From: Niki Roo Date: Wed, 26 Sep 2018 20:17:42 +0000 (+0200) Subject: Fix layout issues in getContent() text X-Git-Url: https://git.nikiroo.be/?p=gofetch.git;a=commitdiff_plain;h=e818d449fee8a5397ab2f05df63bbeffc4c67dc0 Fix layout issues in getContent() text --- diff --git a/src/be/nikiroo/gofetch/output/Html.java b/src/be/nikiroo/gofetch/output/Html.java index 0bcc833..a445264 100644 --- a/src/be/nikiroo/gofetch/output/Html.java +++ b/src/be/nikiroo/gofetch/output/Html.java @@ -159,8 +159,9 @@ public class Html extends Output { builder.append("
\n"); if (resume) { - builder.append(" " + StringUtils.xmlEscape(story.getContent()) - + "\n"); + builder.append(" " + + StringUtils.xmlEscape(story.getContent()).replace("\n", + "
") + "\n"); } else { builder.append(" " + StringUtils.xmlEscape(story.getFullContent()) diff --git a/src/be/nikiroo/gofetch/support/BasicSupport.java b/src/be/nikiroo/gofetch/support/BasicSupport.java index dcd5e6e..42761c9 100644 --- a/src/be/nikiroo/gofetch/support/BasicSupport.java +++ b/src/be/nikiroo/gofetch/support/BasicSupport.java @@ -300,21 +300,7 @@ public abstract class BasicSupport { Document doc = DataUtil.load(in, "UTF-8", url.toString()); Element article = getFullArticle(doc); if (article != null) { - StringBuilder builder = new StringBuilder(); - ElementProcessor eProc = getElementProcessorFullArticle(); - if (eProc != null) { - for (String line : toLines(article, eProc)) { - builder.append(line + "\n"); - } - } else { - builder.append(article.text()); - } - - // Content is too tight with a single break per line: - fullContent = builder.toString().replace("\n", "\n\n") // - .replace("\n\n\n\n", "\n\n") // - .replace("\n\n\n\n", "\n\n") // - .trim(); + fullContent = getArticleText(article); } if (fullContent.isEmpty()) { @@ -331,6 +317,33 @@ public abstract class BasicSupport { } } + /** + * Return the text from this {@link Element}, using the + * {@link BasicSupport#getElementProcessorFullArticle()} processor logic. + * + * @param article + * the element to extract the text from + * + * @return the text + */ + protected String getArticleText(Element article) { + StringBuilder builder = new StringBuilder(); + ElementProcessor eProc = getElementProcessorFullArticle(); + if (eProc != null) { + for (String line : toLines(article, eProc)) { + builder.append(line + "\n"); + } + } else { + builder.append(article.text()); + } + + // Content is too tight with a single break per line: + return builder.toString().replace("\n", "\n\n") // + .replace("\n\n\n\n", "\n\n") // + .replace("\n\n\n\n", "\n\n") // + .trim(); + } + /** * Return the full article if available (this is the article to retrieve * from the newly downloaded page at {@link Story#getUrlInternal()}). diff --git a/src/be/nikiroo/gofetch/support/EreNumerique.java b/src/be/nikiroo/gofetch/support/EreNumerique.java index 0b3efcf..fea7b59 100644 --- a/src/be/nikiroo/gofetch/support/EreNumerique.java +++ b/src/be/nikiroo/gofetch/support/EreNumerique.java @@ -111,7 +111,7 @@ public class EreNumerique extends BasicSupport { Element contentElement = article.getElementsByClass("td-excerpt") .first(); if (contentElement != null) { - return contentElement.text(); + return getArticleText(contentElement); } return ""; diff --git a/src/be/nikiroo/gofetch/support/LWN.java b/src/be/nikiroo/gofetch/support/LWN.java index 144fdc9..aa2a653 100644 --- a/src/be/nikiroo/gofetch/support/LWN.java +++ b/src/be/nikiroo/gofetch/support/LWN.java @@ -141,7 +141,7 @@ public class LWN extends BasicSupport { // All but the first and two last children for (int i = 1; i < listing.children().size() - 2; i++) { Element e = listing.children().get(i); - content = content.trim() + " " + e.text().trim(); + content = content.trim() + " " + getArticleText(e); } return content; diff --git a/src/be/nikiroo/gofetch/support/LeMonde.java b/src/be/nikiroo/gofetch/support/LeMonde.java index 1f7aea7..0999093 100644 --- a/src/be/nikiroo/gofetch/support/LeMonde.java +++ b/src/be/nikiroo/gofetch/support/LeMonde.java @@ -109,7 +109,7 @@ public class LeMonde extends BasicSupport { protected String getArticleContent(Document doc, Element article) { Element contentElement = article.getElementsByClass("txt3").first(); if (contentElement != null) { - return contentElement.text(); + return getArticleText(contentElement); } return ""; diff --git a/src/be/nikiroo/gofetch/support/Phoronix.java b/src/be/nikiroo/gofetch/support/Phoronix.java index c73ddc7..427f2d1 100644 --- a/src/be/nikiroo/gofetch/support/Phoronix.java +++ b/src/be/nikiroo/gofetch/support/Phoronix.java @@ -129,7 +129,7 @@ class Phoronix extends BasicSupport { protected String getArticleContent(Document doc, Element article) { Element p = article.getElementsByTag("p").first(); if (p != null) { - return p.text(); + return getArticleText(p); } return ""; diff --git a/src/be/nikiroo/gofetch/support/Pipedot.java b/src/be/nikiroo/gofetch/support/Pipedot.java index 149a20c..0d044e5 100644 --- a/src/be/nikiroo/gofetch/support/Pipedot.java +++ b/src/be/nikiroo/gofetch/support/Pipedot.java @@ -141,7 +141,7 @@ public class Pipedot extends BasicSupport { for (Element elem : article.children()) { String tag = elem.tagName(); if (!tag.equals("header") && !tag.equals("footer")) { - return elem.text(); + return getArticleText(elem); } } diff --git a/src/be/nikiroo/gofetch/support/SeptSurSept.java b/src/be/nikiroo/gofetch/support/SeptSurSept.java index cec51ce..7f5ca16 100644 --- a/src/be/nikiroo/gofetch/support/SeptSurSept.java +++ b/src/be/nikiroo/gofetch/support/SeptSurSept.java @@ -189,6 +189,6 @@ public class SeptSurSept extends BasicSupport { @Override protected ElementProcessor getElementProcessorComment() { - return null; + return new BasicElementProcessor(); } } diff --git a/src/be/nikiroo/gofetch/support/Slashdot.java b/src/be/nikiroo/gofetch/support/Slashdot.java index 43ce13d..057ed9f 100644 --- a/src/be/nikiroo/gofetch/support/Slashdot.java +++ b/src/be/nikiroo/gofetch/support/Slashdot.java @@ -145,7 +145,7 @@ public class Slashdot extends BasicSupport { Element contentElement = doc // .getElementById("text-" + getArticleId(doc, article)); if (contentElement != null) { - return contentElement.text(); + return getArticleText(contentElement); } return ""; @@ -173,7 +173,18 @@ public class Slashdot extends BasicSupport { @Override protected ElementProcessor getElementProcessorFullArticle() { - return null; + return new BasicElementProcessor() { + @Override + public boolean detectQuote(Node node) { + if (node instanceof Element) { + Element element = (Element) node; + if (element.tagName().equals("i")) { + return true; + } + } + return false; + } + }; } @Override diff --git a/src/be/nikiroo/gofetch/support/TheRegister.java b/src/be/nikiroo/gofetch/support/TheRegister.java index 478381d..11874af 100644 --- a/src/be/nikiroo/gofetch/support/TheRegister.java +++ b/src/be/nikiroo/gofetch/support/TheRegister.java @@ -130,7 +130,7 @@ public class TheRegister extends BasicSupport { Element detailsElement = article.getElementsByClass("standfirst") .first(); if (detailsElement != null) { - return detailsElement.text(); + return getArticleText(detailsElement); } return ""; diff --git a/src/be/nikiroo/gofetch/support/TooLinux.java b/src/be/nikiroo/gofetch/support/TooLinux.java index 77f0c30..3b23b0d 100644 --- a/src/be/nikiroo/gofetch/support/TooLinux.java +++ b/src/be/nikiroo/gofetch/support/TooLinux.java @@ -96,7 +96,7 @@ public class TooLinux extends BasicSupport { protected String getArticleContent(Document doc, Element article) { Element content = article.getElementsByClass("introduction").first(); if (content != null) { - return content.text(); + return getArticleText(content); } return ""; diff --git a/test/expected/LWN/0000763603.header b/test/expected/LWN/0000763603.header index b547597..043e1de 100644 --- a/test/expected/LWN/0000763603.header +++ b/test/expected/LWN/0000763603.header @@ -14,6 +14,10 @@ i some I/O streams to allow others to meet their bandwidth and i latency requirements. These mechanisms work, but they come at i a cost: a loss of as much as 80% of total available I/O i bandwidth. I have run some tests to demonstrate this problem; -i some upcoming improvements to the bfq I/O scheduler promise to -i improve the situation considerably. +i some upcoming improvements to the [1]bfq I/O scheduler promise +i to improve the situation considerably. +i +i +i +i [1] https://lwn.net/Articles/601799/ i diff --git a/test/expected/LWN/0000763603.header.html b/test/expected/LWN/0000763603.header.html index fa5e5fc..ceec6b4 100644 --- a/test/expected/LWN/0000763603.header.html +++ b/test/expected/LWN/0000763603.header.html @@ -13,7 +13,7 @@
([Kernel] Aug 29, 2018 21:20 UTC (Wed) (corbet))

- Many services, from web hosting and video streaming to cloud storage, need to move data to and from storage. They also often require that each per-client I/O flow be guaranteed a non-zero amount of bandwidth and a bounded latency. An expensive way to provide these guarantees is to over-provision storage resources, keeping each resource underutilized, and thus have plenty of bandwidth available for the few I/O flows dispatched to each medium. Alternatively one can use an I/O controller. Linux provides two mechanisms designed to throttle some I/O streams to allow others to meet their bandwidth and latency requirements. These mechanisms work, but they come at a cost: a loss of as much as 80% of total available I/O bandwidth. I have run some tests to demonstrate this problem; some upcoming improvements to the bfq I/O scheduler promise to improve the situation considerably. + Many services, from web hosting and video streaming to cloud storage, need to move data to and from storage. They also often require that each per-client I/O flow be guaranteed a non-zero amount of bandwidth and a bounded latency. An expensive way to provide these guarantees is to over-provision storage resources, keeping each resource underutilized, and thus have plenty of bandwidth available for the few I/O flows dispatched to each medium. Alternatively one can use an I/O controller. Linux provides two mechanisms designed to throttle some I/O streams to allow others to meet their bandwidth and latency requirements. These mechanisms work, but they come at a cost: a loss of as much as 80% of total available I/O bandwidth. I have run some tests to demonstrate this problem; some upcoming improvements to the [1]bfq I/O scheduler promise to improve the situation considerably.



[1] https://lwn.net/Articles/601799/

diff --git a/test/expected/LWN/0000763729.header b/test/expected/LWN/0000763729.header index 934f640..be98c7c 100644 --- a/test/expected/LWN/0000763729.header +++ b/test/expected/LWN/0000763729.header @@ -8,6 +8,12 @@ i an attacker; it's worse if it remains compromised even after a i reboot. Numerous mechanisms for ensuring the integrity of i installed system files have been proposed and implemented over i the years. But it seems there is always room for one more; to -i fill that space, the fs-verity mechanism is being proposed as -i a way to protect individual files from malicious modification. +i fill that space, the [1]fs-verity mechanism is being proposed +i as a way to protect individual files from malicious +i modification. +i +i +i +i [1] https://lwn.net/ml/linux-fsdevel/20180824161642.1144-1-ebi- +i ggers@kernel.org/ i diff --git a/test/expected/LWN/0000763729.header.html b/test/expected/LWN/0000763729.header.html index 9db006b..6988e8a 100644 --- a/test/expected/LWN/0000763729.header.html +++ b/test/expected/LWN/0000763729.header.html @@ -13,7 +13,7 @@
([Kernel] Aug 30, 2018 18:50 UTC (Thu) (corbet))

- The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the fs-verity mechanism is being proposed as a way to protect individual files from malicious modification. + The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the [1]fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.



[1] https://lwn.net/ml/linux-fsdevel/20180824161642.1144-1-ebiggers@kernel.org/

diff --git a/test/expected/LWN/0000763987.header b/test/expected/LWN/0000763987.header index 8fc90d4..3cb26e4 100644 --- a/test/expected/LWN/0000763987.header +++ b/test/expected/LWN/0000763987.header @@ -1,8 +1,12 @@ 0Kernel prepatch 4.19-rc2 null/LWN/0000763987 70 i [Kernel] Sep 2, 2018 22:29 UTC (Sun) (corbet) i -i The 4.19-rc2 kernel prepatch is out for testing. "As usual, -i the rc2 release is pretty small. People are taking a breather -i after the merge window, and it takes a bit of time for bug -i reports to start coming in and get identified." +i The [1]4.19-rc2 kernel prepatch is out for testing. " As +i usual, the rc2 release is pretty small. People are taking a +i breather after the merge window, and it takes a bit of time +i for bug reports to start coming in and get identified. " +i +i +i +i [1] https://lwn.net/Articles/763988/ i diff --git a/test/expected/LWN/0000763987.header.html b/test/expected/LWN/0000763987.header.html index af529b2..3579fad 100644 --- a/test/expected/LWN/0000763987.header.html +++ b/test/expected/LWN/0000763987.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 2, 2018 22:29 UTC (Sun) (corbet))

- The 4.19-rc2 kernel prepatch is out for testing. "As usual, the rc2 release is pretty small. People are taking a breather after the merge window, and it takes a bit of time for bug reports to start coming in and get identified." + The [1]4.19-rc2 kernel prepatch is out for testing. " As usual, the rc2 release is pretty small. People are taking a breather after the merge window, and it takes a bit of time for bug reports to start coming in and get identified. "



[1] https://lwn.net/Articles/763988/

diff --git a/test/expected/LWN/0000764001.header b/test/expected/LWN/0000764001.header index 529c9fa..3e15d73 100644 --- a/test/expected/LWN/0000764001.header +++ b/test/expected/LWN/0000764001.header @@ -1,12 +1,18 @@ 0[$] An introduction to the Julia language, part 2 null/LWN/0000764001 70 i [Development] Sep 4, 2018 15:57 UTC (Tue) (jake) i -i Part 1 of this series introduced the Julia project's goals and -i development process, along with the language syntax, including -i the basics of control flow, data types, and, in more detail, -i how to work with arrays. In this part, user-defined functions -i and the central concept of multiple dispatch are described. It -i will also survey Julia's module and package system, cover some -i syntax features, show how to make plots, and briefly dip into -i macros and distributed computing. +i [1]Part 1 of this series introduced the [2]Julia project's +i goals and development process, along with the language syntax, +i including the basics of control flow, data types, and, in more +i detail, how to work with arrays. In this part, user-defined +i functions and the central concept of multiple dispatch are +i described. It will also survey Julia's module and package +i system, cover some syntax features, show how to make plots, +i and briefly dip into macros and distributed computing. +i +i +i +i [1] https://lwn.net/Articles/763626/ +i +i [2] http://julialang.org/ i diff --git a/test/expected/LWN/0000764001.header.html b/test/expected/LWN/0000764001.header.html index f43c7ae..6a9b78a 100644 --- a/test/expected/LWN/0000764001.header.html +++ b/test/expected/LWN/0000764001.header.html @@ -13,7 +13,7 @@
([Development] Sep 4, 2018 15:57 UTC (Tue) (jake))

- Part 1 of this series introduced the Julia project's goals and development process, along with the language syntax, including the basics of control flow, data types, and, in more detail, how to work with arrays. In this part, user-defined functions and the central concept of multiple dispatch are described. It will also survey Julia's module and package system, cover some syntax features, show how to make plots, and briefly dip into macros and distributed computing. + [1]Part 1 of this series introduced the [2]Julia project's goals and development process, along with the language syntax, including the basics of control flow, data types, and, in more detail, how to work with arrays. In this part, user-defined functions and the central concept of multiple dispatch are described. It will also survey Julia's module and package system, cover some syntax features, show how to make plots, and briefly dip into macros and distributed computing.



[1] https://lwn.net/Articles/763626/

[2] http://julialang.org/

diff --git a/test/expected/LWN/0000764048.header b/test/expected/LWN/0000764048.header index c44db41..877eed6 100644 --- a/test/expected/LWN/0000764048.header +++ b/test/expected/LWN/0000764048.header @@ -4,10 +4,22 @@ i i Security and convenience rarely go hand-in-hand, but if your i job (or life) requires extraordinary care against potentially i targeted attacks, the security side of that tradeoff may win -i out. If so, running a system like Qubes OS on your desktop or -i CopperheadOS on your phone might make sense, which is just -i what Konstantin Ryabitsev, Linux Foundation (LF) director of -i IT security, has done. He reported on the experience in a talk -i [YouTube video] entitled "Life Behind the Tinfoil Curtain" at -i the 2018 Linux Security Summit North America. +i out. If so, running a system like [1]Qubes OS on your desktop +i or [2]CopperheadOS on your phone might make sense, which is +i just what Konstantin Ryabitsev, Linux Foundation (LF) director +i of IT security, has done. He reported on the experience in a +i [3]talk [YouTube video] entitled "Life Behind the Tinfoil +i Curtain" at the 2018 [4]Linux Security Summit North America . +i +i +i +i [1] https://www.qubes-os.org/ +i +i [2] https://copperhead.co/ +i +i [3] https://www.youtube.com/watch?v=8cU4hQg6GvU&index=6&list=P- +i LbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI&t=0s +i +i [4] https://events.linuxfoundation.org/events/linux-security-s- +i ummit-north-america-2018/ i diff --git a/test/expected/LWN/0000764048.header.html b/test/expected/LWN/0000764048.header.html index c4b0609..17313ca 100644 --- a/test/expected/LWN/0000764048.header.html +++ b/test/expected/LWN/0000764048.header.html @@ -13,7 +13,7 @@
([Security] Sep 5, 2018 22:11 UTC (Wed) (jake))

- Security and convenience rarely go hand-in-hand, but if your job (or life) requires extraordinary care against potentially targeted attacks, the security side of that tradeoff may win out. If so, running a system like Qubes OS on your desktop or CopperheadOS on your phone might make sense, which is just what Konstantin Ryabitsev, Linux Foundation (LF) director of IT security, has done. He reported on the experience in a talk [YouTube video] entitled "Life Behind the Tinfoil Curtain" at the 2018 Linux Security Summit North America. + Security and convenience rarely go hand-in-hand, but if your job (or life) requires extraordinary care against potentially targeted attacks, the security side of that tradeoff may win out. If so, running a system like [1]Qubes OS on your desktop or [2]CopperheadOS on your phone might make sense, which is just what Konstantin Ryabitsev, Linux Foundation (LF) director of IT security, has done. He reported on the experience in a [3]talk [YouTube video] entitled "Life Behind the Tinfoil Curtain" at the 2018 [4]Linux Security Summit North America .



