Recent Changes - Search:
NTLUG

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

Show Descriptions... (Show All) (Two Column)

LinuxSecurity - Security Advisories

  • Debian DSA-6220-1 SimpleEval Important Sandbox Bypass CVE-2026-32640
    Byambadalai Sumiya discovered that SimpleEval, a library for adding evaluatable expressions into Python projects, didn't fully restrict some module references, resulting in sandbox bypass. For the oldstable distribution (bookworm), this problem has been fixed in version 0.9.12-1+deb12u1.







LWN.net

  • Git 2.54.0 released
    Git maintainer Junio Hamano has announcedGit 2.54.0, which includes contributions from 137 people; 66 of thosepeople are first-time contributors to the project. Changes include theaddition of Git history rewriting, Git's web interface (gitweb)"has been taught to be mobile friendly", and much more. See theannouncement for all improvements, additions, and bug fixes. Hamanois now taking a short break:
    I will go offline for a couple of weeks starting this evening,hopefully after updating 'next' and possibly also pushing out thefirst batch of the new cycle. There is no designated interimmaintainer this time, but I trust that the community can selforganize during my absense, if the shape of the release and the treeturns out to be super bad ;-).


  • Arch Linux now has a reproducible container image
    Robin Candau has announcedthe availability of a bit-for-bit reproducible container image forArch Linux:

    The bit-for-bit reproducibility of the image is confirmed by digestequality across builds (podman inspect --format '{{.Digest}}'<image>) and by running diffocito compare builds. We provide documentation on how to reproduce thisDocker image (as we did for the WSL image as well).

    Building the base rootFS for the Docker image in a deterministic way was the main challenge, but it reuses the same process as for our WSL image(as both share the same rootFS build system).

    [...] This represents another meaningful achievement in our"reproducible builds" efforts and we're already looking forward to thenext step!


  • [$] Digging into drama at The Document Foundation
    The Document Foundation (TDF) isthe nonprofit entity behind the LibreOffice productivity suite. Most of thetime, the software takes the spotlight, but that has changed in the past few weeks, andnot for pleasant reasons. TDF has revokedfoundation membership status from about 30 people who work for or havecontracting status with Collabora. Inresponse, Collabora has announcedplans to focus on a "entirely new, cut-down, differentiated Collabora Office"project and reduce its involvement with LibreOffice. TDF's representatives claim thatits actions were necessary to maintain the foundation's nonprofit status, while othercommunity members assert that this is part of a power grab. The facts seem toindicate that there are legitimate issues to be addressed, but it is unclearthat TDF needed to go so far as to disenfranchise all Collabora-affiliated contributors.



  • Security updates for Monday
    Security updates have been issued by AlmaLinux (.NET 10.0, .NET 8.0, .NET 9.0, delve, freerdp, giflib, go-rpm-macros, libarchive, and openexr), Debian (gimp, imagemagick, luanti, mapserver, mupdf, opam, perl, pillow, postgresql-13, and tiff), Fedora (aqualung, awstats, curl, incus, mac, mbedtls, mingw-LibRaw, python-msal, python3.11, python3.12, python3.15, smb4k, stb, and usd), Gentoo (DTrace and FUSE), Mageia (gdk-pixbuf2.0, giflib, polkit-122, python-cairosvg, and rsync), Oracle (.NET 10.0, .NET 8.0, .NET 9.0, 389-ds-base, bind, freerdp, go-rpm-macros, kernel, libarchive, nodejs:20, openexr, perl:5.32, python, python3, squid:4, thunderbird, and uek-kernel), Slackware (tigervnc), and SUSE (aardvark-dns, avahi, bind, blender, Botan, bouncycastle, chromedriver, cpp-httplib-devel, flannel, gdk-pixbuf, GraphicsMagick, ignition, ImageMagick, jetty-annotations, jetty-minimal, kernel, kubo, leancrypto-devel, libcap, liblog4cxx-devel, libpng16-16, libraw, libraw-devel, NetworkManager, opam, openssl-3, openvswitch, openvswitch3, podman, polkit, python-cryptography, python-djangorestframework, python-Django, python-ecdsa, python311-Django, python311-jwcrypto, python311-Pillow, roundcubemail, skopeo, tempo-cli, and vim).


  • Seven stable kernels for Saturday
    Greg Kroah-Hartman has announced the release of the 6.19.13, 6.18.23, 6.12.82, 6.6.135, 6.1.169, 5.15.203, and 5.10.253 stable kernels. Each contains anumber of important fixes throughout the tree; users are advised toupgrade.



  • [$] A more efficient implementation of Shor's algorithm
    Shor's algorithm is the main practical example of an algorithm that runs morequickly on a quantum computer than a classical computer — at least in theory.Shor's algorithm allows large numbers to be factoredinto their component prime factors quickly.In reality, existing quantum computers do not have nearlyenough memory to factor interesting numbers using Shor's algorithm, despitedecades of research.A new paper provides a major stepin that direction, however. While still impractical on today's quantumcomputers, the recent discoverycuts the amount of memory needed to attack 256-bit elliptic-curve cryptographyby a factor of 20. More interesting, however, is that the researchers chose topublish a zero-knowledge proof demonstrating that they know a quantum circuitthat shows these improvements, rather than publishing the actualknowledge of how to do it.


  • [$] The 7.0 scheduler regression that wasn't
    One of the more significant changes in the 7.0 kernel release is to use the lazy-preemption mode by default in the CPUscheduler. The scheduler developers have wanted to reduce the number ofpreemption modes for years, and lazy preemption looks like a step towardthat goal. But then there came this reportfrom Salvatore Dipietro that lazy preemption caused a 50% performanceregression on a PostgreSQL benchmark. Investigation showed that thesituation is not actually so grave, but the episode highlights just howsensitive some workloads can be to configuration changes; there may besurprises in store for other users as well.


  • Security updates for Friday
    Security updates have been issued by AlmaLinux (.NET 8.0, .NET 9.0, freerdp, libarchive, and thunderbird), Debian (chromium, openssh, and thunderbird), Fedora (aurorae, bluedevil, breeze-gtk, buildah, cockpit, extra-cmake-modules, flatpak-kcm, grub2-breeze-theme, kactivitymanagerd, kcm_wacomtablet, kde-cli-tools, kde-gtk-config, kdecoration, kdeplasma-addons, kf6, kf6-attica, kf6-baloo, kf6-bluez-qt, kf6-breeze-icons, kf6-frameworkintegration, kf6-kapidox, kf6-karchive, kf6-kauth, kf6-kbookmarks, kf6-kcalendarcore, kf6-kcmutils, kf6-kcodecs, kf6-kcolorscheme, kf6-kcompletion, kf6-kconfig, kf6-kconfigwidgets, kf6-kcontacts, kf6-kcoreaddons, kf6-kcrash, kf6-kdav, kf6-kdbusaddons, kf6-kdeclarative, kf6-kded, kf6-kdesu, kf6-kdnssd, kf6-kdoctools, kf6-kfilemetadata, kf6-kglobalaccel, kf6-kguiaddons, kf6-kholidays, kf6-ki18n, kf6-kiconthemes, kf6-kidletime, kf6-kimageformats, kf6-kio, kf6-kirigami, kf6-kitemmodels, kf6-kitemviews, kf6-kjobwidgets, kf6-knewstuff, kf6-knotifications, kf6-knotifyconfig, kf6-kpackage, kf6-kparts, kf6-kpeople, kf6-kplotting, kf6-kpty, kf6-kquickcharts, kf6-krunner, kf6-kservice, kf6-kstatusnotifieritem, kf6-ksvg, kf6-ktexteditor, kf6-ktexttemplate, kf6-ktextwidgets, kf6-kunitconversion, kf6-kuserfeedback, kf6-kwallet, kf6-kwidgetsaddons, kf6-kwindowsystem, kf6-kxmlgui, kf6-modemmanager-qt, kf6-networkmanager-qt, kf6-prison, kf6-purpose, kf6-qqc2-desktop-style, kf6-solid, kf6-sonnet, kf6-syndication, kf6-syntax-highlighting, kf6-threadweaver, kgamma, kglobalacceld, kinfocenter, kmenuedit, knighttime, kpipewire, krdp, kscreen, kscreenlocker, ksshaskpass, ksystemstats, kwayland, kwayland-integration, kwin, kwin-x11, kwrited, layer-shell-qt, libexif, libkscreen, libksysguard, libplasma, nix, ocean-sound-theme, oxygen-sounds, pam-kwallet, plasma-activities, plasma-activities-stats, plasma-breeze, plasma-browser-integration, plasma-desktop, plasma-dialer, plasma-discover, plasma-disks, plasma-drkonqi, plasma-firewall, plasma-integration, plasma-keyboard, plasma-login-manager, plasma-milou, plasma-mobile, plasma-nano, plasma-nm, plasma-oxygen, plasma-pa, plasma-print-manager, plasma-sdk, plasma-setup, plasma-systemmonitor, plasma-systemsettings, plasma-thunderbolt, plasma-vault, plasma-welcome, plasma-workspace, plasma-workspace-wallpapers, plasma-workspace-x11, plasma5support, plymouth-kcm, plymouth-theme-breeze, podman, polkit-kde, powerdevil, qqc2-breeze-style, sddm-kcm, skopeo, spacebar, spectacle, thunderbird, and xdg-desktop-portal-kde), Mageia (cockpit-338), Oracle (capstone, cockpit, firefox, fontforge, freerdp, golang-github-openprinting-ipp-usb, kernel, nghttp2, nodejs:20, nodejs:24, openexr, and squid), Red Hat (gnutls, libarchive, libpng, libpng12, libpng15, libtiff, libvpx, libxslt, multiple packages, python, python3, python3.11, python3.12, and python3.9), Slackware (libxml2), SUSE (apache-pdfbox, azure-storage-azcopy, corosync, cups, freerdp, iproute2, libsdb2_4_2, libtpms, NetworkManager, openssl-1_1, ovmf, plexus-utils, python, python-CairoSVG, python-jwcrypto, python-PyJWT, python-pyOpenSSL, python-urllib3, python3, python314, rust1.93, shim, smc-tools, terraform-provider-local, terraform-provider-random, terraform-provider-tls, thunderbird, tiff, util-linux, and vim), and Ubuntu (libowasp-esapi-java, linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gke, linux-gkeop, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-oracle, linux, linux-aws, linux-aws-6.8, linux-gcp, linux-gke, linux-gkeop, linux-ibm, linux-lowlatency, linux-lowlatency-hwe-6.8, linux, linux-realtime, linux-aws-fips, linux-fips, linux-gcp-fips, linux-fips, linux-gcp-fips, linux-gcp, linux-gcp-6.17, linux-hwe-5.15, linux-intel-iot-realtime, linux-realtime, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-nvidia-tegra, linux-nvidia-tegra, linux-nvidia-tegra-igx, linux-realtime, linux-realtime-6.8, linux-realtime-6.17, ofono, and ruby-rack).


