All Jupiter Broadcasting Shows

Jupiter Broadcasting
undefined
Mar 31, 2019 • 0sec

Linux Action News 99

Mozilla’s new Android app, Google wants you to adopt AMP for Email, and our reaction to LVFS joining the Linux Foundation. Plus Debian's generous gift, Red Hat crosses the $3B mark, and the Open Source Awards are nigh! Links:Firefox Lockbox comes to Android — Today, we are excited to bring Firefox Lockbox to Android users, a secure app that keeps people’s passwords with them wherever they go.AMP for email launched — Google today officially launched AMP for Email, its effort to turn emails from static documents into dynamic, web page-like experiencesRegister with Google to send dynamic emailsUbuntu 19.04 Beta is Now AvailableUbuntu MATE 18.04 Beta 1 for Raspberry PiUbuntu Studio to Remain Officially Recognized Ubuntu Flavour — The release of Ubuntu Studio 19.04 will remain on-course. Beta is scheduled for March 28th, Release Candidate for April 11th, and Final Release scheduled for April 18th.Red Hat crosses $3B revenue mark — Red Hat recorded revenue of US$2.9 billion for the last fiscal year which ended in February 2018.LVFS joins Linux Foundation — The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project.Handshake donates $300,000 USD to Debian — This significant financial contribution will help Debian to continue the hardware replacement plan designed by the Debian System Administrators, renewing servers and other hardware components and thus making the development and community infrastructure of the Project more reliable.UK Open Source Awards 2019 — The Awards Event will be The Informatics Forum of the University of Edinburgh and will take place on Wednesday 12 June 2019.
undefined
Mar 28, 2019 • 0sec

Emergency Condiments | User Error 62

What attracted us to Linux in the first place, planning for when tech goes away, and why we aren't surrounded by alien life. Plus a difficult culinary choice for Dan, and what we'd use instead of Linux. 00:00:33 How do you balance embracing new tech with planning for its obsolescence? 00:09:01 #AskError: Is there any food you won't eat? Even in an emergency? 00:15:56 Why did you start using Linux? 00:26:40 #AskError: If you started working at a company and could only choose Mac or Windows, which would be the less painful choice? 00:31:13 What's your take on the Fermi Paradox?
undefined
Mar 28, 2019 • 0sec

Supply Chain Attacks | TechSNAP 400

We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise. Plus an update from the linux vendor firmware service, your feedback, and more!Links:Joren Verspeurt on Twitter — The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers — The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.Malicious updates for ASUS laptops — A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.Asus Live Update Patch Now Availabile — Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups — ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.The Messy Truth About Infiltrating Computer Supply Chains — The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”Inside the Unnerving CCleaner Supply Chain Attack — Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World — ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. Gaming industry still in the scope of attackers in Asia — Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.Microsoft Security Intelligence Report Volume 24 is now available — Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.Microsoft Security Intelligence Report Volume 24Supply Chain Attacks Spiked 78 Percent in 2018Supply Chain Security: A Talk by Bunnie Huang — I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.Attack inception: Compromised supply chain within a supply chain poses new risk — The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.Supply Chain Attacks and Secure Software Updates — In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.Bad USB, Very Bad USB — The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.Reflections on Trusting Trust by Ken ThompsonLVFS Project Announcement - The Linux Foundation — The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.LVFS: Vendor StatusTwo new supply-chain attacks come to light in less than a week — Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months
undefined
Mar 28, 2019 • 0sec

