Links 29/09/2022: Avidemux 2.8.1 and Pithos 1.6.0

Posted in News Roundup at 6:54 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • The Register UKIBM’s ‘bare metal’ LinuxONE push: Did somebody say OpenShift?

        Red Hat has released betas of RHEL 8.7 and 9.1 while its parent company IBM is offering Linux mainframe instances in the cloud, although only in some regions.

        If you’re looking for some particularly resilient home in the cloud to run Linux workloads, Red Hat’s parent company IBM has a new mainframe-based Infrastructure-as-a-Service product out under the LinuxONE umbrella, which it has dubbed “bare metal servers.”

        As we described a few years ago, IBM offers a whole range of different hypervisors on mainframes, including PR/SM (akin to a hypervisor in the firmware) and the native Linux in-kernel hypervisor KVM. One of the company’s flagship mainframe OSes, z/VM, is perhaps more commonly used to manage VMs on Z series, but it’s cheaper to rent LinuxONE mainframes because they’ve been tweaked to only run Linux, excluding any native IBM mainframe OSes.

        It’s noticeable that the announcement specifically mentions Red Hat’s container management platform OpenShift – maybe not unrelated to Red Hat’s new CEO Matt Hicks, who was one of the original OpenShift team.

      • CentOSCentOS Hyperscale SIG conference recap – Blog.CentOS.org

        In the past couple of months members of the CentOS Hyperscale SIG attended several conferences where they were able to share the work the SIG is doing and meet up in person, in some cases for the first time.

        We have a page tracking conference presentations around Hyperscale-related topics. You can find references there to all talks mentioned below, including video recordings where available.

        Conferences aren’t just about presentations though. The “hallway track” provides a great opportunity for serendipidous connection, and the various social events are often a great venue for folks to mingle and get to know each other in an informal setting.

        If you’d like to meet us in person at a future event please reach out. We also generally cover conferences we plan to attend in our quarterly reports.

      • Kubernetes BlogEnforce CRD Immutability with CEL Transition Rules

        Immutable fields can be found in a few places in the built-in Kubernetes types. For example, you can’t change the .metadata.name of an object. Specific objects have fields where changes to existing objects are constrained; for example, the .spec.selector of a Deployment.

        Aside from simple immutability, there are other common design patterns such as lists which are append-only, or a map with mutable values and immutable keys.

        Until recently the best way to restrict field mutability for CustomResourceDefinitions has been to create a validating admission webhook: this means a lot of complexity for the common case of making a field immutable.

        Beta since Kubernetes 1.25, CEL Validation Rules allow CRD authors to express validation constraints on their fields using a rich expression language, CEL. This article explores how you can use validation rules to implement a few common immutability patterns directly in the manifest for a CRD.

      • Exploring the Benefits of Containerization – Container Journal

        As part of the effort to simplify application development processes, many developers are leveraging containerization. It is one way of grouping the infrastructure of applications, making it easier for developers to interact with and manage. It’s not a new method and has been evolving for several years now, allowing developers to become more confident in using it. Containerization also has many benefits for developers.

      • The Growing Appreciation for Service Mesh
    • Audiocasts/Shows

    • Kernel Space

      • LWNThe 2022 Linux Kernel Maintainers Summit [LWN.net]

        After a two-year hiatus, the 2022 Linux Kernel Maintainers Summit returned to an in-person format in Dublin, Ireland on September 15. Around 30 kernel developers discussed a number of process-related issues relating to the kernel community. LWN had the privilege of being there and is able, once again, to report from the event.

      • LWNBetter regression handling for the kernel [LWN.net]

        The first scheduled session at the 2022 Linux Kernel Maintainers Summit was a half hour dedicated to regression tracking led by Thorsten Leemhuis. The actual discussion took rather longer than that and covered a number of aspects of the problem of delivering a kernel to users that does not break their applications.
        Leemhuis started by saying that, after a break of a few years, he has managed to obtain funding to work as the kernel’s regression tracker and is back at the job. He has created a new bot intended to minimize the amount of work required and to, he hopes, enable effective regression tracking while not creating additional overhead for developers. In an ideal world, bug reporters will put bot-related directives into their reports, after which the bot will track replies. When it sees a patch with a Link tag pointing back to the report, it will mark the bug as resolved.

        This application (called “regzbot”) is still young, he said, and it has its share of warts and deficiencies. It has reached a point of being useful for Linus Torvalds, but it is not yet as useful for subsystem maintainers. It is, in any case, far better than trying to track bugs manually. Regzbot has already caught regressions that would have otherwise fallen through the cracks. He thanked Meta for providing the funding that makes this work possible.

      • LWNNext steps for Rust in the kernel [LWN.net]

        The Rust for Linux project, which is working to make it possible to write kernel code in the Rust programming language, has been underway for a few years, and there is a growing number of developers who feel that it is time to merge this work into the mainline. At the 2022 Linux Kernel Maintainers Summit, Miguel Ojeda updated the group on the status of the project with the goal of reaching a conclusion on when this merge might happen. The answer that came back was clear enough: Rust in the kernel will be happening soon indeed.

        There was little suspense on that front; Linus Torvalds spoke up at the beginning of the session to say that he plans to accept the Rust patches for the 6.1 kernel (likely to be released in mid-December) unless he hears strong objections. Ojeda indicated that he would like to see that happen and asked how the patches should be routed into the mainline. Torvalds said that he would rather not accept them directly, so it seems likely that Kees Cook will be routing this work upstream.

      • LWNHow far do we want to go with BPF?

        The BPF subsystem has come a long way in recent years; what started as a mechanism for implementing packet filters has become a way to load code into the kernel for a wide variety of tasks. At the 2022 Linux Kernel Maintainers Summit, Jiri Kosina kicked off a session by asking how far the transition to BPF should go. The actual scope of the session turned out to be rather more limited than that, and no fundamental changes were considered.

        Kosina started by saying that BPF has been highly successful and it is increasingly being used by user programs. But the kernel community has no policies about out-of-tree BPF code and, in particular, how to deal with associated bug reports. What happens when a kernel change breaks somebody’s BPF program? Ted Ts’o added that future applications are increasingly likely to include BPF scripts, and users may not be aware that they are running something that is more like a kernel module than an ordinary program. That can lead to confusion and complaints to kernel developers when things break.

      • LWNVarious short development-process topics

        The final part of the 2022 Linux Kernel Maintainers Summit included a number of relatively short discussions on a variety of topics. These included testing of stable updates, compiler versions, test suites, and the traditional session where Linus Torvalds talks about his happiness (or lack thereof) with the way the development process is going.

      • LWNIntroducing io_uring_spawn [LWN.net]

        The traditional mechanism for launching a program in a new process on Unix systems—forking and execing—has been with us for decades, but it is not really the most efficient of operations. Various alternatives have been tried along the way but have not supplanted the traditional approach. A new mechanism created by Josh Triplett adds process creation to the io_uring asynchronous I/O API and shows great promise; he came to the 2022 Linux Plumbers Conference (LPC) to introduce io_uring_spawn.

        Triplett works in a variety of areas these days, much of it using the Rust language, though he has also been working on the kernel some of late. He is currently working on build systems as well. Build systems are notorious for spawning lots of processes as part of their job, “so I care about launching processes quickly”. As with others at this year’s LPC, Triplett said that he was happy to see a return to in-person conferences.

      • LWNThe road to Zettalinux [LWN.net]

        Nobody should need more memory than a 64-bit pointer can address — or so developers tend to think. The range covered by a pointer of that size seems to be nearly infinite. During the Kernel Summit track at the 2022 Linux Plumbers Conference, Matthew Wilcox took the stage to make the point that 64 bits may turn out to be too few — and sooner than we think. It is not too early to start planning for 128-bit Linux systems, which he termed “ZettaLinux”, and we don’t want to find ourselves wishing we’d started sooner.

        The old-timers in the audience, he said, are likely to have painful memories of the 32-bit to 64-bit transition, which happened in the mid-1990s. The driving factor at the time was file sizes, which were growing beyond the 2GB that could be represented with signed, 32-bit numbers. The Large File Summit in 1995 worked out the mechanisms (“lots of dreadful things”) for handling larger files. Developers had to add the new lloff_t size for 64-bit file sizes and the llseek() system call to move around in large files. Wilcox said that he would really prefer not to see an lllseek() for 128-bit offsets.

    • Graphics Stack

      • CollaboraWeston 11.0: what’s new, what’s next

        Among those changes, this new version brings in some optimization being done in the DRM-backend that refactors and simplifies the handling of buffers that can be scanned out by hardware planes, as well as some changes to include preliminary work towards having support for multiple GPUs.

        Color management infrastructure code has landed that allows HDR characteristics to be delivered to an HDR-capable monitor by setting-up HDR metadata in a weston.ini configuration file and delivering that to KMS. Once Weston gains the ability to produce HDR content in a future version, it will come naturally supported.

        This new version brings in multiple RDP improvements, like clipboard pasting, various keyboard language support, bumped support for a newer version of FreeRDP library, and many more other improvements and fixes.

        With refactoring of the weston_buffer infrastructure, support for wp_single_pixel_buffer_v1 protocol has landed, allowing for instance more optimal media playback.

        Finally, as part of our re-architecture effort to support multiple inputs, outputs, and back-ends being active at the same time, the initial groundwork has been laid to support multiple back-ends with more incoming changes still in-flight.

      • LWNWeston 11.0: what’s new, what’s next (Collabora blog) [LWN.net]

        Over on the Collabora blog, Marius Vlad writes about the recent Weston 11.0.0 release. Weston is the reference compositor for the Wayland display server protocol. Vlad looks at features of the release, including some things that are being deprecated and removed, as well as features coming in Weston 12.

    • Applications

      • Ubuntu HandbookAvidemux 2.8.1 is out with New Filters & HiDPI Improvements | UbuntuHandbook

        Avidemux video editor released version 2.8.1 a few days ago. Here’s the new features and how to install instruction for Ubuntu 22.04 and Ubuntu 20.04.

        The new release improved HiDPI displays support by updating the icon set, and using OpenGL for rendering on-the-fly preview in video filter dialog.

        Avidemux 2.8.1 also introduced new filters: 3D LUT, Decimate, and Arbitrary Rotate, as well as new video encoder: VideoToolbox HEVC for macOS users.

        It also added support for decoding 8-bit VP9 on Windows using DXVA2 and Linux using VDPAU with graphics card that features a VP9 decoder.

      • Ubuntu HandbookPandora Radio Client Pithos 1.6.0 Now Uses CSD Header bar [Ubuntu PPA] | UbuntuHandbook

        Pithos, native Linux client for Pandora Radio, got a new release update few days ago. Here’s how to install it in Ubuntu 22.04, Ubuntu 20.04 & Ubuntu 18.04 via PPA.

    • Instructionals/Technical

      • Linux HintConfigure Lets Encrypt Digital Ocean

        A website’s domain must have SSL/TLS encryption if it intends to get visitors. SSL/TLS certificates provide a strong connection among web servers and browsers. Earlier, security wasn’t a major concern. It was relatively common for websites to deliver data via the established HTTP protocol. Nowadays, the channel used to communicate with the server must be secured, though, because cybercrimes including identity theft, credit card fraud, and espionage are on the rise.

        A Certificate Authority (CA) called Let’s Encrypt offers free SSL/TLS certificates, enabling HTTPS encryption on web servers. It is domain verified, so a dedicated IP Address is not necessary. It is usually advised to have an SSL certificate enabled on your website to improve your SEO ranking, particularly on Google.

      • OSTechNixHow To Configure Mouse Support For Linux Virtual Consoles With GPM [Ed: Last updated today]
      • Make Use OfHow to Manage RSS Feeds With Mozilla Thunderbird on Linux

        Thunderbird is one of the best desktop email clients for Linux. It’s fast, easy to use, and provides a range of features to simplify email management on your desktop. In addition, Mozilla also includes a few additional functionalities in the Thunderbird Mail client: chat, newsgroups, and syndication, which extend its scope of use further.

        If you already use Mozilla Thunderbird for email management on your machine, you can now also access your latest news feeds and blogs within the same program. Here’s how to use Thunderbird Mail as an RSS feed reader on Linux.

      • Make Use OfHow to Live Monitor YouTube Views and Google Analytics With a Raspberry Pi

        People who make YouTube videos or produce web content often set up dedicated displays to monitor performance statistics live, such as YouTube Analytics and Google Analytics. The live analytics data can give an insight of trending content, while the statistics can be used to quickly tweak and optimize related content.

        In an ideal world, live monitoring should start at the flip of a power switch or the push of a power button on the television remote. A Raspberry Pi connected to a television or a monitor is ideal for this.

      • HowTo ForgeHow to Install Jekyll Static Website Generator on Ubuntu 22.04

        Jekyll is a free and open-source static file generator written in Ruby.

      • HowTo ForgeHow to Install Graylog 4 on Ubuntu 22.04

        Graylog is a free and open-source log monitoring tool used for capturing, storing, and enabling real-time analysis of terabytes of machine data.

      • Make Use OfHow to Install Flatpak Packages on a Chromebook

        Flatpak offers newer versions of apps than what you find by default on Chromebooks. Here’s how to run the latest Linux software.

        On most Chromebooks, you can install a complete version of Debian Stable under the Linux development environment. If you want access to newer apps, many popular Linux apps are available as Flatpak packages. It can be tricky to get such apps running on a Chromebook, but the process is easy when you know how.

      • Linux HandbookHow to Follow Symbolic Links in Linux

        A symbolic link (also known as soft link) is a kind of shortcut to another file. It’s heavily used in Linux for shared libraries.

        But how do you know to which original file the link points to?

      • Trend OceansHow to Fix Error: Failed to Download Metadata for Repo ‘AppStream’ from CentOS 8 – TREND OCEANS

        If you are compelled to use CentOS 8 or have any other reason to have it still running on your system, Then I hope you know that CentOS 8 has died and reached its End Of Life (EOL) on December 31st, 2021.

      • ID RootHow To Install SonarQube on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install SonarQube on Ubuntu 22.04 LTS. For those of you who didn’t know, SonarQube or formerly Sonar is an open-source platform for static code analysis and code security. It can find the security vulnerabilities in more than 20 programming languages along with auto-analyzing code quality to detect code bugs and smells. SonarQube also provides reports such as duplicate code, coding standards, code complexity, and security recommendation.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of SonarQube on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • AddictiveTipsHow to chat on Whatsapp on Linux with ZapZap

        ZapZap is a beautiful, powerful Whatsapp client for Linux. It is an unofficial app with improved features like support for multiple users, integrated spellcheck, notifications, etc. Here’s how to chat on Whatsapp on Linux with ZapZap.

      • TechRepublicHow to install Rancher Desktop on Linux and macOS | TechRepublic

        Docker Desktop is one of the more popular GUI tools for developing and managing Docker containers. However, it’s not alone in the world of Docker GUIs. Although many Docker GUIs have come and gone, some have stood the test of time. One such GUI tool is Rancher Desktop.

      • TechRepublicHow to enable Docker command completion in Linux to simplify the Docker CLI | TechRepublic

        For some, Docker is second nature. The commands used are ingrained in their psyche. For others, however, it can be a chore to have to remember all those command line options. Is it docker image, docker images, or docker import? Given how complicated container deployment and management can be, the last thing you want is to have to remember every single command option available.

    • Games

      • Godot EngineGodot Engine – Dev snapshot: Godot 4.0 beta 2

        We released Godot 4.0 beta 1 two weeks ago! That was a big milestone on our journey to finalize our next major release – be sure to check out that blog post if you haven’t yet, for an overview of some of the main highlight of Godot 4.0.

