Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 23 Feb 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Sandwich-style 96Boards SBC runs Linux on ST’s new Cortex-A7/M4 SoC Rianne Schestowitz 22/02/2019 - 6:55pm
Story Today in Techrights Roy Schestowitz 22/02/2019 - 12:24pm
Story Q4OS Linux Revives Your Old Laptop and Give it Windows Looks itsfoss 22/02/2019 - 10:02am
Story Android Leftovers Rianne Schestowitz 22/02/2019 - 9:48am
Story today's leftovers Roy Schestowitz 22/02/2019 - 9:33am
Story OSS: Launchpad, RAMSES, Kodi, WorldWideWeb, D-Bus Broker Roy Schestowitz 2 22/02/2019 - 9:26am
Story KDE: Slackware's Plasma5, KDE Community 'Riot' (Matrix), Kdenlive Call for Testers/Testing Roy Schestowitz 22/02/2019 - 5:21am
Story Hack Week - Browsersync integration for Online Roy Schestowitz 1 22/02/2019 - 5:03am
Story Preliminary Support Allows Linux KVM To Boot Xen HVM Guests Roy Schestowitz 22/02/2019 - 4:59am
Story Servers: Kubernetes, SUSE Enterprise Storage and Microsoft/SAP Roy Schestowitz 22/02/2019 - 4:35am

These Weeks in Firefox, Mozilla on Privacy, FSFE Blogs on Tor, Purism’s CEO Todd Weaver Testifies at California Congressional Privacy Commission

Filed under
Web
  • These Weeks in Firefox: Issue 53
  • Mozilla Future Releases Blog: Enhanced Tracking Protection Testing: Protecting users’ privacy by default

    Over the past couple of months since we announced that we would broaden our approach to anti-tracking we’ve been experimenting and testing Enhanced Tracking Protection, a feature that blocks cookies and storage access from third-party trackers. Recently, we published a set of policies that define which tracking practices will be blocked in Firefox, and a new set of redesigned controls for the Content Blocking section where users can choose their desired level of privacy protection. As the next step in our path to enable Enhanced Tracking Protection by default, this week we launched a study to observe how enabling this functionality for a group of Firefox users in our Release Channel would impact the online experience.

  • I am up to no good.

    am a user of “the darknet”. I use Tor to secure my communications from curious eyes. At the latest since Edward Snowden’s leaks we know, that this might be a good idea. There are many other valid, legal use-cases for using Tor. Circumventing censorship is one of them.

    But German state secretary Günter Krings (49, CDU) believes something else. Certainly he “understand[s], that the darknet may have a use in autocratic systems, but in my opinion there is no legitimate use for it in a free, open democracy. Whoever uses the darknet is usually up to no good.”

    [...]

    Instead of trying to ban our democratic people from using tor, we should celebrate the fact that we are a democracy that can afford having citizens who can avoid surveillance and that have access to uncensored information.

  • Purism’s CEO Todd Weaver Testifies at California Congressional Privacy Commission

    My name is Todd Weaver, and I think you’ll find I’m an unusual witness here today, while I may be sitting side-by-side with impressive privacy protection groups, I am here as the CEO of a rapidly growing technology company based in California.

    I am here calling for much stronger consumer privacy protections – starting with giving consumers the power to opt IN rather than opt OUT of sharing their personal data.

    I am here to tell you it’s time for California’s extraordinary tech industry to stop harvesting and “sharing” our most personal private data without our meaningful consent and knowledge.

    I am not here to tell you AB 375 (or stronger) protections are tough to implement, history is filled with wrongdoers complaining that doing right will put them out of business only to comply and thrive later. Incidentally, this same tech industry complained about Europe’s GDPR that certainly did not put them out of business.

    I am here to tell you the new law (or stronger) is easy to technically comply with – if we companies simply begin to honor our customer’s privacy rights and design our services to be privacy-protecting rather than privacy-exploiting.

