Language Selection

English French German Italian Portuguese Spanish

FOSS Force

Syndicate content
FOSS Force News Wire
Updated: 1 hour 2 min ago

Pluralistic: 26 Nov 2021

Friday 26th of November 2021 07:07:40 PM
Today's links UK ICO: surveillance advertising is dead: A true consent framework would do the trick. This day in history: 2011, 2016 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading UK ICO: surveillance advertising is dead (permalink) Here's the theory behind Europe's GDPR: if an online service wants to collect, store and/or process your personal information, it has to obtain your real, informed consent for each of those activities. In theory, this should have exterminated surveillance-based "behavioral" ads. In practice, nothing of the sort has happened…yet. Let's look at the theory first. The ad-tech industry has long maintained that it obtains consent for all its data-processing. This is an obvious pretense. This "consent" consists of you wading through a garbage-novella of legalese and clicking "I agree." To add insult to injury, those "contracts" inevitably say something like, "These terms are subject to change without notice" and/or "You agree that you are not allowed to sue us if we violate these terms, and will have to take your case to an 'arbitrator' that we pay to decide if we're wrong." Based on this consent-theater, ad-tech scammers claim that they can harvest your data, retain it indefinitely, and sell or give it away to anyone they want, and that this is all totally cool with you because if wasn't, you wouldn't have "consented." Enter the GDPR. Under Europe's landmark privacy regulation, companies have to ask you a plain-language question confirming your consent to every piece of data they collect and every use they plan on making of that data. They can't punish you for refusing consent – by locking you out of a service or degrading its quality – and you can withdraw your consent at any time. This is deliberately burdensome. It takes the position that consent is a weighty and serious thing, that personal data is genuinely valuable, and that the transactions in which data is gathered and processed should be solemnized by a thoughtful, substantial ceremony. It calls ad-tech's bluff: "If you think people are really OK with all that spying you've done, let's ask them, in depth, before you do it." The reality is that there's no meaningful "consent" to an open-ended collection and processing of your data – the very premise does violence to the idea of consent itself. Companies that claim that you have consented to hundreds or even thousands of different uses of your data are obviously lying. Consent-theater is the ideological and legal backstop for unfettered commercial surveillance. It means that data-collection and retention is essentially cost-free. Companies built their services accordingly, maximizing their data-collection and sloshing that data around with wild abandon. Under the GDPR, the cost of data-collection is shifted from users – who are expected to wade through "agreements" and somehow negotiate away the terms they find odious – to companies. Now, when a product team sits down to plan a new service, they have to factor in the loss of users who bail on a consent-gathering process that consists of hundreds or thousands of dialogs against the speculative value of the data this will let them gather and process. That value is indeed speculative. "Behavioral" ads – placed dynamically based on your browsing history and other personal information – are only very slightly more effective than "contextual" ads, based on the content of the page you're looking at. Behavioral ads are only more profitable than context ads if all the costs of surveillance – the emotional burden of being watched; the risk of breach, identity-theft and fraud; the potential for government seizure of surveillance data – is pushed onto internet users. If companies have to bear those costs, behavioral ads are a total failure, because no one in the history of the human race would actually grant consent to all the things that gets done with our data. That's what the Dutch public broadcaster NPO learned. As a public institution, its compliance staff decided that it would strictly adhere to the letter and spirit of the GDPR when serving ads on its site. The broadcaster quickly realized that if could only show ads to people who gave meaningful, enthusiastic consent to surveillance, then it couldn't show any ads at all. NPO switched to serving context-based ads – which didn't involve processing any personal information, and thus didn't require a consent process – and its revenues soared. It was showing ads to a lot more people, and those ads were about as effective as the surveillance ads it had deprecated (and it didn't have to give 30-50% of