Storage Changes Software | BSD Now 291

Storage changing software, what makes Unix special, what you need may be “pipeline +Unix commands”, running a bakery on Emacs and PostgreSQL, the ultimate guide to memorable tech talks, light-weight contexts, and more. ##Headlines ###Tracking a storage issue led to software change Early last year we completed a massive migration that moved our customers’ hosting data off of a legacy datacenter (that we called FR-SD2) onto several new datacenters (that we call FR-SD3, FR-SD5, and FR-SD6) with much more modern, up-to-date infrastructure. This migration required several changes in both the software and hardware we use, including switching the operating system on our storage units to FreeBSD. Currently, we use the NFS protocol to provide storage and export the filesystems on Simple Hosting, our web hosting service, and the FreeBSD kernel includes an NFS server for just this purpose. Problem While migrating virtual disks of Simple Hosting instances from FR-SD2, we noticed high CPU load spikes on the new storage units. ###What Makes Unix Special Ever since Unix burst onto the scene within the early '70s, observers within the pc world have been fast to put in writing it off as a unusual working system designed by and for knowledgeable programmers. Regardless of their proclamations, Unix refuses to die. Means again in 1985, Stewart Cheifet puzzled if Unix would turn out to be the usual working system of the longer term on the PBS present “The Laptop Chronicles,” though MS-DOS was effectively in its heyday. In 2018, it is clear that Unix actually is the usual working system, not on desktop PCs, however on smartphones and tablets. What Makes Unix Special? It is also the usual system for net servers. The actual fact is, hundreds of thousands of individuals all over the world have interacted with Linux and Unix programs daily, most of whom have by no means written a line of code of their lives. So what makes Unix so beloved by programmers and different techie sorts? Let’s check out a few of issues this working system has going for it. (For some background on Unix, try The Historical past of Unix: From Bell Labs to the iPhone.) ##News Roundup ###What you need may be “pipeline +Unix commands” only I came across Taco Bell Programming recently, and think this article is worthy to read for every software engineer. The post mentions a scenario which you may consider to use Hadoop to solve but actually xargs may be a simpler and better choice. This reminds me a similar experience: last year a client wanted me to process a data file which has 5 million records. After some investigations, no novel technologies, a concise awk script (less than 10 lines) worked like a charm! What surprised me more is that awk is just a single-thread program, no nifty concurrency involved. The IT field never lacks “new” technologies: cloud computing, big data, high concurrency, etc. However, the thinkings behind these “fancy” words may date back to the era when Unix arose. Unix command line tools are invaluable treasure. In many cases, picking the right components and using pipeline to glue them can satisfy your requirement perfectly. So spending some time in reviewing Unixcommand line manual instead of chasing state-of-the-art techniques exhaustedly, you may gain more. BTW, if your data set can be disposed by an awk script, it should not be called “big data”. Taco Bell Programming ###Running a bakery on Emacs and PostgreSQL Just over a year ago now, I finally opened the bakery I’d been dreaming of for years. It’s been a big change in my life, from spending all my time sat in front of a computer, to spending most of it making actual stuff. And stuff that makes people happy, at that. It’s been a huge change, but I can’t think of a single job change that’s ever made me as happy as this one. One of the big changes that came with going pro was that suddenly I was having to work out how much stuff I needed to mix to fill the orders I needed. On the face of it, this is really simple, just work out how much dough you need, then work out what quantities to mix to make that much dough. Easy. You can do it with a pencil and paper. Or, in traditional bakers’ fashion, by scrawling with your finger on a floured work bench. And that’s how I coped for a few weeks early on. But I kept making mistakes, which makes for an inconsistent product (bread is very forgiving, you have to work quite hard to make something that isn’t bread, but consistency matters). I needed to automate. ###The Ultimate Guide To Memorable Tech Talks Imagine this. You’re a woman in a male-dominated field. English is not your first language. Even though you’re confident in your engineering work, the thought of public speaking and being recorded for the world to see absolutely terrifies you. That was me, five years ago. Since then, I’ve moved into a successful career in Developer Advocacy and spoken at dozens of technical events in the U.S. and worldwide. I think everyone has the ability to deliver stellar conference talks, which is why I took the time to write this post. The Ultimate Guide 1: Introduction 2: Choosing a Topic 3: Writing a Conference Proposal (or CFP) 4: Tools of the Trade 5: Planning and Time Estimation 6: Writing a Talk 7: Practice and Delivery ###Light-weight Contexts: An OS Abstraction for Safety and Performance (2016) Abstract: “We introduce a new OS abstraction—light-weight con-texts (lwCs)—that provides independent units of protection, privilege, and execution state within a process. A process may include several lwCs, each with possibly different views of memory, file descriptors, and access capabilities. lwCs can be used to efficiently implement roll-back (process can return to a prior recorded state),isolated address spaces (lwCs within the process may have different views of memory, e.g., isolating sensitive data from network-facing components or isolating different user sessions), and privilege separation (in-process reference monitors can arbitrate and control access). lwCs can be implemented efficiently: the overhead of a lwC is proportional to the amount of memory exclusive to the lwC; switching lwCs is quicker than switching kernel threads within the same process. We describe the lwC abstraction and API, and an implementation of lwCs within the FreeBSD 11.0 kernel. Finally, we present an evaluation of common usage patterns, including fast roll-back, session isolation, sensitive data isolation, and in-process reference monitoring, using Apache, nginx, PHP,and OpenSSL.” ##Beastie Bits May 7th - BSD Users Stockholm Meetup #6 sysutils/docker-freebsd: Searching for people to help Cat Tax - Ever wonder what Midnight the cat was like? Fixing Unix/Linux/POSIX Filenames Metasploit on OpenBSD Run Your @wn Email Server! with NetBSD rdist(1) Writing a Book with Unix 7 Unix Commands Every Data Scientist Should Know Explaining Code using ASCII Art FreeBSD Aberdeen Hackathon FreeBSD Vienna Hackathon ##Feedback/Questions Mike - FreeBSD Update and Erased EFI files Charles - Volunteer work Jake - Bhyve Front Ends We’ve hit that point where we are running low on your questions, so if you have any questions rolling around in your head that you’ve not thought of to ask yet… send them in! Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv Your browser does not support the HTML5 video tag.
undefined
Mar 26, 2019 • 0sec

