current heading into a table of contents; and adds a new “Headings” panel to the main toolbar (replacing the navigation panel). Converting .pdf, .djvu, and .xps documents to .docx is also said to have improved.

        The Presentation tool now supports custom path animations, offers advanced settings, is able to playback audio and video in slides without requiring VLC, and intros advanced “placement” options for images, when selecting an image and choosing ‘advanced settings’.

    • Fedora Family / IBM

    • Debian Family

      • William Lee Irwin III, Michael Schultheiss & Debian, Oracle, Russian kernel scandal

        Early 2011, six months after the Debian Day volunteer suicide (Frans Pop), a mysterious livejournal blog appeared in Russian about a US-based kernel developer in trouble.

        William Lee Irwin III was a kernel developer and Debian Developer who worked at Oracle. He pioneered support for page clustering on x86. After a medical problem or a seizure, it is suggested that Oracle simply dumped him in the street and he ended up in a homeless shelter.

        Is America’s health system really so bad that they need to rely on Russian support to keep kernel developers above the poverty line? (Yes, American healthcare really is that bad)

        The Russian blog post is followed by a comment in English hinting that a debian-private (leaked gossip network) thread found a job for Irwin. We examined all messages in the thread and found the claim is over-optimistic.

      • Steve McIntyreFirmware again – updates, how I’m voting and why!

        Back in April I wrote about issues with how we handle firmware in Debian, and I also spoke about it at DebConf in July. Since then, we’ve started the General Resolution process – this led to a lot of discussion on the the debian-vote mailing list and we’re now into the second week of the voting phase.


        Fundamentally, my motivation for starting this vote was to ask the project for clear positive direction on a sensible way forward with non-free firmware support. Thus, I’ve voted all of the options that do that above NOTA. On those terms, I don’t like Choice 4 here – IMHO it leaves us in the same unclear situation as before.

        I’d be happy for us to update the Social Contract for clarity, and I know some people would be much more comfortable if we do that explicitly here. Choice 1 was my initial personal preference as we started the GR, but since then I’ve been convinced that also updating the SC would be a good idea, hence Choice 5.

        I’d also rather have a single image / set of images produced, for the two reasons I’ve outlined before. It’s less work for our images team to build and test all the options. But, much more importantly: I believe it’s less likely to confuse new users.

    • Canonical/Ubuntu Family

      • Blue Sky PublicationsFive South African IT inventions that changed the world [Ed: Ubuntu is not an "invention"; it's Debian with another name and some staff that customises it.]

        In 2004, Ubuntu computer operating system was invented by Mark Shuttleworth. It is a Debian-based Linux operating system and it is distributed as free and open source software. The word Ubuntu comes from the Bantu language and it means “humanity towards others” or “I am because we are”.

        Ubuntu is popular for its ease of use and its wide range of applications. Over 20% of the web runs on Ubuntu. French Police migrated over 80 000 desktops to Ubuntu from Windows and saved over 2 million euro.

      • UbuntuCanonical Announces Ubuntu 22.04 LTS Support for FlexRAN Reference Software

        Canonical is thrilled to announce today the availability of Ubuntu 22.04 LTS with real-time kernel support and optimizations for Intel’s latest FlexRAN Reference Software. Designed to meet telecom network transformation needs for 5G, Ubuntu 22.04 LTS real-time kernel delivers performance, guaranteed ultra-low latency and security for critical infrastructure. With this release, Canonical strengthens its commitment to help telecommunications service providers benefit from the technological and economic benefits of open source-software in a secure and supported manner.


        Besides offering real-time-kernel capabilities in Ubuntu which are suited for today’s 5G networks, Canonical offers a full stack of supported open-source technology building blocks, providing a unified approach for telco transformation.

        Canonical conducted detailed performance testing, with OpenRAN on bare metal as well as on Canonical’s MicroK8s and Charmed Kubernetes distributions. The tests showed that Ubuntu delivers better results than any other operating system thanks to the company’s tight collaboration with upstream kernel development and extremely fast patching and release cycles. Telecom providers can deploy containers without compromising on performance or security.

    • Open Hardware/Modding

      • ArduinoUsing smart home tech to care for your pets | Arduino Blog

        Smart home technology has a ton of useful and fascinating use cases for humans, but what about our pets? For most of us, our furry friends are members of the family, and if we can make modifications to our home to help them, we do it.

        The good news here is that there are tons of home automation tools that you can use to make life easier and more fun for your pets, and many of them can be done with just a handful of starting materials and basic knowledge.

        In this article, we’ll take a look at some of the ways smart homes can benefit pets, and explore some projects from the Arduino community.

      • CNX SoftwareLiLyGo T-SIMCAM ESP32-S3 camera development board supports optional 4G LTE connectivity – CNX Software

        ESP32-S3 has been in the news recently and we just wrote about the Bee S3 and BPI-PicoW-S3 boards yesterday, but there’s more, and LilyGo T-SIMCAM ESP32-S3 is another interesting ESP32-S3 board with a 2MP camera as well as support for an optional 4G LTE module.

        The board can make use of the AI capabilities from the ESP32-S3 microcontroller through the built-in camera and microphone and offers two options for power with 5V through a USB Type-C port, as well as a 2-pin JST connector for connecting a battery.

      • ArduinoStandalone Arduino Nano RP2040 Connect-controlled computer runs BASIC for IoT development | Arduino Blog

        If you’re more than 30 years old, then there is a good chance that BASIC (Beginners’ All-purpose Symbolic Instruction Code) was the first programming language you used. Many early computers shipped with a BASIC interpreter in firmware, so it was the first thing users saw when they booted up their computer. While other languages are more useful for most tasks today, BASIC still has benefits. To take advantage of it, Stefan Lenz used a Nano RP2040 Connect to build a standalone computer that runs BASIC for Internet of Things applications.

        The Raspberry Pi RP2040 is a powerful microcontroller that immediately became popular after it hit the market in January 2021. The Arduino Nano RP2040 Connect is one of the newest boards in the Arduino lineup and gives users access to the RP2040 within the friendly Arduino ecosystem. In addition the MCU, this board also contains a u-blox WiFi and Bluetooth® adapter, a six-axis IMU, a microphone, 16MB of flash memory, and even a CryptoAuthentication chip. The u-blox adapter was particularly useful for this project, since it enables IoT control over a wireless network.

      • ArduinoCount elevator passengers with the Nicla Vision and Edge Impulse | Arduino Blog

        Modern elevators are powerful, but they still have a payload limit. Most will contain a plaque with the maximum number of passengers (a number based on their average weight with lots of room for error). But nobody has ever read the capacity limit when stepping into an elevator or worried about exceeding it. In reality, manufacturers build their elevators to a size that prevents an excessive number of passengers. But as a demonstration, Nekhil R. put together a tutorial that explains how to use the Edge Impulse ML platform with an Arduino Nicla Vision board to count elevator passengers.

        The Nicla Vision is a new board built specifically for computer vision applications — especially those that incorporate machine learning. In its small footprint (less than a square inch), there is a powerful STM32H747AII6 microcontroller, a 2MP color camera, a six-axis IMU, a time of flight sensor, a microphone, WiFi and Bluetooth, and an onboard LiPo battery charger — and it’s officially supported by Edge Impulse, making it well suited for ML projects.

    • Mobile Systems/Mobile Applications

      • Ubuntu PitTop 5 Best NFC Apps for Android Devices in 2022

        When someone is thinking about the best contactless card payment system, he must count NFC as the best option. Basically, NFC stands for near-field communication, and it is one of the most popular contactless payment or money transfer systems. Most people use their smartphones to use this service.

  • Free, Libre, and Open Source Software

    • CollaboraA team that grows together, builds together

      With fresh faces wide-eyed for new challenges, Collabora happily welcomes new teammates to the growing roster! A testament to the open environment created by collaborative remote work, our latest joiners are equipped to contribute to the exciting projects we have in the works.

    • TechCrunchHugging Face and ServiceNow launch BigCode, a project to open source code-generating AI systems [Ed: More "hype" and hot air]
    • Venture BeatHow open-source data labeling technology can mitigate bias | VentureBeat

      Data labeling is one of the most fundamental aspects of machine learning. It is also often an area where organizations struggle – both to accurately categorize data and reduce potential bias.

      With data labeling technology, a dataset used to train a machine learning model is first analyzed and given a label that provides a category and a definition of what the data is actually about. While data labeling is a critical component of the machine learning process, recently it has also proven to be highly inconsistent, according to multiple studies. The need for accurate data labeling has fuelled a bustling marketplace of data labeling vendors.

    • Events

    • Web Browsers/Web Servers

      • Chromium

        • GoogleChrome Releases: Stable Channel Update for Desktop

          The Chrome team is delighted to announce the promotion of Chrome 106 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.

          Chrome 106.0.5249.61 ( Mac/linux) and 106.0.5249.61/62( Windows) contains a number of fixes and improvements — a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 106.

    • Content Management Systems (CMS)

      • WordPress 6.1 Beta 2 Now Available – WordPress News

        WordPress 6.1 Beta 2 is now available for download and testing.

        This version of the WordPress software is under development. Please do not install, run, or test this version of WordPress on production or mission-critical websites. Instead, it is recommended that you test Beta 2 on a test server and site.

    • GNU Projects

      • LWNBash-5.2 Release available
        The first public release of bash-5.2 is now available with the URLs
        and from the master branch of the bash git repository
        and the usual GNU mirror sites.
        Bash is the GNU Project's Bourne Again SHell, a complete
        implementation of the POSIX shell spec, but also with interactive
        command line editing, job control on architectures that support it,
        csh-like features such as history substitution and brace expansion,
        and a slew of other features.  For more information on the features
        of Bash that are new to this type of shell, see the file
        `doc/bashref.texi'.  There is also a large Unix-style man page.  The
        man page is the definitive description of the shell's features. 
        This tar file includes the formatted documentation (pdf, postscript,
        dvi, info, and html, plus nroffed versions of the manual pages). 
        Please use `bashbug' to report bugs with this version.  It is built
        and installed at the same time as bash.
        Please read the README file first.
        Installation instructions are provided in the INSTALL file.
        New Features
        This is an update to the fifth major release of bash.
        Read the file NEWS in the bash-5.2 distribution for a complete description
        of the new features.  A copy of the relevant portions is included below. 
        This release fixes several outstanding bugs in bash-5.1 and introduces
        a number of new features.
        There are a number of bug fixes, including several bugs that caused the
        shell to crash. Complete details are available in the CHANGES file.
        The most notable new feature is the rewritten command substitution parsing
        code, which calls the bison parser recursively. This replaces the ad-hoc
        parsing used in previous versions, and allows better syntax checking and
        catches syntax errors much earlier. The shell attempts to do a much better
        job of parsing and expanding array subscripts only once; this has visible
        effects in the `unset' builtin, word expansions, conditional commands, and
        other builtins that can assign variable values as a side effect. The `unset'
        builtin allows a subscript of `@' or `*' to unset a key with that value for
        associative arrays instead of unsetting the entire array (which you can still
        do with `unset arrayname'). There is a new shell option, `patsub_replacement'.
        When enabled, a `&' in the replacement string of the pattern substitution
        expansion is replaced by the portion of the string that matched the pattern.
        Backslash will escape the `&' and insert a literal `&'. This option is enabled
        by default. Bash suppresses forking in several additional cases, including
        most uses of $(<file).
        All the new features are described below.
        Readline has new features as well. There is a new option:
        `enable-active-region'. This separates control of the active region and
        bracketed-paste. It has the same default value as bracketed-paste, and
        enabling bracketed paste enables the active region. Users can now turn off
        the active region while leaving bracketed paste enabled. Two new bindable
        string variables are available; their values are terminal escape sequences
        that set the color used to display the active region and turn it off,
        respectively. If set, these are used in place of terminal standout mode.
        Finally, Readline now checks for changes to locale settings (LC_ALL/LC_CTYPE/
        LANG) each time it is called, and modifies the appropriate locale-specific
        display and key binding variables when the locale changes.
        There are a few incompatible changes between bash-5.1 and bash-5.2. Here-
        documents and here-strings use temporary files if the shell compatibility
        level is 50 or lower. The `unset' builtin in bash-5.2 treats array subscripts
        `@' and `*' differently than previous versions, and differently depending on
        whether the array is indexed or associative. Bash-5.2 attempts to prevent
        double-expansion of array subscripts under certain circumstances, especially
        arithmetic evaluation, by acting as if the `assoc_expand_once' shell option
        were set. Set the compatibility level appropriately to revert to previous
        behavior; details are in the file COMPAT.
        Bash can be linked against an already-installed Readline library rather
        than the private version in lib/readline if desired.  Only readline-8.1 and
        later versions are able to provide all of the symbols that bash-5.2 requires;
        earlier versions of the Readline library will not work correctly. 
        A complete list of changes between bash-5.1 and bash-5.2 is available in
        the file CHANGES; the complete list is too large to include in this
        Also available is a new release of the standalone Readline library,
        version 8.2, with its own configuration scripts and Makefiles. 
        It can be retrieved with the URLs
        and from the master branch of the GNU readline git repository
        and the usual GNU mirror sites.
        The formatted Readline documentation is included in the readline
        distribution tar file.
        The changes in Readline are described in a separate announcement.
        As always, thanks for your help.
        +========== NEWS ==========+
        This is a terse description of the new features added to bash-5.2 since
        the release of bash-5.1.  As always, the manual page (doc/bash.1) is
        the place to look for complete descriptions.
        1. New Features in Bash
        a. The bash malloc returns memory that is aligned on 16-byte boundaries.
        b. There is a new internal timer framework used for read builtin timeouts.
        c. Rewrote the command substitution parsing code to call the parser recursively
           and rebuild the command string from the parsed command. This allows better
           syntax checking and catches errors much earlier. Along with this, if
           command substitution parsing completes with here-documents remaining to be
           read, the shell prints a warning message and reads the here-document bodies
           from the current input stream.
        d. The `ulimit' builtin now treats an operand remaining after all of the options
           and arguments are parsed as an argument to the last command specified by
           an option. This is for POSIX compatibility.
        e. Here-document parsing now handles $'...' and $"..." quoting when reading the
           here-document body.
        f. The `shell-expand-line' and `history-and-alias-expand-line' bindable readline
           commands now understand $'...' and $"..." quoting.
        g. There is a new `spell-correct-word' bindable readline command to perform
           spelling correction on the current word.
        h. The `unset' builtin now attempts to treat arguments as array subscripts
           without parsing or expanding the subscript, even when `assoc_expand_once'
           is not set.
        i. There is a default value for $BASH_LOADABLES_PATH in config-top.h.
        j. Associative array assignment and certain instances of referencing (e.g.,
           `test -v' now allow `@' and `*' to be used as keys.
        k. Bash attempts to expand indexed array subscripts only once when executing
           shell constructs and word expansions.
        l. The `unset' builtin allows a subscript of `@' or `*' to unset a key with
           that value for associative arrays instead of unsetting the entire array
           (which you can still do with `unset arrayname'). For indexed arrays, it
           removes all elements of the array without unsetting it (like `A=()').
        m. Additional builtins (printf/test/read/wait) do a better job of not
           parsing array subscripts if array_expand_once is set.
        n. New READLINE_ARGUMENT variable set to numeric argument for readline commands
           defined using `bind -x'.
        o. The new `varredir_close' shell option causes bash to automatically close
           file descriptors opened with {var}<fn and other styles of varassign
           redirection unless they're arguments to the `exec' builtin.
        p. The `$0' special parameter is now set to the name of the script when running
           any (non-interactive) startup files such as $BASH_ENV.
        q. The `enable' builtin tries to load a loadable builtin using the default
           search path if `enable name' (without any options) attempts to enable a
           non-existent builtin.
        r. The `printf' builtin has a new format specifier: %Q. This acts like %q but
           applies any specified precision to the original unquoted argument, then
           quotes and outputs the result.
        s. The new `noexpand_translations' option controls whether or not the translated
           output of $"..." is single-quoted.
        t. There is a new parameter transformation operator: @k. This is like @K, but
           expands the result to separate words after word splitting.
        u. There is an alternate array implementation, selectable at `configure' time,
           that optimizes access speed over memory use (use the new configure
            --enable-alt-array-implementation option).
        v. If an [N]<&WORD- or [N]>&WORD- redirection has WORD expand to the empty
           string, treat the redirection as [N]<&- or [N]>&- and close file descriptor
           N (default 0).
        w. Invalid parameter transformation operators are now invalid word expansions,
           and so cause fatal errors in non-interactive shells.
        x. New shell option: patsub_replacement. When enabled, a `&' in the replacement
           string of the pattern substitution expansion is replaced by the portion of
           the string that matched the pattern. Backslash will escape the `&' and
           insert a literal `&'.
        y. `command -p' no longer looks in the hash table for the specified command.
        z. The new `--enable-translatable-strings' option to `configure' allows $"..."
           support to be compiled in or out.
        aa. The new `globskipdots' shell option forces pathname expansion never to
            return `.' or `..' unless explicitly matched. It is enabled by default.
        bb. Array references using `@' and `*' that are the value of nameref variables
            (declare -n ref='v[@]' ; echo $ref) no longer cause the shell to exit if
            set -u is enabled and the array (v) is unset.
        cc. There is a new bindable readline command name:
        dd. In posix mode, the `printf' builtin checks for the `L' length modifier and
            uses long double for floating point conversion specifiers if it's present,
            double otherwise.
        ee. The `globbing' completion code now takes the `globstar' option into account.
        ff. `suspend -f' now forces the shell to suspend even if job control is not
           currently enabled.
        gg. Since there is no `declare -' equivalent of `local -', make sure to use
            `local -' in the output of `local -p'.
        2. New Features in Readline
        a. There is now an HS_HISTORY_VERSION containing the version number of the
           history library for applications to use.
        b. History expansion better understands multiple history expansions that may
           contain strings that would ordinarily inhibit history expansion (e.g.,
        c. There is a new framework for readline timeouts, including new public
           functions to set timeouts and query how much time is remaining before a
           timeout hits, and a hook function that can trigger when readline times
           out. There is a new state value to indicate a timeout.
        d. Automatically bind termcap key sequences for page-up and page-down to
           history-search-backward and history-search-forward, respectively.
        e. There is a new `fetch-history' bindable command that retrieves the history
           entry corresponding to its numeric argument. Negative arguments count back
           from the end of the history.
        f. `vi-undo' is now a bindable command.
        g. There is a new option: `enable-active-region'. This separates control of
           the active region and bracketed-paste. It has the same default value as
           bracketed-paste, and enabling bracketed paste enables the active region.
           Users can now turn off the active region while leaving bracketed paste
        h. rl_completer_word_break_characters is now `const char *' like
        i. Readline looks in $LS_COLORS for a custom filename extension
           (*.readline-colored-completion-prefix) and uses that as the default color
           for the common prefix displayed when `colored-completion-prefix' is set.
        j. Two new bindable string variables: active-region-start-color and
           active-region-end-color. The first sets the color used to display the
           active region; the second turns it off. If set, these are used in place
           of terminal standout mode.
        k. New readline state (RL_STATE_EOF) and application-visible variable
           (rl_eof_found) to allow applications to detect when readline reads EOF
           before calling the deprep-terminal hook.
        l. There is a new configuration option: --with-shared-termcap-library, which
           forces linking the shared readline library with the shared termcap (or
           curses/ncurses/termlib) library so applications don't have to do it.
        m. Readline now checks for changes to locale settings (LC_ALL/LC_CTYPE/LANG)
           each time it is called, and modifies the appropriate locale-specific display
           and key binding variables when the locale changes.
        ``The lyf so short, the craft so long to lerne.'' - Chaucer
        		 ``Ars longa, vita brevis'' - Hippocrates
        Chet Ramey, UTech, CWRU    chet@case.edu    http://tiswww.cwru.edu/~chet/
    • Programming/Development

