Language Selection

English French German Italian Portuguese Spanish

Humor

Microsoft loves Microsoft Linux

Filed under
Humor

Microsoft loves Microsoft

Summary: A very old cartoon/column (half a century old) rewritten to explain where Microsoft stands when it comes to "loving" Linux

The Microsoft Commandments

Filed under
Humor

Microsoft B0rg

  1. Thou shalt not host a FOSS project outside GitHub (otherwise it won’t ‘count’)
  2. Thou shalt not edit code without Visual Studio (which now has an “open” — albeit spying and malicious — component for openwashing purposes)
  3. Thou shalt not code without .NET (or Mono)
  4. Thou shalt not use a voting machine without Windows (we have just announced some openwashing component to make up for the NSA back doors that compromise elections worldwide)
  5. Thou shalt not boot GNU/Linux as a standalone operating system (UEFI might not permit this anyway, unless we sign for approval)
  6. Thou shalt not get get a GNU/Linux distribution outside our Store
  7. Thou shalt not buy a computer without Windows preinstalled; those are “naked PCs” and everyone who buys such PCs is a “pirate”
  8. Thou shalt not disparage or even publicly criticise our staff (that would be in violation of GitHub rules, a Code of Conduct, T&C and so on)
  9. Thou shalt not report back doors in our software or leak NSA tools that take advantage of these (there’s a prison sentence for doing so)
  10. Thou shalt not write in mass media things that refute our narrative (proving that we are chronic liars); we would bribe the publication using advertising money and have you sacked
  11. Thou shalt not use open formats such as OpenDocument except inside Microsoft Office, which is incompatible with all other software (by design)
  12. Thou shalt not distribute Linux without paying Microsoft for patents; we’re still suing companies (in 2019) for having the audacity to do so
  13. Thou shalt not host a site or a service outside Azure; we'd sic patent trolls at you
  14. Thou shalt not oppose Microsoft’s lock-in and proprietary software shims inside Linux; we’d send our media partners (Condé Nast) to oust you, at least for a month if not permanently
  15. Thou shalt not report our crimes to the authorities; doing so would make you a “toxic”, “intolerant” person
  16. Thou shalt not use the GPL unless all other options have been exhausted
  17. Thou shalt not adopt a Web browser other than MSIE or our rebranded Chrome, also known as Edge; we’d occasionally tinker with your computer’s settings to remind you to quit using other browsers or refuse the download of such “malware”

Observations of a Egotistical Technical Elitist

Filed under
Humor

Lets be honest, the title alone sets the tone of this post, so please no comments stating i'm an elitist snob, because this i'm am keenly aware of. However a touch of honesty now and again does tend to go a long way.

So what's the problem? Well there are more than one and they grind me down on a daily basis, so it's time to air them here and these are all tech issues..

So lets start with...

2012 Year of the Linux Desktop

Filed under
Humor

I declare 2012 the Year of the Linux Desktop! At least on my computer. Smile

Happy Birthday Susan aka srlinuxx

Filed under
Humor

Happy Birthday Susan aka srlinuxx!!! I can't believe you are 39 yet again! Big Grin Hope you have a great day and a prosperous New Year.

Big oops! Leo Laporte posts love affair online.

Filed under
Humor

Big oops!!! Leo Laporte delivers technology advice to millions managed to broadcast an explicit Google chat with his lover, exposing the affair he's apparently been carrying on with his CEO.

http://gawker.com/5870610/how-the-voice-of-tech-leaked-his-own-sex-chat

Looks like someone has been very very naughty! LOL

Find His Porn: Evil Website of the Week

Filed under
Humor

Just found this on Read Write Web...

Here's our nominee for most evil Web service of the week:FindHisPorn.com. For a one-time low price of $49.99 only $19.95! Limited time offer!, you can allow a dubious piece of Java voodoo onto your PC (Windows only) and let it scrape the contents of your hard drive and show you all the porn it finds. It's just perfect for spying on that special someone in your life.

Find His Porn is cynically exploiting the paranoid and freaked-out, violating privacy, jeopardizing security and taking people's money. It has been created under a total veil of secrecy. Oh, it's also "perfect for ✓ Boyfriends, ✓ Husbands and ✓ Kids" with the "goal of empowering women everywhere." With its marketing finely tuned, Find His Porn profits off of people's engrained norms, broken trust and technical ignorance

Read more...