its revenues to an ad-tech company!). The GDPR holds out serious fines for noncompliance, the kind that could put even a globe-spanning Big Tech colossus out of business. In theory, every online service whose bank-account is within the reach of European enforcers should be following NPO's lead and switching to context ads. In practice, Europeans have swapped one form of consent theater for a worse one. The EU's ad-tech sector has adopted a form of "malicious compliance" with the GDPR, in which users are presented with confusing, endless dialogs. Ignore these, and your consent is presumed. Actually, this isn't even malicious compliance, because it doesn't comply with the GDPR. It's illegal conduct, as the IAB – ad-tech's industry association – has finally admitted. Nevertheless, ad-tech has shown precious little willingness to color within the lines. It's easy to see why, once you understand the GDPR's fatal flaw: the way it allows large companies to forum-shop within EU member states. Ireland is one of the go-to jurisdictions for corporate criminals. Early in the EU process, the country decided to become a tax-haven, establishing itself as a financial secrecy jurisdiction suitable for any corporation that wanted to hide its wealth from tax collectors in the EU and beyond. This process is documented in furious detail in "Tax Haven Ireland," a new book by Brian O'Boyle and Kieran Allen: (O'Boyle and Allen did a great interview about the book with the The Taxcast) The conversion of Ireland into a rogue state whose economy depends on protecting corporate criminals goes beyond its tax code. Its regulators are infamously lax, too – and that includes its Information Commissioner's Office, an organization that doesn't even bother to put on trousers in the morning – it sits around all day in its jammies, eating breakfast cereal and watching cartoons. It certainly doesn't investigate GDPR claims that are brought before it. Since Europe's sleaziest companies all fly Irish flags of convenience, the Irish ICO's King Log routine means that companies that violate the GDPR don't have to worry about facing justice. That defense may not last forever. The Irish Council for Civil Liberties has lodged a complaint against the IAB…in Germany, where the ICO's office is staffed with hungry, committed enforcers. Meanwhile, Max Schrems – the activist whose legal fights inspired the GDPR in the first place – is suing Google in Austria: Now, there's some movement in the UK. The outgoing British Information Commissioner, Elizabeth Denham, has published an official opinion warning the ad-tech sector that surveillance advertising is doomed: Denham characterizes her paper as offering "clarity" on the UK implementation of the GDPR, but that's a bit of doublespeak. In reality, all Denham is clarifying is that her successor will enforce the GDPR's plain language (finally). Writing in Techcrunch, Natasha Lomas is justifiably cynical about this announcement. Lomas says that the ad-tech industry is already moving away from aggressive surveillance, using fancy cryptographic math to create a non-invasive form of behavioral advertising. It's true that there's a lot of movement on this and the technical promises sound great. But as my EFF colleague Alexis Hancock wrote in her deep-dive into "Manifest V3" (the technical initiative at the heart of this movement), the reality is a lot dimmer: Not only do these techniques fail to deliver on their privacy promises, but they also actively interfere with independent browser plugins that block online tracking. To make matters worse, ManifestV3 has significant anti-competitive implications. Denham's parting shot highlights the post-Brexit tension in the UK over competition, privacy and fairness. Last summer, the UK Competition and Markets Authority published a landmark study of the ad-tech industry that painted a picture of a highly concentrated industry riddled with fraud and abuse: But while much of the CMA's report is excellent, it also goes badly awry when contemplating the relation of competition to surveillance. The CMA notes that Facebook and Google have a huge advantage in the market because they can do "attribution." That's the ad-tech euphemism for spying on you – your movements, purchases and online activity – after you see an ad to determine whether you bought anything featured in the ad. Obviously, advertisers love "attribution" and pay a premium for it, which hardens Googbook's domination of the ad-market (they alone have the surveillance tendrils in the physical and virtual world for consistent attribution). The CMA moots a solution to this: assign every British person a unique, lifelong advertising identifier that will allow other companies to spy on you, too, and thus democratize attribution. In this, the CMA has committed