      • Linux HintExtern in C

        C has an added benefit over other scripting languages since it is a procedural programming language. We can also say that C is a compiler-based programming language that distinguishes between Python and Java, which are interpreter-based. As a result, coding compilation and execution are expedited. The data types in the C language are the declarations or definitions for variables. This defines the variety and volume of data about the variables. C is a strong choice language for beginners to learn programming with. The C programming language is used to write the Unix operating system and practically all Unix applications. Due to this reason, C is currently a frequently used professional language.

        The operative systems of component programs, in a particular way, were initially developed using the C language. Because it produces the code that executes almost rapidly code written in assembly language, and C was adopted as a system development language. To run any C-language program, we must first compile it using a C compiler, which turns C into a computer-understandable language. Visual Studio is the best compiler for user code compilation in C language.

        The topic we will discuss in our article is related to the “C” language, which is a simple keyword that is “extern”. The programmers and coders use this keyword to extend the visibility of any variable and function. Eventually, we don’t need function definition in the “C” language because the function will remain visible in the code by default.

        Furthermore, it has a proclivity to disseminate variables and functions visibility over many source files. We can say that declaring a variable without the assassination of memory allocation. It is not required regularly to declare any function while coding a program. It tweaks the affiliation criteria so that the C compiler does not amend the symbol with extra information. In “C” language, we have another prefix, “static”, which could not be used along with the “extern” in the same declaration of a function definition. External is standardized as an “extern” in the C programming language.

      • Linux HintCommand Line Argument Processing in C

        When we have a program to run, the command line arguments could be the arguments declared in the system’s command line preceding the program’s name. Our program will accept the types of arguments to be passed from the command line after the program’s execution. In the command line argument, we have two main parameters, which are “argc” and “argv”. The “argc” is the argument count, whereas “argv” is the argument vector in the C language. The parameter argument count indicates how many arguments were entered in the command line while writing the program. In context, the argument vector parameter is an array of pointers of the characters of the object in the C programming language for command line argument. The parameter argument count border is frequently more notable than or equal to 1.

        A range of order line parameters presented by the programmers is flawed strings. Argv[0] is the order in which the show triggers the program. The main command-line assertion is argv[1].

        The command-line interface credentials are used in C whenever it is essential to provide the program’s attributes to external sources, and there is no desire to use them within the code. Working framework arguments are the traits that the order line passes to the C program when the instruction is executed. Any parameter presented to the script is indicated by a pointer that is maintained within a pointer vector referenced by “argv[]”. The count of arguments passed to the program is addressed by “argc”. By using Command Line Arguments, the program to be operated can be regulated from a range rather than by hard coding the parameters inside the program.

      • Rust

        • Rust BlogRust Compiler Early October 2022 Steering Cycle

          On Friday, 14 October, we will discuss how to deal with “disabled tests”: tests that are turned off at some point (e.g. due to failures in a component we do not control). We do not currently have any protocols in place to review such tests or decide when to try to re-enabling them.

        • Yoshua WuytsWhy async Rust

          A lot of system design is about thinking of the nature of the domains we encounter. And only later, once we understand them, encoding this understanding in a way that machines can verify it.

          I often find async Rust to be misunderstood. Conversations around “why async” often focus on performance 1 – a topic which is highly dependent on workloads, and results with people wholly talking past each other. While performance is not a bad reason to choose async Rust, we often we only notice performance when we experience a lack of it. So I want to instead on which features async Rust provides which aren’t present in non-async Rust. Though we’ll talk a bit about performance too at the end of this post.

  • Leftovers

    • Proprietary

      • IT WireOracle fined US$23m for violations of Foreign Corrupt Practices Act [Ed: Like Microsoft, Oracle relies on crime to do “business”]

        The US Securities and Exchange Commission has asked Oracle to pay more than US$23 million (A$35.7 million) to resolve charges that it violated the Foreign Corrupt Practices Act.

        In a statement, the SEC said Oracle’s subsidiaries in Turkey, the UAE and India had created and used slush funds to bribe officials for business between 2016 and 2019.

        Oracle subsidiaries in Turkey and the UAE also used these slush funds to pay costs for foreign officials to attend tech conferences. This violated the company’s policies and procedures, the statement said.


        The SEC said its investigation was conducted by Samantha Martin and Laura Bennett and supervised by David Reece. It thanked the Capital Markets Board of Turkey, Emirates Securities and Commodities Authority, and the Securities and Exchange Board of India for their help.

    • Security

      • Help Net SecurityMS SQL servers are getting hacked to deliver ransomware to orgs – Help Net Security

        The ransomware encrypts some files and avoids others, including files with an extension associated with its own activities (.FARGO, .FARGO2, etc.) and that of GlobeImposter, another ransomware threat targeting vulnerable MS SQL servers.

      • LWNSecurity updates for Tuesday [LWN.net]

        Security updates have been issued by Debian (dovecot and firefox-esr), Fedora (firefox and grafana), Red Hat (firefox and thunderbird), Slackware (dnsmasq and vim), SUSE (dpdk, firefox, kernel, libarchive, libcaca, mariadb, openvswitch, opera, permissions, podofo, snakeyaml, sqlite3, unzip, and vsftpd), and Ubuntu (expat, libvpx, linux-azure-fde, linux-oracle, squid, squid3, and webkit2gtk).

      • Dark ReadingDefenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration [Ed: Conflating Linux with clown computing stupidity]
      • Apptainer 1.1.0, a Linux Foundation project (formerly Singularity), Arrives With Added Security Features and Build Improvements – Benzinga

        The Apptainer community today announced version 1.1.0 of the popular container system for secure, high-performance computing (HPC). Improvements in the new version provide a smaller attack surface for production deployments while offering features that improve and simplify the user experience. Apptainer continues the legacy of Singularity with backwards compatibility, stability, added security, performance and reproducibility.

      • USCERTCISA Updates Advisory on Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite

        CISA and the Multi-State Information Sharing & Analysis Center (MS-ISAC) has updated joint Cybersecurity Advisory AA22-228A: Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite, originally released August 16, 2022. The advisory has been updated to include additional Malware Analysis Reports and indicators of compromise.

      • CISACISA Releases Three Industrial Control Systems Advisories | CISA

        CISA has released three (3) Industrial Control Systems (ICS) advisories on September 27th, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • IT WireiTWire – Optus chief under pressure to quit over handling of breach

        Both sides of politics are putting pressure on Optus chief executive Kelly Bayer Rosmarin to step down over her handling of the data breach which the company made public last Thursday.

        Opposition cyber security spokesman James Paterson joined the chorus of criticism on Tuesday, calling on Bayer Rosmarin to resign if the public had been misled on the company’s reaction to the breach.

        Home Affairs Minister Clare O’Neil, who on Monday described the attack on Optus’ network as being anything but sophisticated — as Bayer Rosmarin had claimed — expressed concern on Tuesday about reports that Medicare details had been leaked in the data that was made public.

      • Privacy/Surveillance

        • Why Data Brokers Are After Your Personal Information And How Can You Stay Safe

          Personal data, in the digital space, is synonymous with CVV or card pin protection. It’s part and parcel of the virtual web, giving no room for compromise when it comes to its safekeeping. So, why is there a big fuss about data privacy protection?

          To understand why it needs shielding, it’s prudent to understand what it is. Your data is the digital trail collected from all your Internet activities. Think Hansel and Gretel – your online activities leave a whole lot of breadcrumbs. It contains your confidential information, browser history, and even social media activity.

    • Monopolies

      • Copyrights

        • Public Domain ReviewThe Turns of the *Turnverein*: Heinrich Hamann’s Gymnastic Photographs (ca. 1902) – The Public Domain Review

          More than a set of techniques to improve individual fitness, Johann Friedrich Ludwig Christoph Jahn’s gymnastics were meant to train a new form of body politic.

          Despite their best efforts to keep still and straight-faced, the young, uniformed bodies in Heinrich Hamann’s turn-of-the-century photographs of Hamburg’s St. Pauli gymnastics society (Turnverein) remain in motion. Girls shaping a human pyramid alternate looks of attentiveness and amusement. Boys performing handstands on parallel bars are flanked by onlookers who smile, fidget, or grimace. A series of images involving inventive uses of the pommel horse — to reenact Don Quixote, to strike tableaux vivants of Romulus and Remus, and, when paired with a bicycle, to play “Texas Yack” (Jack) — allow physical education to decay into silliness. Only the adult gymnasts in these photographs approach the gravity of purpose desired by their coach. One can see in Hamann’s photographs both the playful spontaneity of the Turnvereins’ original exercises and the rigid postures and movements that would soon help meld individuals into the fascist masses of the Nuremberg rallies and 1936 Berlin Olympics.

          The Turner movement and its calisthenic equipment sprang from a man known as “the Turnvater”: Johann Friedrich Ludwig Christoph Jahn (1778–1852), a German gymnastics educator and fervent nationalist who took the rough-and-tumble turnen (romping about) of unruly schoolboys and molded it into a populist force. Beginning with simple hikes alongside his students in the Berlin countryside, Jahn developed jumping, throwing, and catching games, as well as now-familiar gymnastics exercises — often performed during patriotic commemorations — to train the undisciplined youth. “Just as the gymnasts bounced over their bars with the firm strength of their bodies”, writes Hans Kohn, “so they expected to bounce into the future Volksstaat with the firm strength of their conviction and will”. More than a set of techniques to improve individual fitness, Jahn’s refinement of Johann Christoph Friedrich GutsMuths’ earlier exercises was meant to train a new form of body politic.

  • Gemini* and Gopher

    • Personal

      • EHIWPRM Wordo: ZONED
      • Here I Lie With Truth

        There’s a lot of things going on in my mind, right now.
        Too many things I want to bring them out, but how?
        Pain, mistakes, regrets, just aches that I have, oh wow!
        Things I wish that I had stopped doing by now, no doubt.

        Every nice thing I try to do goes wrong, you know?
        Break yourself along with the people you love, oh no!
        I tend to win them back with some more truth, although!
        They wont ever know the darker side of me, just hope.

