Language Selection

English French German Italian Portuguese Spanish

Events: GStreamer Conference, KubeCon + CloudNativeCon, You, Me and IoT Microconferenc

Filed under
OSS
  • GStreamer Conference 2019 announced to take place in Lyon, France

    The GStreamer project is happy to announce that this year's GStreamer Conference will take place on Thursday-Friday 31 October - 1 November 2019 in Lyon, France.

    You can find more details about the conference on the GStreamer Conference 2019 web site.

    A call for papers will be sent out in due course. Registration will open at a later time. We will announce those and any further updates on the gstreamer-announce mailing list, the website, and on Twitter.

    Talk slots will be available in varying durations from 20 minutes up to 45 minutes. Whatever you're doing or planning to do with GStreamer, we'd like to hear from you!

  • Making Data Mobile In The Cloud Native World: Ori Bendori, Reduxio

    The interview was recorded at KubeCon + CloudNativeCon, Barcelona.

  • You, Me and IoT Microconference Accepted into 2019 Linux Plumbers Conference

    integral part of our daily lives, controlling such devices as on/off switches, temperature controls, door and window sensors and so much more. But the technology itself requires a lot of infrastructure and communication frameworks such as Zigbee, OpenHAB and 6LoWPAN. Open source Real-Time embedded operating systems also come into play like Zephyr. A completely open source framework implementation is Greybus that already made it into staging.

Another Summit in Shanghai

  • Join us at the Contributor Summit in Shanghai

    For the second year, we will have a Contributor Summit event the day before KubeCon China in Shanghai. If you already contribute to Kubernetes or would like to contribute, please consider attending and register. The Summit will be held June 24th, at the Shanghai Expo Center (the same location where KubeCon will take place), and will include a Current Contributor Day as well as the New Contributor Workshop and the Documentation Sprints.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Android Leftovers

Technical vision for Qt for Python

Exposing a huge framework such as Qt to another language is not an easy task and this was the main reason for the slow porting from the old PySide version in Qt 4 to Qt 5. Many developers hours were spent in adapting to new Qt 5 APIs, and more importantly, the binding generator tool such that everything can be handled properly. Now with Qt 6 things will be different, because the development of Qt for Python is progressing side-by-side to the C++ and QML stories in Qt 6. Hopefully, there will be a lot fewer surprises this time around. In fact, this effect can be seen with current 5.x releases, PySide2 is available almost at the same time as the Qt release, having in some cases a few days delays. Since the official release in Qt 5.12.0, the downloads of Qt for Python has been increasing day-by-day, which translates on the community adopting and enjoying the project. Read more Also: Qt 6 Will Bring Improvements To The Toolkit's Python Support

Red Hat: New PHP Builds, End-to-End Encryption for Kubernetes Applications, Interns

  • PHP version 7.2.22RC1 and 7.3.9RC1

    Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests (for x86_64 only), and also as base packages. RPM of PHP version 7.3.9RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 30 or remi-php73-test repository for Fedora 28-29 and Enterprise Linux. RPM of PHP version 7.2.22RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 28-29 or remi-php72-test repository for Enterprise Linux.

  • Self-Serviced, End-to-End Encryption for Kubernetes Applications, Part 2: a Practical Example

    In part one of this series, we saw three approaches to fully automate the provisioning of certificates and create end-to-end encryption. Based on feedback from the community suggesting the post was a bit too theoretical and not immediately actionable, this article will illustrate a practical example. You can see a recording of the demo here.

  • The Tiger that interned at Red Hat

    From the start, Tiger just had the right idea about looking for a college. Instead of reading US World News’ rankings, basing his decisions on sports teams, or even aiming for the Ivy Leagues, Tiger set out to make his college search a data driven effort. He asked himself, first, where he wanted to work. For him, that was an almost typical answer for an aspiring young technology student: Google, Facebook, Red Hat and other big name tech firms. [...] Tiger's real name is Passawit Kaovilai, and he's now entering his third year at NC State. He said that many people in his native Thailand have nicknames, and that his translates well into any language, and is understood immediately. He was also born in the year of the tiger, so the name is a natural fit. Here at Red Hat, Tiger has taken on the duties of a technical marketing intern. That means he's been diving into Red Hat OpenShift 4 to help create documentation and learning tools for users in the field. That also means contributing to open source projects, and getting his handle out there on GitHub, however modestly.

Latest KDE Security Vulnerabilities Are Patched in Ubuntu and Debian, Update Now

A couple of weeks ago, the KDE community fixed a security vulnerability discovered by Dominik Penner in the KConfig component, the configuration settings framework of the KDE Plasma desktop environment, which could allow an attacker to execute malicious code through a specially crafted .desktop file included in an archive that was opened in the file manager. "Dominik Penner discovered that KConfig supported a feature to define shell command execution in .desktop files. If a user is provided with a malformed .desktop file (e.g. if it's embedded into a downloaded archive and it gets opened in a file browser) arbitrary commands could get executed. This update removes this feature," reads the Debian security advisory. Read more