Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 25 Sep 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

today's leftovers

Filed under
Misc
  • NVIDIA 410.57 Linux Beta Released With RTX 2080 Support, OptiX/Vulkan Ray-Tracing

    The Linux driver I've been using today for the just-posted GeForce RTX 2080 Ti Linux benchmarks is now publicly available. This NVIDIA 410 Linux driver is most exciting for Volta and Turing GPU owners, but there are also some EGL and Vulkan updates along with other changes.

  • Multiboot Pinebook KDE neon

    Here’s a picture of my Pinebook running KDE neon — watching Panic! At the Disco’s High Hopes — sitting in front of my monitor that’s hooked up to one of my openSUSE systems. There are still some errata, and watching video sucks up battery, but for hacking on documentation from my hammock in the garden, or doing IRC meetings it’s a really nice machine.

    But one of the neat things about running KDE neon off of an SD card on the Pinebook is that it’s portable — that SD card can move around. So let’s talk about multiboot in the sense of “booting the same OS storage medium in different hardware units” rather than “booting different OS from a medium in a single hardware unit”. On these little ARM boards, u-boot does all the heavy lifting early in the boot process. So to re-use the KDE neon Pinebook image on another ARM board, the u-boot blocks need to be replaced.

  • Glade in Libre Application Summit

    As usual, it was a great opportunity to catch up with old friends and make new ones specially outside the GNOME community.

    This opportunity I talked about the plans I have to integrate Glade with Gnome Builder and other IDEs

  • Linux-ready Apollo Lake mini-PC offers optional Movidius AI

    Aaeon’s rugged “Boxer-6405” mini-PC features an Apollo Lake SoC plus 2x GbE, 4x USB 3.0, 3x or 4x serial, and an HDMI port. Options including SATA, wireless, and an UP AI Core card with Movidius technology.

    Aaeon announced a Boxer-6405 mini-PC that will be unveiled at the 20th China International Industry Fair, held Sep. 19-23 at the Shanghai National Exhibition Center. The compact embedded system will be demonstrated along with the UP AI Vision Kit at Aaeon’s Smart Factory Artificial Intelligence Edge Computing display.

  •  

  • Video: Hackers To The Rescue – Defining Good Hacking

    Noci, the fictional city attacked by malevolent hackers during ICON2018, was saved and the challenge was won by a Swiss team. What is a hacker, how do they define themselves? Two members of ICON, a young non-governmental organisation in Geneva, answered that question for Intellectual Property Watch, with the same affirmation: a hacker is first and foremost a curious mind. View the IP-Watch video interviews below.

    ICON 2018, “The journey to digital trust”  co-organised by ICON, the Geneva Centre for Security Policy (GCSP,) and the MCI group, took place on 13-14 September. The event held what the organisers qualified as the “World premiere cyber-attack simulation.”

    Participants came from France, Italy, Norway and Switzerland, selected after a qualifying competition at the global level, according to an ICON press release. In the end, the challenge was won by Swiss participants Team Sw1ss, it said.

Red Hat's "DevOps" Hype Again and Analysis of last Night's Financial Results

Filed under
Red Hat

OSS Leftovers

Filed under
OSS
  • Deutsche Telekom and Aricent Create Open Source Edge Software Framework

    Deutsche Telekom and Aricent today announced the creation of an Open Source, Low Latency Edge Compute Platform available to operators, to enable them to develop and launch 5G mobile applications and services faster. The cost-effective Edge platform is built for software-defined data centers (SDDC) and is decentralized, to accelerate the deployment of ultra-low latency applications. The joint solution will include a software framework with key capabilities for developers, delivered as a platform-as-a-service (PaaS) and will incorporate cloud-native Multi-access edge computing (MEC) technologies.

  • A Deeper Look at Sigma Prime's Lighthouse: An Open-Source Ethereum 2.0 Client
  • Notable moments in Firefox for Android UA string history
  • Dweb: Creating Decentralized Organizations with Aragon

    With Aragon, developers can create new apps, such as voting mechanisms, that use smart contracts to leverage decentralized governance and allow peers to control resources like funds, membership, and code repos.

    Aragon is built on Ethereum, which is a blockchain for smart contracts. Smart contracts are software that is executed in a trust-less and transparent way, without having to rely on a third-party server or any single point of failure.

