technology:operating system

  • How to Enable DNS-over-HTTPS (DoH) in Mozilla Firefox

    How to Enable DNS-over-HTTPS (DoH) in Mozilla Firefox

    Posted onAugust 8, 2018AuthorTrishaLeave a comment

    When you visit a website, the web browser first translates the domain name (such as to the IP address using the DNS server configured in your operating system. We actually offer a free tool Public DNS Server Tool that helps you quickly configure your Windows system to use one of the publicly available DNS servers.

    But now Firefox browser (starting from version 62) has come up with a new feature called Trusted Recursive Resolver (TRR) which sets Firefox to use a secure DNS server of its own. For this feature, all the DNS resolution requests are sent over HTTPS and this is why only a DNS over HTTPS (DoH) complaint server can be used for this feature.

    Here is how you can enable DoH in Firefox browser:

    Type about:config in the address bar and press Enter.
    When warning appears, click on the I accept the risk button.
    In the search box type trr to find the settings we want.

    #dns #DoH #dnsoverhttps #https

  • Adversarial Interoperability: Reviving an Elegant Weapon From a More Civilized Age to Slay Today’s Monopolies | Electronic Frontier Foundation

    Voici ce que le mouvement pour le logiciel libre peut apprendre des tactiques des concurrents de Microsoft - si vous ne pouvez pas gagner contre les géants, profitez d’eux.

    Today, Apple is one of the largest, most profitable companies on Earth, but in the early 2000s, the company was fighting for its life. Microsoft’s Windows operating system was ascendant, and Microsoft leveraged its dominance to ensure that every Windows user relied on its Microsoft Office suite (Word, Excel, Powerpoint, etc). Apple users—a small minority of computer users—who wanted to exchange documents with the much larger world of Windows users were dependent on Microsoft’s Office for the Macintosh operating system (which worked inconsistently with Windows Office documents, with unexpected behaviors like corrupting documents so they were no longer readable, or partially/incorrectly displaying parts of exchanged documents). Alternatively, Apple users could ask Windows users to export their Office documents to an “interoperable” file format like Rich Text Format (for text), or Comma-Separated Values (for spreadsheets). These, too, were inconsistent and error-prone, interpreted in different ways by different programs on both Mac and Windows systems.

    Apple could have begged Microsoft to improve its Macintosh offerings, or they could have begged the company to standardize its flagship products at a standards body like OASIS or ISO. But Microsoft had little motive to do such a thing: its Office products were a tremendous competitive advantage, and despite the fact that Apple was too small to be a real threat, Microsoft had a well-deserved reputation for going to enormous lengths to snuff out potential competitors, including both Macintosh computers and computers running the GNU/Linux operating system.

    Apple did not rely on Microsoft’s goodwill and generosity: instead, it relied on reverse-engineering. After its 2002 “Switch” ad campaign—which begged potential Apple customers to ignore the “myths” about how hard it was to integrate Macs into Windows workflows—it intensified work on its iWork productivity suite, which launched in 2005, incorporating a word-processor (Pages), a spreadsheet (Numbers) and a presentation program (Keynote). These were feature-rich applications in their own right, with many innovations that leapfrogged the incumbent Microsoft tools, but this superiority would still not have been sufficient to ensure the adoption of iWork, because the world’s greatest spreadsheets are of no use if everyone you need to work with can’t open them.

    What made iWork a success—and helped re-launch Apple—was the fact that Pages could open and save most Word files; Numbers could open and save most Excel files; and Keynote could open and save most PowerPoint presentations. Apple did not attain this compatibility through Microsoft’s cooperation: it attained it despite Microsoft’s noncooperation. Apple didn’t just make an “interoperable” product that worked with an existing product in the market: they made an adversarially interoperable product whose compatibility was wrested from the incumbent, through diligent reverse-engineering and reimplementation. What’s more, Apple committed to maintaining that interoperability, even though Microsoft continued to update its products in ways that temporarily undermined the ability of Apple customers to exchange documents with Microsoft customers, paying engineers to unbreak everything that Microsoft’s maneuvers broke. Apple’s persistence paid off: over time, Microsoft’s customers became dependent on compatibility with Apple customers, and they would complain if Microsoft changed its Office products in ways that broke their cross-platform workflow.