Rusty Stadia | Coder Radio 350

We debate Rust’s role as a replacement for C, and share our take on the future of gaming with Google's Stadia. Plus Objective-C's return to grace, Mike’s big bet on .NET, and more!Links:The RedMonk Programming Language Rankings: January 2019 — The idea is not to offer a statistically valid representation of current usage, but rather to correlate language discussion and usage in an effort to extract insights into potential future adoption trends. Hello .Net Foundation - dominickm.com — I am pleased to share that I have joined the .Net Foundation. Avalonia: A multi-platform .NET UI framework — Avalonia is a WPF-inspired cross-platform XAML-based UI framework providing a flexible styling system and supporting a wide range of OSs: Windows (.NET Framework, .NET Core), Linux (GTK), MacOS, Android and iOS. Google’s Stadia looks like an early beta of the future of gaming — “The future of gaming is not a box,” according to Google. “It’s a place.” Just like how humans have built stadiums for sports over hundreds of years, Google believes it’s building a virtual stadium, aptly dubbed Stadia, for the future of games to be played anywhere. Stadia — Push the envelope of game development with Stadia.Rust is not a good C replacement | Drew DeVault’s Blog — The kitchen sink approach doesn’t work. Rust will eventually fail to the “jack of all trades, master of none” problem that C++ has. Wise languages designers start small and stay small. Wise systems programmers extend this philosophy to designing entire systems, and Rust is probably not going to be invited. I understand that many people, particularly those already enamored with Rust, won’t agree with much of this article. But now you know why we are still writing C, and hopefully you’ll stop bloody bothering us about it.Introduction to Python Development at Linux Academy — This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.
undefined
Mar 26, 2019 • 0sec