[1] https://www.qubes-os.org/

[2] https://copperhead.co/

[3] https://www.youtube.com/watch?v=8cU4hQg6GvU&index=6&list=PLbzoR-pLrL6rOT6m50HdJFYUHyvA9lurI&t=0s

[4] https://events.linuxfoundation.org/events/linux-security-summit-north-america-2018/

diff --git a/test/expected/LWN/0000764055.header b/test/expected/LWN/0000764055.header index 0b2a9b6..ad7fc58 100644 --- a/test/expected/LWN/0000764055.header +++ b/test/expected/LWN/0000764055.header @@ -2,7 +2,7 @@ i [Kernel] Sep 3, 2018 19:07 UTC (Mon) (corbet) i i The annual Maintainer and Kernel Summits will be held in -i Vancouver, BC on November 12 to 15, in conjunction with the +i Vancouver, BC on November 12 to 15, in conjunction with the i Linux Plumbers Conference. The program committee is looking i for topics for both summits; read on for details on how to i submit ideas and, perhaps, get an invitation to the Maintainer diff --git a/test/expected/LWN/0000764055.header.html b/test/expected/LWN/0000764055.header.html index 04b5809..e3ae833 100644 --- a/test/expected/LWN/0000764055.header.html +++ b/test/expected/LWN/0000764055.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 3, 2018 19:07 UTC (Mon) (corbet))

- The annual Maintainer and Kernel Summits will be held in Vancouver, BC on November 12 to 15, in conjunction with the Linux Plumbers Conference. The program committee is looking for topics for both summits; read on for details on how to submit ideas and, perhaps, get an invitation to the Maintainer Summit. + The annual Maintainer and Kernel Summits will be held in Vancouver, BC on November 12 to 15, in conjunction with the Linux Plumbers Conference. The program committee is looking for topics for both summits; read on for details on how to submit ideas and, perhaps, get an invitation to the Maintainer Summit.

diff --git a/test/expected/LWN/0000764057.header b/test/expected/LWN/0000764057.header index eb103f9..5b71d27 100644 --- a/test/expected/LWN/0000764057.header +++ b/test/expected/LWN/0000764057.header @@ -3,7 +3,7 @@ i [Kernel] Sep 4, 2018 0:15 UTC (Tue) (corbet) i i It is common for kernel code to generate unique integers for i identifiers. When one plugs in a flash drive, it will show up -i as /dev/sdN; that N (a letter derived from a number) must be +i as /dev/sdN ; that N (a letter derived from a number) must be i generated in the kernel, and it should not already be in use i for another drive or unpleasant things will happen. One might i think that generating such numbers would not be a difficult diff --git a/test/expected/LWN/0000764057.header.html b/test/expected/LWN/0000764057.header.html index 4526802..1b43f46 100644 --- a/test/expected/LWN/0000764057.header.html +++ b/test/expected/LWN/0000764057.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 4, 2018 0:15 UTC (Tue) (corbet))

- It is common for kernel code to generate unique integers for identifiers. When one plugs in a flash drive, it will show up as /dev/sdN; that N (a letter derived from a number) must be generated in the kernel, and it should not already be in use for another drive or unpleasant things will happen. One might think that generating such numbers would not be a difficult task, but that turns out not to be the case, especially in situations where many numbers must be tracked. The IDA (for "ID allocator", perhaps) API exists to handle this specialized task. In past kernels, it has managed to make the process of getting an unused number surprisingly complex; the 4.19 kernel has a new IDA API that simplifies things considerably. + It is common for kernel code to generate unique integers for identifiers. When one plugs in a flash drive, it will show up as /dev/sdN ; that N (a letter derived from a number) must be generated in the kernel, and it should not already be in use for another drive or unpleasant things will happen. One might think that generating such numbers would not be a difficult task, but that turns out not to be the case, especially in situations where many numbers must be tracked. The IDA (for "ID allocator", perhaps) API exists to handle this specialized task. In past kernels, it has managed to make the process of getting an unused number surprisingly complex; the 4.19 kernel has a new IDA API that simplifies things considerably.

diff --git a/test/expected/LWN/0000764131.header b/test/expected/LWN/0000764131.header index 402f3cd..512b54a 100644 --- a/test/expected/LWN/0000764131.header +++ b/test/expected/LWN/0000764131.header @@ -1,14 +1,19 @@ 0[$] Learning about Go internals at GopherCon null/LWN/0000764131 70 i [Front] Sep 5, 2018 19:20 UTC (Wed) (jake) i -i GopherCon is the major conference for the Go language, +i [1]GopherCon is the major conference for the [2]Go language , i attended by 1600 dedicated "gophers", as the members of its i community like to call themselves. Held for the last five i years in Denver, it attracts programmers, open-source i contributors, and technical managers from all over North i America and the world. GopherCon's highly-technical program is i an intense mix of Go internals and programming tutorials, a -i few of which we will explore in this article. Subscribers can -i read on for a report from GopherCon by guest author Josh -i Berkus. +i few of which we will explore in this article. +i +i +i +i [1] https://www.gophercon.com/ +i +i [2] https://golang.org/ Subscribers can read on for a report +i from GopherCon by guest author Josh Berkus. i diff --git a/test/expected/LWN/0000764131.header.html b/test/expected/LWN/0000764131.header.html index f8983e7..aa45ab4 100644 --- a/test/expected/LWN/0000764131.header.html +++ b/test/expected/LWN/0000764131.header.html @@ -13,7 +13,7 @@
([Front] Sep 5, 2018 19:20 UTC (Wed) (jake))

- GopherCon is the major conference for the Go language, attended by 1600 dedicated "gophers", as the members of its community like to call themselves. Held for the last five years in Denver, it attracts programmers, open-source contributors, and technical managers from all over North America and the world. GopherCon's highly-technical program is an intense mix of Go internals and programming tutorials, a few of which we will explore in this article. Subscribers can read on for a report from GopherCon by guest author Josh Berkus. + [1]GopherCon is the major conference for the [2]Go language , attended by 1600 dedicated "gophers", as the members of its community like to call themselves. Held for the last five years in Denver, it attracts programmers, open-source contributors, and technical managers from all over North America and the world. GopherCon's highly-technical program is an intense mix of Go internals and programming tutorials, a few of which we will explore in this article.



[1] https://www.gophercon.com/

[2] https://golang.org/ Subscribers can read on for a report from GopherCon by guest author Josh Berkus.

diff --git a/test/expected/LWN/0000764184.header b/test/expected/LWN/0000764184.header index 91c215e..a949290 100644 --- a/test/expected/LWN/0000764184.header +++ b/test/expected/LWN/0000764184.header @@ -1,7 +1,19 @@ 0A set of stable kernels null/LWN/0000764184 70 i [Kernel] Sep 5, 2018 15:15 UTC (Wed) (ris) i -i Greg Kroah-Hartman has released stable kernels 4.18.6, -i 4.14.68, 4.9.125, 4.4.154, and 3.18.121. They all contain -i important fixes and users should upgrade. +i Greg Kroah-Hartman has released stable kernels [1]4.18.6 , +i [2]4.14.68 , [3]4.9.125 , [4]4.4.154 , and [5]3.18.121 . They +i all contain important fixes and users should upgrade. +i +i +i +i [1] https://lwn.net/Articles/764185/ +i +i [2] https://lwn.net/Articles/764186/ +i +i [3] https://lwn.net/Articles/764187/ +i +i [4] https://lwn.net/Articles/764188/ +i +i [5] https://lwn.net/Articles/764189/ i diff --git a/test/expected/LWN/0000764184.header.html b/test/expected/LWN/0000764184.header.html index c240b06..e07b6cc 100644 --- a/test/expected/LWN/0000764184.header.html +++ b/test/expected/LWN/0000764184.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 5, 2018 15:15 UTC (Wed) (ris))

- Greg Kroah-Hartman has released stable kernels 4.18.6, 4.14.68, 4.9.125, 4.4.154, and 3.18.121. They all contain important fixes and users should upgrade. + Greg Kroah-Hartman has released stable kernels [1]4.18.6 , [2]4.14.68 , [3]4.9.125 , [4]4.4.154 , and [5]3.18.121 . They all contain important fixes and users should upgrade.



[1] https://lwn.net/Articles/764185/

[2] https://lwn.net/Articles/764186/

[3] https://lwn.net/Articles/764187/

[4] https://lwn.net/Articles/764188/

[5] https://lwn.net/Articles/764189/

diff --git a/test/expected/LWN/0000764200.header b/test/expected/LWN/0000764200.header index 9cd70e2..d7f3eb1 100644 --- a/test/expected/LWN/0000764200.header +++ b/test/expected/LWN/0000764200.header @@ -6,8 +6,15 @@ i but the kernel often only needs a subset of that information i to be able to perform filtering or associate any given packet i with a flow. The piece of code that follows the different i layers of packet encapsulation to find the important data is -i called a flow dissector. In current Linux kernels, the flow -i dissector is written in C. A patch set has been proposed +i called a flow dissector. In current Linux kernels, the [1]flow +i dissector is written in C. A [2]patch set has been proposed i recently to implement it in BPF with the clear goal of i improving security, flexibility, and maybe even performance. +i +i +i +i [1] https://elixir.bootlin.com/linux/v4.18.6/source/net/core/f- +i low_dissector.c +i +i [2] https://lwn.net/Articles/763938/ i diff --git a/test/expected/LWN/0000764200.header.html b/test/expected/LWN/0000764200.header.html index 2823c0c..655ac1e 100644 --- a/test/expected/LWN/0000764200.header.html +++ b/test/expected/LWN/0000764200.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 6, 2018 15:59 UTC (Thu) (corbet))

- Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the flow dissector is written in C. A patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance. + Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the [1]flow dissector is written in C. A [2]patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance.



[1] https://elixir.bootlin.com/linux/v4.18.6/source/net/core/flow_dissector.c

[2] https://lwn.net/Articles/763938/

diff --git a/test/expected/LWN/0000764202.header b/test/expected/LWN/0000764202.header index f8dc850..a5b69fa 100644 --- a/test/expected/LWN/0000764202.header +++ b/test/expected/LWN/0000764202.header @@ -8,5 +8,9 @@ i those using containers there is menu option to reopen a tab in i a different container; Firefox 63 will remove all trust for i Symantec-issued certificates, and it is optional in Firefox i 62; FreeBSD support for WebAuthn was added; and more. See the -i release notes for details. +i [1]release notes for details. +i +i +i +i [1] https://www.mozilla.org/en-US/firefox/62.0/releasenotes/ i diff --git a/test/expected/LWN/0000764202.header.html b/test/expected/LWN/0000764202.header.html index e539a99..92fd3db 100644 --- a/test/expected/LWN/0000764202.header.html +++ b/test/expected/LWN/0000764202.header.html @@ -13,7 +13,7 @@
([Development] Sep 5, 2018 17:31 UTC (Wed) (ris))

- Mozilla has released Firefox 62.0, with several new features. The Firefox Home (default New Tab) allows users to display up to 4 rows of top sites, Pocket stories, and highlights; for those using containers there is menu option to reopen a tab in a different container; Firefox 63 will remove all trust for Symantec-issued certificates, and it is optional in Firefox 62; FreeBSD support for WebAuthn was added; and more. See the release notes for details. + Mozilla has released Firefox 62.0, with several new features. The Firefox Home (default New Tab) allows users to display up to 4 rows of top sites, Pocket stories, and highlights; for those using containers there is menu option to reopen a tab in a different container; Firefox 63 will remove all trust for Symantec-issued certificates, and it is optional in Firefox 62; FreeBSD support for WebAuthn was added; and more. See the [1]release notes for details.



[1] https://www.mozilla.org/en-US/firefox/62.0/releasenotes/

diff --git a/test/expected/LWN/0000764209.header b/test/expected/LWN/0000764209.header index d0410ed..123092c 100644 --- a/test/expected/LWN/0000764209.header +++ b/test/expected/LWN/0000764209.header @@ -9,7 +9,12 @@ i reasonably well protected against this variant since shortly i after its disclosure in January. It is, however, possible for i user-space processes to use Spectre v2 to attack each other; i thus far, the mainline kernel has offered relatively little -i protection against such attacks. A recent proposal from Jiri -i Kosina may change that situation, but there are still some -i disagreements around the details. +i protection against such attacks. A recent [1]proposal from +i Jiri Kosina may change that situation, but there are still +i some disagreements around the details. +i +i +i +i [1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619- +i 510.15880@cbobk.fhfr.pm/ i diff --git a/test/expected/LWN/0000764209.header.html b/test/expected/LWN/0000764209.header.html index 6042eaf..e0e86df 100644 --- a/test/expected/LWN/0000764209.header.html +++ b/test/expected/LWN/0000764209.header.html @@ -13,7 +13,7 @@
([Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet))

- The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details. + The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent [1]proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.



[1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619510.15880@cbobk.fhfr.pm/

diff --git a/test/expected/LWN/0000764219.header b/test/expected/LWN/0000764219.header index 4985147..9c4b1da 100644 --- a/test/expected/LWN/0000764219.header +++ b/test/expected/LWN/0000764219.header @@ -2,10 +2,14 @@ i [Development] Sep 5, 2018 21:17 UTC (Wed) (ris) i i The GNOME Project has announced the release of GNOME 3.30 -i "Almería". "This release brings automatic updates in Software, -i more games, and a new Podcasts application. Improvements to -i core GNOME applications include a refined location and search -i bar in Files, a [Thunderbolt] panel in Settings, support for -i remoting using RDP in Boxes, and many more." The release notes -i contain more information. +i "Almería". " This release brings automatic updates in +i Software, more games, and a new Podcasts application. +i Improvements to core GNOME applications include a refined +i location and search bar in Files, a [Thunderbolt] panel in +i Settings, support for remoting using RDP in Boxes, and many +i more. " The [1]release notes contain more information. +i +i +i +i [1] https://help.gnome.org/misc/release-notes/3.30/ i diff --git a/test/expected/LWN/0000764219.header.html b/test/expected/LWN/0000764219.header.html index 94cef57..c6e1e79 100644 --- a/test/expected/LWN/0000764219.header.html +++ b/test/expected/LWN/0000764219.header.html @@ -13,7 +13,7 @@
([Development] Sep 5, 2018 21:17 UTC (Wed) (ris))

- The GNOME Project has announced the release of GNOME 3.30 "Almería". "This release brings automatic updates in Software, more games, and a new Podcasts application. Improvements to core GNOME applications include a refined location and search bar in Files, a [Thunderbolt] panel in Settings, support for remoting using RDP in Boxes, and many more." The release notes contain more information. + The GNOME Project has announced the release of GNOME 3.30 "Almería". " This release brings automatic updates in Software, more games, and a new Podcasts application. Improvements to core GNOME applications include a refined location and search bar in Files, a [Thunderbolt] panel in Settings, support for remoting using RDP in Boxes, and many more. " The [1]release notes contain more information.



[1] https://help.gnome.org/misc/release-notes/3.30/

diff --git a/test/expected/LWN/0000764321.header b/test/expected/LWN/0000764321.header index 9cdc345..6007b73 100644 --- a/test/expected/LWN/0000764321.header +++ b/test/expected/LWN/0000764321.header @@ -1,16 +1,21 @@ 0The Hidden Benefit of Giving Back to Open Source Software (Working Knowledge) null/LWN/0000764321 70 i [Briefs] Sep 6, 2018 16:56 UTC (Thu) (corbet) i -i The Harvard Business School's "Working Knowledge" site has an -i article arguing that it can pay for companies to allow their -i developers to contribute back to the projects whose software -i they use. "And that presents an interesting dilemma for firms -i that rely heavily on open source. Should they allow employees -i on company time to make updates and edits to the software for -i community use that could be used by competitors? New research -i by Assistant Professor Frank Nagle, a member of the Strategy -i Unit at Harvard Business School, shows that paying employees -i to contribute to such software boosts the company’s -i productivity from using the software by as much as 100 -i percent, when compared with free-riding competitors." +i The Harvard Business School's "Working Knowledge" site has +i [1]an article arguing that it can pay for companies to allow +i their developers to contribute back to the projects whose +i software they use. " And that presents an interesting dilemma +i for firms that rely heavily on open source. Should they allow +i employees on company time to make updates and edits to the +i software for community use that could be used by competitors? +i New research by Assistant Professor Frank Nagle, a member of +i the Strategy Unit at Harvard Business School, shows that +i paying employees to contribute to such software boosts the +i company’s productivity from using the software by as much as +i 100 percent, when compared with free-riding competitors. " +i +i +i +i [1] https://hbswk.hbs.edu/item/the-hidden-benefit-of-giving-ba- +i ck-to-open-source-software i diff --git a/test/expected/LWN/0000764321.header.html b/test/expected/LWN/0000764321.header.html index 756da62..e8a3c8c 100644 --- a/test/expected/LWN/0000764321.header.html +++ b/test/expected/LWN/0000764321.header.html @@ -13,7 +13,7 @@
([Briefs] Sep 6, 2018 16:56 UTC (Thu) (corbet))

- The Harvard Business School's "Working Knowledge" site has an article arguing that it can pay for companies to allow their developers to contribute back to the projects whose software they use. "And that presents an interesting dilemma for firms that rely heavily on open source. Should they allow employees on company time to make updates and edits to the software for community use that could be used by competitors? New research by Assistant Professor Frank Nagle, a member of the Strategy Unit at Harvard Business School, shows that paying employees to contribute to such software boosts the company’s productivity from using the software by as much as 100 percent, when compared with free-riding competitors." + The Harvard Business School's "Working Knowledge" site has [1]an article arguing that it can pay for companies to allow their developers to contribute back to the projects whose software they use. " And that presents an interesting dilemma for firms that rely heavily on open source. Should they allow employees on company time to make updates and edits to the software for community use that could be used by competitors? New research by Assistant Professor Frank Nagle, a member of the Strategy Unit at Harvard Business School, shows that paying employees to contribute to such software boosts the company’s productivity from using the software by as much as 100 percent, when compared with free-riding competitors. "



[1] https://hbswk.hbs.edu/item/the-hidden-benefit-of-giving-back-to-open-source-software

diff --git a/test/expected/SLASHDOT/0102636958 b/test/expected/SLASHDOT/0102636958 index 3dad370..5ca4fbd 100644 --- a/test/expected/SLASHDOT/0102636958 +++ b/test/expected/SLASHDOT/0102636958 @@ -9,17 +9,24 @@ For all the wishful thinking about manufacturing more laptops - and iPhones in the U.S., there is one sector of tech - manufacturing where America remains a leader: computer chips. - From a report: Some $44 billion worth of semiconductors are - exported from the U.S. each year, making them America's fourth - leading manufacturing export after cars, airplanes and refined - oil. There are roughly 80 wafer fabrication plants (aka fabs) - in the U.S., spread across 19 states. [...] An even greater - share of the world's computer chips are designed domestically - and made overseas by companies including Qualcomm, Apple, - Broadcom and Nvidia. A bunch of the high-tech gear needed to - produce chips is also designed and/or made in the U.S. + and iPhones in the U.S., there is [1]one sector of tech + manufacturing where America remains a leader: computer chips . + From a report: + + > Some $44 billion worth of semiconductors are exported from + the U.S. each year, making them America's fourth leading + manufacturing export after cars, airplanes and refined oil. + There are roughly 80 wafer fabrication plants (aka fabs) in + the U.S., spread across 19 states. [...] An even greater share + of the world's computer chips are designed domestically and + made overseas by companies including Qualcomm, Apple, Broadcom + and Nvidia. A bunch of the high-tech gear needed to produce + chips is also designed and/or made in the U.S. + + + + [1] https://www.axios.com/computer-chips-manufacturing-america- + -10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html ** diff --git a/test/expected/SLASHDOT/0102636958.header b/test/expected/SLASHDOT/0102636958.header index b0e8184..0ace1e5 100644 --- a/test/expected/SLASHDOT/0102636958.header +++ b/test/expected/SLASHDOT/0102636958.header @@ -3,15 +3,22 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the how-about-that dept. i i For all the wishful thinking about manufacturing more laptops -i and iPhones in the U.S., there is one sector of tech -i manufacturing where America remains a leader: computer chips. -i From a report: Some $44 billion worth of semiconductors are -i exported from the U.S. each year, making them America's fourth -i leading manufacturing export after cars, airplanes and refined -i oil. There are roughly 80 wafer fabrication plants (aka fabs) -i in the U.S., spread across 19 states. [...] An even greater -i share of the world's computer chips are designed domestically -i and made overseas by companies including Qualcomm, Apple, -i Broadcom and Nvidia. A bunch of the high-tech gear needed to -i produce chips is also designed and/or made in the U.S. +i and iPhones in the U.S., there is [1]one sector of tech +i manufacturing where America remains a leader: computer chips . +i From a report: +i +i > Some $44 billion worth of semiconductors are exported from +i the U.S. each year, making them America's fourth leading +i manufacturing export after cars, airplanes and refined oil. +i There are roughly 80 wafer fabrication plants (aka fabs) in +i the U.S., spread across 19 states. [...] An even greater share +i of the world's computer chips are designed domestically and +i made overseas by companies including Qualcomm, Apple, Broadcom +i and Nvidia. A bunch of the high-tech gear needed to produce +i chips is also designed and/or made in the U.S. +i +i +i +i [1] https://www.axios.com/computer-chips-manufacturing-america- +i -10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html i diff --git a/test/expected/SLASHDOT/0102636958.header.html b/test/expected/SLASHDOT/0102636958.header.html index 9ec4772..2619eaf 100644 --- a/test/expected/SLASHDOT/0102636958.header.html +++ b/test/expected/SLASHDOT/0102636958.header.html @@ -14,7 +14,7 @@ from the how-about-that dept.)
- For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is one sector of tech manufacturing where America remains a leader: computer chips. From a report: Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S. + For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is [1]one sector of tech manufacturing where America remains a leader: computer chips . From a report:

> Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.



