Ubuntu 22.10 is here, and with it comes the full GNOME 43 experience. In this video, the October 2022 release of Ubuntu is reviewed, which will include some of the new features, and final thoughts as well.
Ubuntu 22.10 “Kinetic Kudu” is now out with revamped visual elements, an updated set of applications with newer features, additional settings, and a host of other new things. Ubuntu interim releases are always interesting as they bring many new things to table. Ubuntu developers play around with new features and variations with these interim releases.
A Quick Overview of Archcraft 2022.09.16
Liz Rice considers several facets where eBPF can help, from dynamic vulnerability patching through super-fast load balancing to multi-cluster networking.
Intel has officially released its first graphics driver package, designed for Linux Ubuntu 22.04 LTS. The new driver stack will allow any PC user to quickly set up an Arc GPU in their system as if it were a Windows-based system.
Intel has just released the first Linux-bound graphics driver for its new Arc graphics cards, and as long as you’re running Ubuntu 20.04 or 22.04, you should be able to get going fairly quickly. We emphasize “fairly” because you will be copying and pasting a fair number of commands to get your card fully operational. In our multiple rounds of testing the install of this driver, we ran into no issues.
All of the commands required to get the Arc driver installed can be found on this respective dGPU support page. Before the copy and paste action begins, you should type in “sudo ls” and then your password to prevent hiccups with the first command block. Some of the provided command blocks have multiple commands paired together; all can be copy and pasted together and executed as one in the terminal.
If you're working in the design industry, these color picker and color management Linux apps are a must for you.
For designers and graphic artists of all types, color is a key component of the job. How do you manage those colors? How do you determine the right one? How do you hone in on exactly the hue you want?
Turns out, there are free and open-source apps available to handle each of these tasks on Linux. And the options available may be more diverse than you think.
Power your Raspberry PI Pico with batteries: tutorial to understand how to use a battery pack...
Chromebooks are more powerful than you think. It’s no longer just a web browser anymore. It is also possible to run Linux programs, even Libre Office. This guide will show you how to use Libre Office on your Chromebook.
Penetration testing is a type of security testing used to test an organization’s defenses. Your goal as a pentester is to find and exploit vulnerabilities in the system to gain access to sensitive data or systems. One of the most popular tools for conducting penetration tests is Metasploit. In this tutorial we show you how to install Metasploit Framework on a Ubuntu Linux machine.
Here’s a quick guide on finding the GNOME desktop (or Shell) version via the command line and GUI.
Here's a quick guide on how you can find GNOME Shell version in Ubuntu and other Linux distributions (GUI and CLI method).
In the last few months of this year, a business question exists in all our minds:
-Can we reduce Cost ? -Are there any legacy cloud resources that we can remove ?
The answer is YES, it is always Yes. It is part of your Technical Debt (remember that?).
In our case we had to check a few cloud resources, but the most impressive were our Object Storage Service that in the past we were using Buckets and Objects as backup volumes … for databases … database clusters!!
So let’s find out what is our Techinical Debt in our OBS … ~ 1.8PB . One petabyte holds 1000 terabytes (TB), One terabyte holds 1000 gigabytes (GB).
We have confirmed with our colleagues and scheduled the decomissions of these legacy buckets/objects. We’ve noticed that a few of them are in TB sizes with million of objects and in some cases with not a hierarchy structure (paths) so there is an issue with command line tools or web UI tools.
have a tutorial that explains the basics of the SSH client configuration file and some of the most common configuration options for Linux and Unix developers or sysadmin. In this quick tip, I will explain how and why you sometimes need to ignore or exclude the ssh client config file under Linux, Unix, *BSD and macOS.
In this tutorial, we will show you how to enable BBR on Ubuntu 22.04 LTS. For those of you who didn’t know, BBR a.k.a Bottleneck Bandwidth and Round-trip propagation time is a new congestion control algorithm developed at Google. Its helps to improve the connection speed. The main goal of BBR is to initiate network utilization and reduce queuing. However, this feature should only be enabled on servers and not at the network or client level.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step enabling TCP BBR on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.
Mastodon is free and open-source software for running self-hosted social networking services.
Node.js is a crucial development tool for cloud native development. Because Node.js is very resource-efficient and high performing, it’s perfectly suited for apps and services that need to function at a larger scale. With Node.js, you can develop SaaS applications, such as those used by Netflix, Uber, and Linkedin.
