Computer chips are getting so hot these days, some companies are starting to put liquid cooling into laptops so that they can run faster — or quieter and less hot to the touch.
Just look at Germany-based Tuxedo Computers, which released a 15-inch high-performance laptop earlier this year that supports an external liquid-cooling module. After initially running Windows, the Tuxedo Stellaris 15 – Gen4 now plays nice with Linux, the vendor recently announced.
The laptop can be configured with some of the fastest CPUs out there, letting users choose between an Intel Core i7-12700H, Intel Core i9-12900H, or AMD Ryzen 9 6900HX. For GPU, the laptop supports a wider range of options, from Nvidia's GeForce RTX 3060 to the RTX 3080 Ti.
Tuxedo's liquid-cooling module, called Aquaris, is offered as a €199 ($201 based on current exchange rates) add-on for the laptop, which varies in price based on configuration but starts at around €2,000 ($2,028) for the hardware.
In this video we take a closer look at the upcoming MakuluLinux “GameR” Build, due in the next few weeks...
A Quick overview of openSUSE 15.4.
In episode 2 of exploring lightweight Linux distributions that can run on older hardware, we have Zorin OS Lite 16.1.
The community and element team responsible for creating Asahi Linux have released a new update supporting the latest Apple Mac computers powered by the M2 Apple silicon chips. As well as supporting the Mac Studio range of computers and Bluetooth connectivity. “The end result is that existing reference distro users can simply upgrade their packages, reboot, and Bluetooth should just work without any further configuration or changes!”
The Asahi Linux for Mac project has made some improvements, with the latest version adding initial support for M2 chips as well as the Mac Studio, along with Bluetooth.
Memory sits in the first row after the headers then we have the swap statistics. Most of the numbers are directly fetched from the procfs file /proc/meminfo which are scaled and presented to the user. A good example of a “simple” stat is total, which is just the MemTotal row located in that file. For the rest of this post, I’ll make the rows from /proc/meminfo have an amber background.
As you can probably imagine, the Linux graphics stack comprises many layers of abstractions, from the pretty little button from which you open your Proton-able AAA Steam title to the actual bytecode that runs on whatever graphics card you have installed.
These many abstractions are what allow us to have our glorious moments of being a hero (or maybe a villain, whatever you’re up to…) without even noticing what’s happening, and – most importantly – that allow game devs to make such complex games without having to worry about an awful lot of details. They’re really a marvel of engineering (!), but not by accident!
All of those abstraction layers come with a history of their own1, and it’s kinda amazing that we can even have such a smooth experience with all of those, community-powered, beautifully thought-out, moving pieces, twisting and turning in a life of their own.
But enough mystery! Let’s hop into it already, shall we?
Though in most cases we start from the bottom of the stack and build our way towards the top, here I think it makes more sense for us to build it upside down, as that’s what we’re used to interacting with.
 It's one thing for your computer to have a webcam, but it doesn't work without the right software. Here are several of the top options for Linux.
Most laptops these days feature a built-in webcam that lets you make video calls, do live streams, or take photos of yourself. However, unlike Mac or Windows, some Linux distros don't come with a built-in camera app.
As a result, if you want to use your webcam effectively, you need a third-party camera app on your computer. Linux has several options in this regard. Unfortunately, not all of them are as good and have the necessary webcam features.
Yes, we’re over halfway through 2022. That won’t stop us from celebrating our volunteers and the work accomplished during 2021. It’s always a good time to look back at how we have arrived here this year. Enjoy the read!
The Inkscape project is composed of a global team of volunteer contributors who collaborate to maintain, develop, translate, design, document, promote and use this free and open source (FOSS) professional vector-editing software.
Without our volunteers, Inkscape simply would not exist!
This diversely-skilled team of contributors spend their time and energy serving Inkscape users and mentoring each other and summer students through our chat groups and the forum, meeting to plan launches, organize activities, participate in external events, and connecting with followers across multiple social media platforms. There was even an opportunity to connect for one international conference via a virtual room from continents around the planet.