    Aragon is at the intersection of social, app platform, and blockchain.

  • LLVM 7.0.0 released
  • Parabola GNU/Linux-libre: Boot problems with Linux-libre 4.18 on older CPUs

    Due to a known bug in upstream Linux 4.18, users with older multi-core x86 CPUs (Core 2 Duo and earlier?) may not correctly boot up with linux-libre 4.18 when using the default clocksource.

  • Visual Schematic Diffs in KiCAD Help Find Changes

    In the high(er)-end world of EDA tools like OrCAD and Altium there is a tight integration between the version control system and the design tools, with the VCS is sold as a product to improve the design workflow. But KiCAD doesn’t try to force a version control system on the user so it doesn’t really make sense to bake VCS related tools in directly. You can manage changes in KiCAD projects with git but as [jean-noël] notes reading Git’s textual description of changed X/Y coordinates and paths to library files is much more useful for a computer than for a human. It basically sucks to use. What you really need is a diff tool that can show the user what changed between two versions instead of describe it. And that’s what plotgitsch provides.

LWN's Latest (Today Outside Paywall) Articles About the Kernel, Linux

Filed under
Linux
  • Toward better handling of hardware vulnerabilities

    From the kernel development community's point of view, hardware vulnerabilities are not much different from the software variety: either way, there is a bug that must be fixed in software. But hardware vendors tend to take a different view of things. This divergence has been reflected in the response to vulnerabilities like Meltdown and Spectre which was seen by many as being severely mismanaged. A recent discussion on the Kernel Summit discussion list has shed some more light on how things went wrong, and what the development community would like to see happen when the next hardware vulnerability comes around.

    The definitive story of the response to Meltdown and Spectre has not yet been written, but a fair amount of information has shown up in bits and pieces. Intel was first notified of the problem in July 2017, but didn't get around to telling anybody in the the Linux community about it until the end of October. When that disclosure happened, Intel did not allow the community to work together to fix it; instead each distributor (or other vendor) was mostly left on its own and not allowed to talk to the others. Only at the end of December, right before the disclosure (and the year-end holidays), were members of the community allowed to talk to each other.

    The results of this approach were many, and few were good. The developers charged with responding to these problems were isolated and under heavy stress for two months; they still have not been adequately thanked for the effort they put in. Many important stakeholders, including distributions like Debian and the "tier-two" cloud providers, were not informed at all prior to the general disclosure and found themselves scrambling. Different distributors shipped different fixes, many of which had to be massively revised before entry into the mainline kernel. When the dust settled, there was a lot of anger left simmering in its wake.

  • Writing network flow dissectors in BPF

    Network packet headers contain a great deal of information, but the kernel often only needs a subset of that information to be able to perform filtering or associate any given packet with a flow. The piece of code that follows the different layers of packet encapsulation to find the important data is called a flow dissector. In current Linux kernels, the flow dissector is written in C. A patch set has been proposed recently to implement it in BPF with the clear goal of improving security, flexibility, and maybe even performance.

  • Coscheduling: simultaneous scheduling in control groups

    The kernel's CPU scheduler must, as its primary task, determine which process should be executing in each of a system's processors at any given time. Making an optimal decision involves juggling a number of factors, including the priority (and scheduling classes) of the runnable processes, NUMA locality, cache locality, latency minimization, control-group policies, power management, overall fairness, and more. One might think that throwing another variable into the mix — and a complex one at that — would not be something anybody would want to attempt. The recent coscheduling patch set from Jan Schönherr does exactly that, though, by introducing the concept of processes that should be run simultaneously.

    The core idea behind coscheduling is the marking of one or more control groups as containing processes that should be run together. If one process in a coscheduled group is running on a specific set of CPUs (more on that below), only processes from that group will be allowed to run on those CPUs. This rule holds even to the point of forcing some of the CPUs to go idle if the given control group lacks runnable processes, regardless of whether processes outside the group are runnable.

    Why might one want to do such a thing? Schönherr lists four motivations for this work, the first of which is virtualization. That may indeed be the primary motivation, given that Schönherr is posting from an Amazon address, and Amazon is rumored to be running a virtualized workload or two. A virtual machine usually contains multiple processes that interact with each other; these machines will run more efficiently (and with lower latencies) if those processes can run simultaneously. Coscheduling would ensure that all of a virtual machine's processes are run together, maximizing locality and minimizing the latencies of the interactions between them.

