Language Selection

English French German Italian Portuguese Spanish

Document Foundation: ‘ODF 1.3 ready for ratification by OASIS’

Filed under
LibO
OOo

Version 1.3 of the Open Document Format (ODF), an open standard for documents, spreadsheets and presentations, will be ratified by the OASIS standardisation organisation in December, according to the Document Foundation – the organisation supporting the development of LibreOffice. This update of the ODF standard has been made possible by financial contributions from the United Kingdom, the European Commission, and three office productivity software companies: US multinational Microsoft, UK-based Collabora, and German software maker CIB.

Read more

More in Tux Machines

10 Things to Do After Installing Fedora 33

Fedora 33 is released with many new features and updates. Here is a list of 10 things to do after installing Fedora 33. Read more

today's leftovers

  • Avita Essential: Perfect Laptop for School and College Students at Rs. 17,990

    Starting with the basics, this is a thin and light notebook. The processor inside powering Avita Essential is the Intel Celeron N4000 which is not a powerful processor for windows but perfect for Ubuntu or ChromeOS. There is 4GB of LPDDR4 inside which again is not good enough for Windows but perfect for Ubuntu and ChromeOS. For storage Avita Essential has 128GB SSD. Fast storage means faster boot time but again we would highly recommend using Ubuntu or ChromeOS on this machine.

  •  
  • Buttered-Up Fedora | LINUX Unplugged 377

    Fedora 33 is a bold release, and we’ve put it through the wringer. We tell you what’s great, and what you should know before diving in. Plus our thoughts on the bigger problem exposed by the youtube-dl takedown.

  •   
  • mintCast 346.5 – The Midori Story – mintCast

    In our Innards section, we talk lesser known browsers And finally, the feedback and a couple of suggestions

  • AMDGPU Linux Driver To Finally Enable BACO For Hawaii - Allowing S4/Hibernation - Phoronix

    The Radeon R9 290 "Hawaii" series are about seven years old almost to the day and the AMD Linux open-source driver crew is seemingly celebrating by finally adding the few lines of code needed to enable BACO power management. [...] The patch posted on Tuesday amounts to just a few lines of code for wiring up Hawaii to the AMDGPU driver's BACO support. It's just a few lines of code now but it's only been more recently that AMDGPU began squaring away its BACO support. Thus back in the early days of Hawaii it wasn't as trivial to provide this support albeit for end-users still a pity it took so long for allowing these GPUs to support S4/hibernation.

  • Noah Meyerhans | Debian STS: Short Term Support

    In another of my frequent late-night bouts with insomnia, I started thinking about the intersection of a number of different issues facing Debian today, both from a user point of view and a developer point of view. Debian has a reputation for shipping “stale” software. Versions in the stable branch are often significantly behind the latest development upstream. Debian’s policy here has been that this is fine, our goal is to ship something stable, not something bleeding edge. Unofficially, our response to users is: If you need bleeding edge software, Debian may not be for you. Officially, we have no response to users who want fresher software. Debian also has a problem with a lack of manpower. I believe that part of why we have a hard time attracting contributors is our reputation for stale software. It might be worth it for us to consider changes to our approach to releases.

  • Getting Real About the License Complexity of Linux [Ed: Proprietary software licensing is not complex? Ask BSA.]

    Talk about complex and tedious, but necessary. Identifying all copyright holders, licenses and license obligations within Linux is just that. Added to the already complex maze that is Linux is the fact that the accuracy of licensing information is tied to the specific version of the Linux Kernel you’re using, and older versions will have more issues than newer. Files may contain erroneous license data and subsequently make its way into your software inventory and Bill of Materials.

  • Impact of OSS and OSH – a stakeholder survey

    With this survey, the study coordinators are interested in complementing the literature, database and case study driven approach to assess impact of OSS and OSH with input from the respondents of the stakeholder survey. All together, this body of evidence will be used to derive policy recommendations.

