Language Selection

English French German Italian Portuguese Spanish

Server

SQLite Release 3.31.0 On 2020-01-22

Filed under
Server
OSS

The legacy_file_format pragma is deactivated. It is now a no-op. In its place, the SQLITE_DBCONFIG_LEGACY_FILE_FORMAT option to sqlite3_db_config() is provided. The legacy_file_format pragma is deactivated because (1) it is rarely useful and (2) it is incompatible with VACUUM in schemas that have tables with both generated columns and descending indexes.

Read more

Also: SQLite 3.31 Released With Support For Generated Columns

Server: Caddy, Jekyll, Containers and Kubernetes

Filed under
Server
  • How I moved from Nginx to Caddy

    Let me show you how complex an Nginx configuration can get for something as simple as serving two static websites with sane TLS configuration. If we have a look on the tls.conf, there are many things I would expect from a webserver to be default in the year 2020. First there are the ssl_protocols, second there are the ssl_ciphers and ssl_ecdh_curve, third there is ssl_stapling. I expect all of these to be enabled on default and neither Nginx nor Apache do this with standard settings.

  • Tempus Fugit, or moving from hubpress to Jekyll

    When I opened my blog, I realised I hadn’t updated the underlying hubpress code in quite a while. A long while. So long, in fact, that I couldn’t update hubpress anymore, because, much to my distress, the hubpress project had been archived by its author in the meantime. It had been archived months ago, and because I had not written a blog in over a year, I hadn’t even noticed.

    I think it’s safe to say I do not have a lucky hand in picking new open source projects to build my own stuff upon. But that’s part of the risk of running new tech sometimes, right?

  • Navigating Docker for Windows versions

    Windows though has a couple of gotchas, the behavior of docker on windows can vastly vary depending on which binary and/or configuration you use.

    Containers on windows are dependent on the server version of the Host. For example, your server 2016 (1607) containers can only be executed on a server 2016 host. Currently there are 2 popular base versions that docker supports, Server 2016, and 2019. Gitlab-runner only supports server 2019, so we will go with that.

  • Here’s How To Tackle K8’s Security Challenge…
  • Two New Open Source Projects for Kubernetes Security by Octarine
  • Octarine Adds 2 Open Source Projects to Secure Kubernetes

    Octarine announced today it has launched two open source projects intended to enhance Kubernetes security.

    The first project is kube-scan, a workload and assessment tool that scans Kubernetes configurations and settings to identify and rank potential vulnerabilities in applications in minutes. The second project is a Kubernetes Common Configuration Scoring System (KCCSS), a framework for rating security risks involving misconfigurations.

    Julian Sobrier, head of product for Octarine, said the projects are extensions of the namesake cybersecurity framework the company created based on a service mesh for Kubernetes clusters. The Octarine service mesh not only segments network and application traffic all the way up through Layer 7 running on Kubernetes clusters, but it also acts as an inspection engine that employs machine learning algorithms to identify anomalous traffic, Sobrier says.

  • Octarine Open Sources New Security Scanning Tools

    To enhance Kubernetes security, Octarine has released two new open source security scanning tools.

    The first tool is called Kubernetes Common Configuration Scoring System (KCCSS). It is said to be a new framework for rating security risks associated with misconfigurations. Kube-scan, the second open-sourced tool, is a workload and assessment tool to scan Kubernetes configurations and settings to identify and rank potential vulnerabilities in applications within minutes.

Kubernetes: KubeInvaders, CSI Ephemeral Inline Volumes and Reviewing 2019 in Docs

Filed under
Server
OSS
  • KubeInvaders - Gamified Chaos Engineering Tool for Kubernetes

    Some months ago, I released my latest project called KubeInvaders. The first time I shared it with the community was during an Openshift Commons Briefing session. Kubenvaders is a Gamified Chaos Engineering tool for Kubernetes and Openshift and helps test how resilient your Kubernetes cluster is, in a fun way.

  • CSI Ephemeral Inline Volumes

    Typically, volumes provided by an external storage driver in Kubernetes are persistent, with a lifecycle that is completely independent of pods or (as a special case) loosely coupled to the first pod which uses a volume (late binding mode). The mechanism for requesting and defining such volumes in Kubernetes are Persistent Volume Claim (PVC) and Persistent Volume (PV) objects. Originally, volumes that are backed by a Container Storage Interface (CSI) driver could only be used via this PVC/PV mechanism.

