If for some reason you want to use Reddit but you still care about your online privacy maybe you should try out libreddit, it aims for a fairly vanilla experience with some nice UI changes that I personally appreciate.
We check-in with Fedora Project lead Matthew Miller on the state of the project, then conduct our exit interview with Fedora 34, and review Fedora 35.
What's new, what's changed, and what's broken. It's a Fedora special.
Special Guests: Matthew Miller and Neal Gompa.
Paula Hunter, Executive Director of Mojaloop, joins Doc Searls and Shawn Powers on FLOSS Weekly to discuss the state of digital payments today. Mojaloop is an open-source project that provides the rails for interoperable digital payments between financial institutions, including banks and mobile phone companies. Particularly, in Africa and other parts of the world, where most people transact business in cash or typically use low-cost Android phones in multiple currencies and countries. It's an early, yet highly promising approach to financial inclusion.
After a little async Ruby chat and developer morality struggle, Chris explains how macOS Monterey has lapped Linux with a critical workstation feature.
This blog post discusses a few alternative Rust-language memory models. I hope that this discussion is of value to the Rust community, but in the end, it is their language, so it is also their choice of memory model.
This discussion takes the Rust fearless-concurrency viewpoint, tempered by discussions I have observed and participated in while creating this blog series. Different members of that community of course have different viewpoints, and thus might reasonably advocate for different choices. Those who know me will understand that these viewpoints differ significantly from my own. However, my viewpoint is dictated by my long-standing privilege of living at the edge of what is possible in terms of performance, scalability, real-time response, energy efficiency, robustness, and much else besides. Where I live, significant levels of fear are not just wise, but also necessary for survival. To borrow an an old saying from aviation, there are old pilots, and there are bold pilots, but there are no old bold pilots.
Nevertheless, I expect that my more than three decades of experience with concurrency, my work on the C/C++ memory model (memory_order_consume notwithstanding), and my role as lead maintainer of the Linux-kernel memory model (LKMM) will help provide a good starting point for the more work-a-day situation that I believe that the Rust community wishes to support.
The hardware monitoring "HWMON" subsystem updates have landed in the Linux 5.16 kernel and with this comes sensor support for some additional ASRock and ASUS motherboards.
Another ASRock ID (0xe1b) was added to the NCT6683D sensor chip driver. There was already an ASRock ID present in the driver but this additional ID is used by some of their motherboards. One of the motherboards specifically called out with this patch was the ASRock Z370M Pro4, but likely numerous other ASRock motherboards as well will now have working sensor coverage.
Google makes good use of Linux across its platforms, especially when it comes to Android and its massive servers. Over the years, Google has been inclining more towards open-source projects and programs.
Recently, the tech giant sponsored $1 million to fund a security-focused open-source program run by The Linux Foundation, more details in our original coverage.
And, now, Google just tripled its bounty rewards for the next three months for security researchers working on finding kernel exploits that help achieve privilege escalation (i.e., when an attacker gains administrator access using a bug/flaw)
All of the DRM (Direct Rendering Manager) kernel graphics/display driver updates were submitted and already merged for the very exciting Linux 5.16 kernel cycle. There is a lot of good stuff this round especially when it comes to the open-source Intel and AMD Radeon drivers.
Along with the Btrfs updates, other Linux file-systems have also been sending in their improvements destined for the Linux 5.16 kernel.
EROFS as the new read-only file-system for Linux has seen many interesting changes. EROFS now supports LZMA (MicroLZMA) compression, multiple device support is introduced for multi-layer container images, secondary compression head support, and other improvements. There is also the usual assortment of bug fixes.
In addition to IO_uring improvements in Linux 5.16 itself, the Security Enhanced Linux "SELinux" patches for this new kernel cycle bring controls and auditing around IO_uring.
With the SELinux patches sent out on Monday, there is now Linux Security Modules (LSM), SELinux, and Smack controls and auditing support for IO_uring.
ProtonUp-Qt is a graphical tool that makes it easy to install and manage compatibility tools like Proton-GE and Luxtorpeda for Steam, and Wine-GE, Kron4ek Vanilla and Lutris-Wine builds for Lutris. Recently, the tool has also added support for Heroic Games Launcher.
Using these custom Proton / Wine builds, you can take advantage of various game bug fixes and other patches that take more time to land in the official builds.
The software is based on ProtonUp, a command line only tool to install and update Proton-GE.
GStreamer 1.19.3 unstable development release
The GStreamer team is pleased to announce the third development release in the unstable 1.19 release series.
The unstable 1.19 release series adds new features on top of the current stable 1.18 series and is part of the API and ABI-stable 1.x release series of the GStreamer multimedia framework.
The unstable 1.19 release series is for testing and development purposes in the lead-up to the stable 1.20 series which is scheduled for release in a few weeks time. Any newly-added API can still change until that point, although it is rare for that to happen.
The Emacs documentation on copying and pasting, which is in the GNU info format and can be accessed by C-h i from Emacs, is very detailed and comprehensive. In my version of emacs (26), it is in section 12, “Killing and Moving Text”. I can see the Emacs info documentation on this topic with shell command info “(emacs)Killing” | less
It is also a lot to read. This document aims to be an introduction and quick reference.
This tutorial explains how to install and configure the Pfsense system.
pfSense is a firewall and router software you can install on a computer to create and manage your own router or firewall. It can be used from the command line or from a web graphical interface. This tutorial covers pfSense installation and basic configuration tips.
Arch Linux is hugely popular in the desktop Linux world. One of the reasons for the popularity is that installing Arch Linux itself is a complicated task.