  • How Hall County is handling influx of absentee voting, effects of ransomware attack on elections office

    One of the databases the county uses to verify voter signatures on absentee ballots is not working after some county network outages due to a ransomware attack on Oct. 7. Registration Coordinator Kay Wimpye with the county elections office said employees can still verify voter signatures by manually pulling hard copies of voter registration cards, which is more time-consuming. Most voter signatures can be verified using a state database that has been unaffected by the outages, she said.

  • Vastaamo board fires CEO, says he kept data breach secret for year and a half

    On Monday the board said that an internal probe had determined that a second breach had occurred in March 2019. It appears that at that point Tapio was aware of the breaches and of shortcomings in the psychotherapy provider’s data security systems.

IBM/Red Hat Leftovers

  • Secure your Kubernetes secrets with smart cards and libssh

    In computer security, software implementations of cryptographic algorithms are vulnerable to side-channel attacks. This type of attack seeks to glean information from the computer system rather than from the program that it is running. As examples, Spectre and Meltdown are both side-channel attacks that target the microarchitecture of modern processors. Microarchitecture attacks are only a subset of all side-channel attacks. There are many others. An attacker who is able to access unauthorized regions in memory can discover private or sensitive information, including authentication secrets. A question that naturally follows is, “Where can I safely store my secrets?” One way to protect your Kubernetes or Red Hat OpenShift secrets is to store them in a hardware token. A hardware token physically separates your secret key from the host machine and the applications that it is running. You can use secret keys stored on smart cards or cryptographic tokens to authenticate to server-side applications. This article introduces Public Key Cryptography Standard #11 (PKCS #11), which you can use to uniquely identify objects stored in tokens. I show you how to build and use libssh with support for PKCS #11 and how to use curl to store and retrieve tokens through the secure shell (SSH) protocol.

  • IBM Advance Toolchain for Linux on Power 14.0-1 released!

    A new update release for the 14.0 series of the IBM® Advance Toolchain for Linux on Power is now available.

  • China Mobile Communications Corporation Internet, China National Offshore Oil Corporation and GREE Group Named Winners of the Red Hat APAC Innovation Awards 2020 for China

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the winners of the Red Hat APAC Innovation Awards 2020 for China. China Mobile Communications Corporation Internet, China National Offshore Oil Corporation and GREE Group were honored at the Red Hat Forum China 2020 today for their exceptional and innovative use of Red Hat solutions.

Programming Leftovers

  • PyTorch 1.7.0 Now Available - Exxact

    PyTorch is a widely used, open source deep learning platform used for easily writing neural network layers in Python enabling a seamless workflow from research to production. Based on Torch, PyTorch has become a powerful machine learning framework favored by esteemed researchers around the world. The newest stable release of PyTorch, version 1.7.0, has a number of new highlights including  CUDA 11, New APIs for FFTs, Windows support for Distributed training and more.

  • Stefan Scherfke: Raise … from … in Python
  • PyCoder’s Weekly: Issue #444 (Oct. 27, 2020)
  •   
  • Program in Arm6 assembly language on a Raspberry Pi | Opensource.com

    Assembly language offers special insights into how machines work and how they can be programmed.

  • How JavaScript became a serious programming language

    JavaScript's humble start began in 1995, when it was created in just 10 days by Brendan Eich, then an employee with Netscape Communications Corporation. JavaScript has come a long way since then, from a tool to make websites pretty to a serious programming language. In its early days, JavaScript was considered a visual tool that made websites a little more fun and attractive. Languages like Jakarta Server Pages (JSP; formerly JavaServer Pages) used to do all the heavy lifting on rendered web pages, and JavaScript was used to create basic interactions, visual enhancements, and animations. For a long time, the demarcations between HTML, CSS, and JavaScript were not clear. Frontend development primarily consists of HTML, CSS, and JavaScript, forming a "layer cake" of standard web technologies.