Language Selection

English French German Italian Portuguese Spanish

Misc

today's leftovers

Filed under
Misc
  • IFStile – Iterated Function Systems – visualize substitution tilings

    One of the ways to generate fractals is using the Iterated Function System (IFS).

    In mathematical terms the system is a finite set of contraction maps w_i for i=1, 2, …, N, each with a contractivity factor s<1, which map a compact metric space onto itself. It’s the basis for fractal image compression techniques.

    IFS fractals, as they are known, can be of any number of dimensions, but are often calculated and drawn in 2D. The fractal is made up of the union of several copies of itself, each copy being transformed by a function (hence “function system”). The canonical example is the Sierpiński triangle. Substitution tilings are great source of fractal shapes, due to their recursive nature. This method can generate regular-looking fractals as well as non-geometric fractals.

  • OpenComic – Open Source Cross-platform Comic and Manga Reader

    OpenComic is an open-source comic and manga reader that works on Windows, mac OS, and Linux.

  • FPgM report: 2019-32

    Here’s your report of what has happened in Fedora Program Management this week.

    I have weekly office hours in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else.

  • West Coast Hackfest – Summary

    This year, I helped organize West Coast Hackfest with my stalwart partner and friend Teresa Hill in Portland – with assistance from Kristi Proggi. Big thanks to them for helping to make this a success!

    Primarily the engagement hackfest was focused on the website content. The website is showing its age and needs both a content update and a facelift. Given our general focus on engagement, we want to re-envision the website to drive that engagement as a medium for volunteer capture, identity, and fundraising.

    [...]

    I would like to thank the GNOME Foundation for providing the resources and infrastructure to have us all here.

  • Fontwork challenge

    I plan to update all kind of visual aspects in LibreOffice (6.4), if you are interested in feedback, help, support, you are welcome.

    Download the Fontwork.odp file where all 40 existing fontwork’s are shown. Play around with them and submit the updated file. Nothing is easier to contribute back and have fun with LibreOffice.

  • How to Increment and Decrement Variable in Bash (Counter)
  • Multiple Examples Of ls Command In Linux
  • Multiple Examples Of netcat Or nc Or ncat Command
  • [Old] Microsoft to Pay $25 Million to Settle Foreign Bribery Probe

    The computer behemoth settled the alleged Foreign Corrupt Practices Act violations by four Microsoft subsidiaries in separate agreements with the SEC and the U.S. Department of Justice.

    Microsoft, as part of its settlement with the SEC, neither admitted nor denied the misconduct described by the agency.

today's leftovers

Filed under
Misc
  • Microsoft axes Office 2019 from 'Home Use Program' [iophk: holding data hostage inside not only proprietary data formats but inaccessible, remote servers]

    As expected, Microsoft has dumped the perpetually-licensed Office 2019 from its "Home Use Program" agreements with organizations that license the productivity software for the workplace.

  • MoviePass reportedly changed account passwords to prevent users from seeing films

    Because of the demand, the company ran into trouble. In April 2018, it cut back on its unlimited plan, allowing users to see only four films a month. Then it changed its user plans again, allowing users to only see films from a certain selection. Then it forced users to opt out of the new plans. In January, it unveiled yet another set of subscription plans. In March, it brought back the unlimited plan (with conditions). And finally in July, it announced that it would shut down for “several weeks” to retool its model.

  • The definitive story of how a controversial Florida businessman blew up MoviePass and burned hundreds of millions

    A four-month investigation by Business Insider chronicles the rise and fall of the movie-ticket-subscription startup MoviePass.

  • Check whether laptop is running on battery or cable
  • How to Install Adobe Flash Player on Ubuntu Linux
  • Run your own VPN with Libreswan
  • William (Bill) Blough: Free Software Activities (July 2019)
  • CNCF-led open source Kubernetes security audit reveals 37 flaws in Kubernetes cluster; recommendations proposed

    Last year, the Cloud Native Computing Foundation (CNCF) initiated a process of conducting third-party security audits for its own projects. The aim of these security audits was to improve the overall security of the CNCF ecosystem.

    CoreDNS, Envoy and Prometheus are some of the CNCF projects which underwent these audits, resulting in identification of several security issues and vulnerabilities in the projects. With the help of the audit results, CoreDNS, Envoy and Prometheus addressed their security issues and later, provided users with documentation for the same.

    CNCF CTO Chris Aniszczyk says “The main takeaway from these initial audits is that a public security audit is a great way to test the quality of an open source project along with its vulnerability management process and more importantly, how resilient the open source project’s security practices are.” He has also announced that, later this year, CNCF will initiate a bounty program for researchers who identify bugs and other cybersecurity shortcomings in their projects.

  • Mesosphere Transforms into D2iQ

    Mesosphere this week renamed itself D2iQ as part of an effort to firmly re-establish is bona fides as a provider of tools for automating the deployment of a variety of open source platforms, including Kubernetes.