  • Rust 1.95.0 released
    Version1.95.0 of the Rust language has been released. Changes include theaddition of a cfg_select!macro, the capability releasenotes for a full list of changes.



  • Forgejo 15.0 released
    Version15.0 of the Forgejocode-collaboration platform has been released. Changes includerepository-specific access tokens, a number of improvements to ForgejoActions, user-interface enhancements, and more. Forgejo 15.0 isconsidered a long-term-support (LTS) release, and will be supportedthrough July 15, 2027. The previous LTS, version 11.0, will reach endof life on July 16, 2026. See the announcement and releasenotes for a full list of changes.



  • [$] The first half of the 7.1 merge window
    The 7.1 merge window opened on April 12 with the releaseof the 7.0 kernel. Since then, 3,855 non-merge changesets have beenpulled into the mainline repository for the next release. This mergewindow is thus just getting started, but there has still been a fair amountof interesting work moving into the mainline.


  • KDE Gear 26.04 released
    Version 26.04 ofthe KDE Gear collection of applications has been released. Notable changesinclude improvements in the MerkuroCalendar schedule view and event editor, support for threads in the NeoChat Matrix chat client, as well asthe ability to add keyboard shortcuts in the Dolphin file manager "to nearly anyoption in any menu, plugin or extension". See the changelog fora full list of updates, enhancements, and bug fixes.



  • Security updates for Thursday
    Security updates have been issued by AlmaLinux (bind, bind9.16, bind9.18, cockpit, fence-agents, firefox, fontforge, git-lfs, grafana, grafana-pcp, kernel, nghttp2, nginx, nginx:1.24, nginx:1.26, nodejs:20, nodejs:22, nodejs:24, pcs, perl-XML-Parser, perl:5.32, resource-agents, squid:4, thunderbird, and vim), Debian (incus, lxd, and python3.9), Fedora (cef, composer, erlang, libpng, micropython, mingw-openexr, moby-engine, NetworkManager-ssh, perl, perl-Devel-Cover, perl-PAR-Packer, polymake, pypy, python-cairosvg, python-flask-httpauth, and python3.15), Mageia (kernel, kmod-virtualbox, kmod-xtables-addons and kernel-linus), Oracle (\cockpit, bind, bind9.16, bind9.18, firefox, git-lfs, go-toolset:ol8, grafana, grafana-pcp, grub2, kea, kernel, libtiff, nghttp2, nginx, nginx:1.24, nginx:1.26, nodejs22, nodejs24, nodejs:22, nodejs:24, perl-XML-Parser, python3.9, thunderbird, uek-kernel, and vim), Red Hat (delve, go-toolset:rhel8, golang, golang-github-openprinting-ipp-usb, osbuild-composer, and rhc), SUSE (bind, Botan, cockpit, cockpit-subscriptions, expat, flatpak, glibc, goshs, himmelblau, kea, kernel, kubo, libpng16, libssh, log4j, mariadb, Mesa, netty, netty-tcnative, nfs-utils, nghttp2, nodejs20, openssl-3, pam, pcre2, python, python310, python311, python311-aiohttp, python311-rfc3161-client, python313, python36, rubygem-bundler, sqlite3, sudo, tigervnc, tomcat, tomcat10, tomcat11, util-linux, vim, and webkit2gtk3), and Ubuntu (dotnet8, dotnet9, dotnet10, frr, and linux-azure, linux-azure-4.15).


  • [$] LWN.net Weekly Edition for April 16, 2026
    Inside this week's LWN.net Weekly Edition:
    Front: LLM security reports; OpenWrt One build system; Vim forks; removing read-only THPs; 7.0 statistics; MusicBrainz Picard. Briefs: OpenSSL 4.0.0; Relicensing; Servo; Zig 0.16.0; Quotes; ... Announcements: Newsletters, conferences, security updates, patches, and more.


LXer Linux News



  • New Android development tool designed for robots, not humans
    Google previews Android CLI as agentic development continues to snowballGoogle has introduced a new Android command-line interface built specifically for AI agents, claiming a 70 percent cut in token usage and three times reduction in task completion time.…





  • Attribution or Restriction? The OnlyOffice vs Euro-Office AGPLv3 Licensing Dispute
    The four freedoms granted by the license are supreme and paramount, and their protection must be ensured. GPLv3 was structured to prevent licensors from using additional terms as a backdoor to reintroduce restrictions that the licence was intended to eliminate.The intent behind GPLv3, and by extension AGPLv3, is unusually well-documented. The drafting process was explicitly aimed at preventing licensors from imposing downstream restrictions that would inhibit modification, redistribution, or independent development.


  • Banana Pi BPI-OM7 3D camera kit pairs RK3588 with Orbbec Gemini 2
    Banana Pi has provided initial details about the BPI-OM7 3D camera kit, which combines the BPI-M7 single-board computer with an Orbbec Gemini 2 3D camera for computer vision, robotics, and spatial perception applications. The system is built around the Rockchip RK3588 processor, which integrates four Cortex-A76 cores clocked at up to 2.4 GHz and four […]




  • M5Stack previews CardputerZero handheld Raspberry Pi CM0 system
    M5Stack has teased the CardputerZero, a compact handheld system built around the Raspberry Pi CM0. The device integrates a display, keyboard, battery, and wireless connectivity into a credit card-sized form factor intended for portable Linux-based development and command-line tasks. The platform uses the Broadcom BCM2837 SoC, featuring a quad-core Cortex-A53 processor operating at up to […]











Error: It's not possible to reach RSS file http://services.digg.com/2.0/story.getTopNews?type=rss&topic=technology ...

Slashdot

  • Mobile Phones To Be Banned In Schools In England Under New Plans
    An anonymous reader quotes a report from the Guardian: A ban on mobile phones in schools in England is to be introduced by the government to ensure that "critical safeguarding legislation" is passed. The government will table an amendment to the children's wellbeing and schools bill in the House of Lords after the bill was held up by peers on opposition benches. It will make existing guidance on mobile phone bans in schools statutory, a move that ministers have resisted until now. The government had consistently argued that the vast majority of schools had already banned mobile phones, and that there was no need to add a legal requirement. They finally capitulated, however, describing it as "a pragmatic measure" to get the bill through. [...] The bill is regarded by many as the biggest piece of child protection legislation in decades and includes proposals for a compulsory register for children who are not in school, a crackdown on profiteering in children's social care, and a "single unique identifier" to help agencies track a child's welfare.


    Read more of this story at Slashdot.


  • Apple CEO Tim Cook Is Stepping Down
    Apple announced that Tim Cook will step down as CEO in September after 15 years in the role, handing the job to hardware chief John Ternus. Longtime Slashdot reader sinij shares the news from MarketWatch: Cook leaves an impressive legacy after growing the company to a $4 trillion market capitalization from just $300 billion 15 years ago. Over Cook's 15-year tenure as CEO, Apple's stock has risen 1,932%, beating the S&P 500's 504% increase, according to Dow Jones Market Data. That places Apple's stock as the 38th best-performing member of the index over that period of time. Cook had big shoes to fill, replacing Apple's iconic founder, Steve Jobs, as CEO. Cook's successor, John Ternus, Apple's senior vice president of hardware engineering, will need to guide Apple's through uncharted waters as the company navigates its artificial-intelligence transition and supply-chain constraints. Cook will remain at Apple as executive chairman. "It has been the greatest privilege of my life to be the CEO of Apple and to have been trusted to lead such an extraordinary company. I love Apple with all of my being, and I am so grateful to have had the opportunity to work with a team of such ingenious, innovative, creative, and deeply caring people who have been unwavering in their dedication to enriching the lives of our customers and creating the best products and services in the world," said Cook. "John Ternus has the mind of an engineer, the soul of an innovator, and the heart to lead with integrity and with honor. He is a visionary whose contributions to Apple over 25 years are already too numerous to count, and he is without question the right person to lead Apple into the future. I could not be more confident in his abilities and his character, and I look forward to working closely with him on this transition and in my new role as executive chairman." As for Ternus' replacement, the role of Chief Hardware Officer will be awarded to Apple executive Johny Srouji. "Srouji, who most recently served as senior vice president of Hardware Technologies, will assume an expanded role leading Hardware Engineering, which John Ternus most recently oversaw, as well as the hardware technologies organization," said Apple in a press release.


    Read more of this story at Slashdot.


  • Former Palantir Employee Running For Congress Unveils 'AI Dividend' Plan
    Alex Bores, a former Palantir employee and current Democratic House candidate in New York, is proposing an "AI dividend" that would send direct payments to Americans if AI drives major job losses. "At its core, the AI Dividend is simple: if AI dramatically increases productivity and concentrates wealth, the American people have a stake in those gains," a memo on the policy reads. Axios reports: The dividend would fund direct payments to Americans. It would also be invested into workforce training and education, as well as government capacity to "govern AI safely and fund independent oversight," per the plan memo. "You don't take out fire insurance because you expect your house to burn down -- you have insurance in case something goes awry," Bores told Axios in an interview. "Here we have, for the first time, a technology where the makers of the technology are explicitly saying that their goal is to replace all human labor." "The fact that they've put it out there means government needs to take it seriously." [...] The proposal would be funded through:- A token tax, described in the memo as a "modest tax on AI consumption"- Equity participation in frontier AI firms- Changes to the tax code that would reduce incentives to invest in AI "when it leads to less work" "If [AI companies] they can support this plan, that would show that they actually believe in what they're putting out there," Bores said. "If they're not doing it, then I think it shows that they're really putting window dressing out there." Further reading: Palantir Posts Bond Villain Manifesto On X


    Read more of this story at Slashdot.


  • Deezer Says 44% of Songs Uploaded To Its Platform Daily Are AI-Generated
    Deezer says AI-generated songs now make up 44% of all new uploads to its platform, with nearly 75,000 arriving each day and more than two million per month. The company notes that consumption of these tracks is still very low, "between 1-3% of the total streams," and 85% are flagged as fraudulent. TechCrunch reports: The latest figure from Deezer highlights a continuous surge in AI-generated music uploads to the platform. Deezer reported receiving around 60,000 AI tracks per day in January, up from 50,000 in November, 30,000 in September, and just 10,000 in January 2025, when it first launched its AI-music detection tool. Songs tagged as AI-generated on Deezer are automatically removed from algorithmic recommendations and not included in editorial playlists. The company announced today that it will no longer store hi-res versions of AI tracks. "AI-generated music is now far from a marginal phenomenon and as daily deliveries keep increasing, we hope the whole music ecosystem will join us in taking action to help safeguard artists' rights and promote transparency for fans," said Deezer CEO Alexis Lanternier in a press release. "Thanks to our technology and the proactive measures we put in place more than a year ago, we have shown that it's possible to reduce AI-related fraud and payment dilution in streaming to a minimum."


    Read more of this story at Slashdot.


