Language Selection

English French German Italian Portuguese Spanish

Linux Foundation: ACRN, CNCF, AGL With Listening Device Support

Filed under
Linux
  • The Linux Foundation Announces an Open Source Reference Hypervisor Project Designed for IoT Device Development

    ACRN is comprised of two main components: the hypervisor and its device model, complete with rich I/O mediators. Intel's experience and leadership in virtualization technology was key to the initial development of this hypervisor solution.

  • Dell EMC: The Next Big Shift in Open Networking Is Here [Ed: "This article was sponsored by Dell EMC..." (LF still takes money to write puff pieces/ads, even for Microsoft)]
  • CNCF Webinar to Present New Data on Container Adoption and Kubernetes Users in China

    Last year, the Cloud Native Computing Foundation (CNCF) conducted its first Mandarin-language survey of the Kubernetes community. While the organization published the early results of the English-language survey in a December blog post, the Mandarin survey results will be released on March 20 in a webinar with Huawei and The New Stack.

    Many of China’s largest cloud providers and telecom companies — including Alibaba Cloud, Baidu, Ghostcloud, Huawei and ZTE — have joined the CNCF. And the first KubeCon + CloudNativeCon China will be held in Beijing later this year.

  • 4 Themes From the Open Source Leadership Summit (OSLS)

    This week we attended The Linux Foundation’s Open Source Leadership Summit (OSLS) in Sonoma. Over the past three decades infrastructure open source software (OSS) has evolved from Linux and the Apache web server to touching almost every component of the infrastructure stack. We see OSS’s widespread reach from MySQL and PostgreSQL for databases, OpenContrail and OpenDaylight for networking to Openstack and Kubernetes for cloud operating systems. Its increasing influence up and down the stack is best exemplified by the explosion of solutions included on the Cloud Native Landscape that Redpoint co-published with Amplify and the CNCF.

  • Amazon Embraces Open Source to Compete with Google Assistant on Cars

    Automotive Grade Linux (AGL) is a project hosted by Linux foundation which aims to build a truly open, Linux based platform and framework for automotive applications. Currently, the market is utterly dominated by Android Auto and Apple Car Play. AGL, when it debuts in 2018 Toyota Camry, will be a more neutral, open, and inter-operable alternative to Android Auto and iOS CarPlay.

    Amazon on the other hand is working with Nuance Communications Inc. and Voicebox Technologies Corp. to write code that makes AGL's in-vehicle apps compatible with several voice-assistant technologies (and not just Amazon's Alexa), eliminating the need for developers to make multiple versions. Given the fact that most automakers are also trying to diversify away from Google and Apple's restrictive eco-systems, this could eventually turn into a major win for all parties involved, including consumers.

More in Tux Machines

Clinews – Read News And Latest Headlines From Commandline

A while ago, we have written about a CLI news client named InstantNews that helps you to read news and latest headlines from commandline instantly. Today, I stumbled upon a similar utility named Clinews which serves the same purpose – reading news and latest headlines from popular websites, blogs from Terminal. You don’t need to install GUI applications or mobile apps. You can read what’s happening in the world right from your Terminal. It is free, open source utility written using NodeJS. Read more

GSConnect v13 Alpha Includes Do Not Disturb Feature, Experimental Bluetooth And SMS/Contacts Sync

The v13 alpha release is a rewrite with changes to the architecture, settings and default behavior, and it includes new features like Do Not Disturb, experimental Bluetooth and SMS/Contacts sync, and more. GSConnect is a Gnome Shell implementation of KDE Connect, which integrates Android devices with the Gnome desktop. Using it you can mirror notifications from your phone to your desktop (and the other way around), control a desktop music player from your phone, browse your phone wirelessly from your desktop, synchronize the clipboard between Android devices and your desktop, and much more. GSConnect v13 alpha requires Gnome Shell version 3.28 or newer, and one of the most interesting changes for users is probably the new Do Not Disturb button which lets users silence mobile device notifications: Read more