Tainted Love | LINUX Unplugged 294

Why we sometimes go too far with our Linux advocacy, and a few humble strategies to switch people to Linux. Plus an update to the most important text editor in the world, the new distro causing controversy, and what is a tainted kernel. Special Guests: Brent Gervais, Ell Marquez, and Neal Gompa.Links:Could ‘alcosynth’ provide all the joy of booze – without the dangers? — David Nutt has long been developing a holy grail of molecules – also referred to as “alcarelle” – that will provide the relaxing and socially lubricating qualities of alcohol, but without the hangovers, health issues and the risk of getting paralytic.Happy 21st, curl — We estimate that there are now roughly 6 billion curl installations world-wide. In phones, computers, TVs, cars, video games etc. With 4 billion internet users, that’s like 1.5 curl installation per Internet connected human on earth.nano 4.0 has been released — An overlong line is no longer automatically hard-wrapped, smooth scrolling (one line at a time) has become the default, and more!Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers - Motherboard — The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.Malicious updates for ASUS laptops — The trojanized utility was signed with a legitimate certificate and was hosted on the official ASUS server dedicated to updates, and that allowed it to stay undetected for a long time. The criminals even made sure the file size of the malicious utility stayed the same as that of the original one.Shadow Hammer APT MAC Check — Check if your device has been targeted by the ShadowHammer cyberattackSigintOS: A Linux Distro for Signal Intelligence — SigintOS is an Ubuntu based distribution with a number of built in signal intelligence applications for software defined radios such as RTL-SDRs and other TX capable SDRs like the HackRF, bladeRF and USRP radios. SigintOS — SigintOS; as the name suggests, SIGINT is an improved Linux distribution for Signal Intelligence. This distribution is based on Ubuntu Linux. It has its own software called SigintOS. With this software, many SIGINT operations can be performed via a single graphical interface.Careers – Linux Academy — Ruby on Rails Dev? Maybe some angular love or willing to learn? Linux Academy is hiring RIGHT NOWLFNW: T-shirt preorder closes on 3/31 — While we will have some for sale on site during LFNW2019, the only way to guarantee that you get a shirt is to register for the event, and buy an Individual Sponsorship. Virtual Linux Ansible Fundamentals Study Group | Meetup — Join us before Linux Unplugged for an introduction to Ansible. Call for Proposals - DebConf19 — The DebConf Content team would like to call for proposals in the DebConf 19 conference, which will take place in Curitiba, Brazil, between July 21th and 28th. Fedora 29 Wifi Warning BugTainted kernels — The Linux Kernel documentation — The primary reason for the ‘Tainted: ‘ string is to tell kernel debuggers if this is a clean kernel or if anything unusual has occurred. What is a tainted kernel in Linux? — The feature is intended to identify conditions which may make it difficult to properly troubleshoot a kernel problem. For example, the loading of a proprietary module can make kernel debug output unreliable because kernel developers don't have access to the module's source code and therefore cannot determine what the module may have done to the kernel. Likewise, if the kernel had previously experienced an error condition or if a serious hardware error had occurred, the debug information generated by the kernel may not be reliable.Install Fests - Free Software Foundation — My new idea is that the install fest could allow the devil to hang around, off in a corner of the hall, or the next room. (Actually, a human being wearing sign saying “The Devil,” and maybe a toy mask or horns.) The devil would offer to install nonfree drivers in the user's machine to make more parts of the computer function, explaining to the user that the cost of this is using a nonfree (unjust) program.NexDock 2 by Nex Computer — Kickstarter — Turn your Smartphone or Pi into a laptop.
undefined
Mar 24, 2019 • 0sec

Linux Action News 98

Is Linux gaming really being saved by Google's Stadia platform? We discuss the details and possibilities. Plus good news for KDE Connect users, Intel begins work on next-generation open source video drivers, and much more.Links:Google launches game streaming service called Stadia — Google CEO: "We're building a game platform for everyone."Killed by Google - The Google Graveyard & CemeteryHow OpenXR could glue virtual reality’s fragmenting market together — “OpenXR since the beginning has had a lot of positive energy and urgency," Trevett continued. “I think people kind of realize everyone can benefit. Obviously it's not going to be magic, but I think it can make a difference, because everyone wins."Intel Xe Graphics Being Part Of The First US Exascale Supercomputer Is Great For Linux — With Aurora expected to run Linux, this means the Linux driver support for Xe Graphics will have to be up to par by 2021. Albert Vaca Cintora on Twitter — "KDE Connect has been removed from @GooglePlay for violating their new policy on apps that access SMS [1]. The policy has an explicit exception for companion apps (like KDE Connect), but it was removed anyway and there's no way to talk to Google."Albert Vaca Cintora on Twitter — "To close this thread, I want to say that KDE Connect finally got approved, and SMS support is back in version 1.12.4, both on the Play Store and F-Droid! Thanks everyone who spread the voice (this thread got half a million impressions on Twitter!) and helped make it happen :D… https://t.co/OTLY5KJdI6"Android Developers Blog: Providing a safe and secure experience for our usersGoogle forced into Android browser choice — Now we’ll also do more to ensure that Android phone owners know about the wide choice of browsers and search engines available to download to their phones. This will involve asking users of existing and new Android devices in Europe which browser and search apps they would like to use.Antitrust: Commission fines Google €1.49 billion — Antitrust: Commission fines Google €1.49 billion for abusive practices in online advertisingEC fines Google €1.49bn for abusing ad market dominanceGoogle now pays more in EU fines than it does in taxes
undefined
Mar 21, 2019 • 0sec

