Language Selection

English French German Italian Portuguese Spanish

Gizmoz

Syndicate content
Embedded Linux news & devices
Updated: 1 hour 25 min ago

Embedded computers tap Jetson Xavier NX and AGX Xavier

Tuesday 19th of May 2020 08:21:16 PM
Advantech’s “MIC-710AIX” edge AI computer and 8x PoE “MIC-710IVX” NVR system run Linux on Nvidia’s Jetson Xavier NX. There’s also an AGX Xavier based MIC-730AI system. Advantech has launched two embedded computers built around Nvidia’s Jetson Xavier NX module, which recently began shipping with a $399 Jetson Xavier NX Dev Kit. The MIC-710AIX is a […]

Coffee Lake Box PC offers PCIe and PCI expansion

Tuesday 19th of May 2020 04:15:12 PM
Ibase’s semi-rugged “AMS210” box PC runs on 8th or 9th Gen Coffee Lake CPUs with features including dual SATA bays, 4x GbE, 6x USB, 3x DP, and PCI and PCIe expansion slots. Ibase announced an industrial embedded box PC and “automatic control system” for factory automation, machine vision, digital signage, and industrial IoT applications. The […]

Ubuntu-friendly POS system has up to two 15.6-inch screens

Monday 18th of May 2020 06:33:05 PM
Avalue’s Ubuntu-ready, IP65-protected “RiVar-1501” is a 15.6-inch, HD all-in-one POS terminal with an Apollo Lake processor, GbE, 6x USB 3.0, 2x COM, and support for a second touchscreen. Avalue announced a point-of-sale (POS) capacitive touchscreen terminal called the RiVar-1501 that runs on a quad-core Celeron J3455 from Intel’s Apollo Lake generation. The 15.1-inch, HD capacitive […]

10th Gen Comet Lake-S splashes down on embedded PCs

Monday 18th of May 2020 02:16:08 PM
Vecow’s Linux-ready ECX-2000 Series offer up to 10-core Comet Lake-S CPUs with 6x GbE with PoE and optional 2.5GbE and 10GbE. Below, we take a closer look at Comet Lake-S and sum up the latest news on Intel’s Ice, Rocket, Tiger, and Alder Lake. Vecow announced one of the first embedded industrial computers based on […]

Little Linux wireless gateway keeps it simple

Friday 15th of May 2020 08:38:40 PM
Artila’s compact “Wireless Gateway Matrix-702” for wireless remote monitoring runs Linux on a SAMA5D35 and offers GbE and Fast Ethernet ports and a mini-PCIe slot with micro-SIM. Artila has announced a “simple, cost-effective remote monitoring solution” for “device-to-cloud service.” The DIN-rail mountable, 109.6 x 89 x 30mm Wireless Gateway Matrix-702 has a similar form factor […]

Stinger96 SBC launches and joins 500-unit giveaway of STM32MP1x based 96Boards

Friday 15th of May 2020 03:06:28 PM
Shiratech’s $168 “Stinger96” 96Boards IoT Edition SBC runs Linux on an STM32MP157 and offers an NB-IoT modem. The SBC powers a $195 “IoT Box” system that adds WiFi/BT, mics, and sensors. Shiratech has joined Arrow and ST to give away 500 Stinger96 and Avenger96 SBCs. Shiratech has posted specs for a 96Boards IoT Edition Extended […]

Toradex unveils Apalis i.MX8X module with Torizon Linux support

Thursday 14th of May 2020 10:30:00 PM
Toradex’s “Apalis i.MX8X” module runs Linux on NXP’s up to quad -A35 i.MX8X and offers ECC RAM support. The company also announced that its Torizon Linux distro is available for both the Apalis i.MX8X and smaller Colibri iMX8X. In February while reporting on Toradex’s new Verdin form-factor and Verdin iMX8M Mini and Verdin iMX8M Nano […]

Xavier NX Dev Kit ships as Nvidia adds cloud-native support for all the Jetsons

Thursday 14th of May 2020 04:44:37 PM
[Updated: May 18] — Nvidia’s $399 Jetson Xavier NX Developer Kit runs Linux on the hexa-core Jetson Xavier NX with up to 21 TOPS AI performance. The company also announced cloud native support for the NX and other Jetsons, thereby enabling container apps. Last November, when Nvidia unveiled its Jetson Xavier NX compute module, there […]