a category error that's as old as competition enforcement itself. Monopolies enjoy enormous power, and that power allows them to trample human rights and commit crimes with impunity. They are often very good at this. Writing a century ago, Ida M Tarbell – whose "History of the Standard Oil Company" led to the breakup of Rockefeller's oil behemoth – called this "illegitimate greatness." Tarbell warned readers that the goal of competition law shouldn't be to democratize the ability of smaller firms to commit crimes, but rather to extinguish those crimes by making companies weak enough that we can force them to obey the law. In other words, we don't want competition in the field of "who can violate internet users' human rights most efficiently at scale?" So here we are, with two UK top regulators examining the same question and coming to very different conclusions. The ICO is finally promising to extinguish mass surveillance, while the CMA wants to make it more efficient. Meanwhile, across the Channel, the EU just rescued the Digital Markets Act by reversing a set of Big-Tech-friendly amendments and installing fierce protections for real competition and installing fresh curbs on surveillance, beyond the GDPR. The UK only has an ICO because it was par of the EU when the GDPR was passed. Now, post-Brexit, the UK will be under no obligation to adopt the DMA or other rules that correct the defects in the GDPR. It'll be fascinating – and possibly terrible – to watch how the UK proceeds as the EU continues to attack Big Tech power and its risible fictions like consent-theater. Facebook has threatened to leave the EU if they keep this up. That is not going to happen, of course, but it would be pretty wild if the UK made a bid for post-Brexit relevance by offering a new flag of convenience to Big Tech as the EU leans on Ireland to end its program of criminal enabling. (Image: Matt Harrop, CC BY-SA 2.0; Cryteria, CC BY-SA 3.0, modified) This day in history (permalink) #10yrsago Interrogation of Byron Sonne, Toronto G20 hacker on trumped up charges for mocking G20 security #5yrsago Chestburster roast turkey #5yrsago Malcolm McLaren’s son torched his punk collection to protest the 40th anniversary of punk “celebrations” Colophon (permalink) Today's top sources: Slashdot ( Currently writing: Picks and Shovels, a Martin Hench noir thriller about the heroic era of the PC. Yesterday's progress: 1035 words (7548 words total). A Little Brother short story about remote invigilation. PLANNING A Little Brother short story about DIU insulin PLANNING Spill, a Little Brother short story about pipeline protests. Yesterday's progress: 621 words (32894 words total) FIRST DRAFT COMPLETE A nonfiction book about excessive buyer-power in the arts, co-written with Rebecca Giblin, "The Shakedown." FINAL EDITS A post-GND utopian novel, "The Lost Cause." FINISHED A cyberpunk noir thriller novel, "Red Team Blues." FINISHED Currently reading: Analogia by George Dyson. Latest podcast: Jam To-Day ( Upcoming appearances: The Kids Are (Kinda) All Right (San Diego Comic-Con), Nov 28[item_id]=9591 Redistribute the Internet (NGI Summit), Nov 30 Internet Governance Forum (Warsaw), Dec 10 Competition and Regulation in Disrupted Times, Dec 16 Recent appearances: NFTs (Upstream) Policy, Profit, Privacy, and Privilege: The Post-Pandemic Future of Remote Testing Technology (ACM-USTPC): Alternative recommender systems in the DSA: Latest book: "Attack Surface": The third Little Brother novel, a standalone technothriller for adults. The Washington Post called it "a political cyberthriller, vigorous, bold and savvy about the limits of revolution and resistance." Order signed, personalized copies from Dark Delicacies "How to Destroy Surveillance Capitalism": an anti-monopoly pamphlet analyzing the true harms of surveillance capitalism and proposing a solution. (print edition: (signed copies: "Little Brother/Homeland": A reissue omnibus edition with a new introduction by Edward Snowden:; personalized/signed copies here: "Poesy the Monster Slayer" a picture book about monsters, bedtime, gender, and kicking ass. Order here: Get a personalized, signed copy here: Upcoming books: The Shakedown, with Rebecca Giblin, nonfiction/business/politics, Beacon Press 2022 This work licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution. How to get Pluralistic: Blog (no ads, tracking, or data-collection): Newsletter (no ads, tracking, or data-collection): Mastodon (no ads, tracking, or data-collection): Medium (no ads, paywalled): (Latest Medium column: "Apple’s Right-to-Repair U-turn." Twitter (mass-scale, unrestricted, third-party surveillance and advertising): Tumblr (mass-scale, unrestricted, third-party surveillance and advertising): "When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla

How to Install Animated Plymouth During Boot Process in Arch Linux

Friday 26th of November 2021 07:00:41 PM
Read on for a tutorial on how you can install animated Plymouth during the boot process in Arch Linux. The post How to Install Animated Plymouth During Boot Process in Arch Linux appeared first on Linux Today.

EuroLinux 8.5 Release Notes - EuroLinux Documentation

Friday 26th of November 2021 06:04:49 PM

EuroLinux 8.5 is the first minor release created in a continuous way. It was also the first version when we deployed our engineer to remote sites (in most cases virtual) to provide support for organisations that rebuild RHEL/EuroLinux from sources with Gaia build system. This version code name is Tirana - the capital city of Albania.

Below you can find the essential changes in EuroLinux 8.5 release for x86_64 architecture. The aarch64 GA release is slightly delayed. Release notes for aarch64 will be provided in a separate document.

read more

How to Compress the Whole Directory Using xz and tar

Friday 26th of November 2021 05:00:29 PM
I compressed a directory having 37M size using both xz & zip. The zip file size was 31M, while the xz file was 16M after compression. Pretty impressive, isn’t it? Let us see how to compress the whole directory using xz and tar on Linux, macOS/*BSD/Unix CLI. The post How to Compress the Whole Directory Using xz and tar appeared first on Linux Today.

Non-Fungible T-Shirts, And Other New Gear From Techdirt

Friday 26th of November 2021 05:00:00 PM
Get your Non-Fungible T-Shirt and Right Click gear on Threadless » Just in time for the holiday season, we've got a pair of new designs in the Techdirt Gear store on Threadless — both inspired by the ongoing conversation around (and our own experiments with) NFTs: For those who want to celebrate and defend the ability to Right Click - > Save As, there's the I Right Click And I'm Proud design, which is available on t-shirts as well as hoodies, sweatshirts, face masks, stickers, mugs, and more. For those who want something that doesn't need the blockchain to be scarce and rivalrous, there's the Non-Fungible T-Shirt (which is available only as, well, a t-shirt). Visit the Techdirt Gear store on Threadless to get yours today! And if you're doing some holiday shopping, also check out these academic galaxy map posters from Open Syllabus Project.

Intel Compute-Runtime Updated With DG2/Alchemist Support

Friday 26th of November 2021 04:56:59 PM
Intel's open-source engineers today released the Compute-Runtime 21.47.21710 as their latest update to this open-source compute stack for Linux systems enabling their graphics processors to enjoy performant OpenCL and oneAPI Level Zero support...

Daily Deal: Black Friday Roundup

Friday 26th of November 2021 04:55:00 PM
It's Black Friday and we have specials coupons you can use on the following deals and throughout the store. Coupon code BFSAVE20 gets you 20% off anything that is NOT a digital product, BFSAVE40 gets you 40% off apps and software, and BFSAVE70 gets you 70% off e-learning deals. The Unity Game Developer and Player Bundle featuring PlayStation Plus will help you learn how to create your own amazing games. Courses include how to use AI to create games, how to create a 2D RPG, how to use Photon to build a 3D multiplayer game, and much more. The bundle also includes a one year subscription to PlayStation Plus. Connect with an enormous online community via PlayStation Plus to compete in PS classics like Star Wars: Battlefront, Uncharted, and many more. If that's not reason enough to pull the trigger, the subscription also delivers an epic monthly collection of free games, in a library that is constantly expanding. The bundle is on sale for $70. The 2021 CompTIA Security Infrastructure Expert Bundle has 4 courses to help you learn how to mitigate attacks and vulnerabilities. The courses will help prepare you to sit for exams on CompTIA CASP, PenTest, CySA, and Security. It's on sale for $30. Learn Unreal, C++, and game development. Want to level up your game development skill? The 2022 Ultimate Learn Unreal Game Development Bundle, created in collaboration with Epic Games, can help. Anyone who wants to learn to create games: Unreal Engine is a fantastic platform that enables you to make AAA-quality games. You'll get full lifetime access for a single one-off fee. The creators are qualified and experienced coders and avid gamers, so are able to explain complex concepts clearly, as well as entertain along the way. You will have access to a course forum where you can discuss topics on a course-wide basis, or down to the individual video. It's on sale for $35. PDF Expert is the best PDF writer for Mac. You can easily edit text, images, and links. It will automatically detect the font, size, and opacity of the original text, so you can make edits easily. It’s fast, intuitive, and powerful to let you effortlessly complete literally any PDF task. Need to rework a complete section of a document? No problem. PDF Expert provides a series of essential functions that will transform the way you work with documents on your Mac. It's on sale for $30. Don't forget to use those coupons! Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.

