Language Selection

English French German Italian Portuguese Spanish

Just talk

Orangutans are some of the most solitary animals critically endangered as human consumption grows; Ban Palm oil Industry.

Filed under
Just talk

Orangutan

Orangutans are some of the most solitary animals critically endangered as human consumption grows.

Orangutans are currently only found in the rainforest of Borneo and Sumatra where both species are endangered. The orangutans' habitat has decreased and is rapidly being devastated by loggers, palm oil plantations, gold miners, and unnatural forest fires.

Watching videos of orangutans over hundreds of times is nerve-wracking, seeing them in distress and in great trauma as babies watch their mothers hacked and killed by poachers. They are using their machete which is so inhumane, as many of these infants die without the help of their mother and some other infants are sold as pets, ending in the hands of their 'owner', maltreated and malnourished, making their situation even worse. This happened because of the humongous demand and consumption of humans. Guilt is creeping on me; while enjoying my food and applying all the cosmetics for vanity it is like slaughtering an innocent and beautiful primate slowly and accurately. I wasn't thinking at all; I'm closely blinded of my needs, having never bothered to think that somewhere out there someone is tormented. I can't let this happen any longer. I must act and make a stand and be the voice of orangutans. I'm calling for everyone to ban and stop buying palm oil products. We must stop deforestation and the palm oil industry, strongly and swiftly before orangutans and all other animals sail into extinction.

Beijing Zoo is No Place for Pandas

Filed under
Just talk

Pandas in Beijing Zoo
Photo credit: Nick Hopkins

I am a Panda lover. I work as a support engineer in an I.T company here in the United Kingdom. Most of my spare time is spent watching different Panda videos -- both old and new videos. Basically, it is my therapy; a 'stress release' for me. I find them to be adorable and precious creatures. As a matter of fact, I would like to volunteer to come to Sichuan. I want to experience and feel what it's like to be a Panda keeper, to be able to interact with them for real. The Panda is China's National Treasure, so it's a shame to watch the Panda videos from Beijing zoo, as the place is disgusting and not ideal for Pandas to live in (and for sure for all the rest of the animals who unfortunately got stuck in this prison cell).

The place looks like a ghost town. Lifeless and languished. Knowing that Pandas wear a thick fur on their body, can you imagine what it feels for them in 30C or 35C (summer temperature)? What it probably feels like all the time? Come on, if you really care, you must do something now, otherwise these Pandas will die. Please bring them back to their sanctuary where they really belong.

Winner: Triathlon in The Spa At The Midland

Filed under
Just talk

The Spa At The Midland - Rianne SchestowitzI never thought I could win in a challenge of 3 events.

I guess age is not an excuse for giving up... more so in physical fitness; as the saying goes, health is wealth.... consequently, I'll keep doing my routine and even yoga. It is extremely relaxing!

Motivation, hard work, discipline. By-product is triumph... Smile

GNOME Release Party Manchester

Filed under
Just talk

GNOME Release Party Manchester

Summary: Today's party celebrating the release of GNOME 3.22

RIANNE AND I both attended today's GNOME release party in Manchester. It was a good opportunity to meet some geeky people, including a few from Codethink, which organised this event.

With the latest Kubuntu 15.10 (Wily)

Filed under
Just talk

I love the KDE desktop—I really do. However… here are some grumbles.

Happy Easter and Remarkable Spring

Filed under
Just talk

Happy Easter

Happy New Year From Roy and Rianne

Filed under
Just talk

Xmas tree

2014 was a great year for Tux Machines. The site moved to a new server with much higher capacity and better caching, Rianne and I moved to a better house, and we finally set up a tree the way we wanted to. Financial contributions from readers were enough to subsidise a laptop for Rianne and she now happily submits a lot of links from there.

In 2015 we expect to improve both volume and quality of links. We are going to think of ways to improve the Web site and we openly welcome suggestions from readers. The goal is to make the site more informative more efficiently. We wish to help readers steer away from cruft and gossip and instead identify news of importance, without repetition unless new information and details arise.

Vacation Photos

Filed under
Just talk

Tux and Rianne

Last week we did not post as much news as usual because we went to the south of England with Roy's sister. We did take some photos.

Fireworks! And Tux Machines Works.

Filed under
Just talk

November effigies

Fireworks continue to appear all over the place, even a day after Guy Fawkes Night. Yesterday the city was full of smoke (as though it is under heavy fog all around), but that is just an annually-recurring tradition. It's very bad for the environment, but hey, lots of people enjoy it.

Over 400 Guy Fawkes tried to destroy the House of Lords, just as some gang or a person has been trying now for nearly two months to keep Tux Machines offline. Thankfully, however, the attacks are not succeeding anymore because we have refined our defenses and the offending zombie PCs are being banned left and right (all day long). Surely the plot has been foiled. All we need now is effigies.

Tux Claus

Filed under
Just talk

Tux Claus

Summer is finally over, but summertime or the climate hasn't officially changed yet. I wonder if I can still do something out of the ordinary, but the weather is disrupting my planned activities outside. Sometimes there is sunlight, but the next minute the dark clouds covers the beautiful sky and it makes the day dull and cold.

