Arduino opened registration for an Arduino Core Developers Workshop following a shakeup in which controversial CEO Federico Musto left the company. Arduino developers who are wondering what the new Arduino will look like after last week’s shakeup can now sign up for an Arduino Core Developers Workshop to be held in Turin, Italy, from Sep. 29 through to Oct. 1st.
The Linux Foundation’s Automotive Grade Linux (AGL) project released Unified Code Base (UCB) 4.0 (“Daring Dab”) for Linux-based in-vehicle infotainment (IVI) systems, and added seven new members. The open source group also launched a new virtualization working group that will enable new UCB profiles for telematics, instrument clusters, and head-up-displays (HUDs). In other Linux automotive news, Ubuntu has been spotted in an Uber self-driving car trial (see below).
Linux Toys has announced PiCluster 2.0. The new version of the open source container management tool is written in Node.js and is designed to deliver an upgraded experience through cleaner CSS and JQuery dialogue windows.
In late June, noted open-source programmer Bruce Perens warned that using Grsecurity's Linux kernel security could invite legal trouble. "As a customer, it’s my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity," Perens wrote on his blog. The following month, Perens was invited to court. Grsecurity sued the open-source doyen, his web host, and as-yet-unidentified defendants who may helped him draft that post, for defamation and business interference.
The combination of a database and full-text search analytics becomes unavoidable these days. In this blog post, I will demonstrate a simple way to analyze data from a database with analytics software by using Scylla and Elasticsearch together to perform a simple data mining exercise that gathers data from Twitter.
Vendor management has long been an important – if a tad unglamorous – need in IT shops. That proves even more true in the hybrid cloud era. Hybrid cloud models, especially in concert with a multi-cloud strategy, entail working with multiple offerings and vendors.
This tutorial shows you what is an AppImage and how to use AppImage to install applications in Linux. In addition to that, it also tells you a few things that you should keep in mind while using AppImage.
We US-ians have been sheltered from the exhaustion of IPv4 addresses, but they have run out. IPv6 networks are up and running, so we have no excuses for not being IPv6 literate. Today our scintillating topic is iptables rules for IPv6, because, I am sad to report, our faithful IPv4 iptables rules do not magically work on IPv6 packets, and we must write new rules.
These days when a new version of an operating system is released, there's usually not a lot of gee-whiz new whistles and bells to make the front office folks salivate -- especially if it's a point release. But there are still plenty of new features to make DevOps folks happy -- nuts and bolts stuff that makes everybody's life easier.
The AGL project released UCB 4.0 with new SmartDeviceLink support, and Ubuntu was spotted in an Uber self-driving trial. The Linux Foundation’s Automotive Grade Linux (AGL) project released Unified Code Base (UCB) 4.0 (“Daring Dab”) for Linux-based in-vehicle infotainment (IVI) systems, and added seven new members. The open source group also launched a virtualization working […]
Throughout the last decade, we've been undergoing rapid change in the way we deliver services, conduct our business, share our lives on social media, and use digital technology to engage with one another globally. Let's talk about a short list that is now our norm: digital media consumption, on-demand entertainment, self-driving cars, augmented reality, credit card chips, smart phones, smart wearables, and even drone delivery for your "I can't wait" items. We can even create organs on a 3D printer—total sci-fi stuff for anyone born before 1983. read more
Using bash pipelines and subshells to improve the performance of bash scripts and increase your bash foo! Bash is a deceptively simply interpreter, seemingly easy to use but harder to master its subtleties. But this is what makes free software so much more fun and intellectually stimulating than stuff rushed out a corporate door with deadlines and minimal viable product mentality.
Cylon is a menu driven small shall script which basically gives you an idea to manage/maintain the Arch Linux and it’s derivatives by offering fourteen categories with variety of applications.
Here's a bit of positivity for you today! According to the statistics gathered by the netmarketshare website, in July the percentage of people using Linux on the desktop hit an all time high.
I recently finished reading Your Starter Guide to Maker Spaces by Nick Provenzano, a Raspberry Pi Certified Educator. In the book, Nick describes a Raspberry Pi competition at the school where he teaches. Each student received a Raspberry Pi kit and was told to identify a problem, come up with a solution using the Pi, and not spend more than $75 on their project. The students' solutions varied, but the common result was that the students taught themselves to code.
VeraCrypt is a powerful cross-platform tool for encrypting files and drives. Learn how to use it to encrypt your portable USB drives.
DEF CON Machine-learning tools can create custom malware that defeats antivirus software. In a keynote demonstration at the DEF CON hacking convention Hyrum Anderson, technical director of data science at security shop Endgame, showed off research that his company had done in adapting Elon Musk's OpenAI framework to the task of creating malware that security engines can't spot.
The net neutrality discussion is, at its core, about free speech on the internet. Free speech online is a driving force for the online community; an average of 1.32 billion people each day share their voices on Facebook alone (as of June 2017). It's possible to be heard as well, with more than half of Americans using the internet as their primary source of information. read more
As they do every year, hackers descended on Las Vegas this week to show off the many ways they can decimate the internet's security systems. Here's a collection of some of our favorite talks from this week's Black Hat conference, including some we didn't get the chance to cover in depth.
In today's threatscape, anti-malware software provides little peace of mind. In fact, anti-malware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.