I am not exaggerating. Installing Ubuntu or Debian is a lot easier task than Arch Linux because it doesn’t have an official GUI based installer. And this is where virtual machines come in.
You can try installing Arch Linux in VirtualBox first and see if it’s something you would like to run on actual hardware. This way, you get to experience Arch Linux without disturbing your current operating system.
Imagine the hard drive in your computer failing. Your computer no longer detects it, and it’s impossible to recover the data that you saved. This is a nightmare scenario for just about anyone. You will end up wishing that you had a backup of everything on your hard drive.
Luckily, this is possible and much easier than you may think. There are many different available Linux programs that will help you back up your hard drive, including one that is already installed by default in every Linux distribution.
EPrints is open-source software designed for building open access repositories that are OAI-PMH compliant. It is primarily used for scientific journals and institutional repositories although it can be also used as a document management system.
In this video, I am going to show how to install Kubuntu 21.10.
Ansible is an open source IT automation engine that automates provisioning, configuration management, application deployment, orchestration, and many other IT processes. It enables infrastructure as code. Ansible automates and simplifies repetitive, complex, and tedious operations. It runs on many Unix-like systems, and can configure both Unix-like systems as well as Microsoft Windows.
Ansible itself is written in Python and has a fairly minimal learning curve. Ansible follows a simple setup procedure and does not depend on any additional software, servers or client daemons. It manages nodes over SSH and is parallel by default.
In this guide, we are going to learn how to Install and Configure Ansible on Rocky Linux/CentOS 8.
Fedora 35 stable version has finally arrived! The most notable of the improvements is the inclusion of the recently-released Gnome 41. You can get Fedora Workstation 35 now from the official website, or upgrade your existing install using GNOME Software or through the terminal with dnf system-upgrade. This article describes how to install Fedora 35 Workstation step by step with screenshots.
Fedora is a free and open source Linux distribution developed by the community-supported Fedora Project which is sponsored primarily by Red Hat. Fedora comes in several Desktop and Server flavors.
Fedora works mainly as an upstream distribution for Centos 8 Steam and Red Hat Enterprise Linux. This means that with Fedora comes the latest Linux Kernel and packages with cutting edge features and applications.
Today we are looking at how to install Brackets code editor on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
Chrome for Windows, Mac, and Linux now allows for users to autorun web apps on login as of Chrome 91. This is great for quickly accessing Gmail, Google Chat, and other such services that are used constantly and as soon as users boot into their machines.
With that being said, a manual user gesture is always required in order to initially set up autorun apps in Chrome. Google detailed this in its blog post yesterday. If you’re interested in setting your Chrome apps up this way, just stick around, and I’ll show you how!
Developers and sysadmins often need to use sensitive data, such as API tokens or login credentials to a database. When containerizing applications, this data needs to be passed into the container without the risk of exposure outside the container, such as in an image registry. Podman has a feature—secrets—that allows users to centrally manage sensitive information and to easily and securely access confidential data inside a container. This feature prevents the secret from being exported when creating an image from a container.
Recently, Podman's secrets feature was extended to support even more features, such as user ID (UID), group ID (GID), Mode options, and environment variable secrets. These options allow users to fine-tune their secrets settings to their liking, whether it be restricting permissions or exposing the secret via an environment variable as opposed to a file.
Setting up a Proxmox VE cluster enables you to benefit from multiple servers to share load between, and also gives you access to live migration. In this video, we'll create our very own cluster and add two additional Proxmox VE servers.
In this tutorial, we will show you how to install CakePHP on Debian 11. For those of you who didn’t know, CakePHP is a web application development framework written in PHP, built on the concepts of Ruby on Rails. As we know Ruby on Rails uses Ruby as a language but with development features that Cake wanted to implement in PHP. It’s a foundational structure for programmers to create web applications. Models, Views, and Controllers are used for the separation of business logic from data and presentation layers.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Gitea on a Debian 11 (Bullseye).
In most situations, we use Ansible to manage and configure remote hosts from a single control node. Hence, when creating playbooks, it’s with the understanding that they shall execute on the remote machines we specify in the host’s block of the playbooks.
However, there are instances where you may need to perform a specific action on the local machine instead of remote hosts. In such instances, a feature like local_action comes in handy.
This guide will show you how to work with the Ansible local_action module to execute tasks locally.
Ansible supports conditional evaluations before executing a specific task on the target hosts. If the set condition is true, Ansible will go ahead and perform the task. If the condition is not true (unmet), Ansible will skip the specified task.
To implement conditions in Ansible, we use the when keyword. The keyword takes Boolean expressions based on a value or a variable from previous tasks or facts gathered from the remote hosts.
This guide will teach you how to implement conditions in Ansible playbooks using the when keyword.
Managing users and user attributes is a typical operation for any system administrator. The Ansible user module is one of the handiest ways to manage users and their attributes when working with remote hosts. Ansible.builtin.user module is part of ansible-core and is available by default in most ansible installations.
In this guide, we will focus on how to manage user accounts using the ansible user module.
In Linux, the stat command is a command-line utility that provides detailed information about filesystems or files.
Ansible, considered the most diverse and popular automation tool, provides a module for fetching file and file system information as native Linux stat command.
In this guide, we will understand how to work with the stat module in Ansible playbooks.
Ansible is an incredible automation utility that comes packed with features and tools to manage remote hosts. It works by implementing modules to perform specific tasks and operations.
One practical module in Ansible is the file module. This module is responsible for performing tasks such as creating files and directories, deleting files and directories, creating soft and hard symbolic links, adding and modifying file and directory permissions, and more.