      • disclaimer

        after i returned from my 2 months parental leave i found a great email in my inbox. one from the weekly capitalism update made by a joint delegation of company leaders and hr.

        please update your email signature to include this disclaimer: any references made to address a person are meant to be understood as gendered.

        a bit of background, i work in a german company. in german there is the generic masculinum, which traditionally included all genders (assume hunter, it’s a collection to include everyone that has the profession hunter). usually a profession has a gender, but these are very random and don’t follow any rules. there is something we call “movierung” which is the stem of the word, but in the opposite gender (for hunter this would be huntress). there are different reasons for this, a popular one was to address the spouse of the person in a profession. in german a few hundred years ago you’d call the wife of a carpenter something like carpenteress.

      • New Apartment Woes

        Hi folks, been a while — was coordinating The Grand Migration of one apartment to another.


        Read the damn contract. If you moved in and no one painted the apartment for you, then you don’t need to paint it on the way out.

    • Technical

      • What if The Sims were sentient?

        So I started to re watch a web series, Power Corrupts by darkmatter2525, as the final episode was posted a few days ago and I wanted to go from start to finish to fully enjoy the end. Its a great series and I highly recommend watching it.

        At one point in the story the subject about the ethical treatment of purely digital life comes up. Not just a robot, or a computer that can think. But rather, entire civilizations of fully sentient beings living out their entire lives all in a simulation. *Spoiler Alert* (or not really as its pretty obvious in the first few minutes) these simulated civilizations are created for the shear purpose of providing a testing ground for the “moral fiber” of the flesh and blood human who acts as a god inside the simulation. As the title of the series states power corrupts and the test is to see which humans go bad and which are humble enough and have the will power to not let power go to their heads.

      • Programming

        • Dabbling in CGI

          I’ve always been more of a CGI guy. Output of pages are exactly what gets displayed, no pages with a single div and no content when i examine source. Kind of an odd thing to say as a full stack developer. Within Gemini there isn’t any other option for dynamic data so I feel right at home.

        • 2x Forth

          There are a bunch of rambling essays by Chuck Moore and Jeff Fox at www.ultratechnology.com, referring to 10x Forth and 100x Forth and whatnot.

          They are a fun read for us desperate for Forth trivia and memorabilia… Jeff Fox (Godess rest his soul¹) was a bit of a windbag (look who is talking — I am sure I am called worse), and was not a good explainer of things (neither is Chuck, honestly), but I am due to reread his site because there are morsels of good stuff there.


          This will not work in your dad’s Forth (GForth?), because of interleaved headers. I think you can do that in ColorForth. My newest Forth keeps heads elsewhere, so it is perfectly legal to run into the next-defined word.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Balanced Coverage in Phoronix Today

Posted in Deception, Hardware, Microsoft at 3:13 pm by Dr. Roy Schestowitz

Moments ago:

Phoronix on Intel

Phoronix earlier today:

Phoronix thanks Microsoft

Summary: Phoronix does a lot of promotional ads today while raising corporate money

Links 27/09/2022: CRUX 3.7 Released and Project Caviar

Posted in News Roundup at 10:19 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Its FOSSSystem76 Won’t Release Pop!_OS 22.10 Linux Distro: Here’s Why!

        Pop!_OS is an Ubuntu-based distro that offers a polished user experience alongside a robust software suite.

        Pop!_OS releases are usually worth the wait for their latest tech stack and useful tweaks they bring in with their desktop environment experience.

        But, you will not be getting a Pop!_OS 22.10 release.

        System76 wants to focus on developing its own Rust-based COSMIC desktop environment ditching GNOME for future releases.

    • Audiocasts/Shows

    • Kernel Space

      • Barry KaulerKernel 5.15.70 with simplefb

        …I did decide to keep the legacy framebuffers, using the rather vague logic that it might be better for older hardware. At least, I think that was my reasoning at the time.

        Limine developer mintsuki fixed it. But, tested with an older kernel that has “simple framebuffer” not legacy-framebuffers, and the problem I had with black screen on my old “HP motherboard” PC, just went away — it booted.


        Note, CONFIG_FB_SIMPLE is also deprecated, it is missing in the 5.16 kernel, replaced with CONFIG_DRM_SIMPLEDRM. Will cross that bridge when I get to it.

      • IT WireSupport for Rust will be merged in 6.1 kernel, says Torvalds

        Linux creator Linus Torvalds says the initial merging of support for the Rust programming language in the Linux kernel should happen with the 6.1 release.

        Responding to queries, he cautioned that this would be “literally just the infrastructure – not actually *doing* anything yet, just setting the stage for things”.

        First released 12 years ago, Rust has a notable advantage in that it is designed to provide memory safety, thus ensuring that many types of vulnerabilities can be caught at compile time.

        It was designed by Mozilla Research developer Graydon Hoare in 2006 and refined during the writing of the Servo experimental browser engine and the Rust compiler.

      • OS NewsLinux optimised for 386 and 486

        Do you have some old 386 or 486 machines lying around, collecting dust, but want them to become productive members of your computer household? Fret no more – there’s gray386linux and gray486linux, distributions specifically tailored for these two older architectures. I’m not entirely sure what you’d actually do with them, but fascinating projects nonetheless.

    • Applications

      • TechRadarQEMU review

        Qemu was created by Fabrice Bellard, a famous French computer programmer known for other creations like FFmpeg, a multimedia library tool, and the Tiny C Compiler designed to work on slow computers with limited disk space.

        Bellard released the first version of Qemu in 2011. It’s a free and open-source software licensed under the GNU General Public License (GPL).

    • Instructionals/Technical

      • TecMint21 Tar Command Examples in Linux [Ed: New updates]
      • UbuntubuzzLibreOffice Writer: Set Paper Size F4 or Folio

        This tutorial will help you in setting up F4 or Folio paper size in LibreOffice Writer in step by step with examples and pictures. This includes making templates so you can quickly make F4 documents without repeating paper size setup and further make PDF for easy printing. Now let’s try it out.

      • Red Hat OfficialMonitor remote systems with Ansible and Jinja2 templates | Enable Sysadmin

        Use automation and templates to gather and save information about your Linux virtual machines.

      • Linux HintPartitioning the Hard Disks Under Debian/Ubuntu and Resizing the Partitions

        This tutorial explains how to partition the hard disks and resize the partitions under Linux.
        After reading this tutorial, you will be able to partition your hard drive and resize the partitions both from the command line and from the graphical environment. The programs used in this tutorial are fdisk, cfdisk and GParted.

        In this tutorial, we will partition our hard disk both in graphical and command modes and resize the different partitions.

        All steps described in this article contain screenshots, making it easy for every user to understand and follow them.

      • Linux HintCheck Disk for Errors Linux Mint 20.3

        It is prevalent for your system disks to become corrupted. However, the extent to which this corruption occurs may vary from situation to situation, i.e., you may have your entire disk corrupted or some of its partitions only. Nevertheless, in either case, you need to identify and fix these issues well in time to save yourself from a more significant and serious problem. Therefore, this guide will teach you how to check the disk for errors on a Linux Mint 20.3 system.

      • Linux HintPing Command in Ubuntu 22.04

        Ping is a built-in command line utility available in nearly all operating systems including Linux. It allows you to verify the network connectivity between your system and another network device. Ping also measures the response time which is the time a packet takes to transmit from the sender to the host and then back to the sender. Using the ping command, you can also resolve the IP address of a hostname or URL.

        In this article, we will explain how ping works and how to use it in the Linux system. We execute all the following-mentioned commands on Ubuntu 22.04.

      • Linux HintDebian Package Search

        We understand if you are looking for a quick way of searching deb packages and others installed with a snap. Furthermore, you probably want to get information about a package that is not installed or the list of all installed packages. In that case, this guide arms you with various tools and tips to enhance your package search on Debian systems.

      • BSDlyA Few of My Favorite Things About The OpenBSD Packet Filter Tools

        So how do we go about writing that perfect firewall config?

        I could go on about that at length, and I have been known to on occasion, but let us start with the simplest possible, yet absolutely secure PF ruleset: [...]

      • Manuel MatuzovicDay 1: custom properties and fallbacks

        It’s time to get me up on speed with modern CSS. There’s so much new in CSS that I know too little about. To change that I’ve started #100DaysOfMoreOrLessModernCSS. Why more or less modern CSS? Because some topics will be about cutting-edge features, while other stuff has been around for quite a while already, but I just have little to no experience with it.

      • Vector VS. Raster Images: Choosing The Right Format

        A vector graphic’s small file size and scalability makes it uniquely suitable for use in digital printing from business cards to billboards. They’re also used in lower thirds for videos, web-based objects and rendering 2D or 3D computer animation. Their native files are needed for coin designs, laser engraving, t-shirts, patches, etc. Raster images are best for digital photos and print materials. If your project requires scalable shapes and solid colors, vector is the best choice, but if your project requires complex color blends, raster is the preferred format.

      • Its FOSSWhat is a Loop device in Linux? – It’s FOSS

        If you are an Ubuntu user, then you’ll get a long list of loop devices as shown in the screenshot above.

        It is because of snaps, the universal package management system developed by Canonical. The snap applications are mounted as loop devices.

        Now, this raises another set of questions such as what is a loop device and why snaps applications are mounted as a disk partition.

        Let me shed some light on the topic

      • ID RootHow To Install OpenShot on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install OpenShot on Ubuntu 22.04 LTS. For those of you who didn’t know, OpenShot Video Editor is a free and open-source video editor, that has many features that you would expect from a professional video editor, including timeline editing, drag-and-drop support, image sequences, keyframes, audio mixing, and waveform visualization. It is available for Linux, macOS, and Windows systems.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the OpenShot video editor on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Linux HandbookHow to Deploy ONLYOFFICE Docs Server on RHEL/CentOS

        ONLYOFFICE Docs is a web-based office package that is designed for local deployment and comes with a free desktop client for Linux, Windows and macOS. The suite is open-source and combines collaborative editors for text documents, spreadsheets, presentations and fillable forms that are highly compatible with the OOXNL formats (DOCX, XLSX and PPTX). ONLYOFFICE Docs is also equipped with a viewer for PDF and DjVu files and can convert such files to other formats.

        ONLYOFFICE Docs offers a set of standard editing tools and features for collaborative work, including, Fast and Strict co-editing modes, Track Changes, Version History, comment and user mentions, document comparison and real-time communication.

        With ONLYOFFICE Docs, it’s possible to create a collaborative environment on a Linux server by integrating the suite with a file-sharing platform or a DMS service. The most popular integration examples include Nextcloud, Seafile, ownCloud, Redmine, WordPress, Confluence, SharePoint, Alfresco, Chamilo, Liferay, Moodle, etc.

      • Linux BuzzHow to Install Docker on AlmaLinux 9 Step-by-Step

        In this guide, we will cover how to install docker on AlmaLinux 9 step-by-step.

        Docker is a free and open-source containerization tool that enables enable developers to package their application into a container. Later that container image can be used to deploy and run application on public or private cloud.

      • Linux Shell TipsHow to Install Latest Python on Arch Linux

        The legend of Python as a growing favorite among the numerous programming languages that exist in the Linux ecosystem continues to inspire the onset of numerous projects that are both commercial and individual.

        While on a Linux operating system environment, you can never run out of project ideas that draw inspiration from the Python programming language footprints.

      • Linux CapableHow to Install PowerShell on Raspberry Pi OS [Ed: Microsoft infection; not recommended for GNU/Linux users]
      • Linux HintHow to Install Onedrive on Linux Mint 21 [Ed: Microsoft/NSA surveillance; not recommended for GNU/Linux users]
      • markaicode by MarkHow to Install NPM on Linux Mint 21 [Ed: Microsoft malware vector; not recommended for developers or GNU/Linux users]
      • RoseHostingHow to Install Magento 2.4 on Debian 11 – RoseHosting

        Magento is a very well-known e-commerce platform and highly customizable application. It offers open-source and commercial versions to help developers build eCommerce websites. Magento Commerce, formerly known as the enterprise edition, offers more extensive out-of-the-box features and unlimited scaling. In this tutorial, we will show you how to install Magento Open Source (formerly known as community edition) on Debian 11.

      • Linux CapableHow to Install Pale Moon Browser on Raspberry Pi OS

        Pale Moon is a web browser built on an independently developed source that offers features and optimizations to improve stability. It was forked off from Firefox/Mozilla code many years ago. Its focus is efficiency in use by carefully selecting what should be included – it has full customization options alongside this growing collection of tools!

        Pale Moon provides a balance of features and performance to satisfy the needs for general use while still evolving technology on Web standards.

        In the following tutorial, you will learn how to install Pale Moon Browser on the Raspberry Pi OS Desktop desktop using the command line terminal that supports 32-bit and 64-bit variants and tips about maintaining and removing the browser versions.

      • DebugPointHow to Migrate to Fedora Linux from Ubuntu [Beginner’s Guide]

        Here’s a quick model on how to migrate to Fedora from the Ubuntu desktop, for good & save yourself from “snap drama”.

        Ubuntu and Fedora – are both great Linux operating systems.

        They are used by millions of users every day and are available for desktops, servers, and cloud deployments. Fedora is sponsored by Red Hat and developed by the community, whereas Ubuntu development is managed by Canonical.

        They follow a separate release schedule and have a different package management process. Otherwise, they are the same if you think of them as just a Linux distribution. So that said, it is not that difficult to migrate to Fedora for a long-term Ubuntu user. And use Fedora as a daily driver.

      • Linux HintHow to Monitor and Optimize Power Usage on Linux?

        Battery use on Linux is particularly high as compared to other operating systems. One of the reasons behind this unusual power drainage is that the hardware vendors do not provide the essential documentation for Linux kernel developers to create the power optimized drivers. Linux holds just 2% of the market share in desktop technology which is why an adequate attention is not given in this area. As Linux users, we ought to be concerned about monitoring the power use on our systems and be aware of the different ways where we can optimize the battery/power usage.

        Today, we will explore how to monitor the power usage on Linux using different ways. We will first see how it can be achieved via Graphical User Interface (GUI). Then, we’ll make use of the Linux command line to achieve the same. We will also discuss some methods to optimize the power usage on a Linux system. In this tutorial, we demonstrate the steps on an Ubuntu 22.04 system. The commands that are used in this guide are simple. And the tools that we use can be easily installed in Ubuntu 22.04. Most of the methods discussed here can be replicated on almost all Linux distributions.

      • QtHow to create a REST API with QtHttpServer

        Back in 2019 we announced QtHttpServer to the public, now we are extremely happy to introduce a technical preview, starting in Qt 6.4. for this project.

      • H2S MediaHow to install Virt-Manager on Ubuntu 22.04 LTS Linux

        Virtual Machine Manager, also known as virt-manager or VMM for short, provides a unified user interface for creating and managing virtual machines. VMM relies on libvirt, i.e. it supports the virtualization solutions that libvirt also supports. These include QEMU, KVM, and Xen, but not VirtualBox or VMware Player.

        VMM offers both a graphical user interface and several command-line programs. VMM is written entirely in Python.

        The special feature of VMM is that it forms a kind of intermediate layer so that the management of the virtual machines is uniform, no matter which virtualization solution is used, which reduces the administration effort. The configuration is stored in XML files so that this can also be corrected manually as required. The managed virtual machines can also be located on another computer (e.g. another server), and the connection to it can also be encrypted.

