operatingsystem:microsoft windows

  • How to Enable DNS-over-HTTPS (DoH) in Mozilla Firefox
    https://www.trishtech.com/2018/08/how-to-enable-dns-over-https-doh-in-mozilla-firefox

    How to Enable DNS-over-HTTPS (DoH) in Mozilla Firefox

    Posted onAugust 8, 2018AuthorTrishaLeave a comment

    When you visit a website, the web browser first translates the domain name (such as yahoo.com) to the IP address using the DNS server configured in your operating system. We actually offer a free tool Public DNS Server Tool that helps you quickly configure your Windows system to use one of the publicly available DNS servers.

    But now Firefox browser (starting from version 62) has come up with a new feature called Trusted Recursive Resolver (TRR) which sets Firefox to use a secure DNS server of its own. For this feature, all the DNS resolution requests are sent over HTTPS and this is why only a DNS over HTTPS (DoH) complaint server can be used for this feature.

    Here is how you can enable DoH in Firefox browser:

    Type about:config in the address bar and press Enter.
    When warning appears, click on the I accept the risk button.
    In the search box type trr to find the settings we want.

    #dns #DoH #dnsoverhttps #https

  • WireGuard : fast, modern, secure VPN tunnel
    https://www.wireguard.com
    Pour l’instant c’est en développement, there be dragons.

    WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry.

  • Adversarial Interoperability: Reviving an Elegant Weapon From a More Civilized Age to Slay Today’s Monopolies | Electronic Frontier Foundation
    https://www.eff.org/deeplinks/2019/06/adversarial-interoperability-reviving-elegant-weapon-more-civilized-age-slay

    Voici ce que le mouvement pour le logiciel libre peut apprendre des tactiques des concurrents de Microsoft - si vous ne pouvez pas gagner contre les géants, profitez d’eux.

    Today, Apple is one of the largest, most profitable companies on Earth, but in the early 2000s, the company was fighting for its life. Microsoft’s Windows operating system was ascendant, and Microsoft leveraged its dominance to ensure that every Windows user relied on its Microsoft Office suite (Word, Excel, Powerpoint, etc). Apple users—a small minority of computer users—who wanted to exchange documents with the much larger world of Windows users were dependent on Microsoft’s Office for the Macintosh operating system (which worked inconsistently with Windows Office documents, with unexpected behaviors like corrupting documents so they were no longer readable, or partially/incorrectly displaying parts of exchanged documents). Alternatively, Apple users could ask Windows users to export their Office documents to an “interoperable” file format like Rich Text Format (for text), or Comma-Separated Values (for spreadsheets). These, too, were inconsistent and error-prone, interpreted in different ways by different programs on both Mac and Windows systems.

    Apple could have begged Microsoft to improve its Macintosh offerings, or they could have begged the company to standardize its flagship products at a standards body like OASIS or ISO. But Microsoft had little motive to do such a thing: its Office products were a tremendous competitive advantage, and despite the fact that Apple was too small to be a real threat, Microsoft had a well-deserved reputation for going to enormous lengths to snuff out potential competitors, including both Macintosh computers and computers running the GNU/Linux operating system.

    Apple did not rely on Microsoft’s goodwill and generosity: instead, it relied on reverse-engineering. After its 2002 “Switch” ad campaign—which begged potential Apple customers to ignore the “myths” about how hard it was to integrate Macs into Windows workflows—it intensified work on its iWork productivity suite, which launched in 2005, incorporating a word-processor (Pages), a spreadsheet (Numbers) and a presentation program (Keynote). These were feature-rich applications in their own right, with many innovations that leapfrogged the incumbent Microsoft tools, but this superiority would still not have been sufficient to ensure the adoption of iWork, because the world’s greatest spreadsheets are of no use if everyone you need to work with can’t open them.

    What made iWork a success—and helped re-launch Apple—was the fact that Pages could open and save most Word files; Numbers could open and save most Excel files; and Keynote could open and save most PowerPoint presentations. Apple did not attain this compatibility through Microsoft’s cooperation: it attained it despite Microsoft’s noncooperation. Apple didn’t just make an “interoperable” product that worked with an existing product in the market: they made an adversarially interoperable product whose compatibility was wrested from the incumbent, through diligent reverse-engineering and reimplementation. What’s more, Apple committed to maintaining that interoperability, even though Microsoft continued to update its products in ways that temporarily undermined the ability of Apple customers to exchange documents with Microsoft customers, paying engineers to unbreak everything that Microsoft’s maneuvers broke. Apple’s persistence paid off: over time, Microsoft’s customers became dependent on compatibility with Apple customers, and they would complain if Microsoft changed its Office products in ways that broke their cross-platform workflow.