[1] https://www.axios.com/computer-chips-manufacturing-america--10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html

diff --git a/test/expected/SLASHDOT/0102636958.html b/test/expected/SLASHDOT/0102636958.html index 5a48371..f2ad8b2 100644 --- a/test/expected/SLASHDOT/0102636958.html +++ b/test/expected/SLASHDOT/0102636958.html @@ -20,7 +20,7 @@ from the how-about-that dept.)
- For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is one sector of tech manufacturing where America remains a leader: computer chips. From a report: Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S. + For all the wishful thinking about manufacturing more laptops and iPhones in the U.S., there is [1]one sector of tech manufacturing where America remains a leader: computer chips . From a report:

> Some $44 billion worth of semiconductors are exported from the U.S. each year, making them America's fourth leading manufacturing export after cars, airplanes and refined oil. There are roughly 80 wafer fabrication plants (aka fabs) in the U.S., spread across 19 states. [...] An even greater share of the world's computer chips are designed domestically and made overseas by companies including Qualcomm, Apple, Broadcom and Nvidia. A bunch of the high-tech gear needed to produce chips is also designed and/or made in the U.S.



[1] https://www.axios.com/computer-chips-manufacturing-america--10dcfe13-64f3-4ea9-ad4a-cb189a00429a.html

diff --git a/test/expected/SLASHDOT/0102637536 b/test/expected/SLASHDOT/0102637536 index e59740c..82e6677 100644 --- a/test/expected/SLASHDOT/0102637536 +++ b/test/expected/SLASHDOT/0102637536 @@ -9,26 +9,35 @@ o Source link: https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/ - The Tor Browser has rolled out a new interface with the - release of v8. From a report: The Tor Browser has always been - based on the Firefox codebase, but it lagged behind a few - releases. Mozilla rolled out a major overhaul of the Firefox - codebase in November 2017, with the release of Firefox 57, the - first release in the Firefox Quantum series. Firefox Quantum - came with a new page rendering engine, a new add-ons API, and - a new user interface called the Photon UI. Because these were - major, code-breaking changes, it took the smaller Tor team - some time to integrate all of them into the Tor Browser - codebase and make sure everything worked as intended. The new - Tor Browser 8, released yesterday, is now in sync with the - most recent version of Firefox, the Quantum release, and also - supports all of its features. This means the Tor Browser now - uses the same modern Photon UI that current Firefox versions - use, it supports the same speed-optimized page rendering - engine and has also dropped support for the old XUL-based - add-ons system for the new WebExtensions API system used by - Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium - browsers. + The Tor Browser has [1]rolled out a new interface with the + release of v8 . From a report: + + > The Tor Browser has always been based on the Firefox + codebase, but it lagged behind a few releases. Mozilla rolled + out a major overhaul of the Firefox codebase in November 2017, + with the release of Firefox 57, [2]the first release in the + Firefox Quantum series . Firefox Quantum came with a new page + rendering engine, a new add-ons API, and a new user interface + called the Photon UI. Because these were major, code-breaking + changes, it took the smaller Tor team some time to integrate + all of them into the Tor Browser codebase and make sure + everything worked as intended. The new Tor Browser 8, released + yesterday, is now in sync with the most recent version of + Firefox, the Quantum release, and also supports all of its + features. This means the Tor Browser now uses the same modern + Photon UI that current Firefox versions use, it supports the + same speed-optimized page rendering engine and has also + dropped support for the old XUL-based add-ons system for the + new WebExtensions API system used by Chrome, Opera, Vivaldi, + Brave, and the rest of the Chromium browsers. + + + + [1] https://www.zdnet.com/article/tor-browser-gets-a-redesign- + switches-to-new-firefox-quantum-engine/ + + [2] https://news.slashdot.org/story/17/11/25/1938225/firefox-q- + uantum-is-better-faster-smarter-than-chrome-says-wired ** diff --git a/test/expected/SLASHDOT/0102637536.header b/test/expected/SLASHDOT/0102637536.header index 8301572..9b9226b 100644 --- a/test/expected/SLASHDOT/0102637536.header +++ b/test/expected/SLASHDOT/0102637536.header @@ -2,24 +2,33 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the for-the-record dept. i -i The Tor Browser has rolled out a new interface with the -i release of v8. From a report: The Tor Browser has always been -i based on the Firefox codebase, but it lagged behind a few -i releases. Mozilla rolled out a major overhaul of the Firefox -i codebase in November 2017, with the release of Firefox 57, the -i first release in the Firefox Quantum series. Firefox Quantum -i came with a new page rendering engine, a new add-ons API, and -i a new user interface called the Photon UI. Because these were -i major, code-breaking changes, it took the smaller Tor team -i some time to integrate all of them into the Tor Browser -i codebase and make sure everything worked as intended. The new -i Tor Browser 8, released yesterday, is now in sync with the -i most recent version of Firefox, the Quantum release, and also -i supports all of its features. This means the Tor Browser now -i uses the same modern Photon UI that current Firefox versions -i use, it supports the same speed-optimized page rendering -i engine and has also dropped support for the old XUL-based -i add-ons system for the new WebExtensions API system used by -i Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium -i browsers. +i The Tor Browser has [1]rolled out a new interface with the +i release of v8 . From a report: +i +i > The Tor Browser has always been based on the Firefox +i codebase, but it lagged behind a few releases. Mozilla rolled +i out a major overhaul of the Firefox codebase in November 2017, +i with the release of Firefox 57, [2]the first release in the +i Firefox Quantum series . Firefox Quantum came with a new page +i rendering engine, a new add-ons API, and a new user interface +i called the Photon UI. Because these were major, code-breaking +i changes, it took the smaller Tor team some time to integrate +i all of them into the Tor Browser codebase and make sure +i everything worked as intended. The new Tor Browser 8, released +i yesterday, is now in sync with the most recent version of +i Firefox, the Quantum release, and also supports all of its +i features. This means the Tor Browser now uses the same modern +i Photon UI that current Firefox versions use, it supports the +i same speed-optimized page rendering engine and has also +i dropped support for the old XUL-based add-ons system for the +i new WebExtensions API system used by Chrome, Opera, Vivaldi, +i Brave, and the rest of the Chromium browsers. +i +i +i +i [1] https://www.zdnet.com/article/tor-browser-gets-a-redesign- +i switches-to-new-firefox-quantum-engine/ +i +i [2] https://news.slashdot.org/story/17/11/25/1938225/firefox-q- +i uantum-is-better-faster-smarter-than-chrome-says-wired i diff --git a/test/expected/SLASHDOT/0102637536.header.html b/test/expected/SLASHDOT/0102637536.header.html index 58a15a9..eb6b94b 100644 --- a/test/expected/SLASHDOT/0102637536.header.html +++ b/test/expected/SLASHDOT/0102637536.header.html @@ -14,7 +14,7 @@ from the for-the-record dept.)

- The Tor Browser has rolled out a new interface with the release of v8. From a report: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series. Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers. + The Tor Browser has [1]rolled out a new interface with the release of v8 . From a report:

> The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, [2]the first release in the Firefox Quantum series . Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.



[1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/

[2] https://news.slashdot.org/story/17/11/25/1938225/firefox-quantum-is-better-faster-smarter-than-chrome-says-wired

diff --git a/test/expected/SLASHDOT/0102637536.html b/test/expected/SLASHDOT/0102637536.html index 39574e5..3c37bb4 100644 --- a/test/expected/SLASHDOT/0102637536.html +++ b/test/expected/SLASHDOT/0102637536.html @@ -20,7 +20,7 @@ from the for-the-record dept.)
- The Tor Browser has rolled out a new interface with the release of v8. From a report: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series. Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers. + The Tor Browser has [1]rolled out a new interface with the release of v8 . From a report:

> The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, [2]the first release in the Firefox Quantum series . Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.



[1] https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/

[2] https://news.slashdot.org/story/17/11/25/1938225/firefox-quantum-is-better-faster-smarter-than-chrome-says-wired

diff --git a/test/expected/SLASHDOT/0102637868 b/test/expected/SLASHDOT/0102637868 index 40d4803..6d84328 100644 --- a/test/expected/SLASHDOT/0102637868 +++ b/test/expected/SLASHDOT/0102637868 @@ -9,17 +9,33 @@ o Source link: https://www.apnews.com/f6d0e2a099684468873ab48966590ada - An anonymous reader writes: For the first time an autonomous - sailing robot has completed the Microtransat Challenge by - crossing the Atlantic from Newfoundland, Canada to Ireland. - The Microtransat has been running since 2010 and has seen 23 - previous entries all fail to make it across. The successful - boat, SB Met was built by the Norwegian company Offshore - Sensing AS and is only 2 metres (6.5 ft) long. It completed - the crossing on August 26th, 79 days and 5000 km (3100 miles) - of sailing after departing Newfoundland on June 7th. Further - reading: A Fleet of Sailing Robots Sets Out To Quantify the - Oceans. + An anonymous reader writes: + + > For the first time an autonomous sailing robot has completed + the [1]Microtransat Challenge by [2]crossing the Atlantic from + Newfoundland, Canada to Ireland . The Microtransat has been + running since 2010 and has seen 23 previous entries all fail + to make it across. The successful boat, [3]SB Met was built by + the Norwegian company [4]Offshore Sensing AS and is only 2 + metres (6.5 ft) long. It completed the crossing on August + 26th, 79 days and 5000 km (3100 miles) of sailing after + departing Newfoundland on June 7th. + + Further reading: [5]A Fleet of Sailing Robots Sets Out To + Quantify the Oceans . + + + + [1] https://www.microtransat.org/ + + [2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada + + [3] https://www.microtransat.org/2018_sailbuoy_boat.php + + [4] http://sailbuoy.no/ + + [5] https://science.slashdot.org/story/18/05/16/228245/a-fleet- + of-sailing-robots-sets-out-to-quantify-the-oceans ** diff --git a/test/expected/SLASHDOT/0102637868.header b/test/expected/SLASHDOT/0102637868.header index dda4187..d6a0e02 100644 --- a/test/expected/SLASHDOT/0102637868.header +++ b/test/expected/SLASHDOT/0102637868.header @@ -2,15 +2,31 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the impressive-feat dept. i -i An anonymous reader writes: For the first time an autonomous -i sailing robot has completed the Microtransat Challenge by -i crossing the Atlantic from Newfoundland, Canada to Ireland. -i The Microtransat has been running since 2010 and has seen 23 -i previous entries all fail to make it across. The successful -i boat, SB Met was built by the Norwegian company Offshore -i Sensing AS and is only 2 metres (6.5 ft) long. It completed -i the crossing on August 26th, 79 days and 5000 km (3100 miles) -i of sailing after departing Newfoundland on June 7th. Further -i reading: A Fleet of Sailing Robots Sets Out To Quantify the -i Oceans. +i An anonymous reader writes: +i +i > For the first time an autonomous sailing robot has completed +i the [1]Microtransat Challenge by [2]crossing the Atlantic from +i Newfoundland, Canada to Ireland . The Microtransat has been +i running since 2010 and has seen 23 previous entries all fail +i to make it across. The successful boat, [3]SB Met was built by +i the Norwegian company [4]Offshore Sensing AS and is only 2 +i metres (6.5 ft) long. It completed the crossing on August +i 26th, 79 days and 5000 km (3100 miles) of sailing after +i departing Newfoundland on June 7th. +i +i Further reading: [5]A Fleet of Sailing Robots Sets Out To +i Quantify the Oceans . +i +i +i +i [1] https://www.microtransat.org/ +i +i [2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada +i +i [3] https://www.microtransat.org/2018_sailbuoy_boat.php +i +i [4] http://sailbuoy.no/ +i +i [5] https://science.slashdot.org/story/18/05/16/228245/a-fleet- +i of-sailing-robots-sets-out-to-quantify-the-oceans i diff --git a/test/expected/SLASHDOT/0102637868.header.html b/test/expected/SLASHDOT/0102637868.header.html index b1bf587..8e8d4b0 100644 --- a/test/expected/SLASHDOT/0102637868.header.html +++ b/test/expected/SLASHDOT/0102637868.header.html @@ -14,7 +14,7 @@ from the impressive-feat dept.)

- An anonymous reader writes: For the first time an autonomous sailing robot has completed the Microtransat Challenge by crossing the Atlantic from Newfoundland, Canada to Ireland. The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, SB Met was built by the Norwegian company Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th. Further reading: A Fleet of Sailing Robots Sets Out To Quantify the Oceans. + An anonymous reader writes:

> For the first time an autonomous sailing robot has completed the [1]Microtransat Challenge by [2]crossing the Atlantic from Newfoundland, Canada to Ireland . The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, [3]SB Met was built by the Norwegian company [4]Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th.

Further reading: [5]A Fleet of Sailing Robots Sets Out To Quantify the Oceans .



[1] https://www.microtransat.org/

[2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada

[3] https://www.microtransat.org/2018_sailbuoy_boat.php

[4] http://sailbuoy.no/

[5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-of-sailing-robots-sets-out-to-quantify-the-oceans

diff --git a/test/expected/SLASHDOT/0102637868.html b/test/expected/SLASHDOT/0102637868.html index 89a30f7..7467d11 100644 --- a/test/expected/SLASHDOT/0102637868.html +++ b/test/expected/SLASHDOT/0102637868.html @@ -20,7 +20,7 @@ from the impressive-feat dept.)
- An anonymous reader writes: For the first time an autonomous sailing robot has completed the Microtransat Challenge by crossing the Atlantic from Newfoundland, Canada to Ireland. The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, SB Met was built by the Norwegian company Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th. Further reading: A Fleet of Sailing Robots Sets Out To Quantify the Oceans. + An anonymous reader writes:

> For the first time an autonomous sailing robot has completed the [1]Microtransat Challenge by [2]crossing the Atlantic from Newfoundland, Canada to Ireland . The Microtransat has been running since 2010 and has seen 23 previous entries all fail to make it across. The successful boat, [3]SB Met was built by the Norwegian company [4]Offshore Sensing AS and is only 2 metres (6.5 ft) long. It completed the crossing on August 26th, 79 days and 5000 km (3100 miles) of sailing after departing Newfoundland on June 7th.

Further reading: [5]A Fleet of Sailing Robots Sets Out To Quantify the Oceans .



[1] https://www.microtransat.org/

[2] https://www.apnews.com/f6d0e2a099684468873ab48966590ada

[3] https://www.microtransat.org/2018_sailbuoy_boat.php

[4] http://sailbuoy.no/

[5] https://science.slashdot.org/story/18/05/16/228245/a-fleet-of-sailing-robots-sets-out-to-quantify-the-oceans

diff --git a/test/expected/SLASHDOT/0102638976 b/test/expected/SLASHDOT/0102638976 index d4ee144..6741a54 100644 --- a/test/expected/SLASHDOT/0102638976 +++ b/test/expected/SLASHDOT/0102638976 @@ -9,10 +9,12 @@ o Source link: https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/ - Since the release of Chrome 69 earlier this week, countless of - users have gone on social media and Google Product Forums to - complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: - The blurred font issue isn't only limited to text rendered + Since the [1]release of Chrome 69 earlier this week , + countless of users have gone on social media and Google + Product Forums to [2]complain about "blurry" or "fuzzy" text + inside Chrome . ZDNet: + + > The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to @@ -22,10 +24,23 @@ or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night - after first user complaints started surfacing online. Some - users have also expressed concerns over Chrome not showing - "trivial subdomains" including www and secure lock sign in the - address bar. + after first user complaints started surfacing online. + + Some users have also expressed concerns over Chrome not + showing [3]"trivial subdomains" including www and secure lock + sign in the address bar. + + + + [1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69- + arrives-with-revamped-design-more-powerful-omnibox-and-better- + password-manager + + [2] https://www.zdnet.com/article/google-investigating-issue-w- + ith-blurry-fonts-on-new-chrome-69/ + + [3] https://bugs.chromium.org/p/chromium/issues/detail?id=8814- + 10 ** Whats the deal (Score:2) diff --git a/test/expected/SLASHDOT/0102638976.header b/test/expected/SLASHDOT/0102638976.header index c60622c..9180822 100644 --- a/test/expected/SLASHDOT/0102638976.header +++ b/test/expected/SLASHDOT/0102638976.header @@ -2,10 +2,12 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the blurry-texts dept. i -i Since the release of Chrome 69 earlier this week, countless of -i users have gone on social media and Google Product Forums to -i complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: -i The blurred font issue isn't only limited to text rendered +i Since the [1]release of Chrome 69 earlier this week , +i countless of users have gone on social media and Google +i Product Forums to [2]complain about "blurry" or "fuzzy" text +i inside Chrome . ZDNet: +i +i > The blurred font issue isn't only limited to text rendered i inside a web page, users said, but also for the text i suggestions displayed inside the address bar search drop-down, i and Chrome's Developer Tools panel. [...] According to @@ -15,8 +17,21 @@ i problems. Users said that changing Chrome, operating system, i or screen DPI settings didn't help. "Our team is investigating i reports of this behavior. You can find more information in i this public bug report," a Google spokesperson said last night -i after first user complaints started surfacing online. Some -i users have also expressed concerns over Chrome not showing -i "trivial subdomains" including www and secure lock sign in the -i address bar. +i after first user complaints started surfacing online. +i +i Some users have also expressed concerns over Chrome not +i showing [3]"trivial subdomains" including www and secure lock +i sign in the address bar. +i +i +i +i [1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69- +i arrives-with-revamped-design-more-powerful-omnibox-and-better- +i password-manager +i +i [2] https://www.zdnet.com/article/google-investigating-issue-w- +i ith-blurry-fonts-on-new-chrome-69/ +i +i [3] https://bugs.chromium.org/p/chromium/issues/detail?id=8814- +i 10 i diff --git a/test/expected/SLASHDOT/0102638976.header.html b/test/expected/SLASHDOT/0102638976.header.html index c255ed8..a0b7673 100644 --- a/test/expected/SLASHDOT/0102638976.header.html +++ b/test/expected/SLASHDOT/0102638976.header.html @@ -14,7 +14,7 @@ from the blurry-texts dept.)

