Author Archive

Open-source communities fight over telco market | TechCrunch

https://techcrunch.com/2019/02/27/open-source-communities-fight-over-telco-market/ The Linux Foundation (LF) had its own booth at MWC. The booth is shared by the three LF projects: the Cloud Native Computing Foundation (CNCF), Hyperleger and Linux Foundation Networking, the home of many of the foundational projects like ONAP and the Open Platform for NFV(OPNFV) that power many a modern network. With the

Cyber Security March 2019

This posting is here to collect cyber security news in March 2019. I post links to security vulnerability news to comments of this article. If you are interested in cyber security trends, read my Cyber security trends 2019 posting. You are also free to post related links.

Sparks of joy

What if a jolt of electricity could make you happy? http://blogs.discovermagazine.com/d-brief/2019/02/22/new-experiment-scientists-used-jolts-electricity-spark-actual-joy/#.XHeCgmnks0P People all around the world have been exhausting themselves of late trying to “spark joy” in their lives. Any emotion we feel has a physical cause inside our brains: Electrical charges pass from neuron to neuron. It seems that what we call happiness is

Breaking out of Docker via runC – Explaining CVE-2019-5736 | Twistlock

https://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/ More than a week ago (2019-02-11) a new vulnerability in runC was reported by its maintainers. Dubbed CVE-2019-5736, it affects Docker containers running in default settings and can be used by an attacker to gain root-level access on the host. The same fundamental flaw exists in LXC. Both runC and LXC were patched and

Circular buffer for embedded systems – Overlay Technology

https://overlay.technology/circular-buffer-for-embedded-systems/ The circular buffer behaviour is ideal for implementing any data structure that is statically allocated and behaves like FIFO. As an example, mailboxes and queues can be implemented using the circular buffer as a kernel. This post is part of the Memory Control Structures series. Also, read the other posts in the series…

Linux 4.18 Continues Prepping For The Year 2038

https://www.phoronix.com/scan.php?page=news_item&px=Linux-4.18-More-Y2038-Prep The Linux kernel has already been prepping for years for Year 2038 and that work is still ongoing with the in-development Linux 4.18 kernel. The Year 2038 problem is when systems using a signed 32-bit integer for storing the time since 1 January 1970 (standard for the Unix time-stamp) will wrap around. Solving the

Julia Reda – Breaking: The text of Article 13 and the EU Copyright Directive has just been finalised

https://juliareda.eu/2019/02/eu-copyright-final-text/ This EU law will fundamentally change the internet as we know it – if it is adopted in the upcoming final vote. But we can still prevent that! The history of this law is a shameful one. From the very beginning, the purpose of Articles 11 and 13 was never to solve clearly-defined issues