Platform as a Service (PaaS) is a category of cloud computing services which offers a way to support the complete lifecycle of delivering web applications and services via the cloud. Along with Software as a Service (SaaS) and Infrastructure as a Service (IaaS), PaaS is a service model of cloud computing.
PaaS solution stacks offers a number of advantages. They provide significant benefits for the business with extensive savings in upfront cost of installing a development platform, improved productivity & profits, zero maintenance, decreased operational costs, global access to information using internet and many others. In essence, PaaS technologies enable creative developers to spend less time managing hardware and software.
PaaS solution stacks provide all of the infrastructure to design or deploy general, business, social and enterprise level software applications without being concerned about the underlying infrastructure including networks, servers, operating systems, storage and all the programming tools & applications.
In Docker, a file system mapping refers to the process of associating a directory or a file from the host system with a directory or a file inside a Docker container.
In Docker, port mapping (also known as port forwarding) is the process of associating a port on the host system with a port on a Docker container, allowing network traffic to be directed to and from the container through the host system's network interface.
Using a private Docker registry offers several benefits: You can create a private Docker registry to host and distribute your own Docker container images within your organization or for specific projects.
Docker networks are virtual networks that provide communication channels for Docker containers to communicate with each other and with the host system, allowing containers to communicate securely and efficiently. Docker networks are used to isolate containers from the host system and from other containers, providing a controlled and secure environment for containerized applications.
Docker volumes are a way to persist and manage data in Docker containers. A Docker volume is a directory or a named volume that is stored outside of the container’s file system and is used to store and share data between Docker containers and the host system.
Docker Compose is a tool that allows you to define, configure, and run multi-container Docker applications using a YAML file. It provides an easy way to define the services, networks, and volumes for your Docker containers in a single configuration file, which can be version-controlled and shared across teams.
Docker Swarm is a native container orchestration solution provided by Docker for managing and scaling containerized applications across a swarm of Docker nodes.
Docker image registries are central repositories that store and distribute Docker container images. Docker container images are the building blocks of Docker containers, containing all the necessary files, libraries, and dependencies to run a containerized application.
KDE Connect was designed 10 years ago (!) with Android smartphones as one of our first supported platforms. Because of that, when designing the KDE Connect protocol we had to work around many technical limitations that Android had back in its infancy.
This year I will be working on a project named “KDE Connect discovery and transport protocol improvements” that received a grant from the NLnet foundation as part of the NGI Assure fund. This grant will allow me to work full time in KDE Connect, with the goal of updating the protocol and apps to modern standards.
Below are the 3 main areas that will improve thanks to this and become KDE Connect 2.0 (even though some changes will show up sooner, because we release early, release often).
[...]
Before Android 5, only TLSv1 and a limited set of cipher suites could be used. We always try to stay compatible with old devices and to fight the programmed obsolescence that plagues modern technology, but that meant keeping the KDE Connect protocol compatible with insecure encryption protocols.
Starting with KDE Connect v1.22 for Android, we now require Android 5 or later so we can drop compatibility with insecure encryption in all the KDE Connect implementations (and not only Android). In addition to that, we are reviewing and updating the dependencies we bundle as part of the app to make sure we have the latest security patches.
Later this year, and also thanks to NLnet, we will get a security audit by Radically Open Security. This will be the second time KDE Connect is audited, after the openSUSE security team did so in 2020.
Thanks to its open-source nature and extensive community support, Linux is a powerful and versatile operating system that has gained immense popularity over the years. However, one of the key decisions that Linux users face is whether to opt for a rolling release or a point release distribution.
Both have their pros and cons, and choosing the right one depends on various factors, such as your technical expertise, software needs, and personal preferences.
So, if you are new to Linux or looking to switch to a different distribution, navigating through the plethora of options can be overwhelming. That’s where our comprehensive guide comes in. We’ve compiled all the information you need to decide on rolling vs. point releases on Linux.
Anew version of NuTyX has been released with an updated version of the Cards Package Management Utility with full support for binary packages and sources from VCS systems, like Bazaar, Git, Subversion, and Mercurial.