You probably already know what Node.js is. For those of you who do not, it’s an open source server software that runs on almost every platform. An asynchronous, event-driven JavaScript runtime, Node.js is ideal for building scalable network apps and services. Node.js can be used to create very basic applications (such as the always fun “Hello, World” app) to very complex applications.
Time for another revision of the digiKam Recipes book. This update features a completely revised chapter covering the versioning functionality in digiKam. It now offers a clear explanation of how versioning works in digiKam, which can help you to get the most out of this versatile feature. The Add shell scripts to the Import module chapter has also been revised to include a better practical example of how to use shell scripts with the Import tool.
This is the release schedule the release team agreed on
https://community.kde.org/Schedules/KDE_Gear_22.12_Schedule
Dependency freeze is in TWO weeks (November 3) and feature freeze one after that.
Update on what happened across the GNOME project in the week from October 14 to October 21.
Coming Soon ââ¢
OpenBSD 7.2 is here, spanning an impressive 14 different computer platforms, including FOSS fans who have the newest Apple Arm-based Mac models.
The Reg FOSS desk took a look at OpenBSD 7.1 back in April, and for an overall assessment, what we said there stands. Version 7.1 was mainly noteworthy for including fairly preliminary support for Apple Silicon-based Macs, meaning the M1 processor. The new version 7.2 builds on that by adding three new Arm-based platforms: Apple M2-based Macs, Ampere's manycore Altra CPUs, and Lenovo's Snapdragon-based Thinkpad X13s.
The release notes list this version's new features in detail, and there's even more in the changelog. This is a minor version, so the changes are relatively modest: various bugfixes, improved handling of power management and SMP, and better support for running in Oracle Cloud instances. There's better support for some newer Intel wireless and graphics chipsets, including the AX210 and AX211 Wi-Fi chips, and the built-in graphics of Intel Alder Lake and Raptor Lake processors.
We all know the scene. The room is dark, with the only light provided by the laptop screen. The hooded figure is typing furiously at the keyboard. Suddenly, lines of symbols, letters, and numbers fly into the terminal window as the nefarious character smiles brightly. They. are. in.
But not so fast! The dogged security team has been planning for this. Protocols are in place. The breach is secured; the sinister hacker is captured; and of course, the world is saved. Ah, MovieOS. Don’t you just love it?
Now we all know in the real world, trying to keep any type of technology secure is nearly a herculean task. Strengthening security for the FreeBSD Operating System is no different. But we wanted to know more about exactly what the FreeBSD Security Team does and why they do it. So, we sat down with Gordon Tetlow, a volunteer FreeBSD Security Officer, and Ed Maste, Deputy Security Officer, and Mark Johnston, a FreeBSD security team member. The latter two are sponsored by FreeBSD Foundation and support the security team in both ongoing operational aspects of the team’s work, and proactive development.
If you haven’t used packages for software management in a while, it might be time to give them a try again! Since the introduction of the pkg management tool, binary package management has become incredibly simple and fast on FreeBSD. Binary packages are pre-compiled and require no in-depth understanding of compiling software on FreeBSD, making them the ideal method to install software for new users.
SEMIBUG is hosting a presentation by David Maxwell on security and NetBSD, tonight. It’s hosted online so if you can read this, you can attend.
To me, this week felt somewhat unspectacular. Staging projects are moving along, snapshots are coming out and no drama happened. That’s a good week, right? For Tumbleweed, this seems to be any regular week with 7 published snapshots (1014…1020).
Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)!
I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.
This is a weekly report from the CPE (Community Platform Engineering) Team. If you have any questions or feedback, please respond to this report or contact us on #redhat-cpe channel on libera.chat.
We provide you both infographics and text version of the weekly report. If you just want to quickly look at what we did, just look at the infographic. If you are interested in more in depth details look below the infographic.
Please join us at the next regular Open NeuroFedora team meeting on Monday 24 October at 1300 UTC. The meeting is a public meeting, and open for everyone to attend.
Installing Steam on a Linux system just got a little easier, at least if you can install a Snap package. Ubuntu-maker Canonical announced today that its Steam Snap supports "bleeding edge" Mesa graphics APIs, with more improvements coming soon.
Snaps are self-contained packages that are easier for users to install without command lines and also contain the other programs and libraries they rely on, preventing conflicts between the versions of installed software applications (i.e., dependency hell). They're theoretically easier to update through a store app and are sandboxed from the rest of the system. They're also not universally appreciated in the greater Linux community, as they're pushed primarily by Canonical through its Snap Store and can reduce the performance of some apps.