- Since the release of Chrome 69 earlier this week, countless of users have gone on social media and Google Product Forums to complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online. Some users have also expressed concerns over Chrome not showing "trivial subdomains" including www and secure lock sign in the address bar. + Since the [1]release of Chrome 69 earlier this week , countless of users have gone on social media and Google Product Forums to [2]complain about "blurry" or "fuzzy" text inside Chrome . ZDNet:

> The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online.

Some users have also expressed concerns over Chrome not showing [3]"trivial subdomains" including www and secure lock sign in the address bar.



[1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-arrives-with-revamped-design-more-powerful-omnibox-and-better-password-manager

[2] https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/

[3] https://bugs.chromium.org/p/chromium/issues/detail?id=881410

diff --git a/test/expected/SLASHDOT/0102638976.html b/test/expected/SLASHDOT/0102638976.html index 8c566d7..bb9c5a9 100644 --- a/test/expected/SLASHDOT/0102638976.html +++ b/test/expected/SLASHDOT/0102638976.html @@ -20,7 +20,7 @@ from the blurry-texts dept.)
- Since the release of Chrome 69 earlier this week, countless of users have gone on social media and Google Product Forums to complain about "blurry" or "fuzzy" text inside Chrome. ZDNet: The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online. Some users have also expressed concerns over Chrome not showing "trivial subdomains" including www and secure lock sign in the address bar. + Since the [1]release of Chrome 69 earlier this week , countless of users have gone on social media and Google Product Forums to [2]complain about "blurry" or "fuzzy" text inside Chrome . ZDNet:

> The blurred font issue isn't only limited to text rendered inside a web page, users said, but also for the text suggestions displayed inside the address bar search drop-down, and Chrome's Developer Tools panel. [...] According to reports, the issue only manifests for Chrome 69 users on Windows. Those who rolled back to Chrome 68 stopped having problems. Users said that changing Chrome, operating system, or screen DPI settings didn't help. "Our team is investigating reports of this behavior. You can find more information in this public bug report," a Google spokesperson said last night after first user complaints started surfacing online.

Some users have also expressed concerns over Chrome not showing [3]"trivial subdomains" including www and secure lock sign in the address bar.



[1] https://tech.slashdot.org/story/18/09/04/1711250/chrome-69-arrives-with-revamped-design-more-powerful-omnibox-and-better-password-manager

[2] https://www.zdnet.com/article/google-investigating-issue-with-blurry-fonts-on-new-chrome-69/

[3] https://bugs.chromium.org/p/chromium/issues/detail?id=881410

diff --git a/test/expected/SLASHDOT/0102639448 b/test/expected/SLASHDOT/0102639448 index fc9fc16..fad82f9 100644 --- a/test/expected/SLASHDOT/0102639448 +++ b/test/expected/SLASHDOT/0102639448 @@ -8,18 +8,34 @@ o Source link: https://www.engadget.com/2018/09/06/eve-online-pearl-abyss-ccp-games/ - MAXOMENOS writes: EVE Online developer CCP Games has been - acquired by Pearl Abyss, the South Korean studio behind the - action-oriented MMORPG Black Desert Online. According to - VentureBeat, the deal was worth $425 million and will close in - early October. It's a surprise announcement for CCP, which has - long operated as an independent developer. Eve Online isn't - the biggest MMORPG on the market, but it has maintained a - steady and loyal userbase through continuous updates and a - well-timed switch to a hybrid premium and free-to-play model. - The 15-year-old game is unique, too, with its large-scale - battles and notoriously complex economic and political - systems. + [1]MAXOMENOS writes: + + > + + >> EVE Online + + > developer CCP Games [2]has been acquired by Pearl Abyss , + the South Korean studio behind the action-oriented MMORPG + Black Desert Online. According to [3]VentureBeat , the deal + was worth $425 million and will close in early October. It's a + surprise announcement for CCP, which has long operated as an + independent developer. Eve Online isn't the biggest MMORPG on + the market, but it has maintained a steady and loyal userbase + through continuous updates and a well-timed switch to a hybrid + premium and free-to-play model. The 15-year-old game is + unique, too, with its large-scale battles and notoriously + complex economic and political systems. + + + + [1] https://slashdot.org/~MAXOMENOS + + [2] https://www.ccpgames.com/news/2018/black-desert-online-cre- + ators-pearl-abyss-to-acquire-ccp-games-makers-of-eve + + [3] https://venturebeat.com/2018/09/06/black-desert-online-cre- + ator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-m- + illion/ ** RIP Eve (Score:3) diff --git a/test/expected/SLASHDOT/0102639448.header b/test/expected/SLASHDOT/0102639448.header index 11f3ae1..31f4c40 100644 --- a/test/expected/SLASHDOT/0102639448.header +++ b/test/expected/SLASHDOT/0102639448.header @@ -2,16 +2,32 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the in-some-business-news dept. i -i MAXOMENOS writes: EVE Online developer CCP Games has been -i acquired by Pearl Abyss, the South Korean studio behind the -i action-oriented MMORPG Black Desert Online. According to -i VentureBeat, the deal was worth $425 million and will close in -i early October. It's a surprise announcement for CCP, which has -i long operated as an independent developer. Eve Online isn't -i the biggest MMORPG on the market, but it has maintained a -i steady and loyal userbase through continuous updates and a -i well-timed switch to a hybrid premium and free-to-play model. -i The 15-year-old game is unique, too, with its large-scale -i battles and notoriously complex economic and political -i systems. +i [1]MAXOMENOS writes: +i +i > +i +i >> EVE Online +i +i > developer CCP Games [2]has been acquired by Pearl Abyss , +i the South Korean studio behind the action-oriented MMORPG +i Black Desert Online. According to [3]VentureBeat , the deal +i was worth $425 million and will close in early October. It's a +i surprise announcement for CCP, which has long operated as an +i independent developer. Eve Online isn't the biggest MMORPG on +i the market, but it has maintained a steady and loyal userbase +i through continuous updates and a well-timed switch to a hybrid +i premium and free-to-play model. The 15-year-old game is +i unique, too, with its large-scale battles and notoriously +i complex economic and political systems. +i +i +i +i [1] https://slashdot.org/~MAXOMENOS +i +i [2] https://www.ccpgames.com/news/2018/black-desert-online-cre- +i ators-pearl-abyss-to-acquire-ccp-games-makers-of-eve +i +i [3] https://venturebeat.com/2018/09/06/black-desert-online-cre- +i ator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-m- +i illion/ i diff --git a/test/expected/SLASHDOT/0102639448.header.html b/test/expected/SLASHDOT/0102639448.header.html index bad6182..031d712 100644 --- a/test/expected/SLASHDOT/0102639448.header.html +++ b/test/expected/SLASHDOT/0102639448.header.html @@ -14,7 +14,7 @@ from the in-some-business-news dept.)

- MAXOMENOS writes: EVE Online developer CCP Games has been acquired by Pearl Abyss, the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to VentureBeat, the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems. + [1]MAXOMENOS writes:

>

>> EVE Online

> developer CCP Games [2]has been acquired by Pearl Abyss , the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to [3]VentureBeat , the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.



[1] https://slashdot.org/~MAXOMENOS

[2] https://www.ccpgames.com/news/2018/black-desert-online-creators-pearl-abyss-to-acquire-ccp-games-makers-of-eve

[3] https://venturebeat.com/2018/09/06/black-desert-online-creator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-million/

diff --git a/test/expected/SLASHDOT/0102639448.html b/test/expected/SLASHDOT/0102639448.html index 0b800b7..6942240 100644 --- a/test/expected/SLASHDOT/0102639448.html +++ b/test/expected/SLASHDOT/0102639448.html @@ -20,7 +20,7 @@ from the in-some-business-news dept.)
- MAXOMENOS writes: EVE Online developer CCP Games has been acquired by Pearl Abyss, the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to VentureBeat, the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems. + [1]MAXOMENOS writes:

>

>> EVE Online

> developer CCP Games [2]has been acquired by Pearl Abyss , the South Korean studio behind the action-oriented MMORPG Black Desert Online. According to [3]VentureBeat , the deal was worth $425 million and will close in early October. It's a surprise announcement for CCP, which has long operated as an independent developer. Eve Online isn't the biggest MMORPG on the market, but it has maintained a steady and loyal userbase through continuous updates and a well-timed switch to a hybrid premium and free-to-play model. The 15-year-old game is unique, too, with its large-scale battles and notoriously complex economic and political systems.



[1] https://slashdot.org/~MAXOMENOS

[2] https://www.ccpgames.com/news/2018/black-desert-online-creators-pearl-abyss-to-acquire-ccp-games-makers-of-eve

[3] https://venturebeat.com/2018/09/06/black-desert-online-creator-pearl-abyss-acquires-eve-online-maker-ccp-games-for-425-million/

diff --git a/test/expected/SLASHDOT/0102639752 b/test/expected/SLASHDOT/0102639752 index dcf97c8..5a44679 100644 --- a/test/expected/SLASHDOT/0102639752 +++ b/test/expected/SLASHDOT/0102639752 @@ -11,24 +11,31 @@ Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security - researcher who discovered almost 400,000 web pages with an + researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. - From a report: Vladimir Smitka began his .git directory - odyssey in July when he began looking at Czech websites to - find how many were improperly configured and allow access to - their .git folders within the file versions repository. Open - .git directories are a particularly dangerous issue, he said, - because they can contain a great deal of sensitive - information. "Information about the website's structure, and - sometimes you can get very sensitive data such as database - passwords, API keys, development IDE settings, and so on. - However, this data shouldn't be stored in the repository, but - in previous scans of various security issues, I have found - many developers that do not follow these best practices," - Smitka wrote. Smitka queried 230 million websites to discover - the 390,000 allowing access to their .git directories. The - vast majority of the websites with open directories had a .com - TLD with .net, .de, .org and uk comprising most of the others. + From a report: + + > Vladimir Smitka began his .git directory odyssey in July + when he began looking at Czech websites to find how many were + improperly configured and allow access to their .git folders + within the file versions repository. Open .git directories are + a particularly dangerous issue, he said, because they can + contain a great deal of sensitive information. "Information + about the website's structure, and sometimes you can get very + sensitive data such as database passwords, API keys, + development IDE settings, and so on. However, this data + shouldn't be stored in the repository, but in previous scans + of various security issues, I have found many developers that + do not follow these best practices," Smitka wrote. Smitka + queried 230 million websites to discover the 390,000 allowing + access to their .git directories. The vast majority of the + websites with open directories had a .com TLD with .net, .de, + .org and uk comprising most of the others. + + + + [1] https://www.scmagazine.com/home/news/400000-websites-vulne- + rable-through-exposed-git-directories/ ** diff --git a/test/expected/SLASHDOT/0102639752.header b/test/expected/SLASHDOT/0102639752.header index 28888f4..8da96d9 100644 --- a/test/expected/SLASHDOT/0102639752.header +++ b/test/expected/SLASHDOT/0102639752.header @@ -4,22 +4,29 @@ i from the security-woes dept. i i Open .git directories are a bigger cybersecurity problem than i many might imagine, at least according to a Czech security -i researcher who discovered almost 400,000 web pages with an +i researcher who [1]discovered almost 400,000 web pages with an i open .git directory possibly exposing a wide variety of data. -i From a report: Vladimir Smitka began his .git directory -i odyssey in July when he began looking at Czech websites to -i find how many were improperly configured and allow access to -i their .git folders within the file versions repository. Open -i .git directories are a particularly dangerous issue, he said, -i because they can contain a great deal of sensitive -i information. "Information about the website's structure, and -i sometimes you can get very sensitive data such as database -i passwords, API keys, development IDE settings, and so on. -i However, this data shouldn't be stored in the repository, but -i in previous scans of various security issues, I have found -i many developers that do not follow these best practices," -i Smitka wrote. Smitka queried 230 million websites to discover -i the 390,000 allowing access to their .git directories. The -i vast majority of the websites with open directories had a .com -i TLD with .net, .de, .org and uk comprising most of the others. +i From a report: +i +i > Vladimir Smitka began his .git directory odyssey in July +i when he began looking at Czech websites to find how many were +i improperly configured and allow access to their .git folders +i within the file versions repository. Open .git directories are +i a particularly dangerous issue, he said, because they can +i contain a great deal of sensitive information. "Information +i about the website's structure, and sometimes you can get very +i sensitive data such as database passwords, API keys, +i development IDE settings, and so on. However, this data +i shouldn't be stored in the repository, but in previous scans +i of various security issues, I have found many developers that +i do not follow these best practices," Smitka wrote. Smitka +i queried 230 million websites to discover the 390,000 allowing +i access to their .git directories. The vast majority of the +i websites with open directories had a .com TLD with .net, .de, +i .org and uk comprising most of the others. +i +i +i +i [1] https://www.scmagazine.com/home/news/400000-websites-vulne- +i rable-through-exposed-git-directories/ i diff --git a/test/expected/SLASHDOT/0102639752.header.html b/test/expected/SLASHDOT/0102639752.header.html index d5c2ac8..42bdf07 100644 --- a/test/expected/SLASHDOT/0102639752.header.html +++ b/test/expected/SLASHDOT/0102639752.header.html @@ -14,7 +14,7 @@ from the security-woes dept.)

- Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others. + Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report:

> Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.



[1] https://www.scmagazine.com/home/news/400000-websites-vulnerable-through-exposed-git-directories/

diff --git a/test/expected/SLASHDOT/0102639752.html b/test/expected/SLASHDOT/0102639752.html index 4a2ebbb..3909f00 100644 --- a/test/expected/SLASHDOT/0102639752.html +++ b/test/expected/SLASHDOT/0102639752.html @@ -20,7 +20,7 @@ from the security-woes dept.)
- Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others. + Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report:

> Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.



[1] https://www.scmagazine.com/home/news/400000-websites-vulnerable-through-exposed-git-directories/

diff --git a/test/expected/SLASHDOT/0102639856 b/test/expected/SLASHDOT/0102639856 index e33af06..f5342a5 100644 --- a/test/expected/SLASHDOT/0102639856 +++ b/test/expected/SLASHDOT/0102639856 @@ -10,27 +10,38 @@ Andrew Orlowski of The Register recounts all the gadgets - supercharged with AI that he came across at IFA tradeshow last - week -- and wonders what value AI brought to the table. He - writes: I didn't see a blockchain toothbrush at IFA in Berlin - last week, but I'm sure there was one lurking about somewhere. - With 30 vast halls to cover, I didn't look too hard for it. - But I did see many things almost as tragic that no one could - miss -- AI being squeezed into almost every conceivable bit of + [1]supercharged with AI that he came across at IFA tradeshow + last week -- and wonders what value AI brought to the table . + He writes: + + > I didn't see a blockchain toothbrush at IFA in Berlin last + week, but I'm sure there was one lurking about somewhere. With + 30 vast halls to cover, I didn't look too hard for it. But I + did see many things almost as tragic that no one could miss -- + AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and - the annoyance of being prompted. [...] Back to LG, which takes - 2018's prize for sticking AI into a superfluous gadget. The - centrepiece of its AI efforts this year is a robot, ClOi. Put - Google Assistant or Alexa on wheels, and you have ClOi. I - asked the booth person what exactly ClOi could do to be told - "it can take notes for your shopping list." Why wasn't this - miracle of the Fourth Industrial Revolution let loose on the - LG floor? I wondered -- a question answered by this account of - ClOi's debut at CES in January. Clearly things haven't - improved much -- this robot buddy was kept indoors. + the annoyance of being prompted. + + > + + > [...] Back to LG, which takes 2018's prize for sticking AI + into a superfluous gadget. The centrepiece of its AI efforts + this year is a robot, ClOi. Put Google Assistant or Alexa on + wheels, and you have ClOi. I asked the booth person what + exactly ClOi could do to be told "it can take notes for your + shopping list." Why wasn't this miracle of the Fourth + Industrial Revolution let loose on the LG floor? I wondered -- + a question answered by this account of ClOi's debut at CES in + January. Clearly things haven't improved much -- this robot + buddy was kept indoors. + + + + [1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2- + 018_roundup/ ** Stupid industry fads (Score:5, Funny) diff --git a/test/expected/SLASHDOT/0102639856.header b/test/expected/SLASHDOT/0102639856.header index e47a198..ac1255c 100644 --- a/test/expected/SLASHDOT/0102639856.header +++ b/test/expected/SLASHDOT/0102639856.header @@ -3,25 +3,36 @@ i Thursday September 06, 2018 @11:30PM (msmash) i from the there-is-no-spoon dept. i i Andrew Orlowski of The Register recounts all the gadgets -i supercharged with AI that he came across at IFA tradeshow last -i week -- and wonders what value AI brought to the table. He -i writes: I didn't see a blockchain toothbrush at IFA in Berlin -i last week, but I'm sure there was one lurking about somewhere. -i With 30 vast halls to cover, I didn't look too hard for it. -i But I did see many things almost as tragic that no one could -i miss -- AI being squeezed into almost every conceivable bit of +i [1]supercharged with AI that he came across at IFA tradeshow +i last week -- and wonders what value AI brought to the table . +i He writes: +i +i > I didn't see a blockchain toothbrush at IFA in Berlin last +i week, but I'm sure there was one lurking about somewhere. With +i 30 vast halls to cover, I didn't look too hard for it. But I +i did see many things almost as tragic that no one could miss -- +i AI being squeezed into almost every conceivable bit of i consumer electronics. But none were convincing. If ever there i was a solution looking for a problem, it's ramming AI into i gadgets to show of a company's machine learning prowess. For i the consumer it adds unreliability, cost and complexity, and -i the annoyance of being prompted. [...] Back to LG, which takes -i 2018's prize for sticking AI into a superfluous gadget. The -i centrepiece of its AI efforts this year is a robot, ClOi. Put -i Google Assistant or Alexa on wheels, and you have ClOi. I -i asked the booth person what exactly ClOi could do to be told -i "it can take notes for your shopping list." Why wasn't this -i miracle of the Fourth Industrial Revolution let loose on the -i LG floor? I wondered -- a question answered by this account of -i ClOi's debut at CES in January. Clearly things haven't -i improved much -- this robot buddy was kept indoors. +i the annoyance of being prompted. +i +i > +i +i > [...] Back to LG, which takes 2018's prize for sticking AI +i into a superfluous gadget. The centrepiece of its AI efforts +i this year is a robot, ClOi. Put Google Assistant or Alexa on +i wheels, and you have ClOi. I asked the booth person what +i exactly ClOi could do to be told "it can take notes for your +i shopping list." Why wasn't this miracle of the Fourth +i Industrial Revolution let loose on the LG floor? I wondered -- +i a question answered by this account of ClOi's debut at CES in +i January. Clearly things haven't improved much -- this robot +i buddy was kept indoors. +i +i +i +i [1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2- +i 018_roundup/ i diff --git a/test/expected/SLASHDOT/0102639856.header.html b/test/expected/SLASHDOT/0102639856.header.html index 7c2b334..0f34d88 100644 --- a/test/expected/SLASHDOT/0102639856.header.html +++ b/test/expected/SLASHDOT/0102639856.header.html @@ -14,7 +14,7 @@ from the there-is-no-spoon dept.)

- Andrew Orlowski of The Register recounts all the gadgets supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table. He writes: I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted. [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors. + Andrew Orlowski of The Register recounts all the gadgets [1]supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table . He writes:

> I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted.

