Language Selection

English French German Italian Portuguese Spanish

October 2019

Next Pinebook Pro Pre-Order Window Opens Early November

Filed under
Linux

Linux laptop and general ARM computing enthusiasts alike will be able to pre-order the Pinebook Pro for $199 (excluding shipping costs) from November 6 direct from the Pine64 website.

But if you plan on being among them you’ll want to act fast as the first batch of Pinebook Pros sold out crazily fast — so fast that by the time I hit publish on an article about it, they were all gone!

Read more

GIMP 2.10.14 Released

Filed under
GNU
Software

This is basically the first shot at the previously missing feature set, so expect more to land to GIMP at some point in the future. Making selection tools work outside the canvas sounds like a sensible next stop. Then maybe we can seriously talk about boundless canvas.

This new feature is closely related to out-of-canvas viewing and editing and was also contributed by Ell.

Now when you e.g. rotate a single-layer image, you can use this transform type to automatically expand the canvas to include all of rotated pixels when using the default Adjust clipping mode. The switch is right next to layer/path/selection toggle at the top of any transform tool’s settings.

Read more

Also: GIMP 2.10.14 Released With Better HEIF Support, More Filters Ported To Using GEGL

i.MX8M and i.MX8M Mini SMARC modules debut with 3.5-inch carrier

Filed under
Linux

Ibase’s rugged “RM-N8M” SMARC module runs Linux on an i.MX8M with 3GB soldered LPDDR4 and up to 64GB eMMC. There’s also an upcoming “RM-N8MMI” SMARC that taps the i.MX8M Mini and a new 3.5-inch “RP-103-SMC” carrier.

Ibase announced an RM-N8M Series SMARC 2.0 form-factor module equipped with an NXP i.MX8M SoC. While poking around the Ibase website to see if the company had launched any previous SMARC modules, we found that indeed there is an i.MX6-based RM-F6 SMARC 1.0 module. We also saw a “preliminary” RM-N8MMI Series SMARC 2.0 module with an i.MX8M Mini that we cover farther below.

Read more

Native GTK Dialogs in LibreOffice

Filed under
LibO

The LibreOffice UI was traditionally implemented with its own VCL toolkit which via theming emulated the host desktop toolkit.

Then we migrated the file format the dialogs were described in to the GtkBuilder file format. But still implemented with VCL widgetry, though with additional GTK-alike layout widgets.

Then migrated the translation format to gettext .mo files, which added plural form translation support we had lacked.

Then incrementally migrated the code driving the dialogs to a new API with two implementations, one for VCL widgetry and one for GTK.

Over the last few major releases the GTK version of LibreOffice has increasingly had true GTK dialogs and less VCL dialogs and in master, as of this week, there are now no direct uses of the VCL dialog APIs.

Read more

today's leftovers

Filed under
Misc
  • Rugged embedded trio run Linux on Whiskey Lake

    Vecow launched two compact, rugged embedded PCs with Intel's 8th Gen Whiskey Lake-UE. The Linux-ready SPC-5000 and -5100 offer 4x 10Gbps USB 3.1 Gen2 ports and SUMIT expansion with optional 10GbE modules, and the RES-3000 features IP67-protected M12 ports.

    Vecow announced a fanless, rugged SPC-5000 computer and almost identical, but wider-temp SPC-5100, equipped with Intel's 8th Gen Whiskey Lake-UE CPU. Both embedded computers target machine vision, in-vehicle computing, factory automation, ITS, intelligent control, and AIoT/Industry 4.0 applications.

    The SPC-5000/5100 systems appear to be based on Vecow's recently launched, 3.5-inch EMBC-3000 SBC. The EMBC-3000 also powers a larger, more feature-rich SPC-5200 computer that was announced at the same time in early September.

  • GStreamer & automated testing in Lyon

    Following three days at Embedded Linux Conference Europe, Collaborans are continuing their stay in the capital of France’s Auvergne-Rhône-Alpes region to take part the annual GStreamer Conference, as well as the Automated Testing Summit.

    Our entire multimedia team will be attending the GStreamer Conference, which takes place at L'Embarcadère on October 31 & November 1. They'll be presenting no less than a dozen times during the conference, on topics including RTP jitter buffer timers, network streaming protocols and PipeWire in the automotive industry. Read below for details & links to each of their talks.

    Back at the Palais des congrès de Lyon where ELCE took place, Gustavo Padovan, Linux Core Technologies Lead, will be taking part in the Automated Testing Summit on October 31. KernelCI will undoubtedly be a hot topic and heavily discussed as it became a Linux Foundation project just a few days ago.