This guide will walk you through how to work with the Ansible file module. We will illustrate this using a collection of examples and playbooks.
NOTE: Ensure you have access to your remote hosts specified in Ansible’s inventory file.
In Ansible, a handler refers to a particular task that executes when triggered by the notify module. Handlers perform an action defined in the task when a change occurs in the remote host.
Handlers are helpful when you need to perform a task that relies on a specific task’s success or failure. For example, you can set a handler to send Apache logs if the service goes down.
This article will help you understand how to define and use the Ansible handler in playbooks.
In this guide we are going to learn how to install MongoDB 5.0 Community Edition on a Fedora 34/35 server.
MongoDB is a cross-platform document-oriented NoSQL database program that uses JSON-like documents with optional schemas. MongoDB is developed by MongoDB Inc. and licensed under the Server Side Public License.
Instead of storing data in tables of rows or columns like SQL databases, each record in a MongoDB database is a document described in BSON, a binary representation of the data. Applications can then retrieve this information in a JSON format.
Although modern PCs no longer come with a physical serial port, plenty of devices still require RS232 serial communication to interact with them. With the help of an RS232-to-USB adapter you can easily connect them to your PC. Once connected, you might wonder: How do I monitor the serial port in Linux? Luckily several tools exist, both for the terminal and with a GUI. In this article I’ll introduce you to few popular programs to monitor the serial port in Linux.
You can sort Elasticsearch results using the sort keyword. The sort query requires you to provide a field under which to sort. Elasticsearch does not support sorting on fields of type text.
In this short guide, we will look at how to sort query results in Elasticsearch.
By default, Elasticsearch uses a relevance score to sort the results from a search query. A relevance score determines how relevant a document is depending on the queried data.
However, we can apply filters to narrow down and maximize the relevant documents returned from a query.
This guide will learn how to apply conditions in an Elasticsearch query to filter out more precise query results.
Elasticsearch is a free, open-source, distributed search and analytics engine based on the Apache Lucene project. It provides a robust RESTful API to manage and work with the engine. Elasticsearch is fast, highly scalable, and secure.
Elasticsearch engine is responsible for ingesting data, storage, analysis. Although Elasticsearch is powerful as a standalone service, it becomes mightier when powered with its sisters’ services such as Kibana and Logstash.
This tutorial will show you how to install Elasticsearch and Kibana and discover how to enable Elasticsearch security feature: Xpack.
Using the _ mapping API, you can update existing fields or add new fields to an existing index.
In Elasticsearch, we can get the results of documents that match a specific range using the range query.
Throughout this guide, you will learn to define a range parameter in your search query using Boolean expressions such as greater than, less than, and more.
Have you ever wondered how search engine tools such as Google can accurately predict your search queries as you type? Or correct typos in your search queries? No, it’s not human-like reasoning.
This functionality is possible because of a concept called fuzzy logic, fuzziness, or fuzzy search.
Ruby is a simplistic and powerful programming language that provides exceptional features for daily programming operations.
Because arrays are a fundamental object in Ruby and other programming languages, Ruby provides a way to sort elements without writing an excellent custom algorithm.
This guide will teach you how to sort an array by using Ruby’s built-in methods and functionalities.
Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration and continuous delivery.
Jenkins is a server-based system that runs in servlet containers such as Apache Tomcat. It supports version control tools, including AccuRev, CVS, Subversion, Git, Mercurial, Perforce, ClearCase and RTC, and can execute Apache Ant, Apache Maven and sbt based projects as well as arbitrary shell scripts and Windows batch commands.
In this article, we will show you how to install Jenkins on Ubuntu Systems.
In this tutorial we are going to install kdenlive on Debian 11. Kdenlive is an acronym for KDE Non-Linear Video Editor.
Kdenlive is open source non-linear video editing suite, which support DV, HDV and many more formats.
Hello, friends. In this post, you will learn how to install Syncthing on Ubuntu 20.04 This cool tool allows us on our server to have instant access to one or more folders on many devices. So we are talking about a synchronization tool.
So, let’s go for it.
For those enjoying Steam Remote Play in-home streaming functionality, the latest Steam client beta now supports making use of the Video Acceleration API for encoding.
Last night's Steam client beta adds support for VA-API hardware encoding on Linux with Remote Play. This VA-API video accelerated encoding has been tested to work with both AMD Radeon and Intel graphics hardware having driver support for this API.
As this is a high-end gaming PC, it comes with plenty of power, and you can customize it to add some more power if you need to. You can choose between an NVIDIA GeForce RTX 3070 or an NVIDIA GeForce RTX 3080. Either one will handle most games, but of course, you’re limited by the games offered on Linux.
In spite of the high-end graphics card, the display is an FHD Panel, so you won’t be able to get up to any 4K gaming.
Skanpage is KDE's new image scanning app. It's a simple scanning application designed for multi-page scans and saving of documents and images.
It works for scanning from both flatbed and feed-through automatic document feeder scanners. It lets you configure options for the scanning device, such as resolution and margins, and you can re-order, rotate and delete scanned pages. The scans can be saved to multi-page PDF documents and image files.
Unlike our existing Skanlite app, this new program is written using Kirigami, our responsive interface toolkit which adapts to mobile and desktop devices.
You can get Skanpage from KDE neon now, and look out for it on other Linux distros soon.
Do you have an old computer? Do you love KDE Plasma? If your desktop or laptop was produced before 2011 or has memory no more than 4GB, it might be 32-bit, like those with Intel Pentium or AMD Athlon processor. You can revive it with one of KDE Plasma Desktop systems mentioned in this article, for example, Debian or Tumbleweed, and you can do your daily work with up to date applications and even games.
