IBM’s Lennart Poettering on Breaking Software for Pseudo Novelty

Posted in GNU/Linux, IBM, Kernel, Red Hat, Videos at 5:44 am by Dr. Roy Schestowitz

Video download link | md5sum 39c71c961410d5ff77c6d2e547b01df4
Lennart Poettering versus backward compatibility or API stability
Creative Commons Attribution-No Derivative Works 4.0

Summary: Recently-uploaded ELCE 2011 clip shows a panel with Linus Torvalds, Alan Cox, Thomas Gleixner, Paul McKenney, and Lennart Poettering (relevant to novelty or perceived novelty [1, 2] that mostly degrades the experience of longtime users, e.g. Wayland and systemd)

Notice how, some time along the way, Torvalds violates the Linux Foundation‘s Code of Conduct by using a "bad" word (in the above clip I actually find Lennart Poettering to be more provocative, rude, even trollish; words are just “style” and one can ‘politely’ abuse people). Torvalds would not risk this again (he hasn’t for years); bad for the health, so to speak…

Linus Torvalds health

Yes, he used to look a lot healthier before being sent to "manners" therapy for merely governing his own project (as he had very successfully done for nearly 30 years).

Notice how Torvalds cautions about certain features becoming a security baggage/liability — to the point of necessitating painful removal. In recent years a lot of what the corporate media calls “Linux” holes are in fact critical bugs in systemd. In the video, which is timeless, one can see who’s being rude.

Links 15/05/2022: Linux 5.18 RC7 and Calls for More Mass Surveillance

Posted in News Roundup at 2:32 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Kubernetes 1.24: Volume Populators Graduate to Beta | Kubernetes

        The volume populators feature is now two releases old and entering beta! The AnyVolumeDataSouce feature gate defaults to enabled in Kubernetes v1.24, which means that users can specify any custom resource as the data source of a PVC.

        An earlier blog article detailed how the volume populators feature works. In short, a cluster administrator can install a CRD and associated populator controller in the cluster, and any user who can create instances of the CR can create pre-populated volumes by taking advantage of the populator.

        Multiple populators can be installed side by side for different purposes. The SIG storage community is already seeing some implementations in public, and more prototypes should appear soon.

    • Audiocasts/Shows

      • Jupiter BroadcastingNVIDIA’s New View | LINUX Unplugged 458

        NVIDIA is open-sourcing their GPU drivers, but there are a few things you need to know. Plus, we get some exclusive insights into Tailscale from one of its co-founders.

        Special Guests: Avery Pennarun and Christian F.K. Schaller.

      • GNU World Order 460

        **kapidox** , **kapman** , **kapptemplate** , **karchive** , and **kate** from the **kde** software series of Slackware.

      • VideoSysteroid: Best Way To Set Linux Kernel Parameters – Invidious

        It’s not often you need to mess with kernel parameters but when you do instead of using sysctl how about you try out systeroid instead

    • Kernel Space

      • Linux 5.18-rc7
        From	Linus Torvalds 
        Date	Sun, 15 May 2022 18:15:42 -0700
        Subject	Linux 5.18-rc7
        share 0
        So things continue to be fairly calm, and as such this is likely the
        last rc before 5.18 unless something bad happens next week.
        All the stats here look normal, with the bulk of it being random
        driver updates (network drivers, gpu, usb, etc).
        There's a few filesystem fixes, some core networking, and some code
        kernel stuff. And some selftest updates.
        Sortlog appended, nothing really stands out (the most exciting thing
        last week was literally that Andrew has started using git, which will
        make my life easier, but that doesn't affect the *code*)
        Please give it one last week of testing, so that we'll have a nice
        solid 5.18 release.
      • LWNKernel prepatch 5.18-rc7 [LWN.net]

        The 5.18-rc7 kernel prepatch has been released for testing. Linus says: “So things continue to be fairly calm, and as such this is likely the last rc before 5.18 unless something bad happens next week”.

    • Instructionals/Technical

      • Make Use Of5 Things to Do After Upgrading to Ubuntu 22.04 LTS
      • How to Dual Boot Ubuntu 22.04 LTS and Windows 11

        Hey guys, in this guide we will demonstrate how to configure a dual-boot setup of Ubuntu 22.04 LTS (Jammy Jellyfish) alongside Windows 11.

        For this to work, you need to have Windows 11 already installed on your PC.  You will then need to create a separate partition on your hard drive on which Ubuntu 22.04 will be installed. We will go over all this, so don’t worry.

      • UNIX CopUsing SSH Keys

        SSH supports authenticating users with keys. Although they require more setup ahead of time, they’re generally more secure than typing in passwords. They’re also more convenient in the long run. In this article, I am going to cover using key-based authentication in OpenSSH.

      • UNIX CopHow To Install Anaconda on Ubuntu 22.04

        Anaconda is a distribution of the Python and R programming languages for scientific computing (data science, machine learning applications, large-scale data processing, predictive analytics, etc.), that aims to simplify package management and deployment. The distribution includes data-science packages suitable for Windows, Linux, and macOS. It is developed and maintained by Anaconda, Inc.,

      • UNIX CopHow To Install Anaconda on Fedora 36

        Anaconda is a popular Python/R data science and machine learning platform, used for large-scale data processing, predictive analytics, and scientific computing.

        Anaconda distribution ships with 250 open-source data packages, and more than 7,500 additional packages can be installed from the Anaconda repositories. It also includes the conda command-line tool and a desktop graphical user interface called Anaconda Navigator.

      • UNIX CopHow to install Brave Web browser on CentOS 9 Stream

        Hello, friends. In this post, you will learn how to install Brave Web browser on CentOS 9 Stream. This is one of the best alternative web browsers you can use.

      • Install phpMyAdmin on Ubuntu 22.04 with Apache

        phpMyAdmin is a web-based application for interacting with MySQL database server. This tool provides you with a user interface to make MySQL operations so you don’t have to use the command line interface.

        In this guide you are going to learn how to install phpMyAdmin with Apache on Ubuntu 22.04 and secure it.

      • How to Install GNU Octave on Linux Mint 20

        Linux Mint is an ideal operating system for many kinds of users, such as enthusiasts and developers. That’s why it has become one of the most popular in all of Linux, thanks to its ease of use and robustness. In it, we can install all kinds of tools such as programming languages and thus be useful to professional developers. An example of this is that we can install GNU Octave on Linux Mint without too many problems. This is the aim of our post.

      • Linux HintFinding files in Ubuntu 22.04

        In computing, file placement is an important activity to perform as you may forget the file location. Ubuntu 22.04 supports various built-in commands to trace down your files. However, the graphical user interface may also be used to find files.

      • Linux HintHow to Convert SVG or PDF File to Base64?

        Apart from simple text, the image files or documents can also be converted to the Base64 format. These entities can then be stored securely anywhere you want. In this article, we would like to share the methods of converting the SVG files and PDF files to Base64 using the Python programming language in Ubuntu 20.04. First, we will introduce you briefly to these file formats, followed by the procedure of converting them to Base64.

      • Linux Made SimpleHow to install DataGrip 2022 on a Chromebook

        Today we are looking at how to install DataGrip 2022 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux HintGDISK Command-Line Options

        The GDISK command in Linux is used to partition the drives of your system. Moreover, it can also be used to list down the existing partitions and display relevant information about them. In this guide, we will be talking about the different command-line options that are available with the GDISK command on a Linux Mint 20.3 system.

      • Linux HintMapfile Bash Linux Command

        The bash shell Mapfile command is often known as a reading array. The primary purpose is to read standard input lines and store them in an indexed array variable. Mapfile must also read from substitution (<<) rather than a pipe. In addition, as compared to a read loop, bash Mapfile is a much faster and more convenient solution. It returns 1 if the execution of the command gets successful and 0 in case it is not successful. If we don’t specify an array name, the bash Mapfile variable will be targeting the array variable by default. Thus, we have decided to cover some examples using the mapfile instruction on the bash.

      • Linux HintResolve Issue: Bash Bad Substitution

        You may have received the Bad substitution syntax problem while developing Bash scripts. After browsing through forums, you may discover that you are not alone; other individuals are encountering the same mistake. It’s a typographical fault that happens when you run your Shell script, and it can happen for a variety of reasons. The wrong use of instruction substitution and erroneous characters appended to the program are two major reasons for this.

        Let’s see how we can make our shell script cause this error and how to resolve it. Get started with the new bash file created with Ubuntu’s “touch” query and open it within the “GNU Nano” editor.

      • Linux HintResolve Issue: Bash Unary Operator Expected

        Errors have a diverse number of types and reasons when it comes to bash programming. One of those errors is the “unary operator expected” error in bash programming. When evaluating expressions in conditional declarations, you may run into the “unary operator expected” issue. The reasons for this error “bash unary operator expected” might be diverse. We’ll start by talking about what’s creating the problem. Following that, we’ll go over a couple of options for resolving this problem. Let’s get started with today’s article by creating a new bash file in Ubuntu 20.04 system. For this, we need to utilize the “touch” instruction within the shell terminal and name the file “unary.sh”.

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • OMG UbuntuONLYOFFICE 7.1 is Out With New PDF Viewer, Slideshow Animations + More

        If you’re a fan of open source office software you’re in for a treat as a brand new version of ONLYOFFICE is now available to download.