        But the “1″ in beta 1 means that it’s only the first step of the journey, and like for the alpha phase, we’re going to release new beta snapshots roughly every other week. So here’s beta 2!

        The reception of beta 1 was surprisingly good – we’re happy to see the community tinker with the beta, report bugs and provide feedback on the new features. Many bugs have been fixed in just two weeks, with close to 250 PRs merged, many of which fixed bugs reported by beta testers.

      • Boiling SteamDid the TGS2022 Help The Steam Deck Gain Awareness in Japan? Apparently Yes! – Boiling Steam

        As you know Valve and Komodo have partnered to have a huge booth at the Tokyo Games Show 2022 (TGS2022), and while the show was much smaller than usual, because of the post-COVID19 era, there were still quite a few journalists covering the event, almost as much as usual. But has the event managed to increase the interest in the device locally?

      • GamingOnLinuxGoogle gives up on Stadia, will offer refunds on games and hardware | GamingOnLinux

        As expected for some time now, Google has decided to call it quits on their cloud gaming service Stadia. This was announced in a blog post today.

        Written up by Phil Harrison, the Vice President and General Manager at Stadia, the post mentions how “it hasn’t gained the traction with users that we expected so we’ve made the difficult decision to begin winding down our Stadia streaming service”.

        The wildest part about this, is that they’re going to be refunding all Stadia hardware purchases made through the main Google Store and they will also be refunding all game and add-on content purchases made through the Stadia store. Harrison said they expect to have finished up the majority of refunds by Mid-January, 2023. They will not be refunding any Stadia Pro subscriptions though, only the full purchases. More info on the process here but it seems like it’s not ready yet.

      • GoogleA message about Stadia and our long term streaming strategy

        For many years, Google has invested across multiple aspects of the gaming industry. We help developers build and distribute gaming apps on Google Play and Google Play Games. Gaming creators are reaching audiences around the world on YouTube through videos, live streaming and Shorts. And our cloud streaming technology delivers immersive gameplay at massive scale.

        A few years ago, we also launched a consumer gaming service, Stadia. And while Stadia’s approach to streaming games for consumers was built on a strong technology foundation, it hasn’t gained the traction with users that we expected so we’ve made the difficult decision to begin winding down our Stadia streaming service.

    • Desktop Environments/WMs

      • DebugPointXfce 4.18 Arriving on Christmas, After Two Long Years

        An early Christmas gift for Xfce desktop fans. Per the new Xfce 4.18 announcement, the new release is planned for later this year.

      • Web Pro NewsLinux Distro Reviews: Xfce

        Xfce is one of the oldest desktop environments (DE) available for Linux, but it is still going strong as a top contender for modern users.

        In the previous entry in this series, we explained the role of DEs in the Linux world. Among those, Xfce is a unique offering that threads the line between functionality, stability, and performance, making it a popular choice in the Linux and Unix world.

      • GNOME Desktop/GTK

        • Web Pro NewsLinux Distro Reviews: Gnome

          Gnome is the most popular desktop environment (DE) available for Linux, but it is easily the most controversial and the hardest to rate.

          In the previous entry in this series, we explained the role of DEs in the Linux world. Among those, Gnome is a study in contradictions, simultaneously delighting and angering its user base.

  • Distributions and Operating Systems

    • 9to5LinuxSecurity-Oriented Distro Parrot 5.1 Arrives with AnonSurf 4, Linux Kernel 5.18, and More

      Parrot 5.1 is here six months after Parrot 5.0 and it’s powered by Linux kernel 5.18, which, unfortunately, reached end of life in August. However, the new kernel comes as a significant update from Linux kernel 5.16 used in the previous release, so you should expect better hardware support.

      Parrot 5.1 also ships with the in-house built AnonSurf 4 anonymity tool that provides users with a solution to automatically route all the system traffic through the anonymous Tor network.

    • New Releases

      • Linux MagazineExTiX 22.9 Released with Support for Installing… – Linux Magazine

        The developers of the ExTiX Linux Distribution have released a new version that includes added support to make installing and using Android apps on the desktop a breeze.

        ExTiX is a KDE Plasma-based Linux distribution that has recently enjoyed a new release, 22.9, which adds something special into the mix…the ability to easily install Android apps.

        The ExTiX developers have added Anbox into the mix with support for Google Play Services pre-installed. Because this take on Anbox comes complete with Google Play Store integration, not only is the installation of Android apps simplified on Linux, but the apps should run more dependably and predictably.

    • Red Hat / IBM

      • Red Hat OfficialRed Hat Satellite 6.11.3 has been released

        We are pleased to announce that Red Hat Satellite 6.11.3 is generally available as of September 29, 2022.

        Red Hat Satellite is part of the Red Hat Smart Management subscription that makes it easier for enterprises to manage patching, provisioning, and subscription management of Red Hat Enterprise Linux infrastructure.

      • IBM Old TimerThe Importance of Open Source Digital Wallets to the Future of the Internet [Ed: IBM promoting the lie that “The LF was originally founded in 2000″ (no, not really, but they put this lie in Wikipedia)]

        On September 13, the Linux Foundation (LF) announced its intent to form the Open Wallet Foundation (OWF) at its Open Source Summit Europe in Dublin. The OWF aims to develop open source software, key building blocks, and best practices that anyone can use as a starting point to build multi-platform, highly secure, privacy-protecting digital wallets. In addition, the OWF will advocate for the wide adoption of open source wallets that can be used to support a wide variety of applications, from payments to digital identities.

        The LF was originally founded in 2000 as the Open Source Development Labs to help set the standards for the Linux operating system and support its continued development and commercial adoption. It grew over the years and assumed its current name, Linux Foundation, in 2007. Over the past decade, the LF has undergone a major expansion beyond its original Linux mission. It now has over 1,260 company members and supports hundreds of open source projects. Some of the projects are focused on technology horizontals, – e.g., AI, blockchain, security, cloud, – and others on industry verticals, including energy, automative, government, and health care.

        Let me attempt to explain the importance of this announcement by addressing three key questions: what is a digital wallet?; what are digital identities?; and why do we need standard-based, open source digital wallets?

      • LWNTwo visions for the future of sourceware.org [LWN.net]

        Public hosting systems for free software have come and gone over the years but one of them, Sourceware, has been supporting the development of most of the GNU toolchain for nearly 25 years. Recently, an application was made to bring Sourceware under the umbrella of the Software Freedom Conservancy (SFC), at least for fundraising purposes. It turns out that there is a separate initiative, developed in secret until now, with a different vision for the future of Sourceware. The 2022 GNU Tools Cauldron was the site of an intense discussion on how this important community resource should be managed in the coming years.

        The session in question was initially set up as a birds-of-feather gathering where Sourceware “overseer” Mark Wielaard would describe some of the new services that are being developed for that site. He did not get far before being interrupted by David Edelsohn, who questioned whether it was correct to describe Sourceware as a “software project”. Wielaard tried to push on, noting that there are currently two Red Hat employees, helped by a number of volunteers, looking after the site. Carlos O’Donell repeatedly broke in to describe Sourceware as specifically a Red Hat system. The site’s mission statement, he said, describes it as “a Red Hat system providing services for open-source projects for Red Hat” (which isn’t quite the wording on the actual statement). The purpose of these interjections was evidently (at a minimum) to dispute the notion that Sourceware is a community resource.

      • Red Hat OfficialWhat are the differences between absolute and relative paths? | Enable Sysadmin
      • Red Hat OfficialConnecting to the RHEL web console, part 2: Running the Cockpit web server

        The Red Hat Enterprise Linux (RHEL) web console provides a web-based graphical interface for managing and monitoring systems. The web console can be used to complete a wide variety of tasks, such as managing storage, users, the firewall, monitoring performance metrics, reviewing log files, installing system updates and many others. See the Managing systems using the RHEL 9 web console documentation for more information.

    • Canonical/Ubuntu Family

      • Ubuntu MATE 22.10 Release Notes | Ubuntu MATE

        Ubuntu MATE 22.10 is a modest update by recent standards and focused on “quality of life improvements”. And there is good reason why this release of Ubuntu MATE doesn’t feature the usual bucket 🪣 list of changes you’d typically expect, and that’s because I’ve been helping bring the full Ubuntu MATE experience to Debian MATE 🧉

      • UbuntuUbuntu Blog: Build Ubuntu Pro Golden Image on Google Cloud

        A Golden image is a base image that is used as a template for your organization’s various virtual machines either on-prem or in the public cloud. It streamlines software development processes since mission-critical applications are dependent on a certified environment. Using Golden Images saves numerous hours and resources as they create consistent environments for your developers and operation teams. Golden Images not only help prevent human errors but also standardize VM configurations.

      • Beta NewsUbuntu desktop comes to AWS

        Until today Amazon WorkSpaces cloud desktop solution simply offered the option of either Windows or Amazon Linux machines. Now though Canonical has announced the availability of Ubuntu WorkSpaces on AWS.

        This is a fully managed virtual desktop infrastructure (VDI) on the public cloud and the first third-party Linux OS to be available on the platform. It gives developers access to a wide choice of open source tools and libraries in cutting-edge fields like data science, artificial intelligence/machine learning, cloud and internet-of-things.

      • UbuntuUbuntu Arrives on Amazon WorkSpaces: The First Fully Managed Ubuntu VDI on a Public Cloud | Ubuntu

        Canonical is proud to announce the availability of Ubuntu WorkSpaces on AWS, a fully managed virtual desktop infrastructure (VDI) on the public cloud and the first third-party Linux OS available on the platform. Ubuntu Desktop’s availability on Amazon WorkSpaces was announced today at the AWS End User Computing Innovation Day in Seattle, WA.

        Amazon WorkSpaces offers a fully managed and highly secure cloud desktop solution across a broad hardware spectrum, without the upfront costs of deployment and configuration. They enable remote developers to access high-performance desktops from any location, preserving security.

    • Open Hardware/Modding

      • CNX SoftwareELLO LC1 – A 2mm thin DIY “computer” based on Microchip PIC18 8-bit MCU – CNX Software

        We often write about business card or credit card-sized boards, but it’s only true for 2D dimensions, as most boards are over a centimeter thick, with possibly the thinnest we’ve covered being the Khadas Edge2 SBC that’s just 7mm thick.

      • ArduinoDigitize your collection of 35mm slides | Arduino Blog

        Sharing photos used to be a difficult task. Even after paying for someone to develop your photos and waiting to get them back, you’d end up with small prints that your friends would have to huddle around. One common alternative was 35mm slide projection. Photographers could snap images and then have them developed as 35mm slides. They could then pop those into a slide projector that would blow up the image on a screen or wall where everyone could see the photo. If your family has a large collection of 35mm slides, this Instructables tutorial will help you digitize them.

        As great as 35mm slides were, they don’t have much of a place in our modern world. Not many people have working slide projectors these days and most would prefer digital photos that they can share on social media, store on their computer, or display on a TV. There are 35mm slide digitizing services, but those can cost more than 50 cents (USD) per slide. That becomes very expensive if your slide collection is large. If you have a slide projector, even if its projection bulb is burnt out, this tutorial will help you digitize the slides by snapping photos with a modern DSLR camera.

      • ArduinoAdd ML-controlled smart suspension adjustment to your bicycle | Arduino Blog

        Some modern cars, trucks, and SUVs have smart active suspension systems that can adjust to different terrain conditions. They adjust in real-time to maintain safety or performance. But they tend to only come on high-end vehicles because they’re expensive, complicated, and add weight. That’s why it is so impressive that Jallson Suryo was able to add a similar smart suspension adjustment system to his bicycle.

        This system will only work on specific bicycles that have suspension forks that the user can adjust with a knob. A servo-driven mechanism mounts onto the fork and turns the knob to tweak the firmness and rebound of the front suspension. Normally the rider would need to stop and turn that knob by hand when necessary, but this system can perform that adjustment automatically in response to the current conditions. It can recognize and accommodate five different conditions: idle, medium, rough, smooth, and sprint.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • CollaboraThree conferences for the price of none!

      This year’s X. Org Developer’s Conference (XDC) is teaming up with WineConf and FOSS XR for a jam-packed three day event in Minneapolis at the University of St. Thomas’ Opus Hall. From October 4 to 6, XDC + WineConf + FOSS XR attendees will be able to learn about the latest developments in open sources graphics and XR, and attend the annual technical meeting for the Wine Project. The cherry on top – admission for this in-person event is free!

    • PR NewswireCassandra Summit Returns in 2023
    • Cassandra Summit Returns in 2023
    • Venture BeatHow MLops deployment can be easier with open-source versioning | VentureBeat

      Modern software development typically follows a very iterative approach known as continuous integration/continuous development (CI/CD). The promise of CI/CD is better software that is released quicker and it’s a promise that ClearML now intends to bring to the world of machine learning (ML).

      ClearML today announced the general availability of its enterprise MLops platform that extends the capabilities of the company’s open-source edition. The ClearML Enterprise platform provides organizations with security controls and additional capabilities for rapidly iterating and deploying ML workflows.

    • Productivity Software/LibreOffice/Calligra

    • Programming/Development

      • Linux LinksExcellent Free Tutorials to Learn GDScript – LinuxLinks

        GDScript is Godot’s built-in language for scripting and interacting with nodes. It evolved as a custom scripting language to be used with the Godot computer (and mobile device) Game engine, and it also supports Virtual Reality.

        GDScript is easy to learn with a syntax similar to Python where the code is indented rather than using lots of brackets and semicolons.

        Unlike Python, GDScript is optimized for Godot’s scene-based architecture and can specify strict typing of variables.

      • QtDialogs in Qt Quick

        The Qt Quick Dialogs module has undergone a lot of changes in the last two years. Its purpose has always been to make it simple for developers to add dialogs to their applications. Native dialogs should be used by default on platforms that have a native dialog for a specific dialog type, and if the system can’t provide one, then the module should fall back to a suitable dialog that’s implemented in Qt.

      • QtGetting Started With Qt for Android

        Ready to try out Qt’s Android toolchain and leverage some of those fresh Qt 6 modules in your Android app? Or perhaps you’re already using the Qt API but want to see what Qt Creator can do?

      • QtQt 6.4 Released

        Today we have released Qt 6.4! The latest version of Qt introduces support for a new platform, brings lots of new functionality – some as technology previews (TP) – and plenty of improvements under the hood. Let’s start with the biggest highlight.

      • Ubuntu PitC vs C++ vs C# | The Key Differences To Know
      • LWNThe perils of pinning [LWN.net]

        Parts of the Rust language may look familiar to C programmers, but the two languages differ in fundamental ways. One difference that turns out to be problematic for kernel programming is the stability of data in memory — or the lack thereof. A challenging session at the 2022 Kangrejos conference wrestled with ways to deal with objects that should not be moved behind the programmer’s back.

        C programmers take full responsibility for the allocation of memory and the placement of data structures in that memory. Rust, instead, takes most of that work — and the associated control — out of the programmer’s hands. There are a number of interesting behaviors that result from this control, one of which being that the Rust compiler will happily move objects in memory whenever that seems like the thing to do. Since the compiler knows where the references to an object are, it can move that object safely — most of the time.

      • SMB3 UNIX Extensions – David Mulder

        One of the primary issues preventing the last few holdouts from migrating away from SMB1 is a lack of Posix/UNIX extensions in SMB2+. SMB1 is definitely going away though in the near future.

