All Jupiter Broadcasting Shows

Jupiter Broadcasting
undefined
Jan 2, 2020 • 0sec

Why Computers Suck | BSD Now 331

How learning OpenBSD makes computers suck a little less, How Unix works, FreeBSD 12.1 Runs Well on Ryzen Threadripper 3970X, BSDCan CFP, HardenedBSD Infrastructure Goals, and more. Headlines Why computers suck and how learning from OpenBSD can make them marginally less horrible How much better could things actually be if we abandoned the enterprise development model? Next I will compare this enterprise development approach with non-enterprise development - projects such as OpenBSD, which do not hesitate to introduce ABI breaking changes to improve the codebase. One of the most commonly referred to pillars of the project's philosophy has long been its emphasis on clean functional code. Any code which makes it into OpenBSD is subject to ongoing aggressive audits for deprecated, or otherwise unmaintained code in order to reduce cruft and attack surface. Additionally the project creator, Theo de Raadt, and his team of core developers engage in ongoing development for proactive mitigations for various attack classes many of which are directly adopted by various multi-platform userland applications as well as the operating systems themselves (Windows, Linux, and the other BSDs). Frequently it is the case that introducing new features (not just deprecating old ones) introduces new incompatibilities against previously functional binaries compiled for OpenBSD. To prevent the sort of kernel memory bloat that has plagued so many other operating systems for years, the project enforces a hard ceiling on the number of lines of code that can ever be in ring 0 at a given time. Current estimates guess the number of bugs per line of code in the Linux kernel are around 1 bug per every 10,000 lines of code. Think of this in the context of the scope creep seen in the Linux kernel (which if I recall correctly is currently at around 100,000,000 lines of code), as well as the Windows NT kernel (500,000,000 lines of code) and you quickly begin to understand how adding more and more functionality into the most privileged components of the operating system without first removing old components begins to add up in terms of the drastic difference seen between these systems in the number of zero day exploits caught in the wild respectively. How Unix Works: Become a Better Software Engineer Unix is beautiful. Allow me to paint some happy little trees for you. I’m not going to explain a bunch of commands – that’s boring, and there’s a million tutorials on the web doing that already. I’m going to leave you with the ability to reason about the system. Every fancy thing you want done is one google search away. But understanding why the solution does what you want is not the same. That’s what gives you real power, the power to not be afraid. And since it rhymes, it must be true. News Roundup FreeBSD 12.1 Runs Refreshingly Well With AMD Ryzen Threadripper 3970X For those of you interested in AMD's new Ryzen Threadripper 3960X/3970X processors with TRX40 motherboards for running FreeBSD, the experience in our initial testing has been surprisingly pleasant. In fact, it works out-of-the-box which one could argue is better than the current Linux support that needs the MCE workaround for booting. Here are some benchmarks of FreeBSD 12.1 on the Threadripper 3970X compared to Linux and Windows for this new HEDT platform. It was refreshing to see FreeBSD 12.1 booting and running just fine with the Ryzen Threadripper 3970X 32-core/64-thread processor from the ASUS ROG ZENITH II EXTREME motherboard and all core functionality working including the PCIe 4.0 NVMe SSD storage, onboard networking, etc. The system was running with 4 x 16GB DDR4-3600 memory, 1TB Corsair Force MP600 NVMe SSD, and Radeon RX 580 graphics. It was refreshing to see FreeBSD 12.1 running well with this high-end AMD Threadripper system considering Linux even needed a boot workaround. While the FreeBSD 12.1 experience was trouble-free with the ASUS TRX40 motherboard (ROG Zenith II Extreme) and AMD Ryzen Threadripper 3970X, DragonFlyBSD unfortunately was not. Both DragonFlyBSD 5.6.2 stable and the DragonFlyBSD daily development snapshot from last week were yielding a panic on boot. So with that, DragonFlyBSD wasn't tested for this Threadripper 3970X comparison but just FreeBSD 12.1. FreeBSD 12.1 on the Threadripper 3970X was benchmarked both with its default LLVM Clang 8.0.1 compiler and again with GCC 9.2 from ports for ruling out compiler differences. The FreeBSD 12.1 performance was compared to last