Stuart Langridge, Jono Bacon, and Jeremy Garcia present Bad Voltage, in which Victorian Tumblr is a thing,
Hello and welcome to Episode 472 of Linux in the Ham Shack. In this short-topics epsiode, the hosts discuss several amateur radio and open source related topics including improvements to GNU Radio, the new book from Science is Elementary, Shotcut, WunderGraph, an update on Hamshack Hotline and much more. Thank you for listening and we hope you have a fantastic week.
There are various open-source projects rewritten in Rust. Hence, it is not surprising that is being considered as the second language for Linux Kernel for a while now.
A few days ago at The Linux Foundation’s Open-Source Summit, Linus Torvals mentioned that we should expect the trials for Rust in the next kernel release i.e Linux Kernel 5.20.
In case you did not know, there have been Rust Linux kernel patches already with few sample drivers and the enablement code for the basic infrastructure, as originally reported by Phoronix.
Cardano Foundation Chief Open Source Officer Dirk Hohndel met with Linux creator Linus Torvalds in a fireside chat at the Linux Foundation OS summit. Open-source software and principles are key parts of the Cardano Foundation's commitment to ensuring distributed control and governance in the Cardano ecosystem. Therefore, the Cardano community regards this as positive.
At The Linux Foundation's Open Source Summit in Austin, Texas on Tuesday, Linus Torvalds said he expects support for Rust code in the Linux kernel to be merged soon, possibly with the next release, 5.20.
At least since last December, when a patch added support for Rust as a second language for kernel code, the Linux community has been anticipating this transition, in the hope it leads to greater stability and security.
In a conversation with Dirk Hohndel, chief open source officer at Cardano, Torvalds said the patches to integrate Rust have not yet been merged because there's far more caution among Linux kernel maintainers than there was 30 years ago.
When a computer starts, the first processes that happen are on the motherboard. These processes are hardcoded into read-only memory (ROM) chips (collectively called "firmware") on the motherboard, and they happen fast, with the primary goal being to locate a hard drive with a bootable system on it.
I’ve got two fantastic posts about Linux today, from the same author – Chris Siebenmann. First, the history behind kernel mode setting in Linux.
Sketchnoting, also called visual notetaking, is a method of taking notes using illustrations, symbols, graphic layouts, and text. It's meant to be a creative and engaging way to record your thoughts. It can work well in your personal life as well as in your work life. You don't need to be an artist to create a sketchnote, but you do need to listen, and visually combine and summarize ideas through text and drawings.
In this tutorial, we will show you how to install Ruby on Rails on Ubuntu 22.04 LTS. For those of you who didn’t know, Ruby on Rails is an open-source web application framework that includes everything needed to create database-backed web applications according to the Model-View-Controller (MVC) pattern.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Ruby on Rails web application framework on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.
We noticed that when running the YaST services manager module in a container then the start of the module is about 3 times slower than running in the host system directly. It takes about a minute to start, that is way much…
In this article, you will see how to manage gnome extensions from the terminal to list out extensions that have been installed by the system and user. You will also find a way to install, enable, disable, and uninstall extensions all from the terminal itself.
Darkbar is a tool for pixel perfectionists and dark mode users. It allows you to control whether an application uses dark or light styles for the window controls. It supports X11 and XWayland windows using traditional titlebars (e.g. no client side decorations) like you might find with The GIMP or Electron-based applications.
Krita is a free, open-source drawing program that allows you to create drawings with a wide variety of image editing options. In addition, Krita supports editing PSD files created in Photoshop and provides extensive training materials. Editing HDR content is also supported, while many processes are accelerated with OpenGL.
Krita – User Interface, In the latest beta version of Krita 5.1.0, in addition to the mandatory optimizations and error corrections, the following innovations should also be included.