    Since Pages’ launch, document interoperability has stabilized, with multiple parties entering the market, including Google’s cloud-based Docs offerings, and the free/open alternatives from LibreOffice. The convergence on this standard was not undertaken with the blessing of the dominant player: rather, it came about despite Microsoft’s opposition. Docs are not just interoperable, they’re adversarially interoperable: each has its own file format, but each can read Microsoft’s file format.

    The document wars are just one of many key junctures in which adversarial interoperability made a dominant player vulnerable to new entrants:

    Hayes modems
    Usenet’s alt.* hierarchy
    Supercard’s compatibility with Hypercard
    Search engines’ web-crawlers
    Servers of every kind, which routinely impersonate PCs, printers, and other devices

    Scratch the surface of most Big Tech giants and you’ll find an adversarial interoperability story: Facebook grew by making a tool that let its users stay in touch with MySpace users; Google products from search to Docs and beyond depend on adversarial interoperability layers; Amazon’s cloud is full of virtual machines pretending to be discrete CPUs, impersonating real computers so well that the programs running within them have no idea that they’re trapped in the Matrix.

    Adversarial interoperability converts market dominance from an unassailable asset to a liability. Once Facebook could give new users the ability to stay in touch with MySpace friends, then every message those Facebook users sent back to MySpace—with a footer advertising Facebook’s superiority—became a recruiting tool for more Facebook users. MySpace served Facebook as a reservoir of conveniently organized potential users that could be easily reached with a compelling pitch about why they should switch.

    Today, Facebook is posting 30-54% annual year-on-year revenue growth and boasts 2.3 billion users, many of whom are deeply unhappy with the service, but who are stuck within its confines because their friends are there (and vice-versa).

    A company making billions and growing by double-digits with 2.3 billion unhappy customers should be every investor’s white whale, but instead, Facebook and its associated businesses are known as “the kill zone” in investment circles.

    Facebook’s advantage is in “network effects”: the idea that Facebook increases in value with every user who joins it (because more users increase the likelihood that the person you’re looking for is on Facebook). But adversarial interoperability could allow new market entrants to arrogate those network effects to themselves, by allowing their users to remain in contact with Facebook friends even after they’ve left Facebook.

    This kind of adversarial interoperability goes beyond the sort of thing envisioned by “data portability,” which usually refers to tools that allow users to make a one-off export of all their data, which they can take with them to rival services. Data portability is important, but it is no substitute for the ability to have ongoing access to a service that you’re in the process of migrating away from.

    Big Tech platforms leverage both their users’ behavioral data and the ability to lock their users into “walled gardens” to drive incredible growth and profits. The customers for these systems are treated as though they have entered into a negotiated contract with the companies, trading privacy for service, or vendor lock-in for some kind of subsidy or convenience. And when Big Tech lobbies against privacy regulations and anti-walled-garden measures like Right to Repair legislation, they say that their customers negotiated a deal in which they surrendered their personal information to be plundered and sold, or their freedom to buy service and parts on the open market.

    But it’s obvious that no such negotiation has taken place. Your browser invisibly and silently hemorrhages your personal information as you move about the web; you paid for your phone or printer and should have the right to decide whose ink or apps go into them.

    Adversarial interoperability is the consumer’s bargaining chip in these coercive “negotiations.” More than a quarter of Internet users have installed ad-blockers, making it the biggest consumer revolt in human history. These users are making counteroffers: the platforms say, “We want all of your data in exchange for this service,” and their users say, “How about none?” Now we have a negotiation!

