today's leftovers
-
Lenovo ThinkPad T470 Ultrabook running Linux - Part 2 - Specifications - LinuxLinks
In the first part of this series, we assessed the condition of the refurbished machine. Overall the laptop is in better shape than we expected for a grade B unit although the display was a mite disappointing given its diffusion issues.
Let’s now move on and use inxi, an open source command-line system information tool, to interrogate the system.
-
Special Year End Promotion for Librem 5 USA - Purism
Score $100 off this holiday season on your order for Librem 5 USA. With the holiday season in full swing, this is a great gift for any one in your family concerned about secure supply chain or online privacy. Built with Made in USA electronics, we ship globally, within 10 business days. Order here with the code LIBREM5USA when you checkout. The offer is valid till 5 December 2022.
-
This skull-like android head was made to mimic human expressions | Arduino Blog
Peter Balch visited a robot exhibit at his local museum and noticed that one of the most popular pieces was a robot head that would track and mimic visitors’ faces. That was so interesting that Balch decided to replicate the project in order to learn how it was done. To do that, he first needed a robot head to work with. This Instructables tutorial explains how he built a skull-like android head that will eventually mimic human expressions.
Balch hasn’t yet tackled the facial detection and expression recognition portions of the project, which will require significant processing power. But he has built the android head that will receive the expression commands. It resembles a human skull with a copper tube framework that acts as both a support structure and a design accent. The head also has copper wire eyebrows (with heat-set insert ends) and plastic eyeballs from a cheap toy.
-
Epson stops making laser printers for sustainability reason
-
CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the "Date Added to Catalog" column, which will sort by descending dates.
-
Owkin taps Linux Foundation to open-source its AI learning software
Just a few months after publishing the results of a project wherein they convinced 10 competing pharma companies to give the same AI access to their data sets, life sciences AI specialist Owkin is taking another step towards de-siloing drug development data: It’s making its federated learning software Substra open source and placing it in the charge of the Linux foundation.
-
UK watchdog investigates of Apple and Google 'stranglehold' • The Register
-
Microsoft 365 faces darkening GDPR compliance clouds after German report • TechCrunch