  • Top opensource Android apps

    Since my transition to Linux I have acquired a culture of open source software, a culture that is expanding with every day I spend in Linux. 

    Especially after having seen the importance of open source applications in fighting the monopoly of Big softwares companies such as Microsoft, Apple, Adobe ...

    It has expanded to include even the way I use my smartphone, where I have become inclined to use open source applications, because of my love for open source on the one hand, and on the other hand because of the thirst of commercial software to spy on my personal information as well as the aggressive bad ads that hinder the good use of softwares. 

  • GraphQL a cut above the REST, say query lang's fans: Airbnb, Knotel, others embrace the tech

    At the GraphQL Summit in San Francisco on Wednesday, Matt DeBergalis, co-founder and CTO at data plumbing biz Apollo GraphQL, urged companies to appoint a data graph champion to help ease the implementation of GraphQL, a query language for fetching data.

    It's not yet a given that organizations want to implement GraphQL. But at a gathering arranged by Apollo, which makes the de facto standard open-source client and the commercial Apollo GraphQL Platform, there's a certain incentive to imagine GraphQL everywhere.

    It's already halfway there, at least among the 472 companies attending the show – about 52 per cent of organizations represented are already using the technology in production. Some of the more recognizable names include Airbnb, Audi, Expedia, The New York Times, Medium, PayPal, and Priceline.

  • After Server Breach, NordVPN Has Strengthened Security Measures

    What do you do when you find out the company you were entrusting with your privacy was hacked? Panic? There may have been a lot of that going on when NordVPN admitted to a security breach of their server.

    The good news is that NordVPN is on top of it, and it has already strengthened security measures. But will they be able to trust NordVPN again?

  • Shadow tree encapsulation theory

    Types 3 through 5 do not have any kind of support and type 4 and 5 encapsulation would be hard to pull off due to Spectre. User agents typically use a weaker variant of type 4 for their internal controls, such as the video and input elements, that does not protect confidentiality.

    [...]

    Type 2 encapsulation gives component developers control over what remains encapsulated and what is exposed. You need to take all your users into account and expose the best possible public API for them. At the same time, it protects you from folks taking a dependency on the guts of the component. Aspects you might want to refactor or add functionality to over time. This is much harder with type 1 encapsulation as there will be APIs that can reach into the details of your component and if users do so you cannot refactor it without updating all the callers.

Programming: Python, Bash and More

Filed under
Development
  • Python 3.8 Adds Walrus Operator, Improves Developer Experience

    The new release of the popular programming language includes capabilities to help developers produce better code, but it might take a while for enterprise adoption.

  • 4 Python tools for getting started with astronomy

    NumFOCUS is a nonprofit charity that supports amazing open source toolkits for scientific computing and data science. As part of the effort to connect Opensource.com readers with the NumFOCUS community, we are republishing some of the most popular articles from our blog. To learn more about our mission and programs, please visit numfocus.org. If you're interested in participating in the NumFOCUS community in person, check out a local PyData event happening near you.

  • Bash completion in Zato commands

    This is a quick tip on how to quickly and easily enable Bash completion for Zato commands - each time you press Tab when typing a Zato command, its arguments and parameters will be auto-completed.

  • Configurama - Building SaaS #36

    In this episode, we turned our attention to handling settings and configuration. We discussed different techniques for handling settings, looked at available tools, and started integrating one of the tools into the project.

    The initial discussion in the stream focused on different ways of doing settings. I talked about what I view as a difference between configuration (mostly static stuff) and settings (dynamic parts of the app).

    I also discussed where to get settings from. We talked about the 12 Factor App style with environment variables, and secret management tools like HashiCorp Vault and AWS KMS. Ironically, I blanked out on AWS Secrets Manager as an option. Additionally, we considered the alternative of reading settings from a file instead of environment variables and the security implications of environment variables.

  • Site.js: now with auto server reload on source code changes

    Sorry, your browser doesn't support embedded videos. But that doesn’t mean you can’t watch it! You can download this video directly, and watch it with your favourite video player.

Red Hat: Kubernetes, RHEL Impact and Halloween Release

Filed under
Red Hat
  • Why you don't have to be afraid of Kubernetes

    It was fun to work at a large web property in the late 1990s and early 2000s. My experience takes me back to American Greetings Interactive, where on Valentine's Day, we had one of the top 10 sites on the internet (measured by web traffic). We delivered e-cards for AmericanGreetings.com, BlueMountain.com, and others, as well as providing e-cards for partners like MSN and AOL. Veterans of the organization fondly remember epic stories of doing great battle with other e-card sites like Hallmark. As an aside, I also ran large web properties for Holly Hobbie, Care Bears, and Strawberry Shortcake.