    As part of that effort, the rebranded company launched three separate offerings, starting with a curated distribution of Kubernetes dubbed Konvoy. That platform provides the foundation for Ksphere, a suite of tools for automating both the deployment and ongoing management of Kubernetes that address everything from monitoring and logging to ingress control and disaster recovery via a single installer.

today's leftovers

Filed under
Misc
  • Mike Gabriel: Cudos to the Rspamd developers

    I just migrated the first / a customer's mail server site away from Amavis+SpamAssassin to Rspamd. Main reasons for the migration were speed and the setup needed a polish up anyway. People on site had been complaining about too much SPAM for quite a while. Plus, it is always good to dive into something new. Mission accomplished.

    [...]

    The main part of the work had already been documented in a blog post [2] by someome with the nick "zac" (no real name found). Thanks for that!

    The Sophos AV integration was a little tricky at the start, but worked out well, after some trial and error, log reading, Rspamd code studies, etc.

    On half way through, there was popped up one tricky part, that could be avoided by the Rspamd upstream maintainers in future releases. As far as I took from [3], Rspamd lacks support for retrieving its map files and such (hosted on *.rspamd.com, or other 3rd party providers) via a http proxy server. This was nearly a full blocker for my last project, as the customer's mail gateway is part of a larger infrastructure and hosted inside a double ring of firewalls. Only access to the internet leads over a non-transparent squid proxy server (one which I don't have control over).

    To work around this, I set up a transparent https proxy on "localhost", using a neat Python script [4]. Thanks for sharing this script.

  • This Teen Hacker Found Bugs in School Software That Exposed Millions of Records

    At the Defcon hacker conference in Las Vegas today, 18-year-old Bill Demirkapi presented his findings from three years of after-school hacking that began when he was a high school freshman. Demirkapi poked around the web interfaces of two common pieces of software, sold by tech firms Blackboard and Follett and used by his own school. In both cases, he found serious bugs that would allow a hacker to gain deep access to student data. In Blackboard's case in particular, Demirkapi found 5 million vulnerable records for students and teachers, including student grades, immunization records, cafeteria balance, schedules, cryptographically hashed passwords, and photos.

    Demirkapi points out that if he, then a bored 16-year-old motivated only by his own curiosity, could so easily access these corporate databases, his story doesn't reflect well on the broader security of the companies holding millions of students' personal information."The access I had was pretty much anything the school had," Demirkapi says. "The state of cybersecurity in education software is really bad, and not enough people are paying attention to it."

  • Intel SVT-HEVC 1.4 Brings GStreamer Plug-In, HDR Feature

    Intel's open-source SVT video encoder team today released a new feature update to their HEVC/H.265 open-source video encoder.

  • Spinning, Support, and Open Source
  • Your learning journey with SUSE

    I hate to say it, but summer is finally winding down. This time of year just “feels” like school, doesn’t it? Some kids are already back in school but mine have a couple of weeks of summer left that they are trying to savor. For my kids, preparation for the new school year is quite involved, from concerns about who their teachers will be, will their friends have the same teacher, what to wear, and more. Rarely does what they’ll learn come up as a concern for my kids. Deep down we trust that their school, and teachers, have a plan for each day and that their learning journey will pick up where it left off last spring. It’s the one thing my kids don’t worry about when it comes to school.

today's leftovers

Filed under
Misc
  • Sway 1.2-RC1 Released For The i3-Inspired Wayland Compositor

    Sway 1.2 is tracking compatibility fixes/improvements against i3 4.17, Swaybar is now spawned as a Wayland client, XWayland support enhancements, wlr-output-management-v1 protocol support, output toggle support, layout handling enhancements, and a wide range of different fixes and other improvements to this promising lightweight Wayland compositor built off their WLROOTS project.

  • Fedora Update Weeks 25–30

    It has been quite a long time since the last post, unfortunately, but I’m not gone yet. I was fairly busy for a couple of weeks, and then taking a little break while waiting for the Fedora 31 Mass Rebuild to finish. But here we go with what’s been taking place.

    The major bit of work leading up to the Mass Rebuild was getting all Go packages up do date to the newly approved Guidelines. This involved several refreshes of packages, newly created packages, and other general cleanup, implemented almost entirely by Robert-André Mauchin (eclipseo) for all the Go libraries. Unfortunately, this missed adding Obsoletes to the renamed packages, so I (manually) tracked commit notifications and wrote a script to add these in. There were nearly 200 of these, which is too many to list here, but you can find them on datagrepper.

  • A Modern Supermicro Kabylake Xeon Motherboard Now Supports Coreboot

    While the tide may be eventually turning, as it stands today for those wanting to run Coreboot on x86 desktop/server hardware you are largely limited to generations-old platforms. But now there is a new option and that is a Coreboot port having been completed to a modern Supermicro motherboard for use with Intel Xeon "Kabylake" processors.

    Through a partnership between 9elements Cyber Security and Mullvad, a port has been completed to the Supermicro X11SSH-TF motherboard that is for Xeon E3-1200 v6 series processors.

  • Kiwi TCMS: Kiwi TCMS conference presence, AW2019

    Your favorite open source test case management system is going on tour again.

  • Rough, tough 10.4- and 12.1-inch in-vehicle computers offer 802.11ac and LTE

    Advantech has launched a Linux-friendly “DLT-V72 Facelift” series of rugged, Intel Bay Trail based vehicle-mounted computers in 10.4- and 12.1-inch models with 802.11ac, LTE, and optional UPS, sensors, and screen blanking.