      • Install Fleet Osquery Manager on Oracle Linux – kifarunix.com

        Follow through this tutorial to learn how to install Fleet osquery manager on Oracle Linux. “Fleet is the most widely used open source osquery manager.

      • Trend OceansHow to Enable SSH Service in Rescue Mode on CentOS/RockyLinux/AlmaLinux

        This guide will not be helpful at the moment, but make sure to bookmark this article to enable ssh service in rescue mode to take a backup of your system, configuration, and generate an SOS report, etc.

      • DebugPointMigrate to Fedora from Ubuntu [Essential Beginner's Guide]

        Ubuntu and Fedora – are both great Linux operating systems. They are used by millions of users every day and are available for desktops, servers, and cloud deployments. Fedora is sponsored by Red Hat and developed by the community, whereas Ubuntu development is managed by Canonical.

        The objective of this guide is for desktop migration.

        That means if you have been using Ubuntu on your Laptop/desktop for some time and never had a chance to try out the Fedora Linux workstation, then this article is for you.

    • Games

  • Distributions and Operating Systems

    • New Releases

      • CRUX 3.7 Released

        This page discusses the relevant changes introduced in CRUX 3.7. Everybody upgrading from the previous release is advised to carefully read the following notes.


        CRUX 3.7 comes with a multilib toolchain which includes glibc 2.36, gcc 12.2.0 and binutils 2.39

    • BSD

    • Fedora Family / IBM

      • Bartłomiej Piotrowski: Enforcing pull request workflow and green CI status of PRs on Flathub repositories

        Starting from 2022-10-04, we’re going to tighten the branch protection settings by disabling direct pushes to protected branches (i.e. master, beta, and the ones starting with branch/) and requiring status checks to pass. This means that all changes will need to go through a regular pull request workflow and require the build tests to pass (i.e. that they be green) on Buildbot before being merged.

        As part of this change, we’re introducing two new checks as well. Manifests will be linted with flatpak-builder-lint to ensure compliance with best practices we suggest doing the initial review phase. If your app should be exempted from specific linter rules, please open an issue with an explanation why.

      • Fedora ProjectFedora Community Blog: Call for Proposals: FWD 2022

        The Diversity, Equity, and Inclusion (DEI) team is hard at work in the preparation for Fedora Week of Diversity (FWD). We would love to have a larger group of volunteers to make Fedora Week of Diversity bigger and better this year to celebrate our diverse and inclusive community.

        FWD will take place on October 14th and 15th on the Hopin platform. We are also hosting an online game on https://teambuilding.com/ for all participants to play and attend connection games.

      • Enterprisers Project5 interview questions to detect an IT innovator

        After thousands of interviews hiring innovators, I’ve learned what leads to better hiring and excellent team outcomes. Surprisingly, teams often overlook fundamental components of the hiring process.

      • OpenSource.comGet change alerts from any website with this open source tool | Opensource.com

        The year was 2020, and news about COVID-19 came flooding in so quickly that everyone felt completely overwhelmed with similar news articles providing updates with varying degrees of accuracy.

        But all I needed to know was when my official government guidelines changed. In the end, that’s all that mattered to me.

        Whether the concern is a pandemic or just the latest tech news, keeping ahead of changes in website content can be critical.

        The changedetection.io project provides a simple yet highly capable, open source solution for website change detection and notification. It’s easy to set up, and it can notify over 70 (and counting) different notification systems, such as Matrix, Mattermost, Nextcloud, Signal, Zulip, Home Assistant, email, and more. It also notifies proprietary applications like Discord, Office365, Reddit, Telegram, and many others.

      • Red HatEnd-to-end field-level encryption for Apache Kafka Connect | Red Hat Developer

        Encryption is valuable in Apache Kafka, as with other communication tools, for protecting data that might be sent to unanticipated or untrustworthy recipients. This series of articles introduces the open source Kryptonite for Kafka library, which is a community project I wrote. Kryptonite for Kafka requires no changes to source code, as it works entirely through configuration files. It currently does so by encrypting data through integration with Apache Kafka Connect, but there are plans to extend the scope of the project to other integration strategies for Kafka.

        This first article in the series demonstrates encryption on individual fields in structured data, using a relational database and a NoSQL database as examples. The second article focuses on files and introduces some additional sophistication, such as using different keys for different fields.

    • Devices/Embedded

      • Linux GizmosBox PC packs Rockchip X3588 chipset and runs on Android 12.0

        Polywell Computers recently unveiled a fanless Box PC integrating the Rockchip 3588 SoC to target digital kiosks, network security and other commercial applications. The X58 Box PC offers up to 8GB of RAM, 64GB of eMMC storage, dual GbE LAN ports and onboard wireless connectivity.


        The X58 also provides optional features including one RS232 Serial COM port (optional RS485) and a 4-pin RS232 Serial COM header (optional TTL).

        Lastly, the product seems to support Android 12.0, but customers might need to reach out to the Polywell Computers to get compatible images since they are not available on the product page.

    • Open Hardware/Modding

      • UbuntuIoT project lifecycle: App-centric software development [Part II] | Ubuntu

        The traditional embedded Linux development model ties applications to the OS. Such a constraint means apps have to target a specific release, which lowers development velocity. Furthermore, broken upgrades in one part of the device may affect refreshes in the rest of the OS.

        On the other hand, embedded developers are increasingly looking at open-source software to enable rapid app-centric software deployment and global collaboration.

        Does Ubuntu offer a production-grade platform suited for the modern app-centric world of IoT devices? Let’s find out.

      • Raspberry PiExperience AI with the Raspberry Pi Foundation and DeepMind

        I am delighted to announce a new collaboration between the Raspberry Pi Foundation and a leading AI company, DeepMind, to inspire the next generation of AI leaders.

      • New York TimesMy Parents Are Hackers Out of Necessity

        People with disabilities like my parents have become hackers out of necessity, forced to find innovative ways to thrive in a world constructed for the non-disabled. At my mom’s local accessible gym, a bungee cord was attached to the ceiling, allowing her to walk on a treadmill with less resistance — a sort of do-it-yourself antigravity treadmill, as it were. To reach the remote that controls her van’s wheelchair lift without getting out, my mom has tied the control around the skinny metal pole of the driver seat’s headrest. Daily hacks like this may seem small, but they reflect the daily ingenuity of the larger disabled community.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • HackadayRobotic Platform Is Open Sourced And User Friendly

      Having a 3D printer or a CNC machine available for projects is almost like magic. Designing parts in software and having them appear on the workbench is definitely a luxury. But for a lot of us, these tools aren’t easily available and projects that use them can be out-of-reach. That’s why one of the major design goals of this robotics platform was to use as many off-the-shelf components as possible.

    • Garrit FrankeSelf-hosted software I’m thankful for

      Self-hosting software is not just rainbows and sunshine. I used to self-host a lot of my tools, but after some time the burden of maintaining those tools made me switch to hosted alternatives.

      However, there are a few projects that I stuck with over the years, and which I think deserve a deep appreciation.

    • Open AIIntroducing Whisper

      Whisper is an automatic speech recognition (ASR) system trained on 680,000 hours of multilingual and multitask supervised data collected from the web. We show that the use of such a large and diverse dataset leads to improved robustness to accents, background noise and technical language.

    • AIMOpenAI Open-Sources ‘Whisper’ — a Multilingual Speech Recognition System

      Speech recognition remains a challenge in AI. However, OpenAI has just moved one step closer to solving it. In a blog post last week, OpenAI introduced Whisper—a multilingual, automatic speech recognition system that is trained and open sourced to approach human level robustness and accuracy on English speech recognition.

    • Web Browsers/Web Servers

      • Mozilla

        • QuartzGhana’s most popular language will be available to more people online

          Mozilla, the web browser company, says it has added Twi to Common Voice, its open source database of languages crowdsourced from real people who speak them. The aim is to feed the data into speech recognition software and increase the availability of diverse local languages on the [Internet], deconstructing a world where European-colonial languages are the default (in some cases, only) mediums of online communication.

          African linguists have complained for years that the [Internet] is eliminating entire histories since “if a machine doesn’t understand your language it will be like it never existed,” Vukosi Marivate, chief of data science at the University of Pretoria in South Africa, said last year. That is mostly due to a lack of effort by [Internet]-based platforms that fail to provide the necessary support features: most do not provide first-language interface support for more than 90% of all Africans, as a survey by an Oxford Internet Institute-backed survey found.

    • Productivity Software/LibreOffice/Calligra

      • TecMintTop 5 Open Source Plugins for ONLYOFFICE Docs

        ONLYOFFICE Docs is a good alternative to Microsoft Office for Linux-based operating systems. In a nutshell, it’s an online office package that comes with web-based editors allowing you to create and edit text documents, spreadsheets, presentations, and fillable forms in your browser.

        The suite is notable for its complete compatibility with the OOXML formats (DOCX, PPTX, and XLSX) and support for other popular formats, including ODF.

      • Its FOSSONLYOFFICE 7.2 Introduces Plugin Marketplace, Live Viewer, and More

        ONLYOFFICE is an open-source office suite that offers a lot of utility in a relatively small package.

        This follows the previous major release of ONLYOFFICE 7.1 and offers quite a few improvements.

        Let’s see what is on offer.

      • The Register UKOnlyoffice version 7.2 released, download for free • The Register

        The latest point-release of Onlyoffice, a free Microsoft Office-compatible suite, is here with multiple small improvements and better support for Asian and African writing systems.

        Despite Microsoft’s seemingly unassailable hegemony, Office does still have rivals other than Google Docs. There’s more than one free-and-open-source productivity suite out there. Onlyoffice has a few points in its favor, and the new version 7.2 increases its appeal.

        Onlyoffice 7 came out at the start of the year and this is the second point-release. This version has improved font support, notably for handling ligatures – the combined characters created by joining two (or more) letters together. This isn’t a big deal in English; it’s useful for some words of Latin origin, such as anæsthetic. However, for some alphabets, where most or all letters join together, it’s critical, so this means Onlyoffice 7.2 now has much better support for Bengali (বাংলা বর্ণমালা) and N’Ko (ߒߞߏ), among others.

    • Content Management Systems (CMS)

      • Linux LinksBest Free and Open Source Julia Static Site Generators

        LinuxLinks, like most modern websites, is dynamic in that content is stored in a database and converted into presentation-ready HTML when readers access the site.

        While we employ built-in server caching which creates static versions of the site, we don’t generate a full, static HTML website based on raw data and a set of templates. However, sometimes a full, static HTML website is desirable. Because HTML pages are all prebuilt, they load extremely quickly in web browsers.

    • Education

      • Eerie LinuxEuroBSDCon 2022, my first BSD conference (and how they are different)

        I’ve been to my share of IT conferences, both as a regular attendee and as a speaker. However I’ve never been to any BSD conference until last weekend when I went to EuroBSDCon in Vienna. Chances are that you’ve heard that these conferences are different. And oh boy, they are! Do yourself a favor and go see for yourself if you’ve got any chance of doing so!

        This is a long article with which I hope will give readers interested in this past EuroBSDCon a good overview of what that conference was like for a complete newcomer. Be my guest and join me relive some of what I experienced a week ago!

    • Openness/Sharing/Collaboration

      • Open Access/Content

        • Jon UdellCurating the Studs Terkel archive

          What you’d really rather do is search for the words in a transcript, select surrounding context, use that selection to define an audio segment, and share a link to both text and audio. That’s exactly what I did to produce this powerful link, courtesy of WFMT’s brilliant remixer, which captures both the written words I quoted above and the spoken words synced to them.

    • Programming/Development

      • QtCommercial LTS Qt 6.2.6 Released

        We have released Qt 6.2.6 LTS for commercial license holders today. As a patch release, Qt 6.2.6 does not add any new functionality.

        You can add Qt 6.2.6 to the existing online installation by using the maintenance tool or do a clean installation by using the Qt Online Installer. Offline installers are available in the Qt Account download area.

      • OpenSource.com165+ JavaScript terms you need to know | Opensource.com

        JavaScript is a rich language, with sometimes a seemingly overwhelming number of libraries and frameworks. With so many options available, it’s sometimes useful to just look at the language itself and keep in mind its core components. This glossary covers the core JavaScript language, syntax, and functions.

      • Linux Hintsscanf() Function in C

        In the various programming languages like C, we always encounter programs that contribute to taking the input from the user in the form of any value typed from the keyboard input, which involves the use of the scanf() method. But several other programs exist where we want to read the data formatted from the other string instead of keyboard input. For such types of reading formatted strings from one string to another, we use the sscanf() method. This function overwrites the value in one string with the other string, or when it extracts and breaks the one whole string into two different strings. Suppose we have a string “hi to the world”. We break and store this string into three other strings and store it in another variable; then, we may use the sscanf() method.

      • Linux HintStrstr Function in C

        The strstr() function is a built-in function used to process strings that are handled by library string.h. It is the library that provides us multiple functions to manipulate string. strstr() is used to find the specified main string’s first appearance of the matched substring by searching the source string. If the search is successful, it will return a pointer to the first substance of a substring in a string to be searched. In case it is appearing for more than once, it will pass the pointer to the first appearance of the substring. If the desired substring doesn’t appear, it will return null /0.

      • Linux HintStrtok Function in C

        “The strtok() function is a predefined C library function that enables us to break strings into multiple strings or zero, the most important point while splitting strings to keep in mind is that it can’t be empty or null.

        Two parameters are passed to the strtok() function that is responsible for tokenizing the string; the first parameter is the on that holds the string that is to be tokenized, while the second one is the delimiter that holds the keyword or character which will define the start and end of the string at which it is tokenized. The strtok() function ignores the delimiter part and simply displays the string that is right next to the delimiter.

        Whenever the strtok() function is called, the pointer to the next token, which is denoted by a null-terminated string, is returned. When it accounts for the end of the string where no token is discovered, it will return null.”

      • Linux HintStructures in C

        “In C Language, Structures are combined data type initialization that is used to group multiple variables in a single type; variables that are grouped must be related to each other. It allows those variables to be accessed by a single pointer. The main difference between a Structure and an Array is that an Array has only a single datatype, but on the other hand, a Structure can hold different datatypes. Hence, we can say that structure is a user-defined datatype that is used to store multiple variables with different datatypes in a single block to store a specific type or record.

        Let’s suppose we need to store a record of a person; that type of record will have attributes with different datatypes like Number, Name in Char, etc. For that purpose, we cannot use Array as it stores records with the same data type. The structure will come in handy in this case for us. It is a way to different group datatypes, and defining it means we are creating our new datatype.”

      • Linux HintStrncpy in C

        Strncpy is also known as String Copy Function. It is a crucial function that is offered by the C Language’s C String Library. Strncpy is responsible for copying a chunk of one string’s content into another.

      • Linux HintStatic Variables in C

        “C is a very flexible language when it comes to allocating different variables in a function or outside the function. A static variable is one of those variables that are declared “statically” in a program. The starting value of the static variables is zero. Static variables continue to function while the program runs.”