Canonical worked with Steam-creator Valve to create the Steam Snap in "Early Access" in March. It bakes in the Mesa drivers and Proton and Wine wrappers needed for some Windows-via-Linux games, resolves the 32-bit/64-bit discrepancies for certain libraries, and handles the other necessary items that users would typically be pulling in via command-line and private repositories.
The latest Steam Snaps add support for removable media, high-DPI displays, and localization. Canonical states that the app also benefits from a migration to Core 22 and LZO compression. (Snaps were originally developed for Ubuntu's mobile OS and embedded/Internet of Things platform. It's complicated.)
At the moment, installing the Steam Snap pulls in the very latest Mesa drivers from Oibaf's PPA repository. In the near future, Canonical wants to let Snap installers customize their install if they wish, choosing "fresh" or "turtle" Mesa drivers for the latest point release or stable releases, respectively.
Linux software company Canonical Ltd. today announced a major new release of its popular Ubuntu operating system. Ubuntu is one of the most widely used versions of Linux and is especially popular with large enterprises, which use the software to power all kinds of public cloud environments and business applications.
Pi Zero Bikecomputer offers you a complete open-source guide and tools to build your own GPS cycling computer with Raspberry Pi Zero (W, WH, 2W).
The project is the brain child of Hishizuka, who is a cyclist and a developer as well from Japan.
Pi Zero Bikecomputer is a GPS and ANT+ bike computer based on Raspberry Pi Zero(W, WH, 2 W). This is the first DIY project in the world integrated with necessary pieces of hardware and software packages for modern bike computer.
It measures and records position(GPS), ANT+ sensor (speed/cadence/power) and I2C sensor (pressure/temperature/accelerometer, etc.). It also displays these values, even maps and courses in real-time. In addition, it writes out log into .fit format file.
If there’s one thing the Raspberry Pi is good for, it’s breathing life into old hardware. Of all the projects we’ve covered involving vintage hardware, we’ve never seen something quite like this Raspberry Pi-powered tank simulator that YouTuber Tom Scott had the privilege of demonstrating in his recent video. This simulator was originally built in the 1970s but still works today thanks to a little help from our favorite SBC.
According to Scott, this is the last 1970s tank-driving simulator left in the world. The unit features a box in which users can sit with realistic controls that would be found inside the cockpit of an actual tank. The screen shows them what’s in front of the tank while the box is rigged to tilt and move in real-time to simulate the effects of driving a tank in the real world.
BigTreeTech known primarily for its 3D printing accessories, has released a Raspberry Pi CM4 (opens in new tab) alternative board. The device, as reported by CNX Software (opens in new tab), uses the exact same form factor as the Compute Module, but downgrades the specs. Still, if you’re after a low-power board for IoT or other product that needs the kind of IO a CM4 can provide, this looks like a reasonable replacement.
About a year ago I wrote about my gripes with Firefox not playing nicely with KDE Plasma Activities and how I created an Activity-aware Firefox hack/wrapper.
[...]
That said, you are warmly invited to visit Activity-aware Firefox’ GitLab repository, where you can read more about it, install and use it …and of course, help make it even better by contributing code, bug reports or ideas :)
We are launching a new role in the Native Language Communities. This role aims to improve the communication between the global projects, The Document Foundation and the local communities.
This communication should be directed in two ways: keep local communities informed on what is happening internationally, and keep the international community informed of what is achieved by the local communities.
My hope is also that TDF will be able to bring more help, if it is informed of the achievements, difficulties, wishes and needs locally.
October 21st marks Global Encryption Day, a time that calls to mind the many benefits of an unfairly (but increasingly) maligned technology. This has given us an occasion to reflect on recent attacks to encryption on the part of governments, specifically the European Union.
[...]
Chat control measures have been discussed in the EU for some time. Now, they seem dangerously close to adoption. They follow a temporary measure adopted by the European Parliament, which requested that communication providers voluntarily hand over information to law enforcement sourced from an individual's communications. A proposal currently under discussion within the Council of the European Union seeks to make this measure permanent, and moreover, to make it mandatory for email and chat hosts to spy on their users. In the case of end-to-end encryption, this means installing a permanent client-side backdoor into both free and nonfree messaging apps. And while there has been some resistance to legislators' actions from advocacy groups like European Digital Rights, and others in the EU, this has not created a change in direction. Chat control needs to be stopped in its tracks.
Pretty much all the practitioners I favor in Software Architecture are deeply suspicious of any kind of general law in the field. Good software architecture is very context-specific, analyzing trade-offs that resolve differently across a wide range of environments. But if there is one thing they all agree on, it's the importance and power of Conway's Law. Important enough to affect every system I've come across, and powerful enough that you're doomed to defeat if you try to fight it.
