Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc
  • Rugged embedded trio run Linux on Whiskey Lake

    Vecow launched two compact, rugged embedded PCs with Intel's 8th Gen Whiskey Lake-UE. The Linux-ready SPC-5000 and -5100 offer 4x 10Gbps USB 3.1 Gen2 ports and SUMIT expansion with optional 10GbE modules, and the RES-3000 features IP67-protected M12 ports.

    Vecow announced a fanless, rugged SPC-5000 computer and almost identical, but wider-temp SPC-5100, equipped with Intel's 8th Gen Whiskey Lake-UE CPU. Both embedded computers target machine vision, in-vehicle computing, factory automation, ITS, intelligent control, and AIoT/Industry 4.0 applications.

    The SPC-5000/5100 systems appear to be based on Vecow's recently launched, 3.5-inch EMBC-3000 SBC. The EMBC-3000 also powers a larger, more feature-rich SPC-5200 computer that was announced at the same time in early September.

  • GStreamer & automated testing in Lyon

    Following three days at Embedded Linux Conference Europe, Collaborans are continuing their stay in the capital of France’s Auvergne-Rhône-Alpes region to take part the annual GStreamer Conference, as well as the Automated Testing Summit.

    Our entire multimedia team will be attending the GStreamer Conference, which takes place at L'Embarcadère on October 31 & November 1. They'll be presenting no less than a dozen times during the conference, on topics including RTP jitter buffer timers, network streaming protocols and PipeWire in the automotive industry. Read below for details & links to each of their talks.

    Back at the Palais des congrès de Lyon where ELCE took place, Gustavo Padovan, Linux Core Technologies Lead, will be taking part in the Automated Testing Summit on October 31. KernelCI will undoubtedly be a hot topic and heavily discussed as it became a Linux Foundation project just a few days ago.

  • Top opensource Android apps

    Since my transition to Linux I have acquired a culture of open source software, a culture that is expanding with every day I spend in Linux. 

    Especially after having seen the importance of open source applications in fighting the monopoly of Big softwares companies such as Microsoft, Apple, Adobe ...

    It has expanded to include even the way I use my smartphone, where I have become inclined to use open source applications, because of my love for open source on the one hand, and on the other hand because of the thirst of commercial software to spy on my personal information as well as the aggressive bad ads that hinder the good use of softwares. 

  • GraphQL a cut above the REST, say query lang's fans: Airbnb, Knotel, others embrace the tech

    At the GraphQL Summit in San Francisco on Wednesday, Matt DeBergalis, co-founder and CTO at data plumbing biz Apollo GraphQL, urged companies to appoint a data graph champion to help ease the implementation of GraphQL, a query language for fetching data.

    It's not yet a given that organizations want to implement GraphQL. But at a gathering arranged by Apollo, which makes the de facto standard open-source client and the commercial Apollo GraphQL Platform, there's a certain incentive to imagine GraphQL everywhere.

    It's already halfway there, at least among the 472 companies attending the show – about 52 per cent of organizations represented are already using the technology in production. Some of the more recognizable names include Airbnb, Audi, Expedia, The New York Times, Medium, PayPal, and Priceline.

  • After Server Breach, NordVPN Has Strengthened Security Measures

    What do you do when you find out the company you were entrusting with your privacy was hacked? Panic? There may have been a lot of that going on when NordVPN admitted to a security breach of their server.

    The good news is that NordVPN is on top of it, and it has already strengthened security measures. But will they be able to trust NordVPN again?

  • Shadow tree encapsulation theory

    Types 3 through 5 do not have any kind of support and type 4 and 5 encapsulation would be hard to pull off due to Spectre. User agents typically use a weaker variant of type 4 for their internal controls, such as the video and input elements, that does not protect confidentiality.

    [...]

    Type 2 encapsulation gives component developers control over what remains encapsulated and what is exposed. You need to take all your users into account and expose the best possible public API for them. At the same time, it protects you from folks taking a dependency on the guts of the component. Aspects you might want to refactor or add functionality to over time. This is much harder with type 1 encapsulation as there will be APIs that can reach into the details of your component and if users do so you cannot refactor it without updating all the callers.

More in Tux Machines

Kernel and Graphics: Intel, AMD, and NVIDIA

  • Intel teases 'software-defined silicon' with Linux kernel contribution – and won't say why

    Intel has teased a new tech it calls "Software Defined Silicon" (SDSi) but is saying almost nothing about it – and has told The Register it could amount to nothing. SDSi popped up around three weeks ago in a post to the Linux Kernel mailing list, in which an Intel Linux software engineer named David Box described it as "a post-manufacturing mechanism for activating additional silicon features".

  • RadeonSI Lands Another "Very Large" Optimization To Further Boost SPECViewPerf - Phoronix

    In recent months we have seen a lot of RadeonSI optimizations focused on SPECViewPerf with AMD seemingly trying to get this open-source OpenGL driver into very capable shape moving forward for workstation GL workloads. Hitting Mesa 22.0-devel today is yet another round of patches for tuning SPECViewPerf.