      • Linux HintSwitch Cases in C

        In the C programming language, sometimes we may encounter variables that have different operations for different values. Such a variable is known as the switch case variable. We use the switch case because it has the switch statements and it replaces the if else-if statements in the C. The switch case has one switch expression which is verified by comparing its value with the switch statements that keep on changing. If the value is matched, the statement, in that case, is printed. Otherwise, in the case where there is no match found, the default value is executed after checking the match in all switch cases.

        There are some restrictions on the use of these switch cases. First of all, the switch expression is required to have the data type char or integer. The value of each case should be used inside of the switch case statement and its data type must be an integer or const char (constant character).

      • Linux HintTypecasting in C

        “In typecasting, the compiler changes the datatype of our variables by itself based on how we want the program to run. C operations can only be performed with similar datatypes. If datatypes become different, then, in that case, typecasting will occur.

        In C Language, we define variables or constants with specific datatypes, if after the declaration of our variables, we are writing an expression or performing some operation, and we may get the output from it in a different type. So to maintain the type, we need typecasting for that purpose. Let’s suppose we are taking two integers and dividing them by each other; the result may be in a double datatype because of the points value. So to resolve the issue, we will use the concept of typecasting.

        There are two types of typecasting one is Implicit and the other one is Explicit.

        In Implicit Typecasting, the process is done by the compiler, and no information is lost. In Explicit Typecasting, we as a programmer will do the casting manually, and in doing so, we might lose the information.”

  • Leftovers

    • Ruben SchadeThis news site link may surprise you

      Sites employ dark patterns because they generate income. Until the financial incentives are flipped or no longer exist, expect to see more of these amazing, trendsetting standards that twelve out of five of us don’t know about.

    • Vanity FairDarth Vader’s Voice Emanated From War-Torn Ukraine

      Obi-Wan Kenobi provided a rare moment of celebration. The Respeecher employees who were still residing in Kyiv gathered to watch Vader’s first appearance on the show and called Belyaev in Lviv to cheer for him. Viewers adored Vader’s terrifying return, praising his chilling presence. Jones’s family told Wood how pleased they were with the result of all the work, a tribute to the actor that honors his many years giving voice to the galactic tyrant.

    • Science

      • Matt RickardHard to Compute, Simple to Verify

        Large-language models are a different way of solving a hard to compute, easy to verify problems. Before LLMs, if you were given a prompt, generating the associated image took time. A talented artist could take a few hours (minutes, days, etc.) to create a polished piece. Once created, it would be easy to verify if it fits the criteria – is this an image of a horse wearing sunglasses? LLMs make the problem (relatively) easy to compute.

    • Education

      • Telex (Hungary)I don’t believe the government is waiting for EU funds to raise teachers’ wages

        On Monday morning, hundreds of teachers and students formed a human chain around one of Hungary’s best schools, Fazekas Mihály elementary and high school in Budapest. They were protesting the conditions in education, especially the extremely low pay of educators. As one of the teachers who organized the protest told us: “If we did not stand up now, the example we would show our students would entitle them to make us badges which say: “I am a coward”.

    • Hardware

      • TalospaceTonight’s Game On OpenPOWER: ZGloom

        Building it from source is straightforward; Fedora 36 has SDL2, SDL2_mixer and libxmp. Before you type make (or make -j24), however, edit the Makefile and add -O3 -mcpu=power9 to the CXXFLAGS. Then download this ZIP of the game resources, unzip it, and copy or symlink the ZGloom binary inside the resulting directory. While you can jump to any level from the main menu, game settings (graphics, keys, etc.) are controlled from the in-game menu after you actually start one.

      • HackadayTiny Dongle Brings The Hard Drive’s Song Back To Updated Retrocomputers

        Back in the “beige box” days of computing, it was pretty easy to tell what your machine was doing just by listening to it, because the hard drive was constantly thrashing the heads back and forth. It was sometimes annoying, but never as annoying as hearing the stream of Geiger counter-like clicks stop when you knew it wasn’t done loading a program yet.

      • HackadayWhen 3D Printing Gears, It Pays To Use The Right Resin

        There are plenty of resins advertised as being suitable for functional applications and parts, but which is best and for what purpose?

      • HackadayLending A Helping Hand To Hens With AI

        As anyone who has taken care of chickens or other poultry before will tell you, it can be backbreaking work. So why not build a robot to do all the hard work for us? That’s precisely what [Aktar Kutluhan] demonstrated with an AI-powered IoT system that automatically feeds chicks and monitors unhatched eggs.

    • Health/Nutrition/Agriculture

      • CoryDoctorowMcKinsey and Providence colluded to force poor patients into destitution

        Though Providence is nominally a nonprofit, but it sits atop a $10 billion private equity fund that it invests in unrelated sectors. Its nonprofit status lets it evade $1.2 billion per year in federal and state taxes. The company stole $500,000,000 in US covid relief intended for hospitals in danger of closure. Its CEO makes $10,000,000 per year.

      • Mexico News DailyReviving the cultivation of ‘green gold’: Mexican scientists create modified henequen agave

        According to a report by the news agency EFE, the scientists visited henequen (Agave fourcroydes) plantations years ago and selected the most robust, resistant and leafiest plants. They removed the plants, took them to CICY labs and used in vitro genetic engineering processes to create “elite henequen” from them.

    • Pseudo-Open Source

      • Openwashing

        • Open Source Bait and Switch

          The bad thing is corporate cynicism. Take Google. They open sourced Android when it had no users. Companies built on top of it and so did developers. Advocacy formed around it because “it’s open source”. Then they released the closed source Google Play Services which later added the SaaS Firebase requirement for some essential functionality (it’s free for that at the moment) and now we have deep vendor closed source dependencies masquerading as open source.

    • Security

      • IT WireiTWire – Cold feet? Optus attacker changes tack, says all data deleted

        The attacker who allegedly breached the networks of Optus appears to have developed cold feet, posting a note saying that he/she has deleted all the data that was exfiltrated.

        “Too many eyes. We will not sale data to anyone. We cant if we even want to; personally deleted data from drive (Only copy),” the attacker wrote.

        But security researcher Brett Callow pointed out that the 10,200 samples that had already been leaked were now being shared by another forum member.

      • Simon WillisonYou can’t solve AI security problems with more AI

        One of the most common proposed solutions to prompt injection attacks (where an AI language model backed system is subverted by a user injecting malicious input—“ignore previous instructions and do this instead”) is to apply more AI to the problem.

      • HackadayReverse Engineering Hack Chat With Matthew Alt

        Join us on Wednesday, September 28 at noon Pacific for the Reverse Engineering Hack Chat with Matthew Alt!

      • Bruce SchneierNew Report on IoT Security

        The Atlantic Council has published a report on securing the Internet of Things: “Security in the Billions: Toward a Multinational Strategy to Better Secure the IoT Ecosystem.” The report examines the regulatory approaches taken by four countries—the US, the UK, Australia, and Singapore—to secure home, medical, and networking/telecommunications devices. The report recommends that regulators should 1) enforce minimum security standards for manufacturers of IoT devices, 2) incentivize higher levels of security through public contracting, and 3) try to align IoT standards internationally (for example, international guidance on handling connected devices that stop receiving security updates).

      • Fractal security audit – Julian’s Code Corner

        Projects that receive funding from NLnet are required to have their code audited for potential security issues. Ours was performed by Radically Open Security, a Non-Profit Computer Security Consultancy from the Netherlands.
        Since Fractal, by design, doesn’t include much security critical code the security researcher extended the quick scan somewhat also to the matrix-rust-sdk.

        I have been in direct contact with the security researcher and they kept me up-to-date about their findings. This way, I could already during the audit start to fix identified security issues. Luckily, no major security issue was identified.

      • Integrity/Availability/Authenticity

        • 9to5GoogleSome Google Photos users finding that old images have been ‘corrupted’

          According to those affected, the corruption persists when downloading the image. This apparently applies to both individual downloads and when using Google Takeout. The original copies of pictures do not appear to be impacted, but the edited ones are what appear in the Google Photos apps.

          Dozens of reports and examples show near-identical instances of this issue. The problem looks to have resided for some in the last day, but others are still affected. As such, it’s more than likely that there is a solution on Google’s end for this.

      • Privacy/Surveillance

        • NPRPutin grants Russian citizenship to Edward Snowden

          Former National Security Agency contractor-turned-whistleblower Edward Snowden has been granted Russian citizenship. The news was confirmed in a decree by Russian President Vladimir Putin posted Monday to the Kremlin’s website.

        • Common DreamsAfter Nearly a Decade in Exile, Snowden Granted Russian Citizenship

          “After two years of waiting and nearly 10 years of exile, a little stability will make a difference for my family.”

        • MeduzaPutin grants Russian citizenship to Edward Snowden — Meduza

          Russian President Vladimir Putin has granted Russian citizenship to former U.S. National Security Agency (NSA) contractor Edward Snowden, according to an executive decree published on the Russian government’s official website. Snowden fled the U.S. in 2013 after leaking classified information on NSA surveillance programs.

        • The HillTikTok could face $29 million fine from UK over kids’ data privacy violations

          TikTok allegedly breached the U.K.’s protections for children’s data privacy between May 2018 and July 2020, in part by processing the data for children under 13 without appropriate parental consent, according to an investigation by the U.K.’s Information Commissioner’s Office (ICO).

          The ICO also found that TikTok breached privacy protections by failing to provide proper information to users in a transparent way, and processing “special category data” without legal grounds to do so, according to the announcement.

        • India TimesUK could fine TikTok $29 million for failing to protect children’s privacy

          The Information Commissioner’s Office has issued TikTok and TikTok Information Technologies UK Ltd with a “notice of intent”, the regulator said in a statement.

        • New York TimesTikTok Seen Moving Toward U.S. Security Deal, but Hurdles Remain

          The Biden administration and TikTok have drafted a preliminary agreement to resolve national security concerns posed by the Chinese-owned video app but face hurdles over the terms, as the platform negotiates to keep operating in the United States without major changes to its ownership structure, four people with knowledge of the discussions said.

          The two sides have hammered out the foundations of a deal in which TikTok would make changes to its data security and governance without requiring its owner, the Chinese [Internet] giant ByteDance, to sell it, said three of the people, who spoke on the condition of anonymity because the negotiations are confidential.

        • Computers Are Badthe nevada national security site pt 4

          This is something of a recurring theme with nuclear weapons, and one of the more troubling challenges to stockpile stewardship. Some readers may be familiar with the widely reported case of FOGBANK. FOGBANK is a classified material used for a classified (although disclosed by a previous Undersecretary of Energy) purpose in several nuclear weapons. Originally manufactured in the ’70s and ’80s, FOGBANK had become more of a secret than ever intended by the time a need arose to produce more, in the ’00s. Little documentation had been kept on the manufacturing process, the facility had been decommissioned, and few people involved in the ’70s were still around. It took nearly a decade and over $100 million to reverse-engineer the process that the same organization had run successfully less than 50 years before.

        • NYOB6 Months of “agreement in principle”, EU-US agreement in fact still missing

          On 25 March 2022, in the wake of the war on Ukraine, US-President Joe Biden and European Commission President Ursula von der Leyen announced an “agreement in principle” on EU-US data transfers, despite two Court of Justice (CJEU) rulings striking down the previous “Safe Harbor” and “Privacy Shield” agreements.

        • Jacobin MagazineGreece’s Right-Wing Government Is Spying on Its Critics

          Greece’s right-wing government has been caught tapping the phones of journalists and opposition politicians. The scandal has raised doubts over Prime Minister Kyriakos Mitsotakis’s future — and highlighted his New Democracy party’s worrying authoritarian turn.

        • TechdirtSan Francisco Legislators Approve Bill Giving Cops Live, On Demand Access To Private Security Cameras

          If you don’t like people making “People’s Republic of California” jokes, maybe don’t do stuff like this…

        • TechdirtVPN Providers Remove Servers From India In Wake Of New Data Collection Laws

          VPN providers remain a primary target of governments around the world (authoritarian leaning and otherwise) that don’t much like their citizens chatting privately or avoiding government surveillance. We watched it happen in Russia, where strict new data collection and retention rules resulted in a mass exodus of VPN providers (the ones that are actually dedicated to privacy and security, anyway).

        • EFFBan Government Use of Face Recognition In the UK

          That’s why we are calling for a ban on government use of face recognition in the UK. We are not alone. London-based civil liberties group Big Brother Watch has been driving the fight to end government-use of face recognition across the country. Human rights organization Liberty brought the first judicial challenge against police use of live facial recognition, on the grounds that it breached the Human Rights Act 1998. The government’s own privacy regulator raised concerns about the technical bias of LFR technology, the use of watchlist images with uncertain provenance, and ways that the deployment of LFR evades compliance with data protection principles. And the first independent report commissioned by Scotland Yard challenged police use of LFR as lacking an explicit basis and found the technology 81% inaccurate. The independent Ryder Review also recommended the suspension of LFR in public places until further regulations are introduced.

        • AccessNowStop the EUMigraTool rollout: predictive AI systems have no place in EU migration policies – Access Now

          The EU-funded ITFlows project must not roll out dangerous AI tools that “predict migration flows,” and “detect risks of tensions related to migration.” Access Now and civil organisations from across Europe are calling on the ITFlows Consortium — which coordinates the ITFlows research project designed to ensure “​​adequate management solutions of migration flows” — to immediately halt the development of the EUMigraTool and stop pursuing the use of any and all technologies that can be used to criminalise migration, and target specific groups and individuals.

          “Predictive AI systems have no place in migration within and around the EU, and it’s incredibly reckless to inject ‘techno-solutionism’ into this scenario,” said Caterina Rodelli, EU Policy Analyst at Access Now. “Access Now isn’t just raising red flags around specific technology. This is about intervening before any dangerous AI tool is ever given legitimacy in a framework like this. It is not possible to predict migration without risking fundamental rights, and we cannot allow these distorted ideas to gain a foothold in such a serious and life-altering context.”

      • Confidentiality

        • uni TorontoWhat can a compromised TLS Certificate Transparency Log do?

          One of the potential concerns in the Certificate Transparency ecosystem is that a CT Log could be compromised. But what can an attacker who’s in control of a CT log actually do? That’s a question both of how CT logs work in general and of the current uses that people make of them, both clients (ie browsers) and Certificate Authorities. So here’s what I can see about that, based partly on the TLS client’s view of CT logs. To start with, let’s restate an obvious thing: a CT Log cannot by itself create a valid TLS certificate. Any real attack requires not just a compromised CT log (or several), but a Certificate Authority that’s either compromised or can be used to mis-issue some certificates for you.

    • Defence/Aggression

      • IT WireUS bans two more Chinese telecommunications providers

        In a statement issued last week, Federal Communications Commission chairwoman Jessica Rosenworcel said: “Today we take another critical step to protect our communications networks from foreign national security threats.

        “Earlier this year the FCC revoked China Unicom America’s and PacNet/ComNet’s authorities to provide service in the United States because of the national security risks they posed to communications in the US.