Games: Surviving Mars and OpenMW

Filed under
Gaming

Kernel and Security: BPF, Mesa, Embedded World, Kernel Address Sanitizer and More

Filed under
Security
  • Concurrency management in BPF

    In the beginning, programs run on the in-kernel BPF virtual machine had no persistent internal state and no data that was shared with any other part of the system. The arrival of eBPF and, in particular, its maps functionality, has changed that situation, though, since a map can be shared between two or more BPF programs as well as with processes running in user space. That sharing naturally leads to concurrency problems, so the BPF developers have found themselves needing to add primitives to manage concurrency (the "exchange and add" or XADD instruction, for example). The next step is the addition of a spinlock mechanism to protect data structures, which has also led to some wider discussions on what the BPF memory model should look like.

    A BPF map can be thought of as a sort of array or hash-table data structure. The actual data stored in a map can be of an arbitrary type, including structures. If a complex structure is read from a map while it is being modified, the result may be internally inconsistent, with surprising (and probably unwelcome) results. In an attempt to prevent such problems, Alexei Starovoitov introduced BPF spinlocks in mid-January; after a number of quick review cycles, version 7 of the patch set was applied on February 1. If all goes well, this feature will be included in the 5.1 kernel.

  • Intel Ready To Add Their Experimental "Iris" Gallium3D Driver To Mesa

    For just over the past year Intel open-source driver developers have been developing a new Gallium3D-based OpenGL driver for Linux systems as the eventual replacement to their long-standing "i965 classic" Mesa driver. The Intel developers are now confident enough in the state of this new driver dubbed Iris that they are looking to merge the driver into mainline Mesa proper. 

    The Iris Gallium3D driver has now matured enough that Kenneth Graunke, the Intel OTC developer who originally started Iris in late 2017, is looking to merge the driver into the mainline code-base of Mesa. The driver isn't yet complete but it's already in good enough shape that he's looking for it to be merged albeit marked experimental.

  • Hallo Nürnberg!

    Collabora is headed to Nuremberg, Germany next week to take part in the 2019 edition of Embedded World, "the leading international fair for embedded systems". Following a successful first attendance in 2018, we are very much looking forward to our second visit! If you are planning on attending, please come say hello in Hall 4, booth 4-280!

    This year, we will be showcasing a state-of-the-art infrastructure for end-to-end, embedded software production. From the birth of a software platform, to reproducible continuous builds, to automated testing on hardware, get a firsthand look at our platform building expertise and see how we use continuous integration to increase productivity and quality control in embedded Linux.

  • KASAN Spots Another Kernel Vulnerability From Early Linux 2.6 Through 4.20

    The Kernel Address Sanitizer (KASAN) that detects dynamic memory errors within the Linux kernel code has just picked up another win with uncovering a use-after-free vulnerability that's been around since the early Linux 2.6 kernels.

    KASAN (along with the other sanitizers) have already proven quite valuable in spotting various coding mistakes hopefully before they are exploited in the real-world. The Kernel Address Sanitizer picked up another feather in its hat with being responsible for the CVE-2019-8912 discovery.

  • io_uring, SCM_RIGHTS, and reference-count cycles

    The io_uring mechanism that was described here in January has been through a number of revisions since then; those changes have generally been fixing implementation issues rather than changing the user-space API. In particular, this patch set seems to have received more than the usual amount of security-related review, which can only be a good thing. Security concerns became a bit of an obstacle for io_uring, though, when virtual filesystem (VFS) maintainer Al Viro threatened to veto the merging of the whole thing. It turns out that there were some reference-counting issues that required his unique experience to straighten out.
    The VFS layer is a complicated beast; it must manage the complexities of the filesystem namespace in a way that provides the highest possible performance while maintaining security and correctness. Achieving that requires making use of almost all of the locking and concurrency-management mechanisms that the kernel offers, plus a couple more implemented internally. It is fair to say that the number of kernel developers who thoroughly understand how it works is extremely small; indeed, sometimes it seems like Viro is the only one with the full picture.

    In keeping with time-honored kernel tradition, little of this complexity is documented, so when Viro gets a moment to write down how some of it works, it's worth paying attention. In a long "brain dump", Viro described how file reference counts are managed, how reference-count cycles can come about, and what the kernel does to break them. For those with the time to beat their brains against it for a while, Viro's explanation (along with a few corrections) is well worth reading. For the rest of us, a lighter version follows.

