Language Selection

English French German Italian Portuguese Spanish

Leftovers: OSS

Filed under
OSS
  • IBM unveils Blockchain as a Service based on open source Hyperledger Fabric technology

    IBM unveiled its “Blockchain as a Service” today, which is based on the open source Hyperledger Fabric, version 1.0 from The Linux Foundation.

    IBM Blockchain is a public cloud service that customers can use to build secure blockchain networks. The company introduced the idea last year, but this is the first ready-for-primetime implementation built using that technology.

  • Software And Choice

    Some projects, whether intentionally (e.g., LLVM) or by accident (e.g., Linux) will grow beyond this scope (in those cases, vastly so). The question then becomes murkier. The two projects I've chosen for example here are both, I would say, "fork-proof" - LLVM has a very lenient code acceptance policy (see: all of the ghc-specific portions of the backend), while Linux has an extremely powerful module interface against which things can be built that do not merit inclusion into mainline. A user could fork LLVM, or Linux, but their version is extremely unlikely to become authoritative. Even if one does become authoritative, or close to it, that decision may also revert if the new fork does not live up to the quality standards of the old (I'm thinking about ffmpeg/libav here).

  • Hello FOSSASIA: Revisiting the event *and* the first program we write in C

    I was at FOSSAsia this weekend to deliver a workshop on the very basics of programming. It ended a pretty rough couple of weeks for me, with travel to Budapest (for Linaro Connect) followed immediately by the travel to Singapore. It seems like I don’t travel east in the timezone very well and the effects were visible with me napping at odd hours and generally looking groggy through the weekend at Singapore. It was however all worth it because despite a number of glitches, I had some real positives to take back from the conference.

  • Community leadership charts course for OpenStack

    Last week, about 40 people from the OpenStack Technical Committee, User Committee, Board of Directors and Foundation Staff convened in Boston to talk about the future of OpenStack. We candidly discussed the challenges we face as a community, but also why our mission to deliver open infrastructure is more important than ever.

    To kick things off, Mark Collier opened with a state of the union address, talking about the strength of our community, the number of users running OpenStack at scale across various industries and the progress we’ve made working across adjacent open source projects. OpenStack is one of the largest, global open source communities. In 2016 alone, we had 3,479 unique developers from dozens of countries and hundreds of organizations contribute to OpenStack, and the number of merged changes increased 26 percent year-over-year. The size and diversity of the OpenStack community is a huge strength, but like any large organization, scale presents its own set of challenges.

  • OpenStack® Board Elects Huawei as Platinum Member and H3C as Gold Member of the Foundation
  • Community leadership planning, new board members, and more OpenStack news
  • Open project collaboration from elementary to university classrooms

    In this article, we share our experiences: two examples of fostering creative collaboration among students from elementary school to higher education. Aria F. Chernik, an open educator and director of OSPRI (Open Source Pedagogy, Research + Innovation) at Duke University, introduces an open-by-design, learning innovation project at Duke. Anna Engelke, a tinkering and technology educator, speaks about using open pedagogy to design a Scratch-based maker club at a local elementary school.

  • Rcpp 0.12.10: Some small fixes

    The tenth update in the 0.12.* series of Rcpp just made it to the main CRAN repository providing GNU R with by now over 10,000 packages. Windows binaries for Rcpp, as well as updated Debian packages will follow in due course. This 0.12.10 release follows the 0.12.0 release from late July, the 0.12.1 release in September, the 0.12.2 release in November, the 0.12.3 release in January, the 0.12.4 release in March, the 0.12.5 release in May, the 0.12.6 release in July, the 0.12.7 release in September, the 0.12.8 release in November, and the 0.12.9 release in January --- making it the fourteenth release at the steady and predictable bi-montly release frequency.

