Language Selection

English French German Italian Portuguese Spanish

January 2020

Collabora’s Contributions to Linux 5.5 Improve the Panfrost Driver, More

Filed under
Linux

Collabora continues to add numerous hardware improvements in the Linux kernel with their endless contributions, and today they’ve shared a list of contributions done as part of the latest Linux 5.5 kernel series.

In an attempt to improve the upstream support of devices powered by the i.MX 6 family of processors, Collabora’s developers improved the brcmfmac open source Broadcom Wi-Fi driver by fixing suspend support for devices that try to save battery life by cutting the power during sleep.

They also improved the Panfrost open source driver for modern ARM Mali GPUs, the Hantro VPU codec driver, the Chrome Embedded Controller, as well as the virtual media controller driver (vimc), and paved the way for bus format negotiation between DRM pipeline components.

Read more

Firefox 72.0.2 Lands in Ubuntu’s Repos, Minor Regressions Fixed

Filed under
Moz/FF
Ubuntu

The latest Firefox 72.0.2 web browser has just landed today in the stable software repositories of all supported Ubuntu Linux releases.

Released by Mozilla on January 20, 2020, Firefox 72.0.2 is a bugfix release that fixes inconsistent playback performance for full screen 1080p videos on certain systems, addresses some issues that occurred when opening files that contain spaces in their path, and fixes a web compatibility issue with CSS Shadow Parts.

Various stability fixes are included as well in Firefox 72.0.2, which is now available for installation from the main archives of Ubuntu 19.10 (Eoan Ermine), Ubuntu 18.04 LTS (Bionic Beaver), and Ubuntu 16.04 LTS (Xenial Xerus) operating system series.

Read more

Valve's ACO Helps Put New Life Into Radeon GCN 1.0 GPUs With ~9% Better Linux Gaming Performance

Filed under
Graphics/Benchmarks

Among many other Valve ACO back-end improvements for Mesa 20.0, one of the notable additions is this AMDGPU LLVM alternative now working for Radeon "Southern Islands" / GCN 1.0 graphics cards. With this, these original AMD GCN graphics cards may have some extra life out of Linux gaming boxes thanks to slightly higher performance some eight years after these graphics cards first launched in the Radeon HD 7000 series.

ACO is the back-end to the Mesa Radeon Vulkan driver that's funded by Valve and optimized for speedy shader compilation to help with game load times and for delivering optimal gaming performance. With the upcoming Mesa 20.0, ACO works from the Radeon GFX10/Navi graphics cards back through the GCN 1.0 products. Granted, by default the Radeon DRM kernel driver is used for these graphics cards so you need to first boot the system with "amdgpu.si_support=1 radeon.si_support=0" for enabling the AMDGPU kernel driver that is needed for allowing RADV to work at all.

Read more

Compute module and eval kit run Linux on RISC-V-based PolarFire SoC

Filed under
Linux

Aries Embedded’s “M100PF” module runs Linux on Microchip’s RISC-V architecture PolarFire SoC and starts at $381 with 8x SERDES lanes and three levels of FPGAs up to 300K LE. A $684-and-up eval kit is also available.

Germany-based Aries Embedded, which has produced Linux-driven compute modules such as the i.MX6 UL-based M6UL, has launched the first module based on the PolarFire SoC, a Linux-powered, FPGA-enabled RISC-V system-on-chip from Microchip’s Microsemi unit (see farther below). The 74 x 42mm module supports applications including wireline access networks, cellular infrastructure, defense, commercial aviation, industrial automation, and IoT.

Read more

Leftovers: Beelink, Scraping and Security

Filed under
Security
Misc
  • Beelink Gemini T45 Pentium N4200 Mini PC Review

    No sooner had I written ‘Beelink T45 Review with Windows and Linux, and Tweaking BIOS Power Limits’ than Beelink announce they wouldn’t in fact sell that configuration but an ‘updated’ version.

  • US court fully legalized website scraping and technically prohibited it

    On September 9, the U.S. 9th circuit court of Appeals ruled (Appeal from the United States District Court for the Northern District of California) that web scraping public sites does not violate the CFAA (Computer Fraud and Abuse Act).

    This is a really important decision. The court not only legalized this practice, but also prohibited competitors from removing information from your site automatically if the site is public. The court confirmed the clear logic that the entry of the web scraper bot is not legally different from the entry of the browser. In both cases, the “user” requests open data — and does something with it on their side.