        If you can look past the shouty name, ONLYOFFICE offers a highly-performant, well-featured, and fully-functional alternative to LibreOffice (which, though awesome, is a bit ‘old-school’ for some folks’ UI tastes). It’s also the next-best thing to that stalwart of the productivity software scene: Microsoft Office.

        ONLYOFFICE 7.1 inherits a swathe of improvements recently deposited in the cloud-side version of the suite, such as improved performance, better Microsoft Office compatibility, and a handy new new print preview mode in all of the suite’s respective components.

    • Programming/Development

      • The Unix Philosophy and Lagrange

        I wasn’t initially going to wade into this discussion (since it’s not really what I want this gemlog to be), but something is bugging me. Maybe I’m misreading Ainent’s initial post but they seem to be arguing that Lagrange violates the Unix philosophy *because* it supports 6 different protocols (including file://). I think this assumes a stronger interpretation of “one thing” than is desirable.

      • [Old] Wiley“The Canary in the Coal Mine…” A cautionary tale from the decline of SourceForge

        This article tells the cautionary tale of the downfall of Allura/SourceForge. We identified both internal and external causes, both social and technical in nature. We also found evidence of sociotechnical and architectural problems in project archives. Project and community health metrics could have been used to predict and understand the downfall by tracking its early manifestations. The team reported to be aware of the technical debt in the project, yet this was insufficient to maintain the health of the project. Community managers should also measure and manage the mutual impacts of technical and social debt. Furthermore, our analysis suggests that a combination of managerial and technical flaws doomed this project: architectural flaws, power-distance, and measurable management mishaps eventually led to the forge’s demise. Practitioners and maintainers of other software projects can benefit from this cautionary tale, for example, as indications of what not to do, in the scope of their community and architecture management infrastructure.

      • Dirk EddelbuettelDirk Eddelbuettel: RcppArmadillo on CRAN: Updates

        Armadillo is a powerful and expressive C++ template library for linear algebra and scientific computing. It aims towards a good balance between speed and ease of use, has syntax deliberately close to Matlab and is useful for algorithm development directly in C++, or quick conversion of research code into production environments. RcppArmadillo integrates this library with the R environment and language–and is widely used by (currently) 978 other packages on CRAN, downloaded over 24 million times (per the partial logs from the cloud mirrors of CRAN), and the CSDA paper (preprint / vignette) by Conrad and myself has been cited 469 times according to Google Scholar.

        This release brings a first new upstream fix in the new release series 11.*. In particular, treatment of ill-conditioned matrices is further strengthened. We once again tested this very rigorously via three different RC releases each of which got a full reverse-dependencies run (for which results are always logged here). A minor issue with old g++ compilers was found once 11.1.0 was tagged to this upstream release is now 11.1.1. Also fixed is an OpenMP setup issue where Justin Silverman noticed that we did not propagate the -fopenmp setting correctly.

      • Linux HintReversed Linked List (C++)

        When you reverse a linked list, the link path is reversed, and the head becomes the tail, and the tail becomes the head. By swapping the positions of the nodes, we can understand this quickly. In this swapping, we just change the positions of the nodes from left to right or vice-versa.

      • Linux HintGets Function in C

        Bound-checking is therefore not accomplished by the gets() method. It would not examine if the input data integrates inside the character array’s holding limit of bytes. A buffer overflow can occur when an entry exceeds the array limit. Through fgets, this restriction of the gets() method could be eliminated. The gets() method produces a string if it occurs. It reverts NULL if it starts to fail. It displays the EOF indicator on a string if an end-of-file situation generates the error. If another error triggers the failure, the error parameter is displayed on the string.

      • Linux HintGetting started with Node-Red on Raspberry Pi

        Node-Red is a visual programming tool that is used to connect APIs and hardware in a more prominent and exciting way. It has a web-based editor that will allow you to control and manage your Raspberry Pi device from a remote location. The graphical user interface of the editor is excellent and pretty simple which enables a beginner to handle it quite easily. The Node-Red can easily be installed on your Raspberry Pi device and once the installation is completed you will need to acquire a basic understanding of how to use this tool on a web editor to develop different projects.

        In this tutorial, we will provide you with an easy setup guide to get started with Node-Red on your Raspberry Pi and start developing your projects with ease.

      • Python

        • Linux HintStatistics Module in Python

          If you’re in the research world, statistics is of paramount importance! And Python offers many a module for statistics, but the one that we’ll be talking about today is called the statistics module. It’s a simple module, not really for advanced statistics but for those who just need a simple and quick computation. In this tutorial, we’ll be reviewing the statistics module in Python.

        • Linux HintEmulate the Do-While Loop in Python

          Most of the standard programming languages have three types of loops to iterate some statement multiple times. These are the while loop, for loop, and the do-while loop. The while and for loop are available in Python but Python has no do-while loop. The do-while loop can be implemented by using another loop. In the do-while loop, the condition is tested after inserting the loop. So, the statements of the do-loop execute at least once even if the condition may not be matched. The ways of emulating the do-while loop in Python have been shown in this tutorial.

      • Java

        • Linux HintException Handling in Java | Explained

          Java provides a concept of Exception Handling that makes it possible to handle the errors at run time, in this way, the normal follow of the program wouldn’t be affected. To handle the runtime exceptions Java provides multiple ways such as try-catch, finally, throw, throws. The normal flow can be preserved using any of these exception handling methods.

    • Standards/Consortia

      • RIPEImpact Analysis for UTF-8 in the RIPE Database

        The RIPE Database contains the names and addresses of organisations as well as administrative and technical contacts for resources and routing in the RIPE region. The Database currently supports the Latin-1 (ISO-8859-1) character set, which can represent most characters in western European languages. However it cannot fully support characters used in other languages and alphabets that are commonly used in the RIPE service region and beyond. Currently, any unsupported characters must be transliterated into Latin-1 (or even ASCII in some cases, which is a subset of Latin-1), potentially corrupting the meaning. Switching the RIPE Database from Latin-1 to UTF-8 allows names and addresses to be properly represented for querying and display.

  • Leftovers

    • HackadayLight Whiskers From Soap Bubbles Is Real Science

      You might think that anything to do with a soap bubble is for kids. But it turns out that observing light scattering through a soap bubble produces unexpected results that may lead to insights into concepts as complex as space-time curvature. That’s what [stoppi] says in his latest experiment — generating “light whiskers” using a laser and a soap bubble. You can watch the video, below, but fair warning: if videos with only music annoy you, you might want to mute your speakers before you watch. On the other hand, it almost seems like a laser light show set to music.

    • HackadayVicious Little Desktop Shredder Pulverizes Plastic Waste

      We’ve all likely seen video of the enormous industrial shredders that eat engine blocks for lunch and spit out a stream of fine metal chips. The raw power of these metal-munching monsters is truly fearsome, and they appear to be the inspiration for SHREDII, the miniature plastic shredder for at-home recycling of plastic waste.

    • HackadayThe Explosive Art Of Detonographs

      The visual arts are a broad field, encompassing everything from the chiselling of marble sculptures to the creation of delicate landscapes in charcoal on paper. However, [Evelyn Rosenberg] has experimented with some altogether more radical techniques over the years, creating her explosively-formed detonographs.

    • Myths Adults Believe

      As mentioned in the post, we don’t have five senses. We can sense gravity, so we know when we are upside down, so that’s six. We can sense heat, and cold (two different senses, which can be activated both at once), and we can sense when we’re hungry and thirsty.

      Once I read about this old myth (I never figured it out myself), I started writing out lists of senses. I think I got to about twelve, but I’ve heard others have got to 18 distinct senses. It’s one of many myths I’ve believed in life, and every time I find one, I start wondering about how many others I’ve accepted.

    • riding the wave of agency

      Some self reflection has brought up interesting questions of late about the nature of agency as it applies to self-improvement, motivation, and those types of things.

    • Hardware

      • HackadayComputer Thing Might Be Garbage

        [Tech Time Traveller] has a lot of voices in his head this week, and most of them are worried about his wife’s reaction to him buying other people’s garbage. We don’t blame him, though. He bought it from an estate sale and it was billed as a TV typewriter. The device looked completely homebrewed from somewhere around the late 1970s to the early 1980s. It contains a mess of components obviously hand-built in a combination of neat construction and messy wiring.

      • HackadayUpcycling A Flat Bed Scanner

        [Piffpaffpoltrie] had a 20-year-old Acer flatbed scanner that they just couldn’t justify keeping. But it does seem a shame to throw away a working piece of gear. Instead, the old scanner became a light table. We’ll admit, as projects go, it isn’t the most technically sophisticated thing we’ve ever seen, but we do think it is a worthy way to upcycle something that would otherwise be filling up a landfill.

      • HackadayE-Paper Clock Displays Things In A Battery-Friendly Manner

        Clock builds are a hacker staple, and many overflow with power-thirsty LEDs and network features. This build from [mattwach] takes quite the opposite approach, sipping away at its batteries thanks to an e-paper based design.

    • Health/Nutrition/Agriculture

    • Security

      • Privacy/Surveillance

        • TruthOutPrivacy Experts Warn Data From Period-Tracking Apps May Soon Be Used Against You
        • Facial recognition in European cities – What you should know about biometric mass surveillance

          As an effort to promote privacy and human rights in the EU, we at Greens/EFA got together with a team of international experts to understand where biometric mass surveillance, like facial recognition, is put to use this very moment in different European cities and states.

          Keep reading to find out what we learned, and why must take action to ban the use of these technologies now – before it is too late.

        • Holistic privacy: How to remove the target on encryption’s back

          Encryption, encryption, encryption. When it comes to the digital world, encryption is the number one tool we’ve got for protecting people’s security and privacy. If you had to pick a singular cybersecurity thing which was the most important, it would be encryption. Without encryption, the entire internet would catch on fire and we’d be left with a pile of ashes containing everything from your texts to your grandma, to your bank password, or even top secret government memos.

          Losing—or weakening—encryption would be a catastrophe — and that’s why so many good people fight tooth and nail to protect it. However, as the fiery debate over tech (and how to regulate it) rages on — the focus on encryption is starting to get really intense. And with that intensity, it’s starting to feel like other aspects of security and privacy aren’t getting the attention they deserve. Things like metadata, data storage, and digital identities also have enormous privacy and security implications, but they’re often left out of the discussion when talking about regulation and technical designs.

          Instead, regulators focus their efforts on trying to weaken or ban encryption: it’s all about backdoors, lawful access, and wanting access to things which are, well, impossible to provide access to (that’s the whole point of end-to-end encryption, after all). When it’s only about encryption, the conversation about tech—which is often extremely complex—loses nuance. Don’t get me wrong, encryption has to be a core part of any discussion about privacy and security, it’s just not the only thing that matters. The conversation about whether something is (or isn’t) private does not begin and end with ‘is it encrypted?’. Sure, if it’s not encrypted, that’s a big red flag. But if it is encrypted, does that immediately equal privacy?

        • When the EU wanted to own all computers

          The only way to prevent FOSS e2ee like Matrix or PGP or OMEMO is to own everyone’s uid zero.

          Owning everyone’s uid zero is not OK for a hundred ripple effects. Passwords, finance, love letters, computational resources…

          This is different from already external apps like Signal or iMessage or iCloud, apps which are like hiring someone to come over to your house to fix your broken sink. Any given plumbing company can introduce&advertise an idea like their plummers can wear a body cam to prevent assault, for example, and such cameras can be regulated or even mandated by the EU.

    • Defence/Aggression

      • Common DreamsOpinion | Ukraine: The New American Crusade

        The United States is synonymous with war yet does everything it possibly can to avoid such a connection. Its conflicts are always couched in the language of democracy, liberal values, freedom, and the like, despite swathes of evidence that show these wars produce precisely the opposite outcomes. The unfortunate reality is that bombs dropped in the name of freedom produce the same amount of death and destruction as those dropped by tyrants, and American policymakers actively work to hide this from voters. 

      • Common DreamsOpinion | The Downside Risks of Sweden and Finland Joining NATO
      • Task And PurposeRussian troops are proving that cell phones in war zones are a very bad idea

        When Russian troops cross into Ukraine, their cell phones emit a roaming signal that connects to Ukraine’s cellular network, allowing the Ukrainians to triangulate where the Russians are by using the closest three cell towers, said Artem Starosiek, CEO of Molfar, an open-source intelligence community based in Kyiv.

        “So, the Ukrainian special services automatically receive information with the ID number of the device, roaming number, and, of course, the location of the person,” Starosiek told Task & Purpose. “Fortunately, Russians are quite naive and ignorant about using mobile devices, so they often call home, turning on their phones and connecting to the Ukrainian stations.”

        The Russians have also given away their positions by stealing Ukrainian iPhones, which can be tracked using the Find My iPhone app, even when the phones are turned off, Starosiek said.

      • Common DreamsBuffalo Gunman’s Racism Directly Tied to Mainstreaming of White Nationalism, Say Critics

        Amid the outpouring of grief and heartache following Saturday’s massacre in Buffalo that left 10 people dead and three wounded, critical observers say the racial animus which evidence shows motivated the killer must be seen in the larger context of a white nationalist mindset that has increasingly broken into the mainstream of the right-wing political movement and Republican Party in recent years.

        Taken into custody at the scene of the mass shooting at the Tops Market and identified as Payton Gendron, the white 18-year-old male charged with the murders of the victims live-streamed his attack online where he also posted a detailed, 180-page document that has been described by those who have reviewed it—including journalists and law enforcement—as a white nationalist manifesto rife with anti-Black racism, antisemitism, and conspiracy theories about “white replacement.”

      • VarietyGunman Kills 10 People in Buffalo, N.Y. Shooting While Livestreaming on Twitch

        Officials believe that the gunman streamed his actions through a camera attached to a tactical helmet. Reports indicate that the video depicts the shooter pulling up to the grocery store and pointing his assault rifle at people in the parking lot and opening fire. The gunman then walked into the store to shoot others.

        Twitch, the massively popular live-streaming website owned by Amazon, has since taken the gunman’s channel offline, citing a violation of Twitch’s “community guidelines and terms of service.” A spokesperson confirmed that the company removed the stream less than two minutes after the violence started.

      • Business InsiderThe Buffalo mass shooting gunman live-streamed the attack on Twitch

        Authorities also said the gunman live-streamed the attack using a camera that was attached to the tactical helmet he was wearing.

      • CNNLivestream of shooting shows gunman pulling up to supermarket and saying, “Just got to go for it”

        In a statement sent to CNN, Twitch confirmed the shooting was streamed and said the user “has been indefinitely suspended from our service, and we are taking all appropriate action, including monitoring for any accounts rebroadcasting this content.”

      • BBCGermany shooting: 2,200 people watched on Twitch

        The company said the account that live-streamed the attack had been created two months before the incident. It had only attempted to live-stream once before.

        Twitch said it had shared a “hash” of the video with a group of tech companies including Microsoft and Facebook.

        A video hash is essentially a “fingerprint” of a video that helps platforms detect if the same footage has been uploaded on their service.

      • ABCSupermarket shooting: Accused shooter Payton Gendron livestreamed attack, authorities say

        “The social media platforms that profit from their existence need to be responsible for monitoring and having surveillance, knowing that they can be, in a sense, an accomplice to a crime like this. Perhaps not legally, but morally. They’ve created the platform for this hate to be spewed,” said Hochul.

        Hochul also said there is “a feeding frenzy on social media platforms, where hate festers more hate.”

      • MedforthFrance: Islamist imam sentenced to one year in prison for terrorist offences

        Bassam Ayachi, who is on trial for terrorist criminal organisation, is suspected of belonging to the Islamic nationalist group Ahrar Al-Sham and of ” plotting ” with Al-Nosra, an affiliate of Al-Qaeda. A video from 2015 shows him “entering Idlib like a warlord” and “giving orders” while “a banner of the Al-Nosra Front” can be seen in the background.

      • TruthOutPeople in US Don’t Support the Gaza Blockade. Why Won’t Congress Take Action?
      • Common DreamsOpinion | Can US Progressives Defeat Big Money and Trumpism?

        The authoritarian Right is rapidly cementing its institutional control of US politics. Last week’s leaked draft Supreme Court opinion overturning Roe v Wade is just the latest brick in the wall.

      • TruthOutWhite Supremacist Massacre in Buffalo Shows Alt-Right Ideology Leads to Murder
    • Transparency/Investigative Reporting

      • The Gray ZoneOperation Surprise: leaked emails expose secret intelligence coup to install Boris Johnson
      • CBSHow Bellingcat is using TikTok to investigate the war in Ukraine

        According to Bellingcat founder Eliot Higgins, information from the video sharing platform began amassing prior to Russia’s February invasion, when civilians posted TikTok videos of tanks driving down Russian streets. These videos not only showed the buildup before the invasion, Higgins said, but they also identified the specific units and equipment the Russian military planned to use. In instances where Bellingcat suspects Russians deployed cluster munitions into Ukraine from rocket launchers fired from inside Russia, Bellingcat says they can identify the units likely responsible.

        “In some cases, it’s actually possible to see these convoys through their entire journey from their base all the way to the border,” Higgins said. “So all these bits of information give us additional evidence that we can use for accountability purposes in the future.”

      • Foreign PolicyChinese TikTok Users Are in Love With ‘Daddy Putin’

        These videos, which paint a positive, misconstrued portrait of Putin, often rack up hundreds of thousands of likes and thousands of comments. Users feel he’s a sensitive leader who cares deeply for the Russian people.

        “Social media often represents the distorted reality of many users,” Iuliia Mendel, a former spokesperson for Ukrainian President Volodymyr Zelensky, told Foreign Policy. “All in all, we are talking about attempts to create a positive image of Putin using social networks.”

        Fans of Putin have taken to the platform to confess their “fervent love” for the Kremlin’s longest-serving leader since Joseph Stalin. Many users include heart or prayer emojis alongside “乌拉,” a transliteration of ura, the Russian word for “huzzah.” This Chinese word coincidentally shares the same first character as the Chinese word for Ukraine, “乌克兰.”

    • Finance

      • Capitalists are the real “consumers”

        Everywhere you pick up a book or a newspaper or watch a story, you’ll see the same word: consumer. It’s supposed to refer to us, ordinary people, who do the consuming, as opposed to the big important people who are presumably on the other side of the equation: producers, those people who own businesses and “provide jobs.”

        This language is crazy for a lot of reasons, not the least of which is that “consumer” is just a couple shades away from “useless eater,” which gives you a good idea of how close the dominant discourse already is to straight up fascist thinking. But more importantly for my purposes here, I’d just like to point out the very obvious fact that the dominant way of thinking and speaking about all this is precisely backward. Straightforwardly backward. Capitalist society is full of these ideological reversals.