  • Trump Administration Begins Refunding $166 Billion In Tariffs
    "After a Supreme Court of the United States ruling in Feb. 2026, many tariffs imposed by the Trump administration were declared illegal because the president overstepped his authority," writes Slashdot reader hcs_$reboot. "As a result, the U.S. government now has to refund a massive amount of money, around $160-170+ billion, paid mainly by importers." According to the New York Times, the administration has now begun accepting refund requests, "surrendering its prized source of revenue -- plus interest." From the report: For some U.S. businesses, the highly anticipated refunds could be substantial, offering critical if belated financial relief. Tariffs are taxes on imports, so the president's trade policies have served as a great burden for companies that rely on foreign goods. Many have had to choose whether to absorb the duties, cut other costs or pass on the expenses to consumers. By Monday morning, those companies can begin to submit documentation to the government to recover what they paid in illegal tariffs. In a sign of the demand, more than 3,000 businesses, including FedEx and Costco, have already sued the Trump administration in a bid to secure their refunds, with some cases filed even before the Supreme Court's ruling. But only the entities that officially paid the tariffs are eligible to recover that money. That means that the fuller universe of people affected by Mr. Trump's policies -- including millions of Americans who paid higher prices for the products they bought -- are not able to apply for direct relief. The extent to which consumers realize any gain hinges on whether businesses share the proceeds, something that few have publicly committed to do. Some have started to band together in class-action lawsuits in the hopes of receiving a payout. Many business owners said they weren't sure how easy the tariff refund process would be, particularly given Mr. Trump's stated opposition to returning the money. The administration has suggested that it may be months before companies see any money. Adding to the uncertainty, the White House has declined to say if it might still try to return to court in a bid to halt some or all of the refunds. The money will mostly go to importers and companies, since they were the ones that directly paid the tariffs. While individual refunds with interest could take around 60 to 90 days to process, the overall effort will probably move much more slowly because of how large and complicated it will be. There are also legal questions around whether companies would have to pass any of that money on to consumers. Slashdot reader AmiMoJo commented: "This is perhaps the biggest transfer of wealth in American history. Most of those companies will just pocket the refund and not pass any of it on to the consumer. If prices go down at all, they won't be back to pre-tariff levels. You paid the tariffs, but you ain't getting the refund."


    Read more of this story at Slashdot.


  • Palantir Posts Bond Villain Manifesto On X
    DeanonymizedCoward writes: Engadget reports that Palantir has posted to X a summary of CEO Alex Karp and Nicholas W. Zamiska's 2025 book, The Technological Republic, which reads like a utopian idealist doodled on a Bond villain's whiteboard. While the post makes some decent points, it also highlights the Big-AI attitude that the AI surveillance state is in fact a good thing, and strongly implies that the Good Guys need to do war crimes before the Bad Guys get around to it. "The ability of free and democratic societies to prevail requires something more than moral appeal," one of the 22 points states. "It requires hard power, and hard power in this century will be built on software." The book is billed as "a passionate call for the West to wake up to our new reality," and other excerpts in the social media post include assertions such as: "Free email is not enough. The decadence of a culture or civilization, and indeed its ruling class, will be forgiven only if that culture is capable of delivering economic growth and security for the public"; "National service should be a universal duty"; "The postwar neutering of Germany and Japan must be undone"; and "Some cultures have produced vital advances; others remain dysfunctional and regressive." The statement criticizes the West's resistance to "defining national cultures in the name of inclusivity," as well as the treatment of billionaires and the "ruthless exposure of the private lives of public figures."


    Read more of this story at Slashdot.


  • Allbirds' Move To AI Has Echoes of the Dot-Com Frenzy
    An anonymous reader quotes a report from Bloomberg, written by writer Austin Carr: Allbirds is pivoting to artificial intelligence. The San Francisco brand, whose wool running shoes were once the sneaker du jour among the tech crowd, announced last week that it was expanding into AI computing infrastructure. The bizarre strategic shift was immediately greeted with a surprising frenzy on Wall Street, where shares of Allbirds soared 582% last Wednesday before dropping the next day. [...] Of course, the absurdity of Allbirds' situation echoed familiar Silicon Valley tropes -- from the endless startup pivots of the 2010s to the more recent boom-and-bust cycles of arbitrarily valued crypto coins. But it immediately reminded me of the marketing ploys of the dot-com crash. After all, some of the more iconic fails ended up being retailers such as Pets.com, Webvan, etc., riding the web wave with little to show for it beyond terrible margins. One particular comparison from that period stands out as relevant to Allbirds: Zap.com. The holding company behind it, Zapata Corp., had a long and convoluted history, but was essentially selling fish-oil products by the time it decided to reinvent itself as an internet portal. It amassed a variety of web properties -- in media, e-commerce, gaming and so on -- and even once tried to acquire the search engine Excite. Spoiler alert: Zap flopped. Jen Heck, then a young employee at one of Zap's up-and-coming portfolio entities, remembers how quickly the hype of that web 1.0 turned to hell. As absurd as Zapata's pivot sounds today, it seemed feasible during the excitement of the internet revolution. "We went from like, 'Wow, this life thing is just so easy,' to it all ending so suddenly," Heck recalls. The ones who survived that tech bubble, she says, actually had differentiated products and the right creative thinkers building them -- and weren't just cynically jumping on the latest hot trend. "'Internet' was the magic word then, and 'AI' is the magic word now," Heck says.


    Read more of this story at Slashdot.


  • NSA Using Anthropic's Mythos Despite Blacklist
    Axios reports that the NSA is using Anthropic's restricted Mythos Preview model despite the Pentagon insisting the company poses a "supply chain risk." Axios reports: The government's cybersecurity needs appear to be outweighing the Pentagon's feud with Anthropic. The department moved in February to cut off Anthropic and force its vendors to follow suit. That case is ongoing. The military is now broadening its use of Anthropic's tools while simultaneously arguing in court that using those tools threatens U.S. national security. Two sources said the NSA was using Mythos, while one said the model was also being used more widely within the department. It's unclear how the NSA is currently using Mythos, but other organizations with access to the model are using it predominantly to scan their own environments for exploitable security vulnerabilities. Anthropic restricted access to Mythos to around 40 organizations, contending that its offensive cyber capabilities were too dangerous to allow for a wider release. Anthropic only announced 12 of those organizations. One source said the NSA was among the unnamed agencies with access. The NSA's counterparts in the U.K. have said they have access to the model through the country's AI Security Institute. Anthropic's CEO met with top U.S. officials on Friday to discuss "opportunities for collaboration," according to a White House spokesperson, "as well as shared approaches and protocols to address the challenges associated with scaling this technology."


    Read more of this story at Slashdot.


  • Robots Beat Human Records At Beijing Half-Marathon
    An anonymous reader quotes a report from TechCrunch: The winning runner at a Beijing half-marathon for humanoid robots finished the race today in 50 minutes and 26 seconds -- significantly faster than the human world record of 57 minutes recently set by Jacob Kiplimo. [...] [T]he winning time is a massive improvement over last year's race, when the fastest robot finished in two hours and 40 minutes. The Associated Press reports that this year's winner was built by Chinese smartphone maker Honor. It seems the winning robot wasn't actually the fastest, as a different Honor robot finished in 48 minutes and 19 seconds. But that one was remote controlled -- the 50:26 robot was autonomous and won due to weighted scoring. About 40% of participating robots competed autonomously, while the remaining 60% were remote controlled, according to Beijing's E-Town tech hub. Not all of them did as well as Honor's robots, with one robot falling at the starting line and another hitting a barrier.


    Read more of this story at Slashdot.


  • Videos Catch Amazon Delivery Drones Dropping Packages From 10 Feet in the Air
    There's been a few complaints about Amazon's drone delivery service. "The automated mailmen are dropping off packages from 10 feet in the air," reports the New York Post, "rendering the contents of each box susceptible to crashing and smashing." One example? Tamara Hancock filmed a drone delivering a bottle of Torani flavoring syrup to her home in Arizona (as a test of how Amazon handled fragile items). It was delivered it in a plastic bottle — not glass — but the massive drone drops the drone from so high that the impact cracked the bottle's cap. (In the video Hancock opens her delivery to find leaked flavoring syrup "everywhere.") The delivery was hard to film, Hancock says, because "If the drone sees me in the back yard, it will not drop, because it is worried about hurting humans or animals." The Post notes Amazon's "AI-charged fleet" of drones are "Outfitted with industry-leading 'sense and avoid' technology, the aerodynamic machines are equipped to drop off eligible items, weighing a maximum of five pounds, at designated areas in 60 minutes or less."The high-tech, however, apparently does not ensure gentle landings. Collisions, including a recent crash-and-burn into a Texas building, as well as several mid-flight malfunctions in rainy weather, have abounded since the drones' inaugural launch.... Tasha, a separate Amazon user, spotted the drone plunging a package near the paved driveway of a neighbor's yard. Unfortunately, its propellers caused other, previously delivered parcels to blow away, sending one into the street... In a statement to The Post, Amazon said it apologized for one of the "rare instances when products don't arrive as expected." Amazon's drone fleet has been running since late 2024, the Post adds, and are now offering "ultra-fast" shipping in U.S. states including Arizona, Florida, Michigan, Kansas and Texas. The machines do seem massive. I'm surprised neighbors aren't complaining about the noise...


    Read more of this story at Slashdot.


  • Zoom Partners With Sam Altman's Iris-Scanning Company To Offer Callers Verifications of Humanness
    Zoom "has partnered with World, Sam Altman's iris-scanning identity company (previously known as Worldcoin), " reports Digital Trends, "to add real-time human verification inside meetings."Zoom is now inviting organizations to join the beta version of the rollout, which Digital Trends says "lets hosts confirm that every face on the call belongs to a real person, not an AI-generated imposter. "For those wondering how World's Deep Face technology works, it includes a three-step process. It cross-references a signed image from a user's original Orb registration, a live face scan from the device, and the frame of the video that's visible to the other participants in the meeting. Only when the three samples match does a "Verified Human" badge appear next to the user's name... Hosts can also make Deep Face verification mandatory for joining meetings, preventing unverified participants from joining entirely. Mid-call, on-the-spot checks are also possible...


    Read more of this story at Slashdot.


  • Brave Browser Introduces 'Origin', a Pay-Once 'Minimalist' Browser
    The Brave browser "has introduced Brave Origin, a stripped-down version of its browser that removes built-in monetization features like Rewards and other extras tied to its business model," writes Slashdot reader BrianFagioli"The stripped-down browser is available either as a separate browser download or as an upgrade to the existing Brave install, unlocked through a one-time purchase that can be activated across multiple devices. The idea is simple on paper: pay once, and you get a cleaner, more minimal browsing experience without the add-ons that fund Brave's ecosystem. What makes the move unusual is the pricing model itself. While paying to support a browser is not controversial, charging users specifically to remove features raises questions about whether those additions are seen as value or clutter. The situation gets even stranger on Linux, where Brave Origin is reportedly available at no cost, creating an uneven experience across platforms and leaving some users wondering why they are being asked to pay for something others get for free.


    Read more of this story at Slashdot.