        To compensate, the community has been hard at work creating a new UNIX extension standard for SMB3. These have been in the works since as early as 2010, but have recently seen some renewed interest in completion. The Linux ksmbd server and cifs client both support SMB3 UNIX extensions. Several third party servers also offer support. Support from Samba server is nearing completion.

      • syslog-ng 101: how to get started with learning syslog-ng?

        How to get started with syslog-ng? There are two main resources: the syslog-ng documentation and the syslog-ng blogs. You should learn the concepts and basics from the documentation. The blogs document use cases and you can use the docs as a reference.

      • Daniel StenbergThe first 300 setopts | daniel.haxx.se

        Already when the first version of curl shipped in 1998, I had plans and ideas in the back of my head to turn it to a library at some point. I had already before worked on providing libraries with APIs for applications and I appreciated their powers.

        During the summer of 2000 I refactored the curl internals so that it would become a library with an exposed API that we could provide to the world and then let applications get the same file transfer capabilities that the curl command line tool has.


        It took four years to double the amount of options and ten years alter the official count was at 180.

        Today, in September 2022, we recently merged code that made the setopt counter reach 300 and this is the number of options that will ship in the pending 7.86.0 release. After 22 years we’ve added 241 new options, almost 11 new options per year on average.

        Every new option comes with a cost: more code, more tests, more documentation and an even larger forest in which users can get lost when they try to figure out how to tell libcurl to behave the way the want it. The benefit of course being that libcurl gets one more capability and new chances to fulfill users’ wishes. New options certainly are both a blessing and a curse.

      • Rust

        • Rust BlogAnnouncing the Rust Style Team

          Rust has a standardized style, and an implementation of that style in the rustfmt tool. The standardized style helps Rust developers feel comfortable and at home in many different projects, and the tooling support from rustfmt makes it easy to maintain and to incorporate in continuous integration. rustfmt also provides many options to customize the style, but the style guide defines the defaults, and most projects use those defaults.

          The standard Rust style resulted from development and discussion within the Rust style team, between 2016 and 2018. After publishing the style guide, the Rust style team concluded its active work, by design.

  • Leftovers

    • Health/Nutrition/Agriculture

      • YLEFinland’s Covid cases to rise again, health authority predicts

        There will be an increase in new Covid cases across Finland as winter approaches, according to a forecast from the National Institute for Health and Welfare (THL).

        The health authority presented an assessment of the coronavirus situation at a joint press briefing with the Ministry of Social Affairs and Health, on Thursday morning.

        The experts said vaccinations are not effective in significantly reducing the spread of the virus at this point. The best protection from severe Covid symptoms comes from hybrid immunity, which people gain from a combination of vaccinations and a recent infection.

        Finland is monitoring two Omicron subvariants of the coronavirus that causes Covid-19 — BA.2 and BA.4 — particularly closely.

    • Security

      • IT WireiTWire – Optus breach: Labor pledge to update laws covering security

        Federal Attorney-General Mark Dreyfus says the laws governing security have not kept pace with technology, adding that the government would work to update legislation to make it fit for purpose.

        He told Channel 7′s Sunrise program on Thursday: “We need everybody who has Australians’ data to take care of it.

        “We need to make sure that when there is a hack or data breach, that they immediately notify people that have been affected and notify financial institutions and banks and government so that we can take action and that banks and financial institutions can take action to keep people safe from the effects of the hack.

        “So the laws haven’t kept pace. The prime minister talked about this yesterday in the Parliament. We’re going to make sure that our laws are brought up to date and work to protect Australians.”

        {loadposition sam08}Optus revealed on 22 September it had suffered a massive data breach. The data that has been stolen includes Medicare details, drivers’ licence data and also passport data. The government is insisting that the telco pay for replacement of these forms of ID where it is needed.

        Regarding the Medicare data, the company said in a statement on Wednesday: “Of the 9.8 million customer records exposed, we have identified 14,900 valid Medicare ID numbers that have not expired.

      • LWNSecurity updates for Thursday [LWN.net]

        Security updates have been issued by Debian (chromium, lighttpd, and webkit2gtk), Fedora (firefox, gajim, libofx, and python-nbxmpp), Gentoo (bluez, chromium, expat, firefox, go, graphicsmagick, kitty, php, poppler, redis, thunderbird, and zutty), Oracle (firefox and thunderbird), Red Hat (kernel), Slackware (xorg), SUSE (expat, libostree, lighttpd, python3-lxml, rust1.62, slurm, slurm_18_08, and vsftpd), and Ubuntu (libxi, linux-gcp, postgresql-9.5, and sqlite3).

      • AccessNowGeneva Declaration: international community unites to end spyware abuse – Access Now

        It’s time to make a collective commitment to human rights, and stop the dangerous, unchecked, and proliferating use of spyware technology. Access Now, the Government of Catalonia, the private sector, and civil society from across the globe are demanding concerted global change to this uncontrolled industry through the Geneva Declaration on Targeted Surveillance and Human Rights.

        “Digital technologies have the power to advance human rights. Surveillance technology does the opposite — it robs people and communities of privacy, agency, and freedom,” said Laura O’Brien, Senior UN Advocacy Officer at Access Now. “We must put an end to the deployment of these treacherous tools, and demand the immediate moratorium on the export, sale, transfer, servicing of, and use of digital surveillance tech. Collectively, we must uphold the Geneva Declaration on Targeted Surveillance and Human Rights.”

        Members of the international community are calling for an end to the proliferation of surveillance technologies used to target individuals and communities engaging in protected activities, such as exercising their right to protest. They are also pressuring governments, in coordination with civil society and the private sector, to implement a moratorium on the export, sale, transfer, servicing, and use of targeted digital surveillance technologies, until rigorous human rights safeguards are put in place to regulate such practices.

      • Citizen LabStatement on the fatal flaws found in a defunct CIA covert communications system – The Citizen Lab

        In 2018, Jenna McLaughlin and Zach Dorfman of Yahoo News reported that a system used by the CIA to covertly communicate with its assets around the world had been compromised by Iran and China around 2011. The compromise reportedly led to the death of “more than two dozen sources” in China in 2011 and 2012, and also reportedly led Iran to execute some CIA assets and imprison others.

        Because the network was used by CIA assets around the world, the compromise also reportedly enabled Iran and China to track espionage activities outside of their borders, related to other countries.

        While relevant oversight bodies reportedly performed an investigation into the as-yet-unreported compromise in 2013, Yahoo News reported that those responsible for the intelligence failures were never held accountable: “One of the central concerns among those familiar with the scope of the breakdown is the institutions responsible for it were never held accountable.”

      • Bleeping ComputerNew malware backdoors VMware ESXi servers to hijack virtual machines

        A modified level of trust is not enough for the ESXi system to accept it by default but the attacker also used the ‘–force’ flag to install the malicious VIBs.

      • Bruce SchneierDifferences in App Security/Privacy Based on Country – Schneier on Security

        Depending on where you are when you download your Android apps, it might collect more or less data about you.

      • The ConversationThe same app can pose a bigger security and privacy threat depending on the country where you download it, study finds

        Google and Apple have removed hundreds of apps from their app stores at the request of governments around the world, creating regional disparities in access to mobile apps at a time when many economies are becoming increasingly dependent on them.

        The mobile phone giants have removed over 200 Chinese apps, including widely downloaded apps like TikTok, at the Indian government’s request in recent years. Similarly, the companies removed LinkedIn, an essential app for professional networking, from Russian app stores at the Russian government’s request.

      • The Register UKRust is eating into our systems, and it’s a good thing • The Register

        C++ first appeared in commercial form in 1985, the year the Nintendo Entertainment System hit the US. A generation of systems programmers have gone from hip young codeslingers to senior management, and they can say truthfully that the fundamental underpinning of IT has been successfully built in the older way. Everything Rust can do, the current C++ can do too; it’s even insulting to suggest that programmers need the extra help.

      • USCERTCISA Publishes User Guide to Prepare for Nov. 1 Move to TLP 2.0

        Managed by the Forum of Incident Response and Security Teams (FIRST), TLP is a system of markings that communicates information sharing permissions. According to FIRST, the purpose of TLP is “to facilitate greater sharing of potentially sensitive information and more effective collaboration.” Note: Unlike formal classification systems, TLP is not legally binding.

      • CISACISA Releases Six Industrial Control Systems Advisories | CISA

        CISA has released six (6) Industrial Control Systems (ICS) advisories on September 29, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • DuoNew Chaos Malware Targets Windows and Linux Devices | Decipher

        A threat actor possibly based in China is deploying a new multiplatform piece of malware named Chaos that is infecting SOHO routers, brute-forcing SSH password, ising known vulnerabilities to propagate, and launching DDoS attacks against a variety of targets.

      • FOSSLifeChaos Malware Targets Home Routers with DDoS Attacks

        Additionally, he notes, the recent shift to remote work has made home routers and other devices outside corporate networks particularly attractive targets for attackers.

      • Privacy/Surveillance

        • Middle East Eye‘No one is safe’: As UN debates spyware threats, rights groups say ban it

          Human and digital rights advocates have welcomed UN Secretary-General Antonio Guterres’ recent recognition that spyware has become a significant threat to the UN’s human rights work.

          But they say now is the time for member states to finally enforce a global moratorium on the sale and use of surveillance technologies until regulations catch up with technology.

          “Digital surveillance is one of the biggest threats facing activists and human rights movements today,” said Marwa Fatafta, Middle East policy manager at Access Now which defends digital rights.

          “We’ve reached the tipping point with the proliferation of malicious spyware. No one, no where is safe.”

        • AccessNowThe Geneva Declaration on Targeted Surveillance – Human Rights

          The Geneva Declaration on Targeted Surveillance and Human Rights (the Declaration) is a collective commitment to human rights in the digital age. While recognizing that digital technologies can strengthen democracy and human rights, the Declaration specifically condemns the proliferating use of surveillance technologies to target communities engaging in protected activities, and calls on governments, in coordination with civil society and the private sector, to implement a moratorium on the export, sale, transfer, servicing and use of targeted digital surveillance technologies developed by the private industry, until rigorous human rights safeguards are put in place to regulate such practices.

          Led by civil society organisation Access Now and the Government of Catalonia, the Declaration is set to officially launch on 29 September 2022 at the UN Human Rights Council’s 51st session side event Spyware: A Threat to Human Rights and Democracy organised by Access Now and the Government of Catalonia, in Geneva, Switzerland.

    • Censorship/Free Speech

      • Reuters‘The internet is dead in Iran’: Protests targeted by shutdown

        Saeed Souzangar, who runs a technology company in Tehran, is adept at navigating frequent internet disruptions to ensure his business can keep operating, but even he has been thrown by nationwide communications outages this month.

        The death of Mahsa Amini, a 22-year-old woman who died in custody after being arrested by the country’s morality police, has triggered the biggest street protests in years, prompting a sweeping security crackdown and curbs on internet and phones.

      • ReutersSix million silenced: A two-year internet outage in Ethiopia

        She had just been crowned world champion, but Ethiopian marathon runner Gotytom Gebreslase broke down in tears when asked if her family was celebrating her win back home in war-torn Tigray.

        “I haven’t spoken to my parents in months,” she said, wiping her eyes as she spoke at a news conference during the World Athletics Championships in Eugene, in the northwestern U.S. state of Oregon, in July.

    • Freedom of Information / Freedom of the Press

      • VOA NewsCambodia’s Press Freedom ‘Under Attack,’ Report Finds

        Independent media in Cambodia continue to come under attack, with journalists harassed and retaliated against, a new report found.

        In its September report assessing the civic space of Cambodia, the international nonprofit CIVICUS rated the country as “repressed.”

      • Reuters‘Living in the stone age’: Offline for 18 months in Indian Kashmir

        For editors at The Kashmir Walla, fact-checking a story used to involve a flurry of googling before press time. So when an 18-month internet and phone shutdown began in the Indian Himalayan region in 2019, they had to improvise.

        “We used to leave blank spaces in news stories when we couldn’t verify certain facts. Every week, a team member would fly to Delhi and fill in the blanks,” said Yash Raj Sharma, an editor with the weekly magazine.

        It was one of numerous headaches for the region’s journalists. Unable to use his mobile, Sharma, 25, recalled driving to a telephone booth at Srinagar airport to dictate an 800-word news story to a friend in Delhi.

        “That incident will remain with me forever as a memory of working during the longest communication and internet shutdown,” said Sharma, who also used to call friends in Delhi to ask them to read out and respond to his emails.

    • Internet Policy/Net Neutrality

      • In Myanmar’s rebel strongholds, internet can mean life or death

        For Zaw Myint Thein, a farmer in northwestern Myanmar, having no internet in the area for more than a year causes many inconveniences – his son is unable to study, he can no longer sell his watermelon crops online, and he feels cut off.

        “It’s like my eyes and ears are closed,” the 45-year-old said by phone from the Sagaing region.

        But in this stronghold of resistance to the military junta that seized power in a coup early last year, the army-ordered internet shutdown – and sporadic cuts to mobile phone communications – puts lives on the line, Zaw Myint Thein said.

      • Public KnowledgeFCC Votes To Give Disabled Incarcerated People Access to Specialized Communications Services – Public Knowledge

        Today, the Federal Communications Commission voted to approve a Report and Order and Further Notice of Proposed Rulemaking to improve access to communications for incarcerated people with disabilities and to reduce the financial burdens created by certain calling service charges and practices.

    • Monopolies

      • Public KnowledgePublic Knowledge Applauds House for Passing Bill Increasing Funding for Antitrust Enforcement – Public Knowledge

        Today, the U.S. House voted to pass the “Merger Filing Fee Modernization Act,” a package of bills introduced by Representatives Joe Neguse (D-CO) and Ken Buck (R-CO) to increase funding for federal antitrust enforcement agencies and support state attorney general antitrust enforcement through more favorable venue rules. The bill passed on a bipartisan vote of 242-184.

        Public Knowledge led a letter signed by more than 35 public interest, consumer advocacy, unions, and civil society groups urging Congress to pass the bill to enable these agencies to “properly fulfill their role safeguarding the economy and consumers from anticompetitive conduct and harmful mergers.”

  • Gemini* and Gopher

    • Personal

      • EclipSmart Binoculars Arrived

        I bought some Celestron EclipSmart binoculars, which are basically just 10x42mm binoculars with built-in continuum (a.k.a. white-light) filters, so that they can be safely used for viewing the Sun. Obviously, they are targetting people who want to view eclipses, but they work just as well any other time that you want to view the solar disc.

        I gave them a quick test this morning and as expected, I was able to see the solar disc, and I saw one sunspot clearly. I compared what I saw with the Intensitygram image from NASA, and the sunspot was in the same location, though the NASA image showed three additional small sunspots.

      • Polyphia – Ego Death (feat. Steve Pai)

        I was actually hesitsting in sharing a Polyphia track but then this new track came and I think I’d just commit to it.

        I’m not a guitar nerd, I’m not a music nerd, but I like music, and that alone doesn’t stop me from listening to whatever prog rock instrumentals that they’re presenting.

        What I like about this track is that there’s basically no breathing room through the entire almost 6 minutes of the track, and that I think different parts of the piece added up together makes it so that there’s always something new on the table, while being rhythmetically and melodically pleasing, without being out of place.

    • Technical

      • Automatically ban ports scanner IPs on NixOS

        Since I switched my server from OpenBSD to NixOS, I was missing a feature. The previous server was using iblock, a program I made to block IPs connecting on a list of ports, I don’t like people knocking randomly on ports.

        iblock is simple, if you connect to any port on which it’s listening, you get banned in the firewall.