[...]
Conway's Law is essentially the observation that the architectures of software systems look remarkably similar to the organization of the development team that built it. It was originally described to me by saying that if a single team writes a compiler, it will be a one-pass compiler, but if the team is divided into two, then it will be a two-pass compiler. Although we usually discuss it with respect to software, the observation applies broadly to systems in general.
When you use one programming language daily in your job as a Software Engineer, it's easy to fall into the trap of that language bubble. I want to show you how stepping outside your comfort zone and learning new languages and paradigms helped me grow as a Software Engineer.
Over the years I've transitioned from frontend developer to full-stack developer and even tried professional game development! In that time, I managed and mentored developers at different stages of experience.
I don’t want you to think of me as a hater of C++. In spite of the fact that I’ve been writing a Rust vs C++ blog series in Rust’s favor (in which this post is the latest installment), I am very aware that Rust as it exists would never have been possible without C++. Like all new technology and science, Rust stands on the shoulders of giants, and many of those giants contributed to C++.
And this makes sense if you think about it. Rust and C++ have very similar goals. The C++ community has done a lot over all these years to pioneer new programming language features in line with those goals. C++ has then given these features years to mature in its humongous ecosystem. And because Rust also doesn’t have to be compatible with C++, it can then steal those features without some of the caveats they come with in C++.
It is all well and good talking about REST & HATEOAS in theory or describing the Hypermedia-Driven Application architecture, but, at the end of the day, what matters in software is practical: Does it work? Does it improve things?
We can say for sure that htmx works, since we use it in our own software. But it is hard to say that it would be an improvement over other approaches, since we haven't had an apples-to-apples comparison of how htmx might compare with, say, react.
"Gradual Typing" has become incredibly popular over the last 8 years or so. The most notable examples of this phenomena exist in the JavaScript space. Since JavaScript is the lingua franca of the web there have been several efforts to leverage the benefits of static type systems to enable easier programming-in-the-large for JavaScript. Gradual type systems such as TypeScript and Flow have found the most success in this space.
If you were given a golden ticket of sorts, what would you do with it? What would you build? Would you quit working for a while, or perhaps not work as hard? Or how would you leverage that opportunity that windfall to make your little slice of the world just a little bit better? Recently, I had a chance to talk to a longtime social media pal who is doing something really ambitious and awesome, the kind of thing that makes me wish that more people like him were out there taking big swings. And it comes down to putting a 2022 spin on an old idea: Making a TV station for the local community. Today’s Tedium dives into a creator who’s taking an ambitious idea on the air … along with the rest of his small town.
I’m finding the ethics of all of this extremely difficult.
Stable Diffusion has been trained on millions of copyrighted images scraped from the web.
The Stable Diffusion v1 Model Card has the full details, but the short version is that it uses LAION-5B (5.85 billion image-text pairs) and its laion-aesthetics v2 5+ subset (which I think is ~600M pairs filtered for aesthetics). These images were scraped from the web.
I’m not qualified to speak to the legality of this. I’m personally more concerned with the morality.
The final model is I believe around 4.2GB of data—a binary blob of floating point numbers. The fact that it can compress such an enormous quantity of visual information into such a small space is itself a fascinating detail.
The US Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a Linux kernel flaw to its Known Exploited Vulnerabilities Catalog and instructed federal agencies to address it within three weeks.
Up first this week is a quintet of vulnerabilities in the Linux kernel’s wireless code. It started with [Soenke Huster] from TU Darmstadt, who found a buffer overwrite in mac80211 code. The private disclosure to SUSE kernel engineers led to a security once-over of this wireless framework in the kernel, and some other nasty bugs were found. A couple result in Denial-of-Service (DOS), but CVE-2022-41674, CVE-2022-42719, and CVE-2022-42720 are Remote Code Execution vulnerabilities. The unfortunate bit is that these vulnerabilities are triggered on processing beacon frames — the wireless packets that announce the presence of a wireless network. A machine doesn’t have to be connected or trying to connect to a network, but simply scanning for networks can lead to compromise.
CISA, the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have released a joint Cybersecurity Advisory (CSA), #StopRansomware: Daixin Team to provide information on the “Daixin Team,” a cybercrime group actively targeting U.S. businesses, predominantly in the Healthcare and Public Health (HPH) Sector, with ransomware and data extortion operations. This joint CSA provides Daixin actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) obtained from FBI threat response activities and third-party reporting.