This is a list of Free Software Desktop Systems, like KDE and GNOME the desktop environments, and like Kubuntu and Ubuntu the operating systems, and whether one is available as a complete computer to purchase. In this article, you will find useful information and further readings about the user interface choices available on GNU/Linux and BSD computing platforms. This will be used further on UbuntuBuzz.com to accompany every desktop related explanation.
The final version of LibreELEC 10.0.1 has been released, bringing Kodi (Matrix) v19.3 to LibreELEC users.
Users of LibreELEC 10 Beta or RC1 get an automatic update to the final version. LibreELEC 9.2 setups will not be automatically updated, you will need to manually update.
We can offer stable and good working versions for Allwinner, Generic and Rockchip devices. The RPi4 is also in good shape but the codebase is rather new, so it is not polished yet (keep reading for details).
The "AMDGPU" kernel graphics driver has been ported and pulled into the DragonFlyBSD operating system.
Open-source developer Sergey Zigachev has ported the AMDGPU kernel driver from Linux to DragonFlyBSD and as of today is now in that open-source operating system's upstream code-base.
Today we are looking at Fedora 35 KDE Plasma Desktop It comes with Linux Kernel 5.14, KDE Plasma 5.22.5, and uses about 2GB of ram when idling. Enjoy!
In this video, we are looking at Fedora 35 KDE Plasma Desktop.
A long, long time ago, a young man named Sage Weil had a doctoral dissertation to complete. He sat in his living room (I presume) and thought to himself, “How can I improve Software-Defined Storage?”*
Powered by the Linux 5.14 kernel series, Red Hat Enterprise Linux 9 Beta is here to give the community a preview of the next major release of the award-winning and acclaimed Red Hat Enterprise Linux operating system for desktop, server and cloud computing.
Red Hat Enterprise Linux 9 Beta introduces enhanced web console performance metrics to better identify various causes that may affect the performance of your systems, along with the ability to export these metrics to popular analysis and reporting tools like Grafana.
Red Hat Enterprise Linux (RHEL) 9 Beta is now available and delivers exciting new features and many more improvements. RHEL 9 Beta is based on upstream kernel version 5.14 and provides a preview of the next major update of RHEL. This release is designed for demanding hybrid multicloud deployments that range from physical, on-premises, public cloud to edge.
We’ve been working hard on Red Hat Enterprise Linux 9. Red Hat Enterprise Linux 9 Beta is now available—and it’s been built with production stability and development agility in mind. Built from CentOS Stream, Red Hat Enterprise Linux 9 Beta delivers an easier application development experience based on a new platform with powerful capabilities.
Red Hat today announced the first public beta of the upcoming Red Hat Enterprise Linux 9.0.
Red Hat Enterprise Linux 9.0 brings improvements to its Cockpit web console including the ability now to apply kernel live patches from the web console. RHEL 9 Beta also has additional security profiles, integrated OpenSSL 3 support, IMA integration, SSH root password login is finally disabled by default, improvements around container development, and more. There is also a wealth of updated packages like using GCC 11 as the default system compiler, Python 3.9, LLVM 12, and other updates.
Red Hat has launched its eponymous Red Hat Enterprise Linux (RHEL) 9 beta and promised admin and IT ops people there will be less of a need for them to learn new ways of doing things.
Red Hat said the latest beta is based on upstream kernel version 5.14 and provides a preview of the next major update of RHEL. It punted the new version as being designed for “demanding hybrid multi-cloud deployments that range from physical, on-premises, public cloud to edge”.
Fedora 35 Available to Download and Upgrade with GNOME 41, The release of the new stable version of the Fedora 35 distribution finally came after delays two weeks later. Also thanks to additional tests, Fedora Server 35 and Fedora Workstation 35 should have good enough stability, taking into account the large number of changes, updates and news in this release.
WirePlumber allows for more customization of the policy and rules for audio and video. It provides a richer development experience and adds bindings for most languages. If you enable the third-party repositories that ship in Fedora Linux desktop variants, those repositories are now immediately available. Additionally, enabling third-party repositories now makes selected Flathub applications available via a filtered Flathub remote. This eases access to a curated list of applications that will not cause legal or other problems for Fedora to point to, does not overlap Fedora Flatpaks, and works reasonably well.” The release announcement offers further details.
Fedora Linux 35 is now available for workstations (laptops or desktops), servers, or IoT devices. Among other things, the update brings Linux kernel 5.14 with improved hardware support, and the GNOME 41 and KDE Plasma 5.23 desktop environments.
You can download the latest version of Fedora from the GetFedora website, or if you’re already running Fedora 34 or older, you can update your operating system to get the latest versions.
For those who use Fedora for more than a developer platform, the Fedora server family has improvements as well. For example, Fedora 35 Cloud images will now have hybrid BIOS+UEFI boot support. With this update, if UEFI doesn't work for you you have legacy BIOS support to fall back on.
Btrfs is now Fedora Cloud's default file system. The big win here is you can take advantage of transparent compression to save filesystem space.
Put it all together and as Miller says, "With Fedora 35, the Fedora Project continues towards our vision of a world where everyone benefits from free and open-source software built by inclusive, welcoming, and open-minded communities. We prioritize bringing the latest Linux innovation to our users. This latest version is focused on polishing features and support for improved performance and an even better user experience - helping to bridge the gap between new and expert users."
Ready to try it? You can download Fedora and install it on a new machine or virtual machine (VM). Or, if you're already a Fedora user you can run the latest release by updating your current Fedora.