      • Legend of Homebody (PC)

        For the last little bit I’ve been wanting to get away from games where problems are solved through acts of violence. They’ve been getting a bit tiresome of late, so I’m exploring other avenues in the medium at the moment. Lately, I’ve been playing some Legend of Homebody. This is a game where you stay in your apartment all day trying to make it in one of four professions: visual artist, writer, musician, or programmer.

        There are a number of different game modes to choose from that mostly effect how long you play. There’s normal mode where the closest thing to a story happens, followed by increasingly difficult modes where the gameplay is similar but story becomes less of a thing. There are also increasingly long modes for people who want extended sessions. Core activities stay the same in each mode, but they add a bit more color to each playthrough.

      • Programming

        • Forth without IF THEN ELSE jumping around

          I crudely avoided the issue of how one would implement what I tried to describe in my previous post: a Forth in which decompiled source looks like original source. Someone called me on it, and I should clarify.

          The problem is that we are trying to linearize the unlinearizable. Code, especially Forth code, is more of a tree. We read and write code linearly – a function consists of a bunch of tokens, and think of it as an ordered sequence. But the threaded code is executed as a depth-first tree walk, down into definitions until the bottom CODE, then up and down again, until the entire tree is walked. It’s kind of awe-inspiring to visualize execution.

          So, whether IF jumps over some code or jumps sideways to some code somewhere else makes little difference. This opens the door for if’s clauses to be elsewhere as anonymous subroutines, os as Slava of Factor calls them, quotations.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

EPO Management Plans to Further Accelerate Grants of Illegal, Invalid, Fake European Patents Next Year

Posted in Europe, Patents at 4:41 pm by Dr. Roy Schestowitz

Unsustainable productivity increase of +10% for 2023

Summary: The EPO has quit behaving like a patent office; it’s just issuing a lot of bogus patents to meet pre-defined “targets” and then it bullies examiners into blind compliance

AS noted earlier this evening, the EPO‘s “f***king president” (that’s what he calls himself) António Campinos plans to grant even more illegal patents. Why is this being tolerated?

Well, examiners aren’t tolerating this. The Central Staff Committee (CSC) has just told staff that “historically low compliance rate of granted patents (73.3%) contrasts with the overall production plan for 2023″ (those plans are just marketing and lies).

Here’s the message to staff:

Unsustainable productivity increase of +10% for 2023

Dear colleagues,

In this open letter we urge the President to refrain from imposing yet another productivity increase of +10% on staff. A historically low compliance rate of granted patents (73.3%) contrasts with the overall production plan for 2023: more production, fewer staff, purely top-down planning.

We appeal for common sense, in view of the future of the European patent system, the reputation of the EPO and, of course, in the interest of the staff.

And here’s the corresponding open letter:

Reference: sc22124cl
Date: 22.09.2022

European Patent Office | 80298 MUNICH | GERMANY

Mr António Campinos
President of the EPO

By email


Unsustainable productivity increase of +10% for 2023

Dear Mr President,
In a speech held on 13 September 2022 in front of Master students at the University of Alicante, you stressed the importance of delivering high-quality patents for entrepreneurs, inventors and investors. The EPO is, however, currently far from its own high-quality objectives: the audit compliance rate for granted patents is historically low at 73.7% (figures of end of June 2022), below the 2022 target of 85% and far below the target of 95% in the Strategic Plan 2023.

The DG 1 overall production plan for 2023 recently announced at operational level will further worsen the situation: more production is to be achieved from fewer staff, the planning will be purely top-down and a steep increase in productivity of around +10% is requested.

The steep increase in productivity is presented as justified by the need to catch-up with the current salary adjustment procedure – the result for the year 2022 will be around 10% because of the high Eurozone inflation. This argument is a misrepresentation of the financial bundle of measures (CA/18/20) approved by the Council on the basis of the Mercer Financial Study 2019 (CA/83/19). It is the biennial adjustment of the EPO fees (and not productivity) which shall be inflation based.

Digitization and IT tools are also said to help to achieve this increase in productivity. The Central Staff Committee sincerely doubts in view of recurring complaints from staff on the lack of ergonomics of many tools, repetitive outages and automation not developing as expected.

The Strategic Plan 2023 is coming to an end soon, which may tempt the Office to present positive results deriving from it to the Administrative Council. However, imposing yet another productivity increase of +10% is neither justified nor sustainable to improve the quality of EPO granted patents.

The Central Staff Committee urges you to refrain from continuing in this direction – in the interest of the European patent system, the reputation of the EPO and its staff.

Yours sincerely,

Michael Sampels
Acting Chairman of the Central Staff Committee

He’ll probably just ignore such letters; just like he ignores demands to comply with a court's ruling.

[Meme] EPO Would Probably Argue It’s Just a Coincidence That “Women Have Received, on Average, Only 0.88 Steps to Every 1 Step Awarded to Men”

Posted in Europe, Patents at 4:24 pm by Dr. Roy Schestowitz

Maybe the EPO’s management has a very simplistic view of women’s technical capabilities

People that the EPO isn't promoting

Summary: Women barely get promotions at the EPO (“men are 54% more likely to receive a double step compared to women”); the EPO keeps storytelling to distract from these measurable facts

Facts About the European Patent Office and Why Recruiting/Retaining Capable Examiners Isn’t Possible Anymore

Posted in Europe, Patents at 4:13 pm by Dr. Roy Schestowitz

Video download link | md5sum 7e85aabf781dae691a2e707de1787fb6
EPO by the Numbers
Creative Commons Attribution-No Derivative Works 4.0

Summary: A couple of new papers (or parts of a long paper) reveal an office responsible for granting patents which intentionally fails to do the job properly

THE video above shows that the EPO barely publishes anything anymore, except maybe once a week. The latest fluff (warning: epo.org link) is just misleading two-paragraph propaganda about an illegal and unconstitutional ploy called Unified Patent Court (UPC). With many obstacles ahead, those words won’t age well.

But much of the video then deals with Parts 3 and 4 of a multi-part paper (see first and second part) from the staff representatives. It’s shown in a hurry (see this [PDF] and that [PDF]). It contains many charts and demonstrates the appalling conditions, which discourage suitably-qualified people from joining the EPO and even just staying at the EPO.

epo.org is still a parade of lies, but it has lost momentum. The EPO itself is an imploding bubble, having granted far too many invalid patents, whose harm will be seen in decades to come.

To quote the The Central Staff Committee’s message to staff:

Rewards Exercise 2022: Reduction of the budget and comparing populations

Dear colleagues,

Every July the Office proudly announces the results of the yearly reward exercise. This year was no different, with the Office’s publication concerning the reward exercise of 2022 “Celebrating outstanding achievements with an inclusive approach”. In an effort to improve the transparency of the practice, the annual announcement is accompanied by a document containing the detailed statistics, which provide breakdowns of different divisions of our EPO population. We appreciate having access to the data, since it allows for an analysis of the distribution of the rewards despite being far from complete (i.e. lacking data on functional allowances).

The staff representation has carefully examined the data provided this year and for previous years and has initiated a short series of publications (part 1, part 2) detailing our analysis. The next are:

Part three: Reduction of the budget

Part four: Comparing populations

Over the coming weeks, subsequent editions in this series on the rewards exercise will be published that take a closer look at a number of topics that have given us cause for concern.

Sincerely yours,

The Central Staff Committee – CSC

In the next post we’ll show that António Campinos is already being contacted regarding the plan to grant loads of European Patents illegally.

No Protection for Linux Offered by the So-called ‘Linux’ Foundation

Posted in Antitrust, Deception, GNU/Linux, IBM, Microsoft at 3:50 pm by Dr. Roy Schestowitz

Video download link | md5sum bdfdd6fa693b45158f0e1cb63bb496ef
Protection Racket
Creative Commons Attribution-No Derivative Works 4.0

Summary: From a purely objective perspective, the so-called ‘Linux’ Foundation spends far more time/money protecting monopolies than it spends protecting Linux; hence, the organisation arguably does more harm than good to society

EARLIER today we said that the Linux Foundation (LF) was claiming, in vain, that it had protected women and minorities. It’s about rhetoric with almost nothing to show for it. We said that "The Linux Foundation is in No Position to Lecture Us (or Anybody) on Diversity" because it seemed like a typical corporate ploy; they paint communities as zealots and bigots, then demand control of the projects of these communities. The Software Freedom Conservancy (SFC) constantly uses such issues as a "wedge". SFC played a big role in the coup against the FSF, even more than once. Someone has told us that “a reminder about the anti-RMS petition tied to the unfounded smear campaign is needed. The campaign was based on baldfaced lies which too many, out of apparent eagerness to lynch RMS or destroy FOSS, did not examine.”

“It’s about rhetoric with almost nothing to show for it.”The video above discusses that for a bit and then proceeds to pointing out how the LF does nothing about ‘secure-core’ or ‘secure’ boot blocking Linux (back doors’ proponents and spy agencies like the NSA misframe security). In other words, when it comes to pressing issues the LF is on the same side as Microsoft and IBM, which even tried to deprecate BIOS support. Restrictions and lockdowns like DRM and TPM are perfectly OK with the LF.

An associate of ours brought up “secure-core”, the “thicker part of the wedge, long after the thin edge.”

“SFC played a big role in the coup against the FSF, even more than once.”The associate said “secure-core has hardly been covered at all; remember 20+ years ago when Microsoft tried to acquire Phoenix or AMI BIOS? I forget which. That was when they laid out their strategy to also begin lock-in from the hardware on up. Not just from the OS on down. I’m missing a few steps but secure-core appears to be a certification programme where restricted boot is not just on by default but on permanently in such a way as to prevent non-Microsoft systems from booting.”

Recently, Microsoft and the OEMs stepped this agenda up a little. Where was the LF? What did it do to protect Linux from this? Absolutely nothing! Spending endless millions on vanity offices.

Software Freedom Conservancy (SFC) is Facilitating a Hostile Takeover by Corporations (Privatising Free Software)

Posted in Free/Libre Software, FSF, GNU/Linux, Red Hat at 3:05 pm by Dr. Roy Schestowitz

Video download link | md5sum 989d6ee61c6398bf072bba30c65de7a2
Outsourcing GNU Piecewise
Creative Commons Attribution-No Derivative Works 4.0

Summary: The Software Freedom Conservancy (SFC), which is trying to take ‘business’ and funds away from the FSF (also from SFLC, which sued it over that), helps IBM/Red Hat and the corporate front groups take over important GNU projects, typically under the guise of providing security and funds (financial security)

THE MONEY tends to make things toxic in the Free software world.

James Bottomley (IBM) wrote about it less than a day ago and we’ve already witnessed how IBM uses its “donations” to the FSF as a form of blackmail (“do what we say or lose money!”).

Lately, some awful things were done by awful people who had defamed the founder of the Free software movement. They wanted to forcibly remove him and, failing that, to forcibly remove projects they’re connected to from GNU and/or the FSF. In the process they detached copyrights and caused chaos, mostly benefiting employers such as IBM. IBM likes to behave as though it owns GNU! It’s all about money to these people…

“Lately, some awful things were done by awful people who had defamed the founder of the Free software movement.”Earlier this month there was a shouting match culminating in this week's message and about 18 hours ago LWN liberated (outside the paywall today) last week’s article, which mentions what it was all about and gave access to video. It says “yelling from the audience made it clear that there was some disagreement at this point — disagreement that had never been expressed during the month-long mailing-list discussion.”

There’s an unspoken-about conflict of interest, as the author is in the Linux Foundation, which pockets or gains control over these projects. I mention this in the video above. Similarly, many of the comments come from kernel developers/enthusiasts, so there’s an inherent bias. At one point the author and editor admits “Funding from the LF” when he writes: “Through the end of 2019, LWN received some travel sponsorship from the LF that enabled us to get to events and was much appreciated. For some strange reason we stopped travelling in 2020 and that sponsorship ended; we have received no funds from the LF since that time. So the claim in the above comment is not really true. We might see if they are willing to renew the travel money at some point, but we have not even asked that question. The steady stream of “I got COVID” reports coming in from the events of the last two weeks has not increased our urgency on that point.”

The video above makes it clear that this account of events is tilted in favour of the corporate allies.

“There’s an unspoken-about conflict of interest…”The modus operandi isn’t too hard to grasp. First, small grassroots communities develop good software. Over time it gains a lot in adoption, including corporate absorption (downstream and upstream, it’s even in billions of products). But these corporations are then tempted to take over the entire thing, not just hire the key developers. They’re taking over the governance, copyrights, maybe even topping it with obligatory software patents (obligatory to employees recruited from these projects).

In 2018 we saw Linus Torvalds temporarily ousted (and brought back in a lower position) from his own project and a year later Richard Stallman (rms) suffered the same fate, albeit less temporarily. For corporations, kicking aside project founders (like rms) and the FSF is the ‘natural’ next step. It’s like a process of gradual privatisation, turning the Commons into “intellectual property”.

The author says “Red Hat could turn evil someday (though he sees no signs of that now) and it is good to have a contingency plan.”

Saying there’s “no signs of that now” is missing the full picture; Red Hat is just a drone of IBM and many managers at Red Hat came from Microsoft following a massive and still-ongoing staff exodus.

“There are a lot of interesting comments, and almost 99% of them are from LWN subscribers, i.e. people who pay LWN.”I’ve not watched the video of the controversial “debate”, but this comment notes: “Looking at the video of the talk, that was egregiously unprofessional. I just cringed…”

There are a lot of interesting comments, and almost 99% of them are from LWN subscribers, i.e. people who pay LWN.

The Linux Foundation is in No Position to Lecture Us (or Anybody) on Diversity

Posted in Deception, GNU/Linux, IBM, Kernel, Red Hat at 10:11 am by Dr. Roy Schestowitz

Earlier this month the following photo was taken (all male); Original in LWN (months ago LWN also became all male as ris had stepped down)

LF is diverse

Summary: The Linux Foundation cannot define support and cannot understand how to support women so instead it trolls people; it also hires no black people and just like IBM it then accuses the community of being an impediment to diversity (community projects actually have more such diversity)

A couple of years ago we said that “IBM (Red Hat) Lectured FSF That It Needed More Diversity, But Was It Looking at the Mirror? IBM and Red Hat Are Even Less Diverse.”

The new photo (above) shows that the so-called ‘Linux’ Foundation fails to demonstrate to us how corporations are taking the lead (these men are employees) or will tackle diversity woes.

We’ve been writing about this subject for years because destructive people in Debian brought the same disruptive ideology to Debian, resulting in almost zero women developers (they’re used as political props, which in turn puts them off). So the ‘Linux’ Foundation’s psyche spreads and it’s not helping. It’s a straw man. Identity politics distract from key issues like Software Freedom and threats such as corporate takeovers. Corporations do not have genders and races, they just have shareholders and they want to dominate everyone.

In a recent press release, the boasting about diversity was prominent. Many of these LF pages keep boasting about diversity, but usually they assign women to do clerical and low-paid work. It’s the same at Red Hat and IBM. They want us to at least feel like they have lots of girls on tje payroll.

What is it that makes this relevant? We need to talk about it because IBM/Red Hat and LF (the front group) keep weaponising this as a smear against communities (for 3 years already), i.e. projects not controlled by corporations. In the case of Linux (the kernel), if all those salaried coders are not female, what does that tell us about corporations as the ‘solution’?

