When was the last time you installed an operating system? If your answer is “A few years ago” or “When I got my first PC in the early 2000s or 2010s, you should try installing one. But instead of Windows, why not try installing Linux this time? I know that people have previously complained about how hard installing and using Linux could be, but what if I told you that it’s not hard; in fact, using Linux is just a piece of cake these days.
When choosing operating systems, Windows is a straightforward choice for millions out there, and why wouldn’t it be? It’s still widely believed to be one of the easiest OS. However, with the growth of Linux over the past few years, Windows is no longer the only easy OS to use and install. It’s time to let go of the “Linux is hard to use satire,” get out of our comfort zones and embrace the project that truly respects your privacy and grants extra layers of security. Here’s a list of things that prove Linux is not hard to use.
Linux hardware vendor System76 announced today a new line of Thelio desktop computers that feature a full chassis redesign with support for swappable accents.
Thelio is System76’s flagship Linux-powered desktop computer lineup that comes in no less than five different configurations, both internal and external. The Thelio’s current lineup includes the Thelio, Thelio Mira, Thelio Major, Thelio Mega, and Thelio Massive models.
System76's Thelio desktop computers have been notable for three things -- being assembled in the USA, running Linux-based operating systems, and having a largely wooden chassis. Moving forward, the PC will still be assembled in America and ship with a Linux distribution (Ubuntu or Pop!_OS), but it won't necessarily contain any wood.
You see, the computer manufacturer has decided to redesign the chassis to be mostly aluminum, save for a thin accent strip. Actually, while the strip can be made of wood, not all of them are. In other words, it is not a given that a Thelio desktop will contain any wood -- only if you specifically choose a wooden access strip. Some of the strips are instead made of powder-coated aluminum. And yes, you can replace the strip by easily pinching and sliding it off.
System76 revolutionized desktop PC's with their Thelio desktop, and now the company has released a refresh that has a very interesting feature. In addition to many small tweaks and modifications, the new model actually lets you swap the new accent panel with one of several variations at any time. In this video, Jay will give you a full day 1 review of the brand new Thelio.
System76 has a brand new design for their flagship PC: Thelio. In this video we're going to compare the differences between the 2019 Thelio I own and their latest revision.
Linux Mint 21 is here and it’s awesome! We show you not only how to get it installed but how you can multi-boot it with Windows and a plethora of other Linux distros! Along the way discovering Logical Volume Management, delve into the UEFI system and play with partitions!
PLUS: How open source can save the smart home, discover OpenIndiana, create better cutouts with GIMP, hide messages in images, set up your 3D printer for better prints, recreate Pac-Man with Python, boost your creative writing and more!
Don't confuse it with Arch Linux :)
LoongArch is a CPU architecture by Loongson Technology.
Recently, Loongson added the initial support for LoongArch CPU architecture in Linux Kernel 5.19.
If you are curious, LoongArch has similar attributes to RISC-V. You can also call it a new RISC ISA (Instruction Set Architecture).
Want more technical details? The Linux Kernel's documentation is your friend.
While it is not popular, a new CPU architecture support is always welcome and opens up various opportunities with new hardware.
This week’s episode of Destination Linux, Ryan challenges Michael & Jill to a Test Your Linux Might where Ryan asks Michael & Jill about various news topics and articles to see how much they know without any preparation. Then we take a look at the latest Beta release of Fedora Linux with Fedora 37 Beta. Plus, we have our tips/tricks and software picks. All this and more coming up right now on Destination Linux to keep those penguins marching!
Many Linux users ask the question "How can I contribute to my favorite Linux distribution(s)?" While contributing code, artwork, documentation and money are certainly needed, one of the easiest ways to contribute is by seeding torrents.
In this video, we check out BlackArch Linux. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2810 tools. You can install tools individually or in groups.
Greetings there everyone, this is TechBizmo. In this video, I'll teach you how to scale your display in the XFCE Desktop environment.
In this video, I will be taking a quick look at curtail, a simple photo compression program for Linux.
What is the best keyboard launcher? I don't know if I've found it yet - but here's some options that come close to mirroring some of the best options in the business.
I'm announcing the release of the 5.19.10 kernel.
All users of the 5.19 kernel series must upgrade.
The updated 5.19.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.19.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
thanks,
greg k-h
We are happy to announce that Théo Lebrun has joined our engineering team, as of September 9, 2022, just in time to attend the Embedded Linux Conference Europe with the rest of the Bootlin engineering team.
The body behind the biggest open source project in the world has opened a European division.
Sometimes, attending a European trade show – even virtually – can give you a slight feeling of being a supporting feature, with the main act happening in North America, usually some time earlier. So the launch of the Linux Foundation Europe in Dublin last week was a welcome change. After all, the Linux kernel itself was originally a European project, from a member of Finland's Swedish-speaking minority.
We reduced power consumption from the BIOS in the previous article in this series. And we’re using GNOME’s Balanced power saving mode. What else is next?
Let’s try PowerTOP, software that displays data about the power use of a Linux system. What piqued our interest is that the software analyzes power issues and offers optimization suggestions. Let’s see what it suggests.
PowerTop is available from the repositories of all main Linux distros, so installing it on your system is straightforward.
The Terminal emulators listed here are tested on Ubuntu 22.04 LTS and could work easily on older releases depending on the hardware resource you have.
PipeWire is becoming the norm in audio and video handling among GNU/Linux distributions as more and more of them are switching to it as the default server for handling audio, video streams, and hardware, as well as its powerful session and policy manager WirePlumber.
From my perspective, because of the above, PipeWire is getting a lot of attention from developers these days, and the latest addition paves the way for support of the next generation of Bluetooth audio with the initial implementation of Bluetooth LE (Low Energy) audio support.
Timeshift is a relatively new utility for Linux, but it’s something that’s become so essential to desktop users that many distros have added it to their official repositories. This nifty application essentially brings the System Restore utility from Windows to Linux.
Timeshift allows you to create incremental backups that produce exact images of your system at a specific point in time. You can use them to restore your system to the exact state that it was in when the backup was made. Since they’re incremental, they don’t take nearly as much hard drive space to store. In this post we show you how to get started with Timeshift on your own desktop.
As a sysadmin, you'll often deal with IP address configuration. Changing the IP address is one of the common IP configuration tasks.
While the IP addresses on most systems are configured automatically, you may need to change them manually in some cases.
In this article, you'll see various ways to change the IP address in Linux. I'll also focus on Ubuntu network configuration separately.
Ubuntu makes it easy to install Docker. Install Docker on Ubuntu by following the steps in this how-to article.
