"The tiny single-board PC movement that's leading the Internet of
Things (IoT) market is largely dominated by ARM-based processors, and
for good reason — they're cheap, low power and capable. However, what
if you prefer to work with the x86 architecture? JaguarBoard looks
strikingly similar to Raspberry Pi, which is arguably the most popular
single-board mini PC. But unlike Raspberry Pi, JaguarBoard allows
users to develop for x86, courtesy of its Intel Atom Z3735G (Bay
Trail) foundation. The chip is a quad-core part clocked at 1.33GHz to
1.83GHz with 2MB of L2 cache, offering a fair amount of horsepower for
IoT applications. In addition to an Atom processor, JaguarBoard also
boasts 1GB of DDR3L memory, 16GB of eMMC storage, three USB 2.0 ports,
10/100M LAN port, HDMI 1.4 output, SDIO 3.0 socket, two COM ports,
four GPIO pins, and audio ports. It's an interesting device that you
could use strictly as a mini PC for general purpose computing, as an
embedded system, a learning or research tool, or for whatever DIY
projects you can conjure up."
-- source: http://hardware.slashdot.org/story/16/01/24/1729241
Cheers, Peter
--
Peter Reutemann
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174
http://www.cms.waikato.ac.nz/~fracpete/http://www.data-mining.co.nz/
Customers don’t understand and don’t care about the security of the
devices they put online. And vendors are in no hurry to enlighten them,
if it adds to costs and cuts profits.
If anybody is in a position to intervene, it has to be a Government
authority.
<http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-thing…>
Came across this
<http://www.phoronix.com/forums/forum/phoronix/latest-phoronix-articles/8468…>
rather informative posting about different filesystems for
cross-platform use. One interesting possibility is UDF (“Universal Disk
Format”), which is how DVDs are usually formatted. It turns out it is
useful not just for read-only media but read/write as well. There is
widespread built-in support for it on Linux, OS X and Windows, albeit
with some limitations in the proprietary OSes (as usual).
It can even work on flash drives, though there may be some issues with
the hardware layout being optimized for FAT32 or other antiquated
filesystems.
Alternatively, the article mentions a number of choices for accessing
Linux filesystems on Windows:
<http://www.fs-driver.org/>
<http://uranus.chrysocome.net/linux/ext2ifs.htm>
<http://www.diskinternals.com/linux-reader/>
<http://www.chrysocome.net/virtualvolumes>
Disclaimer: I haven’t tried any of these.
I was looking for some options to tweak scaling and positioning of
images printed with the CUPS “lp” command. This page
<http://www.cups.org/documentation.php/doc-1.5/options.html> lists
various keywords that can be used with the “-o” option, in particular
“natural-scaling”, “ppi” and “position”. You’ll notice that section has
a large banner at the top saying “Not Supported on Mac OS X”. Which is
slightly ironic, given that CUPS is owned by Apple.
Anyway, the description of those options has disappeared from versions
of that page for CUPS 1.6 and later, e.g.
<http://www.cups.org/documentation.php/doc-1.6/options.html>,
<http://www.cups.org/documentation.php/doc-2.1/options.html>. This even
though I have CUPS 2.1.2 on my system, and the “position” option, for
example, does seem to do something.
'Fedora contributor and NetworkManager developer Lubomir Rintel
explains how your devices are being identified on a network by a
unique number that most of us know by the name of MAC address. Same
goes for mobile networking, as your laptop's or mobile phone's MAC
address is, in most cases, broadcasted everywhere you go before you
even attempt a connection to a wireless network. And that's a problem
for your privacy. The solution? Randomization of the MAC address while
scanning for Wi-Fi networks. Apple is already using this method on iOS
8 and later mobile operating systems, and so is Microsoft in Windows
10, so Linux users will ["likely"] get it in the upcoming
NetworkManager 1.2 release.'
-- source: http://tech.slashdot.org/story/16/01/19/1345210
Cheers, Peter
--
Peter Reutemann
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174
http://www.cms.waikato.ac.nz/~fracpete/http://www.data-mining.co.nz/
<http://arstechnica.com/gadgets/2016/01/numbers-dont-lie-its-time-to-build-y…>:
A lot of you are probably muttering, "right, pfSense, sure." Some
of you might even be thinking about smoothwall or untangle NG. I
played with most of the firewall distros out there, but I decided
to go more basic, more old school: a plain, CLI-only install of
Ubuntu Server and a few iptables rules.
His benchmarks show his homebrew router handily beating off-the-shelf
products in wired performance. In wireless performance, however, he
feels available PC cards are way behind what dedicated router boxes
can do.
"A patch for a critical Linux kernel flaw, present in the code since
2012, is expected to be pushed out today. The vulnerability affects
versions 3.8 and higher, said researchers at startup Perception Point
who discovered the vulnerability. The flaw also extends to two-thirds
of Android devices, the company added. An attacker would require local
access to exploit the vulnerability on a Linux server. A malicious
mobile app would get the job done on an Android device. The
vulnerability is a reference leak that lives in the keyring facility
built into the various flavors of Linux. The keyring encrypts and
stores login information, encryption keys and certificates, and makes
them available to applications."
-- source: http://linux.slashdot.org/story/16/01/19/1326212
Cheers, Peter
--
Peter Reutemann
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174
http://www.cms.waikato.ac.nz/~fracpete/http://www.data-mining.co.nz/
Neil Brown, the guy who has been mostly responsible for the software
RAID subsystem on Linux since he created it over a decade and a half
ago, has decided to hand over the reins
<http://phoronix.com/scan.php?page=news_item&px=Neil-Brown-Last-MD>.
No drama involved, he just seems to have lost interest.
"As you might know, Fedora and many other GNU/Linux distributions
require users to do an incremental upgrade when attempting to move
from an older version of the operating system to the most recent one.
For example, if you want to upgrade from Fedora 21 to Fedora 23, you
will have first to upgrade to Fedora 22. Lately, Fedora upgrades have
become more stable and reliable, mostly because of some brand-new
technologies, such as the DNF package manger. Fedora's Adam Williamson
theorizes about an innovative method that might support official
upgrade of the Fedora Linux operating system across two releases in
the future."
-- source: http://linux.slashdot.org/story/16/01/16/2156219
Cheers, Peter
--
Peter Reutemann
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 858-5174
http://www.cms.waikato.ac.nz/~fracpete/http://www.data-mining.co.nz/