    • AstroTurf/Lobbying/Politics

      • Common DreamsOpinion | Neofascist Minority Rule by the GOP Is Laying Waste to the United States

        Minority rule is killing America. This is most obvious in our Senate and Supreme Court, although it’s also hurt the credibility of the presidency and is damaging many of our states.

      • India TimesUkraine’s key IT sector booming despite Russian invasion

        When Russian bombing started, IT companies shut offices in the capital Kyiv and eastern city of Kharkiv and engineers found refuge in western Ukraine or Poland next door.

        Veselovskiy said there were already around 500 tech companies in Lviv before the war but now estimates that 80 percent of the sector is in the western city.

      • The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.

        This would be the worst surveillance mechanism ever established outside of China, and all in the pretext of protecting children.

        Cryptography professor Matthew Green said that the EU proposal “describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR. Not an exaggeration.”

      • Site36Encrypted communication: UK remains member of EU interception group

        Notwithstanding its exit from the European Union, the British police will remain a member of a Standing Heads of Lawful Interception Units based at Europol. The UK is represented there by the National Crime Agency. This was confirmed by the EU Commissioner for Home Affairs, Ylva Johansson, in her answer to a parlamentary question by the pirate Patrick Breyer. The UK is thus the only third country in the group, which otherwise consists exclusively of EU members and the Schengen states Norway, Switzerland and Iceland.

        The working group of the departments on telecommunications surveillance had once been founded as a strategic „5G Expert Group“ on the initiative of the German Federal Criminal Police Office. It was supposed to give the authorities access to the new telephone standard, which was actually tap-proof. After this was successfully pushed through in the European and international standardisation bodies ETSI and 3GPP, the group was given a new name and new tasks in October 2021. It is now to ensure that the needs of law enforcement agencies are taken into account when amending surveillance laws at EU level and in the member states.

      • Common Dreams‘Still on Track to Win This Primary,’ Says John Fetterman After Stroke

        John Fetterman, the Democratic Lt. Governor of Pennsylvania who is also running for the open U.S. Senate seat in the state, announced Sunday afternoon that he suffered a stroke over the weekend but was already feeling better after the medical condition was treated at a local hospital.

        “Our campaign isn’t slowing down one bit, and we are still on track to win this primary on Tuesday, and flip this Senate seat in November.”

      • Misinformation/Disinformation

        • Common DreamsOpinion | Corporate Media Ignore Left Critiques of Government’s New ‘Disinformation’ Board

          Testifying in front of a House committee, Department of Homeland Security Secretary Alejandro Mayorkas recently announced DHS’s formation of a “Disinformation Governance Board.” The board’s stated mission would be to address “disinformation spread by foreign states such as Russia, China and Iran,” as well as “transnational criminal organizations and human-smuggling organizations.”

        • The EconomistRussia is swaying Twitter users outside the West to its side

          UKRAINE AND Russia are fighting mainly in eastern Ukraine, but they are courting allies around the globe. Ukraine needs other countries to abide by Western sanctions. That means winning hearts and minds in places like India and Turkey.

          To Western ears, Russia’s portrayal of Ukraine’s leaders as Nazis sounds absurd. But just as Ukraine’s military strength surprised the Kremlin, the effectiveness of Russian propaganda might also be underestimated. An analysis of recent Twitter posts suggests that Russia’s online information operations may be focused outside the West—and already bearing fruit.

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • Christian Student in Sokoto, Nigeria Stoned to Death

        A Christian student stoned to death at a college in northwest Nigeria on Thursday (May 12) was falsely accused of blaspheming the prophet of Islam because she had refused to date a Muslim, sources said.

        Deborah Emmanuel Yakubu, a 200-level student at Shehu Shagari College of Education in Sokoto, the capital of Sokoto state, was beaten, stoned to death and her body set on fire, area residents said; a video showing the attack reportedly appeared on social media on Thursday (May 12). In the video, an unidentified man reportedly rages in the Hausa language that he killed Yakubu and set her body on fire.

      • ICCNigeria is World’s Scariest Country to be a Christian

        Open Doors cited a report by SBM Intelligence, a Nigeria-based research firm, for the reported killings in the West African country. The attacks are blamed on Islamist extremist groups such as Boko Haram and Islamic State in West Africa Province (ISWAP), militant Fulani herdsmen, bandits and violent gangs.

        Open Doors reported that there were increasing signs that these groups were working together and widening the impact of their violence. The organization alleged more Christians are killed for their faith in Nigeria than in the rest of the world combined.

      • Common Dreams‘It’s a Fight They’ll Get’: Defenders of Abortion Rights March Nationwide

        Marches and rallies took place in cities across the United States on Saturday as defenders of reproductive rights vowed to defend the country against a looming decision by the U.S. Supreme Court that would eviscerate protections enshrined in Roe v Wade for nearly half a century.

        Under the banner of “Bans Off Our Bodies,” the demonstrations took place in cities large and small but with a shared message.

      • TruthOutLouisiana Bill Classifying Abortion as Homicide Receives Backlash From the Right
    • Internet Policy/Net Neutrality

      • smolZINE – Issue 26
      • what could have been

        I dunno if the small net is quite the place to went, but it’s the only place I trust to not betray my privacy, so there goes.

      • “I ATEN’T DED”

        In the autumn I worked on rexmpp (an XMPP library) a bit more, made an
        Emacs interface, started using it as my primary XMPP client.

    • Monopolies

      • Patents

        • Japan: Problem of Japan’s patent linkage system comes to the surface by a set of IP High Court decisions [Ed: In a humane society, lives should always become before patents]

          The “patent linkage system” is in general a system wherein market approval of generic drugs is linked with the status of the originator drug’s patents, for the purpose of early resolution of patent disputes and ensuring the stable and consistent supply of generic drugs. Japan has not statutorily adopted the patent linkage system, but the system is said to have been adopted in the Ministry of Health, Labor and Welfare (MHLW)’s notification level, under which marketing approval shall not be granted for a generic drug while the originator’s patent covering the active ingredient is existing. Also, among indications and dose and administrations approved for the originator’s drug, those covered by the originator’s patents shall be carved out from the marketing approval for a generic drug. However, there are some problems in the Japanese system, and one of them is that the process of determination of whether or not a generic drug is covered by the originator’s patents is not open to the public. Further, in practice, when the originator’s patent is invalidated through an invalidation trial at the JPO, marketing approval is sometimes granted for the generic drug or the previously carved-out indications or dose and administrations, “without” waiting for the invalidity decision to become final.

        • Only Humans are Inventors Under the Patents Act, But For How Long? [Ed: Patent extremists want computer-generated patent applications to be allowed. Insane!]

          Artificial Intelligence Systems or Devices cannot be “inventors” under the Australian Patents Act, the Full Federal Court has confirmed. The inventor of a patent must be a natural person. Does there need to be legislative change to address the role of Artificial Intelligence in the Australian patents scheme?

          An expanded five judge appeal bench of the Full Federal Court has recently handed down its judgment confirming that artificial intelligence (AI) systems or devices cannot be an “inventor” under the Patents Act 1990 (Commissioner of Patents v Thaler [2022] FCAFC 62), reversing the decision of Justice Beach at first instance and bringing Australia into line with the position taken in other jurisdictions including the US, UK and Europe.

          In his patent application, Dr Thaler named an AI device that he created, DABUS, as the inventor. The central question for the Full Court was whether AI can be an “inventor” pursuant to the Patents Act and the Patents Regulations 1991 (the Regulations). The Full Court held that the application filed by Dr Thaler did not comply with reg 3.2C(2)(aa) because it failed to identify a natural person as the inventor. The Full Court also held that section 15 of the Patents Act, which provides for circumstances where a person draws entitlement to the grant of a patent from an inventor, requires the inventor to be a natural person. It came to this view having regard to the statutory language, structure and history of the Patents Act and the policy objectives underlying the legislative scheme.

        • Mathys & Squire hires new partner from HGF [Ed: Typical marketing spam from Amy Sandys; when she does not disseminate disinformation she wants us to think one low-level worker changing job is actually important news.]
        • MondaqFederal Circuit Reverses PTAB Decision In Amgen Biosimilar-Related IPR Appeal [Ed: Patent maximalists like to cherry-pick cases where "obvious" (invalid) patents are upheld later; they try to 'scandalise' PTAB, still]

          On April 14, 2022, the U.S. Court of Appeals for the Federal Circuit reversed the PTAB’s determination in IPR2016-01542 that claims of Amgen’s U.S. Patent No. 8,952,138 are obvious. The ’138 patent claims are directed to methods of refolding proteins by “contacting the protein with a refolding buffer comprising a redox component comprising a final thiol-pair ratio” of a specified range and a certain redox buffer strength to form a refold mixture. Amgen appealed the Board’s construction of “final thiol-pair ratio” and its obviousness determination based on the construction. Amgen argued that the plain language makes clear that the “redox component is a distinct volume from the refold buffer, and it is that redox component that comprised the claimed ‘final thiol-pair ratio.’” The Federal Circuit agreed with Amgen, and found the PTAB’s construction “inconsistent with the plain language of claim 1 and the specification.” Under the correct construction, the Federal Circuit found that claims 1-24 of the ’138 patent were not obvious over the prior art and reversed the PTAB’s decision.