In this tutorial, we will show you how to install Pinta on Manjaro 21. For those of you who didn’t know, Pinta is a free, open-source program for drawing and image editing. It is designed to have lots of amazing features yet it has a very simple and minimalistic interface. For anyone looking for a powerful yet user-friendly image editor, Pinta is an excellent option.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Pinta image editor on a Manjaro 21 (Ornara).
Floorp is a new, privacy-friendly Firefox-based browser developed by the Japanese student community. The browser is designed to provide users with a fast, private browsing experience while protecting their online privacy. Floorp uses several privacy-enhancing features, including a built-in ad blocker, tracker blocker, and cookie manager. In addition, the browser includes several other useful features, such as a dark mode, bookmarks sync, and an integrated password manager.
The following tutorial will teach you how to install Floorp on Manjaro 21 Linux. The tutorial will use the command line terminal with yay AUR helper. Ideally, most users may be using some wrapper for Pacman; for new users, it is essential to install one to keep your packages up-to-date while you learn Arch/Manjaro.
The Gnome Text Editor, better known as GEdit or Text Editor, is a free and open-source text editor which is part of the Gnome Desktop Environment. It has been designed with usability and accessibility in mind and features a clean and straightforward interface. GEdit is highly configurable and supports various programming languages and file formats. It can be extended with plugins to add additional functionality, such as spell-checking and code completion. The Gnome Text Editor is an ideal choice for those who need a versatile and powerful text editing tool.
The following tutorial will teach you how to install Gnome Text Editor on Manjaro 21 Linux. The tutorial will use the command line terminal with yay AUR helper. Ideally, most users may be using some wrapper for Pacman; for new users, it is essential to install one to keep your packages up-to-date while you learn Arch/Manjaro.
Pinta is an open-source image editing tool available for free, and it has quickly become a favorite among novice and experienced users. One of the things that makes Pinta so appealing is its ease of use. The interface is clean and intuitive, and users can quickly find the necessary tools. Even better, Pinta offers a wide range of features, including support for layers, transparency, and high-resolution images. For anyone looking for a powerful yet user-friendly image editor, Pinta is an excellent option.
The following tutorial will teach you how to install Pinta on Manjaro 21 Linux. The tutorial will use the command line terminal and the default Arch Linux/Manjaro repository.
Rate limiting is very crucial for a website with a massive user base to avoid 503 or 429 errors. Even if you have a small website, you should limit the rate of each connection to prevent DDOS attacks (which are surely going to spoil the user experience) or prevent your server from receiving too many requests at the same time.
So, the question is how the rate limit for connections (or requests) will work on your NGINX server. The answer is pretty simple. Let me give you an example:
You have a room with space for 20 people. Usually, they come and go simultaneously, but in a situation where more than 20 people arrive in your room, you will gently avoid them with a message like 429 (too many people). In such a situation, you can either kick them out and say “never ever gonna come here” or let them wait in the queue until the same number of people inside the room leave.
It’s all your choice what you wish to do with the extra people who arrived. So let’s see how you can apply this terminology to your NGINX server using the directives.
Backups are an integral part of any operating system. They ensure that critical copies of data are always available in the unfortunate event that the system crashes or something goes wrong.
Urbackup is an efficient and easy-to-use Client-Server backup system for Linux and Windows Systems. It’s a fast and reliable Linux backup tool that provides a web interface that allows you to add clients whose files and directories need to be backed up.
Urbackup employs deduplication to store backups on either Windows or Linux servers. Backups are created quietly without interrupting other running processes in the system. Once backed up, files can be restored through a web interface while drive volumes can be restored with a bootable USB-Stick.
Security Enhanced Linux or SELinux is responsible for the implementation of mandatory access control mechanisms on major Linux distributions like Fedora, RHEL, and Rocky Linux. These access control mechanisms guarantee increased security on all processes and files within a Linux operating system distribution.
The Python virtual environment provides a command “deactivate” to go back to normal. Once the virtualenv is activated, you simply run the below command to deactivate the environment and get the original shell back.
psacct or acct both are open source utilities for monitoring users’ activities on the Linux system. These utilities run in the background and keep track of each user’s activity on your system as well as what resources are being consumed.
I personally used these tools in our company, we have a development team where our developers continuously work on servers. So, these are the best utilities to keep an eye on them.
These programs provide an excellent way to monitor what users are doing, what commands are they executing, how many resources are being consumed by them, and how long users are active on the system. Another useful feature is, that it gives total resources consumed by services like Apache, MySQL, FTP, SSH, etc.
psacct or acct utilities run in the background and keep track of each user’s activity on your Linux system as well as what resources are being consumed.
To protect web resources with Kerberos you may use Apache HTTPD with mod_auth_gssapi — however, all web scripts (e.g., PHP) run under Apache will have access to the Kerberos long-term symmetric secret credential (keytab). If someone can get it, they can impersonate your server, which is bad.
The gssproxy project makes it possible to introduce privilege separation to reduce the attack surface. There is a tutorial for RPM-based distributions (Fedora, RHEL, AlmaLinux, etc), but I wanted to get this to work on a DPKG-based distribution (Debian, Ubuntu, Trisquel, PureOS, etc) and found it worthwhile to document the process. I’m using Ubuntu 22.04 below, but have tested it on Debian 11 as well. I have adopted the gssproxy package in Debian, and testing this setup is part of the scripted autopkgtest/debci regression testing.
3 ways to use the Linux inxi command Don Watkins Tue, 09/20/2022 - 03:00 I was looking for information about the health of my laptop battery when I stumbled upon inxi. It's a command line system information tool that provides a wealth of information about your Linux computer, whether it's a laptop, desktop, or server.
The inxi command is licensed with the GPLv3, and many Linux distributions include it. According to its Git repository: "inxi strives to support the widest range of operating systems and hardware, from the most simple consumer desktops, to the most advanced professional hardware and servers."
Documentation is robust, and the project maintains a complete man page online. Once installed, you can access the man page on your system with the man inxi command.
Set up a virtual machine to test your applications, binaries, and container images on different architectures.
Jack Wallen shows you prevent Firefox from consuming all of your system resources and make the browser faster.
Every so often I give up on Firefox, only to return to it at a later time because I find other browsers to be either unreliable, unsafe or just too bloated with features. I want a web browser to be a web browser, not a kitchen sink filled with features I neither need nor want.
One of the reasons that sends me away from Firefox is how heavy it can be on system resources. When it has trouble, I can start Firefox and hear the fans on my System76 Thelio come to life as if to say: “Captain, I’m giving her all she’s got!” Well, Scotty, sometimes it’s just not enough, and Firefox brings the system to a halt.
Okay, let me start by saying: Don’t do this on a machine you depend upon for productivity.
With that warning out of the way, let’s talk Fedora 37 beta. This upcoming release will include GNOME 43, a much-improved file manager, improved support for web apps, a new system menu and a new device security panel. Given how amazing Fedora 36 has been, logic would dictate that 37 will be nothing but improvements to what many consider to be the best Linux distribution on the market.
If you're a database admin, you might want to be able to keep track of the performance of those servers. Jack Wallen shows you how with Percona and Docker.
NGINX provides you with many more options than any available web server provides to customize your website for performance, optimization, and security.
“After reading this tutorial, you will be able to install both Oracle Java JDK and OpenJDK on Debian and based Linux distributions, including Ubuntu. The process also includes instructions to add the JAVA HOME path.”
This tutorial explains how to install Oracle Java JDK 18 on Debian-based Linux distributions easily.
This document is optimized both for users looking for fast instructions to implement and for users looking for theoretical knowledge. For practical purposes, theoretical content was placed at the end of the instructions.
All steps described in this tutorial contain screenshots, making it easy for every Linux user to follow them independently of their expertise level.
Every Linux distribution has different versions available in the market. Whenever a newer version is released, most users are tempted to upgrade their systems. However, to install the latest available release, they must know the current Linux version that they are using. Therefore, this guide will explain the four different methods of checking the Linux Mint version.
A while ago, we have shown you how to install software in an offline Ubuntu Linux system. Today, we will see how to fully update and upgrade offline Debian-based systems using Apt-offline utility. Unlike the previous method, we do not update/upgrade a single package, but the whole system. This method can be helpful in situations where you have slow Internet speed or don't have an active Internet connection at all.
“A username and password for a single account are the primary requirements for accessing a Linux system. In order to verify a user during a system login attempt, all user accounts passwords are saved in a file or database. Finding this file on a user’s machine is beyond the knowledge and abilities of every user. Linux checks the password given by the user against an entry in one or more files located in the directory named “/etc.” when the user logs in with a username and password.
All the crucial data required for user login is stored in the /etc/passwd files. The user’s account information is kept in the /etc/passwd file, to put it another way. The entire list of users on your Linux system is contained in this plain text file. It contains data about the user name, password, group ID, user id, shell, and home directory. Only superuser or root user accounts should have restricted write access permissions.”
This article will show you where and how to save the passwords for system user accounts on Linux distributions.
Yep, that revving you hear is the sound of a new release candidate.
The last few releases of SuperTuxKart have, it has to be said, spoiled us in terms of new karts, characters, tracks, features, game modes and more — the upcoming SuperTuxKart 1.4 release is no different!
A stack of visual changes are proffered in the latest builds. Collectable items are said to have a “more dynamic and polished way to interact with players”, something you can (partially) see demoed in this gif...
Screenshooter (xfce4-screenshooter), as the name suggests, is an application that takes screenshots. Some action is needed once the screenshot is taken on the captured image. Currently, the application provides four well-defined actions: to save the picture, open the image, copy it into the clipboard, and upload it to Imgur. But some users may want to perform other specific actions after taking the screenshot, such as printing them or sending them over an email. So the task was to allow users to add custom actions that can be executed once the screenshot is taken. Similar functionalities are also present in Thunar and AppFinder.
[...]
Then comes the most crucial part, where the custom action gets executed. Here we don't read the list, just the command and name stored in the ScreenshotData structure. The absolute path of the image first replaces the placeholder text. Then "g_spawn_async" is used to execute the command asynchronously. It's done asynchronously so that the command may not block the application.
This implementation's beauty lies in how we have used the already implemented code. Once the image is captured, it is stored in the /tmp directory using the "Save" option. Then the execution part happens. So under the hood, two actions are occurring from the action selection dialog box.
My days as a GSoC mentee have ended, and I would like to share everything I have done during these days and what is left. I have posted a few blogs already, so if you have read them, you already know what I have done, and thus you can skip to the last section.
Up until now, when KDE has run a fundraiser, or received donations, the proceedings have gone to KDE as a whole. We use the money to fund operational costs, such as office rent, server maintenance, and salaries; and to pay for travel expenses for community members, event costs, and so on. This has worked well and helps the KDE Community and common project to flourish.
But the fundraiser starting today is very different. For the first time KDE is running a fundraiser for a specific project: today we have the ambitious goal of raising 15,000€ for the Kdenlive team. The funds will be given to contributors to help Kdenlive take the next step in the development of KDE's advanced, free and open video-editing application. For the record, on the cards for upcoming releases are nested timelines, a new effects panel, and improving the overall performance of Kdenlive, making it faster, more responsive, and even more fun to work with.
Kdenlive, a powerful free and open source video editor from the KDE team is now having a dedicated fundraising campaign to support the team working on it. Probably one of my favourite pieces of software, which I often have a love / hate relationship with due to some historic instability issues it has genuinely gotten a lot better there. It could be improved as with anything and these funds will help towards that.
An alternative to GNOME Software has been written, using Flutter, and it’s making enough noise that Canonical is rumored to be considering using it as the default.
A community-drive software store, named Ubuntu Software Store, has been written in Flutter and received so much positive attention that Canonical is, according to this Reddit thread, considering it as a replacement for GNOME Software.
The features found in Ubuntu Software Store include Snap support, dbpk/rpm support, an adaptive layout, install from file manager, remove and update software, permission manager, and search. But the most impressive aspect of Ubuntu Software Store is its speed. Unlike GNOME Software (on Ubuntu), which can be quite slow, Ubuntu Software Store is fast.
Wireshark is a free, open-source vulnerability scanning tool that relies on packet sniffing to get a precise picture of network traffic. It’s a terrific tool for troubleshooting all sorts of issues and bugs, it works perfectly with multiple OS’, and it helps capture the traffic traveling through the network. Unfortunately for beginners, Wireshark is geared towards tech-savvy users only.
Whether you’re a cyber security professional, software development enthusiast, or aspiring network engineer – if you want to tackle network troubleshooting that includes inspecting individual packets, you’re probably considering using Wireshark.
In this video, I am going to show how to install Solus GNOME 4.3
EuroLinux Desktop is a modern operating system that combines the aesthetics and functionality of Windows and macOS with the reliability and security of server Linux distributions. The software, built upon the source code of Red Hat Enterprise Linux 9, incorporates a series of changes to the user interface, introduced by EuroLinux. The system was designed for use in office work, public institutions, companies, educational institutions, and private users. It is covered by 10 years of technical support from the manufacturer.
The premiere of the EuroLinux Desktop, an operating system prepared for personal computers, took place on September the 20th, 2022. This solution is designed for people and organizations which use Windows or macOS daily and are looking for a stable system with many years of technical support as well as a similar aesthetic to Microsoft and Apple. The new system intuitively responds to the needs of public administration, the financial sector, educational institutions, and private users. EuroLinux Desktop is based on the source code of Red Hat Enterprise Linux 9, the system that is universally used in the most demanding environments (banks, stock exchanges, industry). However, it includes additional functionalities, extensions, and facilities.