week's Windows 10 vs. Linux benchmarks with the same system. BSDCan 2020 CFP BSDCan 2020 will be held 5-6 (Fri-Sat) June, 2020 in Ottawa, at the University of Ottawa. It will be preceded by two days of tutorials on 3-4 June (Wed-Thu). NOTE the change of month in 2020 back to June Also: do not miss out on the Goat BOF on Tuesday 2 June. We are now accepting proposals for talks. The talks should be designed with a very strong technical content bias. Proposals of a business development or marketing nature are not appropriate for this venue. See http://www.bsdcan.org/2020/ If you are doing something interesting with a BSD operating system, please submit a proposal. Whether you are developing a very complex system using BSD as the foundation, or helping others and have a story to tell about how BSD played a role, we want to hear about your experience. People using BSD as a platform for research are also encouraged to submit a proposal. Possible topics include: How we manage a giant installation with respect to handling spam. and/or sysadmin. and/or networking. Cool new stuff in BSD Tell us about your project which runs on BSD other topics (see next paragraph) From the BSDCan website, the Archives section will allow you to review the wide variety of past BSDCan presentations as further examples. Both users and developers are encouraged to share their experiences. HardenedBSD Infrastructure Goals 2019 has been an extremely productive year with regards to HardenedBSD's infrastructure. Several opportunities aligned themselves in such a way as to open a door for a near-complete rebuild with a vast expansion. The last few months especially have seen a major expansion of our infrastructure. We obtained a number of to-be-retired Dell R410 servers. The crash of our nightly build server provided the opportunity to deploy these R410 servers, doubling our build capacity. My available time to spend on HardenedBSD has decreased compared to this time last year. As part of rebuilding our infrastructure, I wanted to enable the community to be able to contribute. I'm structuring the work such that help is just a pull request away. Those in the HardenedBSD community who want to contribute to the infrastructure work can simply open a pull request. I'll review the code, and deploy it after a successful review. Users/contributors don't need access to our servers in order to improve them. My primary goal for the rest of 2019 and into 2020 is to become fully self-hosted, with the sole exception of email. I want to transition the source-of-truth git repos to our own infrastructure. We will still provide a read-only mirror on GitHub. As I develop this infrastructure, I'm doing so with human rights in mind. HardenedBSD is in a very unique position. In 2020, I plan to provide production Tor Onion Services for the various bits of our infrastructure. HardenedBSD will provide access to its various internal services to its developers and contributors. The entire development lifecycle, going from dev to prod, will be able to happen over Tor. Transparency will be key moving forward. Logs for the auto-sync script are now published directly to GitHub. Build logs will be, soon, too. Logs of all automated processes, and the code for those processes, will be tracked publicly via git. This will be especially crucial for development over Tor. Integrating Tor into our infrastructure so deeply increases risk and maintenance burden. However, I believe that through added transparency, we will be able to mitigate risk. Periodic audits will need to be performed and published. I hope to migrate HardenedBSD's site away from Drupal to a static site generator. We don't really need the dynamic capabilities Drupal gives us. The many security issues Drupal and PHP both bring also leave much to be desired. So, that's about it. I spent the last few months of 2019 laying the foundation for a successful 2020. I'm excited to see how the project grows. Beastie Bits FuryBSD - KDE plasma flavor now available DragonFly - git: virtio - Fix LUN scan issue w/ Google Cloud LPI is looking for BSD Specialist learning material writers ZFS sync/async + ZIL/SLOG, explained BSD-Licensed Combinatorics library/utility SSL client vs server certificates and bacula-fd MaxxDesktop planning to come to FreeBSD Project Page Feedback/Questions Tom - ZFS Mirror with different speeds Jeff - Knowledge is power Johnny - Episode 324 response to Jacob Pat - NYC*BUG meeting Jan Meeting Location Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv Your browser does not support the HTML5 video tag.
undefined
Jan 1, 2020 • 0sec