>

> [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.



[1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2018_roundup/

diff --git a/test/expected/SLASHDOT/0102639856.html b/test/expected/SLASHDOT/0102639856.html index 0625d73..6bd7b4c 100644 --- a/test/expected/SLASHDOT/0102639856.html +++ b/test/expected/SLASHDOT/0102639856.html @@ -20,7 +20,7 @@ from the there-is-no-spoon dept.)
- Andrew Orlowski of The Register recounts all the gadgets supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table. He writes: I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted. [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors. + Andrew Orlowski of The Register recounts all the gadgets [1]supercharged with AI that he came across at IFA tradeshow last week -- and wonders what value AI brought to the table . He writes:

> I didn't see a blockchain toothbrush at IFA in Berlin last week, but I'm sure there was one lurking about somewhere. With 30 vast halls to cover, I didn't look too hard for it. But I did see many things almost as tragic that no one could miss -- AI being squeezed into almost every conceivable bit of consumer electronics. But none were convincing. If ever there was a solution looking for a problem, it's ramming AI into gadgets to show of a company's machine learning prowess. For the consumer it adds unreliability, cost and complexity, and the annoyance of being prompted.

>

> [...] Back to LG, which takes 2018's prize for sticking AI into a superfluous gadget. The centrepiece of its AI efforts this year is a robot, ClOi. Put Google Assistant or Alexa on wheels, and you have ClOi. I asked the booth person what exactly ClOi could do to be told "it can take notes for your shopping list." Why wasn't this miracle of the Fourth Industrial Revolution let loose on the LG floor? I wondered -- a question answered by this account of ClOi's debut at CES in January. Clearly things haven't improved much -- this robot buddy was kept indoors.



[1] https://www.theregister.co.uk/2018/09/05/consumer_ai_ifa_2018_roundup/

diff --git a/test/expected/SLASHDOT/0102640098 b/test/expected/SLASHDOT/0102640098 index 81e3f14..b3cd7cc 100644 --- a/test/expected/SLASHDOT/0102640098 +++ b/test/expected/SLASHDOT/0102640098 @@ -9,28 +9,37 @@ o Source link: https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html - An anonymous reader quotes a report from CNBC: As our global - economy increasingly comes to run on technology-enabled rails - and every company becomes a tech company, demand for - high-quality software engineers is at an all-time high. A - recent study from Stripe and Harris Poll found that 61 percent - of C-suite executives believe access to developer talent is a - threat to the success of their business. Perhaps more - surprisingly -- as we mark a decade after the financial crisis - -- this threat was even ranked above capital constraints. And - yet, despite being many corporations' most precious resource, - developer talents are all too often squandered. Collectively, - companies today lose upward of $300 billion a year paying down - "technical debt," as developers pour time into maintaining - legacy systems or dealing with the ramifications of bad - software. This is especially worrisome, given the outsized - impact developers have on companies' chances of success. - Software developers don't have a monopoly on good ideas, but - their skill set makes them a uniquely deep source of - innovation, productivity and new economic connections. When - deployed correctly, developers can be economic multipliers -- - coefficients that dramatically ratchet up the output of the - teams and companies of which they're a part. + An anonymous reader quotes a report from CNBC: + + > As our global economy increasingly comes to run on + technology-enabled rails and every company becomes a tech + company, demand for high-quality software engineers is at an + all-time high. A recent study from [1]Stripe and Harris Poll + found that 61 percent of C-suite executives believe access to + developer talent is a threat to the success of their business. + Perhaps more surprisingly -- as we mark a decade after the + financial crisis -- [2]this threat was even ranked above + capital constraints . And yet, despite being many + corporations' most precious resource, developer talents are + all too often squandered. Collectively, companies today lose + upward of $300 billion a year paying down "technical debt," as + developers pour time into maintaining legacy systems or + dealing with the ramifications of bad software. This is + especially worrisome, given the outsized impact developers + have on companies' chances of success. Software developers + don't have a monopoly on good ideas, but their skill set makes + them a uniquely deep source of innovation, productivity and + new economic connections. When deployed correctly, developers + can be economic multipliers -- coefficients that dramatically + ratchet up the output of the teams and companies of which + they're a part. + + + + [1] https://stripe.com/reports/developer-coefficient-2018 + + [2] https://www.cnbc.com/2018/09/06/companies-worry-more-about- + access-to-software-developers-than-capital.html ** So why not treat them well? (Score:5, Insightful) diff --git a/test/expected/SLASHDOT/0102640098.header b/test/expected/SLASHDOT/0102640098.header index 4cafd75..6cb73a1 100644 --- a/test/expected/SLASHDOT/0102640098.header +++ b/test/expected/SLASHDOT/0102640098.header @@ -2,26 +2,35 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the new-breed-of-corporate-leaders dept. i -i An anonymous reader quotes a report from CNBC: As our global -i economy increasingly comes to run on technology-enabled rails -i and every company becomes a tech company, demand for -i high-quality software engineers is at an all-time high. A -i recent study from Stripe and Harris Poll found that 61 percent -i of C-suite executives believe access to developer talent is a -i threat to the success of their business. Perhaps more -i surprisingly -- as we mark a decade after the financial crisis -i -- this threat was even ranked above capital constraints. And -i yet, despite being many corporations' most precious resource, -i developer talents are all too often squandered. Collectively, -i companies today lose upward of $300 billion a year paying down -i "technical debt," as developers pour time into maintaining -i legacy systems or dealing with the ramifications of bad -i software. This is especially worrisome, given the outsized -i impact developers have on companies' chances of success. -i Software developers don't have a monopoly on good ideas, but -i their skill set makes them a uniquely deep source of -i innovation, productivity and new economic connections. When -i deployed correctly, developers can be economic multipliers -- -i coefficients that dramatically ratchet up the output of the -i teams and companies of which they're a part. +i An anonymous reader quotes a report from CNBC: +i +i > As our global economy increasingly comes to run on +i technology-enabled rails and every company becomes a tech +i company, demand for high-quality software engineers is at an +i all-time high. A recent study from [1]Stripe and Harris Poll +i found that 61 percent of C-suite executives believe access to +i developer talent is a threat to the success of their business. +i Perhaps more surprisingly -- as we mark a decade after the +i financial crisis -- [2]this threat was even ranked above +i capital constraints . And yet, despite being many +i corporations' most precious resource, developer talents are +i all too often squandered. Collectively, companies today lose +i upward of $300 billion a year paying down "technical debt," as +i developers pour time into maintaining legacy systems or +i dealing with the ramifications of bad software. This is +i especially worrisome, given the outsized impact developers +i have on companies' chances of success. Software developers +i don't have a monopoly on good ideas, but their skill set makes +i them a uniquely deep source of innovation, productivity and +i new economic connections. When deployed correctly, developers +i can be economic multipliers -- coefficients that dramatically +i ratchet up the output of the teams and companies of which +i they're a part. +i +i +i +i [1] https://stripe.com/reports/developer-coefficient-2018 +i +i [2] https://www.cnbc.com/2018/09/06/companies-worry-more-about- +i access-to-software-developers-than-capital.html i diff --git a/test/expected/SLASHDOT/0102640098.header.html b/test/expected/SLASHDOT/0102640098.header.html index d07a8c5..011e995 100644 --- a/test/expected/SLASHDOT/0102640098.header.html +++ b/test/expected/SLASHDOT/0102640098.header.html @@ -14,7 +14,7 @@ from the new-breed-of-corporate-leaders dept.)

- An anonymous reader quotes a report from CNBC: As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- this threat was even ranked above capital constraints. And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part. + An anonymous reader quotes a report from CNBC:

> As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from [1]Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- [2]this threat was even ranked above capital constraints . And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.



[1] https://stripe.com/reports/developer-coefficient-2018

[2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html

diff --git a/test/expected/SLASHDOT/0102640098.html b/test/expected/SLASHDOT/0102640098.html index 9c6f5e7..e02825d 100644 --- a/test/expected/SLASHDOT/0102640098.html +++ b/test/expected/SLASHDOT/0102640098.html @@ -20,7 +20,7 @@ from the new-breed-of-corporate-leaders dept.)
- An anonymous reader quotes a report from CNBC: As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- this threat was even ranked above capital constraints. And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part. + An anonymous reader quotes a report from CNBC:

> As our global economy increasingly comes to run on technology-enabled rails and every company becomes a tech company, demand for high-quality software engineers is at an all-time high. A recent study from [1]Stripe and Harris Poll found that 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business. Perhaps more surprisingly -- as we mark a decade after the financial crisis -- [2]this threat was even ranked above capital constraints . And yet, despite being many corporations' most precious resource, developer talents are all too often squandered. Collectively, companies today lose upward of $300 billion a year paying down "technical debt," as developers pour time into maintaining legacy systems or dealing with the ramifications of bad software. This is especially worrisome, given the outsized impact developers have on companies' chances of success. Software developers don't have a monopoly on good ideas, but their skill set makes them a uniquely deep source of innovation, productivity and new economic connections. When deployed correctly, developers can be economic multipliers -- coefficients that dramatically ratchet up the output of the teams and companies of which they're a part.



[1] https://stripe.com/reports/developer-coefficient-2018

[2] https://www.cnbc.com/2018/09/06/companies-worry-more-about-access-to-software-developers-than-capital.html

diff --git a/test/expected/SLASHDOT/0102640274 b/test/expected/SLASHDOT/0102640274 index 6129b0b..6bd9fef 100644 --- a/test/expected/SLASHDOT/0102640274 +++ b/test/expected/SLASHDOT/0102640274 @@ -9,38 +9,54 @@ o Source link: https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust - pgmrdlm shares a report from The Verge: Best known for coining - the phrase "net neutrality" and his book The Master Switch: - The Rise and Fall of Information Empires, Wu has a new book - coming out in November called The Curse of Bigness: Antitrust - in the New Gilded Age. In it, he argues compellingly for a - return to aggressive antitrust enforcement in the style of - Teddy Roosevelt, saying that Google, Facebook, Amazon, and - other huge tech companies are a threat to democracy as they - get bigger and bigger. "We live in America, which has a strong - and proud tradition of breaking up companies that are too big - for inefficient reasons," Wu told me on this week's Vergecast. - "We need to reverse this idea that it's not an American - tradition. We've broken up dozens of companies." "I think if - you took a hard look at the acquisition of WhatsApp and - Instagram, the argument that the effects of those acquisitions - have been anticompetitive would be easy to prove for a number - of reasons," says Wu. And breaking up the company wouldn't be - hard, he says. "What would be the harm? You'll have three - competitors. It's not 'Oh my god, if you get rid of WhatsApp - and Instagram, well then the whole world's going to fall - apart.' It would be like 'Okay, now you have some companies - actually trying to offer you an alternative to Facebook.'" - Breaking up Facebook (and other huge tech companies like - Google and Amazon) could be simple under the current law, - suggests Wu. But it could also lead to a major rethinking of - how antitrust law should work in a world where the giant - platform companies give their products away for free, and the - ability for the government to restrict corporate power seems - to be diminishing by the day. And it demands that we all think - seriously about the conditions that create innovation. "I - think everyone's steering way away from the monopolies, and I - think it's hurting innovation in the tech sector," says Wu. + [1]pgmrdlm shares a report from The Verge: + + > Best known for coining the phrase "net neutrality" and his + book The Master Switch: The Rise and Fall of Information + Empires, Wu has a new book coming out in November called + [2]The Curse of Bigness: Antitrust in the New Gilded Age . In + it, he argues compellingly for a return to aggressive + antitrust enforcement in the style of Teddy Roosevelt, saying + that Google, Facebook, Amazon, and other huge tech companies + [3]are a threat to democracy as they get bigger and bigger . + "We live in America, which has a strong and proud tradition of + breaking up companies that are too big for inefficient + reasons," Wu told me on this week's Vergecast. "We need to + reverse this idea that it's not an American tradition. We've + broken up dozens of companies." + + > + + > "I think if you took a hard look at the acquisition of + WhatsApp and Instagram, the argument that the effects of those + acquisitions have been anticompetitive would be easy to prove + for a number of reasons," says Wu. And breaking up the company + wouldn't be hard, he says. "What would be the harm? You'll + have three competitors. It's not 'Oh my god, if you get rid of + WhatsApp and Instagram, well then the whole world's going to + fall apart.' It would be like 'Okay, now you have some + companies actually trying to offer you an alternative to + Facebook.'" Breaking up Facebook (and other huge tech + companies like Google and Amazon) could be simple under the + current law, suggests Wu. But it could also lead to a major + rethinking of how antitrust law should work in a world where + the giant platform companies give their products away for + free, and the ability for the government to restrict corporate + power seems to be diminishing by the day. And it demands that + we all think seriously about the conditions that create + innovation. "I think everyone's steering way away from the + monopolies, and I think it's hurting innovation in the tech + sector," says Wu. + + + + [1] https://slashdot.org/~pgmrdlm + + [2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/- + dp/0999745468 + + [3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook- + regulation-interview-curse-of-bigness-antitrust ** Safe Harbor (Score:5, Interesting) diff --git a/test/expected/SLASHDOT/0102640274.header b/test/expected/SLASHDOT/0102640274.header index 3d5338f..0646617 100644 --- a/test/expected/SLASHDOT/0102640274.header +++ b/test/expected/SLASHDOT/0102640274.header @@ -2,36 +2,52 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the easier-said-than-done dept. i -i pgmrdlm shares a report from The Verge: Best known for coining -i the phrase "net neutrality" and his book The Master Switch: -i The Rise and Fall of Information Empires, Wu has a new book -i coming out in November called The Curse of Bigness: Antitrust -i in the New Gilded Age. In it, he argues compellingly for a -i return to aggressive antitrust enforcement in the style of -i Teddy Roosevelt, saying that Google, Facebook, Amazon, and -i other huge tech companies are a threat to democracy as they -i get bigger and bigger. "We live in America, which has a strong -i and proud tradition of breaking up companies that are too big -i for inefficient reasons," Wu told me on this week's Vergecast. -i "We need to reverse this idea that it's not an American -i tradition. We've broken up dozens of companies." "I think if -i you took a hard look at the acquisition of WhatsApp and -i Instagram, the argument that the effects of those acquisitions -i have been anticompetitive would be easy to prove for a number -i of reasons," says Wu. And breaking up the company wouldn't be -i hard, he says. "What would be the harm? You'll have three -i competitors. It's not 'Oh my god, if you get rid of WhatsApp -i and Instagram, well then the whole world's going to fall -i apart.' It would be like 'Okay, now you have some companies -i actually trying to offer you an alternative to Facebook.'" -i Breaking up Facebook (and other huge tech companies like -i Google and Amazon) could be simple under the current law, -i suggests Wu. But it could also lead to a major rethinking of -i how antitrust law should work in a world where the giant -i platform companies give their products away for free, and the -i ability for the government to restrict corporate power seems -i to be diminishing by the day. And it demands that we all think -i seriously about the conditions that create innovation. "I -i think everyone's steering way away from the monopolies, and I -i think it's hurting innovation in the tech sector," says Wu. +i [1]pgmrdlm shares a report from The Verge: +i +i > Best known for coining the phrase "net neutrality" and his +i book The Master Switch: The Rise and Fall of Information +i Empires, Wu has a new book coming out in November called +i [2]The Curse of Bigness: Antitrust in the New Gilded Age . In +i it, he argues compellingly for a return to aggressive +i antitrust enforcement in the style of Teddy Roosevelt, saying +i that Google, Facebook, Amazon, and other huge tech companies +i [3]are a threat to democracy as they get bigger and bigger . +i "We live in America, which has a strong and proud tradition of +i breaking up companies that are too big for inefficient +i reasons," Wu told me on this week's Vergecast. "We need to +i reverse this idea that it's not an American tradition. We've +i broken up dozens of companies." +i +i > +i +i > "I think if you took a hard look at the acquisition of +i WhatsApp and Instagram, the argument that the effects of those +i acquisitions have been anticompetitive would be easy to prove +i for a number of reasons," says Wu. And breaking up the company +i wouldn't be hard, he says. "What would be the harm? You'll +i have three competitors. It's not 'Oh my god, if you get rid of +i WhatsApp and Instagram, well then the whole world's going to +i fall apart.' It would be like 'Okay, now you have some +i companies actually trying to offer you an alternative to +i Facebook.'" Breaking up Facebook (and other huge tech +i companies like Google and Amazon) could be simple under the +i current law, suggests Wu. But it could also lead to a major +i rethinking of how antitrust law should work in a world where +i the giant platform companies give their products away for +i free, and the ability for the government to restrict corporate +i power seems to be diminishing by the day. And it demands that +i we all think seriously about the conditions that create +i innovation. "I think everyone's steering way away from the +i monopolies, and I think it's hurting innovation in the tech +i sector," says Wu. +i +i +i +i [1] https://slashdot.org/~pgmrdlm +i +i [2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/- +i dp/0999745468 +i +i [3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook- +i regulation-interview-curse-of-bigness-antitrust i diff --git a/test/expected/SLASHDOT/0102640274.header.html b/test/expected/SLASHDOT/0102640274.header.html index ff323d0..b92baa5 100644 --- a/test/expected/SLASHDOT/0102640274.header.html +++ b/test/expected/SLASHDOT/0102640274.header.html @@ -14,7 +14,7 @@ from the easier-said-than-done dept.)

- pgmrdlm shares a report from The Verge: Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called The Curse of Bigness: Antitrust in the New Gilded Age. In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies are a threat to democracy as they get bigger and bigger. "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies." "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu. + [1]pgmrdlm shares a report from The Verge:

> Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called [2]The Curse of Bigness: Antitrust in the New Gilded Age . In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies [3]are a threat to democracy as they get bigger and bigger . "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies."

>

> "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.



[1] https://slashdot.org/~pgmrdlm

[2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/dp/0999745468

[3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust

diff --git a/test/expected/SLASHDOT/0102640274.html b/test/expected/SLASHDOT/0102640274.html index e071f7f..8439f80 100644 --- a/test/expected/SLASHDOT/0102640274.html +++ b/test/expected/SLASHDOT/0102640274.html @@ -20,7 +20,7 @@ from the easier-said-than-done dept.)
- pgmrdlm shares a report from The Verge: Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called The Curse of Bigness: Antitrust in the New Gilded Age. In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies are a threat to democracy as they get bigger and bigger. "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies." "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu. + [1]pgmrdlm shares a report from The Verge:

> Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called [2]The Curse of Bigness: Antitrust in the New Gilded Age . In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies [3]are a threat to democracy as they get bigger and bigger . "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies."

>

> "I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.