        “Now, working with our national security partners, we are taking additional action to close the door to these companies by adding them to the FCC’s Covered List. This action demonstrates our whole-of-government effort to protect network security and privacy.”

      • VOA NewsSomalia Military Makes Gains in Large-scale Offensive Against Al-Shabab

        An offensive by the Somali tribal militia backed by the Somali government was launched in the Hiran region a few weeks ago against al-Shabab militants, liberating several key townships before moving on to Galgaduud and then the Bay region in the south.

        There has been significant progress in the liberation of 40 settlements in the Hiran region alone, with the support of the Somali government’s military commandos trained by the United States.

      • NBCOath Keeper charged in Jan. 6 attack texted with Andrew Giuliani about election

        A high-ranking member of the far-right Oath Keepers organization who has been charged in connection with the Jan. 6 riot at the U.S. Capitol exchanged messages in November 2020 with former Trump White House aide Andrew Giuliani about election issues, NBC News has learned.

      • Jacobin MagazineThe Problem Isn’t “Polarization” — It’s Right-Wing Radicalization

        The concept of “polarization” is increasingly used in mainstream circles to lament the current state of politics. It is a liberal parallel to right-wing moral panics about cancel culture, “wokeness” — or what used to be called “political correctness gone mad.” Such moral panics are generally based on ridiculous nonevents that nonetheless seep into public discourse, often with the help of mainstream media. As Nathan Oseroff-Spicer has documented, the “woke” panic has spread to strip clubs, the military, corporations, medical education, and the British monarchy, among others. While the liberal center may see the right-wing “war on woke” as overblown, they insist on casting it as one side of a duopoly of extremism from both Left and Right. The Right may have indulged extremist and authoritarian tendencies, it argues, but so has the Left. Trumpists and Brexiteers are the flipside of antifa and overzealous woke students.

      • ABCWichita man sentenced in ‘swatting’ case that led to death

        Prosecutors said Gaskill got into an argument in December 2017 with Ohio gamer Casey Viner over a $1.50 bet. Using an old Wichita address Gaskill had given him, Viner persuaded Tyler Barris in Los Angeles to call Wichita police and say a kidnapping and shooting had happened at the address, prosecutors said.

      • NBCNASA’s DART spacecraft successfully slams into asteroid in historic test of planetary defense

        The $325 million mission was designed to see whether “nudging” an asteroid can alter its trajectory, providing scientists with a valuable real-world test of planetary defense technologies.

      • Common Dreams‘Climate Change Is the Asteroid,’ Say Critics of NASA Earth Defense Mission

        “Climate change is a thousands of times greater problem and must be addressed.”

      • HackadayWatch NASA Crash A Probe Into An Asteroid Tonight

        Got any plans for tonight? No? Well then you’re in luck, because NASA is just a few hours from intentionally smashing a probe into the minor planet Dimorphos as part of Double Asteroid Redirection Test (DART) — marking the first time humanity has ever intentionally tried to knock a space rock off-course. If it works, we’re one step closer to having a viable planetary defense system in case we ever detect an asteroid on a collision course with Earth. If it doesn’t work. . . well, we’ve still got time to come up with another plan.

      • The NationThe Most Painful Episode of the January 6 Insurrection

        I am a white male historian of the Civil War raised in the American South. At a preternatural age, I managed with misguided pride to memorize the back-of-the-baseball-card version of that war. I knew how many died at Shiloh on which side, on which day. I could recite with indecent precision which regiments suffered what losses on which day at Gettysburg. I knew that slavery caused the war—but I managed not to focus on that fact. I was too focused on war as a man’s calling. Rambo II sent me to a local knife and gun shop where—not yet old enough to drive and too young to buy anything—I childishly cut my thumb and manfully bled all over the store. The Army recruiting station set up outside The Hunt for Red October almost made me join up. God help me, I collected Desert Storm trading cards. Adapted from After Life: A Collective History of Loss and Redemption in Pandemic America, edited by Rhae Lynn Barnes, Keri Leigh Merritt, and Yohuru Williams (Haymarket Books).

      • Democracy Now“We Are Proud Boys”: Far-Right Gang Normalized Political Violence, Embraced by GOP as Legit Discourse

        As the House committee investigating the January 6 Capitol insurrection is set to hold its first fall public hearing, we look at one of the key groups that helped plan and carry out the attack as part of their goal to normalize political violence, with HuffPost journalist Andy Campbell, author of the new book, “We Are Proud Boys: How a Right-Wing Street Gang Ushered In a New Era of America.” He says, “They’ve been on a parade of violence at the behest of Trump and the GOP for six years now.” Campbell recently obtained a document that gives rare insight into how the Proud Boys “meticulously” plan their rallies and how they were going to carry out a march in New York City on January 10. He says GOP rhetoric, parroted by the right-wing media, is normalizing the political violence committed by the Proud Boys and, in effect, “sanitizing them for the rest of the country.”

      • Meduza‘Let them run’: Lukashenko speaks about Russians leaving the country to escape the draft — Meduza

        President of Belarus Alexander Lukashenko has met with Vladimir Putin today in Sochi. The Russia 24 TV channel broadcast Lukashenko’s opening speech at the meeting. Comparing the current mass exodus of Russians attempting to flee the mobilization to the mass migration of Belarusians in 2020–2021, Lukashenko suggested that “it’s necessary to decide what to do with them” if those people were to return to Russia later.

      • MeduzaFSB sends armored personnel carrier to border checkpoint ‘just in case’ — Meduza

        The Russian FSB has sent an armored personnel carrier (APC) to the Upper Lars checkpoint in North Ossetia on the country’s border with Georgia, RBK reported on Monday, citing the security agency’s local border department. The APC is needed “in case reservists decide to break through the checkpoint and leave the country without going through any border crossing procedures. Only for that purpose,” the FSB told the outlet.

      • MeduzaRussian border guards reportedly checking men against conscription lists and denying exit to some — Meduza

        Agents from the Russian FSB’s border service who work in airports have received lists of people to be conscripted, the independent Russian outlet The Bell reported on Monday, citing four sources from the airline industry. Three of the sources noted that the list only includes soldiers whose draft summonses have already been issued, not Russia’s entire mobilization base.

      • Common Dreams‘We Aren’t Going to War’: Draft Officer Shot Amid Russian Anger Over Conscription

        Reuters reported that the gunman, who was detained, identified himself as Ruslan Zinin, age 25.

      • Meduza15 killed in school shooting in Izhevsk — Meduza

        On the morning of September 26, a man opened fire in Izhevsk school No. 88. Circumstances of the incident are still unclear: Telegram channels published photos of a classroom with the door barricaded. Baza published two videos taken by schoolchildren during the incident; shots can be heard in the background.

      • MeduzaPrigozhin admits to creating PMC Wagner in 2014 — Meduza

        St. Petersburg businessman Evgeny Prigozhin confirmed that he created PMC Wagner, the mercenary group. He admitted that he created the group in 2014, when, in his words, “the genocide of the Russian population of Donbas began.”

      • MeduzaLocal resident opens fire in military enlistment office in Irkutsk region — Meduza

        In the town of Ust-Ilimsk, Irkutsk region, a man opened fire at the military enlistment office, injuring a military officer. Telegram channels published a video of the incident showing one man standing on the stage in a small hall and shooting at another man behind the pulpit, after which he falls, and those gathered run out of the room.

      • Common DreamsPeace Group Urges US and China to Halt ‘Blatantly Provocative’ Military Maneuvers

        “With the frequency and scale of these maneuvers increasing by the week, the likelihood of a mishap is increasing exponentially.”

      • Common DreamsEliminating Nuclear Weapons ‘Is Not Only Possible, It Is Necessary’: UN Chief

        “Let us commit to forging a new consensus around defusing the nuclear threat for good and achieving our shared goal of peace.”

      • TruthOutJanuary 6 Committee Members: Group May Unanimously Refer Trump for Prosecution
      • TruthOutSocialists Need an Independent Approach to Gun Violence
    • Transparency/Investigative Reporting

      • The NationDo Presidents Have a Right to Secrecy?

        Thanks to Donald Trump, secrecy is big news these days. However, as political pundits and legal experts race to expose the layers of document-related misdeeds previously buried at his Mar-a-Lago estate, one overlooked reality looms large: Despite all the coverage of the thousands of documents Trump took with him when he left the White House, there’s been next to no acknowledgment that such a refusal to share information has been part and parcel of the Washington scene for far longer than the current moment.

    • Environment

      • QuartzIndia will consume 40% more coal over the next decade than now

        In the coming decade, at least 40% more coal consumption is estimated in India. These trends are reflected in the draft version of the National Electricity Plan (NEP) released by the Central Electricity Authority (CEA), which gives a glimpse of the energy transition happening in India.

        The CEA report estimates a 40% increase in domestic coal requirement in 2031-32. In 2021-22, India’s domestic coal requirement was 678 million tonnes (MT). It will increase to 831.5 MT by 2026-27 and 1018.2 MT by 2031-32.

      • Hong Kong Free PressNote from a dying planet: Don’t just do something, panic!

        It seems we are approaching, with no signs of serious braking, several points at which current climate problems – floods, fires, droughts – will be joined by much more serious manifestations of planetary indisposition.

        Any day now, for example, the Greenland ice cap may slither bodily off the top of Greenland into the North Atlantic, producing an instant and drastic reduction in the amount of dry land available. Good news for some, bad for others. Residents in first-floor Tsim Sha Tsui flats will be able to step directly from their windows into their Uber gondolas. The shops below will be submerged.

        This sort of thing ought to be occupying a lot of media space and it is worth wondering why it isn’t.

      • Deutsche WelleNoise pollution: Why the sea needs more peace

        Too much noise is not only annoying for us on land but also to animals underwater. Worse, too much noise can kill them. Three solutions for making the oceans quieter and why less noise is good for the climate.

      • Common Dreams80+ Democrats Urge Biden EPA to Accept Union Demands

        “At a time when EPA is administering historic levels of funding, it is imperative that EPA’s career employees are supported by the agency’s political leadership,” the lawmakers wrote to EPA Administrator Michael Regan, a former agency employee. “Improving the rights and protections of EPA employees is critical to recruit and retain the talented and diverse workforce needed to fulfill the agency’s mission to address climate change, enhance environmental justice, and protect public health and the environment.”

      • TruthOutHouse Democrats Urge EPA to Accept Union’s Demands for Rights and Protections
      • Common DreamsOn Eve of Senate Vote, Climate Campaigners Make ‘Big Push’ Against Manchin ‘Dirty Deal’

        “Sen. Joe Manchin’s dirty deal could fast-track numerous coal, crude oil, and gas development projects across the country.”

      • Energy

        • BBCInterpol seeks arrest of failed crypto-firm boss Do Kwon – BBC News

          Agency asks police forces around the world to seek and detain the South Korean businessman.

        • The HillMilitary innovation office launching effort to assess cryptocurrency threats to national security

          The Defense Advanced Research Projects Agency (DARPA) told the Post that it had hired crypto intelligence firm Inca Digital to work on its launch of the analysis project, which will take place over the span of a year.

          Inca Digital will provide DARPA with specialized instruments to provide a more in-depth assessment of [cryptocurrency] markets.

        • Russell GravesSolar Tourism in Utah

          I’ve been curious about how “big commercial solar farms” are done for some long while, because their cost per watt numbers, even with labor, are exceptionally low. Most of the newer farms seem to be sub-$1/W installed. A revision on my A-frames recently got down into that price range, but that was a DIY install, so no labor costs on it (and homeowner installed).

        • Eesti RahvusringhäälingProfessor: Estonians might not even notice disconnecting from Russian grid

          Therefore, Estonia might have around 1,700 megawatts (MW) of controllable generation capacity to cover peak demand. However, if we consider regular maintenance and the chance that one or more of our oil shale power blocks might unexpectedly fail, it is not sensible to use gas turbine reserve capacity during ordinary periods, even if the price of electricity is high. “Some generators could work at half or even lower capacity to be able to quickly up generation when needed,” Kilter explained.

      • Wildlife/Nature

        • NPRWhy it’s perfectly normal to see baby puffins thrown off cliffs in Iceland each year

          Many residents of Vestmannaeyjar spend a few weeks in August and September collecting wayward pufflings that have crashed into town after mistaking human lights for the moon. Releasing the fledglings at the cliffs the following day sets them on the correct path.

          This human tradition has become vital to the survival of puffins, Rodrigo A. Martínez Catalán of Náttúrustofa Suðurlands [South Iceland Nature Research Center] told NPR. A pair of puffins – which mate for life – only incubate one egg per season and don’t lay eggs every year.


          You can search for pufflings starting around 9 p.m. until as late as 3 a.m., and can hunt by foot, bike, car or even boat. Powers advises looking for them where there are the most lights, like harbors, golf courses, hospitals, schools, gas stations or construction sites. Some birds even end up in harbors, where boat oil in the water can weigh them down and cause them to drown, Powers said.

        • The RevelatorHow Cities Are Preparing for the ‘Silent Killer’ of Extreme Heat
    • Finance

    • AstroTurf/Lobbying/Politics

      • US CongressS.4913 – Securing Open Source Software Act of 2022, 117th Congress (2021-2022)

        Latest Action: Senate – 09/21/2022 Read twice and referred to the Committee on Homeland Security and Governmental Affairs.

      • Peters and Portman Introduce Bipartisan Legislation to Help Secure Open Source Software

        “This important legislation will, for the first time ever, codify open source software as public infrastructure,” said Trey Herr, Director, Cyber Statecraft Initiative, Scowcroft Center for Strategy and Security, the Atlantic Council. “If signed into law, it would serve as a historic step for wider federal support for the health and security of open source software. I am encouraged by the leadership of Senators Peters and Portman on this issue.”

        The overwhelming majority of computers in the world rely on open source code – freely available code that anyone can contribute to, develop, and use to create websites, applications, and more. It is maintained by a community of individuals and organizations. The federal government, one of the largest users of open source software in the world, must be able to manage its own risk and also help support the security of open source software in the private sector and the rest of the public sector.

      • Bipartisan open source security legislation introduced in Senate

        Legislation seeking to address open source software risks in government has been introduced by Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, according to The Record, a news site by cybersecurity firm Recorded Future.

      • The RecordLog4j: Senators introduce bill centered on CISA open source security efforts

        The Securing Open Source Software Act — sponsored by Senators Gary Peters (D-Mich.) and Rob Portman (R-Ohio) — would require the Cybersecurity and Infrastructure Security Agency (CISA) to create a “risk framework” around the use of open source code within the government and critical infrastructure agency.

        CISA would need to find ways to “mitigate risks in systems that use open source software” as well as hire experienced open source experts to address issues like Log4j. The bill also requires the Office of Management and Budget (OMB) to publish guidance for agencies about how to use open source software securely.