    Since Pages’ launch, document interoperability has stabilized, with multiple parties entering the market, including Google’s cloud-based Docs offerings, and the free/open alternatives from LibreOffice. The convergence on this standard was not undertaken with the blessing of the dominant player: rather, it came about despite Microsoft’s opposition. Docs are not just interoperable, they’re adversarially interoperable: each has its own file format, but each can read Microsoft’s file format.

    The document wars are just one of many key junctures in which adversarial interoperability made a dominant player vulnerable to new entrants:

    Hayes modems
    Usenet’s alt.* hierarchy
    Supercard’s compatibility with Hypercard
    Search engines’ web-crawlers
    Servers of every kind, which routinely impersonate PCs, printers, and other devices

    Scratch the surface of most Big Tech giants and you’ll find an adversarial interoperability story: Facebook grew by making a tool that let its users stay in touch with MySpace users; Google products from search to Docs and beyond depend on adversarial interoperability layers; Amazon’s cloud is full of virtual machines pretending to be discrete CPUs, impersonating real computers so well that the programs running within them have no idea that they’re trapped in the Matrix.

    Adversarial interoperability converts market dominance from an unassailable asset to a liability. Once Facebook could give new users the ability to stay in touch with MySpace friends, then every message those Facebook users sent back to MySpace—with a footer advertising Facebook’s superiority—became a recruiting tool for more Facebook users. MySpace served Facebook as a reservoir of conveniently organized potential users that could be easily reached with a compelling pitch about why they should switch.

    Today, Facebook is posting 30-54% annual year-on-year revenue growth and boasts 2.3 billion users, many of whom are deeply unhappy with the service, but who are stuck within its confines because their friends are there (and vice-versa).

    A company making billions and growing by double-digits with 2.3 billion unhappy customers should be every investor’s white whale, but instead, Facebook and its associated businesses are known as “the kill zone” in investment circles.

    Facebook’s advantage is in “network effects”: the idea that Facebook increases in value with every user who joins it (because more users increase the likelihood that the person you’re looking for is on Facebook). But adversarial interoperability could allow new market entrants to arrogate those network effects to themselves, by allowing their users to remain in contact with Facebook friends even after they’ve left Facebook.

    This kind of adversarial interoperability goes beyond the sort of thing envisioned by “data portability,” which usually refers to tools that allow users to make a one-off export of all their data, which they can take with them to rival services. Data portability is important, but it is no substitute for the ability to have ongoing access to a service that you’re in the process of migrating away from.

    Big Tech platforms leverage both their users’ behavioral data and the ability to lock their users into “walled gardens” to drive incredible growth and profits. The customers for these systems are treated as though they have entered into a negotiated contract with the companies, trading privacy for service, or vendor lock-in for some kind of subsidy or convenience. And when Big Tech lobbies against privacy regulations and anti-walled-garden measures like Right to Repair legislation, they say that their customers negotiated a deal in which they surrendered their personal information to be plundered and sold, or their freedom to buy service and parts on the open market.

    But it’s obvious that no such negotiation has taken place. Your browser invisibly and silently hemorrhages your personal information as you move about the web; you paid for your phone or printer and should have the right to decide whose ink or apps go into them.

    Adversarial interoperability is the consumer’s bargaining chip in these coercive “negotiations.” More than a quarter of Internet users have installed ad-blockers, making it the biggest consumer revolt in human history. These users are making counteroffers: the platforms say, “We want all of your data in exchange for this service,” and their users say, “How about none?” Now we have a negotiation!

    Or think of the iPhone owners who patronize independent service centers instead of using Apple’s service: Apple’s opening bid is “You only ever get your stuff fixed from us, at a price we set,” and the owners of Apple devices say, “Hard pass.” Now it’s up to Apple to make a counteroffer. We’ll know it’s a fair one if iPhone owners decide to patronize Apple’s service centers.

    This is what a competitive market looks like. In the absence of competitive offerings from rival firms, consumers make counteroffers by other means.

    There is good reason to want to see a reinvigorated approach to competition in America, but it’s important to remember that competition is enabled or constrained not just by mergers and acquisitions. Companies can use a whole package of laws to attain and maintain dominance, to the detriment of the public interest.