Just about anything can seem like a smart strategy in retrospect if you’ve got enough patience, perseverance, luck, and time.
That’s how some successful business and IT approaches hatch: A blend of trial-and-error and ever-changing circumstances eventually leads to a sustainable, intentional plan. Many hybrid cloud architectures first came about by “accident,” for example – an IT initiative here, a corporate acquisition there, and SaaS apps, well, everywhere, and now you’re “hybrid.” The strategy comes after the fact, once stakeholders realize the potential advantages.
Automation commonly follows a similar pattern. Automate a unit test or security scan here, an accounts receivable process or HR onboarding forms there, and it seems you’re on your way to becoming a well-oiled – and highly automated – machine.
On Tuesday Intel said it was going the Linux way for system upgrades in factories. Chipzilla has worked with Red Hat on a blueprint that provides a more granular coordination of machines' operation between facilities, which is now being made possible on the faster 5G networks.
Red Hat was proud to sponsor this year's NodeConf Remote, Europe’s largest conference covering the Node.js framework. The conference held four packed days of technical talks and workshops from October 18 to 21, 2021. Like last year, this year's conference was presented remotely.
Red Hat Enterprise Linux (shortened to RHEL) 8.4 is now available for the Linux customers. RHEL 8.4 has various updates and enhancements for developers, designers, and production teams. So now you can download the latest version from Red Hat’s official site.
But before downloading RHEL 8.4 you might want to have a sneak peek at all the new features offered by this model. This article will explain that and then will take you through the upgrade procedure using the dnf command-line option.
Red Hat doesn't just talk about transformation, we do transformation with our clients, hands-on.
I recently committed code into a code repository for a transformation project, working alongside our customer and the Red Hat APAC Open Innovation Labs team in a residency-style engagement. Let's talk about why Red Hat customers choose to work with us to transform vital parts of their business.
Organizations realize that transformation needs to be people-centric. It can’t be only top-down, theoretical, or unrelatable to outcomes. That only allows room for fear and change resistance to grow.
It needs to come with globally proven practices, methodologies and processes. It needs to build on innovative open source, cloud-ready technology and bring people together on the journey of collaboration, information sharing—in a safe environment to learn and grow.
That’s what the Red Hat approach is all about. And I’ll walk you through the details now.
A new desktop has been implemented to APTus AppCenter: Sugar
Along with the work-in-progress new Ubuntu desktop installer, another GUI project being pursued by Canonical going into the Ubuntu 22.04 LTS cycle is the "firmware-updater" as a firmware updating GUI solution written in the Flutter toolkit and Dart.
Canonical has been quietly working on firmware-updater as a GUI front-end for handling firmware updating on Ubuntu Linux. Fortunately, this isn't reinventing the wheel entirely but basically a Flutter-geared GUI front-end to the wonderful FWUPD utility with the Linux Vendor Firmware Service.
Adlink announced two rugged, Ubuntu/ROS driven robotics controllers: a “ROSCube Pico NPN” SBC or box PC based on the Jetson Nano and Xavier NX with 4x GbE and a “ROSCube Pico TGL” box PC based on Tiger Lake-U with 2.5GbE and GbE.
Today at the Robotics and Automation 21 show in Coventry, UK, Adlink unveiled two ROSCube Pico robotics controllers. The ROSCube Pico NPN is available in both board-level and enclosed models, both with a choice of Nvidia Jetson Nano and more powerful Jetson Xavier NX modules. The ROSCube Pico TGL taps an 11th Gen Tiger Lake ULP processor in a box PC form factor and ships with Intel OpenVINO.
While the ESP32 is clearly a superior piece of hardware, we think you’ll agree that the ESP8266 is just too useful not to have a dozen or so kicking around the parts bin at any given time. Cheap, easy to use, and just enough capabilities to bring your projects into the wonderful world of IoT. But if you really want to get the most out of it, you’ll eventually have to skip the development board and start working with the bare module itself.
It can be a scary transition, but luckily, [Ray] has collected some notes that should prove helpful for anyone looking use modules like the ESP-12F in their own custom PCBs. From different tips on making sure the power-hungry modules get enough juice, to cost cutting measures that help reduce the ancillary parts needed in your circuit design, it’s a worthwhile read for new and experienced ESP8266 wranglers alike.
Conexio Stratus board is equipped with Nordic Semi nRF9160 System in Package (SiP) with LTE-M (eMTC) & NB-IoT cellular IoT connectivity as well as GPS support through a pair of u.FL connectors for antennas, together with 500MB of mobile data valid for ten years.
Detecting shapes and gestures has traditionally been performed by camera systems due to their large arrays of pixels. However, Jean Peradel has come up with a method that uses cheap time-of-flight (ToF) sensors to sense both objects and movement over time. Better yet, his entire project is housed within a 3D-printed “Grumpy Hedgehog” that contains not only the sensors, but a highly-interactive 1.44” LCD screen as well.
Peradel’s smart home companion is capable of picking up several different kinds of movements and patterns to perform a wide variety of actions such as sending keystrokes to a PC, controlling a light, or actuating a servo motor. This is accomplished by taking VL53L1X ToF modules, which have a 16Ãâ16 scanning array and communicate over the I2C bus. Once the attached Arduino MKR WiFi 1010 has read this data, it can determine if the object (which appears closer on the grid) has moved up, down, left, or right.
The CrowPi2 looks like an ordinary laptop with an 11.6-inch screen with 1080p resolution, but it's also a nifty Raspberry Pi experimentation and learning platform. You can remove the wireless keyboard from the case to reveal a development board with bunch of different onboard sensors and modules, and components such as an LCD display and a solderless breadboard.