    I remember like it was yesterday the first time we had a real problem. Normally, we had about 200Mbps of traffic coming in our front doors (routers, firewalls, and load balancers). But, suddenly, out of nowhere, the Multi Router Traffic Grapher (MRTG) graphs spiked to 2Gbps in a few minutes. I was running around, scrambling like crazy. I understood our entire technology stack, from the routers, switches, firewalls, and load balancers, to the Linux/Apache web servers, to our Python stack (a meta version of FastCGI), and the Network File System (NFS) servers. I knew where all of the config files were, I had access to all of the admin interfaces, and I was a seasoned, battle-hardened sysadmin with years of experience troubleshooting complex problems.

    But, I couldn't figure out what was happening...

    Five minutes feels like an eternity when you are frantically typing commands across a thousand Linux servers. I knew the site was going to go down any second because it's fairly easy to overwhelm a thousand-node cluster when it's divided up and compartmentalized into smaller clusters.

  • The economic impact of Red Hat Enterprise Linux: How IT professionals benefit

    It’s not overstated to say that the IT landscape completely changed with the introduction of Red Hat Enterprise Linux, more than a decade and a half ago. For 2019, IDC estimated a global business revenue of $188 trillion. Of this, they estimate that at least 40% is touched by software, leaving the IT footprint to be an estimated $81 trillion. Yes, you read that right, $81 trillion. As all of this software forming the global business IT footprint has to run on an operating system, IDC estimates that over 50% is running on Linux, with Red Hat Enterprise Linux accounting for 25% of that.

    That’s a lot of big numbers but what does it all mean? It means that Red Hat Enterprise Linux has changed the experience of many IT professionals around the globe. In a software-centric world, ongoing we have seen higher demand in support and IT services which in turn further helps fuel the global IT ecosystem.

    When IDC asked IT organizations how Red Hat Enterprise Linux benefitted them, they discovered a 12% savings in IT staff productivity. This means that IT professionals spend less time managing servers, doing routine IT tasks, resolving support calls, deploying new business apps and upgrading mission-critical apps. But that’s not all.

  • The spooktacular tale of Red Hat's Halloween release

    In many stories and myths, naming is important. Knowing the proper name of something gives you power over it. Likewise, naming has been important for Red Hat Linux over the years.

    The Halloween release was actually a paid beta and not a 1.0. The Halloween release was dubbed Red Hat Software Linux 0.9, and started a tradition of having a codename for the release that lasted through the final Red Hat Linux release (9.0.93, "Severn"), and carried over to Fedora for many years.

    The tradition was to have a name for a release that was somewhat related to the previous release name. For example, the 1.0 release was "Mother's Day," and "Rembrandt" followed "Picasso," and "Colgate" followed it. (For the record, the best release name was a Fedora release, dubbed "Zod." Allowing many fun headlines playing off the Superman II villain.)

Linspire 8.5 Linux Operating System Released, Based on Ubuntu 18.04.3 LTS

Filed under
Linux
Ubuntu

Linspire 8.5 "Swordfish 2" is a major release compared to the previous versions, bringing numerous updated components and various new features for a full-fledged Linux desktop experience. Just like its little brother Freespire 5.0, Linspire 8.5 is based on Ubuntu 18.04.3 LTS (Bionic Beaver) and uses the Linux 5.0 kernel.

Similar to Freespire 5.0, the goal for Linspire 8.5 was to address the bloatware complaints from the community and make the distribution slimmer by including only the "best of breed" applications. Of course, this means that, if users want to replace the default apps or install more, they can use the software center utility.

Read more

Direct: Linspire 8.5 Released

More in Tux Machines

Free Software Leftovers

  • From Clean & Green Mockup to OpenBSD cwm(1) desktop

    If the words CGA or Hercules raise sweet memories from your far away youth, the Mockup Clean & Green from u/awareofdistractions may hit you right in the heart. And if you like it so much, it may be used for real-life desktop environment using OpenBSD stock and ports material.

  • Learning more about our users

    At the Tor Project we practice user-centered design. This means we put our users at the heart of our development process, making a conscious effort to understand the contexts in which people use our tools and paying particular attention to the bumps they encounter along the way.

    Many digital product companies rely heavily on data gathered from invasive tracking scripts to better understand their users’ behavior, further fueling the surveillance economy. However that’s not how we do things at Tor – instead, we aim to conduct research that respects the basic principles of privacy and consent.