    But there are also use cases for data volumes whose content and lifecycle is tied to a pod. For example, a driver might populate a volume with dynamically created secrets that are specific to the application running in the pod. Such volumes need to be created together with a pod and can be deleted as part of pod termination (ephemeral). They get defined as part of the pod spec (inline).

    Since Kubernetes 1.15, CSI drivers can also be used for such ephemeral inline volumes. The CSIInlineVolume feature gate had to be set to enable it in 1.15 because support was still in alpha state. In 1.16, the feature reached beta state, which typically means that it is enabled in clusters by default.

    CSI drivers have to be adapted to support this because although two existing CSI gRPC calls are used (NodePublishVolume and NodeUnpublishVolume), the way how they are used is different and not covered by the CSI spec: for ephemeral volumes, only NodePublishVolume is invoked by kubelet when asking the CSI driver for a volume. All other calls (like CreateVolume, NodeStageVolume, etc.) are skipped. The volume parameters are provided in the pod spec and from there copied into the NodePublishVolumeRequest.volume_context field. There are currently no standardized parameters; even common ones like size must be provided in a format that is defined by the CSI driver. Likewise, only NodeUnpublishVolume gets called after the pod has terminated and the volume needs to be removed.

  • Reviewing 2019 in Docs

    Hi, folks! I’m one of the co-chairs for the Kubernetes documentation special interest group (SIG Docs). This blog post is a review of SIG Docs in 2019. Our contributors did amazing work last year, and I want to highlight their successes.

    Although I review 2019 in this post, my goal is to point forward to 2020. I observe some trends in SIG Docs–some good, others troubling. I want to raise visibility before those challenges increase in severity.

What Must be Considered Before Choosing a Container Platform?

Filed under
Server
OSS

An increasing number of IT groups are incorporating development tools, such as containers, in order to create cloud-native apps that operate in a constant manner across public, private, and hybrid clouds.

However, the trickiest part is to find the best container platforms for the organization. It is hard to make the correct decisions regarding container orchestration for managing lifecycles of the containers in order to function at scale and accelerate innovation.

Containers can be Linux

It is vital for every application to run on Linux since the containers are always running on a Linux host.

Containers that are used for managing their lifecycles, work best with Linux. However, these days, Kubernetes is the popular container orchestration platform that was built on Linux concepts and make use of Linux tooling and application programming interfaces (APIs) for managing the containers.

The companies are advised to opt for a Linux distribution that they know and trust before taking any decision on the OS for their container platform. Red Hat Enterprise Linux (RHEL), an OS platform, suits well for operating company’s containers as it provides stability and security features simultaneously, allowing developers to be agile.

Read more

Kubernetes: KubeDR, Elastic and Bug Bounty

Filed under
Server
OSS
  • Catalogic Software Announces KubeDR – Open Source Kubernetes Disaster Recovery

    Catalogic Software, a developer of innovative data protection solutions, today announced the introduction of its Catalogic open source utility, KubeDR, built to provide backup and disaster recovery for Kubernetes cluster configuration, certificates and metadata. Kubernetes is the fastest growing and most popular platform for managing containerized workloads in hybrid cloud environments. Catalogic is also launching cLabs to support new products, open source initiatives and innovations, such as KubeDR.

    Kubernetes stores cluster data in etcd, an interface that collects configuration data for distributed systems. While there are solutions focused on protecting persistent volumes, the cluster configuration data is often forgotten in existing industry solutions. There is a market need to provide the specific requirements of backup and support for Kubernetes cluster data stored in etcd. Catalogic’s new KubeDR is a user-friendly, secure, scalable and an open source solution for backup and disaster recovery designed specifically for Kubernetes applications.

  • Elastic Brings Observability Platform to Kubernetes

    Elastic N.V. announced this week that Elastic Cloud, a subscription instance of an observability platform based on the open source Elasticsearch engine, is generally available on Kubernetes.

    Anurag Gupta, principal product manager for Elastic Cloud, deploying Elastic Cloud for Kubernetes (ECK) eliminates the need to invoke an instance of the platform running outside their Kubernetes environment.

  • Kubernetes Launches Bug Bounty

    Kubernetes, the open-source container management system, has opened up its formerly private bug bounty program and is asking hackers to look for bugs not just in the core Kubernetes code, but also in the supply chain that feeds into the project.

