Monday, January 7, 2008

Christopher Lee McCuin, 25, from Tyler, Texas in the United States has been arrested after police found him possibly preparing to eat the body parts of his dead girlfriend, Jana Shearer aged 21. He was also charged with stabbing his ex-wife’s boyfriend, William Veasley, 42.

According to reports, Shearer’s mother was told by McCuin to “look in the garage” where she discovered the mutilated body of her daughter. She then flagged down a police officer on the road.

McCuin called 911 after the mother left the house. According to reports, he told the dispatcher that he was boiling Shearer’s body parts and preparing to eat them. When police got to his home, they discovered one of Shearer’s ears boiling in a pot, and an unnamed piece of her flesh on the kitchen table, with silverware placed beside it. The rest of her body had several “chunks” missing from it, according to the Tyler Morning Telegraph quoting Sheriff J.B. Smith of the Smith County Sheriff’s Department.

Police later found out that McCuin had stabbed his ex-wife’s boyfriend, and also broke into Tyler Custom Openings, a local business, sometime on Friday or Saturday. He started by going to Shearer’s home on Friday January 4 to have a discussion with her, but she was never seen alive again. Before stabbing Veasley, he beat Shearer “with a blunt object, multiple times” to death. On Saturday morning, he arrived at his ex-wife’s home and fought with Veasley, stabbing him. He is currently in critical condition at a local hospital.

McCuin then broke into the Tyler Custom Openings and then went to his mother’s house where he took her to his home to show her what he had done. Although McCuin was inside the house when police arrived, he was able to escape and was chased for a short distance before being caught again.

McCuin is currently being held on a US$2,000,000 bail at Smith County jail.

Retrieved from “https://en.wikinews.org/w/index.php?title=Police_in_Texas_arrest_man_eating_dead_girlfriend&oldid=1700064”
Posted in Uncategorized

Wednesday, December 21, 2011

Former Salt Lake City mayor and human rights activist Rocky Anderson took some time to discuss his 2012 U.S. presidential campaign and the newly-created Justice Party with Wikinews reporter William S. Saturn.

Anderson served as mayor of Salt Lake City for eight years (2000–2008) as a member of the Democratic Party. During his tenure, he enacted proposals to reduce the city’s carbon emissions, reformed its criminal justice system, and positioned it as a leading sanctuary for refugees. After leaving office, Anderson grew critical of the Democratic Party’s failure to push for impeachment against President George W. Bush, and for not reversing policies on torture, taxes, and defense spending. He left the party earlier this year and announced that he would form a Third party.

Anderson officially established the Justice Party last week during a press conference in Washington D.C.. He proclaimed “We the people are powerful enough to end the perverse government-to-the-highest-bidder system sustained by the two dominant parties…We are here today for the sake of justice — social justice, environmental justice and economic justice.” The party promotes campaign finance reform and is attempting to appeal to the Occupy Wall Street movement. It is currently working on ballot access efforts, and will hold a Founding Convention in February 2012 in Salt Lake City.

Among other issues, Anderson discussed climate change, health care, education, and civil liberties. He detailed his successes as mayor of Salt Lake City, stressed the importance of executive experience, and expressed his views on President Barack Obama and some of the Republican Party presidential candidates. He spoke in depth about former Massachusetts governor Mitt Romney, with whom he worked during the 2002 Winter Olympics, and fellow Utahan, former governor and U.S. ambassador to China Jon Huntsman, Jr..

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_former_Salt_Lake_City_mayor_and_2012_presidential_candidate_Rocky_Anderson&oldid=2526540”
Posted in Uncategorized

Wednesday, June 29, 2011

In a 7-2 decision handed down on Monday, the US Supreme Court struck down California’s violent video game law and ruled that video games are protected speech covered by the First Amendment. The California law banned the sale and rental of violent video games to minors.

The underlying question was whether the violence in video games has the ability to affect children more than violence in other media, such as books, movies, plays and other forms of entertainment.

Video games qualify for First Amendment protection. Like protected books, plays, and movies, they communicate ideas through familiar literary devices and features distinctive to the medium.

Justice Antonin Scalia, writing for the majority, said that depictions of violence have never been regulated by the US government. Thus violent videos are not to fall under government control as does pornography but is to be accorded the same First Amendment protections as other forms of entertainment. The sale of violent video games is not to be criminalized and California’s attempt to do so was “unprecedented and mistaken.” Scalia noted, referring to fairy tales, that “the books we give children to read—or read to them when they are younger—contain no shortage of gore.”