Blacklisting insecure filesystems in openSUSE

Filed under
Linux

The Linux kernel supports a wide variety of filesystem types, many of which have not seen significant use — or maintenance — in many years. Developers in the openSUSE project have concluded that many of these filesystem types are, at this point, more useful to attackers than to openSUSE users and are proposing to blacklist many of them by default. Such changes can be controversial, but it's probably still fair to say that few people expected the massive discussion that resulted, covering everything from the number of OS/2 users to how openSUSE fits into the distribution marketplace.
On January 30, Martin Wilck started the discussion with a proposal to add a blacklist preventing the automatic loading of a set of kernel modules implementing (mostly) old filesystems. These include filesystems like JFS, Minix, cramfs, AFFS, and F2FS. For most of these, the logic is that the filesystems are essentially unused and the modules implementing them have seen little maintenance in recent decades. But those modules can still be automatically loaded if a user inserts a removable drive containing one of those filesystem types. There are a number of fuzz-testing efforts underway in the kernel community, but it seems relatively unlikely that any of them are targeting, say, FreeVxFS filesystem images. So it is not unreasonable to suspect that there just might be exploitable bugs in those modules. Preventing modules for ancient, unmaintained filesystems from automatically loading may thus protect some users against flash-drive attacks.

If there were to be a fight over a proposal like this, one would ordinarily expect it to be concerned with the specific list of unwelcome modules. But there was relatively little of that. One possible exception is F2FS, the presence of which raised some eyebrows since it is under active development, having received 44 changes in the 5.0 development cycle, for example. Interestingly, it turns out that openSUSE stopped shipping F2FS in September. While the filesystem is being actively developed, it seems that, with rare exceptions, nobody is actively backporting fixes, and the filesystem also lacks a mechanism to prevent an old F2FS implementation from being confused by a filesystem created by a newer version. Rather than deal with these issues, openSUSE decided to just drop the filesystem altogether. As it happens, the blacklist proposal looks likely to allow F2FS to return to the distribution since it can be blacklisted by default.

Read more

gitgeist: a git-based social network proof of concept

Filed under
Development
Web

Are you tired of not owning the data or the platform you use for social postings? I know I am.

It's hard to say when I "first" used a social network. I've been on email for about 30 years and one of the early ad-hoc forms of social networks were chain emails. Over the years I was asked to join all sorts of "social" things such as IRC, ICQ, Skype, MSN Messenger, etc. and eventually things like Orkut, MySpace, Facebook, etc. I'll readily admit that I'm not the type of person that happily jumps onto every new social bandwagon that appears on the Internet. I often prefer preserving the quietness of my own thoughts. That, though, hasn't stopped me from finding some meaningfulness participating in Twitter, Facebook, LinkedIn and more recently Google+. Twitter was in fact the first social network that I truly embraced. And it would've remained my primary social network had they not killed their own community by culling the swell of independently-developed Twitter clients that existed. That and their increased control of their API effectively made me look for something else. Right around that time Google+ was being introduced and many in the open source community started participating in that, in some ways to find a fresh place where techies can aggregate away from the noise and sometimes over-the-top nature of Facebook. Eventually I took to that too and started using G+ as my primary social network. That is, until Google recently decided to pull the plug on G+.

While Google+ might not have represented a success for Google, it had become a good place for sharing information among the technically-inclined. As such, I found it quite useful for learning and hearing about new things in my field. Soon-to-be-former users of G+ have gone in all sorts of directions. Some have adopted a "c'mon guys, get over it, Facebook is the spot" attitude, others have adopted things like Mastodon, others have fallen back to their existing IDs on Twitter, and yet others, like me, are still looking.