    Or think of the iPhone owners who patronize independent service centers instead of using Apple’s service: Apple’s opening bid is “You only ever get your stuff fixed from us, at a price we set,” and the owners of Apple devices say, “Hard pass.” Now it’s up to Apple to make a counteroffer. We’ll know it’s a fair one if iPhone owners decide to patronize Apple’s service centers.

    This is what a competitive market looks like. In the absence of competitive offerings from rival firms, consumers make counteroffers by other means.

    There is good reason to want to see a reinvigorated approach to competition in America, but it’s important to remember that competition is enabled or constrained not just by mergers and acquisitions. Companies can use a whole package of laws to attain and maintain dominance, to the detriment of the public interest.

    Today, consumers and toolsmiths confront a thicket of laws and rules that stand between them and technological self-determination. To change that, we need to reform the Computer Fraud and Abuse Act, Section 1201 of the Digital Millennium Copyright Act, , patent law, and other rules and laws. Adversarial interoperability is in the history of every tech giant that rules today, and if it was good enough for them in the past, it’s good enough for the companies that will topple them in the future.

    #adversarial_Interoperability #logiciel_libre #disruption

  • Ubuntu 19.04: What’s New? [Video]

    Ubuntu 19.04 ‘Disco Dingo’ is (very nearly) here, serving as latest version of the Ubuntu operating system — but what’s changed? Spoiler alert: not much. This update is more of a modest evolution than a […] This post, Ubuntu 19.04: What’s New? [Video], was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • #blockchain as the Next Evolutionary Step of the Open Source Movement

    There’s little argument that open source has transformed our world. As a developer, I cannot recall a single day in the last few years where I did not rely on open source software. I’m not the exception. The majority of software engineers today rely on open source daily in their professional lives.For one, open source is dominating developer infrastructure. From operating systems (Linux in the cloud) to databases (MySQL, MongoDB, Redis) to programming languages themselves (JavaScript, Python, Java, C, PHP). It’s not just developers, it’s consumers as well. From what they run on their phones (Android) to how they access the web (Chrome, Firefox).The motivation is clear. Open source is good for humanity. It is making technology more accessible and open — anyone can build anything.Open source (...)

    #bitcoin #open-source #ethereum #cryptocurrency

    • lien propre:

      Glen Greenwald, Micah Lee - 20190412

      In April, 2017, Pompeo, while still CIA chief, delivered a deranged speech proclaiming that “we have to recognize that we can no longer allow Assange and his colleagues the latitude to use free speech values against us.” He punctuated his speech with this threat: “To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.”

      From the start, the Trump DOJ has made no secret of its desire to criminalize journalism generally. Early in the Trump administration, Sessions explicitly discussed the possibility of prosecuting journalists for publishing classified information. Trump and his key aides were open about how eager they were to build on, and escalate, the Obama administration’s progress in enabling journalism in the U.S. to be criminalized.

      Today’s arrest of Assange is clearly the culmination of a two-year effort by the U.S. government to coerce Ecuador — under its new and submissive president, Lenín Moreno — to withdraw the asylum protection it extended to Assange in 2012. Rescinding Assange’s asylum would enable the U.K. to arrest Assange on minor bail-jumping charges pending in London and, far more significantly, to rely on an extradition request from the U.S. government to send him to a country to which he has no connection (the U.S.) to stand trial relating to leaked documents.

      Indeed, the Trump administration’s motive here is clear. With Ecuador withdrawing its asylum protection and subserviently allowing the U.K. to enter its own embassy to arrest Assange, Assange faced no charges other than a minor bail-jumping charge in the U.K. (Sweden closed its sexual assault investigation not because they concluded Assange was innocent, but because they spent years unsuccessfully trying to extradite him). By indicting Assange and demanding his extradition, it ensures that Assange — once he serves his time in a London jail for bail-jumping — will be kept in a British prison for the full year or longer that it takes for the U.S. extradition request, which Assange will certainly contest, to wind its way through the British courts.