Introducing Red Hat Quay

Embracing container orchestration has many implications for an enterprises’ technology stack. An image registry becomes a critical component of the deployment pipeline. Red Hat Quay is a mature enterprise-centric container image registry which has a rich history of meeting the needs of cloud native technologists. When Red Hat acquired CoreOS earlier this year, we were looking to amplify our leadership in enterprise container-based solutions. CoreOS at the time had two primary products, Tectonic and Quay. Quay was added directly into Red Hat’s portfolio of products and renamed Red Hat Quay. Read more Also: FPgM report: 2018–38

Security: Windows/NSA Back Doors and Exploits (EternalBlue), Rust Flaw, Roughtime, DDOS Hype and "The Lucy Gang"

  • Leaked NSA Exploits Shifting From Ransomware To Cryptocurrency Mining
    This report, from Zack Whittaker at TechCrunch, says there's really no endpoint in sight for the unintended consequences of exploit hoarding. But at this point, it's really no longer the NSA or Microsoft to blame for the continued rampage. Stats from Shodan show more than 300,000 unpatched machines in the United States alone. EternalBlue-based malware still runs rampant, but the focus has shifted from ransom to cryptocurrency. An unnamed company recently watched the NSA's exploit turn its computers into CPU ATMs. [...] There will never be a full accounting of the damage done. Yes, the NSA never thought its secret stash would go public, but that doesn't excuse its informal policy of never disclosing massive vulnerabilities until it's able to wring every last piece of intel from their deployment. And there's a chance this will happen again in the future if the agency isn't more proactive on the disclosure front. It was foolhardy to believe its tools would remain secret indefinitely. It's especially insane to believe this now.
  • The Rust Programming Language Blog: Security advisory for the standard library
    The Rust team was recently notified of a security vulnerability affecting the standard library’s str::repeat function. When passed a large number this function has an integer overflow which can lead to an out of bounds write. If you are not using str::repeat, you are not affected. We’re in the process of applying for a CVE number for this vulnerability. Fixes for this issue have landed in the Rust repository for the stable/beta/master branches. Nightlies and betas with the fix will be produced tonight, and 1.29.1 will be released on 2018-09-25 with the fix for stable Rust.
  • Cloudflare Secures Time With Roughtime Protocol Service
    If time is money, then how important is it to secure the integrity of time itself? Time across many computing devices is often synchronized via the Network Time Protocol (NTP), which isn't a secure approach, but there is another option. On Sept. 21, Cloudflare announced that it is deploying a new authenticated time service called Roughtime, in an effort to secure certain timekeeping efforts. The publicly available service is based on an open-source project of the same name that was started by Google. "NTP is the dominant protocol used for time synchronisation and, although recent versions provide for the possibility of authentication, in practice that‘s not used," Google's project page for Roughtime states. " Most computers will trust an unauthenticated NTP reply to set the system clock meaning that a MITM [man-in-the-middle] attacker can control a victim’s clock and, probably, violate the security properties of some of the protocols listed above."
  • DDoS Vulnerability Can Disrupt The Whole Bitcoin Infrastructure [Ed: Latest FUD about Bitcoin. A DDOS attack can disrupt anything at sufficient capacity levels, including Wall Street and ANY financial market.]
  • Crippling DDoS vulnerability put the entire Bitcoin market at risk
  • This Russian botnet mimics your click to prevent Android device factory resets
    According to researchers from Check Point, the botnet has been developed by a group of Russian-speaking hackers known as "The Lucy Gang," and demos have already been provided to potential subscribers to the system looking for Malware-as-a-Service (MaaS) solutions. Botnets are a thorn in the side for cybersecurity firms, hosting providers, and everyday businesses alike. The systems are made up of enslaved devices including mobile devices, Internet of Things (IoT) gadgets, and PCs.