This tutorial shows how to resolve domain names on the Linux shell and how to query a name server for various kinds of DNS records like A, MX and NS records. To resolve a domain name on the shell, we will use the command dig.
A recent thread on the Fedora development list about unified kernel images co-incided with work I’m involved in wrt confidential computing (AMD SEV[-SNP], Intel TDX, etc). In exploring the different options for booting virtual machines in a confidential computing environment, one of the problems that keeps coming up is that of validating the boot measurements of the initrd and kernel command line. The initrd is currently generated on the fly at the time the kernel is installed on a host, while the command line typically contains host specific UUIDs for filesystems or LUKS volumes. Before even dealing with those problems, grub2‘s support for TPMs causes pain due to its need to measure every single grub.conf configuration line that is executed into a PCR. Even with the most minimal grub.conf using autodiscovery based on the boot loader spec, the grub.conf boot measurements are horribly cumbersome to deal with.
With this in mind, in working on confidential virtualization, we’re exploring options for simplifying the boot process by eliminating any per-host variable measurements. A promising way of achieving this is to make use of sd-boot instead of grub2, and using unified kernel images pre-built and signed by the OS vendor. I don’t have enough familiarity with this area of Linux, so I’ve been spending time trying out the different options available to better understand their operation. What follows is a short description of how i took an existing Fedora 36 virtual machine and converted it to sd-boot with a unified kernel image.
First of all, I’m assuming that the virtual machine has been installed using UEFI (EDK2’s OOVMF build) as the firmware, rather than legacy BIOS (aka SeaBIOS). This is not the default with virt-manager/virt-install, but an opt-in is possible at time of provisioning the guest. Similarly it is possible to opt-in to adding a virtual TPM to the guest, for the purpose of receiving boot measurements. Latest upstream code for virt-manager/virt-install will always add a vTPM if UEFI is requested.
With the recent resurgence in Covid19 I’ve been working from home a lot and using both my work laptop and personal PC on the same monitor. HDMI KVM switches start at $150 and I didn’t feel like buying one. So I wrote a script to change inputs on my monitor. The following script locks the session on the local machine and switches the monitor’s input to the other machine. I ran the command “ddcutil vcpinfo| grep Input” which shows that (on my monitor at least) 60 is the VCP for input. Then I ran the command “ddcutil getvcp 60” to get the current value and tried setting values sequentially to find the value for the other port.
Cert-manager is a cloud-native certificate management service for Kubernetes and Red Hat OpenShift. To configure cert-manager, you need to install several resources using custom resource definitions (CRDs). Depending on the issuer type and the certificate you need, creating these custom resources can become complex. This article introduces Dekorate as an easier way to generate the cert-manager custom resources. We will also provide an example Java application based on Spring Boot that uses the certificate generated by cert-manager.
In this tutorial, we will show you how to create Apache Virtual Host on Ubuntu 22.04 LTS. For those of you who didn’t know, The term “Virtual Hosting” refers to the hosting of many domains on a single server. The virtual hosting concept is used by companies to host multiple websites using a single machine. It can be achieved either by an ‘IP-based’ method or a ‘domain-name-based’ approach. In ‘IP-based’ hosting we have distinct IP addresses for each website. In the case of ‘name-based’ hosting, we have multiple names running on each IP address.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step set up Apache Virtual Host on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.
Follow through this tutorial to learn how to install VirtualBox guest additions on Rocky Linux 9. We are installing the VirtualBox Guest additions on Rocky Linux 9 Desktop.
An NFS server allows multiple systems to share a file system deployed over a network. Here's how you can install and set up an NFS server on Linux.
Sun Microsystems' NFS (Network File System) is an RPC-based distributed file system structure that allows networked devices to use servers running NFS over a network as their local drives.