Getting Experimental Vulkan Within QEMU VMs Using Linux 5.16+ Paired With Mesa's Venus

Friday 26th of November 2021 04:28:17 PM
When running on the very latest Linux 5.16 Git kernel paired with recent Mesa and various experimental components to the virtualization stack, it is possible getting at least basic Vulkan acceleration working within QEMU guest virtual machines that in turn is accelerated by the host...

Apt vs Apt-get Commands Explained: Which One To Use?

Friday 26th of November 2021 04:11:12 PM

As a regular Ubuntu or Debian Linux user, you might have noticed that some package installer, removal, or updating commands use the apt command instead of the apt-get command. Now, as a day-to-day Linux user, you would not get to know what they are and which command is used for what! But as a power Linux/Ubuntu user, you definitely must know the difference between apt vs apt-get commands.

In the default command lists of Ubuntu, the apt-get command has been widely used for a long while. The new apt command was introduced a few years ago to increase the work efficiency and make the commands process simpler. Though there are some packages that only work with apt-get, hence most cache loading and cache removing or updating functions are nowadays done by the apt command.

read more

Thunderbird & no email associated to perform action error

Friday 26th of November 2021 04:07:25 PM

A new weird little problem has landed into my lap. On one of me Windows boxes, I upgraded Thunderbird, the mail client program, to the new release. I went from 78.x to 91.x, and in the process, I also received a gratis error message.

It would pop up on every program startup, and it reads: There is no email program associated to perform the requested action. Please install an email program or, if one is already installed, create an association in the Default Programs control panel. Clunky language aside, Control Panel is sadly no longer the goto place for default apps in Windows 10/11. Plus, the error shows up during Thunderbird startup. Every time. Let's fix this.

read more

Git, curl, systemd Roll with Tumbleweed

Friday 26th of November 2021 04:04:20 PM

openSUSE Tumbleweed gave rolling release users a snapshot every day this past week.

The latest snapshot to be released was 20211124. This snapshot brought systemd 249.7, which focused on package tests and updated dependencies for the testsuite. The text editor vim had a minor update to version 8.2.3640, but it was filled with many fixes; some of the fixes included taking care of a memory leak, crashes and performance issues related to GTK. The removal of a redundant script header was made in the update of dracut and optimal compression parameters were made for zstd in the Linux-boot process package. Other packages to update in the snapshot were autoyast2 4.4.22, embedded Linux library ell 0.46, GNOME’s document viewer evince 41.3 and gtk-vnc 1.3.0.

read more

How to Create an Amazon AWS EC2 Instance Using Python Boto3

Friday 26th of November 2021 04:00:09 PM
In this article, we will see how we can create an EC2 instance using Python Boto3. We will use the “create_instances” method to create an instance. The post How to Create an Amazon AWS EC2 Instance Using Python Boto3 appeared first on Linux Today.

Wireshark 3.6 Network Analyzer Release

Friday 26th of November 2021 03:30:11 PM
After a year of development, a new stable branch of the Wireshark 3.6 network analyzer has been released. Recall that initially the project developed under the name Ethereal, but in 2006, due to a conflict with the owner of the Ethereal trademark, the developers were forced to rename the project to Wireshark. The project code is distributed under the GPLv2 license. The post Wireshark 3.6 Network Analyzer Release appeared first on Linux Today.

today's howtos

Friday 26th of November 2021 03:11:52 PM
  1. How To Install phpIPAM on Ubuntu 20.04 LTS - idroot

    In this tutorial, we will show you how to install phpIPAM on Ubuntu 20.04 LTS. For those of you who didn’t know, phpIPAM is a free PHP-based web IP Address management tool whose goal is to provide modern, lightweight, and useful IP address management and administration. It is a PHP-based application with MySQL database backend, using jQuery libraries, ajax, and some HTML5/CSS3 features.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the phpIPAM free open-source IP address management application on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

  2. Create an S3 Bucket on AWS using Terraform

    In this article, I will show you how to use Terraform to create an S3 bucket on AWS. Before proceeding, I assume that you are familiar with S3 bucket if not then you can click here to see the steps to create an S3 bucket from the AWS console.