  • Blue Origin Rocket Launches, Successfully Reuses Booster - But Loses Satellite
    SpaceNews reports:Blue Origin's New Glenn suffered a malfunction of its second stage on the rocket's third flight April 19, stranding its payload in an unrecoverable "off-nominal" orbit and dealing the company a setback as it seeks to increase its flight rate... AST SpaceMobile had planned to launch 45 to 60 satellites this year for its D2D constellation, but BlueBird 7 is the first to launch since BlueBird 6 launched on an Indian LVM3 rocket in December. AST SpaceMobile still expects to have 45 satellites in orbit by the end of the year, the article notes. (In an earnings call in March, AST SpaceMobile's CEO had promised they'd soon start "stacking" satellites, "batched in groups of either three, four, six or eight in a single launch.") He'd added that "To support our launch cadence during 2026, we expect the New Glenn booster to be reused every 30 days or less..." There's some good news there, SpaceNews points out, since today saw the first successful reflight of a New Glenn first stage rocket:The booster, called "Never Tell Me The Odds" by Blue Origin, touched down on the company's landing platform, Jacklyn, in the Atlantic Ocean nearly nine and a half minutes after liftoff. The booster launched NASA's ESCAPADE Mars mission on the NG-2 flight in November. However, the booster reuse on NG-3 was only partial since the stage's biggest component, its BE-4 engines, was new. "With our first refurbished booster we elected to replace all seven engines and test out a few upgrades including a thermal protection system on one of the engine nozzles," Dave Limp, chief executive of Blue Origin, said in an April 13 social media post. "We plan to use the engines we flew for NG-2 on future flights." The satellite will now be "de-orbited", AST SpaceMobile said in a statement. (They added that "The cost of the satellite is expected to be recovered under the company's insurance policy.") Thanks to long-time Slashdot reader schwit1 for sharing the news.


    Read more of this story at Slashdot.


  • Voyager 1 is Running Out of Power. NASA Just Switched Part of It Off
    After 49 years of space travel, Voyager 1 "is running out of power," reports NPR:The spacecraft runs on a radioisotope thermoelectric generator — a device that converts heat from decaying plutonium into electricity. It carries no solar panels, no rechargeable batteries. Just the slow, steady release of nuclear warmth, which diminishes by about 4 watts each year. After nearly five decades, that decline has become critical. During a routine maneuver in late February, Voyager 1's power levels fell unexpectedly, bringing the probe dangerously close to triggering an automatic fault-protection shutdown — a self-preservation response that would have forced engineers into a lengthy and risky recovery process. The team needed to act first. On April 17, mission engineers sent a sequence of commands to deactivate the Low-energy Charged Particles experiment, known as the LECP, which is one of Voyager 1's remaining science instruments. The LECP has measured ions, electrons, and cosmic rays originating from both our solar system and the galaxy beyond it, helping scientists map the structure of interstellar space in a way no other instrument could... Voyager 1 now carries two operational science instruments: one that listens for plasma waves, and one that measures magnetic fields. Engineers believe the latest shutdown could buy the mission roughly another year of breathing room. The team is also developing a more sweeping power conservation plan they informally call "the Big Bang" — a coordinated swap of several powered components all at once, trading older systems for lower-power alternatives. If testing on Voyager 2, planned for May and June 2026, goes well, the same procedure will be attempted on Voyager 1 no sooner than July. If it works, there is even a slim chance the LECP could once more continue to work. The engineers say they hope to keep at least one instrument operating on each spacecraft into the 2030s. It would leave both still reporting from places no machine has ever gone before.111 Voyager 1 is now 15 billion miles from Earth, the article points out. (Radio signals take 23 hours to arrive...) Thanks to long-time Slashdot reader fahrbot-bot for sharing the article.


    Read more of this story at Slashdot.


  • Nobel Prize-Winning Physicist Predicts Humankind Won't Survive Another 50 Years
    Live Science spoke with physicist David Gross, who today received the $3 million "Special Breakthrough Prize in Fundamental Physics". He was part of a trio that won the 2004 physics Nobel prize for research that helped complete the Standard Model of particle physics. But when asked if physics will reach a unified theory of the fundamental forces of nature within 50 years, Gross has a surprising answer. "Currently, I spend part of my time trying to tell people... that the chances of you living 50 [more] years are very small." Cold War estimates for a 1% chance of nuclear war each year seem low, Gross says. "The chances are more likely 2%. So that's a 1-in-50 chance every year."David Gross: The expected lifetime, in the case of 2% [per year], is about 35 years. [The expected lifetime is the average time it would take to have had a nuclear war by then. It is calculated using similar equations as those used to determine the "half-life" of a radioactive material.] Live Science: So what do you suggest as remedies to lower that risk? Gross: We had something called the Nobel Laureate Assembly for reducing the risk of nuclear war in Chicago last year. There are steps, which are easy to take — for nations, I mean. For example, talk to each other. In the last 10 years, there are no treaties anymore. We're entering an incredible arms race. We have three super nuclear powers. People are talking about using nuclear weapons; there's a major war going on in the middle of Europe; we're bombing Iran; India and Pakistan almost went to war. OK, so that's increased the chance [of nuclear war]. I would really like to have a solid estimate — it might be more, and I think I'm being conservative — but a 2% estimate [of nuclear war] in today's crazy world. Live Science: Do you think we'll ever get to a place where we get rid of nuclear weapons? Gross: We're not recommending that. That's idealistic, but yes, I hope so. Because if you don't, there's always some risk an AI 100 years from now [could launch nuclear weapons], but chances of [humanity] living, with this estimate, 100 years, is very small, and living 200 years is infinitesimal. So [the answer to] Fermi's question of "Where are the civilizations, all the intelligent organisms around the galaxy, and why don't they talk to us?" is that they've killed themselves... There are now nine nuclear powers. Even three is infinitely more complicated than two. The agreements, the norms between countries, are all falling apart. Weapons are getting crazier. Automation, and perhaps even AI, will be in control of those instruments pretty soon... It's going to be very hard to resist making AI make decisions because it acts so fast. He points out that with the threat of climate change, "people have done something," even though "It's a much harder argument to make than about nuclear weapons. "We made them; we can stop them." Thanks to hwstar (Slashdot reader #35,834) for sharing the article.


    Read more of this story at Slashdot.


The Register

  • Microsoft's GitHub grounds Copilot account sign-ups amid capacity crunch
    Remember what we promised when you subscribed for a year? Well, we've got a new deal that's better for us.
    Microsoft's GitHub has stopped accepting new Copilot individual subscriptions while the code hosting biz figures out how it can meet its service commitments without breaking the bank.…


  • Vibe coding upstart Lovable denies data leak, cites 'intentional behavior,' then throws HackerOne under the bus
    A lesson in how not to respond to vulnerability reports
    Vibe-coding platform Lovable is pooh-poohing a researcher’s finding that anyone could open a free account on the service and read other users' sensitive info, including credentials, chat history, and source code. However, the company’s story keeps changing: First it attributed the publicly exposed info to "intentional behavior" and "unclear documentation," then threw bug-bounty service HackerOne under the bus.…


  • Trump-branded datacenter project fails to make itself great, again
    The struggles continue for Fermi America's 17 GW bit barn ambitions
    It’s been a weekend filled with dizzying changes in the boardroom at datacenter wannabe Fermi America as it hopes eventually to expand its West Texas campus to about 17 gigawatts of behind-the-meter generation capacity.…



  • Chase got a spiff of $77 million to create one job with New York datacenter
    Official involved in deal tells El Reg number doesn't paint entire picture of datacenter's economic benefit
    When Rockland County, New York, approved nearly $77 million in tax breaks for JPMorgan Chase's datacenter expansion in 2024, no one showed up to object. Two years and a whole lot of bit barns in the news cycle later, government watchdogs are calling foul over the project's lone permanent job.…


  • Claude Desktop changes app access settings for browsers you don't even have installed yet
    Installation and pre-approval without consent looks dubious under EU law
    One app should not modify another app without asking for and receiving your explicit consent. Yet Anthropic's Claude Desktop for macOS installs files that affect other vendors' applications without disclosure, even before those applications have been installed, and authorizes browser extensions without consent.…


  • Linux 7.1 will have an optional new NTFS driver
    Good news for those working with Windows, bad news for Paragon Software
    The feature list for Linux kernel 7.1 is taking shape, and a standout addition has already landed: a new read-write NTFS driver.…




  • Schmoozebots: study finds flattery will get AI everywhere
    Excessive friendliness may cause users to forget they're talking to a very confident autocomplete
    A study into how humans interact with chatbots suggests the fastest way to make an LLM feel human isn't making it smarter – it's making it seem nicer.…


  • One of Europe's sovereign cloud picks may not be so-sovereign after all
    US-based cloud providers could have to disclose certain data under American legal orders
    The European Commission has awarded four contracts designed to advance cloud sovereignty in the EU, but one uses services from S3NS, a joint venture between Thales and Google Cloud, raising questions about its real independence.…


  • New Android development tool designed for robots, not humans
    Google previews Android CLI as agentic development continues to snowball
    Google has introduced a new Android command-line interface built specifically for AI agents, claiming a 70 percent cut in token usage and three times reduction in task completion time.…



  • AI is reshaping Britain's datacenter map away from London
    Bit barns need to worry more about space, access to grid – overstuffed center no longer a must, say experts
    UK AI datacenter capacity could migrate away from London as power shortages, planning constraints and reduced reliance on low-latency connections to financial firms make other locations more attractive.…



  • HP's remote desktop push retreats as Anyware heads for end of life
    Workstations that made distant desktops feel local is headed for a slow shutdown
    HP is quietly pulling the plug on its Teradici-derived remote desktop business, shelving HP Anyware and its zero client hardware barely a few years after betting big on the tech as the backbone of its hybrid work push.…



  • Palantir's NHS future in doubt as ministers eye contract break
    £330M deal leaves service with no ownership of software built to connect trusts to the platform
    The UK government is considering ending Palantir's involvement in a central NHS data platform after coming under fire from MPs, unions, and campaigners.…



  • AI quota inflation is no token effort. It's baked in
    We've been here before. This time, we may not get out
    Opinion Fans of the creative arts often find out where creators gather to talk among themselves, then sneak in to eavesdrop on what those masters of the art talk about. Golden insights, daring concepts, cutting-edge thinking? Not a bit. Gossip, if you're lucky. Travel miseries, if you're not. Mostly, they talk about money.…


  • Next.js developer Vercel warns of customer credential compromise
    Blames outfit called Context.ai, which reckons an agentic OAuth tangle caused the incident
    Vercel, the company that created the open source Next.js web development framework, has a data leak that led to compromise of some customer credentials, and blamed an outfit called Context.ai for the mess.…


  • 'Invisible mouse' made a mess of PC rebuild
    You can't fix what you can't see – especially when your workspace is a maelstrom
    Who, Me? Welcome to yet another Monday, and therefore to this week's edition of Who, Me? For those unfamiliar, it's The Register's reader-contributed column that shares your stories of workplace messes, and how you tried to clean them up without dirtying your career prospects.…