Yesterday, when we were reporting on Canonical’s release of Ubuntu images optimized for Intel’s Elkhart Lake and Tiger Lake processors, we saw several patch notices referring to the EHL. Aaeon then confirmed that the patches referred to its PICO-EHL4 SBC, which was revealed with no image and very few details a year ago after Elkhart Lake was announced. Aaeon has since posted specs, apparently in late September when it announced the board, on Aaeon’s newsletter. We also cover Aaeon’s Tiger Lake-U based GENE-TGU6 3.5-inch SBC, which we detailed in May based on a preliminary product page and which Aaeon has now formally launched with some minor changes.
Whether you’re a tech hobbyist interested in dabbling in technical writing or an established technologist looking to pivot your career to become a professional technical writer, you can build your technical writing portfolio with open source contributions. Writing for open source projects is fun, flexible, and low risk. Contribute to a project of interest to you on your own schedule, and you might be surprised at how welcoming the community can be or how fast you can make an impact.
Your open source contributions show potential employers that you take the initiative and seek opportunities to learn, grow, and challenge yourself. As with anything, you have to start somewhere. Contributing to open source projects allows you to showcase your talents while also learning new skills and technologies. In addition, writing for open source projects enables you to connect with new communities, collaborate with new people across time zones, and build your network. When you dig into open source opportunities, you enhance your resume and set yourself apart from other candidates. Here are four ways to get started with contributing to open source that can lead to a career in technical writing.
A number of System76 laptops saw their Coreboot open-source firmware ports merged to the mainline code-base today.
System76 has been porting their laptops to running off Coreboot for the maximum extent possible for open-source, when Intel's FSP and the like do not get in the way. System76 has been successful in this ongoing endeavor and a number of their devices today saw the support merged into mainline Coreboot.
Ever considered doing research about online communities, free culture/software, and peer production full time? It’s PhD admission season and my research group—the Community Data Science Collective—is doing an open-to-anyone Q&A about PhD admissions this Friday November 5th. We’ve got room in the session and its not too late to sign up to join us!
The list of the noticeable enhancements in Firefox 94 includes Colorways, site isolation, as well as multiple performance and security improvements.
The latest stable version of the Firefox web browser, version 94, is now rolling out. There’s quite a bit going on with a couple of new features, some add-ons updates and a whole lot of performance fixes and improvements.
There are also all important security updates which roll out in every version update and new release to the browser.
Today, Tuesday, Mozilla officially releases Firefox 94 and Firefox ESR 91.3 at the same time. As usual, the new versions have been on the servers since yesterday . Linux users can look forward to more speed in WebGL rendering and less energy consumption, because the OpenGL API is also changing from GLX to its modern successor EGL under X11 , as Mozilla developer Martin Stransky reports in his blog .
On the first launch of Firefox 94, a dialog will pop-up allows you to choose between color schemes. By clicking on “Explore colorways“, it allows to choose between 6 color palettes with live preview. And each has ‘Soft’, ‘Balance’, and ‘Cold’ colors to choose from.
For those using Mesa driver >= 21, Firefox 94 now uses the Linux graphics stack EGL instead of GLX. This will increase WebGL performance and reduce resource consumption. Ubuntu 21.04 and Ubuntu 21.10 may have the benefit, though proprietary Nvidia driver is not supported at the moment.
The new Firefox introduced a “about:unloads” page, allows users to manually unload inactive tabs to release system resources. Though it can be disabled by settings “browser.tabs.unloadOnLowMemory” to false.
Mozilla has released security updatesââ¬Â¯to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.ââ¬Â¯
CISA encourages users and administrators to review the Mozilla security advisories forââ¬Â¯Firefox 94 and Firefox ESR 91.3.
Tired of that unsettling feeling you get from looking for paywalled papers on that one site that shall not be named? Yeah, us too. But now there’s an alternative that should feel a little less illegal: this new index of the world’s research papers over on the Internet Archive.
It’s an index of words and short phrases (up to five words) culled from approximately 107 million research papers. The point is to make it easier for scientists to gain insights from papers that they might not otherwise have access to. The Index will also make it easier for computerized analysis of the world’s research. Call it a gist machine.
Technologist Carl Malamud created this index, which doesn’t contain the full text of any paper. Some of the researchers with early access to the Index said that it is quite helpful for text mining. The only real barrier to entry is that there is no web search portal for it — you have to download 5TB of compressed files and roll your own program. In addition to sentence fragments, the files contain 20 billion keywords and tables with the papers’ titles, authors, and DOI numbers which will help users locate the full paper if necessary.
We can think of arrays as databases or, more specifically, a table within a database. The main use of arrays is to store related items in a single entity, allowing you to manage them efficiently.
This tutorial will illustrate how to filter the results from an array using the select, find and reject methods.
Within the C++ language, there are some objects specified in libraries to do some specific tasks. Just like this, the iostream library has been used to input and output the data to an input and output device while using C++. The “cout” object is the main object used to display the data to a device screen while including the “iostream” header file in the code. Let’s have some examples to see the format of the C++ cout statement in Ubuntu 20.04.
We all know that many of the basic concepts of programming contain many data structures, variables, statements, and loops. Loops are very well-known among all of them when running a series of instructions or doing some tasks under certain conditions. The most famous and most used loop is the “for” loop. So, today we will be looking at the syntax and working of the “for” loop for a series of numbers, i.e., 1 to 10. Let’s start by opening a terminal shell with the help of a “Ctrl+Alt+T” command on the Ubuntu 20.04 desktop system.