Timestamped Notes | BSD Now 290

FreeBSD on Cavium ThunderX, looking at NetBSD as an OpenBSD user, taking time-stamped notes in vim, OpenBSD 6.5 has been tagged, FreeBSD and NetBSD in GSoC 2019, SecBSD: an UNIX-like OS for Hackers, and more. ##Headlines ###ARM’d and dangerous: FreeBSD on Cavium ThunderX (aarch64) While I don’t remember for how many years I’ve had an interest in CPU architectures that could be an alternative to AMD64, I know pretty well when I started proposing to test 64-bit ARM at work. It was shortly after the disaster named Spectre / Meltdown that I first dug out server-class ARM hardware and asked whether we should get one such server and run some tests with it. While the answer wasn’t a clear “no” it also wasn’t exactly “yes”. I tried again a few times over the course of 2018 and each time I presented some more points why I thought it might be a good thing to test this. But still I wasn’t able to get a positive answer. Finally in January 2019 year I got a definitive answer – and it was “yes, go ahead”! The fact that Amazon had just presented their Graviton ARM Processor may have helped the decision. ###Looking at NetBSD from an OpenBSD user perspective I use to use NetBSD quite a lot. From 2.0 to 6.99. But for some reasons, I stopped using it about 2012, in favor of OpenBSD. Reading on the new 8 release, I wanted to see if all the things I didn’t like on NetBSD were gone. Here is a personal Pros / Cons list. No Troll, hopefully. Just trying to be objective. What I liked (pros) Things I didn’t like (cons) Conclusion So that was it. I didn’t spend more than 30 minutes of it. But I didn’t want to spend more time on it. I did stop using NetBSD because of the need to compile each and every packages ; it was in the early days of pkgin. I also didn’t like the way system maintenance was to be done. OpenBSD’s 6-months release seemed far more easy to manage. I still think NetBSD is a great OS. But I believe you have to spent more time on it than you would have to do with OpenBSD. That said, I’ll keep using my Puffy OS. ##News Roundup ###Using Vim to take time-stamped notes I frequently find myself needing to take time-stamped notes. Specifically, I’ll be in a call, meeting, or interview and need to take notes that show how long it’s been since the meeting started. My first thought was that there’s be a plugin to add time stamps, but a quick search didn’t turn anything up. However, I little digging did turn up the fact that vim has the built-in ability to tell time. This means that writing a bit of vimscript to insert a time stamp is pretty easy. After a bit of fiddling, I came up with something that serves my needs, and I decided it might be useful enough to others to be worth sharing. John Baldwin’s notes on bhyve meetings ###OpenBSD 6.5-beta has been tagged It’s that time of year again; Theo (deraadt@) has just tagged 6.5-beta. A good reminder for us all run an extra test install and see if your favorite port still works as you expect. CVSROOT: /cvs Module name: src Changes by: deraadt@cvs.openbsd.org 2019/02/26 15:24:41 Modified files: etc/root : root.mail share/mk : sys.mk sys/conf : newvers.sh sys/sys : ktrace.h param.h usr.bin/signify: signify.1 sys/arch/macppc/stand/tbxidata: bsd.tbxi Log message: crank to 6.5-beta ###The NetBSD Foundation participating in Google Summer of Code 2019 For the 4th year in a row and for the 13th time The NetBSD Foundation will participate in Google Summer of Code 2019! If you are a student and would like to learn more about Google Summer of Code please go to the Google Summer of Code homepage. You can find a list of projects in Google Summer of Code project proposals in the wiki. Do not hesitate to get in touch with us via #netbsd-code IRC channel on Freenode and via NetBSD mailing lists! ###SecBSD: an UNIX-like OS for Hackers SecBSD is an UNIX-like operating system focused on computer security based on OpenBSD. Designed for security testing, hacking and vulnerability assessment, it uses full disk encryption and ProtonVPN + OpenVPN by default. A security BSD enviroment for security researchers, penetration testers, bug hunters and cybersecurity experts. Developed by Dark Intelligence Team for private use and will be public release coming soon. ##Beastie Bits Why OpenBSD Rocks Rich’s sh (POSIX shell) tricks Drinking coffee with AWK Civilisational HTTP Error Codes MidnightBSD Roadmap NetBSD on Nintendo64 From Vimperator to Tridactyl ##Feedback/Questions Russell - BSD Now Question :: ZFS & FreeNAS Alan - Tutorial, install ARM *BSD with no other BSD box pls Johnny - New section to add to the show Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv Your browser does not support the HTML5 video tag.
undefined
Mar 20, 2019 • 0sec