Read more

A Psion Palmtop Successor Has Arrived and It Runs Android and Linux

Filed under
Android
Linux
Gadgets

A lot of people probably remember the 1990s palmtop computers made by Psion fondly. The clamshell-design palmtops were pocketable, black and white, but had a working stylus and a fantastic tactile foldout QWERTY keyboard that you could type pretty substantial documents on or even write code with. A different company -- Planet Computers -- has now produced a spiritual successor to the old Psion palmtops called the Gemini PDA that is much like an old Psion but with the latest Android smartphone hardware in it and a virtually identical tactile keyboard. It can also dual boot to Linux (Debian, Ubuntu, Sailfish) alongside Android. The technical specs are a MediaTek deca-core processor, 4GB RAM, 64GB storage (plus microSD slot), 4G, 802.11c Wi-Fi, GPS, Bluetooth, eSIM support, and 4,220mAh battery. The screen measures in at 5.99-inches with a 2,160 x 1,080 (403ppi) resolution. The only thing missing seems to be the stylus -- but perhaps that would have complicated manufacturing of this niche-device in its first production run.

Read more

Eensy-weensy i.MX8M Mini module also powers SBC

Filed under
Android
Linux

CompuLab’s Linux-driven, 38 x 28mm “UCM-iMX8M-Mini” module features an i.MX8M Mini, WiFi/BT, and up to 4GB RAM and 64GB eMMC. The COM also ships on a sandwich-style “SBC-iMX8M-Mini” SBC.

CompuLab unveiled a Linux-driven computer-on-module with NXP’s new i.MX8M Mini SoC. At 38 x 28 x 4mm, the UCM-iMX8M-Mini is considerably smaller than CompuLab’s i.MX8M-based, 68 x 42mm CL-SOM-iMX. The module is also smaller than the two other Mini-based COMs we’ve seen so far: F&S Elektronik Systeme’s 40 x 35mm PicoCore MX8MM and Variscite’s 55 x 30mm DART-MX8M-Mini.

Read more

WWW and OSS Leftovers

Filed under
OSS
Web
  • WWW = Woeful, er, winternet wendering? CERN browser rebuilt after 30 years barely recognizes modern web

    In preparation for next month's 30th anniversary of the proposal that gave us the world wide web, boffins at the behest of CERN have recreated the world's first web browser, and made it accessible as a modern web page.

    Created by Sir Tim Berners-Lee, the ur-browser, first called WorldWideWeb, and later Nexus, was built from Objective-C in 1990 on a NeXT workstation to display its maker's HyperText Markup Language.

    The browser's resurrection – click here to try it out – follows five days of hacking by an international team of nine developers, reunited after a previous effort to revive the original Line Mode Browser in 2013.

  • Web Design Survey Findings and Next Steps

    Now we need your help again! The main takeaway from the first survey was that developers and designers of every experience level want to better understand CSS issues like unexpected scrollbars and sizing. We’ve started researching and prototyping potential tool ideas for investigating specific types of CSS bugs, but we need your feedback to guide our work.

    Please take a moment with our quick single-page CSS Layout Debugging survey and help us rank the most time-consuming bugs. Your feedback will be immensely helpful in clarifying our plans in 2019 and beyond.

  • How donations helped LibreOffice and TDF in 2018

    Donations to The Document Foundation, the non-profity entity behind LibreOffice, help us to grow our community, share knowledge about the software (and its development), maintain our infrastructure, organise events and much more. The image below shows what was made possible in 2018, thanks to your generous donations – click for a larger version!

  • NomadBSD 1.2-RC2 released!

    The second release candidate of NomadBSD 1.2 is now available! We would like to thank all the RC1 testers who sent us feedback and bug reports. If you notice any problems, please let us know.

  • Mi 9 kernel source code available on launch day

    Xiaomi literally declared war against Samsung by setting the launch date of Mi 9 on the same day with Galaxy S10. The Chinese launch event by Xiaomi completed just now – Mi 9, Mi 9 Transparent Edition and Mi 9 SE are now official.

  • Bell Labs, Skunk Works, and the Crowd Sourcing of Innovation

    I’ve noticed that we hear a lot less from corporate research labs than we used to. They still exist, though. Sure, Bell Labs is owned by Nokia and there is still some hot research at IBM even though they quit publication of the fabled IBM Technical Disclosure Bulletin in 1998. But today innovation is more likely to come from a small company attracting venture capital than from an established company investing in research. Why is that? And should it be that way?

Servers: Cockpit, SOA and Kubernetes

Filed under
Server
  • Cockpit 188

    Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 188.

  • Good news: Business automation is not about SOA

    This is not an article about service-oriented architecture (SOA); neither is it a business process management (BPM) article. This article is about how business automation can change the way you create software.