NuTyX is a French Linux distribution based on Linux From Scratch and Beyond Linux From Scratch with its own package manager called Cards, which stands for Create, Add, Remove, and Download System. Cards is a set of utilities (pkgadd, pkgrm, pkginfo, pkgmk, and cards) that come together to serve as all your package management needs for NuTyx.
The latest release of NuTyx includes a fully updated toolchain (gcc 12.2.0, glibc 2.37, and binutils 2.40), SysV 3.06, systemd 253.0, Python interpreter 3.11.3, NVIDIA driver version 530.41.03, and Xorg Server version 21.1.8. You'll also find updated versions of supported desktops, including XFCE 4.18.3, MATE 1.26.1, GNOME 44.0, and KDE Plasma 5.27.4. All in all, NuTyx supports 13 different Linux desktops. Since version 22.12, there have been more than 1000 commits applied.
The latest release of FreeBSD, version 13.2, has been released. It contains lots of package upgrades including to OpenSSH 9.2p1, OpenSSL 1.1.1t, and OpenZFS 2.1.9. Other new features include upgrading the bhyve hypervisor to now support more than 16 virtual CPUs in a guest, a WireGuard VPN driver, netlink for network configuration, and lots more. See the release notes for more information.
Ubuntu Budgie 23.04 (Lunar Lobster) is a normal release with 9 months of support, from April 2023 to January 2024. Ubuntu LTS releases are focused on long term support. If stability is more important than having the latest and greatest version of the kernel, desktop environment, and applications then Ubuntu Budgie 22.04 LTS is perfect for you.
For Ubuntu Budgie the latest budgie-desktop v10.7.1 is now available for 23.04 out of the box. We have also made this available via our backports-budgie PPA for our 22.04 LTS community: This is the new version of the Budgie Desktop v10.7 from the BuddiesOfBudgie organisation which Ubuntu Budgie are a key contributor to.
What is an Automatic Text Summarization Process?
Automatic summarization is a crucial process for many applications, as it helps to quickly identify the most important information in a large dataset. This not only saves time, but also makes it easier to understand and analyze the data.
What is Typesense?
Typesense is an incredibly fast search engine that can tolerate typos, allowing you to quickly and accurately search your data even if you make mistakes while typing.
Firefox 112 intros a handful of changes that gives some extra buffs to this brilliant open-source web-browser.
Like what?
Well, Mozilla mention the ability to right-click in a password field to access a ‘reveal password’ option. This sounds a bit of a strange addition, granted. But not all password fields pre-populated with your saved credentials offer an option to un-asterisk credentials, so it may be useful.
The Document Foundation, thanks to the widespread popularity of LibreOffice, is recognized as one of the largest FOSS organizations worldwide, and especially in Europe (where the project was born over 20 years ago).
The SoftRF T-BeamSUPREME is a new small embedded device designed and produced by LILYGO and SoftRF. The new development board is compatible with U-blox MAX-M10S modules and Seemtech SX1262 LoRa modules.
<img alt="" src="https://res.cloudinary.com/canonical/image/fetch/f_auto,q_auto,fl_sanitize,c_fill,w_720/https://ubuntu.com/wp-content/uploads/ac53/Snap-optimization-3.gif" width="720" />
Welcome to Part 2 of the “optimise your ROS snap” blog series. Make sure to check Part 1 before reading this blog post. This second part is going to present initial optimisations already used in the Gazebo snap. We will present the benefit that they could bring to our ROS snaps as well as the performance results.
Before its release, the Gazebo snap was using two optimisations that we need to cover first.
React and Next.js!
React is a popular free and open-source JavaScript framework for building enterprise-class web apps, reactive user-interface, and fast end-results.
DataparkSearch Engine is a powerful and versatile search engine that can be used to search for information within a website, group of websites, intranet or local system. This open-source web-based search engine is equipped with a wide range of features that make it stand out from the competition.
One of
A structure is a data type created by the user which combines multiple variables of different data types into a single entity identified by a single name.
The C library function memmove() is used to copy a certain number of bytes from one memory address to another.