[T]he books we give children to read—or read to them when they are younger—contain no shortage of gore.

The beginning of the decision states, “Video games qualify for First Amendment protection. Like protected books, plays, and movies, they communicate ideas through familiar literary devices and features distinctive to the medium. And ‘the basic principles of freedom of speech…do not vary’ with a new and different communication medium.”

“The most basic principle—that government lacks the power to restrict expression because of its message, ideas, subject matter, or content, Ashcroft v. American Civil Liberties Union, 535 U. S. 564, 573—is subject to a few limited exceptions for historically unprotected speech, such as obscenity, incitement, and fighting words. But a legislature cannot create new categories of unprotected speech simply by weighing the value of a particular category against its social costs and then punishing it if it fails the test.”

The justices were not convinced by the existing research that the interactive nature of video games pose a greater risk to society because of their interactive nature. None of the results of the existing research put before the court showed that violent games cause violent behavior. “Psychological studies purporting to show a connection between exposure to violent video games and harmful effects on children do not prove that such exposure causes minors to act aggressively. Any demonstrated effects are both small and indistinguishable from effects produced by other media. Since California has declined to restrict those other media, e.g., Saturday morning cartoons, its video-game regulation is wildly under-inclusive, raising serious doubts about whether the State is pursuing the interest it invokes or is instead disfavoring a particular speaker or viewpoint.”

According to Nadine Kaslow, professor and chief psychologist at Emory University Department of Psychology and Grady Hospital, the evidence regarding the effects of violent video games is mixed. While there is evidence to suggest that exposure of children to violence results in more aggressive and less pro-social behavior, some studies show there is no negative effect, she said. She point out that toy guns were popular and parents monitored whether toy guns were allowed in the home.

This ruling does not prevent private retailers from placing restrictions on their sale of video games. The video game industry currently has its own rating system, much like that used for movies, and educates retailers in using the rating system to prevent minors from buying mature-rated games. According to PC World the industry’s compliance is better than that of other entertainment industries. Further, parental controls have been added to game consoles.

The view of the Entertainment Software Association that a better strategy is the education of parents rather than court battles.

Retrieved from “https://en.wikinews.org/w/index.php?title=US_Supreme_Court_rules_video_games_are_protected_speech&oldid=4196173”
Posted in Uncategorized

Submitted by: Brian Chow

Do you need to request products samples for an event you are organizing? Do you need to request bulk freebies for fundraising? Do you need to find sponsors for product donations?

Here are strategies to help you request freebies and samples from companies and sponsors. You should be aware that the offers posted on many free stuff sites are not suitable for bulk requests. These sites list free stuff offered by corporations that use free offers to promote their products and services. Generally, these companies limit their samples to one per person, family, or an organization.

The best way to request multiple samples is to approach national and local manufacturers, stores, or companies directly. Visit their web sites and search for contact information of their corporate giving departments, public relations, or customer services. Then, email, write, or call to request the samples. You should consider writing letters using your organizations letterheads. In your letters, be sure to explain what you would like to request, why you need them, how you are going to use them, and how you would recognize the companies for their generosity.

When you contact large, national companies, you may want to find out if the companies have formal corporate giving policies. Use a search engine and search for the corporate giving or donation policies. Keywords to try are the companys name and corporate giving or the companys name and donation. Then, determine if your events or your organizations correspond to the policies, and compose your letter, following the instructions listed in the policies.

You may have better response rates from local companies. Try contacting companies that have target markets of your event or your organization. For example, I helped to organize a youth artwork contest. I contacted local fast food companies and youth clothing companies for the contest prizes. I was able to get a large duffle bag, a sweatshirt, and several gift certificates from local businesses.

[youtube]http://www.youtube.com/watch?v=RCW0VsfR9FM[/youtube]

When you are successful in requesting the samples, be sure to write thank you letters, including photos and videos to show how the samples were used and how the companies received recognitions.

Here are additional resources to help you request multiple free samples:

1. Read Secret Ways to Get Free Stuff to find more examples of contacting companies directly and asking for free stuff.

http://freestuffpage.com/forums/showthread.php?t=3469

2. Contact nonprofit groups such as Gifts in Kind International. These groups take extra inventories from manufacturers and redistribute them to other nonprofits. You may have to complete applications and wait to use these services.

http://www.giftsinkind.org/

3. Visit fundraising sites for resources at Yahoo! Directory of Fundraising

http://dir.yahoo.com/Society_and_Culture/Issues_and_Causes/Philanthropy/Nonprofit_Resources/Fund_Raising/

4. Read books on fundraising. Visit the site below for fundraising titles that you are able to locate in your local libraries.

http://govolunteer.ca/library/Search.do?keyword=Fundraising

Good luck and best wishes on your efforts in requesting multiple samples and donations.