Here's a step-by-step guide to setting up and configuring an NFS server on a Linux machine.
Moodle is a free and open-source Learning Management System and CMS written in PHP. It allows tutors and instructors to create courses for their students and provides long-distance education and other online learning programs more accessible. This tutorial will show you how to install Moodle with Nginx and Let's Encrypt SSL on Ubuntu 22.04.
Learn the steps to install GNU Emacs 27 text editor on Ubuntu 22.04 Focal Fossa using the command terminal.
GNU Emacs is a programmable text editor suitable for development. Emacs make it easier to write source code through syntax highlighting and can be customized by the user. Help is available for the tool as well as support for multiple languages. GNU Emacs can also be used to create text documents based on LaTeX.
Apart from that, it is a very comprehensive and platform-independent editor that is extensible by its own Lisp dialect (Emacs Lisp). Since its control is mainly based on keyboard shortcuts, it requires some training in order to be able to use all its possibilities intensively. Due to a high number of plugins, the editor can be used in almost all areas. For example, there are extensions for file management, email and news, IRC, compilations, web surfing, and much more.
Learn the steps to install GNU Emacs 28 text editor on Ubuntu 20.04 Focal Fossa using the command terminal.
GNU Emacs is a programmable text editor suitable for development. Emacs make it easier to write source code through syntax highlighting and can be customized by the user. Help is available for the tool as well as support for multiple languages. GNU Emacs can also be used to create text documents based on LaTeX.
Apart from that, it is a very comprehensive and platform-independent editor that is extensible by its own Lisp dialect (Emacs Lisp). Since its control is mainly based on keyboard shortcuts, it requires some training in order to be able to use all its possibilities intensively. Due to a high number of plugins, the editor can be used in almost all areas. For example, there are extensions for file management, email and news, IRC, compilations, web surfing, and much more.
In this tutorial, you will learn on how to simply install Rocky Linux 9 on VirtualBox. With Rocky Linux 9 now being available, you might want to try it out and the best way out is through installing it as a virtual machine.
EasyEngine is a free and open-source Linux command line tool for managing WordPress sites on Ubuntu and Debian servers. It enables you to deploy single or multisite WordPress installations with various configurations, such as caching, SSL with different configs, different WordPress versions, database configurations, different PHP versions, and more. You can check out the full configuration options for WordPress here.
It’s a Python based tool that can be used to manage WordPress, MariaDB, Nginx, and PHP using the command line.
EasyEngine can be installed on all Debian-based distributions.
Wine is a nifty utility that allows users to run Windows applications and games inside a Linux environment. Wine 7.0 is finally out, and it ships with an array of numerous improvements and a total of 40 bug fixes.
Node.js is a versatile platform for building server-side applications. Built on Chrome’s V8 JavaScript engine, Node.js is fast and scalable. It uses an event-driven, non-blocking IO model that makes it lightweight and efficient. Node.js is an ideal platform for building data-intensive real-time applications across distributed devices. With its wide range of features, Node.js provides developers with everything they need to build high-performance network applications. Node.js is also highly extensible as an open-source platform, making it easy to add new functionality as required. Whether you’re looking to build a simple API or a complex web application, Node.js is an excellent choice for your back-end development needs.
In the following tutorial, you will learn various methods of installNode.js on Rocky Linux 9 desktop or server with three methods.
Installing applications from a deb file is quite simple. You double click on it and it opens in the Software Center application and you install it from there.
But what about uninstalling a .deb package in Ubuntu or Debian? How do you remove the package you installed some time back.
While there are several ifs and buts around it, the simplest and most reliable way of deleting a deb file is by using the apt remove command.
Learn the steps to install GNU Emacs 27 on Ubuntu 22.04 Focal Fossa using the command terminal. You can also install Emacs 28/26/25 versions as well.