  3. How To Change File Attributes in Linux With Chattr Command

    File attributes are certain properties that are associated with the file. The attributes allow a file to have some characteristics that are valid for all users.

    You may be familiar with the file permissions on Linux. As Linux is a multi-user operating system, it is possible to assign different file or folder permissions for different users.

    File attributes are quite similar to permissions on Linux. However, while basic permissions are only limited to read, write, and execute, the attribute allows the files or folders to have some extended sets of rules that apply on them.

    We can change or modify file/folder permissions with the chmod command. If you are not familiar with the Linux permissions, we recommend you to take a look at our comprehensive guide on the matter. Knowledge of file or folder permissions are not required to follow this tutorial.
    An important thing to remember about the attributes is that the attributes generally apply to all the users in the system (even root).

    For example, if a file were to be assigned the read-only attribute, that file would not allow any user (including root) to modify it. Obviously, the root user could modify the file, but only after removing the read-only attribute.

  4. Apt vs Apt-get Commands Explained: Which One To Use?

    As a regular Ubuntu or Debian Linux user, you might have noticed that some package installer, removal, or updating commands use the apt command instead of the apt-get command. Now, as a day-to-day Linux user, you would not get to know what they are and which command is used for what! But as a power Linux/Ubuntu user, you definitely must know the difference between apt vs apt-get commands.

    In the default command lists of Ubuntu, the apt-get command has been widely used for a long while. The new apt command was introduced a few years ago to increase the work efficiency and make the commands process simpler. Though there are some packages that only work with apt-get, hence most cache loading and cache removing or updating functions are nowadays done by the apt command.

  5. How to install Ajenti 2 Control Panel on Debian 11

    Ajenti 2 is an open-source, web-based control panel that can be used for a large variety of server management tasks. It can install packages and run commands, and you can view basic server information such as RAM in use, free disk space, etc. All this can be accessed from a web browser. Optionally, an add-on package called Ajenti V allows you to manage multiple websites from the same control panel.

    In this tutorial, we are going to install Ajenti 2 on our Debian 11 server.

  6. Josef Strzibny: Summer and winter time changes with DateTime

    Developers usually think of timezones, but European summertime changes can be easily overlooked. I have to admit I overlooked them when parsing dates with DateTime.from_naive!/2.

    What’s the issue, you ask?

read more

How Set or Change Time Zone in Linux

Friday 26th of November 2021 03:00:51 PM
In Linux system, time zone points to local time of region or county. When time zone is set in linux then it’s time automatically set according to region or country. It is always recommended to set correct time zone according to the geographical location of the system. The post How Set or Change Time Zone in Linux appeared first on Linux Today.

Six more stable kernels

Friday 26th of November 2021 02:40:50 PM
Greg Kroah-Hartman has announced the release of six new stable kernels: 5.10.82, 5.4.162, 4.19.218, 4.14.256, 4.9.291, and 4.4.293. These kernels contain lots of important fixes throughout the tree; users of those series should upgrade.

Security updates for Friday

Friday 26th of November 2021 02:14:54 PM
Security updates have been issued by Fedora (freerdp, gnome-boxes, gnome-connections, gnome-remote-desktop, guacamole-server, hydra, java-1.8.0-openjdk-aarch32, medusa, mingw-gstreamer1, mingw-gstreamer1-plugins-bad-free, mingw-gstreamer1-plugins-base, mingw-gstreamer1-plugins-good, php, pidgin-sipe, remmina, vinagre, and weston), openSUSE (kernel and netcdf), and SUSE (kernel and netcdf).

How To Run A Command After The Previous One Has Finished On Linux

Friday 26th of November 2021 02:00:02 PM
This article explains how to run a command after the previous command has finished running. You can run a command after the previous one has finished, depending on the previous command’s exit status (if it failed or not) or regardless of this. The post How To Run A Command After The Previous One Has Finished On Linux appeared first on Linux Today.