About the Author: Brian Chow has been requesting freebies and samples on the web for over ten years. He is the operator of Free Stuff Page,

freestuffpage.com

, where you can get free samples, deals, contests, and more. Read more useful, related articles at the Frugal Living section at

freestuffpage.com/forums/forumdisplay.php?f=12

.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=23851&ca=Business}

Posted in Public Relations

Friday, June 24, 2011

A United Nations court today convicted a woman, a former minister in the Rwandan government, for her role in the 1994 genocide in the ethnic war between the Tutsi and the Hutu peoples.

Pauline Nyiramasuhuko, 65, was found guilty of seven charges including publicly inciting genocide and rape, and conspiracy to commit genocide “as part of a widespread and systematic attack against a civilian population on political, ethnic and racial grounds,” said the International Criminal Tribunal for Rwanda (ICTR), a UN backed court in Arusha, Tanzania.

Nyiramasuhuko, who was the Rwandan of Minister of Family and Women’s Affairs in Juvénal Habyarimana’s government in 1994 when about 800,000 mostly ethnic Tutsis were killed, was convicted and sentenced to life in prison today. Her son, Arsene Shalom Ntahobali, a militia leader charged with crimes against humanity, war crimes, and rape, was also convicted and sentenced to life. Four local officials were found guilty on genocide charges and given prison sentences ranging from 25 years to life.

According to prosecutor Holo Makwaia, Nyiramasuhuko intended to “destroy in whole or in part the Tutsi ethnic group in Butare”. Following the genocide, she fled Rwanda and was arrested in Nairobi, Kenya, in 1997.

Presiding Judge William Sekule read the judgment: “Many were physically assaulted, raped and taken away to various places in Butare, where they were killed. During the course of these repeated attacks on vulnerable civilians, both Nyiramasuhuko and Ntahobali ordered killings. They also ordered rapes. Ntahobali further committed rapes and Nyiramasuhuko aided and abetted rapes.”

Nyiramasuhuko is the first woman convicted of genocide by the ICTR, which was established in 1994 after approximately 800,000 Tutsis and politically moderate Hutus were massacred during the genocide.

Retrieved from “https://en.wikinews.org/w/index.php?title=Former_Rwandan_government_minister_Nyiramasuhuko_convicted_of_genocide&oldid=3985129”
Posted in Uncategorized

Friday, March 6, 2020

Yesterday, an all-women crew ran the Mysuru–Bengaluru Tippu Express in the Indian state of Karnataka. The state-run Indian Railways launched this event ahead of International Women’s Day, for promoting gender equality at work places.

B Shiva Parvathi was running the train as loco pilot (locomotive pilot), and 22-year-old Rangoli Patil was her loco co-pilot. The train left Mysore Junction railway station at 11:30 am IST (0600 UTC), covering a distance of 139km to reach KSR Bangalore station. The train had banners on it which mentioned “International Women’s Day Celebration”.

Speaking to newspaper Star of Mysore, B Shiva Parvathi said, “It is a proud moment for me to be steering this train today along with my Loco Pilot Rangoli and the all-women staff”. Mysore Divisional Railway Manager Aparna Garg told Wikinews only 10% of the employees in the Mysore Division were women, which constitutes about 650 female employees.

Mysore district comes under the South West Railway (SWR) branch of the Indian Railway. Mysore Division of the SWR celebration of the Women’s day started on March 1, and is planned till March 10. Various activities are being conducted in this period, including health check-ups, yoga, sports competition and trekking, newspaper The Hindu reported.

“The theme ‘Equal for All’ is an effort of the Railways to promote more women workforce and empower them. Women of today are no less to any men, be it in any field. I hope through such initiatives, more number of women are motivated to take up jobs in their respective fields of interest”, Garg told Star of Mysore.