  • Just like phishing for gullible humans, prompt injecting AIs is here to stay
    Aren't we all just prompting tokens of linguistic meaning and hoping the other person isn't bullshitting us?
    kettle It's a week of the year, which means there's been the discovery of yet another prompt injection attack that will force supposedly well-guarded AI bots to spill secrets by asking the right way. …


  • I meant to do that! AI vendors shrug off responsibility for vulns
    Passing the buck, and the blame, down the road shows lack of AI companies' maturity
    OPINION AI vendors: "You need to use AI to fight AI threats (and do everything else in your corporate IT environment)." Also AI vendors: "That's not a security flaw; it's working as intended."…



  • Cloudflare can remember it for you wholesale
    Agent Memory stores AI chat scraps off to the side and recalls them when needed
    Not only is hardware memory scarce these days, but context memory, the conversational data exchanged with AI models, can be an issue too.…




  • Anthropic mocks up Claude Design to draft fancy new pink slips for marketing teams
    The bar for creating visual assets has been lowered to the ability to converse with a model
    Anthropic is known for its industry-leading Claude Code that writes programs, but why stop there? The company, on Friday, introduced a research preview service called Claude Design that creates visual assets, potentially putting some folks out of work.…



  • Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker
    Or, how public information and a €5 tracker exposed an avoidable opsec lapse
    Militaries around the world spend countless hours training, developing policies, and implementing best operational security practices, so imagine the size of the egg on the face of the Dutch navy when journalists managed to track one of its warships for less than the cost of some hagelslag and a coffee.…







  • Would you like fries with that terminal?
    Jack might be on Track, but the order screen certainly isn't
    Bork!Bork!Bork! It was not so much Jack in the Box as Bork on the Screen at a US drive-through fast food outlet the other day. Luckily, a Reg reader was there to take it all in.…


  • Capita won disastrous UK pensions gig after acing performance checks
    Top civil servant tells MPs bid was strong on quality and value for money
    The UK government awarded Capita a £239 million contract to run the Civil Service Pension Scheme (CSPS) after assessing its past performance, despite the rollout later leaving thousands of retirees waiting for payments, a senior civil servant has said.…



  • Claude Opus wrote a Chrome exploit for $2,283
    Pause your Mythos panic because mainstream models anyone can use already pick holes in popular software
    Anthropic withheld its Mythos bug-finding model from public release due to concerns that it would enable attackers to find and exploit vulnerabilities before anyone could react.…






  • Mozilla throws Thunderbolt at enterprise AI providers
    Client connects to deepset's Haystack platform
    Mozilla has declared war on OpenAI, Microsoft, and other firms flogging enterprise AI platforms with an open-source alternative it says provides data privacy guarantees proprietary products never could. …


  • NodeWeaver says its perpetual licensing beats VMware’s perpetual price hikes
    'I think you can run this thing on a potato,' NodeWeaver CTO Alan Conboy said.
    Broadcom's price increases and policy changes have led many VMware customers to look for other options. Nodeweaver is positioning itself as an alternative for customers running computing workloads in far-flung edge locations, from cruise ships to solar farms in Sub-Saharan Africa, and it is taking cost out of the hardware needed as well.…




Polish Linux

  • Security: Why Linux Is Better Than Windows Or Mac OS
    Linux is a free and open source operating system that was released in 1991 developed and released by Linus Torvalds. Since its release it has reached a user base that is greatly widespread worldwide. Linux users swear by the reliability and freedom that this operating system offers, especially when compared to its counterparts, windows and [0]


  • Essential Software That Are Not Available On Linux OS
    An operating system is essentially the most important component in a computer. It manages the different hardware and software components of a computer in the most effective way. There are different types of operating system and everything comes with their own set of programs and software. You cannot expect a Linux program to have all [0]


  • Things You Never Knew About Your Operating System
    The advent of computers has brought about a revolution in our daily life. From computers that were so huge to fit in a room, we have come a very long way to desktops and even palmtops. These machines have become our virtual lockers, and a life without these network machines have become unimaginable. Sending mails, [0]


  • How To Fully Optimize Your Operating System
    Computers and systems are tricky and complicated. If you lack a thorough knowledge or even basic knowledge of computers, you will often find yourself in a bind. You must understand that something as complicated as a computer requires constant care and constant cleaning up of junk files. Unless you put in the time to configure [0]


  • The Top Problems With Major Operating Systems
    There is no such system which does not give you any problems. Even if the system and the operating system of your system is easy to understand, there will be some times when certain problems will arise. Most of these problems are easy to handle and easy to get rid of. But you must be [0]


  • 8 Benefits Of Linux OS
    Linux is a small and a fast-growing operating system. However, we can’t term it as software yet. As discussed in the article about what can a Linux OS do Linux is a kernel. Now, kernels are used for software and programs. These kernels are used by the computer and can be used with various third-party software [0]


  • Things Linux OS Can Do That Other OS Cant
    What Is Linux OS?  Linux, similar to U-bix is an operating system which can be used for various computers, hand held devices, embedded devices, etc. The reason why Linux operated system is preferred by many, is because it is easy to use and re-use. Linux based operating system is technically not an Operating System. Operating [0]


  • Packagekit Interview
    Packagekit aims to make the management of applications in the Linux and GNU systems. The main objective to remove the pains it takes to create a system. Along with this in an interview, Richard Hughes, the developer of Packagekit said that he aims to make the Linux systems just as powerful as the Windows or [0]


  • What’s New in Ubuntu?
    What Is Ubuntu? Ubuntu is open source software. It is useful for Linux based computers. The software is marketed by the Canonical Ltd., Ubuntu community. Ubuntu was first released in late October in 2004. The Ubuntu program uses Java, Python, C, C++ and C# programming languages. What Is New? The version 17.04 is now available here [0]


  • Ext3 Reiserfs Xfs In Windows With Regards To Colinux
    The problem with Windows is that there are various limitations to the computer and there is only so much you can do with it. You can access the Ext3 Reiserfs Xfs by using the coLinux tool. Download the tool from the  official site or from the  sourceforge site. Edit the connection to “TAP Win32 Adapter [0]


OSnews

  • Some tech company to replace its CEO
    I need to post about this because if I dont, people will get mad. Cook will continue on as Apple CEO through the summer, with Ternus set to join Apples Board of Directors and take over as CEO on September 1, 2026. Cook is going to transition to chairman of the board at Apple, and he will assist with certain aspects of the company, including engaging with policymakers around the world.! ↫ Juli Clover at MacRumors This concludes OSNews coverage of Keeping Up With the Yacht Class, but rest assured, every other tech site will be milking this for weeks to come. You will still be worrying about how to pay for your next tank of gas.


  • Google to punish back button hijacking
    Have you ever tried clicking the back button in your browser, only to realise the website youre on somehow doesnt allow that? Out of all the millions of annoyances on the web, Google has decided to finally address this one: theyre going to punish the search rankings of websites that use this back button hijacking. Pages that are engaging in back button hijacking may be subject to manual spam actions or automated demotions, which can impact the sites performance in Google Search results. To give site owners time to make any needed changes, were publishing this policy two months in advance of enforcement on June 15, 2026. ↫ Google Search Central Its always uncomfortable when Google unilaterally takes actions such as these, since rarely do Googles interests align with our own as users. This is in such rare case, though, and I cant wait to see this insipid practice relegated to the dustbin of history.


  • LXQt 2.4.0 released
    LXQt, the desktop environment which is effectively to KDE what Xfce is to GNOME, has released version 2.4.0. Quite a few changes in this release are further refinements and fixes related to LXQts adoption of Wayland, but there are also a ton of small fixes, improvements, and small new features that have nothing to do with Wayland at all. There are also a few layout cleanups to make some dialogs and panels look a bit tidier and nicer. Note that LXQt supports both X11 and Wayland equally, and the choice of which to use is up to you. If youre using LXQt, youve already seen a few of these changes in point releases of its components, so not everything listed in the release notes might be news to you.


  • Nationwide bill to put age verification in operating systems introduced in the US
    The title of my article on age verification in Linux and other operating systems had a for now! added for a reason, and here we are, with two members of the US Congress introducing a bill to add age verification to operating systems. The text of the proposed bill was only published today, and its incredibly vague and wishy-washy, without any clear definitions and ton of open-ended questions. Still, if passed, the bill would require actual age verification, instead of mere voluntary age reporting that current state-level bills cover. It also seems to eschew the concept of age brackets, giving application developers access to specific ages of users instead. Its a vague mess of a bill that no sane person would ever want passed, but alas, sanity is a rare commodity these days, especially in US Congress. Its introduced by Democrat Josh Gottheimer and Republican Elise M. Stefanik, so it has that bipartisan sheen to it, which could increase its odds of going anywhere. At the same time, though, US Congress is about as useful as a box of matches during a house fire, so for all we know, this will end up going nowhere as its members focus on doing absolutely nothing to reign in the flock of coked-up headless chickens passing for an executive branch over there. If something like this gets passed, every US-based operating system  which includes most open source operating systems and Linux distributions  will probably fall in line when faced with massive fines and legal pressure. This isnt going to be pretty.


  • Tribblix m34 for SPARC released
    Tribblix, the Illumos distribution focused on giving you a classic UNIX-style experience, doesnt only support x86. It also has a branch for SPARC, which tends to run behind its x86 counterpart a little bit and has a few other limitations related to the fact SPARC is effectively no longer being developed. The Tribblix SPARC branch has been updated, and now roughly matches the latest x86 release from a few weeks ago. The graphical libraries libtiff and OpenEXR have been updated, retaining the old shared library versions for now. OpenSSL is now from the 3.5 series with the 3.0 api by default. Bind is now from the 9.20 series. OpenSSH is now 10.2, and you may get a Post-Quantum Cryptography warning if connecting to older SSH servers. zap install now installs dependencies by default. zap create-user will now restrict new home directories to mode 0700 by default; use the -M flag to choose different permissions. Support for UFS quotas has been removed. ↫ Tribblix release notes Theres no new ISO yet, so to get to this new m34 release for SPARC youre going to have to install from an older ISO and update from there.


  • Haiku on ARM64 boots to desktop in QEMU
    Another Haiku monthly activity report, but this time around, theres actually a big ticket item. Haiku has been in a pretty solid and stable state for a while now, so the activity reports have been dominated by fairly small, obscure changes, but during March a major milestone was reached for the ARM64 port. smrobtzz contributed the bulk of the work, including fixes for building on macOS on ARM64, drivers for the Apple S5L UART, fixes to the kernel base address, clearing the frame pointer before entering the kernel, mapping physical memory correctly, the basics for userland, and more. SED4906 contributed some fixes to the bootloader page mapping, and runtime_loader’s page-size checks. Combined, these changes allow the ARM64 port to get to the desktop in QEMU. There’s a forum thread, complete with screenshots, for anyone interested in following along. ↫ waddlesplash While its only in QEMU, this is still a major achievement and paves the way for more people to work on the ARM64 port, possibly increasing its health. Theres tons of smaller changes and fixes all over the place, too, as usual, and the team mentions beta 6 isnt quite ready yet, still. Dont let that stop you from just downloading the latest nightly, though  Haiku is mature enough to use it.