GNU Emacs is a programmable text editor suitable for development. Emacs makes it easier to write source code through syntax highlighting and can be customized by the user. Help is available for the tool as well as support for multiple languages. GNU Emacs can also be used to create text documents based on LaTeX.
Apart from that, it is a very comprehensive and platform-independent editor that is extensible by its own Lisp dialect (Emacs Lisp). Since its control is mainly based on keyboard shortcuts, it requires some training in order to be able to use all its possibilities intensively. Due to a high number of plugins, the editor can be used in almost all areas. For example, there are extensions for file management, email and news, IRC, compilations, web surfing, and much more.
Let’s jump right in! In the previous article, we went through a theoretical overview of PipeWire. Our goal will now be to install and configure a minimal Linux-based system that runs PipeWire in order to output audio to an ALSA sink. The hardware for this demo will be a SAMA5D3 Xplained board and a generic USB sound card (a Logitech USB Headset H340 in our case, as reported by /sys/bus/usb/devices/MAJOR-MINOR/product).
We won’t bother with the bootloader setup (in our case U-Boot) as this is out of scope of our topic; if needed, Bootlin has training sessions for embedded Linux system development for which the training materials are freely available.
In this tutorial, we will show you how to install PostgreSQL on Rocky Linux 9. For those of you who didn’t know, PostgreSQL is an immensely popular open-source relational database management system (RDBMS). Generally, it is used as the primary data store for many web, mobile, geospatial, and analytics applications. PostgreSQL can store structured and unstructured data in a single product. In addition, PostgreSQL is open source software, meaning it can be freely used, modified, and distributed.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of PostgreSQL on Rocky Linux. 9.
Creating and deleting files and directories are standard operations for a sysadmin. Depending on your operating system and filesystem, there may be different ways to perform these tasks. The most efficient way is to use the shell (for instance, Bash). This article assumes you already understand how to enter commands into a Linux terminal. (Read Nathan Lager's What sysadmins need to know about using Bash if you want a refresher.)
 SSH is a tool I use every single day to log into remote Linux servers and take care of my admin tasks. Without SSH, my days would be more complicated and less secure. That doesn’t mean, however, that SSH is configured to your liking right out of the box. There are a few weaknesses in the default configuration and the way you’re probably using the tool.
Let’s fix that.
Here are my five most straightforward tips for securing SSH on your Linux machines. These tips shouldn’t take you more than five minutes to handle and, in the end, you’ll be glad you took the time to do so.
Another milestone with 4000 games on the Steam Deck as Playable or Verified – Well not exactly 4000 games as there were only 3999 games at the time of writing but I hope you can allow us to round this up a little! If we split the games in two categories...
Participants from the openSUSE community working on the upcoming release of the Adaptable Linux Platform (ALP) encourage people to try openSUSE MicroOS Desktop to gain user perspectives on its applicability.
Users are encouraged to try out MicroOS Desktop by installing it and using it on a laptop or workstation for a week or so. By doing this, users develop a frame of reference for how ALP can progress; the community wants to gain feedback about what users think about ALP’s usability, how it fits user workflows and more. The community would like to see critiques and evaluations that work for users. People are encouraged to send feedback to the ALP-community-wg mailing list.
The temporary use of the MicroOS Desktop will help developers assess how to move forward with ALP’s Proof of Concept (PoC).
Currently MicroOS Desktop has both GNOME and KDE’s Plasma as an option.
We have been a bit silent lately in this blog, but there are good reasons for it. As you know, the YaST Team is currently involved in many projects and that implies we had to constantly adapt the way we work. That left us little time for blogging. But now we have reached enough stability and we hope to recover a more predictable and regular cadence of publications.
[...]
As you know, SUSE is developing the next generation of the SUSE Linux family under the code-name ALP (Adaptable Linux Platform). If you are following the activity in that front, you also know several so-called work groups has been constituted to work on different areas.