Companies today need to continuously reimagine themselves to stay relevant. In a hypercompetitive, fast-moving business landscape, we cannot rest on our laurels or put off digital transformation projects for a better time. This mindset is critical to surviving at a time when digital transformation is flipping traditional business models to better enable digital engagement and the use of digital products and services.
Throughout my career as a technology executive in both the public and private sectors, I’ve led and been heavily involved in several transformation projects, including the implementation of a new association management system last year at ISACA.
Given the relationship between edge computing and IoT, it’s unsurprising that the industrial sector – which spawned its own IoT sub-category, aka Industrial IoT (IIoT) – is ripe with edge computing use cases.
The industrial sector – which we’re using here as a broad term for businesses like manufacturing and energy (think heavy machine manufacturing and power plants, for example) – actually had a head start on the edge concept: Industrial SCADA systems. In short, these are local, isolated control systems responsible for all manner of critical industrial and other processes on-premises. You could think of these as precursors of modern edge architecture.
In the spirit of the hugely popular European Heritage Days, where unusual buildings and artworks are opened to the public for one weekend each year, Debian Suicide FYI volunteers are opening the debian-private vaults to bring you more relics from that period in the 1990s when volunteers were hoodwinked by Bruce Perens, Software in the Public Interest and trademarks.
Crowd Supply recently featured an open-source V853 Development board accommodating the high-performing V853 System-on-Chip (SoC). This device provides a 7” MIPI LCD, dual camera modules and many other peripherals to target AI-Vision applications.
The V853 Dev board comes in a 4-layer PCB featuring a Cortex-A7 core (up to 1GHz), a RISC-V E906 core (up to 600MHz) and a 1-TOPS Neural Processing Unit NPU (NPU). The memory system available is about 512MB DDR3 while storage offered is 8GB of eMMC and an SD card slot.
We’ve had a sample of the Khadas Edge2 single board computer powered by Rockchip RK3588S octa-core Cortex-A76/A55 processor for a couple of weeks, and now that the board is officially launched we can post our review of the board with Ubuntu 22.04, and we’ll check out Android 12 later on.
The Khadas Edge2 comes in two variants: Basic and Pro, We received the Edge2 Pro SBC with 16GB RAM and 64GB flash that ships with two WiFi antennas by default, but the company also sent a low-profile fansink and thermal pad for cooling that in theory would be optional, but in practice, it is required as while the board runs fairly cool considering the performance it brings, it still needs a heatsink to prevent overheating and throttling. The fan may not really be necessary though as we’ll see below.
 JeVois-Pro tiny AI camera was introduced last year with an Amlogic A311D processor with a built-in 5 TOPS NPU, and support for an Intel Myriad X or Google Edge TPU M.2 card all that in a compact 50x50x45 mm box.
The company has now managed to get hold of some M.2 A+E 2230 Hailo-8 modules delivering up to 26 TOPS of AI performance and is selling for JeVois-Pro ultra-compact deep learning camera with the Hailo-8 accelerator for $599 delivering up to 31 TOPS once we include the built-in 5 TOPS NPU.
[Phambili Tech] creates a battery powered mountable display, called “the Newt”, that can be used to display information about the time, calendar, weather or a host of other customizable items.
Digital twins have become somewhat of a buzzword in the past couple of years. But what exactly are they? A digital twin, as its name indicates, is a non-physical copy of a physical object. Just like a digital scan of a physical picture. This virtual element enables a real-time view of all relevant data coming from said object. Depending on the system being studied, specific sensors can be tracked and monitored. This allows for the replication of the system’s environment (adherence of the road, weather, surrounding objects or systems, etc). In this blog post, we will discuss digital twins and their use cases in automotive.
Nighttime photography, and especially astrophotography, requires very long exposure. To get a good picture of the stars, you might leave the shutter open for several minutes. That gives nature plenty of time to produce dew on your lens, which can ruin the photo. The solution is a lens heater, but running that heater all night can consume a lot of power. That’s why Andrew Brocklesby built this automated lens heater that only activates when necessary.
Heated dew straps are common and affordable pieces of equipment for photographers. They slip over the frame of the lens and use electrical resistance to produce heat. Like the rear defroster on your car, that heat helps get rid of the condensation that forms as humid air comes into contact with a cool surface. Brocklesby’s device takes into account that the condensation doesn’t form unless both the ambient temperature and humidity are at specific levels. If they aren’t, then there is no need to activate the lens heater and waste power.
Cooking is something many of us love to do at home. There are few feelings more rewarding and satisfying than throwing together a delicious meal in your own kitchen and sharing it with family or friends.
However, cooking can be tough. There are lots of things to pay attention to, lots that can go wrong, and lots of preparation and planning to stay on top of. The good news is that home automation has many different solutions to make the cooking process easier, more fun, and more organized.
Arduinos have been the microcontroller platform of choice for nearly two decades now, essentially abstracting away a lot of the setup and lower-level functions of small microcontrollers in favor of sensible IDEs and ease-of-use. This has opened up affordable microcontrollers to people who might not be willing to spend hours or days buried in datasheets, but it has also obscured some of those useful lower-level functions. But if you want to dig into them, they’re still working underneath everything as [Jim] shows us in this last of a series of posts about interrupts.
Computing at the edge is fueling the need for special-purpose hardware and software infrastructure that complements computational capabilities found in a typical datacenter. The advent of Industry 4.0, the term often used to describe the fourth industrial revolution, has shifted the focus of industrial innovation toward the edge where operational technologies (OT) and traditional IT converge.
This convergence requires organizations to adopt modern, software-defined practices that provide more effective and efficient data analysis closer to the source; implement on-premise artificial intelligence (AI) infrastructure for near real-time predictive analytics; and enable digital twin environments.
Enterprises struggle to bring AI and automation to the edge due to strict requirements and regulations across verticals. Long-term support, zero-trust security, and built-in functional safety are only a few challenges faced by players who wish to accelerate their technology adoption.
At Canonical, we are excited by the promise of bringing secure AI and automation to the edge, and we look forward to providing a stable, open-source foundation for NVIDIA IGX, a new, industrial-grade edge AI platform announced by NVIDIA today. IGX is purpose built for high performance, proactive safety, and end-to-end security in regulated environments. The first product under the IGX platform is NVIDIA IGX Orin, designed to deliver ultra-fast performance in size and power. It’s ideal for use cases in manufacturing, logistics, energy, retail and healthcare.
CISA has released eight (8) Industrial Control Systems (ICS) advisories on September 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
It may have taken longer than anyone initially expected, but the cloud-native era for building and deploying applications has finally arrived. Nearly every major application development initiative being launched today is based on a microservices architecture that runs natively on platforms such as Kubernetes.