  • New Release: Tor Browser 10.5a11

    Tor Browser 10.5a11 is now available from the Tor Browser Alpha download page and also from our distribution directory.

    Note: This is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.

  • FSFE20 +++ IloveFS +++ Job vacancy

    In our February Newsletter, we interview our founding president Georg Greve as part of our publication series to celebrate 20 Years FSFE, we reflect on I love Free Software Day and our FOSDEM participation, we advertise our new job vacancy and as usual we report on our diverse community activities.

  • Keeping platforms open

    My previous article, Whatsapp and the domestication of users, got more attention than I was expecting. Some responses gave me a lot to think about,1 especially regarding actions we can take. I suggest reading that article first; it explained what “user domestication” is and why it’s a problem. It enumerated three countermeasures: FOSS, simplicity, and open platforms.

    Hard problems, by definition, lack easy solutions. Simply choosing (or creating) a platform that avoids user domestication isn’t enough if that platform can change. The price of freedom is eternal vigilance; in addition to settling on the right platform, we must ensure that it honors its users in both the present and the future. Keeping a platform FOSS and simple is more straightforward2 than keeping a platform “open”.

    How do we keep an open platform from becoming a closed platform in the future?

Programming Leftovers

  • 6 Top Data Analysis Tools for Big Data

    Big Data is an all-inclusive term that refers to data sets so large and complex that they need to be processed by specially designed hardware and software tools. The data sets are typically of the order of tera or exabytes in size. These data sets are created from a diverse range of sources: sensors that gather climate information, publicly available information such as magazines, newspapers, articles. Other examples where big data is generated include purchase transaction records, web logs, medical records, military surveillance, video and image archives, and large-scale e-commerce. There is a heightened interest in Big Data and Big Data analysis and the implications they have for businesses. Big Data analysis is the process of examining huge quantities of data to find patterns, correlations, and other useful information that can help firms become more responsive to change, and to make better informed decisions. Big Data analysis can be performed with data mining software. However, the unstructured data sources used for big data analysis are not necessarily suitable for investigation by traditional data mining software.

  • 50 Years of Pascal

    Pascal was easy to teach, and it covered a wide spectrum of applications, which was a significant advantage over Algol, Fortran, and Cobol. The Pascal System was efficient, compact, and easy to use. The language was strongly influenced by the new discipline of structured programming, advocated primarily by E.W. Dijkstra to avert the threatening software crisis (1968).

  • How to use Django Serializers – Linux Hint

    Serializer is used in Django to convert the model instances or querysets into python supported data types that can be easily rendered into JSON, XML, or other formats. The deserialization can also be done by serializers to get back the original data from the serialized data. This feature is available in Django REST Framework. So, the users have to install this framework to use the serializers. Any webpage of the website may contain HTML, CSS, and data from the database tables. But the API does not understand these types of content, and it can understand the raw data only, that is, JSON data. How the serializers can be used to convert the model instance into JSON format has shown in this tutorial.

  • How to use queryset in django – Linux Hint

    Most of the web applications are implemented with the database now. queryset is used in the Django application to retrieve records by filtering or slicing or ordering the database table without changing the original data. The model used Django to create the table in the database. So, the knowledge of using the model in Django is necessary to understand the use of queryset. The main function of the queryset is to iterate the records of database tables by converting them into SQL queries. It can be used from the python command line or by writing the python script to display the browser’s output. The uses of queryset for retrieving data from a database table in different ways have been explained in this tutorial.

  • This Week In Rust: This Week in Rust 379 [Ed: The usual paradox of developing "openly" while requiring people to get an account with Microsoft and then use proprietary software of Microsoft, which attacks Free software.]

    This Week in Rust is openly developed on GitHub.

  • What Is BC in a Bash Script? – Linux Hint

    BC, which stands for Basic Calculator, is a command in Bash that is used to provide the functionality of a scientific calculator within a Bash script. This can be useful for scripting with various arithmentic use cases and scenarios. This article shows you how to use BC in a Bash script.

Security Leftovers

  • How often should I rotate my ssh keys?

    My story for today is about ssh and how even public keys, while much better than simple passwords, are still not a perfect solution.

    The danger is credential theft, which is a fancy way of saying “someone stole your private keys.” Back in the 1990s, that problem was pretty far from our minds; Windows 98 didn’t even have the concept of a separate administrator account, never mind the idea of app sandboxing or the inkling that someone might intentionally want to load malware onto your computer and encrypt all your files for ransomware. Those were the days when some people thought ActiveX controls (essentially loading .exe files from web sites) might be a good idea. Actually, maybe even a great idea as long as there was an “are you sure?” dialog box first.

