Language Selection

English French German Italian Portuguese Spanish

Leftovers: OSS

Filed under
OSS
  • Open Source DCIM Software Project Combats Spreadsheet-Based Data Center Management

    That free option does exist. openDCIM, an open source project born at one of the data centers supporting the US Department of Energy’s national labs. Its original creator, Scott Milliken, manages the Oak Ridge National Lab data center in Oak Ridge, Tennessee.

  • OpsClarity Extends Monitoring to Open Source Suites

    OpsClarity's intelligent monitoring solution now provides monitoring for a growing and popular suite of open source data processing frameworks, including Apache Kafka, Apache Storm, Apache Spark as well as datastores such as Elasticsearch, Cassandra, MongoDB. The solution is intended to enable DevOps teams to gain visibility into how these technologies are dependent on each other and troubleshoot performance issues.

  • The future of the network is open source and programmability, says industry expert

    Network technology has changed considerably in the last 20 years, but most of the changes have been incremental – particularly as they relate the roles and responsibilities of network engineers and administrators.

  • HFOSS: Reviewing “What is Open Source?”, Steve Weber

    This blog post is part of an assignment for my Humanitarian Free and Open Source Software Development course at the Rochester Institute of Technology. For this assignment, we are tasked with reading Chapter 3 of Steve Weber’s “The Success of Open Source“. The summary of the reading is found below.

  • a lambda is not (necessarily) a closure

    But if you said "it's a closure" -- well you're right in general I guess, like on a semantic what-does-it-mean level, but as far as how Guile represents this thing at run-time, hoo boy are there a number of possibilities, and a closure is just one of them. This article dives into the possibilities, with the goal being to help you update your mental model of "how much do things cost".

    In Guile, a lambda expression can be one of the following things at run-time:

    Gone

    Inlined

    Contified

    Code pointer

    Closure

    Let's look into these one-by-one.

  • IBM Provides New Analytics Tools, and Big Datasets for Testing

    IBM has already made many big commitments to data analytics and the cloud. It is committing huge finanical resources to Apache Spark for example, and expanding its cloud portfolio. Now IBM has announced four new data services: Analytics Exchange, Compose Enterprise, Graph, and Predictive Analytics.

  • Free RightScale Tool Lets You Compare Public Clouds
  • Eclipse Che Open Source Cloud IDE Now Available in Beta

    Eclipse Che, an open source cloud IDE with RESTful workspaces and Docker-based machines, is now available in beta.

    Che offers a workspace that is composed of projects and its associated runtimes, making its state distributable, portable and versionable. The platform use VMs, containers, and Web services to bring repeatability, consistency, and performance to workspaces.

More in Tux Machines

Programming Leftovers

  • The PyCon Italia 2022 multiplicity

    The common thread in all these years of participation was not so much the Python language as the people I met and the community of which I felt more and more part, which is why the 2022 edition of PyCon Italia was special because it allowed me to resume this tradition in the presence after two years of interruption.

    This year I experienced PyCon Italia from multiple points of view, from which I will try to tell you about my conference, I am sure that you will recognize yourself in one of them and that you will want to participate in a new role, and I hope you will participate in the next edition of PyCon Italia becoming part of the great Italian Python community.

  • [Release] Status of Python 3.11 release

    We may be pushing the final release until December if the stability of Python 3.11 doesn't improve.

  • Announcing perlcritic Policy ValuesAndExpressions::ProhibitFiletest_rwxRWX

    Since several places in the Perl documentation caution against the use of the file access operators (-r and friends), and since I was unable to find a Perl::Critic policy dealing with this, I thought I would make one: Perl::Critic::Policy::ValuesAndExpressions::ProhibitFiletest_rwxRWX. This policy is assigned to the 'bugs' theme. It has low severity because there are some uses of these operators that seem legitimate to me -- or at least I see no easy way to get around their use.