      • The NationNPR’s Nina Totenberg, Friend of the Reactionary Court

        Totenberg is often denounced by conservatives as a liberal partisan, but in some ways she’s the best friend the newly empowered reactionary court has. Her humanizing stories about how much fun judges like Scalia are once you get to know them provide essential cover for the court. More and more Americans have begun to realize that the judiciary is hostile to their basic rights—indeed, an enemy. Totenberg is on hand to say, no, the justices are our friends. Or, at the very least, her friends.

      • NBCPutin grants Russian citizenship to U.S. whistleblower Edward Snowden

        Among Snowden’s revelations were the NSA’s bulk collection of phone and [Internet] metadata from U.S. users, its spying on the personal communications of foreign leaders, including U.S. allies, and its ability to tap undersea fiber optic cables and siphon off data.

      • TechdirtSubreddit Discriminates Against Anyone Who Doesn’t Call Texas Governor Greg Abbott ‘A Little Piss Baby’ To Highlight Absurdity Of Content Moderation Law

        Last year, I tried to create a “test suite” of websites that any new internet regulation ought to be “tested” against. The idea was that regulators were so obsessively focused on the biggest of the big guys (i.e., Google, Meta) that they never bothered to realize how it might impact other decently large websites that involved totally different setups and processes. For example, it’s often quite impossible to figure out how a regulation about Google and Facebook content moderation would work on sites like Wikipedia, Github, Discord, or Reddit.

      • The NationTrump’s Hate-Fest in North Carolina Reflects His Hold on the GOP Base

        There was a little bit of welcome political news for defenders of democracy in the New York Times/Siena College poll released late last week. More than half of all Americans believe Donald Trump has threatened democracy by pushing the big lie that he defeated Joe Biden in 2020. A majority also believe Trump has committed serious federal crimes and hold an unfavorable opinion of the twice-impeached former president.

      • Common DreamsBoebert, MTG Among US Republicans Celebrating Fascist Victory in Italy

        Pointing happily to the far-right’s recent electoral surge in Sweden, U.S. Rep. Lauren Boebert (R-Colo.) tweeted that “the entire world is beginning to understand that the Woke Left does nothing but destroy.”

      • TechdirtGermany’s Government Continues To Lock People Up For Being Extremely Online

        Germany’s uncomfortable relationship with free speech continues. The country has always been sensitive about certain subjects (rhymes with Bitler and, um, Yahtzee), resulting in laws that suppress speech referring to these subjects, apparently in hopes of preventing a Fourth Reich from taking hold.

      • Meduza‘Immortal love’ and heirloom real estate Team Navalny exposes the secret wealth of Gen. Alexey Sedov, head of the FSB’s Second Service — Meduza

        Gen. Alexey Sedov, the current head of FSB’s Second Service, tasked with “the defense of constitutional government and countering terrorism,” is worth a billion rubles (or $17.2 million), according to “The FSB’s Bandit-in-Chief,” a new investigation published by Navalny Live on YouTube.

      • Meduza‘Blame the West and scapegoat the commissars’: The Kremlin’s latest propaganda guide (mobilization edition) — Meduza
      • MeduzaIn Dagestan, locals fight police on day two of mass protests against mobilization — Meduza

        Extremely heated mass protests against mobilization continue in Dagestan. The capital city of Makhachkala and another city, Khasavyurt, are now in the second day of protesting the draft imposed on the region by Russian federal authorities, under last week’s presidential decree.

      • MeduzaUnwilling would-be conscript set himself on fire in Ryazan — Meduza

        A Ryazan man attempted to burn himself alive on Sunday, Sept. 25, at Ryazan’s central bus terminal, reports the local news channel, YA62.

      • Telex (Hungary)Communication between Orbán and Meloni more intensive than the usual diplomatic formulas – PM’s press office
      • Common DreamsSinema Calls for Restoring 60-Vote Filibuster for Senate Confirmations

        “Not only am I committed to the 60-vote threshold, I have an incredibly unpopular view,” Sinema said at a lecture hosted by Senate Minority Leader Mitch McConnell (R-Ky.), the lawmaker who bears arguably the most responsibility for accelerating the use of the filibuster to thwart the will of the majority. “I actually think we should restore the 60-vote threshold for the areas in which it has been eliminated already. We should restore it.”

      • TruthOutSinema Says Filibuster Should Be Expanded to Make It Harder to Confirm Judges
      • The NationThe Rechazo—Why Chileans Rejected a New Constitution

        How is it possible that in October 2020, almost 80 percent of Chileans expressed their support for a new Constitution, drafted by citizens specifically elected to write it—but after a year of concerted effort to arrive at a modern charter, 62 percent of voters rejected it in a referendum held earlier this month?

      • The NationLet’s Talk About Ron DeSantis’s “Reason” for Kidnapping Migrants

        Florida Governor Ron DeSantis’s excuse for kidnapping Venezuelan immigrants and sending them to Martha’s Vineyard is certifiably ludicrous. Yet most people haven’t heard his attempted defense, either for the kidnapping charge or for the circumstances that led him to send lawful asylum seekers to the Massachusetts island. The corporate both-sides media has largely buried his lies and excuses, instead using this situation to launch another debate about the immigration system in this country—which is what Republicans want us to focus on. They certainly don’t want us talking about their revocation of reproductive rights or cultish support of a former president who is being investigated for espionage.

      • TruthOutGOP Representatives Boebert and Greene Are Celebrating Fascism’s Win in Italy
      • Common DreamsOpinion | The Terrifying Future in Which We Return to a Past Too Warm for Antarctica’s Ice Shelves

        So as a historian, I am particularly interested in what the past tells us about the present. I’ve taught courses on climate change in history. But of course my kind of history doesn’t go back very far from the point of view of physical scientists. The academic discipline of “history” is really the history of humanity since the invention of writing. Even for the world history textbook at Cambridge in which I was involved I doubt we cited any document older than 4,000 years. Writing systems emerged in what is now Iraq around 5,200 years ago. Excitingly enough, scientists reconstructing the history of the earth before humans evolved have developed tools to do so that are increasingly precise.

      • ScheerpostWhat American and Iranian Theocrats Have in Common

        Juan Cole compares extremists in both countries and their attempts to control women’s bodies.

      • ScheerpostMeet Our New ‘Secretary of State’ … Nancy Pelosi

        The Speaker of the House’s recent trips to Armenia and Taiwan spell confusion for the future of US foreign policy.

      • Misinformation/Disinformation/Propaganda

        • New York TimesWhere Online Hate Speech Can Bring the Police to Your Door

          They told him that his 51-year-old father was accused of violating laws against online hate speech, insults and misinformation. He had shared an image on Facebook with an inflammatory statement about immigration falsely attributed to a German politician. “Just because someone rapes, robs or is a serious criminal is not a reason for deportation,” the fake remark said.

          The police then scoured the home for about 30 minutes, seizing a laptop and tablet as evidence, prosecutors said.

          At that exact moment in March, a similar scene was playing out at about 100 other homes across Germany, part of a coordinated nationwide crackdown that continues to this day. After sharing images circulating on Facebook that carried a fake statement, the perpetrators had devices confiscated and some were fined.

        • VarietyHow TikTok Is Influencing Music Trends

          The scale of how TikTok is shaking up entertainment is apparent when looking at where consumers rank it against other formats. Around half of those aged between 15 and 29 ranked it as one of their top 3 most entertaining sources, with a quarter of 30-44s doing so. The need for media planners and creators to adapt and include TikTok-centric content in their strategies is clear, as to not forego access to audiences.

        • ABCWhy Misinformation Spreads So Quickly On Social Media

          What effect is social media having on our politics and, for that matter, society more broadly? According to critics, we’re living through an unregulated era of social media that will one day look as quaint as tobacco in its pre-regulation era.

    • Censorship/Free Speech

      • RFAHRW calls for independent investigation into Vietnamese dissident’s beating

        Human Rights Watch (HRW) is calling on Vietnamese authorities to investigate allegations of the beating and shackling of prisoner of conscience Trinh Ba Tu.

      • Project CensoredBanned in the USA

        In Spring 2022, PEN America published findings from its first ever Index of School Book Bans, a comprehensive count of more than 1,500 instances of individual books banned by some 86 school districts in 26 states, between July 2021 and March 2022, impacting more than two million students. The ALA’s Office for Intellectual Freedom reported fielding 729 book challenges in 2021 alone, targeting nearly 1,600 titles at schools and universities. Both organizations clearly state that the number of reports received are only a fraction of the challenges and potential bans that occur, many of which result in books being removed from shelves, in breach of existing policies, without fanfare or public knowledge, and often under a cloud of fear among librarians, faculty, and staff.

      • QuartzBook bans are spiking in the US. Here are the most targeted titles

        So far this year, ALA has tracked efforts to ban or restrict 1,651 titles, up from 729 in all of 2021. It’s the highest annual number since it started collecting data years ago.

      • Business InsiderGirls Who Code founder speaks out after Pennsylvania school district bans her books: ‘This is about controlling women and it starts with controlling our girls’

        Moms for Liberty did not immediately respond to Insider’s request to comment on the ban.

      • The Register UKGirls Who Code book series banned in some US classrooms

        The Register reached out to Girls Who Code, Moms for Liberty, and Pennsylvania’s Central York School District to better understand the offending content within the series, but did not immediately receive a response.

      • Newsweek‘Handmaid’s Tale,’ ‘Girls Who Code’ and Other Books Just Banned in the U.S.

        Some of the biggest titles in classic and modern literature have been banned in schools and libraries around the United States, including The Handmaid’s Tale, Girls Who Code, and more.

      • TechdirtConservatives Loved Expanding The 1st Amendment To Corporations… Until Last Year. Wonder Why?

        Right after the 5th Circuit’s ruling on Texas’ HB 20 law on content moderation came out, I wrote up a long post going through the many, many oddities (and just flat out mistakes) of the ruling.

      • TruthOutDisinvestment Poses as Great a Threat to Libraries as Book Bans
      • AccessNowJoint statement: civil society welcomes independent human rights assessment on Meta’s content moderation in Palestine and Israel – Access Now

        We, the undersigned human rights organizations, commend the publication of Business for Social Responsibility’s (BSR) Human Rights Due Diligence Report of Arabic and Hebrew content on Meta’s platforms in the Israel/Palestine context in May 2021. For years, digital and human rights organizations have been calling for an independent review of Meta’s content moderation policies. These calls came as a result of Meta’s constant and deliberate actions to censor the voices and narrative of Palestinians and those in solidarity with them. Thus, denying Palestinians their right to freedom of expression, affecting their freedom of assembly and freedom to political participation and non-discrimination and further distorting the international community’s understanding of what is happening in Palestine.

        We appreciate and value BSR’s efforts and professionalism through their assessment and independent review. We especially acknowledge their engagement with local, regional and international stakeholders and right-holders throughout the process. Launching this due diligence report is a step in the right direction. importantly, we look forward to Meta’s unequivocal commitment to implementing the recommendations of this report. More generally, we urge Meta to take decisive action to protect the voices of Palestinians among other oppressed peoples and groups around the world.

      • AccessNowMeta’s actions “adversely impacted” Palestinians’ rights: Access Now welcomes BSR findings

        Access Now and other civil society organizations welcome the release of the long-awaited Business for Social Responsibility’s (BSR) human rights due diligence (HRDD) findings that expose Meta’s rights-violating and biased actions against people in Palestine.

        The HRDD, commissioned by Meta and led by BSR in September 2021, assessed the human rights impacts of Meta’s content moderation policies and practices during the escalation of violence in Palestine and Israel in May 2021. It ​​identifies a variety of adverse human rights impacts for Meta to address, including on the rights of Palestinians to freedom of expression.

        “We’ve long known that Meta’s censorship of Palestinian content is fundamentally biased. Now we have the receipts to prove it,” said Marwa Fatafta, MENA Policy and Advocacy Manager at Access Now. “BSR’s findings expose Meta’s actions have violated the rights of people in Palestine. The key question now is will the company immediately remedy its harms, or will it prove to the world it not only doesn’t care, but is actively, decidedly facilitating online apartheid?”

        Since May 2021, Access Now and partner civil society organizations have called for an independent review of Meta’s content moderation policies around Palestine and Israel. Now, BSR’s findings confirm that Meta’s policies and practices are biased and have negatively impacted Palestinian and Arabic-speaking people who use the company’s platforms.

      • dwaves.deShutdown of Peertube.co.uk – one after another indie video hosting site

        increasingly harsher rules and regulations


        so this is it?

        another video hosting (besides youtube) site shutting down?

        Predict the shutdown of vimeo.com.

        Because their model (probably) won’t fly as far as the constant advertisement streams of Alphabet’s Google’s Youtube (they are testing up to 10x advertisement clips in front of every video… which is just sick & insane)

      • Shutdown of Peertube.co.uk


        Additionally, the proposed UK Online Safety Bill, if enacted, will make it almost impossible to host a site such as Peertube in the UK. This bill makes publishers, with the exception of large media companies, liable for the content hosted on their platform…


        New signups are now disabled, and new uploads will be disabled on 1st September 2022. I will continue to host the service until 30th September 2022 to give everyone a chance to migrate their content to an alternative service. I will not be looking to hand over the service to another host – my belief is that the federation model allows you to choose who hosts your data, and it would be unethical for me to just hand over the reins to a third party without your consent.”

    • Freedom of Information / Freedom of the Press

      • The NationPreserving the Memory of Murdered Journalists in Mexico

        El Tejar, Medellín de Bravo, Veracruz, Mexico—In late May, a baby slept in a hammock as his family tended to customers at the storefront on the ground floor of their home. A wheelbarrow full of mangos sat to one side. This is where Jorge Sánchez Ordóñez, 36, does most of his journalism. It’s also the house from which his father was kidnapped seven years ago. The home looks more imposing now than it did then. After the abduction, workers for the Federal Mechanism for the Protection of Human Rights Workers and Journalists installed security cameras and a metal fence crowned with barbed wire.

      • The DissenterPoll: Most US, UK Adults Know Nothing About Files That Assange Is Charged With Publishing
    • Civil Rights/Policing

      • Hong Kong Free PressChinese anthem booed at Hong Kong football match, as police film fans

        Hong Kong football fans were heard booing China’s national anthem on Saturday at the first match open to spectators in the city since legislation outlawing the practice was passed more than two years ago.

        Supporters in Hong Kong have been barred from games for almost three years due to the coronavirus pandemic, but boos at the anthem were previously heard in the stands as huge, sometimes violent pro-democracy protests swept the city in 2019.

      • VOA NewsIran Protests Flare for 10th Night as Tensions With West Grow

        “Woman, Life, Freedom!” the crowds have chanted as female protesters have defiantly burnt their hijabs in bonfires and blazing rubbish dumpsters — a rallying cry that has been echoed at solidarity protests worldwide, including in London and Paris at the weekend.

        Iranian riot police in black body armor have beaten protesters with truncheons in running street battles, and students have torn down large pictures of the supreme leader and his predecessor Ayatollah Ruhollah Khomenei, in recent video footage published by AFP.