Conquering Planned Obsolescence | Self-Hosted 9

Master of details, open source advocate and YouTuber, Quindor from Intermittent.Tech joins us for a chat about tuya-convert to avoid planned hardware obsolescence, his new 100TB server build, highly available home setups, and his DIY LED project.Special Guest: Andries Faassen.Links:Intermit.Tech - YouTubeIntermittent Technology - My personal blogHome Assistant: Cheap multi-room Temperature SensorsHome Networking: 100TB 10Gbit Server - Last server bitsQuinLED.info - WiFi controllable DIY LED dimmerTuya-convert: A collection of scripts to flash Tuya IoT devices to alternative firmwares
undefined
Dec 31, 2019 • 0sec

Particularly Poor Predictions | LINUX Unplugged 334

We review our predictions and own up to what we got wrong, and what we got right in 2019.Special Guests: Alex Kretzschmar and Brent Gervais.Links:Q&A with Sam K - Acquisition Announcement Follow Up Keep the conversation going join us on Telegram Jupiterbroadcasting.com/telegram My recent Plasma Basic to Brilliant video is out Mac Pro case clone No More Secrets - This project provides a command line tool called nms that recreates the famous data decryption effect seen on screen in the 1992 hacker movie Sneakers. hollywood - launch Byobu, open a random number of splits with random sizes, in each split run a noisy text app cool-retro-term: A good looking terminal emulator which mimics the old cathode display
undefined
Dec 31, 2019 • 0sec

Brunch with Brent: Jackie DeVore | Jupiter Extras 43

Brent sits down with Jackie DeVore, co-host of horror podcast Sirens of Scream and multi-disciplinary artist. Our in-person chat explores the origins of her podcasting, creativity as a lifestyle, women in tech, art, and gaming, and her co-founding and recent launch of Hell Bunny Independents Club, a women's inclusive and supportive digital safe space.Special Guest: Jackie DeVore.Links:Sirens of ScreamHell Bunny Independents Club (HBIC)Jackie DeVore - Useless ProgressBrunch with Brent: Alex KretzschmarSelf-Hosted PodcastBrunch with Brent: Drew DeVoreSirens of Scream 62: Rob Sheridan / HIGH LEVELWarm Bodies - IMDbShaun of the Dead - IMDbTucker and Dale vs Evil - IMDbSirens of Scream Episode 66(6): The Soska Sisters, RABID, and the State of Horror as We Know It!Safety Not Guaranteed - IMDbRoom 104 (TV Series) - IMDbFour Rooms - IMDbNerds in BabelandJupiter Extras 27: Happy Halloween, 2019!Neil Gaiman - WikipediaCoraline - IMDbUser ErrorBrunch with Brent: Ell MarquezBrunch with Brent: Emma MarshallBrunch with Brent: Jill Bryant RynikerQueer Corners, Ottawa, Ontariowhiprsnapr brewing co. craft brewery - Ottawa, OntarioGhosts in the BurbsGhosts in the Burbs - MerchPortal 2 - SteamRedditgiftsJackie DeVore - @jackietherobot on TwitterJackie DeVore - @jackietherobot on InstagramBrent Gervais - @brentgervais on Twitter
undefined
Dec 29, 2019 • 0sec

Linux Action News 138

We review the major moments of the year's news, and discuss how they impacted our world.Links:Amazon takes aim at MongoDB with launch of Mongo-compatible DocumentDBMongoDB "open-source" Server Side Public License rejectedRedis Labs raises $60 million for its NoSQL databaseRedis Labs changes its open-source license — againKeeping Open Source Open – Open Distro for ElasticsearchChef goes 100% open sourceGoogle jumps into gaming with Google Stadia streaming serviceGoogle Stadia will be missing many features for Monday’s launchSupporting choice and competition in EuropePresenting search app and browser options to Android users in EuropeAndroid Developers Blog: Welcoming Android 10!Project Mainline is Google’s new way to speed up security updates in Android QAdiantum: encryption for the low endAll Chromebooks will also be Linux laptops going forwardGoogle gives most Chromebooks an extra year of software supportGoogle and fwupd sitting in a treePhoenix joins the LVFSPlease welcome HP to the LVFSLVFS Project AnnouncementAnnouncing the Open Sourcing of Windows CalculatorIntroducing Windows TerminalMicrosoft Will Release Their Edge Web Browser For LinuxMicrosoft Teams is now available on LinuxAnnouncing WSL 2Ubuntu 19.04 'Disco Dingo' Released with New FeaturesIntel 32bit packages on Ubuntu from 19.10 onwardsStatement on 32-bit i386 packages for Ubuntu 19.10 and 20.04 LTSEnhancing our ZFS support on Ubuntu 19.10Ubuntu 19.10 ReleasedWill Cooke, the Director of Engineering for the Ubuntu desktop, has left CanonicalCanonical announces Ubuntu Pro for Amazon Web ServicesRed Hat Opens the Linux Experience to Every Enterprise, Every Cloud and Every Workload with Red Hat Enterprise Linux 8Red Hat crosses US$3b annual revenue for first timeAnnouncing the release of Fedora 30IBM Closes Landmark Acquisition of Red Hat for $34 Billion; Defines Open, Hybrid Cloud FutureIntroducing Fedora CoreOSPresenting CentOS StreamFedora 31 is officially here!
undefined
Dec 26, 2019 • 0sec