    At a first, developers and architects tend to associate the use of BPM suites (or business-oriented architecture) with SOA. This behavior immediately leads to an incorrect bias about the subject.

    C-suite executives understand: Transform—or be suppressed by new, disruptive, technology-driven startups. In 2019, business automation is a key transformation that executives will seek in order to improve business performance and lower costs. However, some technology teams are not very open to it. Why?

  • Is Kubernetes Serverless?

    If you take a look at where the IT industry is going, you will start to see a trend: a layer of complexity added to the relationship between applications and infrastructure. No longer can you draw a straight line from the application to the machine it runs on. Developers have been trying to get away from having to manage infrastructure for years. It’s no fun having to provision, manage, and patch a multitude of disparate servers, new and old.

    As a result, that layer of abstraction between the application and the underlying infrastructure has led to the invention of a number of technologies, one of them being Kubernetes. Not only can we ensure our application is going to run on a consistent Docker container image, no matter what environment, but we don’t have to manage the containers and keep track of where and how many are running at all times.

Events: Fedora at CLT 2019, LF's Open Networking Summit and Cloud Foundry Summit on Serverless, Knative, Microservices

Filed under
OSS
  • Fedora will be at CLT 2019

    The Fedora Project will be at the Chemnitzer Linux Tage 2019. So far, Robert Scheck and I will make it happen. As we pretty much did it for the last 10 years.

  • The Linux Foundation Announces the 2019 Open Networking Summit North America Speaking Schedule

    The Linux Foundation, the nonprofit organization enabling mass innovation through open source, has announced the keynote speakers and session line-up for Open Networking Summit North America (ONS), taking place April 3-5 in San Jose, Calif.

    The full lineup of sessions can be viewed here, and features speakers from AT&T, China Mobile, Ericsson, Google, Huawei, Intel, KPMG, Nokia, Red Hat, Target, and more.

    “The Open Networking Summit is a chance to bring together the entire open networking community – from telco providers to cloud providers – to share best practices and discuss how we can work together to advance networking technology,” said Arpit Joshipura, General Manager, Networking, Edge & IoT, the Linux Foundation. “Gathering the industry’s foremost innovators and technologists, ONS is a must-attend event for collaboration and knowledge sharing.”

  • 6 Must-Attend Talks at Cloud Foundry Summit on Serverless, Knative, Microservices

    That’s a lot of technical content, so make sure to also get your ideal ratio of business impact content and check out the User Stories track.

Graphics: TuxClocker and VK_EXT_depth_clip_enable

Filed under
Graphics/Benchmarks
  • TuxClocker: Another GPU Overclocking GUI For Linux

    Adding to the list of third-party GPU overclocking utilities for Linux is TuxClocker, a Qt5-based user-interface currently with support for NVIDIA graphics cards and experimental support for AMD GPUs. 

    TuxClocker is a Qt5 overclocking tool that supports adjusting not only the memory/core frequencies but also the power limit, fan speed, and other tunables based upon the GPU/driver in use. There is also graph monitors to show the power and temperature limit, where supported, among other features. 

    TuxClocker offers similar functionality to other third-party, open-source Linux GPU overclocking software though where as most utilities focus just on NVIDIA or AMD hardware, TuxClocker is pursuing both. Currently their stable release supports just NVIDIA GPUs but the development code has AMD Radeon support in the works.

  • Intel Wires VK_EXT_depth_clip_enable Into Their Vulkan Driver, Helping DXVK

    Intel's open-source ANV Vulkan driver now supports the VK_EXT_depth_clip_enable that was designed in part to help the DXVK project for mapping Direct3D atop of the Vulkan API.

Programming Leftovers

Filed under
Development
  • Packaging PyQt5 apps with fbs

    fbs is a cross-platform PyQt5 packaging system which supports building desktop applications for Windows, Mac and Linux (Ubuntu, Fedora and Arch). Built on top of PyInstaller it wraps some of the rough edges and defines a standard project structure which allows the build process to be entirely automated. The included resource API is particularly useful, simplifying the handling of external data files, images or third-party libraries — a common pain point when bundling apps.