Fedora Community Blog: Friday’s Fedora Facts: 2021-47

Friday 26th of November 2021 02:00:00 PM
Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! Fedora Linux 33 will reach end of life on Tuesday 30 November. The F35 retrospective survey is open through 4 December. I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information. AnnouncementsCalls for ParticipationHelp wantedUpcoming meetingsReleases Announcements F35 elections voting is underway.Fedora Linux 33 reaches end of life on Tuesday 30 November.The Taiga instance on will be retired on 17 December.Red Hat is hiring a software engineer to work on Toolbx. CfPs ConferenceLocationDateCfPSCaLEPasadena, CA, US5–8 Marcloses 30 Nov Help wanted 319 package review requests are awaiting a reviewerOrphaned packages seeking maintainersThe Fedora CoreOS team wants your feedback. Please take their short communication survey.What worked well—and what didn’t—during the F35 release cycle? Let me know in the retrospective survey by 4 December.jjames is looking for maintainers to take over mathematical packages. Upcoming test days The call for F36 Test Days is open. Prioritized Bugs See the Prioritized Bugs documentation for information on the process, including how to nominate bugs. Upcoming meetings FPgM Office Hours — 1300 UTC Wednesday and 2000 UTC Wednesday in #fedora-meeting-1Prioritized bugs meeting — 1500 UTC Wednesday in #fedora-meeting-1 Fedora Social Hour — 1400 UTC Thursday in #social on Releases Releaseopen bugsF334622F345514F351965F36 (rawhide)6641 Fedora Linux 35 Elections 2021-11-26 — Voting begins2021-12-09 — Voting ends2021-12-10 — Results announced Fedora Linux 36 305 packages fail to build from source57 packages fail to install Changes The table below lists proposed Changes. See the ChangeSet page or Bugzilla for information on approved Changes. ProposalTypeStatusPackage information on ELF objectsSystem-WideFESCo #2687ELN-ExtrasSystem-WideFESCo #2700Unit Names in Systemd MessagesSelf-ContainedFESCo #2701Remove Wire Extensions SupportSelf-ContainedFESCo #2702ostree native containers / CoreOS layeringSystem-WideAnnouncedPlocate as the default locate implementationSelf-Contained ChangeAnnouncedPostgreSQL 14Self-ContainedAnnounced Fedora Linux 37 The table below lists proposed Changes. See the ChangeSet page or Bugzilla for information on approved Changes. ProposalTypeStatusRetireARMv7System-WideFESCo #2703 Contributing Have something you want included? You can file an issue or submit a pull request in the fedora-pgm/pgm_communication repo. The post Friday’s Fedora Facts: 2021-47 appeared first on Fedora Community Blog.

More in Tux Machines

today's howtos

  • So this is why Deepin requires so much disk space for installation –

    Deepin is a desktop Linux distribution with roots in China. It is based on Debian, but ships with its own graphical interface called Deepin Desktop Environment and a set of Deepin-developed tools to go with it. The last version I installed was from 2015, so since I’m gradually coming back to writing for this blog, I decided to test drive the latest edition – Deepin 20.3, which was released on Nov. 25. For me that means installing it in a virtual environment using VirtualBox. For such installations I typically assign the virtual disk 20GB of disk space. And so it was with Deepin 20.3. But that didn’t end well because at some point the installation failed, with the message shown in Figure 2: “You need at least 64 GB of disk space to install Deepin. To get better performance, 128 GB.”

  • 13 exercises to boost your Linux skills | Enable Sysadmin

    Work through this Linux fundamentals checklist to make sure you're ready for whatever comes your way at home, at work, or on certification exams.

  • BASH 01 - Script Basics |

    This article is the first in a series of articles to cover Bash Scripting. More articles will follow which will build on each other, so make sure you look over each article. It is preferable to read the articles in order (which is why I will number them). Scripting is a very useful ability for someone using Linux. Making scripts is especially useful for Administrators. Everyone should benefit from Bash Scripting. Bash is the most common shell interpreter on Linux systems. When you open a Terminal, you are in an interactive shell environment. To verify that your system is using the Bash shell using the command: 'echo "$SHELL"'.

  • What’s the Difference Between Exposing and Publishing a Docker Port? – CloudSavvy IT

    Exposed and Published container ports are two different but related concepts in Docker. Exposed ports are defined in your Dockerfile as simple metadata. You must publish them when your container starts if you want to enable outside access.