As an associate explains, “many (most) don’t understand the weaponisation, especially of the CoC. It’s “mean” to criticize a corporation for illegal, unethical, and anti-competitive behavior especially if the corporation hurts the kernel and the FOSS world in general.”

Jim Zemlin, who seems to idolise Bill Gates, kept insinuating that criticising Microsoft is like kicking puppies. Criticising a company that attacks you is “hatred” (we did a video about this less than a day ago) and very irrational, apparently… and it’s akin to brutality against animals. He moreover insisted that "Open Source loves Microsoft"… (i.e. Microsoft loves what it is attacking!)

As an associate puts it, “Microsoft has worked hard to earn and stay the object of any hate it receives.”

Not only does the LF hijack the narrative on diversity with so-called 'studies' (marketing) [1, 2] and paid-for puff pieces to promote that narrative [1, 2]; GPL violators and Linux haters join in as well.

It’s more of a siege than a genuine, sincere attempt to introduce more people to Linux. See the photo above; it’s like playing “Where’s Waldo?” but in this case don’t bother looking for a Waldo; there’s a total of zero women.

Links 29/09/2022: Linuxfx 11.2 and Progress on GNOME 43

Posted in News Roundup at 7:46 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • GamingOnLinuxSystem76 gives the Oryx Pro a big refresh with an OLED 4k display

        The Linux flagship NVIDIA laptop from System76 has been given a major overhaul, making it something of a beast. Pricey though, with you needing to dig deep into your wallets with a base price of $2,199.

      • Unicorn MediaSystem76 Upgrades Its Oryx Pro Linux Laptops

        The July upgrade also brought the option for purchasers to configure Oryx Pro with either NVIDIA RTX 3070 Ti with 6144 CUDA Cores or NVIDIA RTX 3080 Ti with 7424 CUDA Cores dedicated graphics cards, configured so that users can switch between the laptop’s integrated Intel GPU and the dedicated NVIDIA graphics directly through the graphics profiles in Pop!_OS, the Linux distribution that System76 builds in-house, and which is installed by default on its machines (although purchasers can opt for the latest and greatest LTS Ubuntu release if they wish).

      • Real Linux UserComing soon – my book Linux for the rest of us – Real Linux User

        In recent blog posts, I have hinted that I have been writing my own book for quite some time. My goal for this book has always been, much like through this website, to bring Linux closer to normal users by providing easy-to-understand tutorials and background information in an accessible way. Because of the many articles I have written for reallinuxuser.com, I had a lot of material at my disposal as a good foundation for writing this book. And now it is almost time that, after about 2 years of research and writing, I can proudly share that I have completed my book.

        In the coming weeks, my book “Linux for the rest of us” will be available through Amazon KDP in paperback and Kindle eBook format. I am now busy with the final preparations and administrative actions to be able to publish the book. In approximately 370 pages in 6 by 9 inches format, the book helps novice Linux users, doubters, and potential switchers, to understand what Linux is, what choices to make and how, to properly choose the right distribution, where to find Linux distributions, how to create a Linux live USB media, how to make sure you have a secure download to start with, how to install Linux, how to get the system working optimally for different hardware types, how to find and install beautiful applications, and it also offers many more interesting topics that will help you further in your Linux journey. The book will help anyone who is not really interested in the most in-depth technical aspects but wants to use a computer for productive purposes, to understand, set up, and use their new Linux system in an effective way, according to a logical step-by-step approach.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 0.0.1 compiling on Ubuntu 64

        You might need some packages first

      • Data SwampAvoid Linux locking up in low memory situations using earlyoom

        Within operating system kernels, at least for Linux and the BSDs, there is a mechanism called “out of memory killer” which is triggered when the system is running out of memory and some room must be made to make the system responsive again.

        However, in practice this OOM mechanism doesn’t work well. If the system is running out of memory, it will become totally unresponsive, and sometimes the OOM killer will help, but it may take like 30 minutes, but sometimes it may be stuck forever.

        Today, I stumbled upon a nice project called “earlyoom”, which is an OOM manager working in the user land instead of inside the kernel, which gives it a lot more flexibility about its actions and the consequences.

    • Graphics Stack

      • GamingOnLinuxNVIDIA put out new Vulkan Beta Driver with Vulkan Video updates

        NVIDIA has released a new version of their Vulkan Beta Driver, with new extensions supported and updates to their support of the newer Vulkan Video. What is Vulkan Video? It’s the attempt to add in hardware accelerated video compression and decompression into the Vulkan API.

    • Applications

      • Linux LinksBest Free and Open Source Alternatives to Apple Photo Booth – LinuxLinks

        Photo Booth is a software application for taking photos and videos with an iSight camera. iSight is a brand name used by Apple to refer to cameras on various devices. The software offers live filters and the ability to replace backgrounds.

        Photo Booth is not available for Linux. We recommend the best free and open source alternatives.

    • Instructionals/Technical

      • UNIX CopHow To Install KeePassXC on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install KeePassXC on Ubuntu systems.

        KeePassXC is a free and open-source password manager. It started as a community fork of KeePassX (itself a cross-platform port of KeePass).

      • Linux CapableHow to Install Code::Blocks IDE on Fedora 36 Linux

        Code::Blocks is free and open-source software highly extensible Integrated Development Environment (IDE) for the C, C++, and Fortran programming languages. It features support for a wide range of compilers, parallel builds, and multi-target projects and also provides an interface with GNU GDB. The code editor in Code::Blocks features syntax highlighting, code folding, a tabbed interface, code completion, a class browser, and smart indenting.

        In the following tutorial, you will learn how to install Code::Blocks on Fedora 36 Linux desktop with either DNF or Flatpak package manager using the command line terminal and instructions on how to update and remove the software in the future if required.

      • CitizixHow to Setup Metabase and Nginx to proxy traffic on Rocky Linux 9

        Metabase is an open-source business intelligence tool. Metabase lets you ask questions about your data, and displays answers in formats that make sense, whether that’s a bar chart or a detailed table. You can save your questions, and group questions into handsome dashboards.

      • markaicode by MarkHow to Modify Ban Time Fail2ban | Mark Ai Code

        Fail2ban is an open-source log parsing program that guards against brute-force assaults on your system. It parses log files and blacklists IP addresses with a high number of authentication failures.

        This commonly happens when a person tries to log in through trial and error. Fail2ban then takes action, such as modifying the firewall rules to ban that IP address for a set amount of time, which is usually 10 minutes or 600 seconds. To avoid locking off innocent users who may have frequently mistyped their passwords, the blocked IP address is automatically unbanned after 10 minutes.

        This post will teach you how to adjust the ban time in fail2ban and, if desired, how to permanently ban an IP address.

      • UNIX CopHow To Install OpenToonz on Ubuntu 20.04 | 22.04 LTS

        OpenToonz is a 2D Animation Program based off of Toonz Developed by Digital Video in Italy. It’s open source animation production software to develop and create all together.

        OpenToonz has been customized by Studio Ghibli, and used for the creation of its works for many years. Dwango has launched the OpenToonz project in cooperation with Digital Video and Studio Ghibli.

      • UNIX CopHow To Install Peek on Ubuntu 20.04 | 22.04 LTS

        In this tutorial, we will show you how to install Peek in Ubuntu systems.

        Peek is a computer software program for Linux to create simple animated GIF file based on the GIF89a file format. A screencast is created from a user-defined screen area. Peek is optimized for generating animated GIFs, but can also directly record to WebM or MP4.

        Peek is not a general purpose screencast app with extended features but rather focuses on the single task of creating small, silent screencasts of an area of the screen for creating GIF animations or silent WebM or MP4 videos.

      • UNIX CopHow To Install Code Blocks on Ubuntu 20.04 | 22.04 LTS

        Code::Blocks is a free, open-source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. It is developed in C++ using wxWidgets as the GUI toolkit. Using a plugin architecture, its capabilities and features are defined by the provided plugins. Currently, Code::Blocks is oriented towards C, C++, and Fortran. It has a custom build system and optional Make support.

      • UNIX CopInstall OpenShot on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install OpenShot on Ubuntu systems

        OpenShot Video Editor is a free and open-source video editor for Windows, macOS, Linux, and Chrome OS. The project started in August 2008 by Jonathan Thomas, with the objective of providing a stable, free, and friendly to use video editor.

        The program supports Windows, macOS, and Linux ever since version 2.1.0 (released in 2016). OpenShot added support for Chrome OS in version 2.6.0 (released in 2021). There is an unofficial portable version beginning in 2020.

      • Its FOSSHow to Use Picture in Picture Mode in Brave Browser

        Brave is an excellent Chrome-like and yet Chrome alternative web browser.

        Firefox and Brave are two browsers I like using on my Linux system. Both have different advantages.

        There is one thing that Firefox does better than Brave and it is the picture-in-picture (PIP) mode that works on YouTube, Netflix and most streaming sites.

        Brave too has picture-in-picture mode but it’s so hidden that you feel like there is no PIP support at all.

        The built-in picture-in-picture works on some websites (like YouTube) but may not work on others (like Prime Video). Worry not! you can use a dedicated extension for that.

        Let me show both methods in this tutorial.

      • List all packages in Ubuntu/Debian that no package depends on
      • RoseHostingHow to install and Secure Redis on Ubuntu 22.04 – RoseHosting

        In this tutorial, we are going to explain in step-by-step detail how to install and secure Redis on Ubuntu 22.04.

        Redis is a shortcut for a remote dictionary server and an in-memory data structure store. It is used as an option for a distributed in-memory key-value database with durability. Redis server is written in C language and supports a huge range of data types such as strings, hashes, lists, and many more.

        Installing and securing Redis on Ubuntu 22.04 is a straightforward process that may take up to 15 minutes. Let’s get things working!

      • Jay LittleThe Siren Song of Set It and Forget It

        The truth is I work with a lot of clients, many of which should know better, whom rely almost exclusively on legacy applications, operating systems and platforms to handle their work on a day to day basis. What makes matters worse is that these legacy tools have been integrated into workflows that they now consider to be sacrosanct despite the fact that over the last decade or two, far superior and far more efficient replacements have been developed.

        But replacing these tools generally requires that end users change or adapt their workflows and they really don’t want to do that as I discussed back in 2021′s post “Spock Was Wrong: In Tech is is Easier to Create than to Destroy”: [...]

      • uni TorontoReaching past our firewalls with WireGuard (some thoughts)

        The appeal of WireGuard for this is that it’s a lightweight service that requires little configuration or operation, and is now supported across all of our Ubuntu fleet. This creates two obvious options, depending on how much work we want to do on these external machines. The first option is to run WireGuard in a non-routed, “point to point” mode on each of the internal machines that have services we want to provide access to. The internal machine would expose its service(s) on an private WireGuard network as well as its normal IP address (in many cases this requires no service changes), and external machines would reach the service by talking to the internal machine’s private WireGuard IP address. The one drawback to this is that it requires configuring each external machine to use the appropriate magic WireGuard IPs for these services, instead of the hostnames we normally use.

      • Manuel MatuzovicDay 2: logical properties

        Logical properties are a new way of working with directions and dimensions, one that allows you to control layout through logical, rather than physical mappings. This is especially useful, if you’re dealing with websites that are presented in different languages and writing modes, like right-to-left.

      • Manuel MatuzovicDay 3: logical property shorthands

        If you use a shorthand property like margin with all 4 values, the properties will always be applied in the direction top – right – bottom – left, no matter the reading direction.

      • Matt RickardSimple Group Theory

        The formal definition of a group and a short proof: A group is a set G with a binary operation on G that satisfies these four axioms1:

        Associativity: For all a,b,c in G (a • b) • c = a • (b • c)

        Identity: There exists an element e in G such that, for each a in G e • a = a and a • e = a

        Inverse: For each a in G there exists an element b in G such that a • b = e and b • a = e, where e is the identity element.

        Closure: For each a, b in G, a • b and b • a are contained in G.

      • Linux HandbookGetting Started With Rootless Container Using Podman

        Are you deploying software using containers? Are you using Podman? Do you want to up your security game by running containers with as little privilege as possible? Boy, do I have an article for you!

      • ID RootHow To Install Audacity on Fedora 36 – idroot

        In this tutorial, we will show you how to install Audacity on Fedora 36. For those of you who didn’t know, Audacity is a free and open-source digital audio editor and recording application. The software includes many features that allow users to edit and record quickly, mix audio files, and support a variety of audio file formats, as well as VST plug-ins. It is available for Windows, macOS, Linux, and other Unix-like operating systems

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Audacity audio editor on a Fedora 36.

      • HowTo ForgeHow to Install Docker Swarm on Debian 11

        Docker Swarm is a container orchestration built on Docker Engine. It allows you to create and deploy a cluster of Docker nodes with multiple servers.

      • ByteXDHow to Transfer Files from a Remote Server to Local Machine – ByteXD

        This tutorial walks you through transferring files from a remote server to a local machine using…

      • Linux Made SimpleHow to install Scartchin’ Melodii on a Chromebook

        Today we are looking at how to install Scartchin’ Melodii on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux.orgTCP/IP Basics by Math | Linux.org

        The TCP/IP Protocol is essential for accessing the Internet. This is the only protocol used for the Internet, so it is important to have some understanding.

        Before we get to the math, let’s look at some basics.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Nate GrahamKDE: Making it easier to submit bug reports

          A persistent complaint KDE faces is that it’s too hard to submit bug reports. One obstacle was the giant scary list of products at https://bugs.kde.org/enter_bug.cgi. Well, no longer! This page is now organized into logical categories with user-friendly text, so it should be much easier to find the right place for your bug report if that’s your entry point. This has been rolled out already and is available immediately…

          There are also other entry points; for example all KDE apps have a “Report a bug” menu item that will take you to the right place automatically. However two prominent ones did not: System Settings and Plasma. In System Settings, the menu item took you to the generic product, not the specific component for the page you’re on. And Plasma had no functionality like this at all.

      • GNOME Desktop/GTK

        • Progress Update For GNOME 43 – Chris’s Design – Development

          GNOME 43 is out the door now, and I want to use this post to share what I’ve done since my post about my plans.


          Since my post in April, Loupe has received many changes. Allan Day provided a new set of mockups for me to work from, and I’ve implemented the new look and a sidebar for the properties. There are some open questions about how the properties should be shown on mobile sizes, so for now Loupe doesn’t fit on phones with the properties view open.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Linuxiac5 Best Free Self-Hosted Music Streaming Software

      This article shows you the five best music streaming services you can install for free and fully control your music collection.

      If you’re a music lover looking for free and open-source music server software to build your own self-hosted live streaming audio server for your extensive music collection, you’ve come to the right place.

      Setting up your own music server with media server software is simple. But services like Spotify already offer similar functionality. So, why build your own?

    • Jussi PakkanenNibble Stew: “Why is it that package managers are unnecessarily hard?” – or are they?

      At the moment the top rated post in In the C++ subreddit is Why is it that package managers are unnecessarily hard?. The poster wants to create an application that uses fmt and SDL2. After writing a lengthy and complicated (for the task) build file, installing a package manager, integrating the two and then trying to build their code the end result fails leaving only incomprehensible error messages in its wake.

      The poster is understandably frustrated about all this and asks a reasonable question about the state of package management. The obvious follow-up question, then, would be whether they need to be hard. Let’s try to answer that by implementing the thing they were trying to do from absolute scratch using Meson. For extra challenge we’ll do it on Windows to be entirely sure we are not using any external dependency providers.