  • Perl Weekly Challenge 172: Prime Partition and Five-Number Summary
  • [Old] Five Tips to Writing RISC-V Assembly

    Writing assembly is itself an art. When C, C++, or any other language is compiled, the compiler determines the art of writing assembly. However, this time, we will some of the techniques and decisions we can make to write these ourselves.

    We will use RISC-V to see how to design logic, write up the logic, and translate the logic into assembly.

  • libmagic: The Blathering

    The libmagic library is older than over half of the human population of Earth, yet it is still in active development and is in the 99.9th percentile of most frequently installed Ubuntu packages. The library’s ongoing development is not strictly limited to bug fixes and support for matching new file formats; the library frequently receives breaking changes that add new core features to its matching engine. libmagic has a custom domain specific language (DSL) for specifying file format patterns. Run `man 5 magic` to read its documentation. The program compiles its DSL database of file format patterns into a single definition file that is typically installed to /usr/share/file/magic.mgc. libmagic is written in C and includes several manually written parsers to identify various file types that would otherwise be difficult to represent in its DSL (for example, JSON and CSV). Unsurprisingly, these parsers have led to a number of memory safety bugs and numerous CVEs.

  • IAR Systems enable innovation in Automotive, providing full support for Renesas RH850 - TechNode Global

    The IAR Embedded Workbench for RH850 and IAR Build Tools for RH850 have been upgraded to the latest technology platforms, including the latest C/C++ language (library support for the C++17 language standard), which will allow developers to build far more advanced code to handle more complex tasks.

  • Passing an Object as a Parameter | Adam Young's Web Log

    I think there area couple of competing guidelines here: Don’t Repeat Yourself versus Let the Complexity Emerge. But let’s start with your previous article on Naive Implementations. The very first implementation should be Naive, changing as little code as possible. As such, the example at the start where you pull the initials out in the calling location is possibly the right one. It does, however, split the logic up to two places, so it might even be easier to pass the whole object in, and pull the initials out in the display code. This could get into a discussion of model-view-controller approach. Are the initials part of the model or part of the view? Here is where we let the complexity emerge. If it is only ever used in this one location, you can think of it as part of the view. If the initials get any wider use, they start migrating toward the model. Thus, I would need more context before I could say what the right design is for them.

Security and Fear, Uncertainty, Doubt

  • Cybersecurity experts question Microsoft's Ukraine report

    Microsoft President Brad Smith spent much of last Wednesday traveling across Washington to promote his company’s sweeping report on the current state of cyberwarfare and disinformation in the Russia-Ukraine war.

    He sat down with David Ignatius, foreign affairs columnist for The Washington Post, for a webcast on its findings. Afterwards, he headed to the Reagan Institute’s Center for Freedom and Democracy to give a 20-minute speech about the 27-page report called “Defending Ukraine: Early Lessons from the Cyber War” before joining Senator Angus King (I-ME) for a panel discussion.

    The New York Times, CNN, The Washington Post, NPR and others covered the study as an accurate and revealing look at an otherwise opaque and confusing digital front in the Ukraine war.

  • QSB-082: Memory management issues in PV frontend drivers

    We have just published Qubes Security Bulletin (QSB) 082: Memory management issues in PV frontend drivers. The text of this QSB is reproduced below. This QSB and its accompanying signatures will always be available in the Qubes Security Pack (qubes-secpack).

  • XSAs released on 2022-07-05

    The Xen Project has released one or more Xen Security Advisories (XSAs). The security of Qubes OS is affected. Therefore, user action is required.

  • New RedAlert Ransomware targets Windows, Linux VMware ESXi servers [Ed: This actually requires someone breaking into the machine in the first place; with Windows, it's a walk in the park as there are back doors]

Games: Last Call BBS, Lord Winklebottom, and More

How to Create and Configure 404 Error Page in NGINX

When you host your website on the NGINX web server, it will handle the client request, but when the request is not fulfilled, it will return an error. This error will be displayed to a user via a basic HTML page with the error code (404, 403, 500, 503), as shown below. Read more