More in Tux Machines

Security Leftovers

  • Security updates for Tuesday
  • Initial Retpoline Support Added To LLVM For Spectre v2 Mitigation
    The LLVM code has been merged to mainline for the Retpoline x86 mitigation technique for Spectre Variant 2. This will be back-ported to LLVM 6.0 and also LLVM 5.0 with an immediate point release expected to get this patched compiler out in the wild. The compiler-side work -- similar to GCC's Retpoline code -- is to avoid generating code where an indirect branch could have its prediction poisoned by a rogue actor. The Retpoline support uses indirect calls in a non-speculatable way.
  • Teen Hacker Who Social Engineered His Way Into Top-Level US Government Officials' Accounts Pleads Guilty To Ten Charges
    The teenage hacker who tore CIA director John Brennan a new AOL-hole is awaiting sentencing in the UK. Kane Gamble, the apparent founder of hacker collective Crackas With Attitude, was able to access classified documents Brennan has forwarded to his personal email account by posing as a Verizon tech. Social engineering is still the best hacking tool. It's something anyone anywhere can do. If you do it well, a whole host of supposedly-secured information can be had, thanks to multiple entities relying on the same personal identifiers to "verify" the social engineer they're talking to is the person who owns accounts they're granting access to. Despite claiming he was motivated by American injustices perpetrated around the world (Palestine is namechecked in the teen's multiple mini-manifestos), a lot of what Gamble participated in was plain, old fashioned harassment.
  • The Guardian view on cyberwar: an urgent problem [Ed: Lists several attacks by Microsoft Windows (but names neither)]
    The first known, and perhaps the most successful of these, was the joint US/Israeli Stuxnet attack on the Iranian nuclear programme in 2009. Since then there has been increasing evidence of attacks of this sort by Russia – against Estonia in 2009, and then against Ukraine, where tens of thousands of attacks on everything from power supplies to voting machines have opened an under-reported front in an under-reported war. Across the Baltic, the Swedish government has just announced a beefed-up programme of civil defence, of which the most substantial part will be an attempt to protect its software and networks from attacks. Meanwhile, North Korean state hackers are blamed by western intelligence services for the WannaCry ransomware attacks which last year shut down several NHS hospitals in the UK. Persistent reports suggest the US has interfered in this way with North Korea’s nuclear missile programme.
  • Reproducible Builds: Weekly report #143
  • Don’t Install Meltdown And Spectre Patches, Intel Warns It Would Increase System Reebots
  • On that Spectre mitigations discussion
    By now, almost everybody has probably seen the press coverage of Linus Torvalds's remarks about one of the patches addressing Spectre variant 2. Less noted, but much more informative, is David Woodhouse's response on why those patches are the way they are.

Tails 3.5 Anonymous OS Released to Mitigate Spectre Vulnerability for AMD CPUs

Tails, the open-source Linux-based operating system designed to protect user's privacy while surfing the Internet, also known as Anonymous OS, was updated today to version 3.5. Coming only two weeks after the Tails 3.4 release, which included patches for the Meltdown and Spectre security vulnerabilities publicly disclosed earlier this month, today's Tails 3.5 update is here to bump the Linux kernel to version 4.14.13 and include the microcode firmware for AMD CPUs to mitigate the Spectre flaw. Read more

Graphics: Freedreno, Gallium3D, AMDGPU, RadeonSI, Mesa

  • Code Aurora Working On Adreno 6xx Support For Freedreno
    The Qualcomm-aligned Code Aurora is working on supporting the latest-generation Adreno A6xx graphics hardware with the open-source Freedreno+MSM driver stack.
  • Work Revised On Adding SPIR-V Support To Clover Gallium3D
    Last May we reported on a Nouveau developer adding SPIR-V support to Gallium3D's OpenCL state tracker. Finally the better part of one year later, Pierre Moreau is ready with the second version of these patches to accept this IR associated with Vulkan / OpenCL 2.1+ within Clover.
  • Trying Out DRM-Next For Linux 4.16 With AMDGPU On Polaris & Vega
    I have spent some time this weekend trying out the DRM-Next code slated for inclusion in Linux 4.16 when its merge window opens next week. The DRM-Next state of the AMDGPU driver appears to be in good shape, at least for the RX 580 and RX Vega cards used for my initial testing.
  • RadeonSI NIR Back-End Picks Up Support For More OpenGL Extensions
    It was just a few days ago that Valve Linux developer Timothy Arceri enabled GLSL 4.50 support for RadeonSI's NIR back-end after previously taking care of tessellation shaders and other requirements. Now he has taken to implementing some other extensions in RadeonSI's NIR code-path.
  • mesa 18.0-0-rc1
    The first release candidate for Mesa 18.0.0 is now available. The plan is to have one release candidate every Friday, until the anticipated final release on 9th February 2018. The expectation is that the 17.3 branch will remain alive with bi-weekly releases until the 18.0.1 release. NOTE: Building the SWR with LLVM 3.9 is currently not possible. Please use newer LLVM version until the issue is resolved. Here are the people which helped shape the current release.
  • Mesa 18.0 Now Under Feature Freeze With 18.0-RC1 Premiere
    Feature development on Mesa 18.0 has now ended with the release today of 18.0-RC1 following the code-base being branched. Emil Velikov of Collabora just announced the availability of Mesa 18.0-RC1. As usual, he's planning on weekly release candidates until the 18.0.0 stable release is ready to ship. Velikov tentatively expects to ship Mesa 18.0.0 around 9 February, but as we know from past releases, it might end up slipping by some days.

Using Dual 4K Monitors Stacked With GNOME

The setup for my main production system that is still on Fedora Workstation 26 with GNOME Shell 3.24.3 has been working out fine. The two displays are the ASUS MG28UQ monitors that work out well on their own and do work with AMDGPU FreeSync on Linux. A GeForce GTX 1050 Ti is enough to power the dual 3840 x 2160 displays for desktop tasks mostly limited to many terminals, Firefox, Chrome, Thunderbird, and other GNOME desktop applications. Certainly that lower-end Pascal GPU isn't fast enough for 4K gaming, but it's not like I have the time for any gaming and for a purely desktop system it's working out fine paired with the 387.34 proprietary driver on Fedora 26 paired with Linux 4.14. Read more