      The indictment tries to cast itself as charging Assange not with journalistic activities but with criminal hacking. But it is a thinly disguised pretext for prosecuting Assange for publishing the U.S. government’s secret documents while pretending to make it about something else.

      Whatever else is true about the indictment, substantial parts of the document explicitly characterize as criminal exactly the actions that journalists routinely engage in with their sources and thus, constitutes a dangerous attempt to criminalize investigative journalism.

      The indictment, for instance, places great emphasis on Assange’s alleged encouragement that Manning — after she already turned over hundreds of thousands of classified documents — try to get more documents for WikiLeaks to publish. The indictment claims that “discussions also reflect Assange actively encouraging Manning to provide more information. During an exchange, Manning told Assange that ‘after this upload, that’s all I really have got left.’ To which Assange replied, ‘curious eyes never run dry in my experience.’”

      But encouraging sources to obtain more information is something journalists do routinely. Indeed, it would be a breach of one’s journalistic duties not to ask vital sources with access to classified information if they could provide even more information so as to allow more complete reporting. If a source comes to a journalist with information, it is entirely common and expected that the journalist would reply: Can you also get me X, Y, and Z to complete the story or to make it better? As Edward Snowden said this morning, “Bob Woodward stated publicly he would have advised me to remain in place and act as a mole.”

      Investigative journalism in many, if not most, cases, entails a constant back and forth between journalist and source in which the journalist tries to induce the source to provide more classified information, even if doing so is illegal. To include such “encouragement” as part of a criminal indictment — as the Trump DOJ did today — is to criminalize the crux of investigative journalism itself, even if the indictment includes other activities you believe fall outside the scope of journalism.

      As Northwestern journalism professor Dan Kennedy explained in The Guardian in 2010 when denouncing as a press freedom threat the Obama DOJ’s attempts to indict Assange based on the theory that he did more than passively receive and publish documents — i.e., that he actively “colluded” with Manning:

      The problem is that there is no meaningful distinction to be made. How did the Guardian, equally, not “collude” with WikiLeaks in obtaining the cables? How did the New York Times not “collude” with the Guardian when the Guardian gave the Times a copy following Assange’s decision to cut the Times out of the latest document dump?

      For that matter, I don’t see how any news organisation can be said not to have colluded with a source when it receives leaked documents. Didn’t the Times collude with Daniel Ellsberg when it received the Pentagon Papers from him? Yes, there are differences. Ellsberg had finished making copies long before he began working with the Times, whereas Assange may have goaded Manning. But does that really matter?

      Most of the reports about the Assange indictment today have falsely suggested that the Trump DOJ discovered some sort of new evidence that proved Assange tried to help Manning hack through a password in order to use a different username to download documents. Aside from the fact that those attempts failed, none of this is new: As the last five paragraphs of this 2011 Politico story demonstrate, that Assange talked to Manning about ways to use a different username so as to avoid detection was part of Manning’s trial and was long known to the Obama DOJ when they decided not to prosecute.

      There are only two new events that explain today’s indictment of Assange: 1) The Trump administration from the start included authoritarian extremists such as Sessions and Pompeo who do not care in the slightest about press freedom and were determined to criminalize journalism against the U.S., and 2) With Ecuador about to withdraw its asylum protection, the U.S. government needed an excuse to prevent Assange from walking free.

      A technical analysis of the indictment’s claims similarly proves the charge against Assange to be a serious threat to First Amendment press liberties, primarily because it seeks to criminalize what is actually a journalist’s core duty: helping one’s source avoid detection. The indictment deceitfully seeks to cast Assange’s efforts to help Manning maintain her anonymity as some sort of sinister hacking attack.