        • FOSS Patents: Ericsson insists on proving Apple’s infringement of three 5G standard-essential patents Apple itself once elected to challenge in Eastern District of Texas

          Ericsson means business and just isn’t going to be outmaneuvered by Apple. In a move that demonstrates the company’s confidence in its 5G patents, Ericsson is opposing a motion by Apple to stay a second case in the Eastern District of Texas. The first case is about the parties’ dueling FRAND claims and will proceed to trial in December. The second one is the part of Apple’s countersuit that did not get consolidated into Ericsson’s case. The remaining claims in that case stem from Apple’s declaratory-judgment attack on three of Ericsson’s 5G patents. Apple’s DJ initiative left Ericsson with no other reasonable choice but to counterclaim that those patents (which Apple handpicked because it presumably thought it could easily prove them not to be standard-essential) are valid and indeed infringed by Apple’s 5G products.

      • Copyrights

        • Torrent FreakPirate Bay’s Crypto ‘Token’ is Barely Alive After Just One Year

          One year ago, The Pirate Bay released its very own ‘crypto’ token out of the blue. There was no official whitepaper for this soft launch, but the torrent site envisioned the ‘coin’ being used to access VIP content or donate to uploaders. Thus far, nothing has come of it. People don’t seem interested in the ‘project’ and the price continues to drop.


Audio: Mark Shuttleworth Marketed to Young Males, With Sexy Pictures

Posted in Audio/Video, Ubuntu at 5:54 pm by Dr. Roy Schestowitz

The Web is rotting away, old links become broken links within months or years, so I’ve decided to encode a 3-minute segment of the whole as Ogg.

Partial trascript (Jeff Waugh): “What happened was, we’ve had some very… some of the very early initial meetings (when, you know, there were about 10 people) and Mark [Shuttleworth] showed this picture… and it was of a girl called Sabrina, or that’s the name that he gave her. And it was a very [?] tone, Vaseline on the lens kind of shot, and it was a… a very beautiful shot, but it was with a girl with her face turned away but her breasts perfectly visible. And he saying to everyone, ‘this is what I want the desktop to look like.’”

What a Difference Half a Decade Makes (When Linux Foundation is ‘Having Fun’)

Posted in GNU/Linux, Kernel at 5:17 pm by Dr. Roy Schestowitz

As the old saying goes, “time has not been very kind to him”… (nor has the boss)

Linus Torvalds in 2016
2 years before Linux Foundation forced Linus Torvalds into public apology and therapists. Source: “With Linus Torvalds! Computing pioneer, creator of Linux. #TED2016″ by Afromusing is licensed under CC BY 2.0.

Linus Torvalds in 2019
1 year after Linux Foundation forced him into public apology and therapists. Source: Linux-grondlegger Torvalds tijdens Open Source Summit in Lyon bestormd door handtekeningenjagers

Linus Torvalds in 2020
2 years after Linux Foundation forced him into public apology and therapists.

Based on some meticulous research online (hours-long), Torvalds has hardly appeared “in public” since then.

Summary: Media shaming campaigns may have taken their toll on the founder of Linux, who is now bossed by someone who rejects Linux and is married to a Microsoft booster. Like Richard Stallman under FSF guidance (and conditions for return, mostly for fear of further media assaults and attack dogs), he has become a more publicity-shy and private person. The Linux Foundation has in effect reduced the founder of what it’s called after (Linux) into a weekly release manager and mascot, whose brand it is gradually diluting/cheapening.

Links 15/05/2022: GNU libiconv 1.17

Posted in News Roundup at 4:15 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Make Use Of6 Practical and Real-World Applications of Linux

      Everyone knows that Linux powers millions of servers and desktops worldwide. But are there any other applications of this open-source OS?

      If you use Linux on your desktop, you might have wondered if the operating system you’re messing around with has any practical uses. Fortunately, there are plenty of real-world applications of Linux today. Here are some of them.

    • Linux Made SimpleLinux Weekly Roundup #182

      Welcome to this week’s Linux weekly roundup. We had another full week in the world of Linux releases with Fedora 36, Bluestar Linux 5.17.7, ALT Linux 10.0, and LXLE Focal beta.

      I hope you have a wonderful week and enjoy every moment!

    • Desktop/Laptop

      • XDAChromebooks are the perfect place to teach yourself about Linux

        The best Chromebooks you can get today have come a long way from the early days. No longer is Chrome OS just a fancy browser running on a laptop. It has grown to incorporate Android and Linux and the platform is now a lot more capable than you might have thought.

        The second of those is particularly important. I’m not about to preach about how everyone should immediately switch to Linux. Or that 2022 is the year of the Linux desktop. Or anything like that. However, it is in the limelight right now with the immensely popular Steam Deck on the shelves.

        Why am I talking about learning Linux? Well for one, it’s never too late or a bad idea to learn something new. Linux isn’t just some other desktop operating system you don’t currently care about. It has plenty of applications out in the big wide world. All those cloud servers? Running Linux. On a smaller scale, the Raspberry Pi is a tiny, extremely flexible Linux computer you can use to do many wonderful things. A Chromebook is a great place to play around with Linux in relative safety.

    • Server

      • The Register UKOpenVMS 9.2 hits production status for x86-64 • The Register

        VMS Software Inc. has announced the release of OpenVMS 9.2, the first production-supported release for commercial off-the-shelf x86 hardware.

        The expectation is that customers will deploy the new OS [PDF] into VMs. Most recent hypervisors are supported, including VMware (Workstation 15+, Fusion 11+ and ESXi 6.7+), KVM (tested on CentOS 7.9, openSUSE Leap 15.3, and Ubuntu 18.04), and Oracle VirtualBox 6.1.

    • Audiocasts/Shows

    • Kernel Space

    • Applications

    • Instructionals/Technical

      • Linux Cloud VPSHow to Install Code-Server IDE platform on Ubuntu 20.04 | LinuxCloudVPS Blog

        In this tutorial, we are going to install the code-server IDE platform on Ubuntu 20.04 OS.

        Code-Server IDE is a development platform running remotely on a server that can be accessed via a web browser. The main purpose of this code IDE platform is to be accessible from everywhere for better collaboration between developers. It is an open-source project integrated with Git support that allows developers to run Visual Studio Code.

        Installing the code-server IDE platform on Ubuntu 20.04 is a very easy and straightforward process that can take up to 20 minutes. Let’s get started!

      • Linux Host SupportHow to Install Varnish 7 on AlmaLinux | LinuxHostSupport

        Varnish is a free, and open-source web application accelerator used for caching website content in memory. It is designed for HTTP to speed up caching of heavy dynamic websites. It is capable of speeding up your website page loading time by a factor of 10x to 300x. This will helps you with your Search Engine Results Page and also improve the user experience on your website.

        In this post, we will show you how to install Varnish 7 on AlmaLinux.

      • [Old] Sailfish OS Tips & Tricks
      • ID RootHow To Install HPLIP on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install HPLIP on Ubuntu 22.04 LTS, as well as some extra required packages by HPLIP

      • Linux HintBash Check If String Is Empty

        While coding in any programming language, we use many variables of different types. One well-known and most used variable type is the “string”. The string is a group of characters and special symbols including space in programming. While working in Linux provides us the opportunity to utilize string variables in our code. Today, we will demonstrate some of the examples to check whether a string variable is empty or not using some of the most well-known Bash options.

        So, let’s get started now. Let’s start with the Bash file creation, as all of our work will be done within the Bash file. So, use the “touch” instruction of Ubuntu to create a Bash file named “empty” with the “sh” extension. The GNU Nano editor can be utilized to open this newly created Bash file.

      • Linux Hint3 Methods to Install MPV Media Player on Ubuntu 22.04 and Linux Mint 20

        The media players are used to play the videos of different formats and the MPV media player is one of the command line media players which is free to download as well as supports many formats of video, audio, and subtitles type.

        Since MPV is a command-line-based media player, it does not contain the GUI but a small menu bar that contains all the options to control the media file.

        The MPV media player can be installed on different operating systems like Windows, macOS, and the Linux distributions, but in this write-up, we specifically discussed the installation methods of the MPV media player on the Ubuntu 22.04 and Linux Mint 20.

      • PSA: Potential libstdc++ hang in std::filesystem::symlink_status

        Something I caught while running TLGS’s crawler. Due to how drogon works. It needs to always successfully open a new socket on TCP connection. Otherwise the entire process is killed. But Gemini does not support multiple requests on the same connection. So it’s easy to endup with a lot of open sockets (though most are waiting to be closed). My hack to solve this conflict is to periodically walk `/proc/self/` and check how many sockets are open. And rest if there’re too many.

      • The New StackScan Container Images for Vulnerabilities with Grype – The New Stack

        Grype, an open source package managed by security company Anchore, is a vulnerability scanner for both images and filesystems.

      • LinuxiacHow to Install Nginx, MariaDB, and PHP (LEMP) on Ubuntu 22.04 LTS

        This guide shows you step-by-step the installation process of the LEMP stack, Nginx, MariaDB, and PHP, in Ubuntu 22.04 LTS.

      • Linux HintHow to Install TeamViewer on Ubuntu 22.04

        A TeamViewer is the application by which we can access the other computer remotely and can perform various tasks on it. We can also share the files among both machines as well as the screen of the device.