    Today, consumers and toolsmiths confront a thicket of laws and rules that stand between them and technological self-determination. To change that, we need to reform the Computer Fraud and Abuse Act, Section 1201 of the Digital Millennium Copyright Act, , patent law, and other rules and laws. Adversarial interoperability is in the history of every tech giant that rules today, and if it was good enough for them in the past, it’s good enough for the companies that will topple them in the future.

    #adversarial_Interoperability #logiciel_libre #disruption

    • lien propre :

      https://www.zdnet.com/article/russian-military-moves-closer-to-replacing-windows-with-astra-linux

      [...]

      RusBITech initially developed the OS for use in the Russian private market, but the company also expanded into the local government sector, where it became very popular with military contractors.

      A few years back, the OS received certifications to handle Russian government information labeled as “secret” and “top secret” —two data secrecy levels situated underneath “special importance” according to Russian law.

      Since then, Astra Linux has slowly made its way into government agencies and is currently in use at the Russian National Center for Defence Control, among various other government and military agencies.
      Already used by the Russian military

      In January 2018, the Russian Ministry of Defence announced plans to transfer military systems from the Windows OS to Astra Linux, citing fears that Microsoft’s closed-source approach might hide Windows backdoors that can be abused by US intelligence to spy on Russian government operations.

      Since then, RusBITech has been going through the Russian government’s certification process to get a “special importance” classification for Astra Linux — which it did, on April 17, according to two local media reports.

      In addition to the FSTEC certification, Astra Linux also received certificates of conformity from the FSB, Russia’s top intelligence agency, and the Ministry of Defense, opening the door for full adoption by Russia’s top military and intelligence agencies.

      The certification was granted for Astra Linux Special Edition version 1.6, also known as the Smolensk release, per local reports. This is a commercial (paid) release.

      The news comes after earlier this week it was reported that the Chinese military was taking similar steps to replace the Windows OS on military systems amid fears of US hacking. The Chinese military didn’t go for a Linux distro but instead alluded to plans of developing a custom OS instead.

      [finis]

      #Russie #sécurité #militaire #défense #Debian #Linux #Windows

      #Chine #États-unis

    • lien propre:

      Glen Greenwald, Micah Lee - 20190412

      https://theintercept.com/2019/04/11/the-u-s-governments-indictment-of-julian-assange-poses-grave-threats-t

      In April, 2017, Pompeo, while still CIA chief, delivered a deranged speech proclaiming that “we have to recognize that we can no longer allow Assange and his colleagues the latitude to use free speech values against us.” He punctuated his speech with this threat: “To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.”

      From the start, the Trump DOJ has made no secret of its desire to criminalize journalism generally. Early in the Trump administration, Sessions explicitly discussed the possibility of prosecuting journalists for publishing classified information. Trump and his key aides were open about how eager they were to build on, and escalate, the Obama administration’s progress in enabling journalism in the U.S. to be criminalized.

      Today’s arrest of Assange is clearly the culmination of a two-year effort by the U.S. government to coerce Ecuador — under its new and submissive president, Lenín Moreno — to withdraw the asylum protection it extended to Assange in 2012. Rescinding Assange’s asylum would enable the U.K. to arrest Assange on minor bail-jumping charges pending in London and, far more significantly, to rely on an extradition request from the U.S. government to send him to a country to which he has no connection (the U.S.) to stand trial relating to leaked documents.

      Indeed, the Trump administration’s motive here is clear. With Ecuador withdrawing its asylum protection and subserviently allowing the U.K. to enter its own embassy to arrest Assange, Assange faced no charges other than a minor bail-jumping charge in the U.K. (Sweden closed its sexual assault investigation not because they concluded Assange was innocent, but because they spent years unsuccessfully trying to extradite him). By indicting Assange and demanding his extradition, it ensures that Assange — once he serves his time in a London jail for bail-jumping — will be kept in a British prison for the full year or longer that it takes for the U.S. extradition request, which Assange will certainly contest, to wind its way through the British courts.

      The indictment tries to cast itself as charging Assange not with journalistic activities but with criminal hacking. But it is a thinly disguised pretext for prosecuting Assange for publishing the U.S. government’s secret documents while pretending to make it about something else.

      Whatever else is true about the indictment, substantial parts of the document explicitly characterize as criminal exactly the actions that journalists routinely engage in with their sources and thus, constitutes a dangerous attempt to criminalize investigative journalism.