Linux-driven networking SBC offers GbE, 2.5GbE, and WiFi 6

Wednesday 13th of May 2020 08:20:05 PM
The Compex CP01 router board — also called the DR6018 — runs OpenWrt on a quad -A53 Qualcomm IPQ6018 and offers a 2.5GbE port, 5x GbE ports with PoE, an M.2 E-key slot, and dual-band 802.11ax (WiFi 6). A Compex CP01 router board has begun sampling with 802.11a/n/ac/ax (WiFi 6) built around a Qualcomm Atheros […]

BeagleBone Green Gateway SBC offers LAN and WiFi too

Wednesday 13th of May 2020 03:27:06 PM
[Updated: May 15] — Seeed has launched a $59.90 “Seeed Studio BeagleBone Green Gateway” SBC that runs Linux on TI’s Sitara AM3358 and combines the Ethernet port of the BeagleBone Green with the WiFi/BLE function of the BB Green Wireless. Seeed has launched a new model in its line of BeagleBone compatibles that balances the […]

Coffee Lake computer offers MXM slot for GPU expansion

Tuesday 12th of May 2020 03:30:31 PM
Cincoze’s rugged “GM-1000” embedded PC combines an 8th or 9th Gen Coffee Lake CPU with an MXM 3.1 socket plus 2x SATA trays, triple display support, 4x USB 3.2 Gen2, multiple M.2 and mini-PCIe, and CMI/CFM I/O expansion. Cincoze announced a GM-1000 “GPU computer” that adopts the MXM 3.1 Type A/B expansion slot to support […]

Open source laptop runs Linux on i.MX8M

Monday 11th of May 2020 07:53:39 PM
MNT Research has gone to Crowd Supply to launch a $999, open source hardware “MNT Reform” laptop that runs Linux on an i.MX8M based Boundary Devices Nitrogen8M SOM and offers a 12.5-inch HD screen and an NVMe SSD. We first reported on the MNT Reform laptop back in 2017 when the prototype was equipped with […]

Zynq UltraScale+ vision kit has a 4K ISP plus GigE and USB3 Vision cores

Monday 11th of May 2020 03:39:35 PM
MYIR’s $599 Vision Edge Computing Platform (VECP) Starter Kit runs Linux on its Zynq UltraScale+ based MYC-CZU3EG module and integrates a CSI-connected Sony camera plus 4K@30 ISP, GigE Vision, and USB3 Vision IP cores. Last July, MYIR announced a MYC-CZU3EG CPU Module based on Xilinx’s quad -A53, FPGA-equipped Zynq UltraScale+ MPSoC along with a MYD-CZU3EG […]

3.5-inch SBC offers Ryzen V1000 and up to four GbE ports

Friday 8th of May 2020 08:55:02 PM
Axiomtek’s 3.5-inch “CAPA13R” SBC features AMD’s Ryzen Embedded V1000 and offers quad display support, 2x M.2 slots, and up to 4x Gigabit Ethernet ports. Axiomtek has launched a 3.5-inch SBC that offers a choice of two quad-core members of AMD’s Ryzen Embedded V1000 family: the 3.35GHz/3.8GHz V1807B and 2.0GHz/3.6GHz V1605B. The CAPA13R is only the […]

2MP embedded camera captures high frame rate video

Friday 8th of May 2020 07:20:08 PM
E-con has launched a $199, 2-megapixel “See3CAM_20CUG” global shutter industrial camera with a USB Type-C interface that can capture monochrome low-light video at 2MP@60fps. Many of E-con Systems’ camera kits target specific Linux-driven embedded boards such as Nvidia Jetson dev kits while others, such as the new See3CAM_20CUG, have a more universal appeal. The 2-megapixel, […]

SBC and box PC run Linux on dual -A72 LS1028A

Thursday 7th of May 2020 09:43:22 PM
TQ-Embedded’s “MBLS1028A-IND” SBC and box PC run Linux on a module with a dual-core -A72 LS1028A and supply 6x GbE with TSN. TQ also has a “TQMLX2160A” module with NXP’s 8-16-core Cortex-A72 LX2x CPU. While reporting earlier this week on TQ-Embedded’s TQMa8Xx and TQMa8XxS modules, based on an i.MX8X, and TQ’s TQMa8MxML module based on […]