        The TeamViewer can be installed on different operating systems including Windows, but in this write-up, we will focus on the installation of the TeamViewer on Ubuntu 22.04.

      • Fixing Houdini startup error on Linux – Darryl Dias

        After installing Houdini you may come across this error. This error appears in the Terminal, if you open it from the application launcher you maybe be getting this error but it does not show in any way.

    • Games

      • Linux HintBest PlayStation 2 (PS2) Emulators for Android in 2022

        The Google Play Store is packed with interesting games, but most of them pale in comparison with the best PlayStation 2 titles, such as Silent Hill 2, Ico, Shadow of the Colossus, the Ratchet and Clank series, Final Fantasy X, Kingdom Hearts 1 & 2, Wild Arms, or Persona 4, just to give some examples.

        These and many other games are still fun to play, even though it’s been more than two decades since Sony released the PlayStation 2 console to great success. You can play them even if you don’t own the console or any of its successors’ thanks to PlayStation 2 emulators for Android.

      • Linux HintBest Roblox Anime Games

        Roblox is a unique gaming platform with a library that has millions of games created by a community of millions of developers, allowing endless hours of gameplay. If you are a fan of anime and looking for games that resemble them then we have mentioned some of the top anime games in this article.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KlipperScreen: All You Need to Know [Ed: Not about KDE per se. This could be a trademark problem because of KDE. Klipper started in the 1990s.]

          KlipperScreen is a program that runs on Klipper firmware and provides a GUI to control your printer. Read on to learn more about it!

  • Distributions and Operating Systems

    • Top 10 Best Linux Distributions in 2022 For Everyone

      A list of best Linux Distributions in 2022 for every user – students, creators, developers and casual users with guidance to pick one.

    • Barry Kaulereasy.sfs recompress with LZ4_HC

      Thanks to forum member rufwoof, who got me thinking about this. File ‘easy.sfs’ has the entire EasyOS filesystem — we don’t split up into smaller SFS files as is done in Puppy. Except, still have the separate ‘devx’ SFS.

      To keep the download file small, easy.sfs is xz-compressed. This is the smallest file-size; however, decompression when in use is also slower than other compression methods. With a fast CPU, you probably won’t notice it, but with a somewhat older CPU there may be noticeable sluggishness, perhaps in app startup.

    • Fedora Family / IBM

    • Debian Family

      • Overpaid lawyer & Debian miss WIPO deadline

        Debian gangsters promise to continue their vendetta despite missing WIPO’s deadline.

        We have all seen those horrendously long discussion threads that take place in Debian from time to time. We wonder if the Debian trademark team, Brian Gupta and Taowa Munene-Tardif (Rosetwig) have involved the lawyer in one of those endless threads. The lawyer’s phone may well be chiming with the sound of a cash register each time a new Debian email comes in.

        Nonetheless, apart from the budget blowout, the other problem with these endless email discussions from indecisive volunteers is that it is impossible to meet deadlines.

    • Open Hardware/Modding

      • Linux Hint5 Easy Ways to Connect Raspberry Pi Remotely

        To connect Raspberry Pi remotely means that we can access the Raspberry Pi using some other computer and can perform different tasks on the Raspberry Pi.

        The Raspberry Pi can be connected to the display screen by using the mini HDMI port but it can also connect to the desktop remotely by using different approaches which are being discussed in this article.

      • Linux Hint3 Methods to Play Spotify on Raspberry Pi

        Spotify is an application that is used to stream millions of music tracks from all around the world on mobile phones, tablets, and desktops. The users of Spotify not only listen to their favorite music but also can make the albums of favorites to store their favorite collection. These albums can be shared with their friends as well as they can also access the albums or songs collections of their favorite people.

      • Linux HintBest Raspberry Pi for Gaming

        Raspberry Pi is a highly effective device that can be used for various purposes. The major advantage of this device is that it can be an ideal option to play large varieties of games, including Final Fantasy, Dragon Ball Z, Minecraft and so on. However, playing these games on Raspberry Pi will require an emulator and device performance that can handle these emulators providing you with a smooth and fast gaming environment.

      • Linux HintBest RetroPie Controllers in 2022

        The RetroPie is an operating system that enables your Raspberry Pi to be a retro-gaming machine so you can play retro games on the Raspberry Pi including the arcade and classic PC games.

      • Linux HintArduino Uno Pinout Guide

        For beginner and advanced level projects the Arduino provides a platform for the user that gives the assistance regarding programing the microcontroller as well as also helps in creating the hardware for the projects

        This platform provides a variety of the microcontroller boards also known as Arduino boards having different specifications. So before using any Arduino board one must know the specification of the boards and most importantly the pins of the boards and their usability. So, we have explained the pinouts of the Arduino Uno board l and the use of each pin in detail.

      • ArduinoMotorize a manual wheelchair with this adaptable electronic system | Arduino Blog

        Motorized wheelchairs can be very expensive, and for those who are unable to afford them, getting around the house can become a challenge. This is what inspired Wesley Gardner from element14 Presents to design a series of wheelchair modifications that can improve a person’s mobility.

        Gardner began by coming up with a few parts in CAD for the battery mount, an electronics enclosure, and a whole host of clamps for attaching steel tubing to the chair. Next, he added a pair of crossmembers below the wheelchair to secure the 12V lead-acid battery in place. Three more tubes were attached vertically to the back as a way to hold the stepper motors against the wheels which rotate them via friction.

      • CNX SoftwareTrying out Edge Impulse machine learning platform on XIAO BLE Sense board – CNX Software

        I had seen the Edge Impulse development platform for machine learning on edge devices being used by several boards, but I hadn’t had an opportunity to try it out so far. So when Seeed Studio asked me whether I’d be interested to test the nRF52840-powered XIAO BLE Sense board, I thought it might be a good idea to review it with Edge Impulse as I had seen a motion/gesture recognition demo on the board.

        It was quite a challenge as it took me four months to complete the review from the time Seeed Studio first contacted me, mostly due to poor communications from DHL causing the first boards to go to customs’ heaven, then wasting time with some of the worse instructions I had seen in a long time (now fixed), and other reviews getting in the way. But I finally managed to get it working (sort of), so let’s have a look.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Linux LinksBest Free and Open Source Alternatives to Apple FileMaker

      In 2020, Apple began the Apple silicon transition, using self-designed, 64-bit ARM-based Apple M1 processors on new Mac computers. Maybe it’s the perfect time to move away from the proprietary world of Apple, and embrace the open source Linux scene.

      FileMaker is a cross-platform relational database application from Claris International, a subsidiary of Apple.

      A relational database matches data using common characteristics found within the data set. The resulting groups of data are organized and are much easier for people to understand.

    • Leftovers

      • Senses


        I’d say that the traditional five senses are more like classes of things than distinct things. Simplifying and lumping together is one of those tools a lot of people use to grok a really complicated universe. I wouldn’t call the five senses a myth, but I’d say that confusing it with reality is confusing the map with the territory.

      • Hardware

        • The Register UKTSMC, Samsung plan price hikes for chip designers – reports

          Just as costs for some components have started to come down, TSMC and Samsung, the two largest contract chip manufacturers in the world, are reportedly planning to increase prices of production, which may affect Nvidia, AMD, Apple, and others that rely on the foundries.

          Reports emerged earlier this week stating that Taiwan-based TSMC is planning price hikes in the single-digit percentages for legacy and advanced chip manufacturing technologies next year. Citing industry sources, Nikkei reported that the price hike will be around five to eight percent.

        • The Register UKCisco warns of premature DIMM failures
        • The Register UKGermany makes new move to attract chip manufacturers

          Germany’s government is looking to attract chipmakers to the country by offering €14 billion ($14.7 billion) in financial support, apparently spurred on by global semiconductor supply chain problems.

          The move follows the European Chips Act from the European Commission and Intel’s decision earlier this year to build a new fabrication plant in Germany.

        • The Register UKRansomware hits global farm machinery giant AGCO • The Register [Ed: Likely Windows TCO]

          According to the FBI, the three top variants of ransomware that were deployed against critical infrastructure companies last year were Conti, LockBit and REvil/Sodinokibi.

        • The Register UKTablet PC sales decline as consumers consider inflation

          Shipments from nearly all of the major tablet manufacturers are declining as consumers and educators find other things to do with their money.

          Distribution data collated by tech analyst Canalys shows 38.59 million units were sent into retail and business channels in calendar Q1, down 3 percent year-on-year, albeit against a tough comparison period when sales in the same period of 2021 went through the roof.

        • The Register UKEuropean tech businesses cool on China due to coronavirus lockdowns

          Supply chain issues and other disruptions in China caused by strict COVID-19 lockdown measures have seen 23 percent of European businesses operating in the Middle Kingdom consider moving elsewhere, according to a recent report.

          The report, from the European Chamber of Commerce in China and released on Thursday, said the number of European businesses considering leaving nearly doubled since the onset of 2022, a mere five months ago.

        • China’s COVID-19 policy and Russia’s war in Ukraine cause severe disruptions to European business in China
        • The Register UKInfineon more than doubles profit as semiconductor shortages persist

          Infineon joined the ranks of chipmakers that are benefiting from the industry-wide global semiconductor shortages, more than doubling profits in a sector where lead times are severely protracted.