    Advantech has updated its DLT-V72 line of rugged vehicle-mounted terminals (VMTs) for warehouse management, port management, heavy-duty operations, and manufacturing applications. New features on the DLT-V72 Facelift include a more stylish, compact design, as well as 802.11ac WiFi, LTE, and optional sensors and screen blanking.

today's leftovers

Filed under
Misc
  • Summing Up The AMD EPYC 7742 2P Performance In One Graphic

    If you didn't have a chance since last night to check out our benchmarks of the AMD EPYC 7742 and EPYC 7502 Linux performance, I certainly encourage you to do so. Even if you aren't a server enthusiast, it's incredible to see the engineering achievement of AMD with Zen 2 and how the race is certainly back on in the CPU space. If you are short on time, here's the quick summary of our initial AMD EPYC 7002 benchmark results. 

    As all independent reviewers seem to be in consensus, the EPYC 7002 series is a godsend for just about everyone, sans Intel. The EPYC 7002 line-up provides the most competitive option against Intel we've seen in the server space in many years if not ever, customers have these lower-cost CPUs that actually perform better and more power efficient in a majority of real-world workloads, and Rome further benefits consumers by reigniting Intel's engine and they will certainly need to respond in some manner by either (much) better pricing or some card up their sleeves.

  • How Can AMD EPYC "Rome" 7002 Series Be Even Better? Open-Source BIOS / Coreboot

    By now you've likely seen the fantastic performance out of AMD's new "Rome" 7002 series processors. The performance is phenomenal and generally blowing well past Intel's Xeon Cascade Lake processors. So that's all good and it can get even better outside of performance: I asked AMD about the prospects of Coreboot / open-source BIOS support and got a surprising response.

    At an event in Austin last month when AMD was talking up Rome, when they weren't talking about the new server CPU's performance potential they were often mentioning the chip's security. That set the stage for bringing up open-source support and Coreboot support without coming across as just an open-source zealot/nerd question. After all, if their lower-level bits were (again) open-source it would ensure a more auditable boot process and ensuring the integrity of their Platform Security Processor (PSP) and the like, which in this day and age is important and trying to ensure no nefarious back-doors to the system. Companies like Facebook and Google are also genuinely interested in this open-source functionality with their work on the likes of Coreboot and LinuxBoot.

  • Curbing Harassment with User Empowerment

    Typically, we want to communicate with strangers online, so this should be possible by default. But if we are being actively harassed, we can assume that further messages from strangers are unsafe, and switch our account to “safety mode”–rejecting messages, invites and other interactions from strangers. We can rely on our trusted contacts for help and support, including passing on well-wishes from strangers.

    At-risk individuals might choose to start their account in safety mode.

    Trusted caretakers might maintain lists of bad actors, but trusting a caretaker should require very careful consideration: What is their governance model? What is their appeals process? Do they leak information about list recipients?

  • Python and public APIs

    In theory, the public API of a Python standard library module is fully specified as part of its documentation, but in practice it may not be quite so clear cut. There are other ways to specify the names in a module that are meant to be public, and there are naming conventions for things that should not be public (e.g. the name starts with an underscore), but there is no real consistency in how those are used throughout the standard library. A mid-July discussion on the python-dev mailing list considered the problem and some possible solutions; the main outcome seems to be interest in making the rules more explicit.

    It should be noted that the Python language does not enforce any access restrictions at all; any program that can import a module can access any top-level name defined in it. All of the "rules" that govern access restrictions are simply conventions, though they are meant to delineate things that can be changed by a module maintainer without going through the usual deprecation cycle. A big part of the public API is effectively a list of names that the module maintainer promises not to change without a good deal of warning (at least two full development cycles).

today's leftovers

Filed under
Misc
  • FLOSS Weekly 541: Hack-a-day

    Hackaday is a website that promotes the free and open exchange of ideas and information. Besides the articles that the website publishes, it also has hardware development community called Hackaday.io where you can discover, create, collaborate, and get feedback on your projects.

  • mintCast 314 – Moss Interview (for real)

    I started playing with Linux in the early 2000s, I got Slackware and Red Hat disks but was too timid to look up all the information on all my cards. I finally got Mandrake to run, and it was fun but was not ready to replace all the things I did. Mandrake had a numerical upgrade, which would not work on my computer. Then I tried SuSE (just before OpenSUSE started), and it ran. But it was strictly niche at that point. My next-door neighbor played with things and eventually had two Windows boxes, a homemade Hackintosh, and a Fedora box, all networked; years later, he passed and bequeathed all those computers to me. When XP users were being pushed to 7, I moved to Ubuntu Gnome. When Ubuntu moved to Unity, that would not run on my computer, and I went back to Win7. I had some Win 8/8.1 computers but got over that, and went back to 7. Then when they tried to force me to Win 10, I tried it, saw all the open holes, found I couldn’t close all the security holes, went back to 7, and found most of the holes were left open. So I installed Linux Mint 17 and have not gone back. Linux has grown substantially in the last 15 years, and is now, in my opinion, a better system than Windows.

  • RQuantLib 0.4.10: Pure maintenance

    A new version 0.4.10 of RQuantLib just got onto CRAN; a Debian upload will follow in due course.

    QuantLib is a very comprehensice free/open-source library for quantitative finance; RQuantLib connects it to the R environment and language.