[1] https://slashdot.org/~pgmrdlm

[2] https://www.amazon.com/Curse-Bigness-Antitrust-New-Gilded/dp/0999745468

[3] https://www.theverge.com/2018/9/4/17816572/tim-wu-facebook-regulation-interview-curse-of-bigness-antitrust

diff --git a/test/expected/SLASHDOT/0102640424 b/test/expected/SLASHDOT/0102640424 index 86a6513..29cd00d 100644 --- a/test/expected/SLASHDOT/0102640424 +++ b/test/expected/SLASHDOT/0102640424 @@ -10,19 +10,20 @@ A 28-year-old MIT graduate named You Wu spent six years - developing a low-cost robot designed to find leaks in pipes - early, both to save water and to avoid bigger damage later + [1]developing a low-cost robot designed to find leaks in pipes + early , both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, - making a map of critical leaks to fix." From the report: MIT - doctoral student You Wu spent six years developing the design, - building on research that earlier students began under a - project sponsored by a university in Saudi Arabia, where most - drinking water comes from expensive desalination plants and - around a third of it is lost to leaks. It took three years + making a map of critical leaks to fix." From the report: + + > MIT doctoral student You Wu spent six years developing the + design, building on research that earlier students began under + a project sponsored by a university in Saudi Arabia, where + most drinking water comes from expensive desalination plants + and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, @@ -30,10 +31,17 @@ skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a - startup called WatchTower Robotics. The company will soon + startup called [2]WatchTower Robotics . The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own. + + + + [1] https://www.fastcompany.com/90232363/this-leak-seeking-rob- + ot-just-won-the-u-s-james-dyson-award + + [2] http://watchtowerrobotics.com/ ** What we are not told ... (Score:1) diff --git a/test/expected/SLASHDOT/0102640424.header b/test/expected/SLASHDOT/0102640424.header index 4b659a4..9fafb41 100644 --- a/test/expected/SLASHDOT/0102640424.header +++ b/test/expected/SLASHDOT/0102640424.header @@ -3,19 +3,20 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the leak-detecting dept. i i A 28-year-old MIT graduate named You Wu spent six years -i developing a low-cost robot designed to find leaks in pipes -i early, both to save water and to avoid bigger damage later +i [1]developing a low-cost robot designed to find leaks in pipes +i early , both to save water and to avoid bigger damage later i from bursting water mains. "Called Lighthouse, the robot looks i like a badminton birdie," reports Fast Company. "A soft i 'skirt' on the device is covered with sensors. As it travels i through pipes, propelled by the flowing water, suction tugs at i the device when there's a leak, and it records the location, -i making a map of critical leaks to fix." From the report: MIT -i doctoral student You Wu spent six years developing the design, -i building on research that earlier students began under a -i project sponsored by a university in Saudi Arabia, where most -i drinking water comes from expensive desalination plants and -i around a third of it is lost to leaks. It took three years +i making a map of critical leaks to fix." From the report: +i +i > MIT doctoral student You Wu spent six years developing the +i design, building on research that earlier students began under +i a project sponsored by a university in Saudi Arabia, where +i most drinking water comes from expensive desalination plants +i and around a third of it is lost to leaks. It took three years i before he had a working prototype. Then Wu got inspiration i from an unexpected source: At a party with his partner, he i accidentally stepped on her dress. She noticed immediately, @@ -23,8 +24,15 @@ i unsurprisingly, and Wu realized that he could use a similar i skirt-like design on a robot so that the robot could detect i subtle tugs from the suction at each leak. Wu graduated from i MIT in June, and is now launching the technology through a -i startup called WatchTower Robotics. The company will soon +i startup called [2]WatchTower Robotics . The company will soon i begin pilots in Australia and in Cambridge, Massachusetts. One i challenge now, he says, is creating a guide so water companies i can use the device on their own. +i +i +i +i [1] https://www.fastcompany.com/90232363/this-leak-seeking-rob- +i ot-just-won-the-u-s-james-dyson-award +i +i [2] http://watchtowerrobotics.com/ i diff --git a/test/expected/SLASHDOT/0102640424.header.html b/test/expected/SLASHDOT/0102640424.header.html index 823a33b..da5b5f7 100644 --- a/test/expected/SLASHDOT/0102640424.header.html +++ b/test/expected/SLASHDOT/0102640424.header.html @@ -14,7 +14,7 @@ from the leak-detecting dept.)

- A 28-year-old MIT graduate named You Wu spent six years developing a low-cost robot designed to find leaks in pipes early, both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report: MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called WatchTower Robotics. The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own. + A 28-year-old MIT graduate named You Wu spent six years [1]developing a low-cost robot designed to find leaks in pipes early , both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report:

> MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called [2]WatchTower Robotics . The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.



[1] https://www.fastcompany.com/90232363/this-leak-seeking-robot-just-won-the-u-s-james-dyson-award

[2] http://watchtowerrobotics.com/

diff --git a/test/expected/SLASHDOT/0102640424.html b/test/expected/SLASHDOT/0102640424.html index 9ac7385..584fe29 100644 --- a/test/expected/SLASHDOT/0102640424.html +++ b/test/expected/SLASHDOT/0102640424.html @@ -20,7 +20,7 @@ from the leak-detecting dept.)
- A 28-year-old MIT graduate named You Wu spent six years developing a low-cost robot designed to find leaks in pipes early, both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report: MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called WatchTower Robotics. The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own. + A 28-year-old MIT graduate named You Wu spent six years [1]developing a low-cost robot designed to find leaks in pipes early , both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report:

> MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called [2]WatchTower Robotics . The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.



[1] https://www.fastcompany.com/90232363/this-leak-seeking-robot-just-won-the-u-s-james-dyson-award

[2] http://watchtowerrobotics.com/

diff --git a/test/expected/SLASHDOT/0102640864 b/test/expected/SLASHDOT/0102640864 index 1d6886a..5863002 100644 --- a/test/expected/SLASHDOT/0102640864 +++ b/test/expected/SLASHDOT/0102640864 @@ -10,49 +10,66 @@ The National Academies Press has released a 156-page report, - called "Securing the Vote: Protecting American Democracy," - concluding that blockchains are not safe for the U.S. election - system. "While the notion of using a blockchain as an + called " [1]Securing the Vote: Protecting American Democracy + ," concluding that blockchains are not safe for the U.S. + election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional - security vulnerabilities," the report states. "In particular, - if malware on a voter's device alters a vote before it ever - reaches a blockchain, the immutability of the blockchain fails - to provide the desired integrity, and the voter may never know - of the alteration." The report goes on to say that - "Blockchains do not provide the anonymity often ascribed to - them." It continues: "In the particular context of elections, - voters need to be authorized as eligible to vote and as not - having cast more than one ballot in the particular election. - Blockchains do not offer means for providing the necessary - authorization. [...] If a blockchain is used, then cast - ballots must be encrypted or otherwise anonymized to prevent - coercion and vote-selling." The New York Times summarizes the - findings: The cautiously worded report calls for conducting - all federal, state and local elections on paper ballots by - 2020. Its other top recommendation would require nationwide - use of a specific form of routine postelection audit to ensure - votes have been accurately counted. The panel did not offer a - price tag for its recommended overhaul. New York University's + security vulnerabilities," the report [2]states . "In + particular, if malware on a voter's device alters a vote + before it ever reaches a blockchain, the immutability of the + blockchain fails to provide the desired integrity, and the + voter may never know of the alteration." + + The report goes on to say that "Blockchains do not provide the + anonymity often ascribed to them." It continues: "In the + particular context of elections, voters need to be authorized + as eligible to vote and as not having cast more than one + ballot in the particular election. Blockchains do not offer + means for providing the necessary authorization. [...] If a + blockchain is used, then cast ballots must be encrypted or + otherwise anonymized to prevent coercion and vote-selling." + The New York Times summarizes the findings: + + > The cautiously worded report [3]calls for conducting all + federal, state and local elections on paper ballots by 2020 . + Its other top recommendation would require nationwide use of a + specific form of routine postelection audit to ensure votes + have been accurately counted. The panel did not offer a price + tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in - cybersecurity. Among its specific recommendations was a - mainstay of election reformers: All elections should use - human-readable paper ballots by 2020. Such systems are - intended to assure voters that their vote was recorded - accurately. They also create a lasting record of "voter - intent" that can be used for reliable recounts, which may not - be possible in systems that record votes electronically. [...] - The panel also calls for all states to adopt a type of - post-election audit that employs statistical analysis of - ballots prior to results certification. Such "risk-limiting" - audits are designed to uncover miscounts and vote tampering. - Currently only three states mandate them. + cybersecurity. + + > + + > Among its specific recommendations was a mainstay of + election reformers: All elections should use human-readable + paper ballots by 2020. Such systems are intended to assure + voters that their vote was recorded accurately. They also + create a lasting record of "voter intent" that can be used for + reliable recounts, which may not be possible in systems that + record votes electronically. [...] The panel also calls for + all states to adopt a type of post-election audit that employs + statistical analysis of ballots prior to results + certification. Such "risk-limiting" audits are designed to + uncover miscounts and vote tampering. Currently only three + states mandate them. + + + + [1] https://www.nap.edu/catalog/25120/securing-the-vote-protec- + ting-american-democracy + + [2] https://www.nap.edu/read/25120/chapter/7#103 + + [3] https://www.nytimes.com/aponline/2018/09/06/technology/ap- + us-tec-election-security-reform-report.html ** diff --git a/test/expected/SLASHDOT/0102640864.header b/test/expected/SLASHDOT/0102640864.header index 5ff2376..33b8cb5 100644 --- a/test/expected/SLASHDOT/0102640864.header +++ b/test/expected/SLASHDOT/0102640864.header @@ -3,47 +3,64 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the ensuring-the-integrity-of-elections dept. i i The National Academies Press has released a 156-page report, -i called "Securing the Vote: Protecting American Democracy," -i concluding that blockchains are not safe for the U.S. election -i system. "While the notion of using a blockchain as an +i called " [1]Securing the Vote: Protecting American Democracy +i ," concluding that blockchains are not safe for the U.S. +i election system. "While the notion of using a blockchain as an i immutable ballot box may seem promising, blockchain technology i does little to solve the fundamental security issues of i elections, and indeed, blockchains introduce additional -i security vulnerabilities," the report states. "In particular, -i if malware on a voter's device alters a vote before it ever -i reaches a blockchain, the immutability of the blockchain fails -i to provide the desired integrity, and the voter may never know -i of the alteration." The report goes on to say that -i "Blockchains do not provide the anonymity often ascribed to -i them." It continues: "In the particular context of elections, -i voters need to be authorized as eligible to vote and as not -i having cast more than one ballot in the particular election. -i Blockchains do not offer means for providing the necessary -i authorization. [...] If a blockchain is used, then cast -i ballots must be encrypted or otherwise anonymized to prevent -i coercion and vote-selling." The New York Times summarizes the -i findings: The cautiously worded report calls for conducting -i all federal, state and local elections on paper ballots by -i 2020. Its other top recommendation would require nationwide -i use of a specific form of routine postelection audit to ensure -i votes have been accurately counted. The panel did not offer a -i price tag for its recommended overhaul. New York University's +i security vulnerabilities," the report [2]states . "In +i particular, if malware on a voter's device alters a vote +i before it ever reaches a blockchain, the immutability of the +i blockchain fails to provide the desired integrity, and the +i voter may never know of the alteration." +i +i The report goes on to say that "Blockchains do not provide the +i anonymity often ascribed to them." It continues: "In the +i particular context of elections, voters need to be authorized +i as eligible to vote and as not having cast more than one +i ballot in the particular election. Blockchains do not offer +i means for providing the necessary authorization. [...] If a +i blockchain is used, then cast ballots must be encrypted or +i otherwise anonymized to prevent coercion and vote-selling." +i The New York Times summarizes the findings: +i +i > The cautiously worded report [3]calls for conducting all +i federal, state and local elections on paper ballots by 2020 . +i Its other top recommendation would require nationwide use of a +i specific form of routine postelection audit to ensure votes +i have been accurately counted. The panel did not offer a price +i tag for its recommended overhaul. New York University's i Brennan Center has estimated that replacing aging voting i machines over the next few years could cost well over $1 i billion. The 156-page report [...] bemoans a rickety system i compromised by insecure voting equipment and software whose i vulnerabilities were exposed more than a decade ago and which i are too often managed by officials with little training in -i cybersecurity. Among its specific recommendations was a -i mainstay of election reformers: All elections should use -i human-readable paper ballots by 2020. Such systems are -i intended to assure voters that their vote was recorded -i accurately. They also create a lasting record of "voter -i intent" that can be used for reliable recounts, which may not -i be possible in systems that record votes electronically. [...] -i The panel also calls for all states to adopt a type of -i post-election audit that employs statistical analysis of -i ballots prior to results certification. Such "risk-limiting" -i audits are designed to uncover miscounts and vote tampering. -i Currently only three states mandate them. +i cybersecurity. +i +i > +i +i > Among its specific recommendations was a mainstay of +i election reformers: All elections should use human-readable +i paper ballots by 2020. Such systems are intended to assure +i voters that their vote was recorded accurately. They also +i create a lasting record of "voter intent" that can be used for +i reliable recounts, which may not be possible in systems that +i record votes electronically. [...] The panel also calls for +i all states to adopt a type of post-election audit that employs +i statistical analysis of ballots prior to results +i certification. Such "risk-limiting" audits are designed to +i uncover miscounts and vote tampering. Currently only three +i states mandate them. +i +i +i +i [1] https://www.nap.edu/catalog/25120/securing-the-vote-protec- +i ting-american-democracy +i +i [2] https://www.nap.edu/read/25120/chapter/7#103 +i +i [3] https://www.nytimes.com/aponline/2018/09/06/technology/ap- +i us-tec-election-security-reform-report.html i diff --git a/test/expected/SLASHDOT/0102640864.header.html b/test/expected/SLASHDOT/0102640864.header.html index 49f3948..b5a5d84 100644 --- a/test/expected/SLASHDOT/0102640864.header.html +++ b/test/expected/SLASHDOT/0102640864.header.html @@ -14,7 +14,7 @@ from the ensuring-the-integrity-of-elections dept.)

- The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration." The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity. Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them. + The National Academies Press has released a 156-page report, called " [1]Securing the Vote: Protecting American Democracy ," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report [2]states . "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration."

The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings:

> The cautiously worded report [3]calls for conducting all federal, state and local elections on paper ballots by 2020 . Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.

>

> Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.



[1] https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy

[2] https://www.nap.edu/read/25120/chapter/7#103

[3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-us-tec-election-security-reform-report.html

diff --git a/test/expected/SLASHDOT/0102640864.html b/test/expected/SLASHDOT/0102640864.html index 4c2a8d7..f2f874c 100644 --- a/test/expected/SLASHDOT/0102640864.html +++ b/test/expected/SLASHDOT/0102640864.html @@ -20,7 +20,7 @@ from the ensuring-the-integrity-of-elections dept.)
- The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration." The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity. Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them. + The National Academies Press has released a 156-page report, called " [1]Securing the Vote: Protecting American Democracy ," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report [2]states . "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration."

The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings:

> The cautiously worded report [3]calls for conducting all federal, state and local elections on paper ballots by 2020 . Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.

>

> Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.



[1] https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy

[2] https://www.nap.edu/read/25120/chapter/7#103

[3] https://www.nytimes.com/aponline/2018/09/06/technology/ap-us-tec-election-security-reform-report.html

diff --git a/test/expected/SLASHDOT/0102640946 b/test/expected/SLASHDOT/0102640946 index a0d866c..09523f6 100644 --- a/test/expected/SLASHDOT/0102640946 +++ b/test/expected/SLASHDOT/0102640946 @@ -9,38 +9,51 @@ o Source link: https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people - An anonymous reader quotes a report from Motherboard: - Wednesday, Valve, the company that operates the huge online - video game store Steam, shared more details about how it plans - to control and moderate the ever-increasing number of games - published on its platform. In the post published Wednesday, - Valve shared more details about how it determines what it - considers "outright trolling." "It is vague and we'll tell you - why," Valve wrote. "You're a denizen of the internet so you - know that trolls come in all forms. On Steam, some are simply - trying to rile people up with something we call 'a game shaped - object' (ie: a crudely made piece of software that technically - and just barely passes our bar as a functioning video game but - isn't what 99.9% of folks would say is "good.") Valve goes on - to explain that some trolls are trying to scam folks out of - their Steam inventory items (digital items that can be traded - for real money), while others are trying to generate a small - amount of money through a variety of schemes that have to do - with how developers use keys to unlock Steam games, while - others are trying to "incite and sow discord." "Trolls are - figuring out new ways to be loathsome as we write this," Valve - said. "But the thing these folks have in common is that they - aren't actually interested in good faith efforts to make and - sell games to you or anyone. When a developer's motives aren't - that, they're probably a troll." One interesting observation - Valve shares in the blog post is that it rarely bans - individual games from Steam, and more often bans developers - and/or publishers entirely. [...] Valve said that its review - process for determining that something may be a "troll game" - is a "deep assessment" that involves investigating who the - developer is, what they've done in the past, their behavior on - Steam as a developer, as a customer, their banking - information, developers they associate with, and more. + An anonymous reader quotes a report from Motherboard: + + > Wednesday, Valve, the company that operates the huge online + video game store Steam, shared more details about [1]how it + plans to control and moderate the ever-increasing number of + games published on its platform . In the post [2]published + Wednesday , Valve shared more details about how it determines + what it considers "outright trolling." "It is vague and we'll + tell you why," Valve wrote. "You're a denizen of the internet + so you know that trolls come in all forms. On Steam, some are + simply trying to rile people up with something we call 'a game + shaped object' (ie: a crudely made piece of software that + technically and just barely passes our bar as a functioning + video game but isn't what 99.9% of folks would say is "good.") + + > + + > Valve goes on to explain that some trolls are trying to scam + folks out of their Steam inventory items (digital items that + can be traded for real money), while others are trying to + generate a small amount of money through a variety of schemes + that have to do with how developers use keys to unlock Steam + games, while others are trying to "incite and sow discord." + "Trolls are figuring out new ways to be loathsome as we write + this," Valve said. "But the thing these folks have in common + is that they aren't actually interested in good faith efforts + to make and sell games to you or anyone. When a developer's + motives aren't that, they're probably a troll." One + interesting observation Valve shares in the blog post is that + it rarely bans individual games from Steam, and more often + bans developers and/or publishers entirely. [...] Valve said + that its review process for determining that something may be + a "troll game" is a "deep assessment" that involves + investigating who the developer is, what they've done in the + past, their behavior on Steam as a developer, as a customer, + their banking information, developers they associate with, and + more. + + + + [1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it- + really-does-seem-bad-games-are-made-by-bad-people + + [2] https://steamcommunity.com/games/593110/announcements/deta- + il/1708442022337025126 ** Just charge a $5K "listing fee" (Score:5, Interesting) diff --git a/test/expected/SLASHDOT/0102640946.header b/test/expected/SLASHDOT/0102640946.header index ef1f276..285efc1 100644 --- a/test/expected/SLASHDOT/0102640946.header +++ b/test/expected/SLASHDOT/0102640946.header @@ -2,36 +2,49 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the behind-the-scenes dept. i -i An anonymous reader quotes a report from Motherboard: -i Wednesday, Valve, the company that operates the huge online -i video game store Steam, shared more details about how it plans -i to control and moderate the ever-increasing number of games -i published on its platform. In the post published Wednesday, -i Valve shared more details about how it determines what it -i considers "outright trolling." "It is vague and we'll tell you -i why," Valve wrote. "You're a denizen of the internet so you -i know that trolls come in all forms. On Steam, some are simply -i trying to rile people up with something we call 'a game shaped -i object' (ie: a crudely made piece of software that technically -i and just barely passes our bar as a functioning video game but -i isn't what 99.9% of folks would say is "good.") Valve goes on -i to explain that some trolls are trying to scam folks out of -i their Steam inventory items (digital items that can be traded -i for real money), while others are trying to generate a small -i amount of money through a variety of schemes that have to do -i with how developers use keys to unlock Steam games, while -i others are trying to "incite and sow discord." "Trolls are -i figuring out new ways to be loathsome as we write this," Valve -i said. "But the thing these folks have in common is that they -i aren't actually interested in good faith efforts to make and -i sell games to you or anyone. When a developer's motives aren't -i that, they're probably a troll." One interesting observation -i Valve shares in the blog post is that it rarely bans -i individual games from Steam, and more often bans developers -i and/or publishers entirely. [...] Valve said that its review -i process for determining that something may be a "troll game" -i is a "deep assessment" that involves investigating who the -i developer is, what they've done in the past, their behavior on -i Steam as a developer, as a customer, their banking -i information, developers they associate with, and more. +i An anonymous reader quotes a report from Motherboard: +i +i > Wednesday, Valve, the company that operates the huge online +i video game store Steam, shared more details about [1]how it +i plans to control and moderate the ever-increasing number of +i games published on its platform . In the post [2]published +i Wednesday , Valve shared more details about how it determines +i what it considers "outright trolling." "It is vague and we'll +i tell you why," Valve wrote. "You're a denizen of the internet +i so you know that trolls come in all forms. On Steam, some are +i simply trying to rile people up with something we call 'a game +i shaped object' (ie: a crudely made piece of software that +i technically and just barely passes our bar as a functioning +i video game but isn't what 99.9% of folks would say is "good.") +i +i > +i +i > Valve goes on to explain that some trolls are trying to scam +i folks out of their Steam inventory items (digital items that +i can be traded for real money), while others are trying to +i generate a small amount of money through a variety of schemes +i that have to do with how developers use keys to unlock Steam +i games, while others are trying to "incite and sow discord." +i "Trolls are figuring out new ways to be loathsome as we write +i this," Valve said. "But the thing these folks have in common +i is that they aren't actually interested in good faith efforts +i to make and sell games to you or anyone. When a developer's +i motives aren't that, they're probably a troll." One +i interesting observation Valve shares in the blog post is that +i it rarely bans individual games from Steam, and more often +i bans developers and/or publishers entirely. [...] Valve said +i that its review process for determining that something may be +i a "troll game" is a "deep assessment" that involves +i investigating who the developer is, what they've done in the +i past, their behavior on Steam as a developer, as a customer, +i their banking information, developers they associate with, and +i more. +i +i +i +i [1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it- +i really-does-seem-bad-games-are-made-by-bad-people +i +i [2] https://steamcommunity.com/games/593110/announcements/deta- +i il/1708442022337025126 i diff --git a/test/expected/SLASHDOT/0102640946.header.html b/test/expected/SLASHDOT/0102640946.header.html index 2dec2fa..5d89e22 100644 --- a/test/expected/SLASHDOT/0102640946.header.html +++ b/test/expected/SLASHDOT/0102640946.header.html @@ -14,7 +14,7 @@ from the behind-the-scenes dept.)