I am happy to announce that LLVM 15.0.1 is now available!
Specifically for the GNOME community, Kell writes about GObject and its introspection system (GIR) in Towards a dynamic object model within Unix processes, with liballocs. I didn't try testing it in practice against codebases I work on, but it would be valuable.
Multiple microservices deployed with Kubernets and Docker mean multiple containers to check for logs when debugging or watching internal communication. It would be handy if we could look through logs in a more organized way - and that's how Docker-watcher was born.
These notes describe important changes, enhancements, removed APIs and features, deprecated APIs and features, and other information about JDK 19 and Java SE 19. In some cases, the descriptions provide links to additional detailed information about an issue or a change. This page does not duplicate the descriptions provided by the Java SE 19 (ââ¬Å JSR 394) Platform Specification, which provides informative background for all specification changes and might also include the identification of removed or deprecated APIs and features not described here.
If you’re like most people, you’ve received a text or chat message in recent months from a stranger with an attractive profile photograph. It might open with a simple “Hi” or what seems like good-natured confusion about why your phone number seems to be in the person’s address book. But these messages are often far from accidental: They’re the first step in a process intended to steer you from a friendly chat to an online investment to, ultimately, watching your money disappear into the account of a fraudster.
[Noteolvides] creates the CubeTouch, a cube made of six PCBs soldered together that creates a functional and interactive piece of art through its inlaid LEDs and capacitive touch sensors.
Do you know the name [George Devol]? Probably not. In 1961 he received a patent for “Programmed Article Transfer.” We’d call his invention the first robot arm, and its name was the Unimate. Unlike some inventors, this wasn’t some unrealized dream. [Devol’s] arm went to work in New Jersey at a GM plant. The 4,000 pound arm cost $25,000 and stacked hot metal parts. With tubes and hydraulics, we imagine it was a lot of work to keep it working. On the other hand, about 450 of the arms eventually went to work somewhere.
Anyone who’s looked into high-voltage experiments is likely familiar with ion lifters — spindly contraptions made of wire and aluminum foil that are able to float above the workbench on a column of ionized air. It’s an impressive trick that’s been around since the 1950s, but the concept has yet to show any practical application as the thrust generated isn’t nearly enough to lift a more substantial vehicle.
It’s hard to pin down exactly what a cyberdeck is, as we’ve seen through the huge variety of designs submitted to our 2022 Cyberdeck Contest. The most basic requirement is that it is a type of portable computer, typically with a futuristic, cyberpunk-style design, but beyond that, anything goes. The original concept was introduced in William Gibson’s novel Neuromancer, where it refers to portable devices used to connect to cyberspace. The design of the ‘decks is not described in detail, but we do know that Case, the protagonist, uses a Hosaka computer which is supposedly “next year’s most expensive model”.
According to an internal memo obtained by More Perfect Union, Starbucks is set to announce Monday that it is ending Covid-19 sick pay benefits that offered employees two five-day rounds of paid leave per quarter if they contracted the virus or were exposed to it.
I must have been unlucky to catch polio in Cork, Ireland, in 1956, as this was one of the last polio epidemics ever in Western Europe and the US. Jonas Salk had discovered a vaccine that had been successfully tested the previous year, and at the time I fell ill, mass inoculation was being rolled out for the first time to stop the spread of the virus in Chicago. Across the city, health workers took over vacant shops, the forecourts of gas stations, the backs of trucks, parks, and street corners to vaccinate people. The number of new infections declined as herd immunity was established, marking a turning point in the effort to stop epidemic polio. The success of this decades-long campaign was one of the greatest American achievements in the 20th century.1Adapted from Patrick Cockburn’s The Broken Boy (2022), which is available from orbooks.com and wherever books are sold.
"We still have a problem with Covid," Biden acknowledged in a "60 Minutes" interview aired on Sunday night. "We're still doing a lotta work on it."
Mitchell Beer reports on two factors that are leading scientists to predict a tripling in pandemics in the future.
More than 1.5 million people are in the dark after Hurricane Fiona knocked the power out across all of Puerto Rico Sunday, triggering floods and landslides. We go to San Juan for an update from Democracy Now! correspondent Juan Carlos Dávila, who describes how privatization of the island’s electrical grid coupled with a legacy of U.S. colonialism “has really caused the crisis.” We also speak with former San Juan Mayor Carmen Yulín Cruz as President Biden has declared a national emergency and federal aid pours in. “The distribution has to be robust and has to be people-centered and community-centered,” notes Cruz.
A mere category 1 hurricane dumped so much water on Puerto Rico so quickly that one of its rivers has swollen to 25 feet above normal, even more than it rose during Hurricane Maria in 2017, which was a Category 5 hurricane. The island is beset by flash floods, and is getting 16-30 inches of rain. The usual average amount of rainfall received by Puerto Rico is 31 inches, so it is getting from six months’ to a year’s worth all at once in a single day. All power was knocked out, though the government is vowing to get it back on in days, not the months it took after Maria. Puerto Ricans are U.S. citizens, though it is a territory and not a state. President Biden declared a state of emergency.
"The climate crisis is urgent and here. We will continue to fight for policies that can protect our planet and people."
Climate Week kicks off this week in New York City as more than 150 world leaders gather for the U.N. General Assembly and as Hurricane Fiona rips through Puerto Rico, Typhoon Nanmadol slams southern Japan, and Typhoon Merbok floods parts of western Alaska. We speak to climate scientist Michael Mann about how climate change has changed the pattern of tropical storms, and what needs to happen to address the crisis. He says rising global temperatures have worsened the effects of storms like these, and more aggressive climate legislation from Congress is needed. “We are experiencing devastating consequences of past climate inaction, and it really drives home the importance of taking action now,” says Mann.
Technology is a little famous for coming up with "buzzwords." Other industries do it, too, of course. "Story-driven" and "rules light" tabletop games are a big thing right now, "deconstructed" burgers and burritos are a big deal in fine dining. The problem with buzzwords in tech, though, is that they potentially actually affect your life. When somebody calls an application "secure," to influence you to use their product, there's an implicit promise being made. "Secure" must mean that something's secure. It's safe for you to use and trust. The problem is, the word "secure" can actually refer to any number of things, and the tech industry often uses it as such a general term that it becomes meaningless.
Because "secure" can mean both so much and so little, it's important to use the word "secure" carefully. In fact, it's often best not to use the word at all, and instead, just say what you actually mean.
Chrome's enhanced spellcheck & Edge's MS Editor are sending data you enter into form fields like username, email, DOB, SSN, basically anything in the fields, to sites you're logging into from either of those browsers when the features are enabled. Furthermore, if you click on "show password," the enhanced spellcheck even sends your password, essentially Spell-Jacking your data.