  • Machine learning and stable kernels

    There are ways to get fixes into the stable kernel trees, but they require humans to identify which patches should go there. Sasha Levin and Julia Lawall have taken a different approach: use machine learning to distinguish patches that fix bugs from others. That way, all bug-fix patches could potentially make their way into the stable kernels. Levin and Lawall gave a talk describing their work at the 2018 Open Source Summit North America in Vancouver, Canada.

    Levin began with a quick introduction to the stable tree and how patches get into it. When a developer fixes a bug in a patch they can add a "stable tag" to the commit or send a mail to the stable mailing list; Greg Kroah-Hartman will then pick up the fix, evaluate it, and add it to the stable tree. But that means that the stable tree is only getting the fixes that are pointed out to the stable maintainers. No one has time to check all of the commits to the kernel for bug fixes but, in an ideal world, all of the bug fixes would go into the stable kernels. Missing out on some fixes means that the stable trees will have more security vulnerabilities because the fixes often close those holes—even if the fixer doesn't realize it.

  • Trying to get STACKLEAK into the kernel

    The STACKLEAK kernel security feature has been in the works for quite some time now, but has not, as yet, made its way into the mainline. That is not for lack of trying, as Alexander Popov has posted 15 separate versions of the patch set since May 2017. He described STACKLEAK and its tortuous path toward the mainline in a talk [YouTube video] at the 2018 Linux Security Summit.

    STACKLEAK is "an awesome security feature" that was originally developed by The PaX Team as part of the PaX/grsecurity patches. The last public version of the patch set was released in April 2017 for the 4.9 kernel. Popov set himself on the goal of getting STACKLEAK into the kernel shortly after that; he thanked both his employer (Positive Technologies) and his family for giving him working and free time to push STACKLEAK.

    The first step was to extract STACKLEAK from the more than 200K lines of code in the grsecurity/PaX patch set. He then "carefully learned" about the patch and what it does "bit by bit". He followed the usual path: post the patch, get feedback, update the patch based on the feedback, and then post it again. He has posted 15 versions and "it is still in progress", he said.

PostgreSQL 11: something for everyone

Filed under
Server
OSS

PostgreSQL 11 had its third beta release on August 9; a fourth beta (or possibly a release candidate) is scheduled for mid-September. While the final release of the relational database-management system (currently slated for late September) will have something new for many users, its development cycle was notable for being a period when the community hit its stride in two strategic areas: partitioning and parallelism.

Partitioning and parallelism are touchstones for major relational database systems. Proprietary database vendors manage to extract a premium from a minority of users by upselling features in these areas. While PostgreSQL has had some of these "high-tier" items for many years (e.g., CREATE INDEX CONCURRENTLY, advanced replication functionality), the upcoming release expands the number considerably. I may be biased as a PostgreSQL major contributor and committer, but it seems to me that the belief that community-run database system projects are not competitive with their proprietary cousins when it comes to scaling enterprise workloads has become just about untenable.

Read more

today's howtos and software leftovers

Filed under
Software
HowTos

Solving the storage dilemma with open source storage

Filed under
OSS

Business IT is facing storage growth that’s exceeding even the highest estimates, and there’s no sign of it slowing down anytime soon. Unstructured data in the form of audio, video, digital images and sensor data now makes up an increasingly large majority of business data and presents a new set of challenges that calls for a different approach to storage.

For CIOs, storage systems that are able to provide greater flexibility and choice, as well as the capability to better identify unstructured data in order to categorise, utilise and automate the management of it throughout its lifecycle are seen as the ideal solution.

One answer to solving the storage issue is software defined storage (SDS) which separates the physical storage hardware (data plane) from the data storage management logic or ‘intelligence’ (control plane). Needing no proprietary hardware components, SDS is the perfect cost-effective solution for enterprises as IT can use off-the-shelf, low-cost commodity hardware which is robust and flexible.

Read more

Also: New Open Source Library Nyoka Aids AI, Data Science

WireGuard Picks Up A Simpler Kconfig, Zinc Crypto Performance Fix

Filed under
Linux
Security

WireGuard lead developer Jason Donenfeld sent out the fifth revision of the WireGuard and Zinc crypto library patches this week. They've been coming in frequently with a lot of changes with it looking like this "secure VPN tunnel" could reach the Linux 4.20~5.0 kernel.

With the WireGuard v5 patches there are various low-level code improvements, a "saner" and simpler Kconfig build-time configuration options, a performance regression for tcrypt within the Zinc crypto code has been fixed and is now even faster than before, and there is also now a nosimd module parameter to disable the use of SIMD instructions.

Read more

Microsoft Demonstrates Why Proprietary Software Cannot be Trusted

Filed under
Microsoft
  • This Windows file may be secretly hoarding your passwords and emails

    If you're one of the people who own a stylus or touchscreen-capable Windows PC, then there's a high chance there's a file on your computer that has slowly collected sensitive data for the past months or even years.

    [...]

    The handwriting feature is there since Windows 8 which means the vulnerability has been there for many years. However, if you don’t store valuable information like passwords or email on your PC, you aren’t much likely to get affected much.

  • This Windows File Might Be Secretly Collecting Sensitive Data Since Windows 8

    There is a Windows file named WaitList.dat that covertly collects your passwords and email information, with the help of Windows Search Indexer service.

    Digital Forensics and Incident Response (DFIR) expert Barnaby Skeggs first discovered the information about the file back in 2016 but wasn’t paid much attention. However, in after a new and exclusive interview with ZDNet – it appears that the file, in fact, is reasonably dangerous.

The best editor for PHP developers who work in Linux OS

Filed under
Development
Software

Every programmer knows that coding is fun! Don't you agree with me? However, to be an absolutely professional PHP developer, we have to know a lot about all the specific details of coding.

Selecting the editor you are going to use to happily code is not an easy decision and must be taken unhurriedly.

If you are a beginner, you may try a great code editor with a rich functionality and very flexible customization which is known as Atom Editor, the editor of the XXI century. You may say that we have many pretty alternatives available. Read the explanation below, and the introduced information will knock you off!

Read more

Variscite’s latest DART module taps headless i.MX6 ULZ

Filed under
Linux

Variscite is prepping a headless version of its Linux-friendly DART-6UL module with NXP’s new i.MX6 ULZ SoC, a cheaper version of the i.MX6 UL without display or Ethernet features.

Variscite is spinning out yet another pin-compatible version of its 50 x 25mm DART-6UL computer-on-module, this time loaded with NXP’s headless new i.MX6 ULZ variant of the single Cortex-A7 core i.MX6 UL. Due for a Q4 launch, the unnamed module lacks display or LAN support. It’s billed as “a native solution for headless Linux-based embedded products such as IoT devices and smart home sensors requiring low power, low size, and rich connectivity options.”

Read more

Stable kernels 4.18.9, 4.14.71, 4.9.128 and 4.4.157

Filed under
Linux

Openwashing: Zenko (Dual), Kong (Mere API) and Blackboard (Proprietary and Malicious)

Filed under
OSS

Games: Descenders, War Thunder’s “The Valkyries”

Filed under
Gaming

Kernel: Virtme, 2018 Linux Audio Miniconference and Linux Foundation Articles

Filed under
Linux
  • Virtme: The kernel developers' best friend

    When working on the Linux Kernel, testing via QEMU is pretty common. Many virtual drivers have been recently merged, useful either to test the kernel core code, or your application. These virtual drivers make QEMU even more attractive.

  • 2018 Linux Audio Miniconference

    As in previous years we’re trying to organize an audio miniconference so we can get together and talk through issues, especially design decisons, face to face. This year’s event will be held on Sunday October 21st in Edinburgh, the day before ELC Europe starts there.

  • How Writing Can Expand Your Skills and Grow Your Career [Ed: Linux Foundation article]

    At the recent Open Source Summit in Vancouver, I participated in a panel discussion called How Writing can Change Your Career for the Better (Even if You don't Identify as a Writer. The panel was moderated by Rikki Endsley, Community Manager and Editor for Opensource.com, and it included VM (Vicky) Brasseur, Open Source Strategy Consultant; Alex Williams, Founder, Editor in Chief, The New Stack; and Dawn Foster, Consultant, The Scale Factory.

  • At the Crossroads of Open Source and Open Standards [Ed: Another Linux Foundation article]

    A new crop of high-value open source software projects stands ready to make a big impact in enterprise production, but structural issues like governance, IPR, and long-term maintenance plague OSS communities at every turn. Meanwhile, facing significant pressures from open source software and the industry groups that support them, standards development organizations are fighting harder than ever to retain members and publish innovative standards. What can these two vastly different philosophies learn from each other, and can they do it in time to ensure they remain relevant for the next 10 years?

Red Hat: PodCTL, Security Embargos at Red Hat and Energy Sector

Filed under
Red Hat
  • [Podcast] PodCTL #50 – Listener Mailbag Questions

    As the community around PodCTL has grown (~8000 weekly listeners) we’ve constantly asked them to give us feedback on topics to discuss and areas where they want to learn. This week we discussed and answered a number of questions about big data and analytics, application deployments, routing security, and storage deployment models.

  • Security Embargos at Red Hat

    The software security industry uses the term Embargo to describe the period of time that a security flaw is known privately, prior to a deadline, after which time the details become known to the public. There are no concrete rules for handling embargoed security flaws, but Red Hat uses some industry standard guidelines on how we handle them.

    When an issue is under embargo, Red Hat cannot share information about that issue prior to it becoming public after an agreed upon deadline. It is likely that any software project will have to deal with an embargoed security flaw at some point, and this is often the case for Red Hat.

  • Transforming oil & gas: Exploration and production will reap the rewards

    Through advanced technologies based on open standards, Red Hat deliver solutions that can support oil and gas companies as they modernize their IT infrastructures and build a framework to meet market and technology challenges. Taking advantage of modern, open architectures can help oil and gas providers attract new customers and provide entry into markets where these kinds of services were technologically impossible a decade ago.

BlackArch Linux Ethical Hacking OS Now Has More Than 2000 Hacking Tools

Filed under
GNU
Linux
Security

The BlackArch Linux penetration testing and ethical hacking computer operating system now has more than 2000 tools in its repositories, announced the project's developers recently.

Used by thousands of hundreds of hackers and security researchers all over the world, BlackArch Linux is one of the most acclaimed Linux-based operating systems for hacking and other security-related tasks. It has its own software repositories that contain thousands of tools.

The OS is based on the famous Arch Linux operating system and follows a rolling release model, where users install once and receive updates forever, or at least until they do something that can't be repaired and need to reinstall.

Read more

Debian Patches for Intel's Defects, Canonical to Fix Ubuntu Security Flaws for a Fee

Filed under
Security
Debian
Ubuntu
  • Debian Outs Updated Intel Microcode to Mitigate Spectre V4 and V3a on More CPUs

    The Debian Project released an updated Intel microcode firmware for users of the Debian GNU/Linux 9 "Stretch" operating system series to mitigate two of the latest Spectre vulnerabilities on more Intel CPUs.

    Last month, on August 16, Debian's Moritz Muehlenhoff announced the availability of an Intel microcode update that provided Speculative Store Bypass Disable (SSBD) support needed to address both the Spectre Variant 4 and Spectre Variant 3a security vulnerabilities.

    However, the Intel microcode update released last month was available only for some types of Intel CPUs, so now the Debian Project released an updated version that implements SSBD support for additional Intel CPU models to mitigate both Spectre V4 and V3a on Debian GNU/Linux 9 "Stretch" systems.

  • Announcing Extended Security Maintenance for Ubuntu 14.04 LTS – “Trusty Tahr” [Ed: Canonical looking to profit from security flaws in Ubuntu like Microsoft does in Windows.]

    Ubuntu is the basis for the majority of cloud-based workloads today. With over 450 million public cloud instances launched since the release of Ubuntu 16.04 LTS, a number that keeps accelerating on a day-per-day basis since, many of the largest web-scale deployments are using Ubuntu. This includes financial, big data, media, and many other workloads and use cases, which rely on the stability and continuity of the underlying operating system to provide the mission-critical service their customers rely on.