- An anonymous reader quotes a report from Motherboard: Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about how it plans to control and moderate the ever-increasing number of games published on its platform. In the post published Wednesday, Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.") Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more. + An anonymous reader quotes a report from Motherboard:

> Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about [1]how it plans to control and moderate the ever-increasing number of games published on its platform . In the post [2]published Wednesday , Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.")

>

> Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.



[1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people

[2] https://steamcommunity.com/games/593110/announcements/detail/1708442022337025126

diff --git a/test/expected/SLASHDOT/0102640946.html b/test/expected/SLASHDOT/0102640946.html index 644d7d4..ae4ab82 100644 --- a/test/expected/SLASHDOT/0102640946.html +++ b/test/expected/SLASHDOT/0102640946.html @@ -20,7 +20,7 @@ from the behind-the-scenes dept.)
- An anonymous reader quotes a report from Motherboard: Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about how it plans to control and moderate the ever-increasing number of games published on its platform. In the post published Wednesday, Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.") Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more. + An anonymous reader quotes a report from Motherboard:

> Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about [1]how it plans to control and moderate the ever-increasing number of games published on its platform . In the post [2]published Wednesday , Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.")

>

> Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.



[1] https://motherboard.vice.com/en_us/article/9kmej7/valve-it-really-does-seem-bad-games-are-made-by-bad-people

[2] https://steamcommunity.com/games/593110/announcements/detail/1708442022337025126

diff --git a/test/expected/SLASHDOT/0102641010 b/test/expected/SLASHDOT/0102641010 index 32bc4e7..1f6d651 100644 --- a/test/expected/SLASHDOT/0102641010 +++ b/test/expected/SLASHDOT/0102641010 @@ -9,33 +9,38 @@ o Source link: https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought - An anonymous reader quotes a report from The Guardian: The gut - microbiome is the sum total of all the micro-organisms living - in a person's gut, and has been shown to play a huge role in - human health. New research has found probiotics -- usually - taken as supplements or in foods such as yoghurt, kimchi or - kefir -- can hinder a patient's gut microbiome from returning - to normal after a course of antibiotics, and that different - people respond to probiotics in dramatically different ways. - In the first of two papers published in the journal Cell, - researchers performed endoscopies and colonoscopies to sample - and study the gut microbiomes of people who took antibiotics - before and after probiotic consumption. Another group were - given samples of their own gut microbiomes collected before - consuming antibiotics. The researchers found the microbiomes - of those who had taken the probiotics had suffered a "very - severe disturbance." "Once the probiotics had colonized the - gut, they completely inhibited the return of the indigenous - microbiome which was disrupted during antibiotic treatment," - said Eran Elinav, an immunologist at the Weizmann Institute of - Science in Israel and lead author on the studies. The - scientists also compared the gut microbiomes of the gut + An anonymous reader quotes a report from The Guardian: + + > The gut microbiome is the sum total of all the + micro-organisms living in a person's gut, and has been shown + to play a huge role in human health. New research has found + probiotics -- usually taken as supplements or in foods such as + yoghurt, kimchi or kefir -- [1]can hinder a patient's gut + microbiome from returning to normal after a course of + antibiotics , and that different people respond to probiotics + in dramatically different ways. In the [2]first of two papers + published in the journal Cell, researchers performed + endoscopies and colonoscopies to sample and study the gut + microbiomes of people who took antibiotics before and after + probiotic consumption. Another group were given samples of + their own gut microbiomes collected before consuming + antibiotics. The researchers found the microbiomes of those + who had taken the probiotics had suffered a "very severe + disturbance." "Once the probiotics had colonized the gut, they + completely inhibited the return of the indigenous microbiome + which was disrupted during antibiotic treatment," said Eran + Elinav, an immunologist at the Weizmann Institute of Science + in Israel and lead author on the studies. + + > + + > The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome - health," said Elinav. In the second paper, the researchers + health," said Elinav. In the [3]second paper , the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a @@ -46,6 +51,15 @@ colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual." + + + + [1] https://www.theguardian.com/science/2018/sep/06/probiotics- + not-as-beneficial-for-gut-health-as-previously-thought + + [2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4 + + [3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5 ** diff --git a/test/expected/SLASHDOT/0102641010.header b/test/expected/SLASHDOT/0102641010.header index daab165..a08d031 100644 --- a/test/expected/SLASHDOT/0102641010.header +++ b/test/expected/SLASHDOT/0102641010.header @@ -2,33 +2,38 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the contrary-to-popular-belief dept. i -i An anonymous reader quotes a report from The Guardian: The gut -i microbiome is the sum total of all the micro-organisms living -i in a person's gut, and has been shown to play a huge role in -i human health. New research has found probiotics -- usually -i taken as supplements or in foods such as yoghurt, kimchi or -i kefir -- can hinder a patient's gut microbiome from returning -i to normal after a course of antibiotics, and that different -i people respond to probiotics in dramatically different ways. -i In the first of two papers published in the journal Cell, -i researchers performed endoscopies and colonoscopies to sample -i and study the gut microbiomes of people who took antibiotics -i before and after probiotic consumption. Another group were -i given samples of their own gut microbiomes collected before -i consuming antibiotics. The researchers found the microbiomes -i of those who had taken the probiotics had suffered a "very -i severe disturbance." "Once the probiotics had colonized the -i gut, they completely inhibited the return of the indigenous -i microbiome which was disrupted during antibiotic treatment," -i said Eran Elinav, an immunologist at the Weizmann Institute of -i Science in Israel and lead author on the studies. The -i scientists also compared the gut microbiomes of the gut +i An anonymous reader quotes a report from The Guardian: +i +i > The gut microbiome is the sum total of all the +i micro-organisms living in a person's gut, and has been shown +i to play a huge role in human health. New research has found +i probiotics -- usually taken as supplements or in foods such as +i yoghurt, kimchi or kefir -- [1]can hinder a patient's gut +i microbiome from returning to normal after a course of +i antibiotics , and that different people respond to probiotics +i in dramatically different ways. In the [2]first of two papers +i published in the journal Cell, researchers performed +i endoscopies and colonoscopies to sample and study the gut +i microbiomes of people who took antibiotics before and after +i probiotic consumption. Another group were given samples of +i their own gut microbiomes collected before consuming +i antibiotics. The researchers found the microbiomes of those +i who had taken the probiotics had suffered a "very severe +i disturbance." "Once the probiotics had colonized the gut, they +i completely inhibited the return of the indigenous microbiome +i which was disrupted during antibiotic treatment," said Eran +i Elinav, an immunologist at the Weizmann Institute of Science +i in Israel and lead author on the studies. +i +i > +i +i > The scientists also compared the gut microbiomes of the gut i intestinal tract of 25 volunteers with that of their stools. i They found that stool bacteria only partially correlated with i the microbiomes functioning inside their bodies. "So the fact i that we all almost exclusively rely on stool in our microbiome i research may not be a reliable way of studying gut microbiome -i health," said Elinav. In the second paper, the researchers +i health," said Elinav. In the [3]second paper , the researchers i examined the colonization and impact of probiotics on 15 i people by sampling within their gastrointestinal tract. They i divided the individuals into two groups: one were given a @@ -39,4 +44,13 @@ i individuals into two distinct groups: one which resisted the i colonisation of the probiotics, and one in which the i probiotics colonized the gut and modified the composition of i the gut microbiome and the genes of the host individual." +i +i +i +i [1] https://www.theguardian.com/science/2018/sep/06/probiotics- +i not-as-beneficial-for-gut-health-as-previously-thought +i +i [2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4 +i +i [3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5 i diff --git a/test/expected/SLASHDOT/0102641010.header.html b/test/expected/SLASHDOT/0102641010.header.html index a0a8b44..54d070d 100644 --- a/test/expected/SLASHDOT/0102641010.header.html +++ b/test/expected/SLASHDOT/0102641010.header.html @@ -14,7 +14,7 @@ from the contrary-to-popular-belief dept.)

- An anonymous reader quotes a report from The Guardian: The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- can hinder a patient's gut microbiome from returning to normal after a course of antibiotics, and that different people respond to probiotics in dramatically different ways. In the first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies. The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the second paper, the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual." + An anonymous reader quotes a report from The Guardian:

> The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- [1]can hinder a patient's gut microbiome from returning to normal after a course of antibiotics , and that different people respond to probiotics in dramatically different ways. In the [2]first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies.

>

> The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the [3]second paper , the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."



[1] https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought

[2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4

[3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5

diff --git a/test/expected/SLASHDOT/0102641010.html b/test/expected/SLASHDOT/0102641010.html index 2348a61..f3992d4 100644 --- a/test/expected/SLASHDOT/0102641010.html +++ b/test/expected/SLASHDOT/0102641010.html @@ -20,7 +20,7 @@ from the contrary-to-popular-belief dept.)
- An anonymous reader quotes a report from The Guardian: The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- can hinder a patient's gut microbiome from returning to normal after a course of antibiotics, and that different people respond to probiotics in dramatically different ways. In the first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies. The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the second paper, the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual." + An anonymous reader quotes a report from The Guardian:

> The gut microbiome is the sum total of all the micro-organisms living in a person's gut, and has been shown to play a huge role in human health. New research has found probiotics -- usually taken as supplements or in foods such as yoghurt, kimchi or kefir -- [1]can hinder a patient's gut microbiome from returning to normal after a course of antibiotics , and that different people respond to probiotics in dramatically different ways. In the [2]first of two papers published in the journal Cell, researchers performed endoscopies and colonoscopies to sample and study the gut microbiomes of people who took antibiotics before and after probiotic consumption. Another group were given samples of their own gut microbiomes collected before consuming antibiotics. The researchers found the microbiomes of those who had taken the probiotics had suffered a "very severe disturbance." "Once the probiotics had colonized the gut, they completely inhibited the return of the indigenous microbiome which was disrupted during antibiotic treatment," said Eran Elinav, an immunologist at the Weizmann Institute of Science in Israel and lead author on the studies.

>

> The scientists also compared the gut microbiomes of the gut intestinal tract of 25 volunteers with that of their stools. They found that stool bacteria only partially correlated with the microbiomes functioning inside their bodies. "So the fact that we all almost exclusively rely on stool in our microbiome research may not be a reliable way of studying gut microbiome health," said Elinav. In the [3]second paper , the researchers examined the colonization and impact of probiotics on 15 people by sampling within their gastrointestinal tract. They divided the individuals into two groups: one were given a preparation made of 11 strains of very commonly used probiotics and the other were given a placebo. Of those who were given probiotics, he said, "We could group the individuals into two distinct groups: one which resisted the colonisation of the probiotics, and one in which the probiotics colonized the gut and modified the composition of the gut microbiome and the genes of the host individual."



[1] https://www.theguardian.com/science/2018/sep/06/probiotics-not-as-beneficial-for-gut-health-as-previously-thought

[2] https://www.cell.com/cell/fulltext/S0092-8674(18)31102-4

[3] https://www.cell.com/cell/fulltext/S0092-8674(18)31108-5

diff --git a/test/expected/SLASHDOT/0102641672 b/test/expected/SLASHDOT/0102641672 index e1b800d..31ba4d0 100644 --- a/test/expected/SLASHDOT/0102641672 +++ b/test/expected/SLASHDOT/0102641672 @@ -10,15 +10,17 @@ Hikers, park rangers, and summer residents of Iceland's - northernmost peninsula are seeking to keep the area free from - internet service, worrying that all that comes with it "will - destroy a way of life that depends on the absence of [email, - news, and social media]," reports the Associated Press. "The - area has long resisted cell towers, but commercial initiatives - could take the decision out of Icelanders' hands and push - Hornstrandir across the digital divide." From the report: - Despite or because of its remoteness, Iceland ranks first on a - U.N. index comparing nations by information technology use, + northernmost peninsula are [1]seeking to keep the area free + from internet service , worrying that all that comes with it + "will destroy a way of life that depends on the absence of + [email, news, and social media]," reports the Associated + Press. "The area has long resisted cell towers, but commercial + initiatives could take the decision out of Icelanders' hands + and push Hornstrandir across the digital divide." From the + report: + + > Despite or because of its remoteness, Iceland ranks first on + a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many @@ -30,12 +32,19 @@ it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have - turned family farmsteads into summer getaways. Northwest - Iceland's representative, Halla Signy Kristjansdottir, is in - favor of adding cell towers for the safety of sailors and - travelers in the area. "I don't see anything romantic about - lying on the ground with a broken thigh bone and no cellphone - signal," Kristjansdottir said in an interview. + turned family farmsteads into summer getaways. + + Northwest Iceland's representative, Halla Signy + Kristjansdottir, is in favor of adding cell towers for the + safety of sailors and travelers in the area. "I don't see + anything romantic about lying on the ground with a broken + thigh bone and no cellphone signal," Kristjansdottir said in + an interview. + + + + [1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wi- + red-Icelanders-seek-to-keep-remote-peninsula-digital-free ** Yeah it's real annoying (Score:3, Insightful) diff --git a/test/expected/SLASHDOT/0102641672.header b/test/expected/SLASHDOT/0102641672.header index fd613c4..78df6e8 100644 --- a/test/expected/SLASHDOT/0102641672.header +++ b/test/expected/SLASHDOT/0102641672.header @@ -3,15 +3,17 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the no-cellphones-allowed dept. i i Hikers, park rangers, and summer residents of Iceland's -i northernmost peninsula are seeking to keep the area free from -i internet service, worrying that all that comes with it "will -i destroy a way of life that depends on the absence of [email, -i news, and social media]," reports the Associated Press. "The -i area has long resisted cell towers, but commercial initiatives -i could take the decision out of Icelanders' hands and push -i Hornstrandir across the digital divide." From the report: -i Despite or because of its remoteness, Iceland ranks first on a -i U.N. index comparing nations by information technology use, +i northernmost peninsula are [1]seeking to keep the area free +i from internet service , worrying that all that comes with it +i "will destroy a way of life that depends on the absence of +i [email, news, and social media]," reports the Associated +i Press. "The area has long resisted cell towers, but commercial +i initiatives could take the decision out of Icelanders' hands +i and push Hornstrandir across the digital divide." From the +i report: +i +i > Despite or because of its remoteness, Iceland ranks first on +i a U.N. index comparing nations by information technology use, i with roughly 98 percent of the population using the internet. i Among adults, 93 percent report having Facebook accounts and i two-thirds are Snapchat users, according to pollster MMR. Many @@ -23,10 +25,17 @@ i hasn't coalesced into a petition or formal campaign, so what i it would require or prohibit hasn't been fleshed out. The last i full-time resident of the rugged area moved away in 1952 -- it i never was an easy place to farm -- but many descendants have -i turned family farmsteads into summer getaways. Northwest -i Iceland's representative, Halla Signy Kristjansdottir, is in -i favor of adding cell towers for the safety of sailors and -i travelers in the area. "I don't see anything romantic about -i lying on the ground with a broken thigh bone and no cellphone -i signal," Kristjansdottir said in an interview. +i turned family farmsteads into summer getaways. +i +i Northwest Iceland's representative, Halla Signy +i Kristjansdottir, is in favor of adding cell towers for the +i safety of sailors and travelers in the area. "I don't see +i anything romantic about lying on the ground with a broken +i thigh bone and no cellphone signal," Kristjansdottir said in +i an interview. +i +i +i +i [1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wi- +i red-Icelanders-seek-to-keep-remote-peninsula-digital-free i diff --git a/test/expected/SLASHDOT/0102641672.header.html b/test/expected/SLASHDOT/0102641672.header.html index 63ff0f2..ec7dd63 100644 --- a/test/expected/SLASHDOT/0102641672.header.html +++ b/test/expected/SLASHDOT/0102641672.header.html @@ -14,7 +14,7 @@ from the no-cellphones-allowed dept.)

- Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are seeking to keep the area free from internet service, worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report: Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways. Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview. + Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are [1]seeking to keep the area free from internet service , worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report:

> Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways.

Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.



[1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wired-Icelanders-seek-to-keep-remote-peninsula-digital-free

diff --git a/test/expected/SLASHDOT/0102641672.html b/test/expected/SLASHDOT/0102641672.html index 9ba4bfc..a1c43cf 100644 --- a/test/expected/SLASHDOT/0102641672.html +++ b/test/expected/SLASHDOT/0102641672.html @@ -20,7 +20,7 @@ from the no-cellphones-allowed dept.)
- Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are seeking to keep the area free from internet service, worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report: Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways. Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview. + Hikers, park rangers, and summer residents of Iceland's northernmost peninsula are [1]seeking to keep the area free from internet service , worrying that all that comes with it "will destroy a way of life that depends on the absence of [email, news, and social media]," reports the Associated Press. "The area has long resisted cell towers, but commercial initiatives could take the decision out of Icelanders' hands and push Hornstrandir across the digital divide." From the report:

> Despite or because of its remoteness, Iceland ranks first on a U.N. index comparing nations by information technology use, with roughly 98 percent of the population using the internet. Among adults, 93 percent report having Facebook accounts and two-thirds are Snapchat users, according to pollster MMR. Many people who live in northwestern Iceland or visit as outdoor enthusiasts want Hornstrandir's 570 square kilometers (220 square miles), which accounts for 0.6 percent of Iceland's land mass, to be declared a "digital-free zone." The idea hasn't coalesced into a petition or formal campaign, so what it would require or prohibit hasn't been fleshed out. The last full-time resident of the rugged area moved away in 1952 -- it never was an easy place to farm -- but many descendants have turned family farmsteads into summer getaways.