  • Fixing a 20-year-old bug in Enlightenment E16
    The editor in chief of this blog was born in 2004. She uses the 1997 window manager, Enlightenment E16, daily. In this article, I describe the process of fixing a show-stopping, rare bug that dates back to 2006 in the codebase. Surprisingly, the issue has roots in a faulty implementation of Newton’s algorithm. ↫ Kamila Szewczyk Im not going to pretend to understand any of this, but I know you people do. Enjoy.


  • Let sleeping CPUs lie — S0ix
    Modern laptops promise a kind of magic. Shut the lid or press the sleep button, toss it in a backpack, and hours, days, or weeks later, it should wake up as if nothing happened with little to no battery drain. This sounds like a fairly trivial operation — y’know, you’re literally just asking for the computer to do nothing — but in that quiet moment when the fans whir down, the screen turns dark, and your reflection stares back at you, your computer and all its little components are actually hard at work doing their bedtime routine. ↫ Aymeric Wibo at the FreeBSD Foundation A look at how suspend and resume works in practice, from the perspective of FreeBSD. Considering FreeBSDs laptop focus in recent times, not an unimportant subject.


  • Microsoft isnt removing Copilot from Windows 11, its just renaming it
    A few weeks ago, Microsoft made some concrete promises about fixing and improving Windows, and among them was removing useless AI! integrations. Applications like Notepad, Snipping Tool, and others would see their AI! features removed. Well, it turns out Microsoft employs a very fringe definition of the concept. Microsoft seems to have stripped away mentions of the Copilot! brand in the Windows Insider version of the Notepad app. The Copilot button in the toolbar is gone, and instead, youll find a writing icon which will present you AI-powered writing assistance, such as rewrite, summarize, tone modification, format configuration, and more. Additionally, AI features! in Notepad settings has been renamed to Advanced features! and it allows users to toggle off AI capabilities within the app. ↫ Usama Jawad at Neowin If the recent changes to Notepad are any indication, it seems Microsoft is, actually, not at all going to reducing unnecessary Copilot entry points!, as they worded it, but is merely just going to rename these features so they arent so ostentatiously present. At least, that seems to be the plan for Notepad, and well have to see if they have the same plans for the other applications. I mean, they have to push AI! or look like fools. I just dont understand how a company like Microsoft can be so utterly terrible at communication. While I personally would want all AI! features yeeted straight from Windows, Im sure a ton of people are just fine with the features being less in-your-face and stuffed inside a normal menu alongside all the other normal features. They couldve just been honest about their intentions, and it wouldve been so much better. Like virtually every other technology company, Microsoft just seems incapable of not lying.


  • Scientists invented an obviously fake illness, and AI! spread it like truth within weeks
    Ever heard of a condition called bixonimania? Did you search the internet or ask your AI! girlfriend about some symptoms you were experiencing, and this was its answer? Well0 The condition doesn’t appear in the standard medical literature — because it doesn’t exist. It’s the invention of a team led by Almira Osmanovic Thunström, a medical researcher at the University of Gothenburg, Sweden, who dreamt up the skin condition and then uploaded two fake studies about it to a preprint server in early 2024. Osmanovic Thunström carried out this unusual experiment to test whether large language models (LLMs) would swallow the misinformation and then spit it out as reputable health advice. “I wanted to see if I can create a medical condition that did not exist in the database,” she says. ↫ Chris Stokel-Walker at Nature And AI! ate it up like quality chocolate. It started appearing in the answers from all the popular AI! tools within weeks, and later even started showing up as references in published literature, indicating that scientists copy/paste references without actually reading them. This is clearly a deeply concerning experiment, and highlights there may be many, many more nonsensical, fake studies being picked up by AI! tools. Of course, I hear you say, its not like propagating fake or terrible studies is the sole domain of AI!, as there are countless cases of this happening among actual real researchers and scientists, too. The issue, though, is that the fake studies concerning bixonimania! were intentionally made to be as silly and obviously ridiculous as possible. It references Starfleet Acadamy, the lab aboard the Enterprise, the University of Fellowship of the Ring, and many other fake references instantly recognisable as such by real humans. In fact, the studies even specifically mention that this entire paper is made up” and “fifty made-up individuals aged between 20 and 50 years were recruited for the exposure group!. It would take any human only a few seconds after opening one of these papers to realise theyre entirely fake  yet, the worlds most advanced AI! tools gobbled them up and spit them back out as pure fact within mere weeks of their publication This shouldnt come as a surprise. After all, AI! tools have no understanding, no intelligence, no context, and they cant actually make sense of anything. They are glorified pachinko machines with the output  the ball  tumbling down the most likely path between the pins based on nothing but chance and which pins it has already hit. AI! output understands the world about as much as the pachinko ball does, and as such, cant pick up on even the most obvious of cues that something is a fake or a forgery. It wont be long before truly nefarious forces start doing this very same thing. Why build, staff, and maintain a troll farm when you can just have AI! generate intentional misinformation which will then be spread and pushed by even more AI!? Remember, it took one malicious asshole just one long since retracted fake paper to convince millions that vaccines cause autism. I shudder to think how many people are accepting anything AI! says as gospel.


  • Linux 7.0 released
    Version 7.0 of the Linux kernel has been released, marking the arbitrary end of the 6.x series. Significant changes in this release include the removal of the experimental! status for Rust code, a new filtering mechanism for io_uring operations, a switch to lazy preemption by default in the CPU scheduler, support for time-slice extension, the nullfs filesystem, self-healing support for the XFS filesystem, a number of improvements to the swap subsystem (described in this article and this one), general support for AccECN congestion notification, and more. See the LWN merge-window summaries (part 1, part 2) and the KernelNewbies 7.0 page for more details. ↫ corbet at LWN.net You can compile the kernel yourself, or just wait until it hits your distributions repositories.


  • The disturbing white paper Red Hat is trying to erase from the internet
    It shouldnt be a surprise that companies  and for our field, technology companies specifically  working with the defense industry tends to raise eyebrows. With things like the genocide in Gaza, the threats of genocide and war crimes against Iran, the mass murder in Lebanon, its no surprise that western companies working with the militaries and defense companies involved in these atrocities are receiving some serious backlash. With that in mind, it seems Red Hat, owned by IBM, is desperately trying to scrub a certain white paper from the internet. Titled Compress the kill cycle with Red Hat Device Edge!, the 2024 white paper details how Red Hats products and technologies can make it easier and faster to, well, kill people. Links to the white paper throw up 404s now, but it can still easily be found on the Wayback Machine and other places. Its got some disturbingly euphemistic content. The find, fix, track, target, engage, assess (F2T2EA) process requires ubiquitous access to data at the strategic, operational and tactical levels. Red Hat Device Edge embeds captured, analyzed, and federated data sets in a manner that positions the warfighter to use artificial intelligence and machine learning (AI/ML) to increase the accuracy of airborne targeting and mission-guidance systems. Delivering near real-time data from sensor pods directly to airmen, accelerating the sensor-to-shooter cycle. Sharing near real-time sensor fusion data with joint and multinational forces to increase awareness, survivability, and lethality. The new software enabled the Stalker to deploy updated, AI-based automated target recognition capabilities. If the target is an adversary tracked vehicle on the far side of a ridge, a UAS carrying a server running Red Hat Device Edge could transmit video and metadata directly to shooters. ↫ Red Hat white paper titled Compress the kill cycle with Red Hat Device Edge! I dont think theres something inherently wrong with working together with your nations military or defense companies, but that all hinges on what, exactly, said military is doing and how those defense companies products are being used. The focus should be on national defense, aid during disasters, and responding to the legitimate requests of sovereign, democratic nations to come to their defense (e.g. helping Ukraine fight off the Russian invasion). Theres always going to be difficult grey areas, but any military or defense company supporting the genocide in Gaza or supplying weapons to kill women and children in Iran is unequivocally wrong, morally reprehensible, and downright illegal on both an international and national level. It clearly seems someone at Red Hat feels the same way, as the company has been trying really hard to memory-hole this particular white paper, and considering its word choices and the state of the world today, its easy to see why. Of course, the internet never forgets, and I certainly dont intend to let something like this slide. We all know companies like Microsoft, Oracle, and Google have no qualms about making a few bucks from a genocide or two, but it always feels a bit more traitorous to the cause when its an open source company doing the profiting. It feels like Red Hat is trying to have its cake and eat it too, by, as an IBM subsidiary, trying to both profit from the vast sums of money sloshing around in the US military industrial complex as well as maintain its image as a scrappy open source business success story shitting bunnies and rainbows. Its a long time ago now that Red Hat felt like a genuine part of the open source community. Most of us  both outside and inside of Red Hat, Im sure  have been well aware for a long time now that those days are well behind us, and I guess Red Hat doesnt like seeing its kill cycle this compressed.


  • FreeBSD works best on one of these laptops
    If you want to run FreeBSD on a laptop, youre often yanked back to the Linux world of 20 years ago, with many components and parts not working and other issues such as sleep and wake problems. FreeBSD has been hard at work improving the experience of using FreeBSD on laptops, and now this has resulted in a list of laptops which work effortlessly with the venerable operating system. Theres only about 10 laptops on the list so far, but they do span a range of affordability and age, with some of them surely being quite decent bargains on eBay or whatever other used stuff marketplace you use. If you want to use FreeBSD on a laptop, but dont want to face any surprises or do any difficult setup, get one of the laptops on this list  a list which will surely expand over time.


  • Fixing AMDGPUs VRAM management for low-end GPUs
    It may sound unbelievable to some, but not everyone has a datacenter beast with 128GB of VRAM shoved in their desktop PCs. Around the world people tell the tale of a particularly fierce group of Linux gamers: Those who dare attempt to play games with only 8 gigabytes of VRAM, or even less. Truly, it takes exceedingly strong resilience and determination to face the stutters and slowdowns bound to occur when the system starts running low on free VRAM. Carnage erupts inside the kernel driver as every application fights for as much GPU memory as it can hold on to. Any game caught up in this battle for resources will surely not leave unscathed. That is, until now. Because I fixed it. ↫ Natalie Vock The solution is to use cgroups to control the kernels memory eviction policies, so that applications that should get priority when it comes to VRAM allocation  like games  dont get their memory evicted from VRAM to system RAM. Basically, evict everything else from VRAM before touching the protected application. This way, something like a game will have much more consistent access to more VRAM, thereby reducing needless memory evictions that harm performance. Its a clever solution that makes use of a ton of existing Linux tools, meaning its also much easier to upstream, implement, and support. Excellent work.