      The indictment, for instance, places great emphasis on Assange’s alleged encouragement that Manning — after she already turned over hundreds of thousands of classified documents — try to get more documents for WikiLeaks to publish. The indictment claims that “discussions also reflect Assange actively encouraging Manning to provide more information. During an exchange, Manning told Assange that ‘after this upload, that’s all I really have got left.’ To which Assange replied, ‘curious eyes never run dry in my experience.’”

      But encouraging sources to obtain more information is something journalists do routinely. Indeed, it would be a breach of one’s journalistic duties not to ask vital sources with access to classified information if they could provide even more information so as to allow more complete reporting. If a source comes to a journalist with information, it is entirely common and expected that the journalist would reply: Can you also get me X, Y, and Z to complete the story or to make it better? As Edward Snowden said this morning, “Bob Woodward stated publicly he would have advised me to remain in place and act as a mole.”

      Investigative journalism in many, if not most, cases, entails a constant back and forth between journalist and source in which the journalist tries to induce the source to provide more classified information, even if doing so is illegal. To include such “encouragement” as part of a criminal indictment — as the Trump DOJ did today — is to criminalize the crux of investigative journalism itself, even if the indictment includes other activities you believe fall outside the scope of journalism.

      As Northwestern journalism professor Dan Kennedy explained in The Guardian in 2010 when denouncing as a press freedom threat the Obama DOJ’s attempts to indict Assange based on the theory that he did more than passively receive and publish documents — i.e., that he actively “colluded” with Manning:


      The problem is that there is no meaningful distinction to be made. How did the Guardian, equally, not “collude” with WikiLeaks in obtaining the cables? How did the New York Times not “collude” with the Guardian when the Guardian gave the Times a copy following Assange’s decision to cut the Times out of the latest document dump?

      For that matter, I don’t see how any news organisation can be said not to have colluded with a source when it receives leaked documents. Didn’t the Times collude with Daniel Ellsberg when it received the Pentagon Papers from him? Yes, there are differences. Ellsberg had finished making copies long before he began working with the Times, whereas Assange may have goaded Manning. But does that really matter?

      Most of the reports about the Assange indictment today have falsely suggested that the Trump DOJ discovered some sort of new evidence that proved Assange tried to help Manning hack through a password in order to use a different username to download documents. Aside from the fact that those attempts failed, none of this is new: As the last five paragraphs of this 2011 Politico story demonstrate, that Assange talked to Manning about ways to use a different username so as to avoid detection was part of Manning’s trial and was long known to the Obama DOJ when they decided not to prosecute.

      There are only two new events that explain today’s indictment of Assange: 1) The Trump administration from the start included authoritarian extremists such as Sessions and Pompeo who do not care in the slightest about press freedom and were determined to criminalize journalism against the U.S., and 2) With Ecuador about to withdraw its asylum protection, the U.S. government needed an excuse to prevent Assange from walking free.

      A technical analysis of the indictment’s claims similarly proves the charge against Assange to be a serious threat to First Amendment press liberties, primarily because it seeks to criminalize what is actually a journalist’s core duty: helping one’s source avoid detection. The indictment deceitfully seeks to cast Assange’s efforts to help Manning maintain her anonymity as some sort of sinister hacking attack.

      The Defense Department computer that Manning used to download the documents which she then furnished to WikiLeaks was likely running the Windows operating system. It had multiple user accounts on it, including an account to which Manning had legitimate access. Each account is protected by a password, and Windows computers store a file that contains a list of usernames and password “hashes,” or scrambled versions of the passwords. Only accounts designated as “administrator,” a designation Manning’s account lacked, have permission to access this file.

      The indictment suggests that Manning, in order to access this password file, powered off her computer and then powered it back on, this time booting to a CD running the Linux operating system. From within Linux, she allegedly accessed this file full of password hashes. The indictment alleges that Assange agreed to try to crack one of these password hashes, which, if successful, would recover the original password. With the original password, Manning would be able to log directly into that other user’s account, which — as the indictment puts it — “would have made it more difficult for investigators to identify Manning as the source of disclosures of classified information.”

      Assange appears to have been unsuccessful in cracking the password. The indictment alleges that “Assange indicated that he had been trying to crack the password by stating that he had ‘no luck so far.’”

      Thus, even if one accepts all of the indictment’s claims as true, Assange was not trying to hack into new document files to which Manning had no access, but rather trying to help Manning avoid detection as a source. For that reason, the precedent that this case would set would be a devastating blow to investigative journalists and press freedom everywhere.

