That screenshot up top looks like ElementaryOS Luna but with NORK localisation
Although it has an old versions of KDE (3.5.1) libreoffice and firefox
The latest copy of North Korea's in-house Red Star Linux has leaked to the internet and it looks a lot like OS X, computer science graduate Will Scott says. An unnamed source contacted Scott ahead of his talk on Red Star and North Korea computing at the Chaos Communications Congress last month and shortly after published the …
I would have liked to know a little more about the students themselves, but I guess for an IT presentation, and with time constraints, this wasn't gong to happen here. Still, what a great presentation.
BTW, the video here was unwatchable, but I got a good stream of Will Scott's presentation from the North Korea Tech web site.
Nah, I think you will find NK believe Apple have copied their OS, "Like monkeys stealing butter from the fridge" (or some other nonsensical statement, I think they use a random phrase generator.) Apple better batten down the hatches, the three letter agencies may have another PR exercise coming their way (who do you think it was that really hacked Sony?)
My iPad would be much cooler with an aerial. Apple, take note.
Funny thing, mobile devices with embedded TV are big in Asia. A lot of Chinese no-brand phones (smart and dumb alike) pack analog TV receptors, while many Japanese devices support 1seg. Some, like my own Android 2.3 LUMIX Phone, even include an extensible antenna, though many don't bother. I haven't checked if they do tablets, but I bet they do.
So the good news is that you can have an aerial-equipped tablet! All you have to do is (1) take a trip to Asia and (2) abandon your false Apple god for the Truth and Glory of Our Saviour Google and His Prophet Android. A bit of tourism, a nifty piece of kit and salvation to your immortal soul all in one go, what's not to like?
"Unfiltered" - no content restrictions were imposed.
"logged" - a record of what activities were carried out is kept.
Two distinct options which are not mutually exclusive.
The use of a proxy would allow filtering to occur, if the operators of the proxy so desired, but the implication is that they have chosen not to do so.
Biting the hand that feeds IT © 1998–2019