  • Judge forces insurer to help small business to clean up after a crippling ransomware attack [iophk: Windows TCO]

    A Maryland federal judge on Thursday ruled that an Ohio insurer must cover the costs following a ransomware attack that forced a client to replace much of its technology. State Auto Property & Casualty Insurance is on the hook for losses incurred by National Ink & Stitch, a Maryland screen printing business, after a 2016 hack resulted in “direct physical loss or damage” of National Ink & Stitch’s property.

    No dollar figure has been set yet. The embroidery company had sought $310,000 in damages from State Auto, which has a $1.3 billion market cap.

  •      

  • Leaked Report Shows United Nations Suffered Hack

           

             

    Sophisticated hackers infiltrated U.N. offices in Geneva and Vienna last year in an apparent espionage operation, and their identity and the extent of the data they obtained is unknown.

  • [Older] Equifax Ordered to Spend $1 Billion on Data Security [iophk: Windows TCO]

    After agreeing to pay up to $700 million to settle charges brought by the US Federal Trade Commission (FTC), Equifax now must pay an additional $380.5 million into a fund for class action benefits, attorneys’ fees, expenses, service awards and notice and administration costs, bringing the tally to well over $1 billion.

    But expenses associated with the massive cyber blunder don’t stop here. Chief Judge Thomas W. Thrash, Jr., in the Northern District of Georgia, Atlanta, has ordered Equifax to fork out an additional $1 billion to strengthen its cybersecurity posture and ensure history doesn’t repeat itself.

Debian Developers at FOSDEM and University of Lincoln (Debian Project Leader for 2 Years)

Filed under
Debian
  • Jonathan Dowland: FOSDEM 2020 timetable

    This coming week is FOSDEM! If you're like me and find schedule planning easier with paper and highlighters, this might be useful.

    FOSDEM provide a (30 page) schedule PDF for printing, but the printing order doesn't clearly show which tracks are in parallel.

  • Steve McIntyre: Presenting guest lectures at the University of Lincoln, January 2020

    Dr Charles Fox from the University of Lincoln contacted me out of the blue back in September. He asked me if I would give a couple of guest lectures to his Computer Science students. I was deeply flattered! I took him up on his invitation, and on Tuesday 28th Jan I headed up to visit him and the TSE students.

    My first talk was to provide background on Free and Open Source Software. I started with the history of software in the 1950s, working forwards through the events that sparked the FLOSS movement. I spoke about the philosophical similarities and differences between Free Software and Open Source, and how FLOSS has grown to a state of near-ubiquity. Several of the students are already involved in some existing FLOSS projects, so I was clearly preaching to the choir! I hope I managed to interest the rest of the audience too; I certainly had a warm welcome!

Software: Update for bitfarm-Archiv GPL and Useful Backup Software for GNU/Linux In 2020

Filed under
Software
  • New Update for bitfarm-Archiv GPL released

    New Update for bitfarm-Archiv GPL released
    As of today, GPL-Version 3.5.0 of the Open-Source-DMS document management system bitfarm-Archiv is available. The fully fledged DMS is in line with the current laws and contains five new features which effectively save users time.

  • Useful Backup Software For Linux In 2020

    Let’s have a quick look into the list of useful and best backup software for Linux based operating system in 2020.

Mollamby: the Debian Developer certificate

Filed under
Development
Debian

In March 2018, the script for generating Debian Developer certificates was updated to create certificates for non-uploading Debian Developers.

We can see that in the logs of the Debian keyring, the Debian Project Leader's girlfriend, Molly de Blanc, was added to the Debian Developer non-uploading keyring in December 2018.

In April 2019, Miss de Blanc started a new job at GNOME Foundation.

If you assume she had to give her previous employer, the FSF, one or two months notice, then she probably received the GNOME job offer in January or February. Take another step backwards and it appears she was in the process of making job applications in December 2018.

It appears that the DPL's girlfriend was promoted and given that holy DD status at the very time she was looking for a job.

[...]

Ironically, McGovern's email accuses the person asking the question of being divisive. Yet just weeks later, Neil McGovern played a key role in one of the most divisive events in the entire history of free software, ambushing de Blanc's former boss, Richard Stallman, using his GNOME title to add weight to an anti-RMS attack blog.

Read more

Red Hat: OpenShift 4.3, Red Hat Ansible Tower, SysAdmins and Openwashing

Filed under
Red Hat
  • OpenShift 4.3: The Project Launcher

    In Red Hat OpenShift 4.2, we introduced a number of new console customization features, including ConsoleNotifications, ConsoleExternalLogLinks, ConsoleLinks, and ConsoleCLIDownloads. New in 4.3, the ConsoleLink feature has been extended to cover even more use cases. In addition to the User Menu, Help Menu, and Application Menu, users can now add links to specific project dashboards.

  • Vault IDs in Red Hat Ansible and Red Hat Ansible Tower

    This article demonstrates the use of multiple vault passwords through vault IDs. You will learn how to use vault IDs to encrypt a file and a string. Once they’re encrypted, the vault ID can be referenced inside a playbook and used within Red Hat Ansible and Red Hat Ansible Tower.

  • What's your biggest sysadmin pet peeve?

    But sometimes, it feels like it's just a little harder than it needs to be.

    We've taken great pains to build standardized processes, establish systems for nearly everything, document our work, and make everything we can consistent and automatable. Our work may be difficult, but at least we've been able to bring it under control and make it predictable.

    Well, in theory. It never works out that way in practice.

    No matter how well-written our documentation is, that's no guarantee it's ever going to get read. No matter how many cases our ticketing system is designed to handle, somehow it never seems to prevent the unnecessary drive-by request. No matter how much care we put in to ensure that code deployments never happen late at night or on a weekend, sometimes they always do. Something breaks, and we get the call.

    Almost always, these things generate unplanned work, throw off our carefully-made plans, and cause slowdowns, missed deadlines, and, well, headaches.

    To some degree, that's all just a part of the job. But that doesn't stop us from grimacing and wishing perhaps, just this once, things had gone according to plan. So we're curious: What unplanned activity irks you the most? We've listed a few common headaches we've heard above.

  • NSA cloud advice, Facebook open source year in review, and more industry trends

    As part of my role as a senior product marketing manager at an enterprise software company with an open source development model, I publish a regular update about open source community, market, and industry trends for product marketers, managers, and other influencers. Here are five of my and their favorite articles from that update.

Audiocasts/Shows/Screencast: TLLTS, BSD Now, Self-Hosted, Solus OS 4.1 Plasma and Elementary OS 5.1

Filed under
GNU
Linux
  • The Linux Link Tech Show Episode 842

    alpine linux, debian, docker, pi stuff

  • FreeBSD Down Under | BSD Now 335

    Hyperbola Developer interview, why you should migrate from Linux to BSD, FreeBSD is an amazing OS, improving the ptrace(2) API in LLVM 10, First FreeBSD conference in Australia, and a guide to containers on FreeNAS.

  • Host Your Blog the Right Way | Self-Hosted 11

    We each like different blogging platforms, and share why. Then our tips for keeping your server secure.

    Plus a great way to score cheap drives, a Project Off-Grid update, making your household light switches smart, and Alex's review of the HDHomeRun.

  • Solus OS 4.1 Plasma Run Through

    In this video, we are looking at Solus OS 4.1 Plasma.

  • What’s New in Elementary OS 5.1 Hera

    Elementary OS 5.1 codename “Hera” is the latest minor release of Elementary OS 5.0, brings a major update that adds many improvements and new features, as well as updated components and fresh new artwork.

    In this release, Elementary OS 5.1 based on ubuntu 18.04 LTS includes base packages and powered Linux kernel 5.0. Implemented out-of-the-box Flatpak support to make it easier and secure for users to install third-party apps that are not available in the AppCenter but are essential for their everyday tasks.

    Also, it comes with Sideload, a new, in-house built graphical utility that lets you install Flatpak apps with a single click. In addition, elementary OS 5.1 adds Flatpak support to the AppCenter so that users can manage Flatpak apps alongside regular applications from the official repositories.

More in Tux Machines

Integrity/Availability, Security, and DRM

  • Sinclair hit by ransomware attack, TV stations disrupted [iophk: Windows TCO]

    Sinclair Broadcast Group, which operates dozens of TV stations across the U.S., said Monday that some of its servers and work stations were encrypted with ransomware and that data was stolen from its network.

  • Sinclair hit by ransomware attack, TV stations disrupted [iophk: Windows TCO]

    The Hunt Valley, Maryland-based company either owns or operates 21 regional sports network and owns, operates or provides services to 185 television stations in 86 markets.

  • Canon Sued For Disabling Printer Scanners When Devices Run Out Of Ink

    For more than a decade now, computer printer manufacturers have been engaged in an endless quest called: "let's be as annoying as humanly possible." That quest, driven by a desire to monopolize and boost the sale of their own printer cartridges, has resulted in all manner of obnoxious DRM and other restrictions designed to make using cheaper, third-party printing cartridges a monumental headache. Often, software or firmware updates have been designed to intentionally grind printing to a halt if you try to use these alternative options.

  • Caskading Failures

    In case you hadn’t heard, Let’s Encrypt’s root certificate expired on September 30th, causing many old applications and devices to reject connections to any site secured by certificates issued by Let’s Encrypt. At Cider and Saddle, all of our services are backed by a Let’s Encrypt wildcard certificate, which we’d configured to automatically renew when needed. We thought that meant we’d be in the clear; after all, we were sure to keep our production system up-to-date, and as long as the system’s CA certificates were fresh, there shouldn’t be any issues.

    We were wrong.

    On October 3rd, one of our community members noticed Cask was throwing 500 errors upon visiting the page. Scrubbing through the logs, it was pretty easy to guess what was going on: [...]

today's howtos

  • What's in a hostname?

    You can spend a surprising amount of time chasing RFCs and finding out more than you ever thought you'd need to know about something as trivial as "hostnames".

    The Internet is a Playground, the DNS a never-ending source of entertainment and astonishment, and hostnames... largely undefined.

  • How to change the colour of the underline in gspell

    gspell is GNOME’s spell-checking library.

  • How To Install Calligra Office Suite on Ubuntu 20.04 LTS - idroot

    In this tutorial, we will show you how to install Calligra Office Suite on Ubuntu 20.04 LTS. For those of you who didn’t know, Calligra Suite is an office and graphic art suite by KDE similar to the LibreOffice. It is available for desktop PCs, tablet computers, and smartphones. It contains applications for word processing, spreadsheets, presentation, vector graphics, and editing databases. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Calligra Office Suite on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

  • How to Convert a Webpage to PDF in Linux - It's FOSS

    Saving a webpage as a PDF comes in handy when you archive certain resources or use them for educational purposes. But, how do you convert a webpage to PDF in Linux? You can either choose to go the easy way out using the web browser (GUI) on every Linux distribution or use the terminal to turn a webpage into a PDF file.

  • How to Install GoAccess Web Log Analyzer on Rocky Linux 8

    GoAccess is an open-source lightweight log analyzer that can read and analyze log files of multiple formats, including Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, Caddy, etc. It is written in C language and uses the ncurses library for its dashboard interface, which can be accessed from the command line. It can generate reports in HTML, JSON, and CSV format, which can be shared with others. You can even generate real-time HTML reports that can be displayed via a public link. In this tutorial, you will learn to install GoAccess Analyzer on a Rocky Linux-based server and configure it to read Nginx logs and serve real-time reports.

  • How to Install Prometheus System Monitoring Tool on Debian 11

    Prometheus is a free, open-source and web-based monitoring application that collects metrics from your services and stores them in a time-series database. Prometheus default configuration only exports metrics about itself. But, you can extend it by installing exporters, and other programs. It supports a multi-dimensional data model, multiple modes of graphing and dashboarding. In this post, we will show you how to install Prometheus monitoring on Debian 11.

  • How to Install R Programming Language on Ubuntu 20.04 - LinuxCapable

    R is an open-source programming language, and free software environment for statistical computing and graphical representation created and supported by the R Core Team and the R Foundation. R’s popularity is widely used amongst statisticians and data miners for statistical and data analysis software developers. In the following tutorial, you will learn how to install R using the CRAN repository and install packages from both R’s CRAN repository or PPA cran2deb4ubuntu on Ubuntu 20.04.

  • How to Run Android Apps on Linux

    Ever wanted to run an Android app on Linux but didn’t want to mess with debugging bridges, development environments, or sideloading apps? An app called Anbox makes it possible, and we show you how to use it.

  • GNU Linux Debian – apt package management – what does this two-letter-package-status mean anyway? (ii rc)
  • How to install Mattermost Server on Rocky Linux 8

    Mattermost is messaging software that can be configured to support your organization's messaging requirements. It works just like messaging software you will have used before. Users are able to log in and use the messaging platform to send messages of any kind between themselves or directed at other users which they choose to subscribe to their messaging feed. It also supports group messaging, where a conversation thread emerges between more than one person. Messages also include file attachments, images, links, etc, for sharing across an organization. Additionally, there are some interesting extra features that can be enabled, such as video conferencing if required. Developers want to use this software because it's easy to configure, it can be hosted in your own private cloud, it's free, and messaging is an important requirement for most organizations.

  • Install APEX and ORDS on CentOS 8 - Unixcop

    Oracle Application Express is a low-code development platform that enables you to build scalable, secure enterprise apps, with world-class features, that can be deployed literally anywhere. Also it’s a proprietary web-based integrated development environment (IDE) developed by Oracle Corporation for creating and managing Oracle databases and other related database functionality. In addition to, With it developers can quickly develop and deploy compelling apps that solve real problems and provide immediate value, even it’s not necessary to be an expert in a vast array of technologies to deliver sophisticated solutions.

  • Install Proftpd on Centos and Rockylinux 8 - Unixcop

    Proftpd is an Opensource ftp Server compatible with Unix-like systems its easy to install , fast and secure . lets show you in this how to install this software. In my case i’am using vzlinux its one if the Centos derivatives. Proftpd doesn’t exit on the standard Redhat/Centos repositories this is why we need to create extra repositories to make this possible, we need epel-repository.

  • Install and Configure Squid Proxy on Rocky Linux 8 - kifarunix.com

    In this guide, we are going to learn how to install and configure Squid proxy on Rocky Linux 8. Squid is a full-featured web proxy cache server application which provides proxy and cache services for HTTP, FTP, SSL requests and DNS lookups. It also performs transparent caching that reduces bandwidth and improves response time by caching and reusing frequently requested web pages.

  • Install and Setup Squid Proxy on Debian 11/Debian 10 - kifarunix.com

    In this tutorial, we are going to learn how to install and setup Squid Proxy on Debian 11/Debian 10. Squid is a full-featured web proxy cache application which provides proxy and cache services for HTTP, FTP, SSL requests and DNS lookups. It also performs transparent caching that reduces bandwidth and improves response time by caching and reusing frequently requested web pages.

  • Bash String Manipulation - OSTechNix

    String manipulation is one of the fundamental concepts in bash scripting. In programming, strings are one of the data types which are an ordered sequence of characters. It is important that you know how to create and manipulate strings in bash. In this guide, we will learn string manipulation in Bash shell scripting with simple examples. You will be comfortable working with bash strings at the end of this article.

  • Using Thunderbolt 3 or 4 on Ubuntu - ByteXD

    When purchasing any laptop, you need to take a keen look at all the ports available since they connect your system to other devices in the digital world. When Apple released the new style MacBook Pro in 2015, people were amazed. This machine ditched all the available ports on the previous releases and replaced them with only Thunderbolt 3 and a headphone socket. Standard ports like the charging socket, display ports (HDMI), USB, and SD card reader, which you will most likely find on most laptops, were all removed and are now supported by the Thunderbolt 3 port.

  • Multipath TCP on RHEL 8: From one to many subflows

    Many years ago, Hercules was traveling back to Athens when he lost his way in a wood. Arriving at a crossroad, he found two women. One of them was Aletheia, the goddess of truth, and the other was Apate, the goddess of lies. But he didn't know who was who. Hercules needed all his intelligence to find the only question capable of revealing the way to Athens. If you are lost in a computer network and don't know which path to take, don't worry—you don't need Hercules to find your way: You can use Multipath TCP.

  • Deploy and remove a web server with Ansible

    ​Ansible is an agentless IT automation tool that unravels the mystery of how work gets done. Many sysadmins run Ansible ad hoc commands or playbooks daily to handle their automated tasks. They rely on Ansible's default command-line interface (CLI) output to visualize and understand what happens after their command or playbook finishes running. Since Ansible's CLI standard output is clean and lean, one option for tracking runtimes, getting metrics, understanding resource consumption, and gathering other information is to modify the output to include more details through using callback plugins. This article explores how to use two different Ansible callback plugins to profile system activity and maximum memory usage of tasks and full execution using cgroups.

  • Can you turn a Raspberry Pi into a satellite deco? | ITIGIC

    The Raspberry Pi have been receiving different versions over time, with improvements in USB ports, HDMI, and even Ethernet in the most recent models. Along with them, a constant has been the 40-pin GPIO connector , thanks to which we can hook all kinds of modifications and improvements.

Security Leftovers

  • Project Zero: How a simple Linux kernel memory corruption bug can lead to complete system compromise

    This blog post describes a straightforward Linux kernel locking bug and how I exploited it against Debian Buster's 4.19.0-13-amd64 kernel. Based on that, it explores options for security mitigations that could prevent or hinder exploitation of issues similar to this one. I hope that stepping through such an exploit and sharing this compiled knowledge with the wider security community can help with reasoning about the relative utility of various mitigation approaches. A lot of the individual exploitation techniques and mitigation options that I am describing here aren't novel. However, I believe that there is value in writing them up together to show how various mitigations interact with a fairly normal use-after-free exploit. Our bugtracker entry for this bug, along with the proof of concept, is at https://bugs.chromium.org/p/project-zero/issues/detail?id=2125. Code snippets in this blog post that are relevant to the exploit are taken from the upstream 4.19.160 release, since that is what the targeted Debian kernel is based on; some other code snippets are from mainline Linux. (In case you're wondering why the bug and the targeted Debian kernel are from end of last year: I already wrote most of this blogpost around April, but only recently finished it) I would like to thank Ryan Hileman for a discussion we had a while back about how static analysis might fit into static prevention of security bugs (but note that Ryan hasn't reviewed this post and doesn't necessarily agree with any of my opinions). I also want to thank Kees Cook for providing feedback on an earlier version of this post (again, without implying that he necessarily agrees with everything), and my Project Zero colleagues for reviewing this post and frequent discussions about exploit mitigations.

  • Crims target telcos' Linux and Solaris boxes, which don't get enough infosec love [Ed: Microsoft-connected CrowdStrike badmouthing Microsoft's rivals again while mostly ignoring the elephant in the room, Windows with its notorious (and confirmed) back doors]

    A mysterious criminal gang is targeting telcos' Linux and Solaris boxes, because it perceives they aren't being watched by infosec teams that have focussed their efforts on securing Windows. Security vendor CrowdStrike claims it's spotted the group and that it "has been consistently targeting the telecommunications sector at a global scale since at least 2016 … to retrieve highly specific information from mobile communication infrastructure, such as subscriber information and call metadata." The gang appears to understand telco operations well enough to surf the carrier-to-carrier links that enable mobile roaming, across borders and between carriers, to spread its payloads.

  • Patch PowerShell now, Microsoft tells admins [Ed: Should one feel sorry for fools who put this thing on a GNU/Linux box despite all the warnings including Microsoft's back doors agenda?]

    Microsoft has asked system administrators to patch their PowerShell 7 installations against two vulnerabilities that can allow attackers to bypass Windows Defender Application Control (WDAC) to run arbitrary code, and even gain access to plain text credentials.

  • What’s new in security for Ubuntu 21.10? | Ubuntu

    Ubuntu 21.10 is the latest release of Ubuntu and comes as the last interim release before the forthcoming 22.04 LTS release due in April 2022. As the interim releases are often proving grounds for upcoming features in the LTS releases, this provides a good opportunity to take stock of some of the latest security features delivered in this release, on the road to 22.04 LTS. In this blog post, we will take a look at those features and improvements that add to the overall security of an Ubuntu system and which help to enable your Linux cybersecurity strategy.

Hospital to run GNU Health, openSUSE

Thousands of patients in the coastal area of Kribi, Cameroon, are set to gain enhanced health-care delivery as a hospital in the city expands with the use of energy efficient open-source solutions. The Ebomé Hospital, which is on the southern coast of central Africa, has 24-hour emergency services, an operating room, radiology, maternity, a laboratory, a pharmacy and other services. The hospital treats thousands of people every year. As the facility expands, it will use the Hospital Information System GNU Health to manage patient records, laboratory information and administrative services. The system will be running openSUSE Leap 15.3 on several Raspberry Pi 4 computers. “The excellent, long time relationship among openSUSE and GNU Health communities have resulted in a solid infrastructure that delivers state of the art technology all while delivering outstanding performance and protecting the privacy of the patients and health professionals,” said computer scientist, physician and Free Software advocate Luis Falcón. “From Single Board Computers to enterprise grade servers, to mobile phones. Our communities will continue pioneering and delivering state-of-the-art technology in the areas of public health, hospital and laboratory management, bioinformatics and personal health tech like MyGNUHealth.” Read more