Verdin i.MX8M Mini module gains customizable carrier for edge AI

Thursday 7th of May 2020 05:52:19 PM
Gumstix has launched a $145 “Verdin EdgeAI” carrier for Toradex’s Linux-driven, $138 Verdin i.MX8M Mini module. The board has an M.2 slot designed for an Google card equipped with its Edge TPU, and supports customization within the Geppetto service. Gumstix has opened $145 pre-orders for its Verdin EdgeAI carrier board for Toradex’s Verdin iMX8M Mini […]

Linux-driven modules light up i.MX8X and i.MX8M Mini and Nano

Wednesday 6th of May 2020 09:36:06 PM
TQ-Embedded is launching a “TQMa8Xx” and SMARC form-factor “TQMa8XxS” module that run Linux on NXP’s i.MX8X. TQ is also deploying a i.MX8M Mini/Nano based “TQMa8MxML” LGA module. TQ-Embedded, the embedded unit at Germany-based TQ-Systems, has launched several modules that run Linux on NXP’s i.MX8 processors. The company just announced two new modules — the TQMa8Xx […]

Raspberry Pi based dev kit opens up HART-IP field communications

Tuesday 5th of May 2020 08:25:42 PM
FieldComm’s “HART-IP Developer Kit” combines a RPi 3B+, a WaveShare High-Precision AD/DA Board, a DLSRKIT PoE HAT, and open source software for exploring the HART-IP field instrumentation comm protocol. The FieldComm Group has announced a HART-IP Developer Kit built around the Raspberry Pi for evaluation, demonstrating, and prototyping devices that use HART-IP, the company’s IP-enabled […]

Panel PC prescribed for medical HMI

Monday 4th of May 2020 06:41:44 PM
Advantech’s Linux-ready, Apollo Lake based “HIT-507” panel PC for healthcare HMI has a 7-inch, P-CAP touchscreen and options including a camera, handset, PoE, and readers for barcode, Smart Card, and RFID/NFC. Advantech has launched a 7-inch, panel PC for medical HMI applications. The HIT-507 is available in VESA or open-frame mounting and supports installation in […]

More in Tux Machines

Hardware Freedom: 3D Printing, RasPi and RPi CM3 Module

  • Can 3D Printing Really Solve PPE Shortage in COVID-19 Crisis? The Myth, and The Facts!

    Amid COVID-19 crisis, we see severe shortage of Personal Protective Equipment (PPE) worldwide, to the point that a strict organization like FDA is making exceptions for PPE usage, and there are volunteer effors to try to alleviate this shortage like GetUsPPE. Also, Centers for Disease Control and Prevention (CDC) provides an Excel spreadsheet file to help calculate the PPE Burn Rate. There are many blog posts, video tutorials, and guides that teach people how to print their face shields and masks.

  • Raspberry Pi won’t let your watched pot boil
  • Growing fresh veggies with Rpi and Mender

    Some time ago my wife and I decided to teach our kids how to grow plants. We both have experience as we were raised in small towns where it was common to own a piece of land where you could plant home-grown fresh veggies. The upbringing of our kids is very different compared to ours, and we realized we never showed our kids how to grow our own veggies. We wanted them to learn and to understand that “the vegetables do not grow on the shop-shelf”, and that there is work (and fun) involved to grow those. The fact that we are gone for most of the summer and to start our own garden just to see it die when we returned seemed to be pointless. This was a challenge. Luckily, me being a hands-on engineer I promised my wife to take care of it. There were two options: we could buy something that will water our plants when we are gone, or I could do it myself (with a little help from our kids). Obviously I chose the more fun solution…

  • Comfile Launches 15-inch Industrial Raspberry Pi Touch Panel PC Powered by RPi CM3 Module

    Three years ago, we noted Comfile has made 7-inch and 10.2-inch touch panel PC’s powered by Raspberry Pi 3 Compute Module. The company has recently introduced a new model with a very similar design except for a larger 15-inch touchscreen display with 1024×768 resolution. ComfilePi CPi-A150WR 15-inch industrial Raspberry Pi touch panel PC still features the CM3 module, and the same ports including Ethernet, USB ports, RS232, RS485, and I2C interfaces accessible via terminal blocks, and a 40-pin I/O header.