NewAE Technology’s ChipWhisperer-Husky is a compact tool designed for side-channel power analysis and fault injection with features such as a high-speed logic analyzer used to visualize glitches, real-time data streaming for attacking asymmetric algorithms, and support for JTAG/SWD programming.
Security updates have been issued by Fedora (dokuwiki and rizin), SUSE (libcontainers-common, permissions, sqlite3, and wireshark), and Ubuntu (tiff, vim, and xen).
Watch the video on Youtube
I’ve bought three Aqara sensors for use around my home, so I’ve had the opportunity to compare them to each other and other reference measuring tools. I don’t have any scientifically calibrated thermometers or hygrometers. However, I have half a dozen, and they all agree with each others readings.
Use of the fruit of this surveillance of travelers hasn’t been limited to the government agency that first obtained it from travelers or commercial third parties, or to the purpose that purportedly allowed CBP to obtain it without warrant or probable cause. No access logs are maintained for some of these databases of travel surveillance data, so it’s impossible to audit how they have been used.
A lot of technologies, business choices, and public policies gave us the internet we have today—a tremendous boost to the spread of education, culture, and commerce, despite its well-documented flaws. But few people credit two deeply buried technologies for making the internet possible: hashing and cryptography.
If more people understood the role these technologies play, more money and expertise would go toward uncovering and repairing security flaws. For instance, we probably would have fixed the Heartbleed programming error much earlier and avoided widespread vulnerabilities in encrypted traffic.
This article briefly explains where hashing and cryptography come from, how they accomplish what they do, and their indelible effect on the modern internet.
Long after the enemy forces have laid down their arms, peace accords have been signed and victories celebrated, there is still a heavy toll to be paid. Most of this comes in the form of unexploded ordnance, including landmines and the severe pollution from heavy metals and other contaminants that can make large areas risky to lethal to enter. Perhaps the most extreme example of this lasting effect is the Zone Rouge (Red Zone) in France, which immediately after the First World War came to a close comprised 1,200 square kilometers.
Lithuania, Latvia, Estonia, and Poland’s entry bans for Russian citizens with Schengen tourist visas came into effect on Monday. The new restrictions do not apply to truck drivers, diplomats, and citizens entering for family and humanitarian reasons. In addition, they only apply to the EU’s external borders; Russians with Schengen tourist visas will still be allowed to enter all four countries from within the Schengen zone.
The public chambers of the self-proclaimed Donetsk and Luhansk People’s Republics have appealed to their respective leaders to hold referendums on their incorporation into Russia, according to TASS.€ Interfax reported that “LNR” officials asked for the referendum to be held “immediately,” claiming Russian annexation would “secure the territory of the LNR and open new opportunities for its restoration.”
Vladimir Osechkin, the founder of the Russian human rights project Gulagu.net, was the target of an attempted assassination in the French city of Biarritz, he told journalist Yulia Latynina in an livestreamed interview on Monday. According to Osechkin, Bellingcat investigator Christo Grozev had previously warned him of a possible murder attempt, but he only managed to evade the attack because he happened to notice the red dot from the sight of the assassin’s gun on the wall next to him.
On September 14, violence erupted between border forces on the unmarked line between Kyrgyzstan and Tajikistan. In the four days that followed, the fighting would spread along virtually the entire 604-mile border, killing at least 100 people and leading Kyrgyzstan to evacuate roughly 137,000 people from the area, while officials from both countries would repeatedly try and fail to reach lasting ceasefire agreements. By September 18, disinformation surrounding the event had proliferated, with each side casting the other as the aggressor. Here's what we know for sure about the conflict.
Here’s a nightmare scenario: Unable to recruit enough soldiers from the Russian Federation, Vladimir Putin takes North Korean leader Kim Jong-un up on his recent offer to send 100,000 North Koreans to join the Russian president’s ill-fated attempt to seize Ukraine. Kim has also promised to send North Korean workers to help rebuild that country’s Donbas region, parts of which Russian forces have destroyed in order to “save” it. Consider this an eerie echo of the fraternal aid that Eastern European Communist states provided Pyongyang in the 1950s after the devastation of the Korean War.
No matter how expensive law enforcement is, it can always get more expensive. Most agencies demand outsized portions of local budgets. That’s just the ground floor.
The NATO-backed Atlantic Council has proposed apartheid Israel as a blueprint for a hyper-militarized Ukraine. The paper was authored by Obama’s former ambassador to Tel Aviv, now an Israeli spy-tech consultant.
John Feffer examines what it means that North Korea has been driven ever closer to fellow nuclear powers Russia and China.
President Biden says he doesn’t encourage Taiwanese independence but also says US forces would defend the island in the case of a Chinese invasion.
The new database, known as the Global Registry of Fossil Fuels, also warns that emissions produced by combusting all of the planet's oil, gas, and coal reserves would exceed the world's dwindling "carbon budget" seven times over, underscoring the urgency of keeping fossil fuels in the ground to avert climate catastrophe.
"The industry is attempting to position itself for a nationwide build-out of plastic burning infrastructure under the guise of so-called 'advanced recycling.'"
'Reform' boosters make dubious arguments about reaping benefits of fossil fuel side deal
Summa Silver’s exploratory drilling operations are taking place just a few miles from the boundary of the Gila Wilderness, this country’s first, designated almost 100 years ago through the efforts of the visionary conservationist Aldo Leopold. The Greater Gila region is known for its exceptional biodiversity, hosting more species of birds and mammals than any other region in the Southwest, including the only population of Mexican gray wolves. The Greater Gila is home to over 200 rare plant and animal species, with over 30 listed as threatened or endangered.
You might recall that Elon Musk claims that he hates taxpayer subsidies. They should all be “deleted.” Except for the subsidies given to his companies, apparently.
What is your life worth during a pandemic? During the two-and-half years of public health lockdowns and other limitations imposed to contain Covid, some have argued for minimal restrictions to preserve a strong economy even if it endangered the lives of the vulnerable.
"The price of a college degree should not be bloodshed or a lifetime of crippling debt."
"It's time for these railroad companies to start prioritizing the safety and well-being of their workers—or we'll all pay the price."
The latest warning comes from the World Bank, which published a study late last week warning that central banks' efforts to tame inflation by aggressively hiking interest rates—thereby increasing borrowing costs and tamping down demand—could cause a significant global economic contraction without bringing inflation back down to the pre-pandemic average.
As a student borrower, I've experienced a flood of emotions since hearing President Joe Biden's announcement about federal student loan relief. This is an enormously welcome surprise. I'm among the 60% of all federal student loan borrowers who were Pell Grant recipients and will receive a $20,000 reprieve. But that joy is tempered by the reminder that I'll still be saddled with $60,000 left to pay.