      Journalists have an ethical obligation to take steps to protect their sources from retaliation, which sometimes includes granting them anonymity and employing technical measures to help ensure that their identity is not discovered. When journalists take source protection seriously, they strip metadata and redact information from documents before publishing them if that information could have been used to identify their source; they host cloud-based systems such as SecureDrop, now employed by dozens of major newsrooms around the world, that make it easier and safer for whistleblowers, who may be under surveillance, to send messages and classified documents to journalists without their employers knowing; and they use secure communication tools like Signal and set them to automatically delete messages.

      But today’s indictment of Assange seeks to criminalize exactly these types of source-protection efforts, as it states that “it was part of the conspiracy that Assange and Manning used a special folder on a cloud drop box of WikiLeaks to transmit classified records containing information related to the national defense of the United States.”

      The indictment, in numerous other passages, plainly conflates standard newsroom best practices with a criminal conspiracy. It states, for instance, that “it was part of the conspiracy that Assange and Manning used the ‘Jabber’ online chat service to collaborate on the acquisition and dissemination of the classified records, and to enter into the agreement to crack the password […].” There is no question that using Jabber, or any other encrypted messaging system, to communicate with sources and acquire documents with the intent to publish them, is a completely lawful and standard part of modern investigative journalism. Newsrooms across the world now use similar technologies to communicate securely with their sources and to help their sources avoid detection by the government.

      The indictment similarly alleges that “it was part of the conspiracy that Assange and Manning took measures to conceal Manning as the source of the disclosure of classified records to WikiLeaks, including by removing usernames from the disclosed information and deleting chat logs between Assange and Manning.”

  • Boost 1.70.0 released
    http://isocpp.org/feeder/?FeederAction=clicked&feed=All+Posts&seed=http%3A%2F%2Fisocpp.org%2Fblog%2F2

    Check it out:

    Boost 1.70.0 released

    From the release notes:

    New Libraries​ Outcome: A set of tools for reporting and handling function failures in contexts where directly using C++ exception handling is unsuitable, from Niall Douglas. Histogram: Fast and extensible multi-dimensional histograms with convenient interface for C++14, from Hans Dembinski. Updated Libraries​ Asio: Fixed a Windows-specific memory leak that may occur when system_executor is used. Improved dispatch, post and defer documentation. Fixed compile errors that occur when using the composed read and write operations with MSVC 11.0. Fixed a macOS-specific warning about the deprecation of OSMemoryBarrier. Changed composed asynchronous read and write (...)

    #News,_Product_News,

  • How Artificial Intelligence Is Going To Change Our Lives
    https://hackernoon.com/how-artificial-intelligence-is-going-to-change-our-lives-48458706f6a?sou

    You are most probably reading this article on a smartphone or a computer. When you ask the time by just saying “what’s the time” to Siri on iPhone or to Google Assistant on Android or Cortana on Windows, you are using artificial intelligence. In the last ten years, improvements in artificial intelligence have been quite significant. But more are coming.What is Artificial Intelligence?If human thinking and thoughts can be introduced in a computer or computer-like devices, then it is called #ai or Artificial Intelligence. If you have seen science fiction movies or read novels, then you know about that. An artificial intelligent agent is a system that can perceive its environment and by that, it can take actions for maximizing its chances of success.Today, artificial intelligence is known as (...)

    #technology #artificial-intelligence #future-technology #ai-applications

  • ML.NET: Machine Learning framework by Microsoft for .NET developers
    https://hackernoon.com/ml-net-machine-learning-framework-by-microsoft-for-net-developers-3c6f46

    ML.NET: Machine Learning framework by Microsoft for .NET developersWhenever you think of data science and machine learning, the only two programming languages that pop up on your mind are Python and R. But, the question arises, what if the developer has knowledge of other languages than these?We have a solution in the form of Microsoft’s recently introduced build 2018 of its own version of the machine learning framework especially for .NET and C# developers. The framework is open source and cross-platform and can also run on Windows, Linux, and macOS.The developers always wanted to have a NuGet package which they can plug in with a. Net application for creating machine learning applications. After the release of the first version,ML.NET is still a baby but it is already showing the (...)

