Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc
  • Espressif ESP-Skainet Voice Assistant Offers Wake Word Engine and Speech Commands Recognition for Embedded MCUs
  • scikit-survival 0.10 released

    To illustrate the use of compare_survival, let’s consider the Veterans’ Administration Lung Cancer Trial. Here, we are considering the Celltype feature and we want to know whether the tumor type impacts survival. We can visualize the survival function for each subgroup using the Kaplan-Meier estimator.

  • How To Choose The Perfect Open-Source Dashboard

    In the current data-driven scenario, data visualisation is something all data analyst have to court, and a dashboard, in this case, is an obvious protagonist. Dashboards allow real-time visualising and easy understanding of the key performance indicators in an organisation. Dashboards extract meaningful insights from data which is further used by organisations for decision-making.

    [...]

    Mozaïk is a tool based on NodeJS/ React / D3 / stylus to easily craft beautiful dashboards. It supports multiple devices through an adaptive layout such as on a big screen in the open space or smartphones.

  • Warning Issued For Millions Of Microsoft Windows 10 Users

    Picked up by the eagle eyes of Windows Latest, users are warning that Microsoft’s latest Windows 10 update is hitting performance hard. And what’s most frustrating is Microsoft was warned about this prior to release, shipped it anyway and continues to ignore it.

    Showing up for anyone who hits the ‘Check for updates’ button in Windows Update, KB4512941 was released to fix multiple problems, including bugs in Windows Sandbox, black screen issues and more. But inside the update is a botched Cortana fix which is causing the service to gobble up to 40% of user’s CPUs. Wave goodbye to half your PC’s power and a good chunk of battery life.

  • Security updates for Monday

    Security updates have been issued by Debian (gosa, libav, libextractor, nghttp2, pump, and python2.7), Fedora (dovecot, mod_http2, and pango), Gentoo (dovecot, gnome-desktop, libofx, and nautilus), Mageia (ansible, ghostscript, graphicsmagick, memcached, mpg123, pango, vlc, wavpack, webmin, wireshark, and wpa_supplicant, hostapd), openSUSE (flatpak, libmirage, podman, slirp4netns and libcontainers-common, python-SQLAlchemy, and qemu), Red Hat (ghostscript, java-1.8.0-ibm, and squid:4), and SUSE (kernel, libsolv, libzypp, zypper, NetworkManager, nodejs10, nodejs8, perl, python-Django, and python-SQLAlchemy).

  • GSoC’19 Project : Milestone 4

    The fourth milestone for my Google Summer of Code 2019’s project Porting KDE Connect to Windows involves creating some system integrations for the windows Operating System so it works seamlessly on Windows.

More in Tux Machines

TechNexion Unveils EDM and AXON SoM’s Powered by NXP i.MX8M Plus SoC

The company offers standard support for Ubuntu 20.04 LTS, Linux-built Yocto Project, and Android 10, as well as extended support for FreeRTOS. If it feels like you’ve seen EDM-G-IMX8M-PLUS module before it’s because it should be the one found in the upcoming Wandboard 8MPLUS SBC. There’s will be other development kits based on existing AXON/EDM baseboards including AXON-PI Raspberry Pi-like starter board, or the full-featured AXON-WIZARD and EDM-WIZARD evaluation boards. Marcel vandenHeuvel, TechNexion’s CEO, gives an overview of the AXON i.MX8M Plus modules and baseboard, and shows a Yocto 3.0 Linux demo with dual displays. Read more

Security: AppArmor and SELinux, Linux Security Features and Zero Trust Security Model

  • Technologies for container isolation: A comparison of AppArmor and SELinux

    I researched how containers, virtual machines (VMs), and processes, in general, are separated by different technologies—namely, AppArmor and SELinux. My goal was to compare these solutions for isolation/separation capabilities in the cloud world. Just as a reminder, Red Hat Enterprise Linux uses SELinux technology to separate processes, containers, and VMs. OpenShift also uses this technology. The first option is an isolation technology called AppArmor, which is a very similar technology to SELinux. However, it is not label-based. AppArmor security profiles, which are equivalent to SELinux security policies, look more user-friendly, but that’s because AppArmor is less complicated and controls fewer operations.

  • Kees Cook: security things in Linux v5.7

    Linux v5.7 was released at the end of May. [...] After Silvio Cesare observed some weaknesses in the implementation of CONFIG_SLAB_FREELIST_HARDENED‘s freelist pointer content obfuscation, I improved their bit diffusion, which makes attacks require significantly more memory content exposures to defeat the obfuscation. As part of the conversation, Vitaly Nikolenko pointed out that the freelist pointer’s location made it relatively easy to target too (for either disclosures or overwrites), so I moved it away from the edge of the slab, making it harder to reach through small-sized overflows (which usually target the freelist pointer). As it turns out, there were a few assumptions in the kernel about the location of the freelist pointer, which had to also get cleaned up.

  • Zero Trust Security Model

    The Zero Trust Network, also called Zero Trust Architecture, is a model that was developed in 2010 by the principal analyst John Kindervag. A zero-trust security system helps to protect the enterprise system and improves cybersecurity. [...] The Zero Trust approach depends upon modern technologies and methods to achieve the target of securing an organization. The Zero Trust Model calls for businesses to manipulate micro-segmentation and granular perimeter execution based on users, their whereabouts, and other data or information, to find out whether to believe a user, machine, or application that is trying to seek access to a specific part of the enterprise or organization. Zero Trust also takes care of all other policies, for example, giving users the least access they require to complete the task they want to complete. Creating a Zero Trust environment is not only about putting into practice the separate singular technology associations; it is also about using these and other technologies to impose the idea that no one and nothing should have access until they have proven that they should be trusted. Of course, organizations know that creating a Zero Trust Security Model is not an overnight achievement. Because it is not easy to achieve something so complex in a single night, it can take years to find the most secure, ideal system possible. Many companies are shifting to the cloud security system. These systems have the best options to go to Zero Trust. Now is the time to be ready for a Zero Trust transition. All organizations, either large or small, or should have Zero Trust security systems for their data safety.

Linux Lite 5.2 RC-1 Is Now Available For Download And Testing

Linux Lite is undoubtedly one of the best lightweight and Windows alternative Linux operating systems. Earlier on May 31, 2020, Linux Lite creator Jerry Bezencon released the most feature-rich, Linux Lite 5.0 “Emerald.” Working on the next Linux Lite 5.2 version release, Jerry Bezencon has now made its first testing version available for download. So, let’s see what the new features and updates are coming in the Linux Lite 5.2. Read more

Android Leftovers