The US Senate confirmed Amy Coney Barrett to the Supreme Court eight days before the 2020 presidential election. At the time, the man who appointed her, Donald Trump, said he expected that the court would be called on to decide the election, and he wanted Barrett involved in that decision.
In the introduction to her new fertility memoir, Knocking Myself Up, Michelle Tea writes: “The whole story of a birth begins with that decision to say yes, and the roller coaster that loop-de-loops you to the delivery table or at-home birthing pool or what have you—there is so much in it. All of life, every hope and fear, joy and sadness, the understanding of yourself as a mammal, an embodied animal, is in that story.” Tea, the author of 15 books ranging from memoir to young adult fiction, has decided to detail her unorthodox path to motherhood in her latest. It’s quite a story and involves semen from a gay drag queen, eggs from Tea’s nonbinary partner, a makeshift vessel referred to as the “sperm bowl,” a designated friend to transport said bowl, and a lot of modern medicine.
As Monday’s state funeral for Queen Elizabeth II marks the end of a national period of mourning in Britain, we speak with the U.K.'s first professor of Black studies, Kehinde Andrews, about the generational difference in perceptions of the queen within his Jamaican family, which he lays out in his recent essay, “I Don't Mourn the Queen.” He also describes the brutal legacy of the British slave trade and the British Empire, which makes the monarchy a symbol of white supremacy that should not be mourned, but rather abolished. “This is an old institution — deeply racist, deeply classist, deeply patriarchal. It just needs to go. And this is the perfect time to discuss when it should end,” says Andrews.
I was glad to see Ezra Klein's piece today touting the Biden administration's creation of ARPA-H. This is the Advanced Research Projects Agency-Health, a DARPA-type agency explicitly designed to promote the development of health-related innovations, like vaccines, drugs, and medical equipment.
Right-wing immigration policy has been depraved from the moment Donald Trump instituted the Muslim travel ban as one of his first acts in office. From there, it has spiraled into increasingly brutal and inhumane policy shifts, from family separation and child cages at the border to pledges to enact mass deportation on flimsy procedural grounds. One proposed initiative from the Trump White House’s suite of xenophobic backlash policies that proved a bridge too far, however, was a plan from ghoulish immigration policy adviser Stephen Miller to flood designated asylum cities with undocumented immigrants in a bid to overstretch their social safety nets and exact petty political revenge for dissenting from the right’s new policy consensus.
Fernandes, a Democrat, called the Republican governor's actions "morally criminal" and warned, "There are legal implications around fraud, kidnapping, deprivation of liberty, and human trafficking."
President Joe Biden took a victory lap on Thursday after his administration helped broker a€ deal to stave off what would have been the first national freight railroad strike in 30€ years. But the potential crisis is not over until rank-and-file rail workers vote on whether to approve the agreementââ¬â°—ââ¬â°which could take€ weeks.
At an appeal hearing on Monday, the Moscow City Court reduced municipal deputy Alexey Gorinov’s seven-year prison sentence by one month. Gorinov was found guilty of spreading “false information” about the Russian army on July 8 after he called Russia’s war against Ukraine a war at a municipal council meeting. The verdict made him the first person to be sent to prison by a Russian court for spreading” disinformation” about the military.
According to data from the media research company Mediascope, Russians have been spending more time on YouTube in recent months. After analyzing the data, Kommersant reported that for the first six months of 2022, Russians spent about 84 minutes per day on the site on average. In July, however, the average daily watch time was 87 minutes, and in August, the number rose to 88 minutes.
Both the US and British governments supported the rise of Brazil’s far-right President Jair Bolsonaro. Future Prime Minister Liz Truss had secret meetings with the future president in 2018 to discuss “free trade, free markets and post-Brexit opportunities”€ (BrasilWire, 3/25/20).
The advocacy group's fact sheet—titled Oil Profits and Production Grow at the Expense of Jobs, Consumers, and the Environment—comes as scientists continue to call for a swift transition to clean energy and critics around the world accuse the fossil fuel industry of war profiteering.
This September marks the 40th anniversary of€ Banned Books Week, an annual celebration of the right to read.€ Book challenges and bans€ are at an all-time high. During the week of September 18-24, events across the United States will take place, organized around the theme “Books Unite Us–Censorship Divides Us.” Project Censored is a€ longtime supporter€ and proud cosponsor of Banned Books Week.
"More books banned. More districts. More states. More students losing access to literature. 'More' is the operative word for this report on school book bans," begins the update to PEN America's Banned in the USA: Rising School Book Bans Threaten Free Expression and Students' First Amendment Rights, which was published in April and covered the first nine months of the 2021-22 scholastic year.
It’s been seven years since Congress last introduced a federal anti-SLAPP law (and that was six years after the previous attempt). So here we are, and once again we’ve finally got a federal anti-SLAPP law introduced in Congress, this time by Rep. Jamie Raskin, who recently held a hearing focusing on SLAPP lawsuit attacks against environmental activists (which is where many SLAPP cases have been filed, though the issue is much broader than that).
or its€ 40th€ anniversary, the Banned Books Week Coalition’s theme is “Books Unite Us: Censorship Divides Us.” Indeed, as we survey today’s contentious political climate, we would all do well to pick up, read, and share a banned book or two. Doing so, we might discover amazing things about each other—not to mention ourselves. We can learn how to “agree to disagree,” while honoring the higher ideals of an open society, free expression, and the right to read. Censorship anywhere is a threat to “FReadom” everywhere. Celebrate Banned Books Week September 18-24, but stay vigilant and keep reading and sharing banned books every week throughout the year.
I don’t know what I did wrong, but I’ve angered one of the titans of the internet! For the last six days, my home internet connection has been partially broken. Some apps and many websites either load slowly, partially, or not at all. Everywhere I go, I’m greeted by the same blockade message from Cloudflare.
Cloudflare is the market leader in shielding public websites from targeted traffic-saturation attacks, page load time acceleration, and Content Delivery Network (CDN) services. The company plays a massive role in delivering everyday internet services. Roughly one in three of the top one-million websites is shielded and accelerated through Cloudflare’s massive global data centers, according to data from analytics firm BuiltWith.
Among other methods, Cloudflare uses a browser-challenge page to detect and thwart malicious and unauthorized bots. The page tests the capabilities of your web browser and tries to figure out whether you’re human. The page can be fully automated and only slows down your browsing. However, sometimes it includes a CAPTCHA challenge that prompts you to identify letters and numbers, or images.