    #dotnet #dotnet-developer #mldotnet #microsoft-framework #machine-learning

  • From Designing to Publishing My #windows Application
    https://hackernoon.com/designing-publishing-windows-application-8cd05f0be47b?source=rss----3a81

    Behind the scenes of an indie Windows application.Photo by Donald Tong from PexelsThe last time that I published a Windows application, it was ages ago. So, when a few months ago I decided to develop and publish my product I had to learn and decide everything again.Here’s my journey from the idea to publishing. Not a step to step tutorial but a journal about decisions and pitfalls.The ideaThe idea is quite simple. A task manager, with Kanban view and everything, for Windows. Focused on personal needs, to begin, with teams in mind for the future.Why yet another task manager, and why Windows?Well, I’m a productivity geek, and you can bet that I’m never satisfied with the productivity tools. I’ve tried so many of them that at some point I lost faith in finding the chosen one.I won’t annoy you (...)

    #microsoft #hackernoon-top-story #software-development #visual-studio

  • The Linux desktop is in trouble | ZDNet
    https://www.zdnet.com/article/the-linux-desktop-is-in-trouble

    Jason Hicks, Muffin maintainer and member of the Linux Mint team, observed on Reddit, as reported by Brian Fagioli:

    I also have a life outside open-source work, too. It’s not mentally sound to put the hours I’ve put into the compositor. I was only able to do what I could because I was unemployed in January. Now I’m working a job full time, and trying to keep up with bug fixes. I’ve been spending every night and weekend, basically every spare moment of my free time trying to fix things.

    There’s also been tension because we’re 1-2 months from a release. We’ve had contentious debate about input latency, effects of certain patches, and ways to measure all of this. Other team members are going through their own equally hard circumstances, and it’s an unfortunate amount of stress to occur all at once at the wrong times. We’re human at the end of the day. I wish these aspects didn’t leak into the blog post so much, so just wanted to vent and provide some context. If you take away anything from it, please try the PPA and report bugs. We need people looking for things that might get stuck in cinnamon 4.2.

    I’ve heard this before. There have been a lot of Linux desktop distros over the years. They tend to last for five or six years and then real life gets in the way of what’s almost always a volunteer effort. The programmers walk away, and the distro then all too often declines to be replaced by another.

    It is not easy building and supporting a Linux desktop. It comes with a lot of wear and tear on its developers with far too little reward. Mint is really a winner and I hope to see it around for many more years to come. But I worry over it.

    Looking ahead, I’d love to see a foundation bring together the Linux desktop community and have them hammer out out a common desktop for everyone. Yes, I know, I know. Many hardcore Linux users love have a variety of choices. The world is not made up of desktop Linux users. For the million or so of us, there are hundreds of millions who want an easy-to-use desktop that’s not Windows, doesn’t require buying a Mac, and comes with broad software and hardware support. Are you listening Linux Foundation?

    #Logiciels_libres #Linux #GUI #Economie

  • Things Are Looking Up for Linux on ARM Laptops
    https://www.omgubuntu.co.uk/2019/04/things-are-looking-up-for-linux-on-arm-laptops

    Red Hat developers announce plans to bring desktop Fedora Linux to Windows-based ARM laptops using the 64-bit ARM Snapdragon 850 SoC. This post, Things Are Looking Up for Linux on ARM Laptops, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • News Roundup
    http://cppcast.libsyn.com/news-roundup-4

    Rob and Jason catch up on some news at the end of a week of traveling. News Usability improvements in GCC 9 Triton is the world’s most murderous malware, and it’s spreading Counting Bugs in Windows Calculator Understanding C++ Modules: Part 1: Hello Modules, and Module Units Modern CMake Examples CMake 3.14.0 available for download Introduction into Logging with Loguru Little-known C++: function-try-block Links @robwirving @lefticus Sponsor Backtrace Announcing Visual Studio Extension - Integrated Crash Reporting in 5 Minutes Hosts @robwirving @lefticus 

    http://traffic.libsyn.com/cppcast/cppcast-190.mp3?dest-id=282890

  • TOP 5 #javascript TreeGrid (TreeTable) Components
    https://hackernoon.com/top-5-javascript-treegrid-treetable-components-20f03f4b46c8?source=rss--

    JavaScript Tree component is a very popular and convenient control that helps create data-rich applications. A hierarchical approach to data organization provides many benefits to an end-user. You can find tree lists in applications of all kinds.The main advantage of UI trees is the opportunity to display large amounts of information compactly. But one of the shortcomings is that it’s quite difficult to work with large trees. The information from such trees does not fit in the visible area of interfaces and as a result it becomes necessary to organize horizontal and vertical scrolling (e. g., the process of editing the registry of MS Windows).A TreeTable component appeared as a logical answer to the complexity of work with UI Trees. On the one hand, TreeTable is a classic DataGrid that (...)