    This version does two things related to the new upstream QuantLib release 1.16. First, it updates the Windows build script in two ways: it uses binaries for the brand new 1.16 release as prepapred by Jeroen, and it sets win-builder up for the current and “prospective next version”, also set up by Jeroen. I also updated the Dockerfile used for CI to pick QuantLib 1.16 from Debian’s unstable repo as it is too new to have moved to testing (which the r-base container we build on defaults to). The complete set of changes is listed below:

  • Voice Control Ready Pico-ITX i.MX8M Board for Embedded IoT Solutions

    Imagine a complete POE touch panel PC solution built around the newest i.MX8M ARM technology. A touch panel computer with wide-ranging Linux and support, including Yocto Embedded, QT, Wayland, and Ubuntu, as well as Android 8.1 and 9 Support. Estone Technology is pleased to announce the 10” PPC-4310 Frameless Panel PC.

  • Nicole Faerber nominated for “CTO of the Year” by Women in IT Awards

    Our very own Nicole Faerber has made it to the short-list for “CTO of the Year” by the Women in IT Awards!
    Congratulations are in order–we are so proud to say that Nicole Faerber just got nominated to the short-list of such a meaningful award. Nicole’s nomination means a lot to Purism, and we are here today to say just so.

  • Christopher Allan Webber: ActivityPub Conf 2019 Speakers

    Good news everyone! The speaker list for ActivityPub Conf 2019 is here! (In this document, below, but also in ODT and PDF formats.)

    (Bad news everyone: registration is closed! We're now at 40 people registered to attend. However, we do aim to be posting recordings of the event afterwards if you couldn't register in time.)

  • The upcoming Linux-Tech&More event's [Ed: I don’t think he knows the meaning of the word “event”… ]
  • Can toys teach coding to kids?

    On a Christmas morning in the early 2000s, my mom found herself slaving over a freshly unwrapped copy of Lego Mindstorms: Star Wars. The commercials aired on Cartoon Network for months, offering a fantasy that was too appealing for me to pass up: Supposedly, with a sturdy hard drive, an elementary understanding of computer science, and my own recess-honed Lego skills, a 10-year-old like me could construct and program his very own AT-ST mech from The Empire Strikes Back all by himself. With a press of a button, my robot would be able to walk along the kitchen table and swing its head side to side.

    [...]

    And Robo Wunderkind is just the tip of the iceberg. The Chinese company Makeblock offers several DIY programming kits, including one where children can construct their own drones. With a Bitsbox subscription, every month your kids will receive a new create-an-app adventure. 

  • Tutanota Interviews Tim Verheyden, the Journalist Who Broke the Story on Google Employees Listening to People's Audio Recordings

    Investigative journalist Tim Verheyden, who broke the story on how Google employees listen to people’s audio recordings, explains in an interview how he got hold of the story, why he is now using the encrypted contact form Secure Connect by Tutanota and why the growing number of "ghost workers" in and around Silicon Valley is becoming a big issue in Tech.

  • Microsoft Nabs Russian Hackers Exploiting Flimsy IOT Security [Ed: Microsoft is often the cause of the issues described here]

    Year after year after year, we're connecting millions upon millions of devices to home and business networks with paper-mache grade security. And while there's some fleeting efforts to address the problem (like incorporating flaws into product reviews), it's still not something folks are taking seriously enough. And while such proclamations are often dismissed as hyperbole, it's something folks like Schneier predict isn't likely to change until these vulnerabilities result in some notable human casualties.

  • What all the stuff in email headers means—and how to sniff out spoofing

    I pretty frequently get requests for help from someone who has been impersonated—or whose child has been impersonated—via email. Even when you know how to "view headers" or "view source" in your email client, the spew of diagnostic wharrgarbl can be pretty overwhelming if you don't know what you're looking at. Today, we're going to step through a real-world set of (anonymized) email headers and describe the process of figuring out what's what.

    Before we get started with the actual headers, though, we're going to take a quick detour through an overview of what the overall path of an email message looks like in the first place. (More experienced sysadmin types who already know what stuff like "MTA" and "SPF" stand for can skip a bit ahead to the fun part!)

  • Don’t let the crooks ‘borrow’ your home router as a hacking server [Ed: Sophos is badmouthing GNU/Linux and SSH right now. Why? Check what proprietary software this firm is selling. Machines with open SSH ports and generic passwords don't mean SSH or Linux are at fault. Companies that make machines with passwordless (or weak/unchanged password) remote access basically use GNU/Linux to construct honeypots. The outcome is, as expected, bad for security. Not the fault of GNU/Linux.]

    SSH, short for Secure Shell, is the probably the most common toolkit for remotely managing computers.

    Windows users may be more familiar with RDP, or Remote Desktop Protocol, which gives you full graphical remote control of a Windows computer, with access to the regular Windows desktop via mouse and keyboard.

    But almost every Linux or Unix sysadmin out there, plus many Windows sysadmins, use SSH as well as or instead of RDP, because of its raw power.

today's leftovers

Filed under
Misc
  • Linux Performs Poorly In Low RAM / Memory Pressure Situations On The Desktop

    It's been a gripe for many running Linux on low RAM systems especially is that when the Linux desktop is under memory pressure the performance can be quite brutal with the system barely being responsive. The discussion over that behavior has been reignited this week.