      The Defense Department computer that Manning used to download the documents which she then furnished to WikiLeaks was likely running the Windows operating system. It had multiple user accounts on it, including an account to which Manning had legitimate access. Each account is protected by a password, and Windows computers store a file that contains a list of usernames and password “hashes,” or scrambled versions of the passwords. Only accounts designated as “administrator,” a designation Manning’s account lacked, have permission to access this file.

      The indictment suggests that Manning, in order to access this password file, powered off her computer and then powered it back on, this time booting to a CD running the Linux operating system. From within Linux, she allegedly accessed this file full of password hashes. The indictment alleges that Assange agreed to try to crack one of these password hashes, which, if successful, would recover the original password. With the original password, Manning would be able to log directly into that other user’s account, which — as the indictment puts it — “would have made it more difficult for investigators to identify Manning as the source of disclosures of classified information.”

      Assange appears to have been unsuccessful in cracking the password. The indictment alleges that “Assange indicated that he had been trying to crack the password by stating that he had ‘no luck so far.’”

      Thus, even if one accepts all of the indictment’s claims as true, Assange was not trying to hack into new document files to which Manning had no access, but rather trying to help Manning avoid detection as a source. For that reason, the precedent that this case would set would be a devastating blow to investigative journalists and press freedom everywhere.

      Journalists have an ethical obligation to take steps to protect their sources from retaliation, which sometimes includes granting them anonymity and employing technical measures to help ensure that their identity is not discovered. When journalists take source protection seriously, they strip metadata and redact information from documents before publishing them if that information could have been used to identify their source; they host cloud-based systems such as SecureDrop, now employed by dozens of major newsrooms around the world, that make it easier and safer for whistleblowers, who may be under surveillance, to send messages and classified documents to journalists without their employers knowing; and they use secure communication tools like Signal and set them to automatically delete messages.

      But today’s indictment of Assange seeks to criminalize exactly these types of source-protection efforts, as it states that “it was part of the conspiracy that Assange and Manning used a special folder on a cloud drop box of WikiLeaks to transmit classified records containing information related to the national defense of the United States.”

      The indictment, in numerous other passages, plainly conflates standard newsroom best practices with a criminal conspiracy. It states, for instance, that “it was part of the conspiracy that Assange and Manning used the ‘Jabber’ online chat service to collaborate on the acquisition and dissemination of the classified records, and to enter into the agreement to crack the password […].” There is no question that using Jabber, or any other encrypted messaging system, to communicate with sources and acquire documents with the intent to publish them, is a completely lawful and standard part of modern investigative journalism. Newsrooms across the world now use similar technologies to communicate securely with their sources and to help their sources avoid detection by the government.

      The indictment similarly alleges that “it was part of the conspiracy that Assange and Manning took measures to conceal Manning as the source of the disclosure of classified records to WikiLeaks, including by removing usernames from the disclosed information and deleting chat logs between Assange and Manning.”

  • Ubuntu 19.04 Beta is Now Available to Download

    Download the beta of Ubuntu 19.04 Disco Dingo and help test the next major update of the Linux-based operating system due for release in April. This post, Ubuntu 19.04 Beta is Now Available to Download, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Getting Started With Cross-Platform App Development In 2019

    Getting Started with Cross-Platform App Development in 2019Image credit: Burst/ShopifyBy Reinder de Vries, founder of LearnAppMaking.comRemember Adobe Flash? It was the ultimate cross-platform development tool. Flash ran on any web browser or operating system — it could even run on early versions of Android. And then came HTML5, that did many of the things Flash could do…Cross-platform development has long been the holy grail of building software. Most cross-platform development tools promise you can build your codebase once, and then run the app on any platform. Why build natively for every different platform, if you can build it once and deploy on as many platforms as you want?You can see why this is so compelling. It saves you time and money getting your app to market, and you can cut (...)