    • James Bottomley: Paying Maintainers isn’t a Magic Bullet

      Open Source is often portrayed as a “disrupter” of the market, but it’s not often appreciated that a huge part of that disruption is value destruction. Consider one of the older Open Source systems: Linux. As an operating system (when coupled with GNU or other user space software) it competed in the early days with proprietary UNIX. However, it’s impossible to maintain your margin competing against free and the net result was that one by one the existing players were forced out of the market or refocussed on other offerings and now, other than for historical or niche markets, there’s really no proprietary UNIX maker left … essentially the value contained within the OS market was destroyed. This value destruction effect was exploited brilliantly by Google with Android: to enter and disrupt an existing lucrative smart phone market, created and owned by Apple, with a free OS based on Open Source successfully created a load of undercutting handset manufacturers eager to be cheaper than Apple who went on to carve out an 80% market share. Here, the value isn’t completely destroyed, but it has significantly reduced (smart phones going from a huge margin business to a medium to low margin one).

      All of this value destruction is achieved by the free (as in beer) effect of open source: the innovator who uses it doesn’t have to pay the full economic cost for developing everything from scratch, they just have to pay the innovation expense of adapting it (such adaptation being made far easier by access to the source code). This effect is also the reason why Microsoft and other companies railed about Open Source being a cancer on intellectual property: because it is. However, this view is also the product of rigid and incorrect thinking: by destroying value in existing markets, open source presents far more varied and unique opportunities in newly created ones. The cardinal economic benefit of value destruction is that it lowers the barrier to entry (as Google demonstrated with Android) thus opening the market up to new and varied competition (or turning monopoly markets into competitive ones).

    • DizietHippotat (IP over HTTP) – first advertised release

      The result is that, in practice, currently Hippotat has to be built with (a) a reasonably recent Rust toolchain such as found in Debian unstable or obtained from Rust upstream; (b) dependencies obtained from the upstream Rust repository.

    • Web Browsers/Web Servers

    • SaaS/Back End/Databases

      • PostgreSQLPostgreSQL: PostgreSQL Anonymizer 1.1: Privacy By Default For Postgres

        PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database.

        The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization.

      • Linux HintData Visualization Tools for SQL

        SQL is a high-in-demand programming language used in domains like business analytics to interact with relational data. Professionals widely use it for tasks such as data manipulation, data analysis, and data visualization.

        Interacting with data is one thing, but to be able to translate that data into meaningful information is a challenge in itself.

        Data visualization is the art of converting information from data into visual contexts to make it easier and understandable for the human brain. Data visualization may include creating maps, graphs, and charts so that it is easy to pull meaningful insights from the data.

      • Stacey on IoTSurprise! People are shelling out for IoT subscriptions

        IFTTT, which lets users link connected devices and web services to other connected devices and web services, has achieved $6 million in annual recurring revenue from 150,000 subscribers two years after it announced a subscription plan. Linden Tibbets, the CEO and co-founder of IFTTT, told me the company has reached break even on its revenue and that, going forward, it plans to focus solely on paid subscriptions from users.

    • Education

      • Walled CultureWalled Culture, the book, now freely available: what that means, and how you can help

        Much of the book draws on the interviews that have appeared on the blog over the last year, and on blog posts. But it is supplemented by a huge array of additional material. Testimony to that are the book’s 750 references to further information online. For all the digital versions, there are live hyperlinks to allow readers to check details and pursue further research on topics and ideas of interest.

    • Programming/Development

      • Linux HintBreak Statement in C

        “To remove the program control from the loop, we utilize the C language term “break.”The loop’s iterations cease as immediately after the break statement is detected inside the loop, and control is instantly handed onto the first statement following the break.

        In this tutorial, we will practically implement the break statement to execute various example codes in C.”

      • Linux HintHow to Declare Variables in C

        “A variable is simply a name that is assigned to a storage space so it will be easy for users to access or read in the program. The size, layout of a variable’s memory, and the range of values or set of different operations that can be implemented on the variable are all recognized by the type of variable, and each variable is unique in C programming language. It is understandable that the variable declared in a program can be edited anywhere in the code. You can assign the variable names as any number, letter, or character. Because C is a case-sensitive language, so the uppercase and lowercase characters are separate.

        C programming language allows us to define various data types such as Integer, float, char, string, etc., which we will learn with various examples.”

      • Light Blue TouchpaperTalking Trojan: Analyzing an Industry-Wide Disclosure

        Talking Trojan: Analyzing an Industry-Wide Disclosure tells the story of what happened after we discovered the Trojan Source vulnerability, which broke almost all computer languages, and the Bad Characters vulnerability, which broke almost all large NLP tools. This provided a unique opportunity to measure software maintenance in action. Who patched quickly, reluctantly, or not at all? Who paid bug bounties, and who dodged liability? What parts of the disclosure ecosystem work well, which are limping along, and which are broken?

      • TeX

        • Linux HintHow to Make a Multiline Equation in LaTeX

          Sometimes, we need to break some long equations in a document into multiple lines to make it easy to understand. In lengthy derivations, breaking the equations is essential to explain everything step by step.

          That’s why LaTeX also provides some ways to break the equations. Still, many new users don’t know how to create multiline equations. In this tutorial, we will give you a complete information on how to write the multiline equations in LaTeX.

        • Linux HintHow to Underline a Text in LaTeX

          Underlining a text is not limited to only showing a website hyperlink. We underline a text to make the reader notice some specific words in a document. Underlined text attracts the reader’s attention to it. If you write any technical paper, underlining a text can highlight it for the readers.

          That’s why LaTeX provides a simple way to highlight the text. However, many users don’t know the ways to underline a text. If you want to learn the approach to underlining a text, read this tutorial thoroughly.

        • Linux HintHow to Use a Box Text in LaTeX

          A text box can be useful when you want to move a text around in the document. It can emphasise the specific text on a research paper. We can use the \makebox to create a boxed text on a page in LaTeX.

          However, many LaTeX users are still unaware of the ways to add a boxed text in the technical document. If you don’t know how to do it, read this tutorial thoroughly. We will explain the various ways to add and use a boxed text in LaTeX.

        • Linux HintHow to Write and Use a Floor Symbol in LaTeX

          Mathematically, the floor function is denoted by the floor ⌊x⌋ symbol and the floor (x). The shape of the floor symbol looks like a square bracket ⌊x⌋ with no tops. From programming to mathematics, the floor symbol plays a vital role in showing a specific function.

          Many users add the floor function while creating the technical document in any document processor. However, a floor function requires the correct use of the source code to create it. If you want to learn how to write and use a floor symbol in LaTeX, this tutorial is for you. Let’s get started!

      • Python

        • Linux HintFibonacci Numbers in Python Language

          Fibonacci numbers are a particular sequence where the first value is pre-declared as 0 and the second value is pre-declared as 1. The rest of the numbers are produced from these two by adding the previous two numbers. All Fibonacci numbers are positive integers, beginning from 0.

        • AdafruitICYMI Python on Microcontrollers Newsletter: Retrofitting old computers, Pinguin and much more! #CircuitPython #ICYMI @micropython @Raspberry_Pi

          In about a month, there will be a new yearly release of Python: version 3.11. The main feature for this version is a significant increase in speed. People are testing the new version and their results are stunning. Extrapolating keeping at this pace, Python 3.14 will be faster than C++. To be exact, the loop time will be -0.232 seconds, so it will be done just before you want to do the calculation – Towards Data Science.

        • Nicholas Tietz-SokolskyRounding in Python

          In software engineering, there are two principles that often come into conflict. The first one is the principal of least surprise. The second one is doing the right thing. These come into conflict when the usual thing that people do is in fact the wrong thing. A particular example of this is the behavior of rounding.

          In school we were taught that rounding is always done in one particular way. When you round a number it goes toward the nearest hole number, but if it ends in 5, than it goes toward the higher one. For example, 1.3 rounds to 1, and 1.7 rounds to 2. And we were taught that 1.5 rounds to 2, and 2.5 goes to 3.

          Because this is the way that we were taught rounding works, it can be quite surprising when rounding works differently. In fact, there are a number of different ways to round numbers. The Wikipedia article on rounding gives no fewer than 14 different methods of rounding. Fortunately, with computers, we expect fewer: The IEEE 754 standard for floating point numbers defines five rounding rules.

      • Java

        • Alexandru NedelcuThe Trouble with Checked Exceptions: Part 2

          Java’s Checked Exceptions are problematic, and it’s not due to their ergonomics, but rather because they are in conflict with abstraction and OOP. Also, few people care about typed exceptions (unless they are happy path results, not errors).

      • Rust

  • Leftovers

    • HackadayMining And Refining: Sulfur

      When you think of the periodic table, some elements just have a vibe to them that’s completely unscientific, but nonetheless undeniable. Precious metals like gold and silver are obvious examples, associated as they always have been with the wealth of kings. Copper and iron are sturdy working-class metals, each worthy of having entire ages of human industry named after them, with silicon now forming the backbone of our current Information Age. Carbon builds up the chemistry of life itself and fuels almost all human endeavors, and none of us would get very far without oxygen.

    • HackadayThe 1337 PNG Hashquine

      A hashquine is a fun way to show off your crypto-tricks — It’s a file that contains its own hash. In some file types it’s trivial, you just pick the hash to hit, and then put random data in a comment or other invisible field till you get a collision. A Python script that prints its own hash would be easy. But not every file type is so easy. Take PNG for instance. these files are split into chunks of data, and each chunk is both CRC-32 and adler32 checksummed. Make one change, and everything changes, in three places at once. Good luck finding that collision. So how exactly did [David Buchanan] generate that beautiful PNG, which does in fact md5sum to the value in the image? Very cleverly.

    • Telex (Hungary)Hungarian girl completes most brutal trail in the United States
    • Science

      • HackadayAI Dreaming Of Time Travel

        We love the intersection between art and technology, and a video made by an AI (Stable Diffusion) imagining a journey through time (Nitter) is a lovely example. The project is relatively straightforward, but as with most art projects, there were endless hours of [Xander Steenbrugge] tweaking and playing with different parts of the process until it was just how he liked it. He mentions trying thousands of different prompts and seeds — an example of one of the prompts is “a small tribal village with huts.” In the video, each prompt got 72 frames, slowly increasing in strength and then decreasing as the following prompt came along.

      • Democracy NowAsteroid Diversion? Earth Is Still “Careening Headlong into Climate Catastrophe,” Says NASA Scientist

        NASA successfully crashed a robotic spacecraft into an asteroid this week, a first-of-its-kind test of technology that could prevent a comet or asteroid from hitting the Earth, though the chances of such a catastrophe are low. We speak with NASA climate scientist Peter Kalmus, who calls the successful mission “bittersweet.” “We’re doing these amazing missions like redirecting asteroids, and yet with all that technology, with all that knowledge, somehow it’s not translating into stopping what is clearly the biggest threat facing humanity, which is global heating,” says Kalmus.

      • Omicron LimitedArtificial intelligence reduces a 100,000-equation quantum physics problem to only four equations

        The formidable problem concerns how electrons behave as they move on a gridlike lattice. When two electrons occupy the same lattice site, they interact. This setup, known as the Hubbard model, is an idealization of several important classes of materials and enables scientists to learn how electron behavior gives rise to sought-after phases of matter, such as superconductivity, in which electrons flow through a material without resistance. The model also serves as a testing ground for new methods before they’re unleashed on more complex quantum systems.

    • Education

      • TruthOutLos Angeles Teachers Are Burned Out and Priced Out of Living in Their City
      • The Telegraph UKInside the dark world of student sex work

        University students have been supporting their studies with sex work for decades. Jay-Z rapped about ‘chicks wishin’ they aint have to strip to pay tuition’ in Hard Knock Life in 1998 (the year tuition fees were first introduced in the UK). Belle de Jour (Brooke Magnanti), a research scientist, wrote a best-selling book, The Intimate Adventures of a London Call Girl, in 2005, about her secret life as an escort after she ran out of money in the final stages of her PhD thesis at Sheffield University.

        But the subject really came to the fore last November when Durham University was identified as offering training sessions to support students involved in sex work.

    • Hardware

      • CNETWhat Intel Learned When an Elevator Smashed Into Its Supercomputer Chips

        He didn’t say how many were ruined, but the loss stung because they were initial samples used to test performance and look for problems. “Every one of them at that stage is expensive,” Koduri said in an interview. With hundreds of manufacturing steps, it takes months to make a single advanced chip.

        The elevator door wasn’t just a one-off bummer. It actually revealed a problem that stood in the way of Intel’s effort to reclaim its processor manufacturing leadership: human error.

      • Andre Alves GarziaThe appeal of small computers

        I just read an article about the MNT Pocket Reform at the IEEE Spectrum website and the comments about it at HN. Often when I dive deep into threads about small devices, my attention is drawn to bad comments. People asking who would want such device?, or $SOME_PAST_DEVICE did it first and failed, etc. You get the gist: people projecting their dislike about someone else’s vision disguised as unquestionable facts.

      • HackadayRecycling Junk E-tags Into A LoRaWAN AQI Sensor

        [Aduecho] had seen those cheap eBay deals of e-paper-based pricing tags, and was wondering if they could be hacked to perform some other tasks. After splitting the case open, the controller chip was discovered to be a SEM9110, with some NFC hardware support but little else. [aduecho] was hoping to build some IoT-connected air quality indicator (AQI) units but the lack of a datasheet for SEM9110 plus no sensors in place meant the only real course of action was to junk the PCB and just keep the E-paper display and the batteries. These units appeared to be ‘new old’ stock, so there was a good chance that both would be fresh and ripe for picking.

      • HackadayThe First Microcomputer: The Q1

        Quiz time, what was the first commercially available microcomputer? The Altair 8800? Something obscure like the SCELBI? The Mark-8 kit? According to [The Byte Attic], it was actually the Q1, based on the Intel 8008 processor. The first Q1 microcomputer was delivered in December of 1972, making it the first, as far as he can tell. Later revisions used the Z80 processor, which is the model pictured above that [The Byte Attic] has in his possession. It’s a beautiful little machine, with a striking orange plasma display.

      • HackadayA Look Inside An Old-School Synchroscope

        There’s nothing quite like old-school electrical gear, especially the stuff associated with power distribution. There’s something about the chunky, heavy construction, the thick bakelite cases, and the dials you can read from across the room. Double points for something that started life behind the Iron Curtain, as this delightful synchroscope appears to have.

    • Health/Nutrition/Agriculture

    • Pseudo-Open Source

    • Security

      • KritaOnly Download Krita From Trusted Places

        Third party download sites are outside our control, and can be compromised!

      • Never-before-seen malware has infected hundreds of Linux and Windows devices [Ed: So the problem is bad passwords and stolen keys, not "Linux"]

        SSH infections using password brute-forcing and stolen keys also allow Chaos to spread from machine to machine inside an infected network.

      • IT WireOptus CEO’s spin not exactly the best way to handle breach

        One wonders what exactly drove Optus chief executive Kelly Bayer Rosmarin to front a media session last Friday, in a bid to spin her way through a damaging development at the telco.

        Had she been proficient in the technical aspects of data breaches and was willing to level with people, then it may have done a world of good. Or she could have brought along a technically competent person and let him/her explain things correctly.

        But Bayer Rosmarin tried to paint the breach as a sophisticated attack, something that even a politician like Home Affairs Minister Clare O’Neil was able to shoot it down.

      • The Hill[Crackers] breach tech magazine, send racist push notifications to iPhones

        [Attackers] breached the content management system of Fast Company, a monthly business and tech magazine, on Tuesday evening.