On September 16, Russia’s Justice Ministry added comedian and TV host Maxim Galkin to its “foreign agents” registry, claiming he was engaged in political activity using money from Ukraine. Galkin denied the accusation, saying, “I don’t trade conscience.” Two days later, his wife, pop megastar Alla Pugacheva, asked to be declared a “foreign agent” herself — likely the first time a high-profile figure has publicly requested the designation, which brings with it a range of administrative headaches. In the request, Pugacheva called her husband an “honest, decent, and sincere person, [and] a genuine and incorruptible patriot of Russia” who wants Russians to have “peaceful lives and free speech” and for people to stop dying “for illusory goals.” The statement received over half a million likes on Instagram and was quoted by virtually every Russian media outlet —€ though the Kremlin-controlled ones refrained from mentioning her allusion to the war. Meduza is publishing translations of some of the most notable public reactions to Pugacheva’s statement.
On September 19, Moscow’s Municipal Court “softened” its earlier decision, which sentenced Alexey Gorinov to seven years in prison. The municipal deputy, charged under Russia's law against "disinformation" for calling the war a war, is now to spend six years and 11 months in a penal colony. During a closed hearing, the 61-year-old defendant addressed the court. His final speech was published by the Free Alexey Gorinov! Telegram channel.
In a Telegram post on Monday, Russian State Duma Deputy Alexander Khinshtein claimed that the Russian Justice Ministry has officially approved his bill that would amend Russia’s law against “LGBT propaganda” by expanding it to apply to all ages, among other changes. Shortly after, Khinshtein published images of what he said is the ministry’s official response to the bill. “The bill is supported by the Government of the Russian Federation,” reads the document’s closing paragraph.
A story made the rounds recently about how Airbnb effectively banned Bethany Hallam for life. Hallam, an Allegheny County, Pennsylvania councilperson received a notification from Airbnb that a third party it used for background checks had noted a “criminal records match” in doing a background check, and she would not be able to use Airbnb to either rent or host.
The “Constitution-free zone” — the area within 100 miles of any border crossing, port of entry, or international airport — now apparently covers the entire country in perpetuity.
The ruling oligarchs are terrified that, for tens of millions of people, the economic dislocation caused by inflation, stagnant wages, austerity, the pandemic, and the energy crisis is becoming unendurable.€ They€ warn, as Kristalina Georgieva, Managing Director of the International Monetary Fund (IMF), and NATO Secretary-General Jens Stoltenberg,€ have done, about the potential for social unrest, especially as we head towards winter.
The mounting social inequality is fueling protests around the globe. The global ruling class is determined to prevent these protests from employing the weapon that can bring them down — strikes.
"Republicans always tell us what they want to do. We should believe them and think broadly and in the long term of where we should be working to stop this from happening."
In an extended interview, acclaimed physician and author Dr. Gabor Maté discusses his new book, just out, called "The Myth of Normal: Trauma, Illness, and Healing in a Toxic Culture." "The very values of a society are traumatizing for a lot of people," says Maté, who argues in his book that "psychological trauma, woundedness, underlies much of what we call disease." He says healing requires a reconnection between the mind and the body, which can be achieved through cultivating a sense of community, meaning, belonging and purpose. Maté also discusses how the healthcare system has harmfully promoted the "mechanization of birth," how the lack of social services for parents has led to "a massive abandonment of infants," and how capitalism has fueled addiction and the rise of youth suicide rates.
During the COVID crisis, the FCC launched the Emergency Broadband Benefit (EBB program), which gives lower income Americans a $50 ($75 for those in tribal lands) discount off of their broadband bill. Under the program, the government gave money to ISPs, which then doled out discounts to users if they qualified.
It seems anti-cheat technology is the new DRM. By that I mean that, with the gaming industry diving headfirst into the competitive online gaming scene, the concern over piracy has shifted into a concern over cheating making those online games less attractive to gamers. And because the anti-cheat tech that companies are using is starting to make the gaming public every bit as itchy as it was over DRM.
The GAFAM are evil, and the nice thing about it is that we can call them the MAGMA now (replace the F with M for Meta).
We can also call the MAGMA a form of hyper-capitalism: they are so big that they destroy any kind of competition, by either buying other companies, or creating something better. The "barrier to entry" to compete with them is just way too high.
The legal battle between game developer Bungie and cheat seller AimJunkies has taken a surprising turn. The AimJunkies defendants, who previously distributed 'Destiny 2 Hacks’, deny any wrongdoing and have now filed a countersuit. Turning the tables, they accuse Bungie of hacking, stealing computer data, and circumventing the DMCA.
Three almost identical copyright infringement lawsuits filed against AT&T, Verizon and Comcast this month accused the ISPs of allowing subscribers to pirate movies online, despite being aware of their infringing activities. If successful, the lawsuits could've had serious financial consequences for the companies. But as quickly as they arrived, all three lawsuits have now been dismissed.
Some 50 years before collage would become an established art form, came these pioneering Victorian images all of which exude a certain decorative detail: blood.
Fortunately, the computer has started working again after a full day of drying out. I had a talk with my boss, and while I didn't address the root of the problem, it still was pretty good. The postage meter has started working again, so I don't have to drive across town to get the mail done.
He told me about how the hypercapitalist monopolies are like a layer of magma destroying everything and transforming everything they touch into more magma.
Where magma stands for :ââ¬Â¯Meta-Apple-Google-Microsoft-Amazon.
Don’t talk about GAFAM anymore, talk about MAGMA.
It occured to me the other day that while multiplayer games in the past were made to play/interact with people close to and around you, more and more games nowadays assume internet connectivity at all times and encourage you to play with strangers around the globe.
You can't copy, paste, or edit blocks. You can type and go back one character at a time. And every line you are writing starts to fade away so you are focusing only on the latest paragraph and, mostly intended, on your current idea.
So I was in need of a Beos-FS formatted partition, and the easiest way to get that was to use the Haiku installer. Since I was running the installer already I thought I might as well install the OS and have a look around.
It's pretty good. I like it.
I'm running it on a Thinkpad X61. The install was very fast and it picked up the network right away, and a lot of things seem to work.
I have been encountering alot of archives and mirrors lately. Mostly in the efforts of expanding the catalog of the CDG.But also just recently Ben Collver released an archive of the GameFAQs today. Mirroring web content and hosting archives of large text file databases is something that occurs quite often here in the gemini-space one way or another. Preserving information for future generations is a natural occurance for us internet dwellers. Buut theres a thorn in every internet archivst side. Copyright.
Like the rest of Geminispace, I run my capsule as a hobby project. I'm also not a developer by trade. As a result, the processes I use to design and update my capsule are rather ad-hoc and purpose-built. Perhaps most crucially, I don't have a test capsule to develop on--I build everything on the live server.
That has come back to bite me a few times. When I originally developed the chess service, one script contained a bug that prevented invitations from appearing on the home page. I didn't catch the bug for almost a month, and in that time, no-one played any chess matches. Similar issues plagued the weather forecast CGI in its early days, when flaky connections and CSV parsing errors caused the script to fail more than half of the time.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.