The SLE engineering team is excited to announce that SLE 15 SP4 is now available for download! We have been working hard to make this release as boring smooth as possible for our users, despite updating at least 23% of our entire code and syncing selected packages from openSUSE Factory. Countless internal person-hours was required for developing, testing, releasing, documenting this new Refresh Service Pack and yet we also have to thank our Public Beta testers, our Technology Partners and of course our openSUSE community for their priceless contribution! Releasing our SUSE Linux Enterprise product Family is a truly collective effort, so thank you all!
I became quite interested in cybersecurity around a year ago, given the growing threats of cyberattacks by criminal groups and adversarial governments. I then joined CAMS, MIT’s interdisciplinary cybersecurity consortium and started attending its online weekly seminars. A few weeks ago I attended a CAMS seminar on cyber resilience by Manuel Hepfer, a research affiliate at Oxford University and a research analyst at ISTARI, a cyber risk management company.
What is cyber resilience? While cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks, cyber resilience is the ability to prepare for, withstand, and recover rapidly from any major disruption, whether an intentional cyberattack or a natural disaster.
The seminar was based on a study by Hepfer and colleagues of the 2017 NotPetya ransomware attacks, a series of powerful cyberattacks which caused over $10 billion in global economic damage across a number of industries. Their study was primarily focused on three global companies that were the subject of NotPetya attacks: a logistics company with over 60,000 employees, a manufacturing one with over 20,000 employees, and a third in professional services with over 5,000 employees.
For the past few years, organizations have focused on finding technologies and processes that enable their employees to work from home. But with C-suites and HR professionals investing enormous resources into tools and processes, many are doing so without fully considering the most crucial piece of an agile enterprise – the people.
To optimize performance in this new agile work era, boost employee morale, and recruit and retain the best talent amid a global-scale hiring crisis, organizations also need to address the needs of their workforce.
As more employees voice their needs and concerns regarding their work lives, here are three ways to prioritize the people within your organization.
This article is intended to serve as a reference so that you can understand everything you need to be proud of your repository and make your open source project more open. By using open standards, an open source project improves its quality and shareability, since such standards exist to foster better communication between creators and consumers of the project. Most importantly, open standards can guide technology development by gently enforcing space for diversity and equity.
The purpose of this team is to take care of day-to-day business regarding CentOS and Fedora Infrastructure and Fedora release engineering work.
As a leading, open source, Jakarta Enterprise Edition (Jakarta EE)-compatible application server, Red Hat JBoss Enterprise Application Platform (JBoss EAP) has been a trusted workhorse for enterprise Java workloads for the past decade. This article describes how the Jakarta EE specifications have evolved since the release of the current version, JBoss EAP 7, and what you can look forward to with JBoss EAP 8.
JBoss EAP 7 is optimized for cloud environments, and when deployed with Red Hat OpenShift, offers containers, load balancing, elastic scaling, health monitoring, and the ability to deploy to a container directly from the IDE to improve developer productivity and experience.
The AlmaLinux Build System will let users build software for the AlmaLinux distribution. Full access of ALBS is slated for July.
It's been almost 2 weeks into the GSoC coding period, and the project has picked up the pace!
[...]
The current implementation of the New Documents submenu is a GtkPopoverMenu. It uses the GMenuModel, which is added as submenus in the right-click popover menu. What we plan to do is to expose all the templates in a single-view, tree-like structure! So how are we supposed to do this? Well, the answer is GtkListView as a custom child widget in the popover menu model. And for a GtkListView, we need a GListModel or more specifically GtkTreeListModel as well as a factory to create list items.
It's this time of the year! Godot Community Poll 2022 is now out for everyone to take part. Let us know what your relationship with Godot is in this brief list of questions!
The poll is completely anonymous, and you can see the results after filling it. It will remain open for a week. Completing the poll should take less than 5 minutes.
There are a few small, and sometimes already quite old, features in Qt that, when combined, can be a very nice way to deal with assets in your QML application — especially if some of them live on the file system, some in a resource, and some may need localization or translation. Let’s dive in!
I once got the advice to read Pro Git[PG] in this chapter order: 10, then 1–9. As opposed to 1–10.