  • Why do Macs ask you to press random keys when connecting a new keyboard?
    You might have seen this, one of the strangest and most primitive experiences in macOS, where you’re asked to press keys next to left Shift and right Shift, whatever they might be. Perhaps I can explain. ↫ Marcin Wichary It seems pretty obvious to me thats what it was for, but I guess many normal, regular people have never seen anything but one particular keyboard configuration (ANSI for Americans, ISO for some Europeans, etc.) keyboards. Perhaps they dont realise that not only are there ANSI keyboards with other layouts, but also entirely different keyboard configurations (mainly ISO and JIS). Interestingly, my home country of The Netherlands uses a US English layout on an ANSI configuration, but of course, its the US International variant, either with deadkeys or using AltGr for the various accented/special characters we use. In my current country of residence, Sweden, they use this utterly wild and incomprehensible ISO layout where Shift unlocks characters on the bottom of keys, while AltGr unlocks characters at the top, the exact opposite of literally every other keyboard Ive ever used (US Intl, classic Dutch (no longer used), German, French, etc.). Its utterly bizarre, but entirely normal to my Swedish wife. We cannot use each others keyboards.


  • USB for software developers
    This post aims to be a high level introduction to using USB for people who may not have worked with Hardware too much yet and just want to use the technology. There are amazing resources out there such as USB in a NutShell that go into a lot of detail about how USB precisely works (check them out if you want more information), they are however not really approachable for somebody who has never worked with USB before and doesn’t have a certain background in Hardware. You don’t need to be an Embedded Systems Engineer to use USB the same way you don’t need to be a Network Specialist to use Sockets and the Internet. ↫ Nik WerWolv! A bit of a generic title, but the article details how to write a USB driver.


Linux Journal - The Original Magazine of the Linux Community

  • Archinstall 4.2 Shifts to Wayland-First Profiles, Leaving X.Org Behind
    by George Whittaker
    The Arch Linux installer continues evolving alongside the broader Linux desktop ecosystem. With the release of Archinstall 4.2, a notable change has arrived: Wayland is now the default focus for graphical installation profiles, while traditional X.Org-based profiles have been removed or deprioritized.

    This move reflects a wider transition happening across Linux, one that is gradually redefining how graphical environments are built and used.
    A Turning Point for Archinstall
    Archinstall, the official guided installer for Arch Linux, has steadily improved over time to make installation more accessible while still maintaining Arch’s minimalist philosophy.

    With version 4.2, the installer now aligns more closely with modern desktop trends by emphasizing Wayland-based environments during setup, instead of offering traditional X.Org configurations as first-class options.

    This doesn’t mean X.Org is completely gone from Arch Linux, but it does signal a clear shift in direction.
    Why Wayland Is Taking Over
    Wayland has been gaining traction for years as the successor to X.Org, offering a more streamlined and secure approach to rendering graphics on Linux.

    Compared to X.Org, Wayland is designed to:
    Reduce complexity in the graphics stack Improve security by isolating applications Deliver smoother rendering and better performance Support modern display technologies like high-DPI and variable refresh rates
    As the Linux ecosystem evolves, many distributions and desktop environments are prioritizing Wayland as the default display protocol.
    What Changed in Archinstall 4.2
    With this release, users installing Arch through Archinstall will notice:
    Wayland-based desktop environments and compositors are now the primary options X.Org-centric setups are no longer emphasized in guided profiles Installation workflows better reflect modern Linux defaults
    This simplifies the installation experience for new users, who no longer need to choose between legacy and modern display systems during setup.
    What About X.Org?
    While Archinstall is moving forward, X.Org itself is not disappearing overnight.

    Many applications and workflows still rely on X11, and compatibility is maintained through XWayland, which allows X11 applications to run within Wayland sessions.

    For advanced users, Arch still provides full flexibility:
    Go to Full Article


  • OpenClaw in 2026: What It Is, Who’s Using It, and Whether Your Business Should Adopt It
    by George Whittaker
    “probably the single most important release of software, probably ever.”

    — Jensen Huang, CEO of NVIDIA


    Wow! That’s a bold statement from one of the most influential figures in modern computing.

    But is it true? Some people think so. Others think it’s hype. Most are somewhere in between, aware of OpenClaw, but not entirely sure what to make of it. Are people actually using it? Yes. Who’s using it? More than you might expect. Is it experimental, or is it already changing how work gets done? That depends on how it’s being applied. Is it more relevant for businesses or consumers right now? That’s one of the most important, and most misunderstood, questions.

    This article breaks that down clearly: what OpenClaw is, how it works, who is using it today, and where it actually creates value.

    What makes OpenClaw different isn’t just the technology, it’s where it fits. Most of the AI tools people are familiar with still require a human to take the next step. They assist, but they don’t execute. OpenClaw changes that dynamic by connecting decision-making directly to action. Once you understand that shift, the rest of the discussion, who’s using it, how it’s being deployed, and where it creates value, starts to make a lot more sense.


    Top 10 Questions About OpenClaw 
    What is OpenClaw?

    OpenClaw is an open-source AI agent framework that enables large language models like Claude, GPT, and Gemini to execute real-world tasks across software systems, including APIs, files, and workflows.

    What does OpenClaw actually do?

    OpenClaw functions as an execution layer that allows AI systems to take actions, such as sending emails, updating CRM records, or running scripts, instead of only generating responses.

    Do you need to be a developer to use OpenClaw?

    No, but technical familiarity helps. Non-developers can use prebuilt workflows, while developers can customize and scale implementations more effectively.

    Is OpenClaw more suited for business or consumer use?

    OpenClaw is currently more suited for business and technical use cases where structured workflows exist. Consumer use is emerging but remains secondary.

    How is OpenClaw different from ChatGPT or Claude?

    ChatGPT and Claude generate outputs, while OpenClaw enables those outputs to trigger actions across connected systems.

    Who created OpenClaw?
    Go to Full Article


  • Linux Kernel Developers Adopt New Fuzzing Tools
    by George Whittaker
    The Linux kernel development community is stepping up its security game once again. Developers, led by key maintainers like Greg Kroah-Hartman, are actively adopting new fuzzing tools to uncover bugs earlier and improve overall kernel reliability.

    This move reflects a broader shift toward automated testing and AI-assisted development, as the kernel continues to grow in complexity and scale.
    What Is Fuzzing and Why It Matters
    Fuzzing is a software testing technique that feeds random or unexpected inputs into a program to trigger crashes or uncover vulnerabilities.

    In the Linux kernel, fuzzing has become one of the most effective ways to detect:
    Memory corruption bugs Race conditions Privilege escalation flaws Edge-case failures in subsystems
    Modern fuzzers like Syzkaller have already discovered thousands of kernel bugs over the years, making them a cornerstone of Linux security testing.
    New Tools Enter the Scene
    Recently, kernel maintainers have begun experimenting with new fuzzing frameworks and tooling, including a project internally referred to as “clanker”, which has already been used to identify multiple issues across different kernel subsystems.

    Early testing has uncovered bugs in areas such as:
    SMB/KSMBD networking code USB and HID subsystems Filesystems like F2FS Wireless and device drivers
    The speed at which these issues were discovered suggests that these new tools are significantly improving bug detection efficiency.
    AI and Smarter Fuzzing Techniques
    One of the most interesting developments is the growing role of AI and machine learning in fuzzing.

    New research projects like KernelGPT use large language models to:
    Automatically generate system call sequences Improve test coverage Discover previously hidden execution paths
    These techniques can enhance traditional fuzzers by making them smarter about how they explore the kernel’s behavior.

    Other advancements include:
    Better crash analysis and deduplication tools (like ECHO) Configuration-aware fuzzing to explore deeper kernel states Feedback-driven fuzzing loops for improved coverage
    Together, these innovations help developers focus on the most meaningful bugs rather than sifting through duplicate reports.
    Why This Shift Is Happening Now
    The Linux kernel is one of the most complex software projects in existence. With millions of lines of code and contributions from thousands of developers, manually catching every bug is nearly impossible.
    Go to Full Article


  • GNOME 50 Reaches Arch Linux: A Leaner, Wayland-Only Future Arrives
    by George Whittaker
    Arch Linux users are among the first to experience the latest GNOME desktop, as GNOME 50 has begun rolling out through Arch’s repositories. Thanks to Arch’s rolling-release model, new upstream software like GNOME arrives quickly, giving users early access to the newest features and architectural changes.

    With GNOME 50, that includes one of the most significant shifts in the desktop’s history.
    A Major GNOME Milestone
    GNOME 50, officially released in March 2026 under the codename “Tokyo,” represents six months of development and refinement from the GNOME community.

    Unlike some previous versions, this release focuses less on dramatic redesigns and more on strengthening the foundation of the desktop, improving performance, modernizing graphics handling, and simplifying long-standing complexities.

    For Arch Linux users, that translates into a more streamlined and future-ready desktop environment.
    Goodbye X11, Hello Wayland-Only Desktop
    The headline change in GNOME 50 is the complete removal of X11 support from GNOME Shell and its window manager, Mutter.

    After years of gradual transition:
    X11 sessions were first deprecated Then disabled by default And now fully removed in GNOME 50
    This means GNOME now runs exclusively on Wayland, with legacy X11 applications handled through XWayland compatibility layers.

    The result is a simpler, more modern graphics stack that reduces maintenance overhead and improves long-term performance and security.
    Improved Graphics and Display Handling
    GNOME 50 brings several key improvements to display and graphics performance:
    Variable Refresh Rate (VRR) enabled by default Better fractional scaling support Improved compatibility with NVIDIA drivers Enhanced HDR and color management
    These changes aim to deliver smoother animations, more responsive desktops, and better support for modern displays.

    For gamers and users with high-refresh monitors, these upgrades are especially noticeable.
    Performance and Responsiveness Gains
    Beyond graphics, GNOME 50 includes multiple performance optimizations:
    Faster file handling in the Files (Nautilus) app Improved thumbnail generation Reduced stuttering in animations Better resource usage across the desktop
    These refinements make the desktop feel more responsive, particularly on systems with demanding workloads or multiple monitors.
    New Parental Controls and Accessibility Features
    GNOME 50 also expands its focus on usability and accessibility.
    Go to Full Article


  • MX Linux Pushes Back Against Age Verification: A Stand for Privacy and Open Source Principles
    by George Whittaker
    The MX Linux project has taken a firm stance in a growing controversy across the Linux ecosystem: mandatory age-verification requirements at the operating system level. In a recent update, the team made it clear, they have no intention of implementing such measures, citing concerns over privacy, practicality, and the core philosophy of open-source software.