    #android-app-development #ios-app-development #technology #mobile-app-development #programming

  • Handshake, ENS and Decentralized Naming Services Explained

    The Domain Name System has been in operation for decades and is the infrastructure that handles billions of queries over the internet. As a user, you rely on your operating system and browser to help navigate the internet. However, whats humming quietly is the back-end infrastructure that helps your device find the right website. The #dns is part of the internet infrastructure which is a distributed network that handles queries from billions of people. The query is sent to a resolving server and its only task is to find the IP address behind the website you requested.Recently many blockchain based solutions are starting to rise and they offer a compelling value proposition. Imagine being in Turkey the day they disabled the resolving server from seeking the Twitter IP address. How would (...)

    #cryptocurrency #ethereum #security #bitcoin

  • How to get into #android Development, Step by Step Approach

    Start #learning Android Development, with easy step by step wallpaperAre you an android enthusiast?Do you like android apps and cool libraries or GitHub repositories that help make android development fun and amazing?Are you passionate about android development and want to learn how to get into this, with a step by step approach?Or,Are you looking to expand your programming knowledge and want to try android development?If yes, then you’re at the perfect place.Let’s start with absolute basic questions.What is Android?Android is a mobile operating system developed by Google. It is based on a modified version of the Linux kernel and other open source software, and is designed primarily for touchscreen mobile devices such as smartphones and tablets.But, why learn android?There (...)

    #androiddev #learning-and-development #android-app-development

  • Best Operating Systems for Anonymity: Comparing Titans

    There are plenty of operating systems aimed at achieving online anonymity. But how many of them are really good? I think that not many. Below I want to suggest several Linux distributions that can help to solve numerous privacy\anonymity issues. Let’s go!Tails OSTails is a Debian-based Linux distribution designed to provide privacy and anonymity. All outgoing connections are routed through the #tor network, and all non-anonymous connections are blocked. The system is designed to boot from Live CD or Live USB and leaves no traces on the machine on which it was used. The Tor project is the main sponsor of Tails. This operating system is recommended for use by the Freedom of the Press Foundation and was also used by Edward Snowden to expose PRISM.In order to evaluate all the pros and cons of (...)

    #anonimity #kodachi #tail #whonix

  • Using #docker To Run #mysql Server In Your Development Environment

    Today I’m going to show you how can you can use Docker to run MySQL Server in your development environment. Using Docker to run MySQL is much easier than manually installing it and for when you have multiple instances of MySQL running at the same time. I’m assuming that you already have Docker Community Edtion install on your machine. If you do not have Docker installed follow the instruction here for your operating system.Install MySQL Using DockerIf you search online for how to install MySQL using Docker, you will see many different examples on how to do this. I’m going to show how to do it so that you can connect to the database from your IDE and from the applications you are developing.Type this command at the terminal:$ docker run -p 3306:3306 —name hb-mysql-example -e (...)

    #devops #java #programming

  • #helm from the trenches

    If you are working with #kubernetes then you should use Helm to be able to easily change the YAML resources for your applications. Helm is like a package manager for deploying applications on a cluster, it gives you a list of already created apps (charts) ready to install and you can also start creating your own and publish them in your own chart museum. Like on an operating system, life without a package manager would be much harder.Helm charts for an easier Kubernetes installation (image source: am using Helm day by day, and these are the things I found out while creating new charts or modifying existing ones. If I knew all these before starting with helm than things would have been smoother and I would of wasted less time searching error messages and solutions to (...)

    #cloud-native #devops #cloud

  • What Is #containerization ?

    In traditional software development, code developed in one computing environment often runs with bugs and errors when deployed in another environment.Software developers solve this problem by running software in ‘containers’ in the cloud.How #containers WorkContainerization involves bundling an application together with all of its related configuration files, libraries and dependencies required for it to run in an efficient and bug-free way across different computing environments.The most popular containerization ecosystems are Docker and Kubernetes.Apps and their dependencies sit in containers on top of a ‘container runtime environment’ which can work on a host operating system and the infrastructure of choice.Containers versus Virtual MachinesContainers are often compared to Virtual (...)