The sin() function calculates the sine of an angle. It can be accessed using header file and takes a single argument which is the angle in radians.
In C programming, the structure and union are two different datatypes with similar syntax but differ in terms of memory allocation.
C programming does not support foreach loop. In this article, one can find some solutions to use foreach loop in C.
Binary number is a combination of 0 and 1 while decimals mean in the form of base 10. Follow this article to convert binary numbers to decimals in C.
The strupr() function changes a string's case to uppercase. This article is a guide about strupr() function in C programming.
To Get the class name of an object/variable in Python, the user can use the type() method, the __class__ attribute, or the __class__.__name__ attribute.
This error is caused by calling a variable with parenthesis when it is neither a module nor a function. Also, due to an invalid call to imported module’s method
To convert a list of tuples into a dictionary in Python, use the dict() constructor with either the list comprehension approach or the map() method.
The decode() method is used to decode an already encoded string. To do this, you need to specify the encoding format that was used on the original string.
The user can use various approaches to find duplicates in a list including the conversion of a list into a set, the use of the count() or the if-not condition.
To encrypt strings in Python, you can use the fernet module from the cryptography library. Otherwise, you can utilize the rsa library.
RS can be used freely and without permission to indicate that software or a project is derived from or based on Rust, compatible with Rust, inspired by Rust, or can be used for the same purpose as Rust. We recommend using RS instead of ‘Rust’ if you have any concerns about your use falling outside of this policy, for example, naming your crate foo-rs instead of rust-foo.
Slowing time isn't always a good thing.
This could be huge.
An ethereal glimmer under the water.
Life beyond our expectations.
Surprise!
You've never seen it like this before.
A new report suggests American teens aren’t thrilled with the VR metaverse—just 4% report daily use of VR headsets.€ According to a survey of 5,600 teens in America, VR ownership is relatively low compared to smartphones, too. Just 29% of those surveyed said they owned a VR headset, compared to 87% for smartphones.
Security updates have been issued by Debian (keepalived and lldpd), Oracle (kernel), and SUSE (kernel, podman, seamonkey, and upx).
As we approach KubeConEU 2023, it’s useful to look back at all the progress that’s been made with Kubernetes since the original KubeCon in 2015. We’ve seen the project mature over 26 releases.
CISO ordered federal agencies to patch Veritas Backup Exec vulnerabilities exploited in ransomware attacks.
Microsoft catches an Iranian government-backed APT launching destructive Azure wiper attacks disguised as ransomware.
Statements from the FBI and former Oldsmar city manager indicate what happened at the plant may not have been the work of an outside hacker.
The intelligence files related to the Ukraine war that appeared online aren't the first sensitive military documents shared on video game forums.
Tech giant MSI confirms a cyberattack that resulted in system disruptions and possible exposure to firmware image manipulations.
A Tesla owner is seeking class action status for a lawsuit accusing the automaker of allowing its workers to use intimate or embarrassing imagery captured by the electric vehicles.
Latitude Financial said it had recently received a ransom threat from the group behind the cyberattack, which it was ignoring in line with government advice.
Culbertson Memorial Hospital is on the road to recovery after being hit by a cyber attack on March 30.
The attack came in the overnight hours when employees reported a disruption when trying to access the hospital’s server.
The hospital’s CEO, Gregg Snyder, said he called in third party specialists to assist with the problem. After 12 days of work, Snyder said all critical systems have been fully restored.
On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers. "The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules to protect consumers and strengthen reporting requirements," said FCC Chairwoman Jessica Rosenworcel in announcing the proceeding. "This new proceeding will take a much-needed, fresh look at our data breach reporting rules to better protect consumers, increase security, and reduce the impact of future breaches."
An unknown number of Uber drivers have been informed by a legal firm that represents Uber Technologies that sensitive data, including their identities and Social Security numbers, has been taken by cyberattackers. This data includes the drivers’ names.