Programming: Vala, Perl and Python

  • Excellent Free Tutorials to Learn Vala

    Vala is an object-oriented programming language with a self-hosting compiler that generates C code and uses the GObject system. Vala combines the high-level build-time performance of scripting languages with the run-time performance of low-level programming languages. Vala is syntactically similar to C# and includes notable features such as anonymous functions, signals, properties, generics, assisted memory management, exception handling, type inference, and foreach statements. Its developers, Jürg Billeter and Raffaele Sandrini, wanted to bring these features to the plain C runtime with little overhead and no special runtime support by targeting the GObject object system. Rather than compiling directly to machine code or assembly language, it compiles to a lower-level intermediate language. It source-to-source compiles to C, which is then compiled with a C compiler for a given platform, such as GCC. Did you always want to write GTK+ or GNOME programs, but hate C with a passion? Learn Vala with these free tutorials! Vala is published under the GNU Lesser General Public License v2.1+.

  • Supporting Perl-related creators via Patreon

    Yesterday I posted about this in the Perl Weekly newsletter and both Mohammad and myself got 10 new supporters. This is awesome. There are not many ways to express the fact that you really value the work of someone. You can send them postcards or thank-you notes, but when was the last time you remembered to do that? Right, I also keep forgetting to thank the people who create all the free and awesome stuff I use. Giving money as a way to express your thanks is frowned upon by many people, but trust me, the people who open an account on Patreon to make it easy to donate them money will appreciate it. In any case it is way better than not saying anything.

  • 2020.31 TwentyTwenty

    JJ Merelo kicked off the special 20-day Advent Blog cycle in honour of the publication of the first RFC that would lay the foundation for the Raku Programming Language as we now know it. After that, 3 blog posts got already published:

  • Supporting The Full Lifecycle Of Machine Learning Projects With Metaflow

    Netflix uses machine learning to power every aspect of their business. To do this effectively they have had to build extensive expertise and tooling to support their engineers. In this episode Savin Goyal discusses the work that he and his team are doing on the open source machine learning operations platform Metaflow. He shares the inspiration for building an opinionated framework for the full lifecycle of machine learning projects, how it is implemented, and how they have designed it to be extensible to allow for easy adoption by users inside and outside of Netflix. This was a great conversation about the challenges of building machine learning projects and the work being done to make it more achievable.

  • Django 3.1 Released

    The Django team is happy to announce the release of Django 3.1.

  • Awesome Python Applications: buku

    buku: Browser-independent bookmark manager with CLI and web server frontends, with integrations for browsers, cloud-based bookmark managers, and emacs.

  • PSF GSoC students blogs: Week 9 Check-in

DRM and Proprietary Software Leftovers

  • Some Photoshop users can try Adobe’s anti-misinformation system later this year

    Adobe pitched the CAI last year as a general anti-misinformation and pro-attribution tool, but many details remained in flux. A newly released white paper makes its scope clearer. The CAI is primarily a more persistent, verifiable type of image metadata. It’s similar to the standard EXIF tags that show the location or date of a photograph, but with cryptographic signatures that let you verify the tags haven’t been changed or falsely applied to a manipulated photo.

    People can still download and edit the image, take a screenshot of it, or interact the way they would any picture. Any CAI metadata tags will show that the image was manipulated, however. Adobe is basically encouraging adding valuable context and viewing any untagged photos with suspicion, rather than trying to literally stop plagiarism or fakery. “There will always be bad actors,” says Adobe community products VP Will Allen. “What we want to do is provide consumers a way to go a layer deeper — to actually see what happened to that asset, who it came from, where it came from, and what happened to it.”

    The white paper makes clear that Adobe will need lots of hardware and software support for the system to work effectively. CAI-enabled cameras (including both basic smartphones and high-end professional cameras) would need to securely add tags for dates, locations, and other details. Photo editing tools would record how an image has been altered — showing that a journalist adjusted the light balance but didn’t erase or add any details. And social networks or other sites would need to display the information and explain why users should care about it.