  • How to set up high-refresh rate monitors on Linux

    Do you have a high refresh rate monitor? Are you running Linux? Can’t quite figure out how to change the refresh rate? We can help! Follow along with this guide as we go over how to change the refresh rate on popular Linux desktop environments!

  • How to Install pgAdmin 4 on CentOS 8 – NextGenTips

    In this tutorial guide, I will be taking through the installation of pgAdmin 4 version 6.2 on CentOS 8 pgAdmin 4 is a free and open-source management tool for Postgres. Its desktop runtime written in NWjs allows it to run standalone for individual users, or the web applications code may be directly deployed on a web server for use by the web browser. pgAdmin 4 is a complete rewrite of pgAdmin, built using Python and Java.

  • How to Update to MATE Desktop 1.26 on Ubuntu 21.04

    Ubuntu MATE is a more retrospective version of Ubuntu, one that largely lets you continue using Ubuntu in the way it functioned over a decade ago. But despite how things may look, updates do continue to roll out for the MATE desktop environment that is Ubuntu MATE's namesake. The latest iteration is MATE 1.26. Here's how you can update the MATE desktop in Ubuntu 21.04 to the latest version.

  • How to Change a Users Shell in Linux - Unixcop the Unix / Linux the admins deams

    In this tutorial, we will show you how to change the shell of a user in Linux. The shell is a program that accepts and interprets commands. there are several shells such as bash, sh, ksh, zsh, fish and many other lesser known shells available on Linux. Bash is a Unix shell and command language for the GNU Project as a free software replacement for the Bourne shell. First released in 1989,it has been used as the default login shell for most Linux distributions.

  • How to use shutdown command with examples - Unixcop the Unix / Linux the admins deams

    “Shutdown” refers to the process of stopping and shutting down a computer or server. This involves cutting the power to the main components of the system using a controlled process. Applications are closed, active processes and protocols are saved to the hard drive, device drivers are removed, and user settings are saved in the process. There are several options to do so, including scheduling a shutdown at a specific time, shutting down immediately, broadcasting a unique message, and so on.

  • How to Install MySQL Database on Ubuntu 20.04 | RoseHosting

    MySQL is an open-source relational database management system (RDBMS), it’s widely used and part of the popular LAMP/LEMP stacks. The data is organized in one or more tables in which the data types may be related to each other and MySQL uses SQL Structured Query Language to manage its data. Considering its part of the LAMP/LEMP stack it is used by many database-driven web applications such as WordPress, Magento, Drupal, and Joomla. Today we will install MySQL on our server and create a database and user with chosen permissions on this database, let’s get started!

  • How to install deepin 20.3 - Invidious

    In this video, I am going to show how to install deepin 20.3

Dockeye - New Graphical App to Manage Docker Containers / Images in Linux

Running applications via Docker in Ubuntu Linux? Dockeye is a free open-source tool to manage your containers and images via a graphical user interface. Dockeye is written in Rust programming language. It provides a dark UI (light mode is also available) that list Docker containers and images in tabs. For each container, it provides options to control start, stop, pause, and remove operations. User may also check the detailed information about a container, including ID, image, maintainer, labels, environment, network info, CPU, Memory and other system resource usage. And, app running log is available in tab for debugging purpose. Read more

Raspberry Pi CM4-based panel PC offers DAQ inputs and M.2 NVMe

Sensoper’s 7-inch “SC-PC” HMI panel PC runs Linux on a Raspberry Pi CM4 and supplies GbE, M.2 for NVMe, RS-485, 3x USB, 8x digital inputs, 7x transistor outputs, and 8x analog inputs with a choice of 0-10V or 4-20mA ranges. Michigan-based Sensoper Controls has launched a 7-inch, industrial panel-PC in two variants: an SC-PC-AV8-TO7 model with 8x 0-10V analog inputs and an SC-PC-AM8-TO7 with 4-20mA analog inputs. The otherwise identical panel PCs run Raspbian (Raspberry Pi OS) Linux with pre-installed Node-RED on the Raspberry Pi Compute Module 4. Read more

Android Leftovers