    #whats-is-containerization #devops #distributed-systems

  • #swift 5.0: What’s new, what’s changed, what’s missing, and what’s next?

    It’s more than a month from final branching of swift 5, we should expect it soon as it was announced to be released early this year. Some say that it will come later in April because the same methodology was used for Swift 4.2; the final branching for it was April 20, 2018, and it was released September 17, 2018.Anyhow, we are eagerly waiting for swift 5.0 as it will allow us to develop apps in a beautiful manner.The improving swiftABI StabilityOne of the top priorities for Swift right now is compatibility across future Swift versions. One major component of this is ABI stability, which enables binary compatibility between applications and libraries compiled with different versions of Swift.If Swift becomes ABI Stable, Swift will live within the #ios Operating System and it’s ABI will be (...)

    #swift-5 #apple #mobile-app-development

  • #flutter#slack Redesign Challenge : What I learnt from it.

    Flutter — Slack Redesign Challenge: What I learnt from it.Exploring the power of UI in flutter, I decided to create something cool. I saw the concept of slack application while browsing up-laps.Link: I reveal the power of flutter.Slack Redesigned using Flutter SDKMy flutter redesign is not exactly same as the up-labs version but quite similar, I took it as motivation. I used the default flutter icons and colors to keep it simple.I used flutter as a hobbyist for some time and made couple of packages.After working on this redesign challenge I would love to share my experience in this article.What is Flutter, Dart or FuchsiaHeard about Google’s new operating system for mobile devices? Fuchsia OS. Google didn’t make any public announcements (...)

    #android #mobile-app-development #ios

  • A Short Essay: My Notes On Voice Search

    A Short Essay On Voice SearchAs part of the team at WordLift, I had a privileged view of how the landscape of search and voice is evolving. Also, on FourWeekMBA I’ve experimented in the last two years with Google’s advanced features (carousels, knowledge panels and featured snippets) which give us — I argue — an important overview of how voice search might look like.In addition, I’ve already talked about voice search and why I think is critical to Google future business strategy.Let me start by a couple of moves Google has made which show — I argue — how much the company is betting on voice search. For instance, in 2018, Google invested in San Diego-based startup, KaiOS.This is a company that created an operating system for feature phones (the dumb brother of a smartphone). What’s so incredible about (...)

    #digital-marketing #search-engine-marketing #voice-search-app #voice-search #artificial-intelligence

  • Linux Release Roundup : Android x86, Ubuntu Core 18 + More

    It’s been another busy month in the land of Linux app and distro releases. In this post we roundup some of the latest and more notable updates. We take in a pair of popular operating systems, a useful photography app, and a popular open-source note taking client. Android x86 8.1 Do you long to run […] This post, Linux Release Roundup: Android x86, Ubuntu Core 18 + More, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Raspberry Pi based #wifi Routers

    This rather long post steps you through the process of setting up a WiFi #router on a Raspberry Pi Zero W or Raspberry Pi 3. There are a number of reasons why you might want to do such a thing:Setup a demo any where access point for your web appsCreate deployable devices for use in network testing.As an added bonus this post also describes how to install NodeJS and the AWS command line tool to created scripted workflows with AWS.Setting up the Raspberry PiSetup the Raspberry Pi Zero W using Raspbian Lite. The version I used was 2018-06-27-raspbian-stretch-lite.imgThe following instructions are Mac OSX centric but not too different for how you’d do this using other operating systems.Locate SD cardOn Mac you can do this using diskutil via the command line. Execute the command below and look (...)

    #raspberry-pi-wifi-routers #raspberry-pi #iot

  • Top 5 Free #linux Courses for Programmers

    A curated list of some of the best free online courses to learn Linux in 2019There is no doubt that Linux is one of the most popular operating systems to run server-side applications. I have seen almost all Java applications running on Linux barring a couple of them which runs on Windows as service.If you take out standalone apps like IDEs or tools, most of the real world Java applications run on Linux e.g. payment gateways, trading systems, and other financial applications.That’s why it’s very important for any programmer, IT professional, or a developer to learn and understand Linux, both operating system, as well as command line. Linux as one of the most important skill because it serves you for a long time. It not only makes you productive and teaches a lot of automation by (...)