According to NCB’s March 24 letter, NCB discovered on February 4 that an unauthorized party gained access to their systems on February 1, 2023. They confirmed on March 8 that some information on consumers’ Bank of America past-due credit card accounts was potentially accessed. The credit cards were already closed, but information on the consumers is the concern. According to NCB’s records, the information potentially accessed may have included first and last name, address, phone number, email address, date of birth, employment position, pay amount, driver’s license number, Social Security number, account number, credit card number, routing number, account balance, and/or account status.
Yum! Brands, Inc., which runs the restaurants KFC, Pizza Hut, Taco Bell, and The Habit Burger Grill, submitted a notice of security breach to warn of a cybersecurity incident affecting individuals’ personal information that happened in mid-January 2023.
Although some data had been taken from the company’s network, the company had previously claimed no proof of identity theft or fraud involving individual users’ data.
Ukrainian hacktivist team Cyber Resistance hacked the email of Lieutenant Colonel Sergey Alexandrovich Morgachev, an officer of the Russian Main Intelligence Directorate of the General Staff of the Russian Army (GRU), leader of the Russian hacker group APT 28, consisting of officers of the 85th Main Special Service Center of the GRU, military unit #26165. Dumps of his private correspondence were exclusively provided by the hacktivists to the volunteers of InformNapalm volunteer intelligence community for analysis.
HR software and payroll powerhouse SD Worx suffered a cyberattack last week, forcing it to shut down some of its IT systems.
In a notification issued to potentially affected customers, SD Worx said it spotted malicious behavior in its networks and endpoints (opens in new tab), so in order to isolate the threat, ceased operation of its systems for UK and Ireland customers.
The police department in Camden County, New Jersey confirmed that it was hit with a ransomware attack last month and is still investigating the incident.
A spokesperson for the department — which serves the county’s 523,000 residents — told Recorded Future News that the ransomware attack took place on March 13. Camden County borders Philadelphia to its northwest.
“The agency is operational and did not experience any disruption or outages in its public safety response services to the Camden City community,” said spokesperson Dan Keashen. “At this time, the department is working with information technology and law enforcement professionals to ensure that there is no remaining threat in our network.”
Stroud Area Regional Police Department ("SARPD") announced today that it has taken action after learning of a data security incident which may have impacted certain individuals' personal information. SARPD began providing notice to all potentially impacted individuals on April 10, 2023.
What Happened? On June 29, 2022, SARPD became aware of a data security incident that impacted its server infrastructure and took its systems offline. SARPD immediately undertook efforts to restore its servers, and backups and other information maintained by SARPD were used to enable near seamless restoration of security and operations. SARPD also undertook additional affirmative steps to safeguard the security of data maintained on it systems. SARPD simultaneously retained a forensic investigation firm to determine the nature of the security compromise and identify any individuals whose information may have been compromised.
Mutual de Seguros de Chile is a private, non-profit corporation in the life insurance industry. It also provides other types of benefits to its 500,000 policyholders. On April 3, BlackCat added the insurer to their leaks site with some sample files as proof.
By Matthew Walsh and Jack Moore China said it had “successfully completed” three days of war games around Taiwan on Monday, capping a show of force that saw it simulate targeted strikes and practise a blockade of the self-ruled island.
China's military carried out aerial and naval blockade drills around€ Taiwan€ on Monday, its last scheduled day of exercises, as the US Navy said€ it sailed a guided-missile destroyer through waters claimed by Beijing.
French President Emmanuel Macron begins a state visit to the Netherlands on Tuesday featuring a speech on Europe that will be keenly watched after his controversial remarks on its ties with the US and China.
Ukraine’s armed forces are gearing up for a counter-offensive to take back territory currently occupied by Russia. But it is not just the military that is preparing – civilian administrations in exile are also making plans for their return. FRANCE 24’s correspondent Gulliver Cragg met with the exiled mayor of Melitopol, a city that is currently acting as the capital of the Russian-occupied part of Zaporizhzhia region. But, he says, not for much longer.
The leak of highly sensitive US documents – many of them related to the Ukraine conflict – presents a "very serious" risk to US national security, the Pentagon said Monday.