Nebulous Networking | TechSNAP 419

From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.Links:Introducing Nebula, the open source global overlay network from Slack nebula: A scalable overlay networking tool with a focus on performance, simplicity and security Nebula VPN routes between hosts privately, flexibly, and efficiently How to set up your own Nebula mesh VPN, step by step LINUX Unplugged 329: Flat Network Truthers Cloudy with a chance of neurons: The tools that make neural networks work Welcome To Colaboratory ImageColorizer Notebook DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)
undefined
Dec 26, 2019 • 0sec

Happy Holidays, All(an) | BSD Now 330

Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more. Headlines Authentication vulnerabilities in OpenBSD We discovered an authentication-bypass vulnerability in OpenBSD's authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms. From the manual page of login.conf: OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles. The authentication styles currently provided are: > passwd Request a password and check it against the password in the master.passwd file. See login_passwd(8). > skey Send a challenge and request a response, checking it with S/Key (tm) authentication. See login_skey(8). > yubikey Authenticate using a Yubico YubiKey token. See login_yubikey(8). > For any given style, the program /usr/libexec/auth/login_style is used to > perform the authentication. The synopsis of this program is: > /usr/libexec/auth/login_style [-v name=value] [-s service] username class This is the first piece of the puzzle: if an attacker specifies a username of the form "-option", they can influence the behavior of the authentication program in unexpected ways. login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program. The allowed protocols are login, challenge, and response. (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based). This is the second piece of the puzzle: if an attacker specifies the username "-schallenge" (or "-schallenge:passwd" to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed. Case study: smtpd Case study: ldapd Case study: radiusd Case study: sshd Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE's CVE Assignment Team. First release candidate for NetBSD 9.0 available! Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed! This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface. We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year). Here are a few highlights of the new release: > Support for Arm AArch64 (64-bit Armv8-A) machines, including "Arm ServerReady" compliant machines (SBBR+SBSA) > Enhanced hardware support for Armv7-A > Updated GPU drivers (e.g. support for Intel Kabylake) > Enhanced virtualization support > Support for hardware-accelerated virtualization (NVMM) > Support for Performance Monitoring Counters > Support for Kernel ASLR > Support several kernel sanitizers (KLEAK, KASAN, KUBSAN) > Support for userland sanitizers > Audit of the network stack > Many improvements in NPF > Updated ZFS > Reworked error handling and NCQ support in the SATA subsystem > Support a common framework for USB Ethernet drivers (usbnet) More information on the RC can be found on the NetBSD 9 release page News Roundup Running FreeNAS on a Digitalocean droplet ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you're here, reading this, you probably know all that already and we can skip ahead. I've needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I'm trying to do. Since I'm using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can't. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn't a supported feature, at least not in the traditional way :) Before we begin, here's the gist of what we're going to do: > Base of a FreeBSD droplet, we'll re-image our boot block device with FreeNAS iso. We'll then install FreeNAS on the second block device. Once done we're going to do the ol' switcheroo: we're going to re-image our original boot block device using the now FreeNAS-installed second block device. Part 1: re-image our boot block device to boot FreeNAS install media. Part 2: Install FreeNAS on the second block-device Part 3: Re-image the boot block device using the FreeNAS-installed block device NomadBSD 1.3 is now available From the release notes: > The base system has been changed to FreeBSD 12.1-RELEASE-p1 Due to a deadlock problem, FreeBSD's unionfs has been replaced by unionfs-fuse The GPT layout has been changed to MBR. This prevents problems with Lenovo systems that refuse to boot from GPT if "lenovofix" is not set, and systems that hang on boot if "lenovofix" is set. Support for ZFS installations has been added to the NomadBSD installer. The rc-script for setting up the network interfaces has been fixed and improved. Support for setting the country code for the wlan device has been added. Auto configuration for running in VirtualBox has been added. A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead. NVIDIA driver version 440 has been added. nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the default user and autologin has been added. nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added. Martin Orszulik added Czech translations to the setup and installation wizard. The NomadBSD logo, designed by Ian Grindley, has been changed. Support for localized error messages has been added. Support for localizing the password prompts has been added. Some templates for starting other DEs have been added to ~/.xinitrc. The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved. A script that helps users to configure a multihead systems has been added. The Xorg driver for newer Intel GPUs has been changed from "intel" to "modesetting". /proc has been added to /etc/fstab A D-Bus session issue has been fixed which prevented thunar from accessing samba shares. DSBBg which allows users to change and manage wallpapers has been added. The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed. Support for multiple keyboard layouts has been added. www/palemoon has been removed. mail/thunderbird has been removed. audio/audacity has been added. deskutils/orage has been added. the password manager fpm2 has been replaced by KeePassXC mail/sylpheed has been replaced by mail/claws-mail multimedia/simplescreenrecorder has been added. DSBMC has been changed to DSBMC-Qt Many small improvements and bug fixes. At e2k19 nobody can hear you scream After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut. I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow. Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy. Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab). I did not plan to spend most of my week hacking on rpki-client but in the end I'm happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse. In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement! Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut. Beastie Bits FOSDEM 2020 BSD Devroom schedule Easy Minecraft Server on FreeBSD Howto stats(3) framework in the TCP stack 4017 days of uptime sysget - A front-end for every package manager PlayOnBSD’s Cross-BSD Shopping Guide Feedback/Questions Pat asks about the proper disk drive type for ZFS Brad asks about a ZFS rosetta stone Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv Your browser does not support the HTML5 video tag. Special Guest: Mariusz Zaborski.
undefined
Dec 25, 2019 • 0sec