You may not be aware of it, but the work of every ad blocker is powered by “filter lists” — lists of rules that tell the ad blocker how exactly it should block ads. EasyList is a community-run project that maintains one of the world’s most popular ad blocking filter lists.
There are many popular lists (AdGuard filters is one of them), but EasyList has always stood out as the most prominent and the most popular one. If you're using an ad blocker, there's a 99.99% chance you are using EasyList or one of its derivatives.
[...]
Unfortunately, CloudFlare does not allow non-enterprise users use that much traffic, and now all requests to the EasyList file are getting throttled.
The cryptocurrency community is on a collision course with government regulators and the centralized banking system, and the outcome could have big repercussions for a digital currency model based on decentralized finance and peer-to-peer transactions around the globe.
The coming collision was very much on the minds of attendees at Bitcoin Amsterdam this week, billed by event host Bitcoin Magazine as the “biggest Bitcoin conference in Europe.” The Netherlands setting offered a bit of irony. The Bank of Amsterdam was established in 1609 as the world’s first true central bank, and the Sibos central banking conference was taking place at the same time in a different venue across town.
“Are they talking about which nation state they want to cancel from the financial system?” BTC Inc. Chief Executive David Bailey asked in opening session remarks. “I can promise you that’s not what we’re talking about here. As we say in bitcoin: Fix the money and fix the world.”
It was perhaps the most spectacular failed tree planting project ever. Certainly the fastest. On March 8, 2012, teams of village volunteers in Camarines Sur province on the Filipino island of Luzon sunk over a million mangrove seedlings into coastal mud in just an hour of frenzied activity. The governor declared it a resounding success for his continuing efforts to green the province. At a hasty ceremony on dry land, an official adjudicator from Guinness World Records declared that nobody had ever planted so many trees in such a short time and handed the governor a certificate proclaiming the world record. Plenty of headlines followed.
But look today at the coastline where most of the trees were planted. There is no sign of the mangroves that, after a decade of growth, should be close to maturity. An on-the-ground study published in 2020 by British mangrove restoration researcher Dominic Wodehouse, then of Bangor University in Wales, found that fewer than 2 percent of them had survived. The other 98 percent had died or were washed away.
More than 40% of the street network in some cities is suitable for transformation similar to Barcelona-style “superblocks,” according to a new study. The findings highlight the possibilities as well as the complexities of making neighborhoods in diverse cities greener and less car-centric.
Stella Assange said her husband's fight for freedom was not a legal battle anymore, but lies in the hands of politicians. Assange has also been nominated for the European Union's top human rights prize.
Jen Robinson, human rights lawyer for Wikileaks founder Julian Assange, told Australian reporters Wednesday Assange is in poor health for his coming legal proceedings. Assange faces extradition to the US where 18 counts of illegally obtaining, receiving and disclosing classified information await him.
UK Home Secretary Priti Patel approved the extradition in June. Assange is in the midst of appealing the order. If Assange’s appeal to stay fails, the 51-year-old could serve up to 175 years in US federal prison.
The extradition order comes after years of protracted legal battles with Sweden and the US. The threat of possible deportation to Sweden caused Assange to take refuge in Ecuador’s London-based embassy. Ecuador granted Assange’s asylum request in 2012. The Swedish government eventually dropped all charges in November 2019 ending its extradition request.
Her clients range from Julian Assange to Amber Heard, West Papuan freedom fighters to female soccer players – surfer, Bomaderry High grad and London-based human rights barrister Jennifer Robinson reveals the challenges of defending the world’s disenfranchised.
As part of my studies, I was recently required to use a pre-prepared VirtualBox image as a development environment. I was not very familiar using pure QEMU€¹ without any interface such as Virtual Machine Manager€², so it was a bit of a learning process.
A very brief note to announce reaching a long term goal and major milestone for marginalia search.
The search engine now indexes 106,857,244 documents!
The previous record was a bit south of seventy million. A hundred million has been a pie-in-the-sky goal for a very long time. It's seemed borderline impossible to index a that many documents on a PC. Turns out it's not. It's more than possible.
My forth (octiforth maybe?) is a 32-bit, i386 implementation. Partly because I was messing around with a 32-bit OS, partly because I like the minimalism/challenge of not-enough-registers.
Forth provides for double integers -- Forth was often 16 bits and double-ints were 32, but for a 32-bit forth 64-bit double-ints are sensible. Looking at some doc it appears that the two parts of a double are stored in a big-endian way: the high component is below the low.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.