  • Yes, Linux Does Bad In Low RAM / Memory Pressure Situations On The Desktop

    It's been a gripe for many running Linux on low RAM systems especially is that when the Linux desktop is under memory pressure the performance can be quite brutal with the system barely being responsive. The discussion over that behavior has been reignited this week.

    Developer Artem S Tashkinov took to the kernel mailing list over the weekend to express his frustration with the kernel's inability to handle low memory pressure in a graceful manner. If booting a system with just 4GB of RAM available, disabling SWAP to accelerate the impact/behavior, and launching a web browser and opening new web pages / tabs can in a matter of minutes bring the system down to its knees.

  • Sysdig Injects More AI into Container Security

    At the Black Hat USA conference, Sysdig today announced it has extended the capabilities of Sysdig Secure to include runtime profiling and anomaly detection enabled by machine learning algorithms with Kubernetes environments.

    At the same time, Sysdig unveiled Falco Rule Builder, a more flexible user interface (UI) for creating runtime security policies, which integrates tightly with Sysdig Secure.

    Knox Anderson, director of product management for Sysdig, says these extensions will make it easier for organizations to embrace best DevSecOps processes by relying on container monitoring and security tools for Kubernetes environments delivered via a software-as-a-service (SaaS) application, dubbed Sysdig Cloud Native Visibility and Security Platform (VSP).

    Sysdig Secure is extending its syscall-level integration to gain deep insights into container runtime activity. Within 24 hours of the image being profiled, enterprises can access a profile that provides insights in all process and file system activity, networking behavior and system calls. DevOps and security teams then can use the learned profile snapshot to create a policy that can be applied to container images in the environment automatically.

  • Multi-cloud: 8 tactics for stronger security

    The “multi” in multi-cloud should make clear from the outset that your security plans will need an update for this modern IT paradigm. You’re no longer protecting a single environment or network, but multiple threat surfaces.

    That’s not a cause for panic. Rather, it’s an impetus for incorporating new tools and tactics into your security strategy – and reinforcing some existing processes.

  • PCLinuxOS Family Member Spotlight: Aragorn

    In December 1999. I had never been one to accept the hardware manufacturer's choice of operating system, and while my first ever PC came with DOS 5.0 and Windows 3.0 - which I've used for about six months - I wanted to have OS/2 on my computer, and so I've used OS/2 for over five years. Then I needed a new computer, and I really wanted a UNIX system, but that would have been very expensive, and it was hard to come by. My friends were (of course) all using Windows 95, but that was a DOS-based system, and after having used a real 32-bit operating system for over five years, and with the new computer having a Pentium II processor, I wasn't going to settle on anything DOS-based. So I compromised and I got Windows NT 4.0. I used that for two years.

    Then, late in 1999, I read an article in a computer magazine in which they were discussing several GNU/Linux distros - SuSE, Mandrake, RedHat, Slackware, Debian, Caldera and TurboLinux. Two weeks later I was at a software shop to buy a Microsoft Encarta for my brother as a Christmas gift, and there on the shelf were several of those distros that the magazine had touched upon. I hesitated, but eventually I picked up the Mandrake box - it was the 6.0 PowerPack - and I took it with me to the cashier.

    I ran Mandrake in dual-boot with NT 4.0 for about a month, and then, on the 1st of January 2000, NT 4.0 refused to boot, in spite of the service packs and the official Microsoft Y2K pack I had installed. GNU/Linux booted up fine, and so my choice to stick with that was easily made. I was already seriously impressed by GNU/Linux and the whole Free & Open Source Software philosophy anyway. I've never looked back.

    I've used several distros over the years. On my own computers, it has mainly been Mandrake (before it became Mandriva), PCLinuxOS, Mageia and Gentoo. But between 2002 and 2009 or so, I ran an IRC network with a bunch of people, and we ran Mandrake and CentOS on our servers. We also had one machine with Debian, but that one was located in Norway and I wasn't the admin of that box.

  • Python to Find Difference Between Two Lists

    In this tutorial, we’ll discover two Pythonic ways to find the Difference Between Two Lists. One of the methods is using the Python Set. It first converts the lists into sets and then gets the unique part out of that. Other non-set methods compare two lists element by element and collect the unique ones. We can implement these by using nested for loops and with the list comprehension. By the way, if you are not aware of the sets in Python, then follow the below tutorial. It would quickly introduce you to how Python implements the mathematical form of Set.

  • 11 Beginner Tips for Learning Python

    We are so excited that you have decided to embark on the journey of learning Python! One of the most common questions we receive from our readers is “What’s the best way to learn Python?”

    The first step in learning any programming language is making sure that you understand how to learn. Learning how to learn is arguably the most critical skill involved in computer programming.

  • PyCoder’s Weekly: Issue #380 (Aug. 6, 2019)
  • Genetic Survival Game 'Niche' Will be Free for Schools, on Sale for Everyone Else

    There is one critical caveat, however. Niche will not run on Chromebooks, smartphones, or tablets, so classrooms are going to need to be equipped with at least a low-end PC running Windows 7, Mac OSX 10.8, or Ubuntu 12.04 or higher.

today's leftovers

Filed under
Misc
  • Episode 11: A Conversation with Randy Bias of the OpenStack Foundation

    In this episode, David speaks with long time friend and OpenStack Foundation founding member Randy Bias about the future of Cloud Computing and disrupting technology.