Tails + Virtualization | Choose Linux 25

Ultimate privacy in Distrohoppers, and the best ways to run other operating systems within your current Linux distro.Links:Tails — Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims at preserving your privacy and anonymity.Installing KVM on UbuntuVirtual machine manager — The virt-manager application is a desktop user interface for managing virtual machines through libvirt.Boxes — Boxes is an application that gives you access to virtual machines, running locally or remotely. It also allows you to connect to the display of a remote computer.LINUX Unplugged episode about virtualization — Our crew walks you through their PCI Passthrough setups that let them run Windows, macOS, and distro-hop all from one Linux machine.
undefined
Dec 24, 2019 • 0sec

Linux Wayback Machine | LINUX Unplugged 333

Open source won the last decade, but what if it hadn’t? We look back at some major milestones and reflect on a world where they never existed.Special Guests: Alex Kretzschmar and Brent Gervais.Links:Introducing netboot.xyz Docker Network Boot Server Image (PXE) Tails - Celebrating 10 years of Tails! Ten Years Past GNOME’s 10x10 Goal, The Linux Desktop Is Still Far From Having A 10% Marketshare - Phoronix Linux Headlines Jupiter Extras - NOW ON YouTube Keep the conversation going join us on Telegram! Container History in an Image Shuttleworth’s grand vision for Ubuntu on phones, tablets, TV’s and smart screens everywhere in October 2011 Ubuntu Touch 1.0 in October 2013 BQ Aquaris E4.5 Ubuntu Edition in April 2015 Ubuntu phone killed in April 2017 UBports released first stable OTA in June 2017 Librem 5 crowdfunder in August 2017 Librem 5 starts shipping in December 2019 PinePhone announced at FOSDEM 2019 PinePhone Braveheart edition opens for pre-orders November 2019 Xdg-app becomes Flatpak in May 2016 Launched in December 2014 Skype snapped in February 2018 Chrome OS announced in July 2009 First widely available Chromebooks arrive June 2011 Chromebook Pixel in February 2013 Android apps arrive in September 2014 Network file share support arrives in September 2018 Linux apps beta arrives in stable channel in October 2018 In May 2019 it was announced that all new Chromebooks would support Linux apps In Q4 of 2018, Chromebooks made up 21% of all notebooks sold in the US Feedback: Aaarghhhhh!! (Chris’ Pronunciation)
undefined
Dec 24, 2019 • 0sec

Brunch with Brent: Catherine Kretzschmar | Jupiter Extras 42

Brent sits down with Catherine Kretzschmar, professional music teacher, coding bootcamp enlistee, and humanist celebrant, for an in-person connective chat on the relationship between music and coding, the quality-of-life implications of ever-evolving home automation, an intro to humanist celebrancy, and more. Catherine is a good friend of the Jupiter Broadcasting family and wife of Alex Kretzschmar, co-host of Self-Hosted.Special Guest: Catherine Kretzcschmar.Links:Brunch with Brent: Alex KretzschmarSelf-Hosted PodcastHarmony Remotes - LogitechBeyond Sudoku - PuzzlerHumanist Celebrant - WikipediaBrent Gervais - @brentgervais on Twitter

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app