  • Deploying on #aws Free Tire with #docker and Fabric
    https://hackernoon.com/deploying-on-aws-free-tire-with-docker-and-fabric-d9eca7c629e6?source=rs

    In this article i want to summarize all things that u will need to make good dev environment and deployment for a small application. To make this happen we will use AWS Free Tire and Docker containers and orchestration and #django app as a typical projectLink on this project github: https://github.com/creotiv/aws-docker-exampleBefore go farther please install Docker first: https://docs.docker.com/install/linux/docker-ce/ubuntu/All code running under Python 3.6DockerDocker is a container virtualization engine that gives u ability to create cheap and fast environments for production and development use. Containers are not virtual machines. Key idea of containers is to make them as thin as possible. So you cant run Windows container on Linus system. Here is good image to see the (...)

    #devops #aws-free-tire

  • 5 Best Text Editors for Programmers
    https://hackernoon.com/5-best-text-editors-for-programmers-3f54ef51d5ae?source=rss----3a8144eab

    1. AtomAtom is a free and open-source text and source code editor for macOS, Linux, and #microsoft Windows with support for plug-ins written in Node.js, and embedded Git Control, developed by GitHub. Atom is a desktop application built using web technologies.2. VimVim is a highly configurable text editor for efficiently creating and changing any kind of text. It is included as “vi” with most UNIX systems and with Apple OS X.3. VS CodeVisual Studio Code is a source code editor developed by Microsoft for Windows, Linux and macOS. It includes support for debugging, embedded Git control, syntax highlighting, intelligent code completion, snippets, and code refactoring.4. Notepad++Notepad++ is a text editor and source code editor for use with Microsoft Windows. It supports tabbed editing, which (...)

    #vim #software-development #technology #web-development

  • Overload 149 is now available
    http://isocpp.org/feeder/?FeederAction=clicked&feed=All+Posts&seed=http%3A%2F%2Fisocpp.org%2Fblog%2F2

    ACCU’s Overload journal of February 2019 is out. It contains the following C++ related articles.

    Overload 149 is now available

    From the journal:

    Rip It Up and Start Again. Some things can be resurrected, others cannot. Frances Buontempo wonders when we need to repent and start over. 5 Big Fat Reasons Why Mutexes Suck Big Time. Mutable shared state in multithreaded code is often protected by mutexes. Sergey Ignatchenko reminds us that Re-Actors can avoid many of the problems. A Small Universe. Writing a programming language is a hot topic. Deák Ferenc shows us how he wrote a compiler for bytecode callable from C++. QM Bites: Understand Windows Operating-System Identification Preprocessor Macros. Quality matters and bite sized articles help. Matthew Wilson (...)

    #News,Articles&_Books,

  • Microsoft Will Let You Access Linux Files from Windows Explorer
    https://www.omgubuntu.co.uk/2019/02/access-linux-files-from-windows-explorer-wsl

    Users of the Windows Subsystem for Linux (WSL) will finally be able to access Linux files from Windows’ Explorer. Microsoft confirms that the oft-requested ability to access the Linux file system from Windows will arrive as part of the Windows 10 Version 1903 update later this month. “The next Windows update is coming soon and we’re bringing exciting […] This post, Microsoft Will Let You Access Linux Files from Windows Explorer, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Features To Build Better Applications With .NET Core 3
    https://hackernoon.com/features-to-build-better-applications-with-net-core-3-dc320740e0a9?sourc

    Features To Build Better Applications With .NET Core 3Devs are excited and so should you, for an improved .NET Core 3.0 that comes after much anticipation. First presented back in May during Build, .NET Core 3.0 finally brings support for Windows Desktop Applications.In fact, the open-source .NET Core 3.0 will garner much attention in 2019 and beyond. At the launch at #microsoft Ignite Conference, the company highlighted all major features that will arrive with Core 3.0 — and they will douse you with joy.What Benefits Does it Offer for Desktop Applications?.NET Core 3.0 brings plenty of benefits for desktop-based applications. First, it will improve the overall app performances and bring more speed to runtime updates. Second, it is an open-source platform that offers innovative BCL and APIs (...)