      • The EconomistIran’s rebellion spreads, despite lethal repression

        The government has taken a familiar tack. It calls the unrest a foreign plot co-ordinated by America, Israel and other such evil places (it is not). It organised counter-protests, some with the desultory look of rent-a-crowds. And it has choked the [Internet], making it hard for Iranians to access social media, vpns and WhatsApp—anything they could use to communicate with each other or the world. Worried Iranians in the diaspora are struggling to contact relatives inside the country.

      • MeduzaPoet Artem Kamardin beaten and raped by Russian police — Meduza

        Activist and poet Artem Kamardin has been beaten and raped by Moscow police, Novaya Gazeta Europe reported on Monday.

      • TechdirtAppeals Court Bizarrely Redacts Qualified Immunity Decision To Hide How Compliant The Plaintiff Was

        This is truly strange. The DC Circuit Court of Appeals somehow decided it was a good idea to redact its decision finding (partially) in favor of a person whose rights were violated by DC Metro police officers. What could have been a straightforward recognition that cops exceeded their boundaries was, at least temporarily, presented misleadingly, thanks to the government’s desire to hide this information.

      • Counter PunchGiorgia Meloni and the Return of Fascism to Italy

        Berlusconi takes a revisionist view of Mussolini’s role in Italian history. He believed him to be one of Italy’s “greatest statesmen” and an essentially “benign dictator” who had “done good things for Italy”. This provided a counter-narrative that contradicted the reality of the Italian republic’s anti-fascist foundations. That, in turn, was exploited by the far right.

      • Common DreamsOpinion | Giorgia Meloni’s Anti-Women Politics and the Future of Italy

        Italy’s far-Right Brothers of Italy party looks to have taken the largest share of the votes in the country’s general election—with its leader, Giorgia Meloni, set to become Italy’s first female prime minister.

      • TruthOutFascist Victory in Italy Signals Rise of “Transnational” Far Right Across Europe
      • ScheerpostChris Hedges: The Return of Fascism

        As in the 1930s, a bankrupt liberalism, grotesque social inequality and declining living standards are empowering fascist movements in Europe and the U.S.

      • ScheerpostCalifornia’s Dependency on Prison Labor for Fighting Fires Must End

        Incarcerated firefighters face much higher rates of injury than professional firefighters, and are largely unable to negotiate the conditions of their work. Still, California continues to depend on prison labor to fight fires.

      • Pro PublicaWhy Are So Many People Now Embracing Demagogues?

        To try to understand what, exactly, is happening, I talked with Barbara Walter, a political scientist at the University of California San Diego who studies democracies across the world. Her book “How Civil Wars Start” has become a bestseller. Rather than talk about the prospects for political violence, we discussed why many democracies are retrenching and how the U.S. stands alone — and not in a good way.

      • Democracy NowFascism Returns in Italy: Giorgia Meloni Claims Victory, Allied with Right-Wing Parties Across Europe

        Italy’s first far-right leader since Benito Mussolini, Giorgia Meloni, has declared victory. Her Brothers of Italy party is allied with Spain’s far-right Vox party, Poland’s ruling nationalist Law and Justice party and the Sweden Democrats party, which emerged out of its neo-Nazi movement. We look at “the return of fascism in Italy” with professor Ruth Ben-Ghiat, author of “Strongmen: Mussolini to the Present,” who says that Meloni, a self-declared conservative, “really sees her party as carrying the heritage of fascism into today.” Ben-Ghiat also describes why Meloni is part of a “transnational design” to create a far-right political culture across Europe.

      • Common DreamsLed by Giorgia Meloni, Fascists Set to Take Power in Italy for First Time Since Mussolini

        The alliance of Meloni’s party, Matteo Salvini’s The League, and former prime minister Silvio Berlusconi’s Forza Italia won roughly 43% of the vote in early tallies, with Brothers of Italy winning around 25% in the low-turnout contest. Results counted thus far indicate that the right-wing coalition failed to garner enough support to amend Italy’s constitution.

      • Common DreamsIn ‘Unprecedented Democratic Exercise,’ Cubans Approve Inclusive Family Code

        With 74% of eligible voters turning out to cast ballots, more than two-thirds of votes—nearly four million people—were in favor of the Family Code. Just 50% of “yes” votes were needed to pass the referendum.

      • ScheerpostFascists Set to Take Power in Italy for First Time Since Mussolini

        “Italians must now repeat what their ancestors once did: defeat fascism,” said the progressive movement DiEM25. “But not for the return of the politics-as-usual that brought the f…

      • Common DreamsOpinion | We Have Seen This Movie Before: The Fascists Have Arrived

        Energy and food bills are soaring. Under the onslaught of inflation and prolonged wage stagnation, wages are in free fall. Billions of dollars are diverted by Western nations at a time of economic crisis and staggering income inequality to fund a proxy war in Ukraine. The liberal class, terrified by the rise of neo-fascism and demagogues such as Donald Trump, have thrown in their lot with discredited and reviled establishment politicians who slavishly do the bidding of the war industry, oligarchs, and corporations.

      • Common DreamsOpinion | Introducing Giorgia Meloni: How the United States Opened the Door for Fascism’s Return to Italy

        The Italian Parliamentary election has concluded and the neofascist Giorgia Meloni is ready to emerge as the new prime minister of a divided country with no clear mandate from around 60 percent of eligible voters, in one of the lower voter turnouts in history. The choices were quite grim and the system rigged along the lines of the anti-democratic US election model after years of neoliberal forces working to create a bipolar schizophrenic and easily destabilized political system.

      • Common Dreams‘Huge Victory’: Starbucks Agrees to Begin Contract Talks With 230+ Union Stores

        “It’s no secret that Starbucks has been delaying negotiations and avoiding bargaining sessions.”

      • The NationBad Fetus
      • The NationA Homeland in the World

        They say dozens of women, that day in Cairo, threw themselves from balconies in grief. They say millions attended his funeral. His cheekbones, they say—his satin mouth. They say he was secretly married, secretly gay; that he was always suffering. In his late concerts, they say you could hear the whisper of death in his great shallow sea of a voice. Some say his voice wasn’t all that great, but no one could match him for feeling. They say it was the Nile that killed him.1

      • AccessNowOpen letter to the ITFlows Consortium: stop tech tools for predicting migration that can be repurposed to violate fundamental rights – Access Now

        We, the undersigned civil society organisations and individuals, call on the Consortium to immediately halt the use of EUMigraTool and stop pursuing the use of any and all technologies that can be used in securitisating migration, and criminalising movement and solidarity with people on the move.

        We are alarmed by the potential, and probable, misuse of the forecasting tool — designed to ‘predict migration flows’ and ‘detect risks of tensions related to migration’ — by authorities to interdict border crossings. Furthermore, the project itself has the power to legitimise the notion that it is possible to predict migration without risking fundamental rights — it is not.

    • Internet Policy/Net Neutrality

      • IT WireiTWire – TPG Telecom to switch off 3G services in December 2023

        Australian telecommunications provider TPG Telecom will switch off its 3G network on 15 December 2023.

        In a statement released on Tuesday, the company said it was making the announcement more than a year ahead of the cutoff date so that customers would have time to move to 4G or 5G mobile services.

        Less than one percent of the carrier’s mobile traffic traverses its 3G network.

      • TechdirtThe FCC Finally Starts Taking Space Junk Seriously

        While technologies like low orbit satellite can help shore up broadband access, they come with their own additional challenges. One being that services like Space X’s Starlink have cause potentially unavoidable light pollution, harming scientific research. The other being the exponential growth in space detritus, aka space junk, that will make space navigation increasingly difficult.

    • Monopolies

      • Software Patents

        • TechSpotProject Caviar: Google is promoting new royalty-free audio and video codecs

          Project Caviar involves the already established Alliance for Open Media, a partnership between some of the most important technology and media companies (Amazon, Apple, Microsoft, Meta, Netflix, Nvidia, Samsung) and Google itself, promoting the adoption of open source and royalty-free audio-video codecs like AV1.

        • ProtocolWhy Google is pushing for open media formats

          Project Caviar is based on HDR10+ for video and the Alliance for Open Media’s Immersive Audio Container format for 3D audio.

          Google wants to strengthen both those efforts with a new umbrella brand that can better compete with Dolby’s branding.

          The company is looking to establish a dedicated implementer’s forum to get streaming services and hardware makers to adopt the formats and brand.

        • Google’s leaked “Project Caviar” may lead to royalty-free alternatives of Dolby Atmos and Dolby Vision

          Dolby charges manufacturers mere dollars for brands to pile on Dolby Atmos and Dolby Vision onto consumer products and earns the bulk of its moolah via playbacks, which helps ensure that the Dolby formats are widely accepted.

        • 9to5GoogleReport: Google wants open, royalty-free alternative to Dolby Atmos and Vision

          This comes as spatial audio is marketed (see: Apple Music and Dolby Atmos) as the next big thing in music, while the video side of Google’s format push is aimed at letting end users “capture in these premium formats and get better-quality video.”

          Today, Dolby charges a license fee to device makers that want to add Atmos and Vision support, which is increasingly advertised by streaming services as a premium feature. For example: [...]

      • Copyrights

        • Torrent FreakU.S. Copyright Groups Are Concerned About Russia’s Handling of Online Piracy

          With its invasion of Ukraine, Russia ignited a regional conflict with global repercussions. Thousands of lives have been lost and many more ruined. In response, many U.S. entertainment industry companies took a stand by ceasing their Russian operations. Through the IIPA, many of the same companies now want to urge Russia to keep online piracy in check.

  • Gemini* and Gopher

    • Personal

      • Anyone Worth a Hunk of Stepping Stone

        Which song was singing in my head as I awakened prematurely a bit before six? *Ragamuffin Dumplin’* by The Stalk Forrest Group. What song shall I listen to when the album containing the song that was singing in my head as I awakened prematurely a bit before six is successfully transferred from the Fairphone to *Myx Nulu*? That’d be *Ragamuffin Dumplin’* by the Stalk Forrest Group. I’ll even send it via Telegram to Christian so he can ignore it but without fail joke, jest or assume that I am **drunk**! What a morning it will be!

        The early waking was inspired by a quantities of figs (*higos* y *brevas*) that I ate yesterevening. I am aware that my body doesn’t deal with any sort of sugary substance well, and especially doesn’t deal with any sort of sugary substance in the evening. By *not dealing well*, I mean that I am awakened frequently by the need to urinate and thirst, not to mention bizarre sensations throughout my living corpse. Over the last year, I’ve had numerous tests performed. I’m apparently free of any blood-borne evidence that I have diabetes. No allergy afflicts me. Next I shall visit a so-called *internista* to verify that one, seven or all of my organs are failing. What excitement! I’ll tip my hat (which I need to search for, for I fear it lost!) at the idea of failing organs. Of course, most of them will be replaced by mechanized replicas as I extend my life into a droll immortality, as it should be. Hey, vole – **anything** just to be around for the Heat Death of the Universe.

    • Linux HandbookEverything You Important You Should Know About the known_hosts file in Linux

      If you look into the .ssh folder in your home directory, you’ll see a known_hosts file among other files.

    • Technical

      • ROOPHLOCH ’22

        I’m typing this from an old
        blackberry phone, wifi tethered to
        my actual phone. And I’m logged
        into the republic on ssh, on an
        Android app called Connectbot,
        which this blackberry can run okay.
        Through ssh I can use emacs on the
        republic like I normally do. But
        there is no meta alt key on this
        connectbot, so I had to learn some
        other ways of invoking my favorite
        commands. That’s kind of some
        learning, I guess.

      • Outvoted

        So without going into too much detail, there was a disagreement about the implementation of a feature at The Enterprise. The “feature” is just marking a particular type of account and having the ability to test it. At first, it was a disagreement between two people, one who wanted the feature supported, and the other who didn’t, and the one who didn’t want the feature implemented won by being more stubborn.

      • gemini://arcanesciences.com/gemlog/22-09-26/

        As you may have seen elsewhere, I wrote a silly thing called Let’s Play OS 2200 on the HTTP version of this site, and it got some attention. At first I was happy to see people were enjoying it, but the last day or so have been rough; in particular, some of the feedback on comp.sys.unisys has accused me of attempting to smear OS 2200′s good name, which is very strange, since I love OS 2200 and have been clear about it.

        Whatever. It is what it is. I just don’t have the energy to engage, and maybe I shouldn’t have been so confident about something so far out of my lane. I never intended to upset anyone – I had really hoped people would enjoy what I wrote. I don’t know if I’ll continue the project.

      • Science

        • ACMNeurosymbolic AI

          The ongoing revolution in artificial intelligence (AI)—in image recognition, natural language processing and translation, and much more—has been driven by neural networks, specifically many-layer versions known as deep learning. These systems have well-known weaknesses, but their capability continues to grow, even as they demand ever more data and energy. At the same time, other critical applications need much more than just powerful pattern recognition, and deep learning does not provide the sorts of performance guarantees that are customary in computer science.

        • SCMPSmart mask could be an early warning system to prevent outbreaks of respiratory diseases

          Chinese team develops wearable bioelectric mask that can sniff out diseases such as Covid-19 and influenza

        • TechXploreX-rays, AI and 3D printing bring lost Van Gogh artwork to life

          Using X-rays, artificial intelligence and 3D printing, two UCL researchers reproduced a “lost” work of art by renowned Dutch painter Vincent Van Gogh, 135 years after he painted over it.

          Ph.D. researchers Anthony Bourached (UCL Queen Square Institute of Neurology) and George Cann (UCL Space and Climate Physics), working with artist Jesper Eriksson, used cutting edge technology to recreate a long-concealed Van Gogh painting.

          It’s the latest in their “NeoMasters” series of recreations, a project they’ve been working on since 2019 to bring lost works of art to life.

          They developed a process to recreate lost works that uses X-ray imaging to see through every layer of paint, AI to extrapolate the artist’s style, and 3D printing to fabricate the final piece.

          This newest effort, dubbed “The Two Wrestlers,” depicts two shirtless wrestlers grappling in front of an abstract background. It recreates a painting originally by Van Gogh who covered over the two figures when he reused the canvas for an unrelated painting of flowers.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Monday, September 26, 2022

Posted in IRC Logs at 2:11 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 Qmbushk3rAPEGKQG4BWWsH4aMeRLgbq5TAH5MZHycPYdPb IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmQMWsGQbpzTXsPxGpQt9nb6VqLkGUhGNQTK88h7S9WCiU IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmQ4ppBRpCGCfEobRwrHnH7VvWehsfy7ReyVRwbVi5qS2f IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmaNaZHysAi1vm3JhMRQKUNAMMTcaT8YRqfdLstjPB4TKu IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmUkUiYtfHHxFXMLfJVW7itUHyDvK3ZMED7AyWBgc6N9CJ IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 Qmf7shd6Bn7waUq9WSc4HoYD6G56jfJbLZLhDYNbMu8nBM IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmcY3C2YaxEVQQ3fFZauQoHuSx1Jdv6GfyCv1ea2T4ruXe IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmRPysfW6fGjZBWK7pZaVvB1EYgJXRG19qXCQuxbQLp3Dr IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmWVv1HPWfKNdq4B1hsdKRUksjQbdu793jr8mx3togTQqd

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts