Home Blog Page 669

Free Webinar: How Shared Development Is Driving the Automotive Industry

The Linux Foundation’s Automotive Grade Linux (AGL) project is hosting a free webinar called “Open Source Automotive: How Shared Development Will Drive the Industry Forward.” The hour-long event, which starts at 11am on Wednesday, November 9, will be led by Dan Cauchy, Executive Director of the Automotive Grade Linux project at The Linux Foundation.

The webinar will reveal how AGL’s Unified Code Base (UCB) 2.0, which was released in July, is bringing together automotive manufacturers and suppliers to develop an open connected car platform that can serve as a de facto standard for automotive computing. The current focus is on in-vehicle infotainment, but this is quickly moving toward more comprehensive digital cockpit and assisted driving technology.

AGL’s UCB is necessary, says Cauchy, because the traditional automotive supply chain model has failed to keep up with digital technology.

“Consumers have come to expect their personal devices to be intuitive and user-friendly, and they want that experience to extend into the vehicle,” Cauchy told Linux.com. “In-car connectivity and infotainment systems have not kept pace with smartphone technology primarily because automotive software is fragmented.

“AGL’s goal is to eliminate this fragmentation by building a single software platform for the entire industry,” he said. “Adopting an open platform will lead to more software reuse, enabling shorter production cycles and more rapid innovation.” 

The webinar is a warm-up for a larger AGL Demonstration Showcase to be held January 4-7 at the CES show in Las Vegas. The showcase will include an AGL Demo Suite held on January 5-6 that will showcase a broader range of application developers who use the AGL/UCB codebase.

AGL announced a new round of members in September, including AutoIO Technology (instrument clusters), Irdeto (security technology), Link Motion (IVI), Pocket Soft (RTPatch software updating tools), sdtech (HMI and system design), and Synopsys (automotive-specific IC design and verification tools, and security software). Automotive security is a common theme among all the new members’ solutions.

More than 40 new companies have joined AGL in the past year, bringing the member total to more than 80. Automotive manufacturers like Ford, Honda, Jaguar Land Rover, Mazda, Mitsubishi Motors, Nissan, Subaru, and Toyota, have been joined by technology companies including Aisin AW, Codethink, Continental, DENSO, Fujitsu Ten, Harman, Mitsubishi Electric, NTT DATA MSE, Panasonic, Pioneer, Qualcomm, Renesas Electronics, Wind River, and others.

UCB 2.0 shipped with new rear seat display, video playback, and audio routing support, as well as a comprehensive application framework. At CES, we’ll see more information on UCB 3.0, which is expected to be released later this year.

“UCB 3.0 is the version we expect to see members put into production,” says Cauchy. “UCB 3.0 will also be the basis for the work we are starting on telematics, instrument cluster, heads up display (HUD), and advanced driver assistance systems (ADAS), which are on our roadmap for 2017.”

Learn more about how AGL and shared development are driving the auto industry forward. Join us Wednesday, Nov. 9, 2016 at 11 a.m. Pacific for this free webinar presented by Dan Cauchy. Register Now >>

Agile, DevOps and the Algorithmic Enterprise

The next big trends for technology leaders today are Agile, DevOps, and becoming data-driven ‘algorithmic enterprises’.

That’s the opinion of Mike Mason, technology activist and adviser to the CTO at ThoughtWorks. Speaking to Computing recently, Mason explained that an effective data strategy is needed to solve traditional problems around legacy applications and multiple, conflicting data sets.

“Against a backdrop of increasing speed of technological advancement – which is itself a challenge to which IT leaders must respond – the next big shift is to become a data-driven, algorithmic enterprise,” said Mason

Read more at V3

5 Terminal Commands Every Linux Newbie Should Know

I’m a big fan of the anime series Neon Genesis Evangelion. One of the quotes from it that stands out in my head is, “Man fears the darkness, and so he scrapes away at the edges of it with fire.” For newcomers to the world of Linux, the black screen of the terminal can seem like a deep, foreboding darkness, which is desperately replaced by a GUI whenever possible. It doesn’t have to be that way.

A graphical user interface makes modern computing more enjoyable and easier to use the majority of the time. After all, placing an Amazon order using a text-mode browser in a terminal sounds like an over-enthusiastic exercise in masochism. We like our GUIs and graphical browsers, but there are times when you’ll find yourself in the world of the command line. Like any new tool, knowing a few basics can keep your blood pressure in check when a GUI fails to start, or you need to perform maintenance.

Read more at PCWorld

How to Generate a Strong Password from the Linux Command Line

Having a strong password is one of the most important things you need to have in order to secure your Linux system. There are a lot of methods for generating a strong password. In this tutorial, you’ll learn how to generate a strong password via the Linux CLI.

If you don’t already have a strong password, pick a method and generate one ASAP.

How to generate a strong password through the command line

Using these command line tools is a secure (and fun) way of generating a strong password.

‘Open Source’ Is Not ‘Free Software’

Conflating ‘open source’ and ‘free software’ undermines free software.

In the open source universe, using terms such as FLOSS (Free/Libre and Open Source Software) is common and represents a casual conflation of the terms open source and free software, which are often used interchangeably. I would be remiss if I didn’t also admit that I have been guilty of same. I won’t be doing that anymore—or at least I’ll try not to—for a simple reason: Using the terms interchangeably is dangerous to the goals of free software and open media advocates (read “anti-DRM”). To continue this practice is to undermine beliefs that are fundamental to free software and associated movement.