          Formerly Siemens Semiconductor, the German-based company reported revenue of €3.298 billion ($3.48 billion), up 22 percent year-on-year for Q2 of fiscal 2022 ended March 31 [PDF]. Profit bounced 131 percent to €469 million ($494 million).

      • Proprietary

      • Pseudo-Open Source

      • Security

        • The Register UKFive Eyes turn spotlight on MSPs: Potential weak links in IT supply-chain security [Ed: Microsoft resellers a threat to national security]

          Case in point: the SolarWinds attack in 2020, when Kremlin-backed miscreants slipped malware into SolarWinds’ Orion software, which was then pushed to some 18,000 SolarWinds’ customers. This allowed the criminals to infiltrate nearly 100 US government and private-sector networks.

        • The Register UKFalse-flag cyberattacks a red line for nation-states, says Mandiant boss [Ed: Microsoft Windows TCO]

          “When you get a White House podium statement that X did Y, like we did with with everything from Sony Pictures to NotPetya, that’s 100 percent” confidence in the attribution, Joyce said.

          In 2014, the FBI attributed the Sony Pictures cyberattack to North Korea, and US law enforcement blamed the 2017 NotPetya attacks on the Russian military.

        • The Register UKColonial Pipeline faces nearly $1m fine one year after ransomware attack [Ed: Microsoft Windows ransomware; they have left out important details]

          Colonial Pipeline is facing an almost $1 million fine for control room management failures after the US Department of Transportation alleged they contributed to the nation’s fuel disruption in the wake of the 2021 ransomware attack.

        • The Register UKRansomware the final nail in coffin for small university [Ed: Likely Microsoft Windows]
        • The Register UKAnatomy of a campaign to inject JavaScript into compromised WordPress sites [Ed: These need to be compromised in the first place; unlike Windows, WordPress does not have NSA back doors]

          A years-long campaign by miscreants to insert malicious JavaScript into vulnerable WordPress sites, so that visitors are redirected to scam websites, has been documented by reverse-engineers.

        • The Register UKMost organizations hit by ransomware would pay up if hit again [Ed: Usage of Microsoft Windows is extremely expensive]

          Kaspersky claims that in 88 percent of organizations that have had to deal with a ransomware incident, business leaders said they would choose to pay the money if faced with another attack. In contrast, among those that have not so far suffered a ransomware attack, only 67 percent would be willing to pay, and they would be less inclined to do so immediately.

        • The Register UKIf you’ve got Intel inside, you probably need to get these security patches inside, too

          Intel has disclosed high-severity bugs in its firmware that’s used in datacenter servers, workstations, mobile devices, storage products, and other gear. These flaws can be exploited to escalate privileges, leak information, or stop things from working.

        • The Register UK ⚓ https://www.nasdaq.com/articles/how-to-lock-and-protect-away-secret-files-with-gnu-privacy-guard ䷉ Source: nasdaq

          Pangolin8RAT is modular malware that emerged in 2019 and is regularly updated. It is believed to be the successor of the PlugX and ShadowPad malware families, and has been used to target industries beyond gambling – transportation, telecom and governments have all been attacked.


          TeamT5 also found threat actors collect and store victim credentials, software source code and business info for future use.

        • The Register UKAnother ex-eBay exec pleads guilty to cyberstalking critics • The Register
        • The Register UKIran-linked Cobalt Mirage extracts money, info from US orgs – report [Ed: Microsoft Windows TCO]

          In the financially-motivated “cluster” of attacks, the group is using BitLocker and DiskCryptor to hold victims’ documents to ransom.

        • The Register UKResearchers find 134 flaws in the way Word, PDFs, handle scripts

          Security researchers have devised a tool that detects flaws in the way apps like Microsoft Word and Adobe Acrobat process JavaScript, and it’s proven so effective they’ve found 134 bugs – 59 of them considered worthy of a fix by vendors, 33 assigned a CVE number, and 17 producing bug bounty payments totaling $22,000.

        • The Register UK[Older] Critical vulnerabilities found in ‘millions of Aruba and Avaya switches’
        • The Register UKCommunication around Heroku security incident dubbed ‘train wreck’

          Efforts by Salesforce-owned cloud platform Heroku to manage a recent security incident are turning into a bit of a disaster, according to some users.

          Heroku has run security incident notifications for 18 days and appears to have upset several of its customers due to a perceived lack of openness and communication.

        • Heroku resetting passwords for “a portion” of their users immediately

          Just received this email from Heroku. Given the timeline it seems like the breach is pretty serious.

        • The Register UKIt costs just $7 to rent DCRat to backdoor your network [Ed: Microsoft Windows TCO]

          The backdoor Windows malware, dubbed DCRat or DarkCrystal RAT, was released in 2018, then redesigned and relaunched the following year. An individual who goes by the handles boldenis44, crystalcoder, and Кодер (Coder) developed the RAT, we’re told, and works to improve it on a daily basis.

        • The Register UKIndustry pushes back against India’s data security breach reporting requirements

          Opposition is building to India’s recently introduced rules on reporting computer security breaches, which have come under fire for being impractical, ineffective, and impinging on privacy.

          The rules were introduced without fanfare in late April by CERT-In, the nation’s government-run computer emergency response team that has responsibility for incident management and wider infosec guidance.


          India’s Internet Freedom Foundation has offered an extensive criticism of the regulations, arguing that they were formulated and announced without consultation, lack a data breach reporting mechanism that would benefit end-users, and include data localization requirements that could prevent some cross-border data flows.

          The foundation also points out that the privacy implications of the rules – especially five-year retention of personal information – is a very significant requirement at a time when India’s Draft Data Protection Bill has proven so controversial it has failed to reach a vote in Parliament, and debate about digital privacy in India is ongoing and fierce.

        • The Register UKBiden signs cybercrime tracking bill into law [Ed: How about a more constructive approach like banning Windows and other back-doored software?]

          US President Joe Biden has signed into law a bill that aims to improve how the federal government tracks and prosecutes cybercrime.

        • The Register UKF5, Cisco admins: Stop what you’re doing and check if you need to install these patches

          F5 Networks and Cisco this week issued warnings about serious, and in some cases critical, security vulnerabilities in their products.

          F5 officials said Thursday its most serious issue, a critical flaw in its iControl REST framework with a severity score of 9.8 out of 10, could be exploited to bypass the authentication software, used by its BIG-IP portfolio, and hijack equipment. Specifically, the vulnerability, tracked as CVE-2022-1388, can be abused by miscreants to, among other things, run malicious commands on BIG-IP devices via their management ports unimpeded.

      • Defence/Aggression

      • Environment

        • Energy

          • The Register UKDon’t hate on cryptomining, hate the power stations, say Bitcoin super-fans

            Big names in Bitcoin have defended cryptocurrency mining, issuing a jointly signed letter hitting back at US lawmakers who last month urged a government watchdog to probe the practice.

            Twitter founder and Bitcoin champion Jack Dorsey, the CEO of Bitcoin-collecting MicroStrategy Michael Saylor, and others on Monday signed the letter [PDF] that is a point-by-point rebuttal to a memo [PDF] sent last month to America’s Environmental Protection Agency (EPA) by Representative Jared Huffman (D-CA) and a couple dozen other Democrats.

          • The Register UKDemand for GPUs used to mine crypto ‘disappearing’, says ASUSTeK

            Taiwanese hardware giant ASUSTeK says demand for GPU used to mine cryptocurrency is “disappearing” – and so is about ten percent of demand for personal computers.

            Speaking on the company’s Q1 earnings call, co-CEO S.Y. Hsu said the fall in demand for GPUs was caused by the crypto industry responding to critics of its energy consumption. They’re moving away from proof of work to proof of space – verifiable creation of data occupying space in a storage medium – as the means of mining tokens.

          • The Register UKCoinbase CEO says everything’s OK after SEC filing gives netizens the jitters [Ed: Beginning of the end of fakecoins?]

            Coinbase CEO Brian Armstrong has scrambled to alleviate fears that customers storing cryptocurrencies at the digital cash exchange will lose everything if the biz goes under.

            This concern stemmed from Coinbase’s quarterly 10-Q report [PDF] filed this month to the SEC. It disclosed that customers who kept their cryptocurrencies at the exchange could see their assets seized in the event the business went bankrupt, thus:

          • The Register UKUS Treasury sanctions cryptocurrency mixer Blender • The Register

            The US Treasury has sanctioned cryptocurrency mixer Blender for its role in helping North Korea’s Lazarus Group launder stolen digital assets.

            As a result, among other limitations, anyone in the United States or a US person can no longer do any business with Blender without special permission from the government.

            This marks the Feds’ first-ever sanctions against a crypto mixer, which cybercriminals can use to cover their tracks. As the name might suggest, cryptocurrency mixing, or tumbling, can obscure the source of some digital money. The laundered coins cannot be traced back to, say, a wallet robbed of its contents, allowing crooks to spend their ill-gotten gains without being linked to their crimes.

            Such services have legitimate privacy uses, though Uncle Sam isn’t happy that it can be used to make life easy for criminals, and so it’s cracking down on the practice.

      • Finance

        • The Register UKSoftBank to stop investing ‘randomly’ after losing billions of dollars

          SoftBank lost a lot of money over the past 12 months.