    As governments begin introducing laws that could require operating systems to collect user age data, MX Linux is joining a group of projects resisting the shift.
    What Sparked the Debate?
    The discussion around age verification stems from new legislation, particularly in regions like the United States and Brazil, that aims to protect minors online. These laws may require operating systems to:
    Collect user age or date of birth during setup Provide age-related data to applications Enable content filtering based on age categories
    At the same time, underlying Linux components such as systemd have already begun exploring technical changes, including storing birthdate fields in user records to support such requirements.
    MX Linux Says “No” to Age Verification
    In response, the MX Linux team has clearly rejected the idea of integrating age verification into their distribution. Their reasoning is rooted in several key concerns:
    User privacy: Collecting age data introduces sensitive personal information into systems that traditionally avoid such tracking Feasibility: Implementing consistent, secure age verification across a decentralized OS ecosystem is highly complex Philosophy: Open-source operating systems are not designed to act as data collectors or gatekeepers
    The developers emphasized that they do not want to burden users with intrusive requirements and instead encouraged concerned individuals to direct their efforts toward policymakers rather than Linux projects.
    A Broader Resistance in the Linux Community
    MX Linux is not alone. The Linux world is divided on how, or whether, to respond to these regulations.

    Some projects are exploring compliance, while others are pushing back entirely. In fact, age verification laws have sparked:
    Strong debate among developers and maintainers Concerns about enforceability on open-source platforms New projects explicitly created to resist such requirements
    In some extreme cases, distributions have even restricted access in certain regions to avoid legal complications.
    Why This Matters
    At its core, this issue goes beyond a single feature, it raises fundamental questions about what an operating system should be.

    Linux has long stood for:
    Go to Full Article


  • LibreOffice Drives Europe’s Open Source Shift: A Growing Push for Digital Sovereignty
    by George Whittaker
    LibreOffice is increasingly at the center of Europe’s push toward open-source adoption and digital independence. Backed by The Document Foundation, the widely used office suite is playing a key role in helping governments, institutions, and organizations reduce reliance on proprietary software while strengthening control over their digital infrastructure.

    Across the European Union, this shift is no longer experimental, it’s becoming policy.
    A Broader Movement Toward Open Source
    Europe has been steadily moving toward open-source technologies for years, but recent developments show clear acceleration. Governments and public institutions are actively transitioning away from proprietary platforms, often citing concerns about vendor lock-in, cost, and data control.

    According to recent industry data, European organizations are adopting open source faster than their U.S. counterparts, with vendor lock-in concerns cited as a major driver.

    LibreOffice sits at the center of this trend as a mature, fully open-source alternative to traditional office suites.
    LibreOffice as a Strategic Tool
    LibreOffice isn’t just another productivity application, it has become a strategic component in Europe’s digital policy framework.

    The software:
    Is fully open source and community-driven Supports open standards like OpenDocument Format (ODF) Allows governments to avoid dependency on specific vendors Enables long-term control over data and infrastructure
    These characteristics align closely with the European Union’s broader strategy to promote interoperability and transparency through open standards.
    Government Adoption Across Europe
    LibreOffice adoption is already happening at scale across multiple countries and sectors.

    Examples include:
    Germany (Schleswig-Holstein): transitioning tens of thousands of government systems to Linux and LibreOffice Denmark: replacing Microsoft Office in public institutions as part of a broader digital sovereignty initiative France and Italy: deploying LibreOffice across ministries and defense organizations Spain and local governments: adopting LibreOffice to standardize workflows and reduce costs
    In some cases, migrations involve hundreds of thousands of systems, demonstrating that open-source office software is viable at national scale.
    Go to Full Article


  • From Linux to Blockchain: The Infrastructure Behind Modern Financial Systems
    by George Whittaker
    The modern internet is built on open systems. From the Linux kernel powering servers worldwide to the protocols that govern data exchange, much of today’s digital infrastructure is rooted in transparency, collaboration, and decentralization. These same principles are now influencing a new frontier: financial systems built on blockchain technology.

    For developers and system architects familiar with Linux and open-source ecosystems, the rise of cryptocurrency is not just a financial trend, it is an extension of ideas that have been evolving for decades.
    Open-Source Foundations and Financial Innovation
    Linux has long demonstrated the power of decentralized development. Instead of relying on a single authority, it thrives through distributed contributions, peer review, and community-driven improvement.

    Blockchain technology follows a similar model. Networks like Bitcoin operate on open protocols, where consensus is achieved through distributed nodes rather than centralized control. Every transaction is verified, recorded, and made transparent through cryptographic mechanisms.

    For those who have spent years working within Linux environments, this architecture feels familiar. It reflects a shift away from trust-based systems toward verification-based systems.
    Understanding the Stack: Nodes, Protocols, and Interfaces
    At a technical level, cryptocurrency systems are composed of multiple layers. Full nodes maintain the blockchain, validating transactions and ensuring network integrity. Lightweight clients provide access to users without requiring full data replication. On top of this, exchanges and platforms act as interfaces that connect users to the underlying network.

    For developers, interacting with these systems often involves APIs, command-line tools, and automation scripts, tools that are already integral to Linux workflows. Managing wallets, verifying transactions, and monitoring network activity can all be integrated into existing development environments.
    Go to Full Article


  • Firefox 149 Arrives with Built-In VPN, Split View, and Smarter Browsing Tools
    by George Whittaker
    Mozilla has officially released Firefox 149.0, bringing a mix of new productivity features, privacy enhancements, and interface improvements. Released on March 24, 2026, this update continues Firefox’s steady push toward a more modern and user-focused browsing experience.

    Rather than focusing on a single headline feature, Firefox 149 introduces several practical tools designed to improve how users multitask, stay secure, and interact with the web.
    Built-In VPN Comes to Firefox
    One of the most notable additions in Firefox 149 is the introduction of a built-in VPN feature. This optional tool provides users with an added layer of privacy while browsing, helping mask IP addresses and secure connections on public networks.

    In some configurations, Mozilla is offering a free usage tier with limited monthly data, giving users a simple way to enhance privacy without installing separate software.

    This move aligns with Mozilla’s long-standing emphasis on user privacy and security.
    Split View for Better Multitasking
    Firefox 149 introduces a Split View mode, allowing users to display two web pages side by side within a single browser window. This feature is especially useful for:
    Comparing documents or products Copying information between pages Research and multitasking workflows
    Instead of juggling multiple tabs and windows, users can now work more efficiently in a single, organized view.
    Tab Notes: A New Productivity Tool
    Another standout feature is Tab Notes, available through Firefox Labs. This tool allows users to attach notes directly to individual tabs, making it easier to:
    Keep track of research Save reminders tied to specific pages Organize ongoing tasks
    This feature reflects a growing trend toward integrating lightweight productivity tools directly into the browser experience.
    Smarter Browsing with Optional AI Features
    Firefox 149 also expands its experimental AI-powered features, including tools that can assist with summarizing content, providing quick explanations, or helping users interact with web pages more efficiently.

    Importantly, Mozilla is keeping these features optional and user-controlled, maintaining its focus on transparency and privacy.
    Developer and Platform Updates
    For developers, Firefox 149 includes updates to web standards and APIs. One example is improved support for HTML features like enhanced popover behavior, which helps developers build more interactive web interfaces.

    As always, these under-the-hood changes help ensure Firefox remains competitive and standards-compliant.
    Go to Full Article


  • Blender 5.1 Released: Faster Workflows, Smarter Tools, and Major Performance Gains
    by german.suarez
    The Blender Foundation has officially released Blender 5.1, the latest update to its powerful open-source 3D creation suite. This version focuses heavily on performance improvements, workflow refinements, and stability, while also introducing a handful of new features that expand what artists and developers can achieve.

    Rather than reinventing the platform, Blender 5.1 is all about making existing tools faster, smoother, and more reliable — a release that benefits both professionals and hobbyists alike.
    A Release Focused on Refinement
    Blender 5.1 emphasizes polish over disruption, with developers addressing hundreds of issues and improving the overall production pipeline. The update includes widespread optimizations across rendering, animation, modeling, and the viewport, resulting in a more responsive and efficient experience.

    Many of Blender’s internal libraries have also been updated to align with modern standards like VFX Platform 2026, ensuring better long-term compatibility and performance.
    Performance Gains Across the Board
    One of the standout aspects of Blender 5.1 is its performance boost:
    Faster animation playback and shape key evaluation Improved rendering speeds for both GPU and CPU Reduced memory overhead and smoother viewport interaction Optimized internal systems for better responsiveness
    In some scenarios, animation and editing performance improvements can be dramatic, especially with complex scenes.
    New Raycast Node for Advanced Shading
    A major feature addition in Blender 5.1 is the Raycast shader node, which opens the door to advanced rendering techniques.

    This node allows artists to trace rays within a scene and extract data from surfaces, enabling:
    Non-photorealistic rendering (NPR) effects Custom shading techniques Decal projection and X-ray-style visuals
    It’s a flexible tool that expands Blender’s shading capabilities, especially for stylized workflows.
    Grease Pencil Gets a Big Upgrade
    Blender’s 2D animation tool, Grease Pencil, sees meaningful improvements:
    New fill workflow with support for holes in shapes Better handling of imported SVG and PDF files More intuitive drawing and editing behavior
    These updates make Grease Pencil far more practical for hybrid 2D/3D workflows and animation pipelines.
    Geometry Nodes and Modeling Improvements
    Geometry Nodes continue to evolve with expanded functionality:
    Go to Full Article


  • The Need for Cloud Security in a Modern Business Environment
    by George Whittaker
    Cloud systems are an emergent standard in business, but migration efforts and other directional shifts have introduced vulnerabilities. Where some attack patterns are mitigated, cloud platforms leave businesses open to new threats and vectors. The dynamic nature of these environments cannot be addressed by traditional security systems, necessitating robust cloud security for contemporary organizations.

    Just as businesses have come to acknowledge the value of cloud operations, so too have cyber attackers. Protecting sensitive assets and maintaining regulatory compliance, while simultaneously ensuring business continuity against cloud attacks, requires a modern strategy. When any window could be an opportunity for infiltration, a comprehensive approach serves to limit exploitation.

    Unlike traditional on-premise infrastructure, cloud environments dramatically expand an organization’s threat surface. Resources are distributed across regions, heavily dependent on APIs, and frequently created or decommissioned in minutes. This constant change makes it difficult to maintain a fixed security perimeter and increases the likelihood that misconfigurations or exposed services go unnoticed, creating opportunities for exploitation.
    The Vulnerabilities of Cloud Security Services
    Any misconfiguration, insecure application programming interface (API), or identity management solution may become an invitation for cyberattacks. Amid the rise of artificial intelligence (AI) technology, it is possible for even inexperienced individuals to exploit such weaknesses in cloud systems. Cloud environments are designed for accessibility, a benefit that can be taken advantage of.

    “Unlike traditional software, AI systems can be manipulated through language and indirect instructions,” Lee Chong Ming wrote for Business Insider. “[AI expert Sander] Schulhoff said people with experience in both AI security and cybersecurity would know what to do if an AI model is tricked into generating malicious code.”

    At the same time that many businesses are migrating to cloud platforms and implementing cloud security features, they are adopting AI technology in order to accelerate workflows and other processes. These systems may have their advantages for certain industries, but their presence can create its own vulnerabilities. Addressing the shortcomings of cloud systems and AI at the same time compounds the security challenges of today.
    Go to Full Article


Page last modified on November 02, 2011, at 10:01 PM