    The new bounty program is supported by Google, which originally wrote Kubernetes, and it’s an extension of what had until now been an invitation-only program. Google has lent financial support and security expertise to other bug bounty programs for open source projects. The range of rewards is from $100 to $10,000 and the scope of what’s considered a valid target is unusual.

  • Google Partners With CNCF, HackerOne on Kubernetes Bug Bounty
  • CNCF, Google, and HackerOne launch Kubernetes bug bounty program

    Bug bounty programs motivate individuals and hacker groups to not only find flaws but disclose them properly, instead of using them maliciously or selling them to parties that will. Originally designed by Google and now run by the CNCF, Kubernetes is an open source container orchestration system for automating application deployment, scaling, and management. Given the hundreds of startups and enterprises that use Kubernetes in their tech stacks, it’s significantly cheaper to proactively plug security holes than to deal with the aftermath of breaches.

Enterprise Insights: Red Hat And The Public Cloud

Filed under
Red Hat
Server

Open source projects are the epicenter of technology innovation today. Docker and Kubernetes are revolutionizing cloud-native computing, along with data-focused projects like Mongo and Redis and many others. Even as open source projects drive innovation, however, sponsoring companies face a growing existential threat from hyper-scale cloud providers.

Red Hat is the recognized leader in enterprise open source support. It's a successful public company with a track record of growth, so it was somewhat puzzling to understand why the Red Hat board decided to sell to IBM this past year.

Read more

16 Open Source Cloud Storage Software for Linux in 2020

Filed under
Server
OSS

The cloud by the name indicates something which is very huge and present over a large area. Going by the name, in a technical field, Cloud is something that is virtual and provides services to end-users in the form of storage, hosting of apps or virtualizing any physical space. Nowadays, Cloud computing is used by small as well as large organizations for data storage or providing customers with its advantages which are listed above.

Mainly, three types of Services come associated with Cloud which are: SaaS (Software as a Service) for allowing users to access other publically available clouds of large organizations for storing their data like Gmail, PaaS (Platform as a Service) for hosting of apps or software on Others public cloud ex: Google App Engine which hosts apps of users, IaaS (Infrastructure as a Service) for virtualizing any physical machine and availing it to customers to make them get feel of a real machine.

Read more

Edge AI server packs in a 16-core Cortex-A72 CPU plus up to 32 i.MX8M SoCs and 128 NPUs

Filed under
GNU
Linux
Server
Hardware

SolidRun’s “Janux GS31 AI Inference Server” runs Linux on its CEx7 LX2160A Type 7 module equipped with NXP’s 16-core Cortex-A72 LX2160A. The system also supplies up to 32 i.MX8M SoCs for video and up to 128 Grylfalcon Lightspeeur 2803 NPUs via multiple “Snowball” modules.

When people talk about edge AI servers, they might be referring to some of the high-end embedded systems we regularly cover here at LinuxGizmos or perhaps something more server-like such as SolidRun’s rackmount form factor Janux GS31 AI Inference Server. The system would generally exceed the upper limits of our product coverage, but it’s a particularly intriguing beastie. The Janux GS31 is based on a SolidRun CEx7 LX2160A COM Express Type 7 module, which also powers the SolidRun HoneyComb LX2K networking board that we covered in June.

Read more

Also: Google Cloud Now Offering IBM Power SystemsGoogle Cloud Now Offering IBM Power Systems

Kubernetes on MIPS

Filed under
Server
Hardware
OSS

Background

MIPS (Microprocessor without Interlocked Pipelined Stages) is a reduced instruction set computer (RISC) instruction set architecture (ISA), appeared in 1981 and developed by MIPS Technologies. Now MIPS architecture is widely used in many electronic products.

Kubernetes has officially supported a variety of CPU architectures such as x86, arm/arm64, ppc64le, s390x. However, it’s a pity that Kubernetes doesn’t support MIPS. With the widespread use of cloud native technology, users under MIPS architecture also have an urgent demand for Kubernetes on MIPS.

Achievements

For many years, to enrich the ecology of the open-source community, we have been working on adjusting MIPS architecture for Kubernetes use cases. With the continuous iterative optimization and the performance improvement of the MIPS CPU, we have made some breakthrough progresses on the mips64el platform.

Over the years, we have been actively participating in the Kubernetes community and have rich experience in the using and optimization of Kubernetes technology. Recently, we tried to adapt the MIPS architecture platform for Kubernetes and achieved a new a stage on that journey. The team has completed migration and adaptation of Kubernetes and related components, built not only a stable and highly available MIPS cluster but also completed the conformance test for Kubernetes v1.16.2.

Read more

Kubernetes: Looking for Bugs, New Study and SUSE's Stake

Filed under
Server
OSS
  • Announcing the Kubernetes bug bounty program

    We aimed to set up this bug bounty program as transparently as possible, with an initial proposal, evaluation of vendors, and working draft of the components in scope. Once we onboarded the selected bug bounty program vendor, HackerOne, these documents were further refined based on the feedback from HackerOne, as well as what was learned in the recent Kubernetes security audit. The bug bounty program has been in a private release for several months now, with invited researchers able to submit bugs and help us test the triage process. After almost two years since the initial proposal, the program is now ready for all security researchers to contribute!

    What’s exciting is that this is rare: a bug bounty for an open-source infrastructure tool. Some open-source bug bounty programs exist, such as the Internet Bug Bounty, this mostly covers core components that are consistently deployed across environments; but most bug bounties are still for hosted web apps. In fact, with more than 100 certified distributions of Kubernetes, the bug bounty program needs to apply to the Kubernetes code that powers all of them. By far, the most time-consuming challenge here has been ensuring that the program provider (HackerOne) and their researchers who do the first line triage have the awareness of Kubernetes and the ability to easily test the validity of a reported bug. As part of the bootstrapping process, HackerOne had their team pass the Certified Kubernetes Administrator (CKA) exam.

  • Kubernetes: a secure, flexible and automated edge for IoT developers

    Cloud native software such as containers and Kubernetes and IoT/edge are playing a prominent role in the digital transformation of enterprise organisations. They are particularly critical to DevOps teams that are focused on faster software releases and more efficient IT operations through collaboration and automation. Most cloud native software is open source which broadens the developer pool contributing and customising the software. This has led to streamlined versions of Kubernetes with low footprints which are suited for IoT/edge workloads.

  • What’s New with SUSE CaaS Platform?

    SUSE CaaS Platform continues its steady pace of advancement, delivering new capabilities targeted at improving the Kubernetes platform operator experience. In addition to updating to Kubernetes 1.16, the SUSE CaaS Platform also now enables operators to consolidate operations across multi-cluster, multi-cloud, and multi-platform environments; to simplify cluster and application management with a web-based console; and to optimize system performance with powerful monitoring and management capabilities.

    Customer centricity was once again at the heart of feature considerations and enhancements for SUSE CaaS Platform. Over the past couple of weeks, we heard an increasing desire from our customers for key capabilities like the need for a unified management console and the need for more powerful data visualization. We listened to you, and your needs, and let that be our guide for development.

Syndicate content

More in Tux Machines

Open Hardware and OSS Leftovers

  • ESP Open Source Research Platform Enables the Design of RISC-V & Sparc SoC’s with Accelerators

    FOSDEM 2020 will take place next week, and there will be several interesting talks about open-source hardware and software development.

  • Open source power for classrooms: Arduino Uno WiFi Rev2 for CTC GO! joins Open Roberta

    Dream team for classrooms worldwide: Arduino Uno WiFi Rev2 for CTC GO! joins Open Roberta Lab, the biggest open source coding platform made in Europe. The Arduino Uno WiFi Rev2 is the fourth Arduino board to be integrated into the Open Roberta Lab, which is currently supporting a total of 13 robots and microcontrollers to enable children worldwide to adopt a playful approach to coding. By “dragging and dropping” the colorful programming blocks called “NEPO” hundreds of thousands of users worldwide from more than 100 countries per year create their own programs to make their hardware come to life.

  • Boston Dynamics Robot Dog Now Freely Available to All as Open-Source Code

    Boston Dynamics‘ robot dog Spot has gone through extensive updates in order to become the finished product it is today, and now the Softbank-owned company will make the bot’s SDK available to everyone via GitHub. The release will allow developers and robotics alike to “develop custom applications that enable Spot to do useful tasks across a wide range of industries,” according to Boston Dynamics VP Michael Perry. The access was previously only open to early adopters, but now it’s available as open-source code. However, fellow developers will have to join Boston Dynamics’ early adopter program in order to lease a robot. The company says its to “create custom methods of controlling the robot, integrate sensor information into data analysis tools and design custom payloads which expand the capabilities of the base robot platform,” according to the company.

  • The programmer behind wildly popular open source project Jenkins and Atlassian Bitbucket's former head of product raised $3.2 million to speed up software testing
  • 6 Reasons Why Network Monitoring Software Should Be Open Source

    Open-source software (OSS) is built upon code that's free and available to anyone who needs it. It adheres to the Debian (Linux) free software guidelines. The only type of certification comes from the Open Source Initiative, which makes sure that coding listed as "open source" meets their criteria by a) Being available for distribution to anyone without any restrictions, b) Making sure the source code is available, and c) Including a license that stipulates that any modifications or improvements are released with a new name or version number. Unlike closed, proprietary code, open-source requires no licensing fees or permission as long as you adhere to the terms of service outlined by the developer. Although tech support is hit-or-miss and depends on the developer, it has a large and active community of developers who are happy to help you work out any issues. You'll also find dozens of digital libraries on the internet that contain base code, modules, and fully formed apps that you can use, alter, and share. There are many reasons why working with open source code is preferable, and these are especially applicable to network monitoring apps and tools.

  • 2020: Expect more from containers, open source and cloud

    2020 is the year in which open source will become even more fundamental to the success of companies as they move to become fully-fledged, digitally-led businesses; proprietary software will lose relevance; companies will increasingly turn to the cloud to deliver value and capitalise on growth opportunities; and containers will finally become mainstream. [...] He also believes that the new decade will herald unprecedented growth when it comes to companies not only becoming container-led but also cloud-native - ready to benefit even more from a cloud-centric (and open) landscape. “South African businesses are having more serious discussions around multi-cloud and hybrid cloud implementations. Throughout this, an open approach, relying on an agile approach through containers, gives organisations the impetus they need to be digital-first,” he says.

  • Rodney Don Holder: Here’s why open source AI is important for development

    As these names suggest, open source references a mindset popular in the Silicon Valley tech industry. Artificial intelligence and machine learning operate on computer coding and incredibly refined hardware components. The open-source mindset believes that making these batches of code and hardware blueprints available to the public does more for humanity than does keeping it all close to the chest. In contrast, Rodney Don Holder explains that a closed source approach seeks to protect code and hardware from the public eye. Their concern is more proprietary than it is collaborative. One example of closed source software is Apple as they work hard to maintain control of their software.

  • What is Apache Tomcat? Introducing the Widely Used Java Servlet and JSP Container

    What is Apache Tomcat? Essentially it’s an open-source Java servlet and Java Server Page container that lets developers implement an array of enterprise Java applications. Tomcat also runs a HTTP web server environment in which Java code can run. Three years after the original release of Java in 1995, Sun Microsystems architect James Duncan Davidson developed an open-source servlet reference implementation for the first Java Servlet API. Java servlets are small Java programs that define how responses and requests are handled by the server. A developer would write their servlet or JSP and let Tomcat conduct all of the routing and backend work.

  • Teledyne Extends S-Parameter Leadership with Open Source Software: SIGNALINTEGRITY

    Teledyne LeCroy, a worldwide leader in electronic test and measurement solutions and a business unit of Teledyne Technologies Incorporated, announces today the availability of an open-source software tool, SignalIntegrity, offering free solutions to signal integrity problems for design and test engineers. In order to avoid signal integrity issues in today's world of gigabit-per-second transfer rates, engineers must have superior tools for the necessary combination of simulation, modeling and measurement. The goal of this software is to provide free tools for solving real-time signal integrity problems. More than 1,500 users have downloaded the Python-based software since it has been made available.

  • Open source all-in-one DevOps platform: OneDev’s UI is easy to use

    Variety is the spice of life, and now there is another DevOps platform to choose from. OneDev is a new, all-in-one, open source Git server with a simple to use UI, customizable issue states and fields, and auto-refreshing issue boards. Browse some of its features and see how it compares to other popular tools. Who knows, maybe OneDev is the platform that you have been searching for.

  • DFINITY Foundation Demonstrated ‘LinkedUp’ Open Source Platform

    It also empowers the next generation of developers so that they can build a new breed of tamper-proof enterprise software systems and open internet services. They aim at democratizing software development. He also added that the Bronze release of the Internet Computer would provide the developers and enterprises with infinite possibilities of building on the Internet Computer. All of this is a reflection of the strength of the Dfinity team that they have made so far. Dfinity has also said that its Internet Computer Protocol enables a new type of software that goes by the name autonomous software. This software guarantees permanent APIs which cannot be revoked. [...] Their second major milestone is of demoing a decentralized web app called LinkedUp on the Internet Computer, which can run on an independent data center in Switzerland.

  • Google Open Sources Albert NLP

    Google has made ALBERT (A Lite BERT) available in an open source version. ALBERT is a deep-learning natural language processing model that the developers say uses far fewer parameters than BERT without sacrificing accuracy. Bidirectional Encoder Representations from Transformers, or BERT, is the self-supervised method released by Google in 2018. It has become known for the impressive results the technique has achieved on a range of NLP tasks while relying on un-annotated text drawn from the web. Most similar NLP systems are based on text that has been labeled specifically for a given task.

  • Scientists working with Google just published the most detailed brain scans ever created

    Google and its partners at the Janelia Research Campus today released the largest, most detailed set of brain scans ever published. The project encompasses nearly one-third of the brain of a fruit fly and includes detailed mappings for more than 25 thousand neurons featuring more than 20 million synapses. The best part: it’s all been released open-source to the public. This is a great day for science. [...] Luckily for organizations and individuals who can’t afford the resources it would take to build this particular project, Google and the scientists at the Janelia Research Campus have published the entire project open-source. Even better, the team painstakingly formatted the data, images, videos, and other information in a way that makes it easily accessible to everyday people and usable by world-class researchers.

  • People of WordPress: Robert Cheleuka

    You’ve probably heard that WordPress is open-source software, and may know that it’s created and run by volunteers. WordPress enthusiasts share many examples of how WordPress changed people’s lives for the better. This monthly series shares some of those lesser-known, amazing stories. [...] Robert first came into contact with WordPress in 2014 when he and a friend started a local tech blog. Before that, all he knew was basic, outdated HTML from high school and some knowledge of Adobe Dreamweaver. They decided to use WordPress, and their new blog looked like it came from the future. They used a theme from the repo and got such positive feedback from the blog they decided to open a content and media publishing agency. While they got a few web redesign jobs thanks to the exposure the blog brought, they lacked the administrative and business skills needed and ended up going their separate ways. Then in his first real job after college Robert finally took it upon himself to learn the ins and outs of WordPress. He learned how to install WordPress on a server and did some research on customizing themes. With that knowledge alone he got his first web design clients and started earning nearly as much as he did at his job. Robert soon realized that free WordPress themes would only take him so far, especially with his limited code skills. Because in Malawi only people who travel abroad have access to credit cards, paying for premium themes was impossible. Like many WordPress designers in developing countries, Robert turned to using pirated themes instead. He knew that was both unsafe and unethical, and decided to learn how to code. Knowing how to build themes from scratch would surely help him rise above the competition.

  • Elastic: Big Data Needs Effective Search To Drive Value

    Elastic N.V. (ESTC) is a provider of opensource software which is used in applications like real time search and analytics. Elastic’s rapid growth is being driven by a rapid growth in the volume of data being generated globally and the need for improved search tools. Elastic potentially has a bright future even as cloud computing vendors introduce the same technology, provided the company continues to offer customers a compelling value proposition.

  • MariaDB Announces Cloud Native Open Source DB

    There's a new version of MariaDB that is designed to make it easier to develop apps using smart transactions and cloud-native data storage. MariaDB began life as an alternative to MySQL when Oracle took over the original MySQL. The new release, MariaDB X4, was announced by MariaDB Corp, which develops and sells an enterprise version of the open source MariaDB database management system. MariaDB has a SQL interface for accessing data, alongside GIS and JSON features.

Security Leftovers

  • Does Your Domain Have a Registry Lock?

    Dijkxhoorn said one security precaution his company had not taken with their domain prior to the fraudulent transfer was a “registry lock,” a more stringent, manual (and sometimes offline) process that effectively neutralizes any attempts by fraudsters to social engineer your domain registrar.

    With a registry lock in place, your registrar cannot move your domain to another registrar on its own. Doing so requires manual contact verification by the appropriate domain registry, such as Verisign — which is the authoritative registry for all domains ending in .com, .net, .name, .cc, .tv, .edu, .gov and .jobs. Other registries handle locks for specific top-level or country-code domains, including Nominet (for .co.uk or .uk domains), EURID (for .eu domains), CNNIC for (for .cn) domains, and so on.

  • Cisco Warns of Critical Network Security Tool Flaw

    The flaw exists in the web-based management interface of the Cisco Firepower Management Center (FMC), which is its platform for managing Cisco network security solutions, like firewalls or its advanced malware protection service. Cisco has released patches for the vulnerability (CVE-2019-16028), which has a score of 9.8 out of 10 on the CVSS scale, making it critical in severity.

  • No big deal, Rogers, your internal source code and keys are only on the open web. Don't hurry to take it down

    Source code, internal user names and passwords, and private keys, for the website and online account systems of Canadian telecoms giant Rogers have been found sitting on the open internet. The leaked software, seemingly uploaded to GitHub by a Rogers engineer before they left the telco, is written in Java and powered various components of Rogers.com. The materials are marked "closed source" and copyright Rogers, yet can be found on the web if you know where to look. Details of and credentials for services and systems on the ISP's internal networks are included. This kind of information, along with source code to skim for security bugs, is a boon for miscreants casing the telco to compromise it. These details may have already been exploited by criminals, or may prove useful for future attacks. It's also a reminder that engineers and management must take all precautions to avoid pushing private company code to public repositories. It should be noted that no customer information nor account details – beyond the names, passwords, and email addresses of some members of the ISP's web development team – are present in the public code repository. The web app blueprints date back to 2015, so just how much of this code remains in production is unclear. One hopes the passwords and keys have been replaced over the past five years, at least. With any luck, this may well be more of an embarrassment to one of Canada's biggest broadband'n'telly telcos than anything else.

  • Rogers’ internal passwords and source code found open on GitHub

    Sensitive data of another major Canadian firm has been found sitting open on the GitHub developers platform. Security researcher Jason Coulls said he recently discovered two open accounts with application source code, internal user names and passwords, and private keys for Rogers Communications. No customer data was found. He suspects the code belonged to a developer who has left the telco. Coulls, who works in the IT department of a Toronto firm and has his own security consultancy, initially told The Register of the discovery, after which the news site contacted Rogers. One problem is the code he saw describes data payloads and how it goes between databases and web services. “You can use that to get to the stuff that people [thieves] would go after,” he explained.

  • How to patch your open source software vulnerabilities

    Software vulnerabilities are a fact of life. Researchers -- if not hackers -- constantly discover new ways to compromise popular software libraries. It's up to enterprises to quickly deploy patches to secure software before hackers get in. Consider the Equifax breach, in which a hacker exposed the data of more than 145 million users, resulting in $575 million in fines for the credit rating agency. A U.S. Senate investigation identified a backlog of over 8,500 unpatched vulnerabilities at Equifax -- the hacker gained access through just one of those unpatched systems. Vulnerability backlogs are especially prevalent within enterprises that rely on open source components. Nearly all applications make use of some open source components that take the place of either mundane or arcane coding tasks. An open source project often has an active community to maintain and augment it, but that's not always the case. Ultimately, open source software requires a leap of faith from the user that what they're adopting is secure and effective.

Entrapment and Digital Prisons (Microsoft GitHub and Sonos)

  • Microsoft open-sources ONNX Runtime model to speed up Google’s BERT

    This is the most recent leap forward in natural language for Microsoft, but not its first attempt to make Google’s BERT better. About a year ago, Microsoft AI researchers also released MT-DNN, a Transformer-based model that set new high performance standards for the GLUE language model performance benchmark.

  • GitHub now uses AI to recommend open issues in project repositories [Ed: Microsoft now uses mindless buzzwords like "HEY HI!!!" (AI) to market its proprietary software trap]
  • AVSystem Releases a New Version of Open-Source Anjay LwM2M SDK

    AVSystem is pleased to announce that an open-source version of Anjay 2.2.1 has just been released on GitHub.

  • See you later, Sonos: Meet the open-source audio system that would perhaps perhaps no longer ever die

    This week, Sonos launched — after which therefore retracted — that it would perhaps perchance ruin-of-life a assortment of popular audio streaming products made by the corporate at some level of its first 10 years in alternate. Sonos had made up our minds to complete improve on yarn of these first-skills products lack sufficient processing vitality and storage to accommodate contemporary aspects. Regardless that there delight in been many enhancements in presents, miniaturization, and general efficiency, loudspeaker skills has no longer fundamentally changed since its introduction in the 1920s. Offered that they’re no longer inclined outside their efficiency specifications, the drivers and cones can closing a long time. Diverse elements inner speakers encompass magnets constituted of ferrous and uncommon earth presents that attain no longer expire.

  • So long, Sonos: Meet the open-source audio system that will never die

    Sonos had decided to end support because these first-generation products lack sufficient processing power and storage to accommodate new features. Although there have been many improvements in materials, miniaturization, and overall performance, loudspeaker technology has not fundamentally changed since its introduction in the 1920s. Provided that they aren't used outside their performance specifications, the drivers and cones can last decades. Other components inside speakers include magnets made out of ferrous and rare earth materials that do not expire. In addition to solid-state MOSFET-based signal amplifiers, self-powered speakers also contain transformers, which are made of solid cores of metal wound with fine conductive wire. Updates to transformer technology in recent years include Gallium Nitride (GaN), which reduces heat and overall footprint. These components, particularly MOSFETs do not "go bad" unless they are abused, such as being subjected to high temperatures, very high voltages, or transient power spikes, which can be mitigated by a simple surge suppressor or power conditioner.

FUD and Openwashing Leftovers

  • Kevin Owocki on Gitcoin, Controversy and the Future of Open Source Funding

    Some of that controversy has been from outside the Ethereum community, pointing to Consensys and Ethereum Foundation support as an example of centralization. Some of the controversy has come from within, as debates rage about what is or isn’t an acceptable use of “public” resources.

  • Sonatype: Secure code with less hassle

    Software development has changed drastically over the past decade. Take a 22-year-old graduate with a degree in computer science. At one time, they would start off testing code, then start to write code line-by-line. Today, 80% of applications are developed using open source software. Instead of laboriously worrying over each caret and comma, code is grabbed and assembled. This can make for quick iterations and rapid project completion.

  • Lyft's open source asset tracking tool simplifies security

    The modern map -- in fact, any map since the Age of Sail -- serves an important purpose in navigation. Exploration feats, such as Magellan's circumnavigation of the globe, Lewis and Clark's American expedition, or more recent excursions to the Earth's polar regions, would not have been possible without mapping knowledge and ability. A cursory look at ancient or medieval history shows that early maps, prior to their use for navigation, served a different purpose entirely. The map in the 15th century manuscript La Fleur des Histoires was by no means intended to be geographically accurate. Instead, it was designed to convey a concept or idea -- in this case, the separation of ruling powers by region. However, the real power of mapmaking -- that is, for navigation -- would not be realized for generations.

  • vChain, the Makers of the CodeNotary Open Source Code Trust Solution With Over 9 Million Monthly Customer Integrity Verifications Raises $7 Million in Series A to Secure Today’s DevOps Process

    vChain, the leading trust and integrity company, announces the close of a $7M Series A investment round. Elaia, a leading European tech venture fund, led the new investment round which includes also other notable investors such as Swiss-based Bluwat and Acequia Capital (Seattle, USA). vChain was founded in late 2018 and released its first product in April 2019.

  • Open source licence series - WhiteSource: permissive is winning, but is there a hurt factor?
  • Open source licence series - Instaclustr: Is open core a rotten deal?

    Ideally, open source software should be, well, free and open.

  • Open source licence series - Percona: is the battle won, or is this a different war?

    Recently, the Cryptographic Autonomy License (CAL) was submitted for OSI consideration. As Holo’s co-founder Arthur Brock explains in his blog post, his goal is to protect end-user privacy and autonomy. Restrictions in this case focus not on whom, but how the software should be used. While many on the OSI board seem to support the licence, Bruce Perens, OSI co-founder and the person who drafted the original Open Source Definition (OSD), resigned from OSI saying, “… it seems to me that the organisation is rather enthusiastically headed toward accepting a licence that isn’t freedom-respecting. Fine, do it without me, please.”

  • Open Source Wood Innovation Award Given to an Active Member
  • Open Source Plant Material And Intellectual Property

    Today we hear the term “open source” more and more. It is a term that is most commonly identified with software and firmware development out of the Silicon Valley. However, the term is becoming common in the plant industry.

  • Garadget review: Open your garage door with open-source technology

    There’s no scheduling system nor (surprisingly) a logging system built into Garadget, but it does support Alexa, Google Assistant, SmartThings, IFTTT, and a whole host of lesser-known third-party tools, but all of that will invariably force you into the system’s forums again. For example, there are two Garadget Alexa skills, one for if you want to say “smart garage” and one for if you want to say “Garadget” to invoke the skill. Setting up a connection to SmartThings requires using Samsung’s developer tools.