          The Japanese giant’s founder and CEO Masayoshi Son today told analysts on a conference call marking the end of its fiscal 2022 year that the SoftBank group as a whole lost $13.15 billion. Its two Vision Funds, which account for 50 percent of SoftBank’s net asset value, alone lost $27.4 billion between them. If your technology stock or cryptocurrency portfolio has taken a dive lately in these bumpy economic times, perhaps you can manage a wry grin here.

        • The Register UKSEC adds Tencent, JD.com, China Mobile to group facing potential delisting [Ed: Companies that do not need to fake their market value?]

          More Chinese tech companies including Tencent, JD.com, and China Mobile face delisting by the US Securities and Exchange Commission (SEC) thanks to opaque disclosures.

          Tencent-affiliated gaming outfits Huya and Douyu, internet datacenter services provider Vnet Group, and online game services provider NetEase were among more than 80 fresh additions to a provisional list of companies on May 4.

      • Censorship/Free Speech

        • The Register UKAppeals court unleashes Texas’s anti-content-moderation law • The Register

          On Wednesday, the US Fifth Circuit Court of Appeals decided to undo a preliminary injunction that for the past few months has been blocking Texas’s law prohibiting online content moderation while that legislation is being challenged.

          Two judges of a three judge panel – all Republican appointees – granted Texas’s motion to stay the preliminary injunction, granted last December, that suspended HB 20 amid the dispute over its constitutionality.

        • The Register UKChina wants its youngsters to stop paying streamers • The Register

          China’s internet regulator, the Cyberspace Administration of China (CAC), has published guidelines that aim to stop minors from giving tips or other forms of payment to livestreamers, watching after 10pm, or livestreaming themselves.

          “Website platforms must not develop functional applications that attract minors to tip or induce minors to give ‘gifts.’ If it is found that the website platform violates the aforementioned requirements, measures such as suspending the tipping function and shutting down the live broadcast business will be implemented,” said the recently published Opinions on Regulating Online Live Rewards and Strengthening the Protection of Minors (in Chinese).

      • Internet Policy/Net Neutrality

        • The Register UKCable giants, ISPs, telcos end legal fight against California’s net neutrality law

          California Attorney General Rob Bonta on Wednesday welcomed the decision by a group of telecom and cable industry associations to abandon their legal challenge of the US state’s net neutrality law SB822.

          “My office has fought for years to ensure that internet service providers can’t interfere with or limit what Californians do online,” said Bonta in a statement. “Now the case is finally over.

        • Attorney General Bonta: California’s Net Neutrality Law Is Here to Stay | State of California – Department of Justice – Office of the Attorney General

          OAKLAND – California Attorney General Rob Bonta today issued the following statement on a decision by associations representing major internet service providers to dismiss their lawsuit challenging California’s net neutrality law. Senate Bill 822 protects Californians from blocking, throttling, harmful forms of zero-rating, and other anti-competitive practices that harm

        • The Register UKFTC says Frontier lied about its internet speeds amid $8.5m settlement

          The FTC has settled a case in which Frontier Communications was accused of charging high prices for under-delivered internet connectivity.

          The US telecommunications giant has promised to be clearer with subscribers on connection speeds, and will cough up more than $8.5 million, or less than a day in annual profit, to end the matter.

          Frontier used to primarily pipe broadband over phone lines to people in rural areas, expanded to cities, and today supplies the usual fare to homes and businesses: fiber internet, TV, and phone services.

        • Loopy links

          One thing I found by looking at where my #hashtag crawler went was that some people have a bottomless pit of links.

          The first one I saw was someone exposing a repository of the site content. That included a link to the content itself. Not a link to the actual site, but to the copy of it in the repo. That had a repo link, where you could find a site link, and so on. I spotted this when it got to several levels of site/repo/site/repo/site/repo and told the crawler to give up. I’m mildy curious how deep that could go. I suppose it’s limited by the maximum length of a gemini request (assuming that either the server or the client respected that limit).


          to give up on those too.

          Having read Sean Connor’s experiences with the crawlers that won’t give up on an infinite redirect loop, I think that some crawlers are probably probing the limits of those two capsules.

        • Re: The Disappearence of Sincere Conversations

          I’ve had similar thoughts, I mean, the immediate of ‘social’ media, designed for engagement has a lot of problems.


          I don’t know, I was born in the 80′s so I can’t talk about what happened before, rather than what older friends and parents told us.
          That said, the lifestyle is always being broken by innovations, cheapest ways. I think travelling abroad was ‘impossible’ for a middle-class citizen 50 years ago, now it’s kind of common. Talking in English with random people from the world was kind of unthinkable. Now you are doing it.

          When things become easier, they are less appreciated, I have seen.
          And then they come the greedy technological companies, fighting against the opposite. ‘Everything has to be for profit’, ‘Everything has to be open and free’. I don’t want to take a side, both parts have something I like. And I think being in the middle is kind of healthy.

      • Digital Restrictions (DRM)

      • Monopolies

        • The Register UKTesla sues former engineer, claims he stole Dojo supercomputer trade secrets

          Tesla has started legal action against a former employee the company alleges was copying confidential data from its Project Dojo supercomputer onto his own systems outside the company. It further alleges he tried to conceal his actions by submitting a substitute laptop for inspection by the carmaker’s information security team.

        • Patents

        • Software Patents

          • $4,000 for CPC Patent Technologies ’208 & ’705 prior art

            On May 9, 2022, Unified Patents added two separate PATROLL contests with an opportunity to collect up to $4,000 in cash for prior art on at least claim 10 of U.S. Patent 9,269,208 and at least claim 1 of U.S. Patent 9,665,705. The patents are owned by CPC Patent Technologies Pty., Ltd., an NPE and Charter Pacific Corp. entity. The ’208 and ‘705 patents generally relate to systems using wireless transmission of security code information. They have both been asserted against Apple.

          • $2,000 for CPC Patent Technologies ’039 prior art

            On May 9, 2022, Unified Patents added a new PATROLL contest, with a $2,000 cash prize, seeking prior art on at least claim 13 of U.S. Patent 8,620,039, owned by CPC Patent Technologies Pty., Ltd., an NPE and Charter Pacific Corp. entity. The ’039 patent is generally related to a biometric security card device. It has been asserted against Apple.

        • Trademarks

    [Meme] Unitary Patent and Unified Patent Court (UPC) Cannot Be Reconciled With the Law

    Posted in Europe, Patents at 2:13 pm by Dr. Roy Schestowitz

    Don't tell anyone Brexit doomed UPC

    Summary: Unitary Patent and Unified Patent Court (UPC)? Impossible. But Team UPC counts on an endless torrent of fake news managing to convince you (and more importantly politicians) otherwise.

    Even Team Battistelli is Sometimes Admitting — Out in Public! — That Unified Patent Court (UPC) is Neither Legal Nor Desirable

    Posted in Deception, Europe, Patents at 2:09 pm by Dr. Roy Schestowitz

    Video download link | md5sum 6b334ef318c0bd9f414896b358c65e3e
    Even Former EPO Chiefs Reject the UPC Lies
    Creative Commons Attribution-No Derivative Works 4.0

    Summary: Daniel X. Thomas and other people who are “too old to punish” (consequences to their career profoundly minimised owing to seniority) are among those who push back against the Unitary Patent or Unified Patent Court (UPC); any sane person — not a career-climbing litigation zealot — can identify the pertinent facts and realise that what’s going on here is an injustice of unprecedented proportions in the patent discipline

    THE video above deals with 13 annotated screenshots from today (gathered over the past week) and 17 new comments against the UPC. If one puts aside fake news and shameless self-promotion, it seems abundantly clear that UPC is neither legal nor desirable. Benoît Battistelli and António Campinos as EPO presidents have acted like agents of Team UPC, striving to lower patent quality in anticipation of kangaroo courts with docile judges across the EU.

    “There’s that old cliché about UPC always coming “next year” (and next year they’ll say “next year” again).”The perils of Team UPC have lasted over a decade. They’ve groomed Campinos (he attended and spoke in a UPC lobbying event in his very first week as EPO President). But he’s letting out the expletives. His approval rates among staff are near 0% (3% two years ago; the only way has been down since then).

    As shown above, even former executives of the EPO, who worked and still work with Battistelli, agree that the UPC is a terrible conspiracy (of law firms and their largest clients; they conspire against the European public). The pushback is very apparent and rumours we’ve seen suggest a legal action is inevitable if not imminent. There’s that old cliché about UPC always coming “next year” (and next year they'll say "next year" again).

    [Meme] Common Sense at EPO

    Posted in Europe, Patents at 1:25 pm by Dr. Roy Schestowitz

    Corporations wanting endless patent monopolies; Team Campinos; EPO staff
    Corporations that send patent applications to the EPO are large multinationals (only 20% of applicants are not)

    Summary: The European examiners who deal with patents prefer a system that works for science, for Europe, not for foreign megacorporations that amass millions of low-quality patents and weaponise these to discourage competition

    As an associate of ours put it, “quantity over quality has been a problem, pushed by management, so it is important to distinguish this downturn from an actually desirable re-calibration.”

    « Previous entries Next Page » Next Page »

    RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

    Home iconSite Wiki: You can improve this site by helping the extension of the site's content

    Home iconSite Home: Background about the site and some key features in the front page

    Chat iconIRC Channels: Come and chat with us in real time

    New to This Site? Here Are Some Introductory Resources




    Samba logo

    We support

    End software patents


    GNU project


    EFF bloggers

    Comcast is Blocktastic? SavetheInternet.com

    Recent Posts