  •  
  • EFF and ACLU Tell Federal Court that Forensic Software Source Code Must Be Disclosed
           
             

    Can secret software be used to generate key evidence against a criminal defendant? In an amicus filed ten days ago with the United States District Court of the Western District of Pennsylvania, EFF and the ACLU of Pennsylvania explain that secret forensic technology is inconsistent with criminal defendants’ constitutional rights and the public’s right to oversee the criminal trial process. Our amicus in the case of United States v. Ellis also explains why source code, and other aspects of forensic software programs used in a criminal prosecution, must be disclosed in order to ensure that innocent people do not end up behind bars, or worse—on death row.

             

    The Constitution guarantees anyone accused of a crime due process and a fair trial. Embedded in those foundational ideals is the Sixth Amendment right to confront the evidence used against you. As the Supreme Court has recognized, the Confrontation Clause’s central purpose was to ensure that evidence of a crime was reliable by subjecting it to rigorous testing and challenges. This means that defendants must be given enough information to allow them to examine and challenge the accuracy of evidence relied on by the government.

  •                
  • Powershell Bot with Multiple C2 Protocols
                     
                       

    I spotted another interesting Powershell script. It's a bot and is delivered through a VBA macro that spawns an instance of msbuild.exe This Windows tool is often used to compile/execute malicious on the fly (I already wrote a diary about this technique[1]). I don’t have the original document but based on a technique used in the macro, it is part of a Word document. It calls Document_ContentControlOnEnter[2]: [...]

  •      
  • FBI Used Information From An Online Forum Hacking To Track Down One Of The Hackers Behind The Massive Twitter Attack
           
             

    As Mike reported last week, the DOJ rounded up three alleged participants in the massive Twitter hack that saw dozens of verified accounts start tweeting out promises to double the bitcoin holdings of anyone who sent bitcoin to a certain account.

  •                    
  • Twitter Expects to Pay 9-Figure Fine for Violating FTC Agreement
                         
                           

    That means that the complaint is not related to last month’s high-profile [cr]ack of prominent accounts on the service. That security incident saw accounts from the likes of Joe Biden and Elon Musk ask followers to send them bitcoin. A suspect was arrested in the incident last month.

  •                    
  • Twitter Expects to Pay Up to $250 Million in FTC Fine Over Alleged Privacy Violations
                         
                           

    Twitter disclosed that it anticipates being forced to pay an FTC fine of $150 million to $250 million related to alleged violations over the social network’s use of private data for advertising.

                           

    The company revealed the expected scope of the fine in a 10-Q filing with the SEC. Twitter said that on July 28 it received a draft complaint from the Federal Trade Commission alleging the company violated a 2011 consent order, which required Twitter to establish an information-security program designed to “protect non-public consumer information.”

                           

    “The allegations relate to the Company’s use of phone number and/or email address data provided for safety and security purposes for targeted advertising during periods between 2013 and 2019,” Twitter said in the filing.

  •                
  • Apple removes more than 26,000 games from China app store
                     
                       

    Apple pulled 29,800 apps from its China app store on Saturday, including more than 26,000 games, according to Qimai Research Institute.

                       

    The removals are in response to Beijing's crackdown on unlicensed games, which started in June and intensified in July, Bloomberg reported. This brings an end to the unofficial practice of letting games be published while awaiting approval from Chinese censors.

  •                
  • Intuit Agrees to Buy Singapore Inventory Software Maker
                     
                       

    Intuit will pay more than $80 million for TradeGecko, according to people familiar with the matter, marking one of the biggest exits in Singapore since the Covid-19 pandemic. TradeGecko has raised more than $20 million to date from investors including Wavemaker Partners, Openspace Ventures and Jungle Ventures.

  •                      
  • Justice Department Is Scrutinizing Takeover of Credit Karma by Intuit, Maker of TurboTax
           
             

    The probe comes after ProPublica first reported in February that antitrust experts viewed the deal as concerning because it could allow a dominant firm to eliminate a competitor with an innovative business model. Intuit already dominates online tax preparation, with a 67% market share last year. The article sparked letters from Sen. Ron Wyden, D-Ore., and Rep. David Cicilline, D-R.I., urging the DOJ to investigate further. Cicilline is chair of the House Judiciary Committee’s antitrust subcommittee.