    #online-courses #software-development #programming #technology

  • How #chat #api boosts the Engagement and Retention of Users

    Instant #messaging is a term that entered common usage during the 90s. The days of GTalk, Yahoo Messenger, Orkut, who can forget?But do you know that the actual concept of instant messaging dates back to the mid-1960s? The Compatible Time-Sharing Systems (CTSS) were one of the very first multi-user operating systems, created at the Massachusetts Institute of Technology (MIT)’s Computation Center in 1961. They allowed up to 30 users to log in at the same time and send messages to each other. Those systems, which perhaps seems closer to emails today, had a lot of registered users from MIT and nearby colleges by 1965.Since then, we have come a long way as today we have multiple ways to communicate. In the case of user-user interaction, we have options like push notification, in-app (...)

    #in-app-messaging #chat-api

  • Local #kubernetes setup with #minikube on Mac OS X

    Kubernetes, container registry, #helm…Minikube is ideal tool to setup kubernetes (k8s from now on) locally to test and experiment with your deployments.In this guide I will try to help you get it up and running on your local machine, drop some tips on where and how particular stuff should be done and also make it helm capable (I assume when you use #k8s that at some point you will want to learn about and use Helm, etcd, istio etc).This is your local k8s environment scaffolding guide.Minikube installationMinikube works with virtual machine, and for this it can use various options depending on your preference and operating system. My preference in this case is Oracle’s VirtualBox.You can use brew to install everything:$ brew cask install virtualbox minikubeIn this case you could get some (...)


  • Is the Linux philosophy still relevant in 2019? |

    The philosophy outlined in these books was critical to the original design of Unix and its modern descendant, Linux. That groundbreaking design and its creative implementation made it possible for us to have the amazing open source operating system we have today. Without the concept of data streams, the use of pipes to modify and transform those data streams, the idea that “everything is a file,” and so much more, we would be reduced to struggling with a command line even less powerful than the old IBM or MS-DOS. Even DOS used pipes but never provided powerful utilities like the GNU Core Utilities that we take for granted today and give us access to the most basic of system functions.

  • Zuckerberg’s Arachnophobia

    Zuckerberg’s Arachnophobia: The bright #future of the internetThe digital revolution has rapidly transformed the world. Along the move from whale-sized computers to plankton-sized chips, our lives have been impacted in countless ways and as evident from our plunge into the next wave — AI, IoT and automation — the surge is ongoing. And yet, the technology that has largely powered this evolution has not paralleled this progression in its own maturation.Today, we still use the archaic #internet infrastructure that was devised at the energetic end of the previous millennium; moreover, operating systems even now approach the internet as an application rather than considering connectivity a core component alongside processing and storage. Consequently, we find ourselves vulnerable to hackers and bad (...)

    #mark-zuckerberg #cryptocurrency #blockchain

  • Self-Sovereign #identity: Will your universal digital ID be secure in the quantum future?

    Data today: The Wild West.If you have digital tracks, the latest revelation of corporate data intrusion will leave you shaking in them.According to a newly released Oxford University study, Android is a data monster with a voracious appetite for your data. The mobile operating system with 85 percent market share is harvesting and sharing data from 90 percent of the apps running on its OS. More disconcertingly, 43 percent of these apps transfer data to third parties, including Facebook and Twitter.Such data intrusion is characteristic of the current age of data. Users have been used to seeing their data harvested by the giants of this world, be it companies or governments.What will it take to re-instill public #trust in Google and Android apps? Consider that the recent report of a data (...)

    #big-data #universal-digital-id #blockchain