The United States and the Philippines on Tuesday launch their largest combat exercises in decades that will involve live-fire drills, including a boat-sinking rocket assault in waters across the South China Sea and the Taiwan Strait that will likely inflame China.
Russia and Ukraine on Monday carried out a major prisoner swap, with 106 Russian prisoners of war being freed in exchange for 100 Ukrainians, both sides said. The exchange comes as the commander of Ukraine's ground forces said Russian troops had switched to "scorched earth" tactics in the embattled eastern city of Bakhmut, destroying buildings and positions with air strikes and artillery.€ Follow our blog to see how the day's events unfolded. All times are Paris time (GMT+2).
The Singapore-flagged tanker Success 9 has been boarded by pirates off the Ivory Coast in the latest attack in the region. Security company Praesidium International reported that the vessel was boarded on 10 April while 500 km south of Abidjan.
North Korean leader Kim Jong Un called for expanding the country's war deterrence capabilities in a "more practical and offensive" way, state media said Tuesday, to counter what it called "frantic" aggression by the United States and South Korea.
A Louisville bank employee armed with a rifle opened fire at his workplace Monday morning, killing five people — including a close friend of Kentucky's governor — while livestreaming the attack on Instagram, authorities said.
US officials are searching for the source of a security breach as highly classified documents were allegedly leaked over the past few weeks on social media platforms. Showing war-sensitive details on Ukraine's military defences as the embattled nation prepares to launch a counteroffensive against Russian forces, the documents drew international scrutiny while alarming the Pentagon.
An "objectively traumatic event".
Industrial-scale bitcoin mining facilities in the US create as much carbon pollution as 3.5 million gas-powered cars, and Texas, which boasts the largest number of mining facilities in the country, will see the cost of electricity rise nearly 5% by mid-2023 due to cryptocurrency mining.
Electrolysis-based hydrogen production should be excluded from the general inclusion of hydrogen production under the Industrial Emissions Directive (IED), according to Hydrogen Europe.
A change is coming.
The U.N. food agency said Monday it urgently needs $800 million for the next six months to help Afghanistan, which is at the highest risk of famine in a quarter of a century.
The International Monetary Fund (IMF) forecasts that the global economy will grow at around 3% annually over the next five years, its weakest medium-term projection since 1990.
Hong Kong’s catering sector saw an estimated drop of 15 to 20 per cent during the Easter break, an industry representative has said, as the city recorded more than 1.5 million resident departures between Ching Ming Festival on Wednesday and the long Easter weekend.
Walmart has sued Capital One over “Poor Customer Service” just four years after suing Synchrony for “not taking on risky customers”. We heard a story like this one back in 2019, when Walmart sued Synchrony on their co-brand card.
US President Joe Biden will arrive in Belfast Tuesday to launch high-profile commemorations of the 25th anniversary of the deal that brought peace to Northern Ireland.
Northern Ireland was torn apart by three decades of violence between nationalist and unionist communities that ended with the Good Friday Agreement signed exactly 25 years ago on Monday.
Egyptian authorities have since 2020 carried out a campaign to silence female social media influencers, using a cybercrime law to detain them on vague charges such as violating “public morals” and “undermining family values”. Last week, TikTok celebrity Salma Elshimy became the latest in a growing list of women to fall foul of the authorities over social media posts.
Hong Kong’s women’s ice hockey team scored a historic win at an international tournament on Sunday. Their victory was celebrated by Secretary for Culture, Sports and Tourism Kevin Yeung and Hong Kong’s top sports federation, weeks after they blasted the city’s ice hockey body over a national anthem blunder in February.
UN human rights chief Volker Turk said Monday he was "very concerned" after China sentenced two prominent human rights lawyers to more than a decade in jail.
The United States on Monday officially determined that Russia had wrongfully detained Wall Street Journal reporter Evan Gershkovich and urged his immediate release, stepping up pressure on his behalf
Iranian authorities Saturday announced the installation of surveillance cameras in various public locations to identify and penalise women who defy the national religious dress code by not wearing a hijab.