The YaST Team is deeply involved on two of those work groups, the ones named “1:1 System Management” and “Installation / Deployment”. You can read more details about the mission of each group and the technologies we are developing in the wiki page linked at the previous paragraph.
Since this blog is a well-established communication channel with the (open)SUSE users, we decided we will use it to report the progress on all the projects related to those work groups. That goes beyond the scope of YaST itself and even beyond the scope of the YaST Team, since the mentioned work groups also include other SUSE and openSUSE colleages. But we are sure our readers will equally enjoy the content.
Rocky Linux 9 has been released, featuring various security and performance updates as well as a new build system called Peridot.
According to Gregory Kurtzer, CEO of CIQ and founder of the Rocky Enterprise Software Foundation (RESF), with Rocky Linux 9, “CIQ has created a completely cloud-native build stack called Peridot, which we have given to the RESF and released as open source to the world.”
The Peridot build system was used to build Rocky Linux 9 for the x86_64, aarch64, s390x and ppc64le architectures, says the announcement. “A primary goal in developing the new build system was assuring that new versions of Rocky can be released within one week after each Red Hat Enterprise Linux new version release.” And, says Kurtzer, “Peridot allows anyone to recreate, build, enhance and manage Rocky Linux as we do.”
Rocky Linux 9, codenamed “Blue Onyx”, is here with a host of new security, application and networking features. The capability in version 9 taking center stage is the availability of all the build chain infrastructure tools that developers would need to pick up Rocky Linux to extend or reproduce the operating system, should they desire to do something independently of the community or any upstream supporting organization. As a result, Rocky Linux v9 delivers a supported enterprise Linux platform for the next decade.
In this video, I am going to show how to install Rocky Linux 9.0.
Most organizations struggle with digital transformation (DX) and never achieve it. An Everest Group study concluded that 73 percent of companies were unsuccessful at providing any value from their digital transformation process. Poor planning and employee resistance are the most common reasons for high failure rates.
The pursuit of DX does not have to commence with large-scale initiatives; smaller projects can increase the likelihood of a successful kickoff. Short-term digital transformation efforts can have immediate effects on business and offer positive customer benefits.
In my experience building and training cross-functional teams, I’ve identified three main principles that apply to both engineering and IT. These principles should be taught to all new hires and adopted by IT leaders everywhere.
The Fedora Community in Panama recently celebrated the release of Fedora Linux 36. Our last in-person event was back in December 2019. Thank you to all the organizers, participants, and attendees who made the Fedora Explorer Day 36 event possible.
We had six sessions in total, four in person and two online sessions with friends from Mexico and Venezuela, with the addition of an hour of Fedora networking on YouTube and Twitch.
Alder Lake processors were first formally announced at the end of 2021 with the most powerful H-Series, followed by a range of Alder Lake Edge IoT processors, and in February, Intel officially launched Alder Lake P-Series and U-Series mobile hybrid processors which I had expected to find in several mini PCs by now.
But apart from ASRock iBOX 1200 Series announcement, and leaks of the NUC 12 Studio Pro, I had not really seen any. But today, I found what looks like a mini PC with the Polywell Nano-U12P, but it’s instead marketed as an 8K digital signage player with a choice of Alder Lake P-series and U-series processors.
Bears on tricycles aside, animals are not very good at piloting vehicles. But maybe that is because we haven’t given them controls that suit their thumbless bodies. If a vehicle had controls adapted to a particular animal’s anatomy, could they drive? Back in 2019, researchers at the University of Richmond found that rats could. Inspired by that study, this Instructables user built their own RatCar with touch-sensitive steering.
This RatCar relies on classic behavioral principles established by B.F. Skinner throughout the mid-20th century. Through positive reinforcement, many animals can learn to perform simple tasks. In the case of the RatCar, the tasks are touching one of three touch-sensitive copper meshes that cause the vehicle to move forward, turn right, or turn left. A rat can learn to operate the vehicle through reinforcement training as they receive treats for their actions.