Read more at OpenSource.com

Admins, Update Your Databases to Avoid the MySQL Bug

MySQL, MariaDB, and PerconaDB administrators need to check their database versions, as attackers can chain two critical vulnerabilities and completely take over the server hosting the database.

The two critical vulnerabilities, which can lead to arbitrary code execution, root privilege escalation, and server compromise, affect MySQL and forks like Percona Server, Percona XtraDB Cluster, and MariaDB, according to security researcher Dawid Golunski, who provided details of the vulnerability on LegalHackers. Administrators should install the latest updates as soon as possible, or in cases where the patches cannot be applied, they should disable symbolic link support within the database server configuration by setting symbolic-links=0 in my.cnf.

Read more at InfoWorld

Linus Torvalds Announces the Fourth RC of Linux Kernel 4.9, Things Are Still Big

Linus Torvalds announced the availability of the fourth RC (Release Candidate) development milestone of the upcoming Linux 4.9 kernel series.

According to Mr. Torvalds, who deliberately released the new Release Candidate version a day early than expected (again), the Linux kernel 4.9 RC4 release appeared to have already been big enough, which is due to the fact that there are a bunch of updated drivers, lots of networking fixes, as well as improvements for filesystems that triggered the bug in the new virtually mapped stacks.

“So I’m not going to lie: this is not a small RC, and I’d have been happier if it was. But it’s not unreasonably large for this (big) release either, so it’s not like I’d start worrying,” said Linus Torvalds. “I’m currently still assuming that we’ll end up with the usual seven Release Candidates, assuming things start calming down. We’ll see how that goes as we get closer to a release.”

Read more at Softpedia

Kali Linux – Fresh Installation Guide

Kali Linux is arguably one of the best out of the box Linux distributions available for security testing. While many of the tools in Kali can be installed in most Linux distributions, the Offensive Security team developing Kali has put countless hours into perfecting their ready to boot security distribution.

Kali Linux is a Debian based, security distribution. The distribution comes pre-loaded with hundreds of well known security tools and has gained quite a name for itself.

Kali even has an industry respected certification available called “Pentesting with Kali”. The certification is a rigorous 24 hour challenge in which applicants must successfully compromise a number of computers with another 24 hours to write up a professional penetration test report that is sent to and graded by the personnel at Offensive Security. Successfully passing this exam will allow the test taker to obtain the OSCP credential.

Read complete article at Tecmint

 

Keynote: Collaboration Beyond Code by Jilayne Lovejoy, Principal Open Source Counsel, ARM

Jilayne Lovejoy, Principal Open Source Counsel at ARM talks about collaboration beyond code with the OpenChain project at LinuxCon Europe.

Plumbing the Cloud for Containers

Container systems are becoming easier to install, but setting up and managing production container platforms can still be challenging. In his presentation at CloudNativeCon in Seattle, Michael Friis, Product Manager at Docker, will explain what it takes to install and maintain container platforms on public clouds and describe some important considerations for choosing load balancers, logging, and storage solutions. Here, Friis gives us a preview of his talk and shares some recommended practices.

 

Linux.com: What capabilities or features are unique to Docker for AWS and/or Docker for Azure?

Michael Friis: The objective of Docker for AWS and Azure is to provide a very easy/simple way to provision and configure fully featured swarms of Docker Engine in a native experience for that target IaaS provider. Docker for AWS and Azure use the respective infrastructure installers (Cloudformation and ARM) to build simple installation experiences, and integrate with/deploy with underlying infrastructure features like load balancing and scaling in a way that feels natural and native to Azure and AWS operators.

 

Linux.com: Who should be using Docker for AWS and Docker for Azure, and why?

Michael: Anyone that would like to try out Docker 1.12 and built-in orchestration (aka swarm-mode) can get a working setup in minutes with Docker for AWS and Docker for Azure. Docker for AWS and Docker for Azure are still in beta, but they’re already great for trial and prototype Docker deployments on IaaS.

 

Linux.com: What makes setting up a production container system or PoC challenging?

Michael: There are a few items to consider when setting up a production container environment:

  • Getting security right: Networking and firewalls, configuring certificates and encryption

  • Understanding the  idiosyncrasies of your selected  underlying infrastructure, and mapping those the desired end result in the container environment.

  • Understanding how clustering software is bootstrapped, and what  ancillary software is required for the environment (like K/V-stores)

 

Linux.com: What are a few of the best practices for installing and maintaining easy-to-use container platforms on public clouds?

  • Keep track of the dependencies you take on the underlying infrastructure! Taking advantage of unique and differentiating features of a particular IaaS is great, but do so in a way that doesn’t compromise portability. Docker is a great way to help achieve this.

  • Make sure your setup is automated and scriptable. Even if you have just one production cluster, you’ll want to setup test and staging environments to try out upgrades and similar operational tasks. Make plans for upgrades: Both of the operating system (choose a minimal one with less software, and keep the complexity in container images that are much easier to upgrade), of the clustering system and of the containerized apps.

 

Registration for this event is sold out, but you can still watch the keynotes via livestream and catch the session recordings on CNCF’s YouTube channel. Sign up for the livestream now.