Both arrays and dictionaries share a common trait in all major programming languages: they are both flexible and scalable data structures that help organize and refactor code.
In certain instances, the need to convert an array to a hash and vice versa comes up. In this guide, we shall discuss how you can convert an array to a hash in Ruby.
How NyQuil, the over-the-counter cold medicine of choice for millions of sniffling people, innovated by combining a bunch of drugs together in a novel way.
Fox News wrote an article praising Ron DeSantis, Governor of Florida, for having no COVID now to speak of.
That’s very easy to do when you fire all of the people from the state health department who would tell the public the truth and criminally prosecute those who continue to do so anyway, and then you re-define what COVID cases and deaths are.
Beginning in 2019, the EPA stopped releasing crucial toxics reports. Even agency staffers have a hard time accessing them.
At some point you have to ask yourself if major OS updates ever go smoothly. It seems there are always problems of some sort, whether macOS, Windows, Android, or iOS. This week’s “lucky winner” is the macOS Monterey update that was just released last week. Some users of older machines are complaining of their Macs not restarting after installing the macOS Monterey update.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the NextArch Foundation. The new Foundation is a neutral home for open source developers and contributors to build next-generation architecture that can support compatibility between an increasing array of microservices.
The LFX platform hosts community tools for security, fundraising, community growth, project health, mentorship and more. It supports projects and empowers open source teams to write better, more secure code, drive engagement and grow sustainable ecosystems.
Security updates have been issued by Fedora (CuraEngine, curl, firefox, php, and vim), openSUSE (apache2, pcre, salt, transfig, and util-linux), Oracle (.NET 5.0, curl, kernel, libsolv, python3, samba, and webkit2gtk3), and Red Hat (flatpak).
Despite all the efforts of fixing Cross-Site Scripting (XSS) on the web, it continuously ranks as one of the most dangerous security issues in software.
In particular, DOM-based XSS is gaining increasing relevance: DOM-based XSS is a form of XSS where the vulnerability resides completely in the client-side code (e.g., in JavaScript). Indeed, more and more web applications implement all of their UI code using fronted web technologies: Single Page Applications (SPAs) are more prone to this vulnerability, mainly because they are more JavaScript-heavy than other web applications. An XSS in Electron applications, however, has the potential to cause even more danger due to the system-level APIs available in the Electron framework (e.g., reading local files and executing programs).
The following article will take a deeper look into Mozilla’s eslint-based tooling to detect and prevent DOM-based XSS and how it might be useful for your existing web applications. The eslint plugin was developed as part of our mitigations against injection attacks in the Firefox browser, for which the user interface is also written in HTML, JavaScript and CSS.
Researchers have outlined a method that could be used by bad actors to push vulnerabilities into source code that are invisible to human code reviewers.
In a paper released this week, two researchers at the University of Cambridge in the UK wrote that the method – which they dub “Trojan Source” – essentially can be leveraged against almost every programming language in use today and could be effective in supply-chain attacks similar to the one launched against SolarWinds last year.
Today, the U.S. Government added NSO Group, Candiru, and two other foreign companies to the Entity List for engaging in activities contrary to the national security or foreign policy interests of the United States.
While long overdue, Access Now applauds this announcement, and urges the European Union and other governments to implement similar restrictions on surveillance tech companies who facilitate human rights violations.
“This is a huge win,” said Natalia Krapiva, Tech-Legal Counsel at Access Now. “NSO and Candiru like to brag that their spyware technologies are all about protecting public safety and national security. But here, we have the United States, a major power, coming out and saying these companies are violating not only human rights, but also U.S. national security.”
The Federal Bureau of Investigation (FBI) has released a Private Industry Notification (PIN) on ransomware actors using significant financial events, such as mergers and acquisitions, to target and leverage victim companies.
CISA encourages users and administrators to review Ransomware Actors Use Significant Financial Events and Stock Valuation to Facilitate Targeting and Extortion of Victims and apply the recommended mitigations.
It is possible to bypass certain AVs by encoding executables containing payloads with tools such as Msfvenom. Alternatively, using tools such as Shellter or Veil to create custom Portable Executables (PE) capable of bypassing common anti-virus solutions. These tools also allow you to inject payloads into legitimate software to even better mask your malicious code from the AV.
These tools can be successful at performing their task, however if one used the same binary several times there is a good chance it would be added to existing AV/EDR signature databases. Using websites like VirusTotal to test the detection rate of your executables will also likely speed up the process of your malware getting added to a AV signature database. In general, uploading binaries onto a target currently is a bit of an unnecessary risk, therefore I wanted to look into ways of performing lateral movement with malware that does not need to be transferred to the disk of the target.
The great thing about Cobalt Strike is the option to execute .NET binaries in memory of the target (execute-assembly), without needing to transfer it. Following the same idea, I wanted to be able to transfer malware to the target, that would execute in memory and avoid the unnecessary triggering of AV by the fact that it is present on the disk. I came across a technique called reflective DLL injection and thought it was genius.
Reflective DLL injection involved loading a .NET Dynamic Link Library (DLL) into the memory of the target. Common tooling such as powershell can be used to load the DLL and allows the execution of your choice of methods available within the DLL. This results in diskless malware execution. I liked the concept however, performing the preparation for such a task was slightly lengthy, therefore my programmer instincts kicked in and I thought why not create some automation.