        The [crackers] reportedly sent two obscene and racist push notifications to followers of the magazine in Apple News.

      • Integrity/Availability/Authenticity

        • GeorgeUnique Identifier

          As more and more things are moving online, two problems became apparent to our collective consciousness:

          1. How do you know someone is really a person?

          2. How do you know someone is who they say they are?

          Initially, the “person” thing wasn’t a big issue, the [Internet] was used for low-stake amicable activities, and impersonation, bots, and alternative accounts weren’t a big deal. As for the second issue, well, we used usernames and passwords.

      • Privacy/Surveillance

        • AccessNowDigital identity: What the World Bank won’t talk about – Access Now

          On October 10, the World Bank and the International Monetary Fund will hold an annual summit to discuss the challenges and opportunities that will determine the course of their work on inclusivity and sustainable development all over the world. Unfortunately, this is the second year in a row that they have kept digital identity programs off the agenda, even as civil society organizations continue to press for answers about their responsibility in developing systems that further human rights abuse, exclusion, marginalization, and surveillance.

          The push to implement digital identification systems remains a priority for the World Bank and other international organizations, as it is viewed as integral for reaching UN Sustainable Development Goal (SDG) 16.9, “legal identity for all.” However, attempting to reach that goal this way is both short-sighted and treacherous, as many different digital identity programs the World Bank has funded or promoted demonstrate.

        • AccessNowU.S. Congressional briefing: what overturning Roe v. Wade means for digital rights – Access Now

          Today, September 28, Access Now hosted the U.S. Congressional Briefing, Your body, your data: data-veillance and reproductive rights in a post-Roe world to unpack what the Supreme Court ruling means for human rights and digital safety, and what’s next for collective action.

          “When the U.S. Supreme Court reversed Roe v. Wade, it didn’t only obliterate reliable access to abortion services for women and people who birth — and demolish any sense of agency we had over our own bodies — it threw the right to privacy of all people across the country into jeopardy,” said Willmary Escoto, U.S. Policy Analyst at Access Now. “The threat to privacy is even more dangerous for Black and Latina women, the disabled, immigrants, LGBTQ+, low-income people, and other communities that have been historically discriminated against and exploited.”

        • India TimesDoT mandates IMEI registry before 1st sale or import of mobiles

          The Department of Telecommunications (DoT) has mandated smartphone manufacturers and importers to register the IMEI number of smartphones before the first sale or before the import of the device on a new portal in operation from 2020.

          In a gazette notification, the DoT on Monday, amended the prevention of tampering of the Mobile Device Equipment Identification Number, Rules, 2017 to enforce smartphone manufacturers to register the IMEI number of every mobile manufactured in India with the Indian Counterfeited Device Restriction Portal (ICDR) maintained by the DoT.

        • Site36Plans for more data exchange: EU agreement with Interpol delayed

          So far, only EU states and Europol are allowed to access databases at Interpol, but soon Frontex and the new public prosecutor’s office will be allowed to do so as well. The EU Parliament has drawn red lines for the negotiations.

        • Stacey on IoTAmazon doesn’t need a phone. Alexa will be everywhere.

          Amazon launched a profusion of sensor-filled speakers, cameras, and televisions as well as services from its Eero Wi-Fi business and Ring security business on Wednesday as it doubled down on its idea of ambient intelligence. Basically, Amazon is making sure everything it releases can act as a sensor providing as much information about the environment to Alexa, its digital assistant.

        • YLEProsecutors charge ex-CEO of [cracked] therapy firm Vastaamo [iophk: Windows TCO]

          The Helsinki-based company’s database was breached on at least two separate occasions — in November 2018 and March 2019 — leading to extortionists demanding payment of nearly half a million euros for the data’s return in October 2020.

          When the company refused to pay, the sensitive patient information was leaked onto the dark web.

        • [Old] The HillDHS planning to collect social media info on all immigrants

          Homeland Security’s inspector general published a report earlier this year concluding that DHS pilot programs for using social media to screen immigration applicants “lack criteria for measuring performance to ensure they meet their objectives.”

        • EFFAutomated License Plate Readers Threaten Abortion Access. Here’s How Policymakers Can Mitigate the Risk

          Police can also attach ALPRs to their patrol cars, then capture all the cars they pass. In some cities police are taught to do “gridding,” where they drive up and down every block of a neighborhood to capture data on what cars are parked where. There is also a private company called Digital Recognition Network that has its own contractors driving around, collecting plate data, and they sell that data to law enforcement.

        • EFFEFF Urges FTC to Address Security and Privacy Problems in Daycare and Early Education Apps

          “Parents find themselves in a bind: either enroll children at a daycare and be forced to share sensitive information with these apps, or don’t enroll them at all,” EFF’s letter to Khan said. “Paths for parents to opt a child out of data sharing are, with rare exception, completely absent.”

    • Defence/Aggression

    • Transparency/Investigative Reporting

    • Environment

      • The AtlanticThe Senate Just Quietly Passed a Major Climate Treaty

        What if the Senate passed an international climate treaty—a pact so powerful that it could avert nearly 1 degree Fahrenheit of global warming—and nobody noticed?

        That’s more or less what happened a week ago. Last Wednesday, the Senate ratified the Kigali Amendment, a treaty that will phase out the world’s use of hydrofluorocarbons, or HFCs, a climate pollutant used as an industrial refrigerant and in sprayable consumer products. Because HFCs are hundreds of thousands of times more potent at capturing heat in the atmosphere than carbon dioxide, the Kigali Amendment, which has already been adopted by 137 countries, is the most significant environmental treaty that the United States has joined in at least a decade.

      • NBC‘I’ve always wanted to be a tree’: Human composting starts to catch on

        California Gov. Gavin Newsom this month signed a bill that requires state regulators to create a program allowing “natural organic reduction” by 2027. It will become the fifth state to pass legislation permitting what providers often call “human composting” or “terramation.”

        The process, which is essentially the controlled decomposition of a human body by a funeral service provider, takes about two months. Processing a person’s remains creates 1-2 cubic yards of compost — enough to nearly fill the bed of a pickup truck, which can then be used in gardens or conservation projects.

      • TruthOutManchin’s Big Oil Deal Scrapped From Budget Bill in Victory for Climate Movement
      • Common DreamsOpinion | Defeat of Manchin’s Dirty Deal Is a Win for Environmental Justice and Health Equity

        Facing fierce resistance from frontline communities and concerned citizens across the country, Senator Joe Manchin (D-W.Va.) withdrew his so called “permitting reform” provision from the must-pass government funding bill Tuesday.

      • Common Dreams‘We’ll Beat You Again,’ Say Climate Advocates as Biden Eyes New Path for Manchin’s Dirty Deal

        In a statement after Manchin (D-W.Va.) asked Senate Majority Leader Chuck Schumer (D-N.Y.) to remove the permitting overhaul from the government funding bill, White House Press Secretary Karine Jean-Pierre made clear that President Joe Biden doesn’t intend to let the measure die despite fresh warnings over its potentially disastrous emissions impacts.

      • ScheerpostBen & Jerry’s Pilot Project Aims to Halve Ice Cream Emissions by 2024

        Christopher Bonasia reports that the iconic ice cream maker Ben & Jerry’s will work with 15 dairy farms to halve greenhouse gas emissions by 2024.

      • Common DreamsFresh Demands for ‘Climate Emergency Declaration’ as Monster Hurricane Ian Comes Ashore

        The hurricane, which killed at least two people in Cuba and left the entire country without power before causing major flooding in the Florida Keys Tuesday night, approached the state’s coast as a Category 4 storm and was expected to strengthen to a Category 5 before making landfall.

      • Democracy NowTampa Update on Hurricane Ian: Millions Prepare for Cat. 5 Storm Fueled by the Climate Crisis

        As Hurricane Ian is set to strengthen into a Category 4 or 5 storm and make landfall Wednesday afternoon south of Tampa Bay, the storm already knocked out power in Cuba and killed at least two people Tuesday. Communities across Central Florida are preparing for a “very strong storm,” says Seán Kinane, news and public affairs director at Tampa community radio station WMNF, and many acknowledge the strength of the hurricane is “definitely impacted by climate disruption.”

      • DeSmogHydrogen Lobby Targeting Labour Conference with ‘False Solutions’, Say Campaigners

        Labour has made climate and energy its central policy agenda, and its conference in Liverpool this week has touted the slogan “A Fairer, Greener Future”. However, the hydrogen industry has had an outsized presence at the event compared to cleaner alternatives.

      • Hackaday2022 Hackaday Prize: Congratulations To The Winners Of The Climate-Resilient Communities Challenge

        Holy humanitarian hacking, Batman! We asked you to come up with your best climate-forward ideas, and you knocked it out of the ionosphere! Once again, the judges had a hard time narrowing down the field to just ten winners, but they ultimately pulled it off — and here are the prize-winning projects without much further ado.

      • Energy

        • Cambridge Bitcoin Electricity Consumption Index

          Note: monthly consumption figures are the sum of daily consumption figures calculated by assuming constant power usage over 24 hours at the daily best-guess estimate of Bitcoin’s network power demand. The cumulative consumption is the sum of monthly totals since the start of the model on July 18th 2010. A separate analysis that ignores profitability considerations suggests that the cumulative consumption for the period between January 2009 and July 2010 has only amounted to 4.74 megawatt-hours (MWh), or 0.00000474 TWh – a mere rounding error. It is therefore safe to assume that the cumulative consumption figure listed above provides a robust estimate of Bitcoin’s total consumption since its inception in 2009.

        • VarietyInside the Fight Over the ‘Pulp Fiction’ NFT

          January was a heady time for the Secret Network. The two-year-old platform had launched a cryptocurrency – SCRT – and was preparing to make a big splash in Hollywood. Teaming up with Quentin Tarantino, the network was preparing to auction an NFT based on the screenplay for “Pulp Fiction.”

        • Matt RickardIs Ethereum a Dumb Pipe?

          Commoditized protocols (especially decentralized ones) often create value but have a different entity capture most of it. See examples of email (Gmail) or git (GitHub). Who captures the value? Scaling layers? On-ramps/off-ramps? Regulated exchanges?

        • CS MonitorWhat is ‘dead pool’ and what does it mean for Colorado River?

          The Colorado River supports more than two dozen tribes, seven U.S. states, and Mexico, but Americans living outside the Western region benefit, too. The river preserves national parks and produces winter vegetables, shipped countrywide.

          Yet a long-term rise in demand – and increasingly arid conditions linked to climate change – have resulted in a dire river reality. Lake Mead and Lake Powell, major reservoirs, could reach “dead pool,” with levels of water so low that the river can’t flow below the dams.

        • Cory DoctorowOil is Bankrupt (If We Want It) : Alberta’s Oil Companies Are the Walking Dead.

          Albert’s oil-patch is a zombie, the walking dead. The companies that extract oil there owe more money than they can pay, more than they can borrow, more than they can earn. If they were made to pay their lawful debts, they would all go bankrupt, and, in so doing, would end the extraction of one of the dirtiest, worst sources of oil…

        • TruthOutBill McKibben: The End of Manchin’s Pipeline Deal Is a Grassroots Victory
        • Democracy NowBill McKibben: Victory Over Big Oil as Sen. Manchin Forced to Drop “Hideous Deal” on Energy

          Democratic Senator Joe Manchin abandoned his own energy permitting proposal Tuesday that would have fast-tracked the federal review of energy projects, including the contested Mountain Valley Pipeline. Following intense pressure from a range of climate justice and Appalachian organizers, Manchin asked Senate Majority Leader Chuck Schumer to drop the permitting reforms from a funding bill after it became clear he did not have the votes to pass the proposal. 350.org founder Bill McKibben says Manchin may try to partner with the GOP to revive the proposal later this year, but still says the news represents an “impressive win by grassroots environmentalism.”

        • Common DreamsApparent Sabotage of Nord Stream Pipelines Risks ‘Unprecedented’ Climate Nightmare

          One early estimate from Jean-Francois Gauthier, vice president of measurements at the satellite firm GHGSat, indicates that the Russian gas pipelines were unleashing more than 500 metric tons of methane per hour when they were first damaged.

        • Common Dreams11 Million Without Electricity in Cuba as Hurricane Ian Knocks Out Power Grid

          Around a million people lost power Tuesday as Hurricane Ian lashed the island with heavy rain and wind, tearing off people’s roofs, devastating farms, and reportedly killing at least two people. By late Tuesday, Cuba’s entire power grid had collapsed, leaving roughly 11 million without electricity.

        • ScheerpostExplosions Cause Major Damage to Both Nord Stream Pipelines

          A Polish member of European Parliament suggested the US was responsible.

        • IT WireiTWire – On World EV Day, Victoria is proudly taxing owners of EVs

          On World Electric Vehicle Day, Victoria can celebrate the fact that it charges people who use EVs a tax. The same Victoria that calls itself the education state. It also touts itself as progressive.

          When most of the world is trying to push the use of electric vehicles, Victoria has its foot firmly on the brake. No, make that both feet on the brake.

      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

      • MEMRIPalestinian Islamic Scholar Issam Amira: Nurture In Your Children The Hatred Of Britain Like Mothers Breastfeed Babies; Britain Is Responsible For All The World’s Crises

        Palestinian Islamic scholar Issam Amira said in a speech posted to the Al-Aqsa Call YouTube channel on September 18, 2022 that Britain is the “mother of all crimes and disasters.” He blamed Britain for the Palestinian nakba, for the “humiliation” the Palestinians are suffering, and for the world’s crises throughout history. He criticized the leaders of Muslim countries for offering their condolences over the recent death of Queen Elizabeth II, and recalled a visit to the British Museum in which he realized that everything in the museum had been stolen from nations. He added: “May Allah curse Britain.” It is noteworthy that Amira recently gave a recorded speech at the Hizb-ut Tahrir conference in Britain (see MEMRI TV Clip No. 9749).

      • Sahara ReportersEXCLUSIVE: Amid Alleged Islamisation Agenda, Nigerian Police Academy Commandant, Ahmad Accused Of Replacing Christian Personnel With Muslims

        Ahmed was alleged to have illegally transferred some Christian personnel out of the institution and replaced them with Muslims.

      • Freedom of speech in universities: is there a problem and does the Free Speech Bill help?

        Does the Bill present an opportunity for the Higher Education sector to take reasonable steps to secure freedom of speech on university campuses, is it entirely unnecessary, or will it even make free speech more difficult to maintain?

      • CoryDoctorowFederalist Society v Corporate Personhood

        When tech monopolies used their market power to sew up all the public forums for discourse and then kicked off Donald Trump, Milo Yiannopoulos and Alex Jones, key figures on the right became highly selective trustbusters, dedicated to curbing the power of tech monopolies.

        The ideological cover for this is thin to nonexistent: diehard Federalist Society types like Ted Cruz don’t even bother to try articulating a theory of “good” monopolies and “bad” monopolies. A “good” monopoly is one that helps Ted Cruz and his pals. A “bad” monopoly is one that gets in their way.

        The latest ideological flipflop from the right comes in its relationship to corporate personhood. For a generation, the right has insisted that corporations are people, and, more importantly, corporations are the kinds of people who have free expression rights under the First Amendment of the US Constitution.

      • Sabine HossenfelderI’ve said it all before but here we go again

        But trying to get rid of me isn’t going to solve their problem. For one thing, it’s not working. More importantly, everyone can see that nothing useful is coming out of particle physics, it’s just a sink of money. Lots of money. And soon enough governments are going to realize that particle physics is a good place to save money that they need for more urgent things. It would be in particle physicists’ own interest to listen to what I have to say.