Today we are excited to announce the first full version release of the open source quantum programming framework Cirq: Cirq 1.0. Cirq is a Python framework for writing, running, and analyzing the results of quantum computer programs. It was designed for near-term quantum computers, those with a few hundred qubits and few thousands of quantum gates. The significance of the 1.0 release is that Cirq has support for the vast majority of workflows for these systems and is considered to be a stable API that we will only update with breaking changes at major version numbers.
Currently I am working on a Web-of-Trust implementation for the OpenPGP library PGPainless. This work will be funded by the awesome NLnet foundation through NGI Assure. Check them out! NGI Assure is made possible with financial support from the European Commission’s Next Generation Internet programme.
There was some backpedaling from Microsoft overnight as the company tweaked its Store policy to allow the sale of open-source apps that are otherwise available for free.
The news was delivered by Giorgio Sardo, general manager of the Microsoft Store, that the policy changes have undergone some substantial rewording. Gone is the reference to open-source and free software in section 10.8.7 and, as if to emphasize Microsoft's actual intentions, a link to Microsoft's online infringement reporting form was added in section 11.2.
The syslog-ng Store Box (SSB) is an appliance built on syslog-ng Premium Edition (PE). SSB inherits most of syslog-ng PE’s features and makes them available with an easy-to-use graphical user interface. One of these features is the SQL source. Many applications log their messages to SQL databases. The SQL source of syslog-ng PE and SSB allows you to collect these log messages in real-time and process and store them with the rest of your logs.
The syslog-ng Store Box appliance can collect log messages from many different log sources and in many formats. These include UNIX / Linux / Windows system logs, firewall and router logs, various application logs, and now also SQL sources. SSB can parse, rewrite, filter and store log messages. In addition to the traditional syslog-ng features, the SSB appliance provides an interface to search log messages, and does complete log life cycle management, including archival and backup. Finally, it can also forward events to various on-prem and cloud destinations. It allows you to optimize your SIEM installations both for resources and licensing, as you can collect log messages only once, store them on SSB, and only forward a reduced subset of logs to various analytics tools.
Huawei will launch HarmonyOS 3.0 on July 27, the company revealed on Weibo. A post on the Chinese social media said “the future” and the “evolution” of Huawei is coming next Wednesday, and the event is scheduled for 19:30 local time.
Minutes later, the company tweeted that a new Smart Office launch party is taking place on the very same day at the very same time, revealing the announcement is not just a local event, it is a big deal for the brand across the world.
From Berkeley comes the sad news of the passing of Tom Lord, a longtime free-software developer and the original author of GNU arch. He will be missed.
[...]
I worked a bit with Tom on GNU Arch, back in the day. He was a great mind, precise and dedicated. He was always supporting and caring with contributors.
If we have distributed version control systems such as Bazaar (first) and git (later), we owe it in no small part to him.
Rest in peace Tom, I will miss you.
In 1995 he first moved to Berkeley and began spending time in People’s Park, a place and a society that held great meaning for him.
He returned to Pittsburgh PA in 1998, then came back to the Bay Area in 2001 and relocated permanently to Berkeley in 2004.
In 2007 he married Trina Pundurs, his life partner since 1992.
Upon settling in Berkeley, he began engaging with city politics and policymaking. His interest led him to contribute to the Berkeley Daily Planet, and his work with Planet editor Becky O’Malley drew him further into city and regional issues, especially housing, displacement, and homelessness. In 2016 he was appointed by then-Councilmember Cheryl Davila to serve on the City Housing Advisory Commission.
In 2018 he was profoundly moved by a news report about scientists weeping in the aisles at COP 24, where the IPCC presented its Special Report on the impact of global warming of 1.5€° C (“IPCC SR15”). Upon studying SR15, and following the work of Greta Thunberg, he became a tireless advocate of speaking the truth about the climate emergency and treating it as an actual emergency.