  • Vendors Including NVIDIA Talk Up New OpenCL Extensions For Vulkan Interop, NN Inference - Phoronix

    Last Friday night we spotted OpenCL 3.0.9 with several new extensions included. Today The Khronos Group is formally announcing these latest OpenCL additions focused on Vulkan interoperability as well as neural network inferencing. These new extensions for OpenCL 3.0 include an integer dot product extension for neural network inferencing (cl_khr_integer_dot_product) with a focus on 8-bit integer support.

  • RadeonSI Enables NGG Shader Culling For Navi 1x Consumer GPUs - Phoronix

    As another possible performance win for RadeonSI Gallium3D as AMD's open-source Radeon OpenGL driver on Linux systems is enabling of NGG culling for Navi 1x consumer graphics processors rather than limiting it only to newer Navi 2x (RDNA2) GPUs. Merged on Monday was a patch to enable shader culling for Navi 1x consumer SKUs with no longer limiting it to Navi 2x / GFX10.3 or when using various debug options. This culling was also enabled for Navi 1x GPUs but only for the "Pro" graphics SKUs.

Databases: Managing Database Migrations, PostgreSQL-Related Releases

KDE Plasma 5.18.8, Bugfix Release for October

Plasma 5.18 was released in February 2020 with many feature refinements and new modules to complete the desktop experience. Read more

today's howtos

  • Speak to me! – Purism

    My trusty laptop’s speakers gave up the ghost. I don’t like to sit around in headphones all the time, I don’t have any other speakers, and the replacements are still being manhandled by the postman. I’d get used to the austerity if I hadn’t started missing calls from a friend. That’s unacceptable! But what am I supposed to do? Buy extra gadgets just to throw them away after a week? Nope, I’m not that kind of a person. But hey – I have a Librem 5! It has a speaker. It’s open. I have control over it, and I’m a hacker too. So I should be able to come up with a hack to turn it into a speaker for my laptop, right? Pulseaudio to the rescue. I look through the guide. There it is: forwarding audio over a network.

  • How To Install CSF Firewall on Debian 11 - idroot

    In this tutorial, we will show you how to install CSF Firewall on Debian 11. For those of you who didn’t know, CSF is also known as “Config Server Firewall” is a free and advanced firewall for Linux systems. We should use ConfigServer Security & Firewall (CSF) since this CSF have more advanced and comprehensive features than other firewall application such as UFW, Firewalld, or Iptables. Compared to the other Linux firewall application, CSF is more user-friendly and effective which is mostly used by web hosting providers. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the ConfigServer Security & Firewall (CSF) on a Debian 11 (Bullseye).

  • What are the differences between SQL and MySQL | FOSS Linux

    Due to many organizations, businesses, companies, and firms making an online presence, databases have become the core requirement for their daily operations. A database in a layman’s language is defined as a collection of data stored and organized electronically to ensure easy retrieval, access, management, and manipulation of business data. Most business successes depend on databases since they aid in storing essential and relevant data in a central position. Besides, databases also help facilitate communication of crucial business info such as employee profiles, sales transactions, customer profiles, marketing campaigns, product inventory, etc. Furthermore, databases have ensured that the company’s data is secure through various authentication mechanisms like access specifiers, user logins, and sign-ups. This article will talk about the difference between the two popular relational databases SQL and MySQL.

  • How to install Funkin' Psych Engine on a Chromebook

    Today we are looking at how to install Friday Night Funkin' Psych Engine on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • How to Use an SSH Key with Non-root Users - Unixcop

    You can SSH to your Linux instance as root with the key. However, the key doesn’t work for non-root users. So we will illustrate two methods to use SSH keys with non-root users.

  • Allow Port Through Firewall in Ubuntu 20.04 - Linux Nightly

    Ubuntu comes with ufw (uncomplicated firewall) installed by default. This is a frontend for iptables/nftables, the built-in Linux firewall, and is meant to make firewall management a bit easier. In this guide, you’ll see how to add rules to the firewall to open ports and allow certain services to have access through the firewall on Ubuntu.

  • Some regex tests with grep, sed and AWK

    In my data work I regularly do searching and filtering with GNU grep (version 3.3), GNU sed (4.7) and GNU AWK (4.2.1). I don't know if they all use the same regex engine, but I've noticed differences in regex speed between these three programs. This post documents some of the differences.

  • Upgrade to Fedora 35 from Fedora 34 using DNF – If Not True Then False

    This is guide, howto upgrade Fedora 34 to Fedora 35 using DNF. This method works on desktop and server machines. You can also upgrade older Fedora installations (example Fedora 33/32/31/30) directly to Fedora 35. I have tested this method on several machines, but if you have problems, please let me know. Always remember backup, before upgrade!

  • Jenkins: Basic security settings - Anto ./ Online

    Jenkins contains sensitive information. Thus it must be secured, like any other sensitive platform. Thankfully Jenkins provides you with many security options. This guide will show you all the essential bits that you need to know. You access these features on the Configure Global Security page under manage Jenkins.

  • LDAP query from Python · Pablo Iranzo Gómez's blog

    Recently, some colleagues commented about validating if users in a Telegram group were or not employees anymore, so that the process could be automated without having to chase down the users that left the company. One of the fields that can be configured by each user, is the link to other platforms (Github, LinkedIn, Twitter, Telegram, etc), so querying an LDAP server could suffice to get the list of users. First, we need to get some data required, in our case, we do anonymous binding to our LDAP server and the field to search for containing the ‘other platform’ links.