    #web-development-company #dotnet #web-development #dotnet-core

  • 23 Electron Applications You Should Know About
    https://www.omgubuntu.co.uk/2019/02/best-electron-apps

    Here we present the best Electron applications available for Linux desktops, including Ubuntu, as well as macOS and Windows too. Now, we’ve written about a slew of Electron apps over the past few years, ranging from desktop podcast clients to hybrid terminal/IDEs. Not everyone appreciates Electron’s cross-platform versatility as much as we do (I once […] This post, 23 Electron Applications You Should Know About, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • You Can Now Install Ubuntu on Windows ARM Laptops
    https://www.omgubuntu.co.uk/2019/02/ubuntu-on-arm-windows-laptops

    A new open source project aims to bring fully functional Ubuntu to ARM Windows 10 laptops, like the HP Envy X2, pictured above. A crop of Windows 10 laptops which run atop Qualcomm Snapdragon ARM processors have been released by major PC makers in the past years. Notebooks such as the HP Envy x2 and Asus […] This post, You Can Now Install Ubuntu on Windows ARM Laptops, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Microsoft rät indirekt vom Office-2019-Kauf ab | heise online
    https://www.heise.de/newsticker/meldung/Microsoft-raet-indirekt-vom-Office-2019-Kauf-ab-4300654.html

    Microsoft essaye de vous décourager d’acheter Office 2019 - afin de vous vendre Office 365 . La raison est évidente : Pour Office 2019 vous ne payez qu’une seule fois alors que pour Office 365 vous payez tous les ans. Les arguments ressemblent ceux des vendeurs d’automobiles et n’ont d’intérêt que pour les utilisateurs les plus dépendants et les moins flexibles.

    On se demande pourquoi quelqu’un voudrit encores utiliser un MS-Office payant en dehors des grandes entreprises qui obligent leurs employés à apprendre l’utilisation du monstre. Après tout il y a

    Free Microsoft Office Online, Word, Excel, PowerPoint
    https://products.office.com/en/office-online/documents-spreadsheets-presentations-office-online

    Which browsers work with Office Online - Office Support
    https://support.office.com/en-us/article/which-browsers-work-with-office-online-ad1303e0-a318-47aa-b409-d3a5e

    Desktop and laptop computers

    Use the most recent versions of the following browsers for the best experience with Office Online.

    Windows 10 : Microsoft Edge, Internet Explorer 11, Mozilla Firefox, or Google Chrome

    Windows 8, 8.1, or 7 (SP1): Internet Explorer 11, Firefox or Chrome

    Windows Vista (SP2) : Firefox or Chrome, but some features may not be available. We recommend updating to at least Windows 7 (SP1).

    Mac OS X (10.10 and later) : Apple Safari 10+ or Chrome

    Linux : Office Online works in both Firefox or Chrome on Linux, but some features may not be available.

    If your organization is dependent upon Internet Explorer 8 or Internet Explorer 9 to access older web apps and services, you may want to consider upgrading to Internet Explorer 11 and evaluating Enterprise Mode for Internet Explorer 11. This update helps provide better backward compatibility for legacy web apps.

    iOS Devices

    iPad : If you’re using at least iOS 10.0 we recommend using the Office for iPad apps instead. You’ll find them in the Apple app store.

    If you’re using an older version of iOS then Safari is the best browser for Office Online on iPads, but some features may not be available.

    iPhone : If you’re using at least iOS 10.0 we recommend using the Office for iPhone apps instead of the browser. You’ll find them in the Apple app store.

    If you’re using an older version of iOS then Safari is the best browser for Office Online on iPhones but some features may not be available.

    Note: Not sure which version of iOS you have? See Find the software version on your iPhone, iPad or iPod (Apple Support)

    Android

    There are currently no browsers on Android that are officially supported with Office Online. We recommend using the Office for Android apps instead. You’ll find them in the Google Play store.

    Other devices

    Most Office Online features will work in the Microsoft Edge browser on Hololens or XBox One.

    #software #Microsoft #lock-in #marketing #publicité

  • Insync is Bringing OneDrive to Linux
    https://www.omgubuntu.co.uk/2019/02/insync-support-onedrive-linux-client

    Linux users will soon have a new way to access and sync OneDrive on Linux. Insync, makers of a popular third-party Google Drive syncing client for Linux (and Windows and macOS), have decided to add another string to their bow: Microsoft’s OneDrive cloud storage service. Microsoft offer a OneDrive basic plan for free. It comes with 5GB […] This post, Insync is Bringing OneDrive to Linux, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.