In addition to his climate and housing activism, he spent several years volunteering with students at Longfellow Middle School as part of the Writer Coach Connection program.
He died unexpectedly this week of a massive brain hemorrhage.
ITOps teams can improve sustainability by reducing their technical debt. One way to do that is to run apps inside containers instead of VMs.
We have released Qt 6.2.5 LTS for commercial license holders today. Compared to Qt 6.2.4, Qt 6.2.5 contains close to 700 bug fixes. As a patch release, Qt 6.2.5 does not add any new functionality.
Random strings are used for various purposes in software development. For example, they can be used to code user IDs, generate passwords, and construct tokens in applications. If you’re developing a JavaScript-based program that needs random strings — or any other type of pseudo-random data — then this article is for you! You see, generating random characters (or strings) is easy with the right tools and techniques. Luckily, this article covers exactly that. Let’s get started…
The Rust team has published a new point release of Rust, 1.62.1. Rust is a programming language that is empowering everyone to build reliable and efficient software.
Security updates have been issued by Fedora (buildah), SUSE (dovecot23 and nodejs12), and Ubuntu (harfbuzz, libhttp-daemon-perl, tiff, and webkit2gtk).
CISA has released an Industrial Controls Systems Advisory (ICSA) detailing six vulnerabilities that were discovered in MiCODUS MV720 Global Positioning System Tracker. Successful exploitation of these vulnerabilities may allow a remote actor to exploit access and gain control the global positioning system tracker. These vulnerabilities could impact access to a vehicle fuel supply, vehicle control, or allow locational surveillance of vehicles in which the device is installed.
This advisory contains mitigations for Use of Hard-coded Credentials, Improper Authentication, Cross-site Scripting, and Authorization Bypass Through User-controlled Key vulnerabilities in the MiCODUS MV720 GPS tracker.
Last night, the House Energy and Commerce Committee announced a markup for the “American Data Privacy and Protection Act,” a bipartisan, bicameral bill introduced by Frank Pallone, Jr., (D-NJ), Cathy McMorris Rodgers (R-WA), Jan Schakowsky (D-IL), and Gus Bilirakis (R-FL) to establish a national standard to protect consumer data privacy.
As written, the bill would impose restrictions on how businesses (and not just Facebook or Google) can collect, use, and share consumer data, as well as allow for federal, state, and individual enforcement to protect consumers’ rights. Public Knowledge urges the committee to report this bill favorably to the House for a floor vote.
Like the substance itself, which binds to all kinds of grime, soap bubbles make for sticky symbols, assuming disparate associations — from innocence to vanitas, physics to politics — in the history of visual art.
We have entered the dog days of July in the Northern Hemisphere, with a heat wave bringing Europe to a rolling boil, and thoughts of sea, shade, or cooler climes to many people’s minds. Writing of a shadowed garden, Spanish poet Luis Cernuda (in Stephen Kessler’s translation) captures the lethargy of this weather and the pleasures of relief: how the summer atmosphere can feel “light, afloat; the world turning slowly, like a soap bubble, delicate, iridescent, unreal”. While soap froth has existed since at least the time of Mesopotamia, the fragility, iridescence, and impermanence that Cernuda describes started to bubble into the West’s visual imagination during the sixteenth century. Like the substance itself, which binds to all kinds of grime, soap bubbles make for sticky symbols, assuming disparate associations — from innocence to vanitas, physics to politics — in the artist’s eye.
It's often said Docker is not very good with regard to security, let me illustrate a simple way to get root access to your Linux system through a docker container. This may be useful for people who would have docker available to their user, but whose company doesn't give them root access.
This is not a Docker vulnerability being exploited, just plain Docker by design. It is not a way to become root from *within* the container, you need to be able to run docker on the host system.
If you use this to break against your employer internal rules, this is your problem, not mine. I do write this to raise awareness about why Docker for systems users could be dangerous.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.