Back in February 2021, the American Federation of Teachers (AFT) and the National Education Association (NEA) lobbied the Centers for Disease Control (CDC) to extend COVID restrictions that perpetuate public education’s reliance on privatization, specifically from Big Tech companies, which have been raking in record profits by selling schools ed-tech products to deliver online instruction during lockdowns. While the AFT and the NEA appealed to public health and safety rationales, their CDC lobbying efforts were couched in their conflicts of interest with Big Tech companies, such as IBM; corporate philanthropies, including the Rockefeller Foundation; globalist non-governmental organizations, like the Trilateral Commission; and world governance institutions, such as the United Nations Educational, Scientific, and Cultural Organization (UNESCO).
Lobbying the CDC to add COVID restrictions for in-person learning that perpetuate Big Tech privatization was just a pit-stop on the way toward these same teachers’ unions pushing mandatory coronavirus jabs for students and educators who will be required to verify their vaccination status with compulsory digital immunizations passports platformed on blockchain and other “distributed ledger technologies” (DLTs). Now that President Joe Biden has called on state governors to mandate COVID vaccination for all school employees and students, the AFT and the NEA are fully on board with the state and federal proclamations forcing their dues-paying teachers to get jabbed along with students. By backing government-mandated vaccinations for school employees and students, the AFT and the NEA are rolling out the red carpet for digital vaccine passports through blockchain DLTs that will be used to aggregate students’ electronic health records (EHRs), “learning analytics,” workforce competency algorithms, and criminal histories into “Social Credit” scores which will determine access to the public square and private markets – a technocratic system planned out in detail long before COVID-19 emerged.
[...]
IBM’s extensive ties to the NEA go back several decades. In 1960, the NEA’s “Educational Implications of Automation” was financed “with an unrestricted grant from IBM.” Later, IBM partnered with the NEA’s “Mastery in Learning Project” in 1986, at the tail end of UNESCO “Study 11,” which orchestrated international public-private partnerships between Big Tech corporations, including IBM, Microsoft, and Apple, along with national government agencies, such as the US Department of Ed, to set up the global “information technology” (IT) infrastructure necessary for the Fourth Industrial Revolution’s ed-tech panopticon. In 1988, the NEA-IBM partnership launched the “Mastery in Learning School Renewal Network,” which was “an asynchronous teleconferencing and messaging system using PCs [for] the first electronic network dedicated specifically to school reform.” Two years later, in 1990, UNESCO collaborated with the World Bank to hold the World Conference on Education for All, which was followed up by a conference hosted by the United State Coalition for Education for All (USCEFA) in 1991. According to the USCEFA “Conference Report” titled Learning for All: Bridging Domestic and International Education, USCEFA was sponsored by the NEA, the AFT, IBM, Apple, the US Department of Education, and USAID, which has a long history of fronting for CIA operations.
The Citizen Lab at the Munk School of Global Affairs & Public Policy, University of Toronto (“Citizen Lab”), is an interdisciplinary laboratory which focuses on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security. Our work relies on a “mixed methods” approach to research combining practices from political science, law, computer science, and area studies. Citizen Lab research has included, among other work: investigating digital espionage against civil society; documenting Internet filtering and other technologies and practices that impact freedom of expression online; analyzing privacy, security, and information controls of popular applications; and examining transparency and accountability mechanisms related to the relationship between corporations and state agencies regarding personal data and other surveillance activities.
Our submission is based on research that we have conducted at the Citizen Lab, and is submitted in our individual capacities as fellows of the Citizen Lab.
In light of the recent developments in Ethiopia, and following feedback received from civil society partners, we have decided to postpone Thursday’s public event — “Voices from Ethiopia: Living through internet shutdowns” — until further notice.
The safety and security of the people we work with is of utmost importance to us, and we remain in solidarity with you all through these difficult times.
Facebook has a demographic problem. Even before investigations revealed that the company’s products were destroying teens’ mental health, interest in its flagship product was dropping off a cliff. Since 2019, teen usage of the app has declined by 13 percent, and over the next two years, it’s expected to drop another 45 percent.
“Aging up is a real issue” a researcher wrote in an internal memo revealed last week. Perhaps that’s why Facebook was considering new products targeted at children as young as six years old, according to a new document handed over to Congress by whistleblower Frances Haugen.
A Texas Republican lawmaker has launched an inquiry to identify books at public school libraries and classrooms on the subjects of race or sex that might "make students feel discomfort."
State Rep. Matt Krause, a Republican who is chair of the Texas House Committee on General Investigating, sent a letter on Monday notifying the Texas Education Agency about the investigation and asking a number of school districts to report which books in a list of hundreds of titles are owned by schools and how much money they spent acquiring those titles.
The internet is an indelible part of modern Indian life. From social media platforms to apps for daily services to online schooling to online portals for receiving government benefits, the internet is everywhere. This makes the task of ensuring internet access to every citizen of India a task of paramount importance (to see what the government can do to improve internet access, see our explainer on improving internet access here).
Unfortunately, a significant digital divide still persists to this date. The effects of this digital divide are very serious. For example, millions of children have had their education halted as only 22% of schools have the internet facilities that would have enabled them to shift to online learning. Malnutrition in Jharkhand may have also been a result of bad internet connections at PDS shops. In August this year, a 13 year old tribal boy reportedly fell from a cliff and died while trying to search for internet connectivity to join his online class.
Such incidents are extremely horrifying, and so it is imperative that policy makers address such issues at the earliest. Thus, we have decided to compile data from various sources to provide a holistic view of the state of internet access in India at present. It is important to note here that internet access does not just mean the presence of internet connectivity - it is just as essential that access be provided in an equitable manner. Therefore, we have also included data on the many digital inequalities that pervade our country. Lastly, we will also look at what the government is doing to alleviate these problems.
These designs capture a period of cultural change in Japan, when the kimono became increasingly associated with national mythmaking and tradition.