Linux Gaming Report and Purism Librem 15 | Choose Linux 5

Jason goes deeper down the rabbit hole by exploring the state of Steam gaming on 9 different Linux distributions. Find out how Fedora compares to Pop!_OS. Plus, first impressions of Purism’s brand new Librem 15 v4 laptop.Links:Linux Gaming: Usability And Performance Across 9 DistrosFedora 29 Linux Gaming ReportPop OS 18.10 Linux Gaming ReportLibrem 15
undefined
Mar 19, 2019 • 0sec

Netflix's Gift to Linux | LINUX Unplugged 293

Developers at Netflix are creating the next set of super powers for Linux, we'll get the details straight from the source. Plus some good Debian news, our tips for better battery life, and we play a little Hot SUSE Potato. Special Guests: Brent Gervais and Ell Marquez.Links:Google Stadia announced, a game streaming service for Chrome, Android, and TVs — Powered by Linux, it supports the Vulkan graphics API and Google partnered with Unreal to fully support the Stadia platform. Chris on Instagram — We found a great spot to work for the day, great signal. Just one problem. We sorta got taken hostage for a few hours. Debian Project Leader Elections 2019: Candidates — We're now into the campaigning period. We have 5 candidates.Linux Laptop Battery Optimization Tool TLP 1.2 Released — TLP 1.2 was released today after being in development for more than a year, and it brings support for NVMe, and removable drives like USB and IEEE1394 devices, support for multi queue I/O schedulers (blk-mq), and other significant enhancements.TLP – ConfigurationSuse is once again an independent company — Few companies have changed hands as often as Suse and yet remained strong players in their business. Suse was first acquired by Novell in 2004. Novell was then acquired by Attachmate in 2010, which Micro Focus acquired in 2014. The company then turned Suse into an independent division, only to then announce its sale to EQT in the middle of 2018.SUSE is now an independent company after being acquired by EQT for $2.5 billion | Packt Hub — As the company has been owned by EQT, so according to few users it’s still not independent. One of the users commented on HackerNews, “Being owned by a Private Equity fund can really not be described as being “independent”. MATE 1.22 released — Wanda the Fish now works properly on HiDPI displaysAlbert Vaca Cintora on Twitter — KDE Connect has been removed from @GooglePlay for violating their new policy on apps that access SMS. The policy has an explicit exception for companion apps (like KDE Connect), but it was removed anyway and there's no way to talk to GoogleUse of SMS or Call Log permission groups - Play Console HelpFull-system dynamic tracing on Linux using eBPF and bpftrace — What if you want to trace what happens inside a system call or library call? What if you want to do more than just logging calls, e.g. you want to compile statistics on certain behavior? What if you want to trace multiple processes and correlate data from multiple sources? In 2019, there's finally a decent answer to that on Linux: bpftrace, based on eBPF technology.Learn eBPF Tracing: Tutorial and Examples — eBPF can be used for many things: network performance, firewalls, security, tracing, device drivers, and more!IO Visor Project — The IO Visor Project is an open source project and a community of developers to accelerate the innovation, development, and sharing of virtualized in-kernel IO services for tracing, analytics, monitoring, security and networking functions. It builds on the Linux community to bring open, flexible, distributed, secure and easy to operate technologies that enable any stack to run efficiently on any physical infrastructure.IO Visor Project on GitHub — Organization that hosts the repos for bpftrace, bcc, and other tools.BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more — BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples. bpftrace: High-level tracing language for Linux eBPFInstall bpftrace for Linux using the Snap StoreBCC Tool Diagram — Diagram that breaks down useful tools in BCCeBPF Perf Tools 2019: SlideseBPF Perf Tools 2019: Video

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app