Two days ago my husband and I went to stroll inside the mall and ended up buying some personal stuff in a store. While I was in a queue to pay my husband was in a hurry to add this tiny bit of stuff which I didn't recognise at first. I thought of ignoring and not buying that tiny little thing. Then my husband said "look what I found" and then I asked what is it -- it's tux! Tux Claus. Soon I saw a tiny penguin dressed in Santa clothes; the design was simple ,but it was artistically made. I know it is still early, but we're both excited to add Tux under our Christmas tree and be merry.

Syndicate content

More in Tux Machines

today's lefftovers

OSS Leftovers

  • Running for the board of the Open Source Initiative – a few words
    Today I would like to explain my reasons for my candidacy at the board of the Open Source Initiative. I can think of two kinds of reason for my decision: one is personal, and the other one is directly related to current state of Open Source and software freedom. Let’s start with the first one: I’m currently helping the Open Information Security Foundation and the Suricata project in my capacity at ANSSI, while contributing in a minor way to the LibreOffice project and the Document Foundation.
  • Tutanota: Encrypted Open Source Email Service for Privacy Minded People
    Since then, I have heard of another email provider that you may be interested in. It’s a little different, but it touts some of the same features ProtonMail does: privacy, security, open-source code, etc. It’s called Tutanota, and like ProtonMail, I am a very big fan.
  • Open FinTech Forum – Event preview, October 10-11, New York City.
  • The tracker will always get through
    A big objection to tracking protection is the idea that the tracker will always get through. Some people suggest that as browsers give users more ability to control how their personal information gets leaked across sites, things won't get better for users, because third-party tracking will just keep up. On this view, today's easy-to-block third-party cookies will be replaced by techniques such as passive fingerprinting where it's hard to tell if the browser is succeeding at protecting the user or not, and users will be stuck in the same place they are now, or worse. I doubt this is the case because we're playing a more complex game than just trackers vs. users. The game has at least five sides, and some of the fastest-moving players with the best understanding of the game are the adfraud hackers. Right now adfraud is losing in some areas where they had been winning, and the resulting shift in adfraud is likely to shift the risks and rewards of tracking techniques.
  • MozMEAO SRE Status Report - February 16, 2018
    Here’s what happened on the MozMEAO SRE team from January 23 - February 16.
  • The major milestones of the Government Digital Service (GDS)
  • PyTorch Should Be Copyleft
    Most people have heard of Google’s Tensorflow which was released at the end of 2015, but there’s an active codebase called PyTorch which is easier to understand, less of a black box, and more dynamic. Tensorflow does have solutions for some of those limitations (such as Tensorflow-fold, and Tensorflow-Eager) but these new capabilities remove the need for other features and complexity of Tensorflow. Google built a great system for doing static computation graphs before realizing that most people want dynamic graphs. Doh! [...] I wish PyTorch used the AGPL license. Most neural networks are run on servers today, it is hardly used on the Linux desktop. Data is central to AI and that can stay owned by FB and the users of course. The ImageNet dataset created a revolution in computer vision, so let’s never forget that open data sets can be useful.
  • Linux on Nintendo Switch, a new Kubernetes ML platform, and more news
    In this edition of our open source news roundup, we take a look at the Mozilla's IoT gateway, a new machine learning platform, Code.mil's revamp, and more.

Security: France, Munich, 'Smart' Meters, MeltdownPrime and SpectrePrime

  • Highlights of the French cybersecurity strategy

    First, the document describes that in France cyberdefence and cyberoffence are separated. This is directly opposed to the models employed in Anglo-Saxon countries. But it’s shown as an asset. Key argument: it respects freedoms and civil liberties.

    The document then lists the six general objectives of cyberdefence, namely: prevention, anticipation, protection, detection, attribution, reaction (remediation). The strategy itself is complete, it focuses on civil, military, domestic, external, and international levels. Let’s say it’s a rarity in the business in strategic cybersecurity documents.

    [...]

    The strategy then mentions that one of the solutions could be to release source code and documentation after an end of support date.

  • The Munich Security Conference 2018

    Over the past five decades, the Munich Security Conference (MSC) has become the major global forum for the discussion of security policy. Each February, it brings together more than 450 senior decision-makers from around the world, including heads-of-state, ministers, leading personalities of international and non-governmental organizations, as well as high ranking representatives of industry, media, academia, and civil society, to engage in an intensive debate on current and future security challenges.

  • Smart meters could leave British homes vulnerable to cyber attacks, experts have warned
    New smart energy meters that the Government wants to be installed in millions of homes will leave householders vulnerable to cyber attacks, ministers have been warned.
  • MeltdownPrime and SpectrePrime: Researchers nail exploits
    "The flaws—dubbed Meltdown and Spectre—are in chips made by Intel and other major suppliers. They can allow hackers to steal data from the memory of running apps, including password managers, browsers and emails." The authors of the paper on arXiv, Caroline Trippel, Daniel Lustig, and Margaret Martonosi, discuss a tool they developed for "automatically synthesizing microarchitecture-specific programs capable of producing any user-specified hardware execution pattern of interest." They said they show "how this tool can be used for generating small microarchitecture-specific programs which represent exploits in their most abstracted form—security litmus tests."

How Linux became my job

I've been using open source since what seems like prehistoric times. Back then, there was nothing called social media. There was no Firefox, no Google Chrome (not even a Google), no Amazon, barely an internet. In fact, the hot topic of the day was the new Linux 2.0 kernel. The big technical challenges in those days? Well, the ELF format was replacing the old a.out format in binary Linux distributions, and the upgrade could be tricky on some installs of Linux. Read more