Security Leftovers

           
  • DNS configuration recommendations for IPFire users

    If you are familiar with IPFire, you might have noticed DNSSEC validation is mandatory, since it defeats entire classes of attacks. We receive questions like "where is the switch to turn off DNSSEC" on a regular basis, and to say it once and for all: There is none, and there will never be one. If you are running IPFire, you will be validating DNSSEC. Period. Another question frequently asked is why IPFire does not support filtering DNS replies for certain FQDNs, commonly referred to as a Response Policy Zone (RPZ). This is because an RPZ does what DNSSEC attempts to secure users against: Tamper with DNS responses. From the perspective of a DNSSEC-validating system, a RPZ will just look like an attacker (if the queried FQDN is DNSSEC-signed, which is what we strive for as much of them as possible), thus creating a considerable amount of background noise. Obviously, this makes detecting ongoing attacks very hard, most times even impossible - the haystack to search just becomes too big. Further, it does not cover direct connections to hardcoded IP addresses, which is what some devices and attackers usually do, as it does not rely on DNS to be operational and does not leave any traces. Using an RPZ will not make your network more secure, it just attempts to cover up the fact that certain devices within it cannot be trusted. Back to DNSSEC: In case the queried FQDNs are signed, forged DNS replies are detected since they do not match the RRSIG records retrieved for that domain. Instead of being transparently redirected to a fradulent web server, the client will only display a error message to its user, indicating a DNS lookup failure. Large-scale attacks by returning forged DNS replies are frequently observed in the wild (the DNSChanger trojan is a well-known example), which is why you want to benefit from validating DNSSEC and more and more domains being signed with it.

  • Security updates for Tuesday

    Security updates have been issued by Debian (libx11, webkit2gtk, and zabbix), Fedora (webkit2gtk3), openSUSE (claws-mail, ghostscript, and targetcli-fb), Red Hat (dbus, kpatch-patch, postgresql-jdbc, and python-pillow), Scientific Linux (libvncserver and postgresql-jdbc), SUSE (kernel and python-rtslib-fb), and Ubuntu (ghostscript, sqlite3, squid3, and webkit2gtk). 

  •        
  • Official 1Password Linux App is Available for Testing

    An official 1Password Linux app is on the way, and brave testers are invited to try an early development preview. 1Password is a user-friendly (and rather popular) cross-platform password manager. It provides mobile apps and browser extensions for Windows, macOS, Android, iOS, Google Chrome, Edge, Firefox — and now a dedicated desktop app for Linux, too.

  •        
  • FBI Warns of Increased DDoS Attacks

    The Federal Bureau of Investigation warned in a “private industry notification” last week that attackers are increasingly using amplification techniques in distributed denial-of-service attacks. There has been an uptick in attack attempts since February, the agency’s Cyber Division said in the alert. An amplification attack occurs when attackers send a small number of requests to a server and the server responds with numerous responses. The attackers spoof the IP address to make it look like the requests are coming from a specific victim, and the resulting responses overwhelms the victim’s network. “Cyber actors have exploited built-in network protocols, designed to reduce computation overhead of day-to-day system and operational functions to conduct larger and more destructive distributed denial-of-service amplification attacks against US networks,” the FBI alert said. Copies of the alert were posted online by several recipients, including threat intelligence company Bad Packets.

  • NSA issues BootHole mitigation guidance

    Following the disclosure of a widespread buffer-flow vulnerability that could affect potentially billions of Linux and Windows-based devices, the National Security Agency issued a follow-up cybersecurity advisory highlighting the bug and offering steps for mitigation. The vulnerability -- dubbed BootHole -- impacts devices and operating systems that use signed versions of the open-source GRUB2 bootloader software found in most Linux systems. It also affects any system or device using Secure Boot -- a root firmware interface responsible for validating the booting process -- with Microsoft's standard third party certificate authority. The vulnerability enables attackers to bypass Secure Boot to allow arbitrary code execution and “could be used to install persistent and stealthy bootkits,” NSA said in a press statement.