today's leftovers
-
Rugged embedded trio run Linux on Whiskey Lake
Vecow launched two compact, rugged embedded PCs with Intel's 8th Gen Whiskey Lake-UE. The Linux-ready SPC-5000 and -5100 offer 4x 10Gbps USB 3.1 Gen2 ports and SUMIT expansion with optional 10GbE modules, and the RES-3000 features IP67-protected M12 ports.
Vecow announced a fanless, rugged SPC-5000 computer and almost identical, but wider-temp SPC-5100, equipped with Intel's 8th Gen Whiskey Lake-UE CPU. Both embedded computers target machine vision, in-vehicle computing, factory automation, ITS, intelligent control, and AIoT/Industry 4.0 applications.
The SPC-5000/5100 systems appear to be based on Vecow's recently launched, 3.5-inch EMBC-3000 SBC. The EMBC-3000 also powers a larger, more feature-rich SPC-5200 computer that was announced at the same time in early September.
-
GStreamer & automated testing in Lyon
Following three days at Embedded Linux Conference Europe, Collaborans are continuing their stay in the capital of France’s Auvergne-Rhône-Alpes region to take part the annual GStreamer Conference, as well as the Automated Testing Summit.
Our entire multimedia team will be attending the GStreamer Conference, which takes place at L'Embarcadère on October 31 & November 1. They'll be presenting no less than a dozen times during the conference, on topics including RTP jitter buffer timers, network streaming protocols and PipeWire in the automotive industry. Read below for details & links to each of their talks.
Back at the Palais des congrès de Lyon where ELCE took place, Gustavo Padovan, Linux Core Technologies Lead, will be taking part in the Automated Testing Summit on October 31. KernelCI will undoubtedly be a hot topic and heavily discussed as it became a Linux Foundation project just a few days ago.
-
Top opensource Android apps
Since my transition to Linux I have acquired a culture of open source software, a culture that is expanding with every day I spend in Linux.
Especially after having seen the importance of open source applications in fighting the monopoly of Big softwares companies such as Microsoft, Apple, Adobe ...
It has expanded to include even the way I use my smartphone, where I have become inclined to use open source applications, because of my love for open source on the one hand, and on the other hand because of the thirst of commercial software to spy on my personal information as well as the aggressive bad ads that hinder the good use of softwares.
-
GraphQL a cut above the REST, say query lang's fans: Airbnb, Knotel, others embrace the tech
At the GraphQL Summit in San Francisco on Wednesday, Matt DeBergalis, co-founder and CTO at data plumbing biz Apollo GraphQL, urged companies to appoint a data graph champion to help ease the implementation of GraphQL, a query language for fetching data.
It's not yet a given that organizations want to implement GraphQL. But at a gathering arranged by Apollo, which makes the de facto standard open-source client and the commercial Apollo GraphQL Platform, there's a certain incentive to imagine GraphQL everywhere.
It's already halfway there, at least among the 472 companies attending the show – about 52 per cent of organizations represented are already using the technology in production. Some of the more recognizable names include Airbnb, Audi, Expedia, The New York Times, Medium, PayPal, and Priceline.
-
After Server Breach, NordVPN Has Strengthened Security Measures
What do you do when you find out the company you were entrusting with your privacy was hacked? Panic? There may have been a lot of that going on when NordVPN admitted to a security breach of their server.
The good news is that NordVPN is on top of it, and it has already strengthened security measures. But will they be able to trust NordVPN again?
-
Shadow tree encapsulation theory
Types 3 through 5 do not have any kind of support and type 4 and 5 encapsulation would be hard to pull off due to Spectre. User agents typically use a weaker variant of type 4 for their internal controls, such as the video and input elements, that does not protect confidentiality.
[...]
Type 2 encapsulation gives component developers control over what remains encapsulated and what is exposed. You need to take all your users into account and expose the best possible public API for them. At the same time, it protects you from folks taking a dependency on the guts of the component. Aspects you might want to refactor or add functionality to over time. This is much harder with type 1 encapsulation as there will be APIs that can reach into the details of your component and if users do so you cannot refactor it without updating all the callers.
- Login or register to post comments
- Printer-friendly version
- 4624 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago