Language Selection

English French German Italian Portuguese Spanish

Leftovers: Containers in Research, Opera, KDE Software, Thunderbolt 3, Android and Chrome OS

Filed under
Software
  • Containers in Research

    Last week, I attended the Docker Containers for Reproducible Research Workshop hosted by the Software Sustainability Institute. Many talks were addressing how containers can be used in a high performance computing (HPC) environment. Since running the Docker daemon requires root privileges, most administrators are reluctant to allow users running Docker containers in a HPC environment. This issue as been addressed by Singularity, which is an alternative conterization technology that does not require root privileges. The nice thing is that Singularity allows importing existing Docker images, which allows you creating a Singularity container from anything that is on Docker Hub. Although I only used Docker so far, Singularity sounds like a nice technology I would like to explore in the future.

  • Opera 50 Web Browser Features Cryptocurrency Mining Protection
  • Latte bug fix release v0.7.3 and some news...

    Latte Dock v0.7.3 has been released containing many important fixes and improvements! Soon at your distro repos or...

  • Discussing the future of Cantor

    It is common to use the new year date to start new projects or give new directions for old ones. The last one is the case for Cantor.

    Since when I got the maintainer status for Cantor, I was working to improve the community around the software. Because the great plugins systems of Qt, it is easy to write new backends for Cantor, and in fact in last years Cantor reached the number of 11 backends.

  • Fedora 28 Aiming For Secure Thunderbolt 3 Support

    If Fedora developers are successful, Fedora 28 will feature secure and properly supported Thunderbolt 3 device handling out-of-the-box.

    Long story short, Fedora 28 will hopefully be featuring Red Hat's Bolt project for dealing with modern Thunderbolt devices. With Thunderbolt allowing for direct access to the PCI Express bus, it opens the system up to DMA attacks and other vulnerabilities. But under Thunderbolt 3 is support for security levels by which devices can be restricted to only DisplayPort acess, user authorization of devices, and secure access. The Linux kernel changes for dealing with Thunderbolt 3 is in place but the user-space portion is not.

  • 8 Best Android Launchers To Enhance Looks And Performance Of Your Device in 2018

    Android’s dominance over other mobile operating systems is mainly due to the endless customization opportunities it provides to its user base. Launchers are one of the most customizable parts of Android. Android smartphones are inoperable without a launcher, which comprises of your home screen and the catalog of all the apps available on your device. So every device comes with a default launcher pre-installed.

  • This is the new Acer Chromebook 11

    Many people diss Chromebooks because they simply don't understand them. No, Chrome OS -- the operating system that powers these laptops -- is not just a glorified web browser. Actually, the OS is a full Linux distribution that is both extremely secure and easy to use. True, they can be deficient for some tasks, such as video editing and hardcore gaming, but let's be honest -- not everyone has those needs. If everything you do is in a browser -- email, web surfing, social media, YouTube, Netflix, etc. -- there is no reason to run Windows and open yourself up to malware and other bad things. Hell, Chromebooks even have Microsoft Office support these days!

More in Tux Machines

Openwashing: Zenko (Dual), Kong (Mere API) and Blackboard (Proprietary and Malicious)

Games: Descenders, War Thunder’s “The Valkyries”

Kernel: Virtme, 2018 Linux Audio Miniconference and Linux Foundation Articles

  • Virtme: The kernel developers' best friend
    When working on the Linux Kernel, testing via QEMU is pretty common. Many virtual drivers have been recently merged, useful either to test the kernel core code, or your application. These virtual drivers make QEMU even more attractive.
  • 2018 Linux Audio Miniconference
    As in previous years we’re trying to organize an audio miniconference so we can get together and talk through issues, especially design decisons, face to face. This year’s event will be held on Sunday October 21st in Edinburgh, the day before ELC Europe starts there.
  • How Writing Can Expand Your Skills and Grow Your Career [Ed: Linux Foundation article]
    At the recent Open Source Summit in Vancouver, I participated in a panel discussion called How Writing can Change Your Career for the Better (Even if You don't Identify as a Writer. The panel was moderated by Rikki Endsley, Community Manager and Editor for Opensource.com, and it included VM (Vicky) Brasseur, Open Source Strategy Consultant; Alex Williams, Founder, Editor in Chief, The New Stack; and Dawn Foster, Consultant, The Scale Factory.
  • At the Crossroads of Open Source and Open Standards [Ed: Another Linux Foundation article]
    A new crop of high-value open source software projects stands ready to make a big impact in enterprise production, but structural issues like governance, IPR, and long-term maintenance plague OSS communities at every turn. Meanwhile, facing significant pressures from open source software and the industry groups that support them, standards development organizations are fighting harder than ever to retain members and publish innovative standards. What can these two vastly different philosophies learn from each other, and can they do it in time to ensure they remain relevant for the next 10 years?

Red Hat: PodCTL, Security Embargos at Red Hat and Energy Sector

  • [Podcast] PodCTL #50 – Listener Mailbag Questions
    As the community around PodCTL has grown (~8000 weekly listeners) we’ve constantly asked them to give us feedback on topics to discuss and areas where they want to learn. This week we discussed and answered a number of questions about big data and analytics, application deployments, routing security, and storage deployment models.
  • Security Embargos at Red Hat
    The software security industry uses the term Embargo to describe the period of time that a security flaw is known privately, prior to a deadline, after which time the details become known to the public. There are no concrete rules for handling embargoed security flaws, but Red Hat uses some industry standard guidelines on how we handle them. When an issue is under embargo, Red Hat cannot share information about that issue prior to it becoming public after an agreed upon deadline. It is likely that any software project will have to deal with an embargoed security flaw at some point, and this is often the case for Red Hat.
  • Transforming oil & gas: Exploration and production will reap the rewards
    Through advanced technologies based on open standards, Red Hat deliver solutions that can support oil and gas companies as they modernize their IT infrastructures and build a framework to meet market and technology challenges. Taking advantage of modern, open architectures can help oil and gas providers attract new customers and provide entry into markets where these kinds of services were technologically impossible a decade ago.