  • SMLR 312 Merge branch ‘floppy’
  • Security updates for Tuesday

    Security updates have been issued by Arch Linux (chromium), Debian (glib2.0 and python-django), Fedora (gvfs, kernel, kernel-headers, kernel-tools, and subversion), Oracle (icedtea-web, nss and nspr, and ruby:2.5), Red Hat (advancecomp, bind, binutils, blktrace, compat-libtiff3, curl, dhcp, elfutils, exempi, exiv2, fence-agents, freerdp and vinagre, ghostscript, glibc, gvfs, http-parser, httpd, kde-workspace, keepalived, kernel, kernel-rt, keycloak-httpd-client-install, libarchive, libcgroup, libguestfs-winsupport, libjpeg-turbo, libmspack, libreoffice, libsolv, libssh2, libtiff, libvirt, libwpd, linux-firmware, mariadb, mercurial, mod_auth_openidc, nss, nss-softokn, nss-util, and nspr, ntp, opensc, openssh, openssl, ovmf, patch, perl-Archive-Tar, polkit, poppler, procps-ng, python, python-requests, python-urllib3, qemu-kvm, qemu-kvm-ma, qt5, rsyslog, ruby, samba, sox, spice-gtk, sssd, systemd, tomcat, udisks2, unixODBC, unzip, uriparser, Xorg, zsh, and zziplib), SUSE (ardana packages, ceph, mariadb, postgresql10, python-requests, and python3), and Ubuntu (bash and glib2.0).

  • From the Railway to the Ether

    Proprietary software is the foundation of the digital colonialism; and Richard Stallman reasoned a “nonfree program is a yoke, an instrument of unjust power.” The closed-source software has limitations of use and distribution which means users cannot create or modify the software to add capabilities not envisaged by its originators.

    However, open-source software alone is not enough to protect the public interest because surveillance capitalism has given rise to centralised internet services beyond the control of the user. The cloud service provides petabytes of information to corporations, who then use the data to train their artificial intelligence systems. So those with the best artificial intelligence services will be able to attract more users giving them even more data to make their services better, and so forth. The concentration of data becomes the concentration of power; in the sense that “data is the new oil.”

  • LibreOffice QA Report: July 2019

    LibreOffice 6.2.5 was announced on July 4
    LibreOffice 6.3 RC1, RC2 and RC3 were released throughout the month
    A Bug Hunting Session for LibreOffice 6.3 RC1 was help on July 8
    The 6 GSOC students passed the second evaluation. Reports with their weekly work are sent to the development mailing list
    Olivier Hallot has created Redaction and FOURIER function new help pages
    Ashod Nakashian (Collabora) implemented multiple selections in Slide sorter
    Tamás Zolnai (Collabora) continues his Interoperable text-based form controls work

today's leftovers

Filed under
Misc
  • Google Engineers Get Windows Booting When Kexec'ed Under Linux [Ed: Waste of Google's time and money. Google has already banned Microsoft Windows for security reasons (the OS is designed to not be secure)]

    An interesting summer internship at Google has led to an experimental effort to get Microsoft Windows running via Kexec from Linux. The engineers involved have been implementing enough of the EFI Boot Services to be able to kexec Windows from Linux.

    Kexec has traditionally just been used for loading and booting alternative Linux kernels from a running kernel using this system call in order to minimize system downtime. Kexec is also used by the likes of Raptor's POWER9 systems for booting the system from Petitboot.

  • CPE Team at Flock

    Flock is just around the corner and the CPE (Community Platform Engineering) Team will be there to join our Community at our annual event. We are also going to be presenting some talks around work that we are involved with and we have one hackfest ready. Let’s go look at what we have in our sleeves for you and hopefully you will join us at these sessions!

  • TensorFlow Lite for Microcontrollers Benchmarked on Linux SBCs

    Dimitris Tassopoulos (Dimtass) decided to learn more about machine learning for embedded systems now that the technology is more mature...

  • YCET wins accolades at Libre Office online test

    The quest for a technologically aware faculty base was satiated to a large extent on Friday by the online examination of Libre Office for spoken Tutorial Project of IIT Bombay which was held at YCET for the Department of Applied Sciences.

  • Reflecting On IndieWeb Summit: A Start

    Another Summit first, also inspired by XOXO (and other conferences like Open Source Bridge), color-coded lanyards for our photo policy. Which was a natural lead-in for the heads-up about session live-streaming and where to sit accordingly (based on personal preference). Lastly, pronoun pins and a huge thanks to Aaron Parecki for arranging the logistics of all those materials!

  • Help Us Improve: SUSE Documentation Survey

    Documentation is an essential part of any product. For many years now, you hear me repeating this over and over again. There is no product which is so simple to use and maintain, that it doesn’t require any description, introduction or examples. This is especially true for enterprise software which covers many use cases. Most software solutions only become usable thanks to detailed documentation. If you work in an IT department and you are responsible for a functioning environment and smooth processes, missing or poor documentation can impact your daily work and even the success of your business.