*A Cow based Economics Lesson;

Filed under
Humor

SOCIALISM
You have 2 cows.
You give one to your neighbor.

COMMUNISM
You have 2 cows.
The State takes both and gives you some milk.

FASCISM
You have 2 cows.
The State takes both and sells you some milk.

There are more...

Mozilla forms partnership with Tylenol

Filed under
Humor

Firefox product manager Asa Dotzler said today that Mozilla has formed a partnership with Tylenol. This is in response to the business community after complaints that Mozilla's new "Rapid Release" development cycle will cause headaches for IT managers. So starting today all users who download Firefox 5.0 will also get a coupon for a discount off of Tylenol's "Rapid Release" Gel tablets.

Truths

Filed under
Humor

My sister forwarded this to me and since things are so dismal in the world these days, I thought a few chuckles might be the order of the day.

Syndicate content

More in Tux Machines

Who cares about Emacs?

GNU Emacs isn't the oldest interactive text editor for Unix—it's predated (at least) by the Vi editor—nor is it the only Emacs in existence. However, it's surely the most popular Emacs and one of the best editors available on POSIX. Or it was until fresh new editors, like Atom, VSCode, and Brackets, came to the fresh new open source landscape of today. There are so many options for robust text editors now, many of which have iterated upon Emacs' ideas and traditions, that you may well wonder whether GNU Emacs is still relevant. Read more

Devices: PicoCore, u‑blox and ESP32

  • PicoCore MX8MN is a Tiny NXP i.MX 8M Nano Computer-on-Module

    The PicoCore MX8MN Nano carries the NXP i.MX 8M Nano F&S Elektronik Systeme has announced the development of the smallest i.MX 8M based CoM yet: the PicoCore MX8MN Nano.

  • u-Blox Launches JODY-W3 WiFi 6 & Bluetooth 5.1 Module for Automotive Applications

    u‑blox has just launched JODY-W3 wireless module which the company claims to be the first automotive-grade WiFi 6 module. Apart from supporting 802.11ax WiFi with 2×2 MIMO, the module also comes with dual-mode Bluetooth 5.1 connectivity. WiFi 6 will be used for applications demanding higher bitrates such as ultra‑HD video infotainment streaming and screen mirroring, wireless back‑up cameras and cloud connectivity as well as vehicle systems maintenance and diagnostics. Bluetooth 5.1 will be used for keyless entry systems and other applications leveraging direction-finding and the longer range offered by the latest version of Bluetooth.

  • Barracuda App Server for ESP32 Let You Easily Develop Lua Apps via Your Web Browser

    We covered Real Time Logic’s open-source lightweight Minnow Server for microcontrollers last year, and now the company has released another project: Barracuda App Server for ESP32. This project is more complex and requires an ESP32 board with PSRAM to run such as boards based on ESP32-WROVER module with 4 to 8MB PSRAM. The Barracuda App server (BAS) comes with a Lua VM, and in complement with the LSP App Manager that facilitates active development on the ESP32 by providing a web interface. The Barracuda App Server runs on top of FreeRTOS real-time operating system part of Espressif free ESP-IDF development environment.

3-D Printing and Open Hardware: MakerBot, AAScan and RISC-V

  • MakerBot Targets Schools With Rebranded Printers

    MakerBot was poised to be one of the greatest success stories of the open source hardware movement. Founded on the shared knowledge of the RepRap community, they created the first practical desktop 3D printer aimed at consumers over a decade ago. But today, after being bought out by Stratasys and abandoning their open source roots, the company is all but completely absent in the market they helped to create. Cheaper and better printers, some of which built on that same RepRap lineage, have completely taken over in the consumer space; forcing MakerBot to refocus their efforts on professional and educational customers.

  • 3D-Printed 3D Scanner made to work with your phone

    An Arduino-based 3D scanner was created by an industrious 3D printing enthusiast and released open source this week for all to enjoy. This open source project was made to take out the most time-consuming component of the 3D scan process, giving said process instead to an Android phone combined with 3D-printed parts, a cheap motor, and an Arduino. This is not the first time such a system has been attempted, but it does appear to be the most complete and ready-to-roll system to date.

  • AAScan open source Arduino 3D scanner utilizes the power of your smartphone

    Using the power of Arduino and utilising the camera and powerful performance of a smartphone QLRO has created a fantastic 3D scanner aptly named the AAScan. Check out the video below to learn more about the Android 3D scanner which is open source and fully automated.

  • Video: RISC-V momentum around the world, from edge to HPC

    In this keynote talk from the 2020 HiPEAC conference, RISC-V Foundation Chief Executive Calista Redmond explains how the RISC-V open-source instruction set architecture is gathering momentum around the world, finding applications across the compute continuum from edge to high-performance computing.

  • Weekend Discussion: How Concerned Are You If Your CPU Is Completely Open?

    For some interesting Sunday debates in the forums, how important to you is having a completely open CPU design? Additionally, is POWER dead? This comes following interesting remarks by an industry leader this weekend. Stemming from discussions on Twitter about Raptor's new OpenBMC firmware with a web GUI in tow, one of the discussions ended up shifting to that of open CPU designs and the belief that secretive CPU startup NUVIA could be having an open-source firmware stack.

Security and FUD: SpaceX, NMap, Polyverse, MongoDB, NGINX and Kubernetes

  • All Those Low-Cost Satellites in Orbit Could Be Weaponized by Hackers, Warns Expert

    Last month, SpaceX became the operator of the world's largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000 over the next decade. This is part of its ambitious project to provide internet access across the globe. The race to put satellites in space is on, with Amazon, UK-based OneWeb and other companies chomping at the bit to place thousands of satellites in orbit in the coming months.

  • NMap - A Basic Security Audit of Exposed Ports and Services

    For a plethora of reasons, auditing the security of our servers and networks is of paramount importance. Whether we are talking about a development server, a workstation, or a major enterprise application, security should be baked into every step of the deployment. While we can easily check our firewall settings from “the inside” of our systems. It is also a good idea to run a security audit from "the outside”. Using a network enumeration tool such as the famous and highly vetted Network Mapper (NMap).

  • Cybersecurity startup Polyverse raises $8M to protect Linux open-source code from hackers [Ed: Right around the corner from Bill Gates, another company like Black Duck and it'll "protect" Linux... just buy its proprietary software]

    Polyverse has been validated by the U.S. Department of Defense for mitigating zero-day attacks, intrusions that occur just as a vulnerability becomes public, such as the infamous WannaCry ransomware and hacks of companies like Equifax. The company says its technology is “running on millions of servers.”

  • MongoDB: developer distraction dents DevSecOps dreams

    MongoDB’s director of developer relations has just opened a piece of internal research that suggests as few as 29% of Europe’s developers take full responsibility for security. Now, 29% is a somewhat arbitrary figure, cleary i.e. it could be 22.45% or it could be 39.93%… the fact that the firm has pointed to an exact sum in this way is merely intended to show that it has undertaken a degree of calculation and statistical analysis

  • NGINX Unit Adds Support for Reverse Proxying and Address-Based Routing

    NGINX announced the release of versions 1.13 and 1.14 of NGINX Unit, its open-source web and application server. These releases include support for reverse proxying and address-based routing based on the connected client's IP address and the target address of the request. NGINX Unit is able to run web applications in multiple language versions simultaneously. Languages supported include Go, Perl, PHP, Python, Node.JS, Java, and Ruby. The server does not rely on a static configuration file, instead allowing for configuration via a REST API using JSON. Configuration is stored in memory allowing for changes to happen without a restart.

  • Kubernetes Security Plagued by Human Error, Misconfigs

    Following a year of numerous security bugs within the Kubernetes ecosystem and the first security audit of Kubernetes conducted by the Cloud Native Computing Foundation (CNCF), which hosts the open source platform, continued wide-spread adoption has seen security become somewhat of an afterthought. However, if security concerns continue inhibiting business innovation, does that fall on businesses for neglecting security practices or the market for not providing them with the tools to confidently secure their deployments? “People just get security wrong sometimes,” McLean said. “Companies need a combination of increased learning, cross-pollination, new tooling, and updated processes to identify and remediate these security ‘mistakes’ during build and deploy vs. waiting for exposure during runtime.”