  • 1
  • 2
  • 3

Retrieved from “https://en.wikinews.org/w/index.php?title=Indian_Railway:_all-women_crew_steers_Tippu_Express_ahead_of_International_Women%27s_Day&oldid=4552911”
Posted in Uncategorized

Submitted by: Kaitlin Ertha

Cellular cellphone spying apps are programs which are set up on the following form of people’s cell phones:

People you’re in a connection with you feel may be cheating on you or lying to you

Your son or daughter’s cell telephone to preserve track of who they are talking to and wherever they are going clearly for their own security as a worried father or mothe

[youtube]http://www.youtube.com/watch?v=mPbRc5FIgTM[/youtube]

If you are an employer and you want to keep track of your staff to make sure they are performing what they are meant to be carrying out and going exactly where they are intended to be goingCellular cellphone spying applications are a relatively new creation and the download and income of these applications has elevated substantially in just the previous yr or two. Almost certainly the most well-liked use of mobile mobile phone spying computer software applications is to find out if lovers are cheating on every other. This correlates with the truth that there is infidelity involved in near to fifty% of relationships out there like marriages. Though there are a good deal of signs of infidelity taking place in relationships these kinds of as:

Your husband or wife or boyfriend or girlfriend getting significantly less affectionate

Your husband or wife or boyfriend or girlfriend being away a lot more

Your lover dressing differently or putting on various cologne or perfumeIn fact there is really a guide out there referred to as 180 different signs your lover is cheating on you. But the difficulty with all these distinct indicators for figuring out if a person is cheating on you or not do practically nothing but improve suspicion and really few if any of them offer true cold challenging evidence of cheating.That is why cell telephone spying software program plans are getting to be so popular. They give you with undeniable evidence and they do so in fast vogue. Cell phone spying programs give you with full unrestricted entry to the most delicate info on your prospective cheating companion cell telephone such as:

Each and every phone contact manufactured or obtained which contains the time and the length of the telephone get in touch with as well as the true cellphone quantity

Text or SMS messages which includes the time and the specific text message as properly as the cellphone number concerned