I like that the book has these two routes through it and has put care into both.
There is a certain personality type for whom this works much better, who get confused by flailing around and not knowing what’s actually going on. The “waiddaminute here…” types. People who clean their sink with baking soda and soap. Git is simple and neat and good.
Not publishing one sentence per line, no. Write like this for your eyes only. HTML or Markdown combine separate lines into one paragraph.
We use our smartphones for so many things, whether they are water resistant matters a great deal, which is likely why Samsung showed its phones being used in the pool, at the beach, in a spill, etc. As it turns out, older Samsung Galaxy phones aren’t as water resistant as ads claimed. The company settled an Australian lawsuit over its claims the devices were water resistant and agreed to pay $14 million as a result.
I would not usually ask myself “is there a GPU?” in a Bluetooth LE SoC, but that’s exactly what Renesas SmartBond DA1470x Bluetooth 5.2 LE microcontroller offers with a 2D GPU used to accelerate the rendering of user interfaces in wearables, healthcare devices, home appliances with displays, industrial automation and security systems, as well as consoles in e-bikes and gaming equipment.
The DA1470x also comes with a Cortex-M33 application core, a Cortex-M0+ sensor node controller, 1.5MB SRAM, and an ultra-low-power hardware VAD for always-on audio processing, as well as various peripherals.
Healthcare is a human right, and anybody wanting to terminate an unwanted pregnancy deserves access to whatever form of medical care they choose. However, abortion wasn’t invented in the 20th century, and in the face of patriarchal state repression, I encourage folks to share these resources, some of which I mirror here.
Security updates have been issued by Fedora (ntfs-3g and ntfs-3g-system-compression), SUSE (389-ds, chafa, containerd, mariadb, php74, python3, salt, and xen), and Ubuntu (apache2).
Earlier this month, I and others wrote a letter to Congress, basically saying that cryptocurrencies are an complete and total disaster, and urging them to regulate the space. Nothing in that letter is out of the ordinary, and is in line with what I wrote about blockchain in 2019. In response, Matthew Green has written—not really a rebuttal—but a “a general response to some of the more common spurious objections…people make to public blockchain systems.”
The nuances of cloud-native architecture necessitate some new approaches to security. Not only are container-based microservices inherently distributed, but there is a rising number of dependencies within the software supply chain. As a result, developers are faced with storing and accessing many types of secrets, including API keys, encryption keys, JSON Web Tokens (JWTs) and others when building cloud-native applications based on containers and running on platforms like Kubernetes. But, leaving such secrets exposed within your codebase goes against security best practices, as an attacker could easily access them.
Software components must verify every request is coming from a legitimate source, known as authentication, and they must confirm the requesting party has the required permissions to access a resource, known as authorization. As part of this mission, we’ve seen a lot of development activity around automating secret issuance and distribution to securely store and distribute passwords among services.
Supporters of Tunisian President Kais Saied are using a dangerous tactic to smear women judges in Tunisia: online doxxing. On June 1, President Saied sacked 57 judges in a presidential order, a move widely condemned as an attempt to assert control over all three branches of state power. When a group of judges decided to strike and protest the sacking as an illegitimate “purge,” bloggers began to publish highly sensitive personal information about some of the women judges on Facebook — a defamation campaign meant to shame them into silence.
President Saied has already dismissed the parliament and the government. Now, with Tunisia’s democracy at risk, judges who speak out against the president’s actions are facing exposure and public shaming, while the perpetrators enjoy impunity. These attacks must be stopped, and leaders in government and the social media platforms must reform the laws and policies that make doxxing easy.
I just read mycorrhiza’s log 'Computing Within Limits & Solar Protocol' and something about the solar protocol reasonated with me. I find it interesting to put so much focus on solar energy and the way if flows. The sun is the ultimate provider of most of earths surface energy, the other bit being geothermal. It makes sense to base energy efficent networking technology around it. I like the protocols manifesto and hope to see if it becomes something more.