  • Microsoft hikes cost of licensing its software on rival public clouds, introduces Azure 'Dedicated' Hosts [Ed: Microsoft Tim about Microsoft suffocating/strangling its own 'clients' because Microsoft has a losses issue]

today's leftovers

Filed under
Misc
  • What is Kubernetes-as-a-Service?

    According to wikis, hacker forum discussions and the team itself, Kubernetes is so-named because it translates from (κυβερνήτης in Greek) to governor, helmsman or captain — and further, ‘gubernare’ translates from Latin to government.

    Which all makes perfect sense.

    Because Kubernetes is an open source orchestration technology used to manage Linux containers across private, public and hybrid cloud environments.

    Or… in the words of the people behind the technology: Kubernetes is a portable, extensible, open source platform for managing containerised workloads and services, that facilitates both declarative configuration and automation.

  • Patreon account for Patrick Volkerding’s Slackware

    Everybody who wanted to support Slackware after it became clear that the Slackware Store had not been paying Patrick and family for a long time, but was not prepared to create a PayPal account in order to donate money: there is now an alternative.
    Patreon is a community site where “Patrons support the creators they love in exchange for exclusive membership benefits“.
    I don’t know whether Pat will do stuff like “exclusive benefits” considering the fact that he already gives away Slackware Linux for free since 26 years… anyway, he created a page there where you can setup a monthly recurring payment of one dollar or more – whatever you can spare. Payment methods are either PayPal or credit cards.

  • Ubuntu Weekly Newsletter Issue 590

    Welcome to the Ubuntu Weekly Newsletter, Issue 590 for the week of July 28 – August 3, 2019.

  • Free software activities in May, June and July 2019

    Here is an update covering what I have been doing in my free software activities during May, June and July 2019.

  • RHEL / Centos 6 - Install Nginx Using Yum Command
  • How to Scan QR code without app on PC Windows 10, Linux & Web
Syndicate content

More in Tux Machines

Server: Ubuntu 19.10 Release Schedule, IBM LinuxONE III with Ubuntu and SUSE on Cloud Foundry Foundation and More LF

  • Ubuntu 19.10 Release Schedule and Expected Features

    This is a continually updated article to inform you about Ubuntu 19.10 release date, features and other important things associated with it. The development for Ubuntu 19.10 is nearing its end and it’s time to look at what new features and improvement this new release brings. Ubuntu 19.10 is an important release because it will set the course of development for Ubuntu 20.04 LTS (long term support). I have always felt that the LTS version release takes a lot of features from its predecessor. In other words, Ubuntu 19.10 will be a glimpse of the features you would be getting in Ubuntu 20.04.

  • Announcing the new IBM LinuxONE III with Ubuntu

    Enterprises today need the most secure, and flexible system to support their initiatives, and for that system to grow and evolve for tomorrow. The latest LinuxONE system was designed to support mission-critical initiatives and allow enterprises to be innovative as they design and scale their environment. LinuxONE III provides features for advanced data protection and privacy, enterprise resiliency and scalability, and cloud enablement and integration. Reliability and continuity are critical to the success of any business. With this release, they’ll benefit from up to 10:1 consolidation for key workloads, and up to 190 cores and 40TB of memory. And with 99.999%* availability and up to 7.4x better resilience, enterprises can confidently run and scale their business-critical workloads. The new LinuxONE III provides the highest levels of availability and scalability, so business-critical workloads run flawlessly, recover quickly, and grow seamlessly.

  • Project Quarks: Native Cloud Foundry for Kubernetes

    At the recent Cloud Foundry Summit EU in the Netherlands, Vlad Iovanov of SUSE gave a keynote demo of Project Quarks, the project that integrates Cloud Foundry and Kubernetes, by packaging the Cloud Foundry Application Runtime as containers instead of virtual machines. Vlad explains the current capabilities of Quarks, with a look at its future as a Kubernetes Operator. It’s a fairly technical topic, but Vlad uses creative diagrams and an understandable demo to show the power of Quarks. Cloud Foundry Foundation has posted all recorded talks from CF Summit EU on YouTube. Check them out if you want to learn more about what is happening in the Cloud Foundry world! I’ll be posting more SUSE Cloud Application Platform talks here over the coming days. Watch Vlad’s talk below...

  • Broad Deployment Of Cloud Foundry Almost Double In Just 2 Years

    As businesses embark on their digital transformation journey, developers are driving innovation across cloud native environments for building into the future. According to a recently released report by Cloud Foundry Foundation, 45 percent of user respondents describe their Cloud Foundry use as “broad” compared to 30 percent in 2018 and 24 percent in 2017. The report also revealed that 39 percent of developers are deploying applications in less than one day. What points out towards a healthy and growing community of developers is the fact that almost one in five respondents started using Cloud Foundry in just the last 12 months.