    Extended Security Maintenance (ESM) was introduced for Ubuntu 12.04 LTS as a way to extend the availability of critical and important security patches beyond the nominal End of Life date of Ubuntu 12.04. Organisations use ESM to address security compliance concerns while they manage the upgrade process to newer versions of Ubuntu under full support. The ability to plan application upgrades in a failsafe environment continues to be cited as the main value for adoption of ESM. With the End of Life of Ubuntu 14.04 LTS in April 2019, and to support the planning efforts of developers worldwide, Canonical is announcing the availability of ESM for Ubuntu 14.04.

  • Canonical Announces Ubuntu 14.04 LTS (Trusty Tahr) Extended Security Maintenance

    Canonical announced today that it would extend its commercial Extended Security Maintenance (ESM) offering to the Ubuntu 14.04 LTS (Trusty Tahr) operating system series starting May 2019.

    Last year on April 28, 2017, when the Ubuntu 12.04 LTS (Precise Pangolin) operating system series reached end of life, Canonical announced a new way for corporate users and enterprises to receive security updates if they wanted to keep their current Ubuntu 12.04 LTS installations and had no plans to upgrade to a newer LTS (Long Term Support) release. The offering was called Extended Security Maintenance (ESM) and had a great success among businesses.

Syndicate content

More in Tux Machines

OSS Leftovers

  • Editor's Corner—Open source is not 'one size fits all' [Ed: But that's a plus, not a minus. With proprietary software it's one unsuitable thing for everything; doesn't scale.]
    Open source communities are no doubt playing a key role in moving the telecommunications industry forward, but not everyone is on board the bandwagon. Over the past five months or so, we've spent a fair amount of time writing about open source groups and standards development organizations (SDOs) such as the Linux Foundation, MEF, Open Networking Foundation, OpenDaylight, the TM Forum and ETSI, and there's clearly more cooperation afoot for the good of the industry. But artificial intelligence startup B.Yond's chief marketing officer, Rikard Kjellberg, said his company has to be careful when it comes to choosing which open source community to commit its resources to. Kjellberg spoke to FierceTelecom on the heels of the AT&T Spark conference earlier this month.
  • Collabora Had Another Stellar Year For Open-Source Consulting
    The Collabora open-source consulting firm whose expertise spans from the Linux kernel to LibreOffice and X.Org had another successful year. The UK-based company last week reported their 2017 financial position last week providing a glimpse at the viability of open-source / free software consulting.
  • Daniel Stenberg: The Polhem prize, one year later
    Family and friends have gotten a rudimentary level of understanding of what curl is and what it does. I'm not suggesting they fully grasp it or know what an "internet protocol" is now, but at least a lot of people understand that it works with "internet transfers". It's not like people were totally uninterested before, but when I was given this prize - by a jury of engineers no less - that says this is a significant invention and accomplishment with a value that "can not be overestimated", it made them more interested. The little video that was produced helped:
  • Open Source Voice Assistant, Mycroft AI, Named Top Deal By KingsCrowd
  • Service providers increasingly adopt open source for their networks
    Communications service providers (CSPs) are increasingly keen to adopt open source technologies to deliver their services, according to research. At this week’s Open Networking Summit Europe in Amsterdam, delegates heard that DevOps, automation, cloud, big data and analytics, software-defined networking (SDN), and management and orchestration (MANO) were increasingly being supported by open source solutions. Commissioned research questioned 150 CSP representatives across 98 companies worldwide. It found that 98% of CSPs are “confident” that open networking solutions can achieve the same level of performance as traditional networking solutions.
  • Communications Service Providers Overwhelmingly Confident in Open Source Networking Solutions, Survey Finds
  • WLinux Distro for Windows Subsystem for Linux Now Available, openSUSE Call for Hosts, New Firefox Bug, Firefox Collecting Telemetry Data and Creative Commons Releases Significant CC Search Update
    In other Firefox news, the browser evidently is collecting telemetry data via hidden add-ons, ITWire reports. The ITWire post also quotes Mozilla's Marshall Eriwn, director of Trust and Security: "...we will measure Telemetry Coverage, which is the percentage of all Firefox users who report telemetry. The Telemetry Coverage measurement will sample a portion of all Firefox clients and report whether telemetry is enabled. This measurement will not include a client identifier and will not be associated with our standard telemetry."
  • This “Netflix For Open Source” Startup Helps Programmers Get Paid
    Open source developers, especially those who work on lesser known projects, do not get much attention or money for the work they do. While some developers are paid to work on open source projects as a part of their day jobs, they can get overwhelmed by the amount of work these projects require.
  • Portable Computing Language 1.2 Released For OpenCL On CPUs & More
    The Portable Computing Language (a.k.a. POCL or PortableCL) is the effort for getting OpenCL running on CPUs as well as other hardware for this open-source code-base that supports OpenCL 1.2 with some OpenCL 2.0+ functionality. The main "feature" of POCL 1.2 is support for LLVM Clang 7.0 as previously the support was limited to LLVM 6.0, but now this new version of LLVM is supported. The HWLOC 2.0 library is also now supported. There are also some minor feature additions like device-side printf being supported.
  • Robert O'Callahan: More Realistic Goals For C++ Lifetimes 1.0
    Over two years ago I wrote about the C++ Lifetimes proposal and some of my concerns about it. Just recently, version 1.0 was released with a blog post by Herb Sutter. Comparing the two versions shows many important changes. The new version is much clearer and more worked-out, but there are also significant material changes. In particular the goal has changed dramatically.