The US Court of Appeals for the Seventh Circuit on Friday ruled that an Indiana school district did not violate a teacher’s right to exercise their religious practices after the school terminated the teacher for refusing to use students’ preferred names or pronouns as required by school policy.
Chinese authorities Monday sentenced two of the country’s most prominent human rights activists to prison for the crime of “subversion of state power.
As the ruckus from Taylor Swift’s ‘Ticketmaster debacle’ simmers down, the ticketing space is quietly working on solutions.
Gimme Radio is shutting down at the end of this month after more than six years. The move comes just 11 months after its last investor fundraising round of $3 million.
Well I survived the wind from last night! It was pretty xrazy until around 3am. Today was a shifting aite day so the morning was spent packing up and cleaning. We were invited to the Presidental summer palace, Verdala Palace. The scout group we firet stayed with in Zurrieq were having a camp there and arranged a tour for us. It is an impressive palace which was built as a fortress in the 1500s. The building has been lovingly restored after some inexcusable vandalism in the form of British diplomat wives wanting to redecorate. After the palace, we had to get shifting to Ghajn Tuffeia. I was part of the car party for this one. Loading and unloading bita of kit. I spent the afternoon catching up on past issues of Private Eye in the sun. Once more people started arriving, I finally got my feet in the sea. It was chuffing freezing. Might paddle some more tomorrow. I also had the pleasure of meeting a friend from previous Scout adventures in Poland. We had a nice long catch up and might be meeting up for some lunch tomorrow.
I think people are starting to realize that the situation in the US and elsewhere is going to get a lot worse before it's going to get better.
The Russian troll army and the social rage media like Facebook and Twitter are just exacerbating the entire thing. They exploit every weakness, every fracture, every divide. It doesn't actually matter what we're divided over, as long as there is division to exploit, as long as there is rage to cultivate. Like a poisonous plant, it is encouraged to grow in every crack we leave.
I've spent a week now with Hyprland and I've decided I'm going to continue with it instead of Sway. It's a little more beta compared to Sway which has been rock solid for a while, but here are some of the things that have made the switch worth it to me.
As of now, all of my personal side projects that I've shared are basically complete (I just have to add query support to Cosmarmot). Lately I've been playing with writing GTK4 apps in Common Lisp, my reasons being that I really enjoy the look of a well-designed GTK/Libadwaita application, especially one that supports responsive design for narrow windows and mobile, and fits in well in my Gnome desktop, and because the Common Lisp bindings are so good thanks to the very good GObject introspection bindings. I've done enough to start to get comfortable with writing GUI code, something that has never been my forté. The last time I dipped my toes in desktop GUI programming was writing panel widgets for Gnome 1 (!) in Python. I do feel like writing something fun in it, though.
I have two ideas, and I'm only probably going to work on one. Both of them are kind of unnecessary for their respective ecosystems, but each would add something that hasn't appeared or hasn't become common yet.
Currently GPT 4 is all over the Hacker News main page, and I keep peeking into the threads, just to find that there is nothing actually informative there (while the linked articles are dull, and seem to be there primarily to serve as a subject for chatter), though there are many excited people. Some suggest that GPT 4 is intelligent and capable of reasoning now, while GPT 3 was simply regurgitating things, but still providing no evidence. Though not a long time ago, when GPT 3 was released, people were almost panicking that it is too good to release, that it will distort the coverage of reality in the news (more than people do, apparently). I guess major changes/advancements like that do happen sometimes, but much more often there is just this annoying hype. To add to the annoyance, perhaps the major "AI" application people run into these days are broken chat bots serving as a moat on the way to get help from human operators (which is needed when other, less sophisticated stuff malfunctions). And perhaps video surveillance (though that likely depends on the jurisdiction).
So, this one seems to work. It is meant to facilitate keeping a micro-blog of sorts in my own gemini capsule. I don't get to like it a lot because BASH is out of my comfort zone, and besides, I'm not too happy about the way BASH syntax works with variables, concatenation and all that. But it seems to work, and that's good enough to share. Perhaps it might help somebody who knows even less than me, or, hopefully somebody can catch a bug lurking in it, and/or improve it.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.