Complete unrestricted accessibility to the target cell phones phonebook

Without having a doubt the most potent feature of these cellular cellphone spying packages is its GPS tracking abilities. Logging on to the mobile telephone spying members place you click the ‘GPS tracking tab’ and the person’s specific place (accurate inside of about 200 yards) is up-to-date on a map with their place shown to you in genuine-time. The apparent advantage to this attribute is you get to be a fly on the wall and see precisely wherever you’re cheating partner goes and when they go there.The bottom line is these cellphone spy plans supply you with undeniable evidence of a person’s lying and infidelity.The expense of cellular phone spying packagesThere are about 5 well-liked and efficient cell telephone spying plans you can use. Their attributes, options, and rates change broadly. As a general rule when it arrives to these spy plans the outdated phrase you get what you pay out for definitely applies.The minimum expensive mobile phone spy software program is only $49 for a complete year’s access but the information that is furnished to you in the members area significantly lacks crucial facts. For example the text concept panel in the members place of this certain phone spying software reveals you the time the text message was sent or received but it does not display you the text concept.The most high-priced telephone spy software will give you with the capabilities outlined previously mentioned as well as a spy bug characteristic which turns the person’s cell cellphone into a microphone to you can pay attention in on every little thing heading on inside twenty or 30 feet of the cell cellphone and a characteristic named remote call listening. This attribute notifies your cell cellphone with a text concept when the cell mobile phone of the individual you consider probably cheating on you helps make or receives a cellphone call You dial that person’s phone range when you get this text concept and you are patched in to that mobile phone get in touch with. You can hear both sides of the complete mobile phone conversation with neither of them figuring out you are there. In purchase to get entry to the remote get in touch with listening characteristic and the spy bug function you have to be a member of their Plus-X program which costs $349 for a yr membership. To me this is a tiny bit abnormal. I indicate the remote phone listening and the spy bug feature are fairly awesome resources but if your goal is to locate out if your wife or husband or lover is cheating on you it’s not necessary.The greatest cellular phones spying programs generally cost in between $60 and $80, consist of tons of capabilities, have the greatest satisfaction guarantees, operate on virtually all designs and types of sensible phones, and offer you with tons of information in the members location, more data than you could actually perhaps want or require.Which types of cell phones these cell phone spy apps operate onOnce more this differs based upon which cell phone spy software you select. The least pricey a single explained above all their attributes only operate on Androids and some Blackberry models. A few of the finest telephone spy packages functions on rather much any smart telephone which consists of most all models of Blackberry, Symbian, Android, IPhone, and Windows Mobile and costs appropriate closeto $60 to $eighty.What kind of ensures of satisfaction occur with these mobile phone spying applications?Ironically the most expensive one only has a 10 day assure of satisfaction. My private impression if you’re paying $250-$350 for anything at all it should appear with more than a ten day assure. Most of the other cellphone spy instruments come with a sixty day guarantee of satisfaction.Is there any way the particular person whose telephone is getting spied on can ever know or uncover out it is getting spied on?Definitely not. The only achievable way someone could know or have a very good concept that this application is set up on their cell telephone is 1st off it have to be fairly tech savvy and they have to know what they are searching for. For illustration one particular of the indicators this variety of method is put in on your cell cellphone is your battery loses its power a tiny bit faster but it’s barely noticeable. The only other way the man or woman could know is if they go through the list of applications on their cell cellphone but these cellular spying apps use names that make it challenging for you to figure out what it is and most individuals would just believe it’s a platform certain software plan that is a necessity for the cellphone to run effectively, for illustration the name of the application that is the cellphone spying method would appear one thing like this – mob83483_app. So the bottom line is the only sort of individuals who could actually perhaps know there is a cellular spy software plan on their mobile phone as if they were specialists in these form of apps.Do I need to have to actually get bodily accessibility to the telephone I want to set up the spy application on?Sure. I see some ads and fake info on the Net that indicate you can install some of these packages remotely but that is totally not possible. You do not require entry to the telephone for prolonged however these programs can be put in in 5 minutes or much less. So when your girlfriend or boyfriend or spouse is in the shower that is the perfect time to install it.What is the standard approach for putting in a spy application?The true install procedure is relatively straightforward. Whichever cell phone spy plan you determine to become a member of they will give you a web site address to check out to download the program. When you get access to the person’s mobile phone go to that web deal with with a world wide web browser that will be developed into their cellphone. The plan will download which will take about a moment or a minute and a fifty percent. The complete file dimensions is rather little so it won’t consider long. At that point the mobile phone will ask for your permission to install the system – you select sure. The real install will take yet another moment to a minute and a fifty percent. At that point you shutoff and then restart the telephone and the method will be running invisibly. Whichever mobile phone spying program you make a decision to turn into a member of there will be in depth directions for setting up their program for each sort of telephone. You can print out these recommendations and get them with you.How cellular phones spying plans performAll of these plans run the very same way. Every time a cell telephone does anything at all (can make a get in touch with, receives a get in touch with, and so on) it triggers a programming celebration. A programming function is absolutely nothing much more than a spot a particular person who writes or creates cell cellphone programs can insert programming code. These mobile cellphone snooping applications simply deliver information about these events to a web server. The certain occasions we are speaking about are occasions that occur every time a phone call is placed or obtained, a text concept is sent or received, and many others. The World wide web server the information about these activities is sent to is the members location of your phone spying system. All of these spying applications permit you to logon to the World wide web server 24 hrs a day seven days a week to watch the details about the target cell telephone, in this instance the cell telephone of the man or girl you consider might be cheating on you.Are there any month to month costs concerned with cellular cellphone spy software?Some of these plans have regular monthly costs a few of the excellent ones do not.Are there any free cell cellphone spying packages that work?Is possible you can get 1 free of charge but it is very unlikely. Not that the computer software alone is quite complicated it is undoubtedly possible that the software program by yourself may possibly be no cost nonetheless the main ingredient to make it perform is the internet server. In order toview this information it has to be sent to some kind of world wide web server and no person is going to give this for free. If you see someone claiming to offer this free of charge it is some type of cell phone spy scam.Are these mobile phone spy programs legal?Yes and no. You see when you grow to be a member there is a disclaimer you have to concur to. That disclaimer fundamentally states that the people whose telephone you are putting in the spy application to is mindful that you are putting in it and they agree to it. This is naturally a ridiculous disclaimer simply because if the individual with the target mobile phone is aware that the software is installed you are not going to be in a position to catch them doing anything at all like chatting to the particular person they are cheating with or texting them. As extended as you agree to that disclaimer (it requires checking a check out box when you indicator up) then they will allow you to grow to bea member.