Northwest Iceland's representative, Halla Signy Kristjansdottir, is in favor of adding cell towers for the safety of sailors and travelers in the area. "I don't see anything romantic about lying on the ground with a broken thigh bone and no cellphone signal," Kristjansdottir said in an interview.



[1] https://www.apnews.com/71cdfb7b1c2245069a6f681f8b8f906f/Wired-Icelanders-seek-to-keep-remote-peninsula-digital-free

diff --git a/test/expected/SLASHDOT/0102643378 b/test/expected/SLASHDOT/0102643378 index 8d44a93..a3a011c 100644 --- a/test/expected/SLASHDOT/0102643378 +++ b/test/expected/SLASHDOT/0102643378 @@ -9,24 +9,31 @@ o Source link: https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980 - Earlier today, British Airways said credit card information of - at least 380,000 customers have been "compromised" in a data - breach that occurred between August 21 and September 5. The - information stolen includes customer names, email addresses, - home addresses and payment card information -- but not travel - or passport details. Sky News reports: In an email to affected - customers, BA said: "We're deeply sorry, but you may have been - affected. We recommend that you contact your bank or credit - card provider and follow their recommended advice. We take the - protection of your personal information very seriously. Please - accept our deepest apologies for the worry and inconvenience - that this criminal activity has caused." The breach has been - "resolved" and the website is "working normally," it said. In - a statement, the airline added: "We have notified the police - and relevant authorities... [and] will continue to keep our - customers updated with the very latest information. We will be + Earlier today, British Airways said [1]credit card information + of at least 380,000 customers have been "compromised" in a + data breach that occurred between August 21 and September 5. + The information stolen includes customer names, email + addresses, home addresses and payment card information -- but + not travel or passport details. Sky News reports: + + > In an email to affected customers, BA said: "We're deeply + sorry, but you may have been affected. We recommend that you + contact your bank or credit card provider and follow their + recommended advice. We take the protection of your personal + information very seriously. Please accept our deepest + apologies for the worry and inconvenience that this criminal + activity has caused." The breach has been "resolved" and the + website is "working normally," it said. In a statement, the + airline added: "We have notified the police and relevant + authorities... [and] will continue to keep our customers + updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis." + + + + [1] https://news.sky.com/story/ba-calls-in-police-over-custome- + r-data-theft-from-website-11491980 ** when not if (Score:2) diff --git a/test/expected/SLASHDOT/0102643378.header b/test/expected/SLASHDOT/0102643378.header index fcfedc4..d5eed73 100644 --- a/test/expected/SLASHDOT/0102643378.header +++ b/test/expected/SLASHDOT/0102643378.header @@ -2,22 +2,29 @@ i Thursday September 06, 2018 @11:30PM (BeauHD) i from the sorry-not-sorry dept. i -i Earlier today, British Airways said credit card information of -i at least 380,000 customers have been "compromised" in a data -i breach that occurred between August 21 and September 5. The -i information stolen includes customer names, email addresses, -i home addresses and payment card information -- but not travel -i or passport details. Sky News reports: In an email to affected -i customers, BA said: "We're deeply sorry, but you may have been -i affected. We recommend that you contact your bank or credit -i card provider and follow their recommended advice. We take the -i protection of your personal information very seriously. Please -i accept our deepest apologies for the worry and inconvenience -i that this criminal activity has caused." The breach has been -i "resolved" and the website is "working normally," it said. In -i a statement, the airline added: "We have notified the police -i and relevant authorities... [and] will continue to keep our -i customers updated with the very latest information. We will be +i Earlier today, British Airways said [1]credit card information +i of at least 380,000 customers have been "compromised" in a +i data breach that occurred between August 21 and September 5. +i The information stolen includes customer names, email +i addresses, home addresses and payment card information -- but +i not travel or passport details. Sky News reports: +i +i > In an email to affected customers, BA said: "We're deeply +i sorry, but you may have been affected. We recommend that you +i contact your bank or credit card provider and follow their +i recommended advice. We take the protection of your personal +i information very seriously. Please accept our deepest +i apologies for the worry and inconvenience that this criminal +i activity has caused." The breach has been "resolved" and the +i website is "working normally," it said. In a statement, the +i airline added: "We have notified the police and relevant +i authorities... [and] will continue to keep our customers +i updated with the very latest information. We will be i contacting customers and will manage any claims on an i individual basis." +i +i +i +i [1] https://news.sky.com/story/ba-calls-in-police-over-custome- +i r-data-theft-from-website-11491980 i diff --git a/test/expected/SLASHDOT/0102643378.header.html b/test/expected/SLASHDOT/0102643378.header.html index 84f47a3..98940aa 100644 --- a/test/expected/SLASHDOT/0102643378.header.html +++ b/test/expected/SLASHDOT/0102643378.header.html @@ -14,7 +14,7 @@ from the sorry-not-sorry dept.)

- Earlier today, British Airways said credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports: In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis." + Earlier today, British Airways said [1]credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports:

> In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."



[1] https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980

diff --git a/test/expected/SLASHDOT/0102643378.html b/test/expected/SLASHDOT/0102643378.html index 464b2a3..986dd5c 100644 --- a/test/expected/SLASHDOT/0102643378.html +++ b/test/expected/SLASHDOT/0102643378.html @@ -20,7 +20,7 @@ from the sorry-not-sorry dept.)
- Earlier today, British Airways said credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports: In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis." + Earlier today, British Airways said [1]credit card information of at least 380,000 customers have been "compromised" in a data breach that occurred between August 21 and September 5. The information stolen includes customer names, email addresses, home addresses and payment card information -- but not travel or passport details. Sky News reports:

> In an email to affected customers, BA said: "We're deeply sorry, but you may have been affected. We recommend that you contact your bank or credit card provider and follow their recommended advice. We take the protection of your personal information very seriously. Please accept our deepest apologies for the worry and inconvenience that this criminal activity has caused." The breach has been "resolved" and the website is "working normally," it said. In a statement, the airline added: "We have notified the police and relevant authorities... [and] will continue to keep our customers updated with the very latest information. We will be contacting customers and will manage any claims on an individual basis."



[1] https://news.sky.com/story/ba-calls-in-police-over-customer-data-theft-from-website-11491980

diff --git a/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header b/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header index 0053e93..910dd1d 100644 --- a/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header +++ b/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header @@ -6,5 +6,5 @@ i pour récolter des informations sur les salaires et conditions i de travail des développeuses et développeurs PHP en France. i Vous êtes invité à répondre à l’enquête dès maintenant pour i l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre -i des salairesPHP permet aux développeuses et (...) +i des salairesPHP permet aux développeuses et (...) i diff --git a/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header.html b/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header.html index 7aea0e2..03b9c7e 100644 --- a/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-18T07_14_32Z.header.html @@ -13,7 +13,7 @@
(2018/09/18)

- Cela fait maintenant 5 années que l’AFUP diffuse une campagne pour récolter des informations sur les salaires et conditions de travail des développeuses et développeurs PHP en France. Vous êtes invité à répondre à l’enquête dès maintenant pour l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre des salairesPHP permet aux développeuses et (...) + Cela fait maintenant 5 années que l’AFUP diffuse une campagne pour récolter des informations sur les salaires et conditions de travail des développeuses et développeurs PHP en France. Vous êtes invité à répondre à l’enquête dès maintenant pour l’enquête 2018 : cela prend moins de 5 minutes. Le baromètre des salairesPHP permet aux développeuses et (...)

diff --git a/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header b/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header index 1903a76..b309a90 100644 --- a/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header +++ b/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header @@ -6,5 +6,5 @@ i malveillants en consultant des sites web soupçonnés de pirater i des contenus numériques, selon une étude européenne. Dans le i cadre d’un projet de recherche mené à l’échelle de l’Union par i l’Office de l’Union européenne pour la propriété -i intellectuelle (EUIPO), plus de . 000 fichiers contenant (...) +i intellectuelle (EUIPO), plus de . 000 fichiers contenant (...) i diff --git a/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header.html b/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header.html index 9e3eea9..c1fdb4b 100644 --- a/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-19T12_45_06Z.header.html @@ -13,7 +13,7 @@
(2018/09/19)

- Les internautes font face à de multiples menaces de logiciels malveillants en consultant des sites web soupçonnés de pirater des contenus numériques, selon une étude européenne. Dans le cadre d’un projet de recherche mené à l’échelle de l’Union par l’Office de l’Union européenne pour la propriété intellectuelle (EUIPO), plus de . 000 fichiers contenant (...) + Les internautes font face à de multiples menaces de logiciels malveillants en consultant des sites web soupçonnés de pirater des contenus numériques, selon une étude européenne. Dans le cadre d’un projet de recherche mené à l’échelle de l’Union par l’Office de l’Union européenne pour la propriété intellectuelle (EUIPO), plus de . 000 fichiers contenant (...)

diff --git a/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header b/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header index e8ba674..b5895d5 100644 --- a/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header +++ b/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header @@ -6,5 +6,5 @@ i CloudBees annonce que son service CloudBees Jenkins Support i est désormais disponible sous abonnement. Selon l’éditeur, il i s’agit du « premier service mondial dédié exclusivement au i support des utilisateurs Jenkins. » L’air de rien, les -i ingénieurs de CloudBees contribuent à environ 80% du (...) +i ingénieurs de CloudBees contribuent à environ 80% du (...) i diff --git a/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header.html b/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header.html index b130f86..cad5c0d 100644 --- a/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-19T12_51_05Z.header.html @@ -13,7 +13,7 @@
(2018/09/19)

- Dans le cadre de l’événement « DevOps World | Jenkins World », CloudBees annonce que son service CloudBees Jenkins Support est désormais disponible sous abonnement. Selon l’éditeur, il s’agit du « premier service mondial dédié exclusivement au support des utilisateurs Jenkins. » L’air de rien, les ingénieurs de CloudBees contribuent à environ 80% du (...) + Dans le cadre de l’événement « DevOps World | Jenkins World », CloudBees annonce que son service CloudBees Jenkins Support est désormais disponible sous abonnement. Selon l’éditeur, il s’agit du « premier service mondial dédié exclusivement au support des utilisateurs Jenkins. » L’air de rien, les ingénieurs de CloudBees contribuent à environ 80% du (...)

diff --git a/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header b/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header index 6a770d3..a7d8009 100644 --- a/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header +++ b/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header @@ -6,5 +6,5 @@ i annoncé cette semaine la disponibilité de CloudBees Suite, son i "premier système de déploiement logiciel de bout en bout." La i CloudBees Suite comprend plusieurs produits : CloudBees Core i (gouvernance unifiée des opérations et processus de -i déploiement continu), CloudBees DevOptics (rapports (...) +i déploiement continu), CloudBees DevOptics (rapports (...) i diff --git a/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header.html b/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header.html index 2936c19..5e0d1e3 100644 --- a/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-20T10_57_00Z.header.html @@ -13,7 +13,7 @@
(2018/09/20)

- Dans le cadre « DevOps World | Jenkins World », CloudBees a annoncé cette semaine la disponibilité de CloudBees Suite, son "premier système de déploiement logiciel de bout en bout." La CloudBees Suite comprend plusieurs produits : CloudBees Core (gouvernance unifiée des opérations et processus de déploiement continu), CloudBees DevOptics (rapports (...) + Dans le cadre « DevOps World | Jenkins World », CloudBees a annoncé cette semaine la disponibilité de CloudBees Suite, son "premier système de déploiement logiciel de bout en bout." La CloudBees Suite comprend plusieurs produits : CloudBees Core (gouvernance unifiée des opérations et processus de déploiement continu), CloudBees DevOptics (rapports (...)

diff --git a/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header b/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header index deba5f5..c9f0674 100644 --- a/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header +++ b/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header @@ -6,6 +6,6 @@ i une entreprise fondée il y a 13 ans en France. Sa présence se i renforce en région : après Paris, place à Metz et au i Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de i renforcer ses équipes techniques pour faire face au -i développement commercial de la société. Cette acquisition -i va (...) +i développement commercial de la société. Cette acquisition va +i (...) i diff --git a/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header.html b/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header.html index 753b114..9ca2227 100644 --- a/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-21T09_22_00Z.header.html @@ -13,7 +13,7 @@
(2018/09/21)

- OpCoding, expert PHP Javascript, entre dans le giron d’Adimeo, une entreprise fondée il y a 13 ans en France. Sa présence se renforce en région : après Paris, place à Metz et au Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de renforcer ses équipes techniques pour faire face au développement commercial de la société. Cette acquisition va (...) + OpCoding, expert PHP Javascript, entre dans le giron d’Adimeo, une entreprise fondée il y a 13 ans en France. Sa présence se renforce en région : après Paris, place à Metz et au Luxembourg. Le rachat d’Opcoding va permettre à Adimeo de renforcer ses équipes techniques pour faire face au développement commercial de la société. Cette acquisition va (...)

diff --git a/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header b/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header index 7731be9..19d9fe8 100644 --- a/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header +++ b/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header @@ -6,5 +6,5 @@ i troisième édition, le mardi 16 octobre prochain. Le programme i des conférences est publié et on y attend plus de 800 i personnes. Le programme est exclusivement constitué i d’interventions choisies par un comité de programme, pour la -i qualité de leur retour d’expérience. Les organisateurs (...) +i qualité de leur retour d’expérience. Les organisateurs (...) i diff --git a/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header.html b/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header.html index be75abd..4d751bb 100644 --- a/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-22T18_19_00Z.header.html @@ -13,7 +13,7 @@
(2018/09/22)

- La conférence "devopsé revient au Grand REX à Paris, pour une troisième édition, le mardi 16 octobre prochain. Le programme des conférences est publié et on y attend plus de 800 personnes. Le programme est exclusivement constitué d’interventions choisies par un comité de programme, pour la qualité de leur retour d’expérience. Les organisateurs (...) + La conférence "devopsé revient au Grand REX à Paris, pour une troisième édition, le mardi 16 octobre prochain. Le programme des conférences est publié et on y attend plus de 800 personnes. Le programme est exclusivement constitué d’interventions choisies par un comité de programme, pour la qualité de leur retour d’expérience. Les organisateurs (...)

diff --git a/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header b/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header index a6825dd..4a3bd5b 100644 --- a/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header +++ b/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header @@ -6,5 +6,5 @@ i bougie. Une vidéo a été publiée pour fêter cet événement. Ce i 18e anniversaire a été l’occasion pour le groupe - devenu i international ! - de publier une refonte de son site web i autour de ses valeurs consolidées. Note aux lecteurs : -i Linagora finance toolinux.com depuis mai (...) +i Linagora finance toolinux.com depuis mai (...) i diff --git a/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header.html b/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header.html index 5d6a74e..3bc3bb1 100644 --- a/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-23T09_29_00Z.header.html @@ -13,7 +13,7 @@
(2018/09/23)

- Cet été, tout comme Toolinux.com, LINAGORA a soufflé sa 18ème bougie. Une vidéo a été publiée pour fêter cet événement. Ce 18e anniversaire a été l’occasion pour le groupe - devenu international ! - de publier une refonte de son site web autour de ses valeurs consolidées. Note aux lecteurs : Linagora finance toolinux.com depuis mai (...) + Cet été, tout comme Toolinux.com, LINAGORA a soufflé sa 18ème bougie. Une vidéo a été publiée pour fêter cet événement. Ce 18e anniversaire a été l’occasion pour le groupe - devenu international ! - de publier une refonte de son site web autour de ses valeurs consolidées. Note aux lecteurs : Linagora finance toolinux.com depuis mai (...)

diff --git a/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header b/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header index 6ef2091..d91965b 100644 --- a/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header +++ b/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header @@ -7,5 +7,5 @@ i logiciels libres. C’était une idée depuis dix ans, c’est i désormais un projet bien réel. Initialement développé pour i répondre aux besoins des administrations, les précédentes i versions de CLIP OS n’étaient pas disponibles publiquement. -i Elles le (...) +i Elles le (...) i diff --git a/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header.html b/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header.html index 1a56bd6..b7c7923 100644 --- a/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-24T04_59_08Z.header.html @@ -13,7 +13,7 @@
(2018/09/24)

- Maintenu par l’ANSSI, CLIP OS est un projet de système d’exploitation open source basé sur un noyau Linux et des logiciels libres. C’était une idée depuis dix ans, c’est désormais un projet bien réel. Initialement développé pour répondre aux besoins des administrations, les précédentes versions de CLIP OS n’étaient pas disponibles publiquement. Elles le (...) + Maintenu par l’ANSSI, CLIP OS est un projet de système d’exploitation open source basé sur un noyau Linux et des logiciels libres. C’était une idée depuis dix ans, c’est désormais un projet bien réel. Initialement développé pour répondre aux besoins des administrations, les précédentes versions de CLIP OS n’étaient pas disponibles publiquement. Elles le (...)

diff --git a/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header b/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header index 629b790..5f4d786 100644 --- a/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header +++ b/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header @@ -6,5 +6,5 @@ i capitale française. L’événement n’a jamais été aussi séduisant i sur affiche. Une trentaine de conférenciers, venus de tous les i horizons, vont y partager leur savoir et vous faire profiter i de leur expérience. C’est bon : après des semaines de travail, -i les organisateurs du Forum PHP ont accouché (...) +i les organisateurs du Forum PHP ont accouché (...) i diff --git a/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header.html b/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header.html index 23adf8b..a0b6e52 100644 --- a/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-25T02_31_00Z.header.html @@ -13,7 +13,7 @@
(2018/09/25)

- Il se tiendra les jeudi 25 et vendredi 26 octobre dans la capitale française. L’événement n’a jamais été aussi séduisant sur affiche. Une trentaine de conférenciers, venus de tous les horizons, vont y partager leur savoir et vous faire profiter de leur expérience. C’est bon : après des semaines de travail, les organisateurs du Forum PHP ont accouché (...) + Il se tiendra les jeudi 25 et vendredi 26 octobre dans la capitale française. L’événement n’a jamais été aussi séduisant sur affiche. Une trentaine de conférenciers, venus de tous les horizons, vont y partager leur savoir et vous faire profiter de leur expérience. C’est bon : après des semaines de travail, les organisateurs du Forum PHP ont accouché (...)

diff --git a/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header b/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header index 50a525a..2074c89 100644 --- a/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header +++ b/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header @@ -6,6 +6,6 @@ i Chrome OS 69, tout le monde peut profiter des applications i Linux sur Chromebook, mais pas encore sur tous les modèles. i C’était un navigateur amélioré. C’est désormais un système i d’exploitation capable de faire tourner des applications -i progressives du web, les applications Android et -i désormais (...) +i progressives du web, les applications Android et désormais +i (...) i diff --git a/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header.html b/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header.html index e66920a..5086e8f 100644 --- a/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header.html +++ b/test/expected/TOO_LINUX/2018-09-25T19_07_16Z.header.html @@ -13,7 +13,7 @@
(2018/09/25)

- C’était un privilège réservé aux développeurs. Désormais, avec Chrome OS 69, tout le monde peut profiter des applications Linux sur Chromebook, mais pas encore sur tous les modèles. C’était un navigateur amélioré. C’est désormais un système d’exploitation capable de faire tourner des applications progressives du web, les applications Android et désormais (...) + C’était un privilège réservé aux développeurs. Désormais, avec Chrome OS 69, tout le monde peut profiter des applications Linux sur Chromebook, mais pas encore sur tous les modèles. C’était un navigateur amélioré. C’est désormais un système d’exploitation capable de faire tourner des applications progressives du web, les applications Android et désormais (...)