  • 4 of the Best LastPass Alternatives

    LastPass has recently changed its free account usage policy to be only available on one device, and a lot of its users are not happy about it. If you are a LastPass Free user and are looking to switch, here are four great LastPass alternatives you should check out. These services reserve their pricing tiers for more advanced, business-oriented users while still leaving free users with a powerful set of features to safeguard their online accounts data.

  • Security updates for Thursday

    Security updates have been issued by Arch Linux (ansible-base, keycloak, mumble, and postgresql), Debian (firefox-esr and nodejs), Fedora (dotnet3.1, dotnet5.0, keylime, php-horde-Horde-Text-Filter, radare2, scap-security-guide, and wireshark), openSUSE (postgresql, postgresql13 and python-djangorestframework), Red Hat (Ansible, firefox, and thunderbird), Scientific Linux (firefox and thunderbird), SUSE (php7, postgresql-jdbc, python-cryptography, rpmlint, and webkit2gtk3), and Ubuntu (dnsmasq, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.8, linux-kvm, linux-oracle, linux-raspi, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2, linux-snapdragon, linux-oem-5.10, linux-oem-5.6, screen, and xterm).

  • Biden signs executive order calling for semiconductor supply chain review

    President Biden signed an executive order Wednesday addressing growing concern over a global semiconductor shortage hampering the production of goods like automobiles and smartphones.

    The White House’s executive order directs the federal government to conduct 100-day reviews of supply chains in four sets of products, including computer chips and large capacity batteries, like those used in electric vehicles, according to administration officials.

  • Biden Orders Review to Shore Up Supply Chain Resiliency

    On top of the 100-day review of the four key industries, Biden’s order will also direct yearlong reviews for six sectors: defense, public health, information technology, transportation, energy and food production.

    Biden said his administration will implement the recommendations as soon as they are available. “We're not going to wait for the review to be completed before we start closing the existing gaps,” he said.

  • Technology Executives Say All Evidence Points To Russia In Major Hack Of Computer Networks

    Smith told the committee that the true scope of the intrusions is still unknown because most victims are not legally required to disclose attacks unless they involve sensitive information about individuals.

  • Finnish IT Giant Hit with Ransomware Cyberattack [iophk: Windows TO]

    Norwegian business journal E24 reported the attack on Espoo, Finland-based TietoEVRY on Tuesday, claiming to have spoken with Geir Remman, a communications director at the company. Remman acknowledged technical problems with several services that TietoEVRY provides to 25 customers, which are “due to a ransom attack,” according to the report.

    Remman told E24 that the company considers the attack “a serious criminal act.” TietoEVRY turned off the unspecified services and infrastructure affected “as a preventative measure” until it can recover relevant data, and restart systems “in a controlled manner,” he said.

Ubuntu Leftovers

  • Ubuntu Aims For Higher Quality LTS Point Releases - Phoronix

    New restrictions will be in place beginning with Ubuntu 20.04.3 LTS this summer to try to enforce better quality releases with less regressions by enforcing better quality control. The change beginning with Ubuntu 20.04.3 LTS will require that stable release update (SRU) procedures are followed even for release blockers. This will require that every fix follows the same verification, regression analysis, and aging period process. The tighter quality controls will likely lead to slips in release targets if bugs are found in the release candidates for new point releases, as it will first need to go through the verification and aging process.

  • DFI Partners With Ubuntu For IoT Hardware, OTA Updates - Phoronix

    Most of you probably haven't heard of DFI much in nearly two decades since the days of their colorful "LanParty" motherboards that were well known at the time, but these days they are focused on the industrial computer industry and have now teamed up with Canonical to partake in the Ubuntu IoT Hardware Certification Partner Program. DFI is the first industrial computer vendor joining the Ubuntu IoT Hardware Certification Partner Program for Ubuntu-certified hardware focused on the Internet of Things and embracing over-the-air software updates.

  • What is MEC ? The telco edge.

    MEC, as ETSI defines it, stands for Multi-access Edge Computing and is sometimes referred to as Mobile edge computing. MEC is a solution that gives content providers and software developers cloud-computing capabilities which are close to the end users. This micro cloud deployed in the edge of mobile operators’ networks has ultra low latency and high bandwidth which enables new types of applications and business use cases. On top of that an application running on MEC can have real-time access to a subset of radio network information that can improve the overall experience.