  • The Linux Foundation to Host Open Source Project for Drone Aviation Interoperability

    The Linux Foundation today announced it will host the InterUSS Platform Open Source Project to enable trusted, secure and scalable interoperability between UAS Service Suppliers (USSs) that advances safe, equitable and efficient drone operations. Initial contributors include both industry and regulatory organizations Wing, AirMap, Uber and the Swiss Federal Office of Civil Aviation (FOCA). Similar to the evolution of cities, our skies are becoming busier with traffic. In an effort to unleash innovation and ensure safety, aviation regulators around the world are implementing UAS Traffic Management (UTM, also referred to as U-Space) to support rapidly increasing and highly diverse drone operations. Under UTM, a set of USSs (also known as U-Space Service Providers orUSPs) assist drone operators to conduct safe and compliant operations. USSs can provide service in overlapping airspace and share data when required to support services such as a strategic deconfliction of flight plans and remote identification and industry is developing standards for this data sharing through organizations such as ASTM International. The InterUSS Project provides a forum for collaboration and development of standards-compliant, open source implementations that facilitate communication in the UTM/U-Space environment.

Security Leftovers

  • Security updates for Wednesday

    Security updates have been issued by CentOS (firefox and kernel), Debian (thunderbird), Fedora (curl), openSUSE (curl and python-Werkzeug), Oracle (kernel and thunderbird), Red Hat (rh-nginx114-nginx), SUSE (curl, ibus, MozillaFirefox, firefox-glib2, firefox-gtk3, openldap2, openssl, openssl1, python-urllib3, and util-linux and shadow), and Ubuntu (linux, linux-aws, linux-azure, linux-lts-trusty, linux-lts-xenial, linux-oracle, linux-raspi2, linux-snapdragon, and wpa).

  • SGX and security modules

    Software Guard Extensions (SGX) is a set of security-related instructions for Intel processors; it allows the creation of private regions of memory, called "enclaves". The aim of this feature is to work like an inverted sandbox: instead of protecting the system from malicious code, it protects an application from a compromised kernel hypervisor, or other application. Linux support for SGX has existed out-of-tree for years, and the effort of upstreaming it has reached an impressive version 22 of the patch set. During the upstreaming discussion, the kernel developers discovered that the proposed SGX API did not play nicely with existing security mechanisms, including Linux security modules (LSMs).

  • GitHub acquires Semmle to help developers spot security vulnerabilities [Ed: Company in NSA PRISM pretends to care about security (and also, Microsoft now uses GitHub to change people's code without asking the developers)]

    Software hosting service GitHub has acquired Semmle, a code analysis platform that helps developers discover security vulnerabilities in large codebases.

today's howtos

LWN Articles About Linux (Kernel): Linux Plumbers Conference, Staging, Linux Conference North America, Stable Statistics

  • Topics from the Open Printing microconference

    On day two of the 2019 Linux Plumbers Conference, two of the principals behind the Open Printing project led the very first Open Printing microconference. Project leader Till Kamppeter and program manager Aveek Basu described the current state of printing on Linux and some of the plans for the future, including supporting scanning for multi-function devices. The picture they painted was rosy, at least for printing, which may not quite match the experience of many Linux users. As with many projects, though, Open Printing is starved for contributors—something that was reflected in the sparse attendance at the microconference. Basu began by pointing out that some attendees had likely printed their boarding passes from Linux, which highlights the importance of printing for Linux. People use it for bank documents, transport tickets, and more. He has been at Lexmark for 11 years, working on printing for Linux, macOS, and other Unix-based systems. Kamppeter said that he has been the Open Printing leader since 2001. The idea of the project is to do everything possible to make printing "just work" with Linux and other operating systems; the goal is "plug and print".

  • What happens to kernel staging-tree code

    The staging tree was added to the kernel in 2008 for the 2.6.28 development cycle as a way to ease the process of getting substandard device drivers into shape and merged into the mainline. It has been followed by controversy for just about as long. The recent disagreements over the EROFS and exFAT filesystems have reignited many of the arguments over whether the staging tree is beneficial to the kernel community or not. LWN cannot answer that question, but we can look into what has transpired in the staging tree in its first eleven years to see if there are any conclusions to be drawn there. The core idea behind the staging tree is that it is open to code that does not live up to the normal standards for inclusion into the kernel. Once a driver is added there, it is available to anybody who is brave enough to try to make use of it, but the real purpose is to allow developers to improve the code to the point that it is ready to go into the kernel proper. It serves as an easy place for new developers to try out simple changes and, when it works well, it helps the kernel to gain hardware support that might otherwise languish out-of-tree indefinitely.

  • The USB debugging arsenal

    At the 2019 Embedded Linux Conference North America, which was held in San Diego in August, Krzysztof Opasiak gave a presentation on demystifying the ways to monitor—and even change—USB traffic on a Linux system. He started with the basics of the USB protocol and worked up into software and hardware tools to observe, modify, and fuzz the messages that get sent. Those tools are part of the arsenal that is available to those interested in looking deeply into USB. Opasiak works in Poland for what he called a "small Korean company" (Samsung). He noted that it is not that easy to sniff USB traffic and that the ways to do so are not well known. But "there are no dragons"; nothing bad will happen if you do so. In some ways, USB is like the internet and some of the same tools can be used for both.

  • 5.3 Kernel development cycle statistics

    It's that time of the development cycle again: work on the 5.3 kernel is winding down with an expected final release date of September 15. Read on for LWN's traditional look at where the code in 5.3 came from in this relatively busy development cycle. As of this writing, 14,435 non-merge changesets have been pulled into the mainline repository for 5.3; these changes were contributed by 1,846 developers