  • Infrastructure monitoring: Defense against surprise downtime

    There are a number of tools available that can build a viable and strong monitoring system. The only decision to make is which to use; your answer lies in what you want to achieve with monitoring as well as various financial and business factors you must consider.

    While some monitoring tools are proprietary, many open source tools, either unmanaged or community-managed software, will do the job even better than the closed source options.

    In this article, I will focus on open source tools and how to use them to create a strong monitoring architecture.

  • GSlice considerations and possible improvements

    The paper Mesh: Compacting Memory Management for C/C++ Applications is about moving memory allocations for compaction, even though the memory pointers are exposed. The idea is to merge allocation blocks from different pages that are not overlapping at page offsets, and then letting multiple virtual page pointers point to the same physical page. Some have asked about the applicability to the GSlice allocator.

  • plprofiler – Getting a Handy Tool for Profiling Your PL/pgSQL Code
  • Reading and Writing Files in Python (Guide)
  • Today is a Good Day to Learn Python

Security Leftovers

Filed under
Security
  • Wi-Fi ‘Hiding’ Inside USB Cable: A New Security Threat On The Rise?

    Today, the world has become heavily reliant on computers owing to the various advantages they offer. It has thus become imperative that we, as users, remain updated about the various threats that can compromise the security of our data and privacy.

    A recent report published by Hackaday details a new threat that might just compromise the integrity of devices. At first glance, the O.MG cable (Offensive MG Kit) looks like any other USB cable available in the market. It is what lurks within that is a cause for concern.

  • WiFi Hides Inside a USB Cable [Ed: There are far worse things, like USB devices that send a high-voltage payload to burn your whole motherboard. Do not use/insert untrusted devices from dodgy people.]
  • The Insights into Linux Security You May Be Surprised About

    Linux has a strong reputation for being the most secure operating system on the market. It’s been like that for many years, and it doesn’t seem like Windows or macOS are going to overtake it anytime soon. And while the operating system’s reputation is well-deserved, it can also be harmless experienced users.

    The problem is that some seem to put too much trust in the capabilities of Linux by default. As a result, they often don’t pay enough attention to the manual aspect of their security. Linux can help you automate your workflow to a large extent, but it still requires a manual touch to keep things going well. This is even truer when it comes to security.

  • One Identity Bolsters Unix Security with New Release of Authentication Services

    Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration. Because native Unix-based systems are not linked to one another, each server or OS instance requires its own source of authentication and authorization.

  • Book Review – Linux Basics for Hackers

    With countless job openings and growth with no end in sight, InfoSec is the place to be. Many pose the question, “Where do I start?” Over his years of training hackers and eventual security experts across a wide array of industries and occupations, the author ascertains that one of the biggest hurdles that many up-and-coming professional hackers face is the lack of a foundational knowledge or experience with Linux. In an effort to help new practitioners grow, he made the decision to pen a basic ‘How To’ manual, of sorts, to introduce foundational concepts, commands and tricks in order to provide instruction to ease their transition into the world of Linux. Out of this effort, “Linux Basics for Hackers” was born.

  • Security updates for Wednesday

today's howtos

Filed under
HowTos

HTTP Vs. HTTPS

Filed under
Linux

The internet runs on protocols. Rules and norm defined so that there is some form of standardization. One such protocol is the HyperText Transfer Protocol(HTTP).

Read more

5 of the Best Linux Distros for Developers and Programmers

Filed under
Development
GNU
Linux

One of the reasons Linux is great is because of how flexible it is. For example, it can run on everything from servers to your old laptop to a Raspberry Pi. For this reason, it’s also a fantastic platform for developers.

Whether you’re a seasoned developer or just using Linux to learn to program, you still have to choose a distribution. You could just choose Ubuntu and run with it, but there are plenty of “other options available to you.”

Read more

How To Automatically Change GNOME Background In Intervals Using BASH

Filed under
Linux

Have you ever wanted to have that automatic background switching feature on your GNOME Linux distro? I missed that feature after I switched from Cinnamon to GNOME Sad Searched for apps in the software center and alas there is none that I could find. However, today I’m happy to let you know that there is a workaround to this missing feature through the use of BASH scripting language.

Read more

Syndicate content

More in Tux Machines

Security Leftovers

NetBSD Virtual Machine Monitor

  • NetBSD Virtual Machine Monitor
    NVMM provides hardware-accelerated virtualization support for NetBSD. It is made of an ~MI frontend, to which MD backends can be plugged. A virtualization API is shipped via libnvmm, that allows to easily create and manage virtual machines via NVMM. Two additional components are shipped as demonstrators, toyvirt and smallkern: the former is a toy virtualizer, that executes in a VM the 64bit ELF binary given as argument, the latter is an example of such binary.
  • NetBSD Gains Hardware Accelerated Virtualization
    NetBSD, the highly portable Unix-like Open Source operating system known for its platform diversity, has gained hardware-accelerated virtualization support via an improved NetBSD Virtual Machine Monitor (NVMM).

GNU Releases: mailutils, cflow, tar and parallel

Devices: AArch64, Siemens/Mentor Embedded Linux (MEL), Raspberry Pi and Xiaomi

  • We need Arm64 systems for developers. Again.
    Getting AArch64 hardware for developers is important. When it happen? One day. Maybe even before people forget that such architecture existed. We talk about it during each Linaro Connect. So far nothing serious came from it. We had some failed attempts like Cello or Husky. There is Synquacer with own set of issues. Some people use MACCHIATObin. Some still use Applied Micro Mustangs which should get a place in computer museums. It is chicken and egg issue. No one makes affordable AArch64 systems because no one buys them. Because no one makes them. Hardware vendors concentrate on server market — no chips to choose for developer systems.
  • Siemens PLM Software announces enterprise Mentor Embedded Linux (MEL) solution
    Siemens PLM Software announced an enterprise Mentor Embedded Linux (MEL) solution that provides electronics manufacturers secure, scalable and configurable distributions for industrial, medical, aerospace and defense applications. This MEL technology is a configurable distribution that provides an operating system platform for embedded systems development and is a result of the continued integration of the recently acquired embedded systems design capabilities from Mentor Graphics. The solution is based on Debian, an enterprise class, open source Linux operating system.
  • Siemens launches new enterprise class embedded Linux solution for embedded systems development
    With the growth of internet of things (IoT) and other smart devices, it is becoming increasingly complex and expensive for manufacturers to develop embedded distributions and applications for these devices based on the Linux® operating system. Siemens PLM Software today announced a new enterprise Mentor® Embedded Linux® (MEL) solution that provides electronics manufacturers secure, scalable and configurable distributions for industrial, medical, aerospace and defense applications. This new MEL technology is a configurable distribution that provides a robust operating system platform for embedded systems development and is a result of the continued integration of the recently acquired embedded systems design capabilities from Mentor Graphics. The solution is based on Debian, a broadly utilized, enterprise class, open source Linux operating system.
  • Raspberry Pi Begins Rolling Out The Linux 4.19 Kernel
    The Raspberry Pi folks have been working the past few months on upgrading their kernel in moving from Linux 4.14 to 4.19. That roll-out has now begun. Linux 4.19 has been the target of the Raspberry Pi Foundation due to this newer kernel being a Long-Term Support (LTS) release and thus will be maintained for the long-term. That large jump in the standard kernel version for Raspberry Pi ultimately means less work too for the developers involved: between 4.14 and 4,19, a lot of Raspberry Pi patches and other Broadcom improvements were upstreamed.
  • Raspberry Pi Updates Devices to Linux 4.19
  • Xiaomi’s 2019 goal is to release kernel source code more quickly for all its devices
    Just before MWC 2019, Xiaomi took to the stage at an event in China to launch the new Xiaomi Mi 9 and Mi 9 SE. Both the devices represent the best of what OEM has to offer, bringing in a high value device at a fraction of the cost of a premium flagship. While this approach lets them appeal to the average consumer, Xiaomi has also been quite developer-friendly, which makes them a good purchase even for those who are looking for a device with a very good third party development community. Xiaomi does not void the warranty of devices (in India at least) if you unlock the bootloader, and they have worked on significantly bringing down the waiting times for bootloader unlock requests too.