About the Author: cell phone spy

flukiest.com/media?f_blog_id=102745

Source:

isnare.com

Permanent Link:

isnare.com/?aid=841288&ca=Computers+and+Technology

Posted in Fleet Management

Friday, January 1, 2021

After an active year of original content published on the English-language Wikinews, we take a look back at some of the two dozen-plus original reports from our contributors during 2020.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_2020:_An_%27Original_reporting%27_year_in_review&oldid=4608262”
Posted in Uncategorized

Monday, December 14, 2020

On Tuesday, US-based software company Red Hat announced their plans to shift their focus away from CentOS in favour of CentOS Stream.

In the blog post Chris Wright, the Chief Technological Officer of Red Hat said Red Hat had informed the CentOS governing board that Red Hat was “shifting our investment fully from CentOS Linux to CentOS Stream”. At least five of the nine CentOS Governing Board listed on the project are Red Hat employees.

Started in 2004, CentOS has been a free-of-cost free/libre open source software which provided binary-code compatibility with Red Hat Enterprise Linux (RHEL) — Red Hat’s GNU General Public Licensed paid operating system. CentOS was absorbed into Red Hat in 2014, with Red Hat gaining the trademark rights of “CentOS”.

Red Hat also sponsors the Fedora operating system. Red Hat even gives the software engineering interns laptops with Fedora on it. Till now, software development took place on Fedora, which was later adopted in RHEL, which the Red Hat maintained and provided support for, for those customers who had RHEL subscription. CentOS would then follow RHEL to provide the same features free of cost, but without the support.

Stream was announced in September 2019, just two months after Red Hat was acquired by IBM. CentOS Stream’s development cycle had new features added to it before the features became a part of RHEL. Stream receives more frequent updates, however, it does not follow RHEL’s release cycle.

With CentOS Stream, developments from the community and the Red Hat emplyees would take place beforehand on both Fedora, and Stream as a rolling release, before those features are absorbed into RHEL. CentOS followed the release cycle of RHEL and therefore it was a stable distribution. Features available in CentOS were tried and tested by Fedora, and then RHEL maintainers. Stream, on the other hand, has features added to it before those features become a part of RHEL. That implies Stream would be ahead of RHEL’s development, containing new features which are not yet tried and tested by RHEL developers, and not be binary code-compatible with RHEL.

Writing “The future of CentOS Linux is CentOS Stream”, Wright further wrote in the announcement, CentOS Stream “provides a platform for rapid innovation at the community level but with a stable enough base to understand production dynamics.” Wright also said, “CentOS Stream isn’t a replacement for CentOS Linux; rather, it’s a natural, inevitable next step intended to fulfill the project’s goal of furthering enterprise Linux innovation.”

Since the announcement was made, many people expressed their anger on Internet Relay Chat (IRC), Reddit and CentOS project’s mailing list. CentOS 8’s End of Life (EOL) has been moved up from May 2029 to December 31, 2021, while CentOS 7 is expected to receive maintenance updates through June 2024, outliving CentOS 8.

Gregory Kurtzer, who had started the CentOS project, announced a new operating system, Rocky Linux. Rocky Linux describes itself as “a community enterprise Operating System designed to be 100% bug-for-bug compatible with Enterprise Linux”. The project said “Rocky Linux aims to function as a downstream build as CentOS had done previously, building releases after they have been added to the upstream vendor, not before.” The project maintainers have not decided a date for when the operating system will be released.

Kurtzer explained the reason to call the OS as Rocky Linux: “Thinking back to early CentOS days… My cofounder was Rocky McGaugh. He is no longer with us, so as a H/T [hat tip] to him, who never got to see the success that CentOS came to be, I introduce to you…Rocky Linux”.

Wikinews reached out to the members of the CentOS project, Pablo Greco and Rich Bowen, to discuss this move, its implications as well as the future of CentOS. Greco is a maintainer of armhfp (32-bit processors) and is a part of the CentOS’ quality assurance team. Bowen — who unlike Greco, works for Red Hat — is the community manager of the CentOS project.

 This story has updates See Gregory Kurtzer discusses plans for Rocky Linux with Wikinews as Red Hat announces moving focus away from CentOS, December 18, 2020 

Retrieved from “https://en.wikinews.org/w/index.php?title=Red_Hat_to_move_focus_away_from_CentOS_in_favour_of_Stream;_CentOS_team_discuss_implications_with_Wikinews&oldid=4602313”
Posted in Uncategorized
? May 17, 2010
May 19, 2010 ?
May 18

Pages in category “May 18, 2010”

Retrieved from “https://en.wikinews.org/w/index.php?title=Category:May_18,_2010&oldid=1023529”
Posted in Uncategorized
TO TOP