Money and Press for FOSS FUD firms

Android Leftovers

Fedora and Red Hat News: Test Day, Fedora 29 Beta, Istio, Java and Microsoft Blobs

  • Test Day: Java 8,10,11
    Test Day will focus on OpenJDK 11 and OpenJDK 10. Currently, we have java-1.8.0-openjdk as main JDK in Fedora. It accompanied java-1.7.0-openjdk as JRE for a year, and replaced it in buildroot in F21. Similarly, as did java-1.7.0-openjdk to java-1.6.0-openjdk in F16 as parallel JRE and replaced it in F17 in build root and main JDK. However, today the situation is more complicated. Oracle changed release process, see OpenJDK 11 summary and OpenJDK 10 summary, so currently, in F27 and up, you have java-1.8.0-openjdk as main JDK, java-openjdk as rolling release of STS JDK 10, and java-11-openjdk as techpreview of future LTS JDK. Javaws is provided in another package – icedtea-web
  • Fedora 29 Is On Track With A Lot Of Changes
    With Fedora 29 Beta set to ship today, here's a reminder about some of the great changes on the way with this next installment of the Fedora Linux distribution that is on track to officially release around the end of October. - GNOME 3.30 makes up the default desktop environment and the many improvements to the GNOME Shell / Mutter and all the contained components.
  • Red Hat weaves Istio’s Service Mesh into OpenShift
    If you were thinking that what Red Hat’s Openshift platform really needs is a service mesh, your prayers have been answered, courtesy of Istio. As long you don’t actually plan to use it in production anytime soon. Red Hatter Erik Jacobs said in a blog post yesterday that the firm had unleashed the first technology preview of the Red Hat OpenShift Service Mesh, and that it was based on the Google, IBM and Lyft-backed Istio. Istio is designed to take the complexity of managing microservices architectures away from the application developer or DevOps team. Istio’s backers pitch it as taking care of load balancing and monitoring, as well handling authentication and communications between services, access and traffic control.
  • 6 personality traits driving your organization
  • Scaling Java Containers
    As enterprises increasingly adopt the advantages of deploying containerized applications, it is important to address the potential misconception that the JVM does not play nicely in the cloud. While it is true that most JVMs may not come out of the box perfectly configured to run in an elastic cloud environment, the wide variety of system properties available allows the JVM to be tuned to get the most out of a host environment. If a containerized application is deployed using Red Hat OpenShift, the application could take advantage of the Kubernetes Vertical Pod Autoscaler (VPA), which is an alpha feature. The VPA is a perfect example of where the JVM’s default memory management settings could diminish the increased resource utilization offered by such a feature. This blog post will walk through the steps of configuring and testing a containerized Java application for use with the VPA, which demonstrates the inherent adaptability of the JVM to cloud platforms.
  • A certified sequel: SQL Server on Red Hat’s cloud-native technologies [Ed: "Mike Ferris is vice president of business architecture at Red Hat." Now he's selling nonfree software (likely with back doors) from Microsoft]
  • FY2019 EPS Estimates for Red Hat Inc Raised by William Blair (RHT)
  • Enthralling Stocks: Ensco plc, (NYSE: ESV), Red Hat, Inc., (NYSE: RHT)