        And I have said this all many times before but I hate long twitter threads, so let me just summarize it in one blogpost: [...]

      • TruthOutPoll: Most People Want Certification Process Updated to Prevent Another Jan. 6
      • TechdirtIndian Legislators Want The Government To Be Able To Intercept Encrypted Messages

        India is still a democracy. Or so it pretends. But it’s becoming indistinguishable from autocratic regimes, like those found in some of its nearby neighbors, China, Turkey, and Pakistan.

      • TruthOutStaffers for Andy Levin Unanimously Vote to Form First-Ever Congressional Union
      • Pro PublicaHow to Vote in Person or by Mail

        First things first: Have you confirmed your voter registration yet? You’ll need to be registered in order to vote by mail or in person.

      • Telex (Hungary)They come to Hungary for work, only to find out that life is no bed of roses here either
      • Telex (Hungary)Russian Patriarch Kirill awards Hungarian Deputy Prime Minister Semjén
      • Misinformation/Disinformation/Propaganda

        • NPRFacebook takes down Russian network impersonating European news outlets

          It involved more than 60 websites pretending to be legitimate, high-profile European news organizations, including the U.K.’s The Guardian and Daily Mail, Germany’s Der Spiegel and Bild, and Italian news agency ANSA.

          The spoofed websites were built with care, Nimmo said, under the apparent theory that imitating a big brand would draw a big audience. They copied the layouts of outlets’ real sites and imitated their web addresses. In some cases they used bylines and photos of real journalists and included working links to other news articles.

        • CS MonitorRussian online propaganda? Meta says yes, shuts down network.

          The operation involved more than 60 websites created to mimic legitimate news sites including The Guardian newspaper in the United Kingdom and Germany’s Der Spiegel. Instead of the actual news reported by those outlets, however, the fake sites contained links to Russian propaganda and disinformation about Ukraine. More than 1,600 fake Facebook accounts were used to spread the propaganda to audiences in Germany, Italy, France, the U.K., and Ukraine.

          The findings highlighted both the promise of social media companies to police their sites and the peril that disinformation continues to pose.

        • Craig MurrayTwitter’s Shoddy Fakery

          Watch these three clips very carefully, focusing on the count on the retweet symbol. Do you see what is wrong?

        • Robert ReichThis One Thing Made Alex Jones Stop Lying
    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

      • Common DreamsOpinion | Policies That Center Community Voices Are Key to Solving the Local-News Crisis

        Over the past 15 years, the United States has lost more than half the newspaper reporters covering state and local beats. Runaway media consolidation, mismanagement, new technologies and changing consumer habits have led to widespread job losses and newsroom closings. The decimation of local news has disproportionately harmed low-income communities, people of color, rural communities, and immigrants. And as news deserts expand, disinformation proliferating online has filled the void.

    • Civil Rights/Policing

      • Ali Reza HayatiNobody survives with oppression

        It has been more than ten days since my people in Iran have started protesting against injustices they are suffering from, triggered by the death of Mahsa Amini, a young girl reportedly killed by morality police.

        The government has shut down the [Internet] again and killed almost all messengers and communication services people used and access to any server located outside the country is very much restricted. This has been a common way for the regime to oppress protesters.

      • VOA NewsIran Riot Police Confronting Protesters in Tehran Over Death of Woman

        The protests have spread to at least 80 cities and towns throughout Iran. Security police have used tear gas, clubs and, in some cases, live ammunition to quell the protests calling for the end of the Islamic establishment’s more than four decades in power.

      • The NationIran’s Brutal Crackdown on “Women, Life, Freedom”

        Iran’s “morality police” murdered Jîna Emînî, a 22-year-old Kurdish woman, for wearing an “improper hijab.” They killed her because she was Kurdish and because she was a woman. The hashtag #MahsaAmini is trending, but we should address this injustice appropriately: by the name Jîna’s family gave her. Mahsa is the name imposed on her by the Islamic Republic, a government that oppresses minority groups such as the Kurds and bans the use of Kurdish names in many cases. Jîna’s identity as a Kurdish woman should not be erased. “Jin Jîyan Azadî,” or “Women, Life, Freedom” in Kurdish, has become the slogan of the movement in Iran, but Western media has failed to honor its full significance. It’s a demand for women’s liberation emerging from the Kurdish Freedom Movement.

      • ScheerpostIn Iran, Women Are at the Vanguard of Transformative Change Once Again

        Vrinda Narain and Fatemeh Sadeghi unravel the roots of women’s uprisings in Iran in the wake of Mahsa Amini’s death.

      • The Economist“I’m the same as Mahsa. And I want my freedom”: anger at Iran’s regime spills onto the streets

        What happened to Mahsa has happened to many girls. Often they come for girls who are alone in the street and put them in their vans. Then no one knows where they are. That has happened to so many friends of mine. It doesn’t matter to the police if your hijab is problematic or not. They just get you and then ask you to pay them money. And you have to pay them. If they catch me in the market, they can ask me for 3m rial (about $70). If they question me and I don’t answer, I’ll have to pay more. Once they stopped me in Isfahan and asked me for my phone number. They warned me that if they caught me three times, I’d end up in prison. And I wasn’t even wearing a “bad” hijab. I’d just come from university where we have to wear a proper black hijab.

      • Frontpage MagazineThe Islamic Republic: Shaken to its Core

        The government has ended Internet service in parts in Tehran, and ended access to WhatsApp and Telegram. Despite this, the protesters still manage somehow to meet up and come out in force, and in ever larger numbers, across the country.

      • MedforthFrance: Islamists spread photos of Muslim women not wearing headscarves in schools on social networks to put them under social pressure

        Screenshots of these accounts and quotes from the social networks support this finding. One user wrote: “School is not a legitimate excuse for taking off the veil and delaying prayer.” On August 23, 2022, an Islamist influencer with 47,500 followers posted a video on TikTok urging young women of the Muslim faith to ” (…) put a sash over the abaya [long dress worn over the regular dress, note]”.[…]Le Point

      • BBCMyanmar OnlyFans model sentenced to six years jail

        In such areas – and under state of emergency laws renewed by the Myanmar junta government earlier this year – those charged with crimes are tried in a military court where they’re denied rights like access to a lawyer.

      • Common DreamsDemanding Broad Reforms, Thousands of Inmate Workers on Strike at Alabama Prisons

        The work stoppage began Monday after about three months of planning and organizing by inmates, with help from groups including Alabama Prison Advocacy and Incarcerated Families United.

      • ScheerpostThe U.S. Sees an Unprecedented Investment in Policing Alternatives

        Since 2021, around $500 million in new federal, state, and philanthropic funding has been directed toward initiatives that fall under the umbrella of so-called “community violence intervention,” or CVI

      • ShadowproofIn Washington State, Incarcerated Organizers Build Community With Youth To Fight For Releases

        At Washington’s Stafford Creek Corrections Center, a group of incarcerated organizers have built community with local youths to fight for sentencing reforms, grappling with what it means to organize through an abolitionist lens from inside.

      • Democracy Now“Lady Justice”: Dahlia Lithwick on Women Who Used the Law to Fight Racism, Sexism Under Trump & Won

        We speak with Dahlia Lithwick, who covers the courts and the law for Slate, about women who fought the racism, sexism and xenophobia of Trump’s presidency. She profiles many of them in her new book, “Lady Justice: Women, the Law, and the Battle to Save America.” “Law is slow and takes a long time, but at its best, it really can make us all freer and safer and restore dignity to those that have been harmed,” says Lithwick.

    • Internet Policy/Net Neutrality

      • The NationWho Owns the Internet?

        What is the Internet, and who owns it? These are not simple questions; their boundaries are muddy. Most people would agree that the Internet encompasses physical infrastructure and physical networks—the satellites, radio towers, and fiber-optic cables, aboveground and underwater, that connect our devices—but does it not also refer to the content they carry? And how can one meaningfully distinguish between that content and the servers that host it; the software that translates it into legible form; the eyes and ears that consume it; the hands that build and maintain it? US Senator Ted Stevens was once mocked for describing the Internet as “a series of tubes,” but his metaphor was about as accurate as one could hope for in so few words. The only trouble is that it’s hard to say where the tubes begin and end.

      • India TimesFive things to know about the UN telecoms agency

        Here is a look at the oldest agency in the United Nations fold, which behind the scenes sets the global standards underlying mobile phones, television and the [Internet].

      • TechdirtUS Treasury Department Moves To Protect Internet Access For Iranian Citizens

        Information wants to be free and it is never freer than when it traverses the internet. That’s why so many autocratic leaders strive to shut down this essential connection. It allows governments to control narrative and control citizens. Limiting their communication options means it will be the government’s view that prevails.

    • Monopolies

      • Computer WorldMozilla: Apple, Google, and Microsoft lock you into their browsers

        Mozilla researchers found each platform maker “wants to keep people within its walled garden” by steering mobile and desktop users to Apple Safari, Google Chrome, or Microsoft Edge. “All five major platforms today (Google, Apple, Meta, Amazon, Microsoft) bundle their respective browsers with their operating systems and set them as the operating system default in the prime home screen or dock position,” Mozilla wrote in a 66-page report.

      • Five Walled Gardens: Why Browsers are Essential to the Internet and How Operating Systems Are Holding Them Back

        Mozilla has published new research into how consumers across a number of different countries and continents install and use browsers. It shows the importance of web browsers to consumers, with the vast majority of people surveyed using them each day. It also shows that although many people report knowing how to install a browser in theory, lots of people never actually install an alternative browser in practice. A similar trend can be seen between the number of people reporting to know how to change their default browser versus the number who do this in practice. Crucially, people raise concerns about privacy and security, but they similarly fail to act on these concerns.

      • Five Walled Gardens: Why Browsers are Essential to the Internet and How Operating Systems are Holding Them Back [PDF]

        This report has two purposes: first, to present Mozilla’s research (both recent surveys and years of knowledge) into consumer interaction with browsers. Secondly, to highlight the foreclosure of browser engines and independent browsers by operating systems. Part 1 of the paper is about operating systems, browsers, browser engines and how consumers behave. Part 2 highlights the online choice architecture practices by operating system providers which we believe have shaped consumer browser usage away from independent browsers.

        The research we are releasing with this report paints a complex picture with many paradoxes: people say they know how to change their browser, yet many never do. Many people believe they can choose their browser, yet they have a bias towards software which is pre-installed, set to default and difficult to change. In fact, their browser choice on desktop computers has been thwarted for many years, and it has never truly existed on mobile devices. Our research corroborates what many regulators have already noticed: software can be designed to influence or even manipulate consumer outcomes. And operating systems are designed to maximize usage of their affiliated browsers.

      • TechdirtRep. Ken Buck’s Irrational Spite Of Tech Companies May Have Screwed Up Another Antitrust Bill

        It’s kinda weird how the GOP’s pure hatred and spite towards tech companies, and their desire to exact maximum punishment rather than make good policy, keeps blowing up bills that might otherwise pass. We’ve talked plenty about how Republicans have effectively torpedoed the big tech antitrust bill by insisting that it must include provisions that will be used to sue tech companies over antitrust for… suppressing disinformation. And then there was Ted Cruz (at least temporarily) blowing up a (terrible) journalism antitrust bill by bringing content moderation into it.

      • TechdirtGoogle Tries To Fend Off Telecom Backed ‘Big Tech Tax’ In EU

        We just got done noting how the European Union, prompted by regional telecom monopolies, has been seriously pushing for a new tax on big tech to fund broadband. For decades, telecom giants have lustfully eyed big tech ad revenues. They’ve then convinced politicians that the best way to fix the “digital divide” (lack of broadband) is by taxing tech giants, which telecom giants (falsely) claim get a “free ride.”

      • Copyrights

        • The AtlanticHollywood Learned All the Wrong Lessons From Avatar

          That is a myopic reaction considering the fact that the biggest hit of all time was a wholly original film. Sure, Avatar’s story of a human interloper ingratiating himself with an alien tribe is reminiscent of earthbound epics like Dances With Wolves or The Last of the Mohicans, but Cameron’s movie isn’t directly adapted from any prior work. And yet Hollywood has mined every avenue of intellectual property imaginable over the past decade-plus, surely thinking that the better-known the title, the less risk there is sinking hundreds of millions into making and marketing it. I’ve always been amused at the ironic notion that Avatar had no cultural impact because nobody can name its main character; maybe that’s because the story hasn’t been crammed down viewers’ throats year after year since its release.

        • Torrent FreakTeen’s Destiny 2 Cheat Strategy Gifts Bungie Unlimited Lawsuit Ammo

          A teenager who allegedly threatened staff at Bungie and cheated in Destiny 2 is facing fierce opposition as he attempts to dismiss a lawsuit filed by the developer. Bungie says the defendant doesn’t understand the scope of the DMCA and by declaring Bungie’s software license void due to his age, even more copyright claims are on the way.

        • Torrent FreakLiverpool and Manchester United Team Up to Beat Counterfeiters

          Liverpool and Manchester United are arch rivals on the field but in U.S. federal court they have teamed up to fight a common enemy. Together with Tottenham Hotspur, the English football clubs are taking a stand against counterfeiters selling infringing products through Alibaba, Amazon, eBay, Wish, and other stores, seeking millions in damages.

        • Creative CommonsUNESCO MONDIACULT2022: A Starting Point for Open Culture

          It was in 1982 that the Mexico City Declaration on Cultural Policies defined a path for culture to become a fundamental pillar of development. 40 years on, culture now underpins all 17 of the United Nations Sustainable Development Goals (SDGs), and calls are being made to make culture a sustainable development goal in itself. We agree with UNESCO that “culture is the bridge between peoples and countries… and the key to unlocking mutual understanding and reinforcing global action based human rights and respect for diversity.”

  • Gemini* and Gopher

    • Politics

      • My Chrissy Teigen Moment

        I have no idea who Chrissy Teigen is and I’m not interested to know. As Saayaa put it, it’s the whole point of calling this kind of moment : realizing you have missed some news and that you are happy about it!


        I’m a knowledge freak. I want to know it all about everything. All the time. As soon as I learn about a subject that I didn’t know previously, I will spend at least one hour exploring it, reading wikipedia pages about it just to get a big picture of said subject, trying to find a reference book and ordering it.

      • The Party of Fiscal Responsibility

        The GOP a.k.a. Republicans are lying about being “small government” and “fiscally responsible”.

        “Fiscal” means related to managing a country’s financial resources.

        The GOP is the party of enriching the ultra-rich at the expense of the working poor and even the middle class (and while, contrary to the “working class MAGA” popular perception, GOP-voting households average higher income than supposedly “elite” Democrat voting households, the difference is only around 15% meaning that these families are getting just as exploited by the lobbyists and PACs).

    • Technical

      • A Mod For OpenTTD

        Thankfully this can be amended by writing a mod of a type called NewGRF (New Graphic Resource File). There are several tools available for doing this. The first I tried was TrueGRF, which is a web based tool with a lovely and usable interface. It really was a joy to work with.

      • Internet/Gemini

        • Re: Re: Sneakernets

          I read ew0k’s post about Sneakernets and it made me think about the wonderful time I happened to grow up in.

          In middle school I was connecting to a local BBS (Cherryland BBS in Sturgeon Bay, Wi). I had to sneak over to my grandfather’s construction company at night to get access to his better phone system, he had free long distance while we did not. Dialed in, read some posts, sent some messages and started the download of a game or app and let the system run through the night as it was sloooooow.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts