Home Blog Page 193

Engineers share designs for DIY ventilators online as coronavirus pandemic spreads

With ventilators in dangerously short supply during the COVID-19 pandemic, a number of DIY groups have begun working on open source designs that could be made at home. Julian Botta, a third year resident in emergency medicine at Johns Hopkins, created a Google Doc listing some of the basic specifications for a ventilator and how a do-it-yourself version might be assembled.

The doc, called ‘Specifications for simple open source mechanical ventilator,’ is not affiliated in any way with Johns Hopkins, and is instead a purely personal pursuit for Botta. The idea came to him after he saw several similar projects spread across Github but was concerned that many of the designs were closer to CPAP (continuous positive airway pressure) machines than ventilators, according to a report in Vice.

[Source: Daily Mail]

Open Source Goes Mainstream – How Sharing Is Shaping The Future Of Music

Open source developments in music are leading the industry in a new direction. An increasing number of creators, for example, are building custom instruments and software, then choosing to make the products open source, or sharable in source code format, which allows other creators to produce derivative works free of charge for non-commercial use.

“While open sourcing has been happening on a small scale among academics for some time, it converted over the past few years and is now growing mainstream,” says Ajay Kapur, professor and director of music technology at the California Institute of the Arts (CalArts), pointing to a new movement of electronic artists seeking to create unique sounds and names for themselves on social media. “It’s been really amazing, there has been so much open source stuff happening in the industry driven by the maker movement.”

[Source: Forbes]

Linux Mint Debian Edition 4 Released – Finally Supports SecureBoot, Home Encryption

The Linux Mint crew has released LMDE 4 “Debbie” as their hedge against anything dramatic happening to Ubuntu that would limit their ability to offer Linux Mint and for those preferring the upstream Debian base. Linux Mint Debian Edition 4 is re-based against Debian 10 “Buster” and besides the updated packages has a number of other improvements to this second-class Linux Mint version.

With Linux Mint Debian Edition 4 there is finally UEFI SecureBoot support, automated partitioning support for LVM and full-disk encryption, home directory encryption is also supported, and other installation improvements.

[Source: Phoronix]

Open-source project spins up 3D-printed ventilator validation prototype in just one week

In a great example of what can happen when smart, technically-oriented people come together in a time of need, an open-source hardware project started by a group including Irish entrepreneur Colin Keogh and Breeze Automation CEO and co-founder Gui Calavanti has produced a prototype ventilator using 3D-printed parts and readily available, inexpensive material.

The ventilator prototype was designed and produced in just seven days, after the project spun up on Facebook and attracted participation from over 300 engineers, medical professionals and researchers. The prototype will now enter into a validation process by the Irish Health Services Executive (HSE), the country’s health regulatory body.

[Source: TechCrunch]

Top 5 Open Source Serverless Security Tools

The growing popularity of serverless architecture has led to its massive adoption. My organization has jumped on the serverless bandwagon and it lives up to expectations. The advantages have been tremendous—we have more time to focus on the development, marketing and deployment of the software now that we need not spend much time on infrastructure maintenance.

But with that, I’ve always been somewhat concerned about security. As soon as we made the transition to serverless, I began researching ways to ensure maximum security. The numbers were unbelievable when it came to cyberthreats, from DDoS attacks and data injections to business logic manipulations. Just refer to the OWASP list of top 10 threats and you’ll know how much ground there is to cover. That is the reason why we turned to numerous tools and resources in the market—especially open source—to help in our security. They can save a lot of time on manual maintenance of the system.

[Source: Security Boulevard]

Meet The Innovative Linux OS That’s Easier To Use Than Windows 10 and MacOS

As I approach my third year using it as my daily driver for working and playing, I’m still amazed at how frequently Linux surprises me. I approach Linux as an endless rabbit hole of new discoveries. Endless OS, then, is like an oversized amusement park full of intersecting rabbit holes and winding mazes of knowledge you’re happy to get lost in. I never envisioned having this much fun with a Linux operating system … Read more at Forbes.

[Source: Forbes]

Amazon is looking to bring Target and Walmart into an open source technology group

The e-tailer, which formed an open source organization called Dent last year, is now looking to bring Target and Walmart into the fold, per The Wall Street Journal.

But Target and Walmart reportedly don’t plan to participate at this point. Dent has access to some of the technologies that enable Amazon to operate its Go stores, which feature autonomous checkout, and already works with technology solutions firm Marvell Technology Group and networking software provider Cumulus Networks. The open source nature of Dent means that firms that download Amazon’s software can use it as they like without collaborating directly with Amazon.

[Source: Business Insider Nordic]

Is Clear Linux Just A Toy Distribution By Intel?

A user experimenting with Clear Linux had an opinion to share on their mailing list and referred to it as a “toy” distribution and some of our readers have expressed similar opinions on it. Here is the response by one of the Intel developers central to Clear Linux’s development.

The user referred to it as a toy project over not supporting as much hardware as some distributions, supporting too much GNOME “bloatware”, and not easily supporting as much closed-source software.

Basically, Clear Linux is focused on being a developer OS and not a general purpose OS to satisfy every user’s desire. Their code for third-party / closed-source packages on Clear Linux should help in broadening their software ecosystem but they are marching to the beat of their own drum that doesn’t necessarily align with the ways of other Linux distributions especially on the desktop front.

[Source: Phoronix]

Uber open-sources Piranha, a tool that automatically deletes stale code

Uber today made available in open source Piranha, a tool that automatically deletes stale and unused code from app codebases. The company says it eliminates the need for engineers to engage in the task of code removal themselves, which often prevents them from working on newer features.

Concretely, Piranha could help businesses that maintain apps speed up their development lifecycle, which in turn could cut down on costs and improve end-user experiences. “At Uber, we use feature flags to customize our mobile app execution, serving different features to different sets of users. These flags allow us to, for example, localize the user’s experience in different regions where we operate and, more importantly, to gradually roll-out features to our users and experiment with different variations of the same functionality,” wrote Uber in a blog post.

[Source: VentureBeat]

7 Linux Distros for Security Testing

Linux is often talked about when it comes to security. With this OS, you can choose from a multitude of distributions (distros) to lock down your computer or device, but that’s just for starters. Many Linux distros come with tools to help you perform penetration tests and security audits.

Take a look at just a few Linux distros for security testing. Many are based on Debian or Ubuntu with some added built-in custom tools.

Backbox, for instance, is an Ubuntu-based OS. It comes with a variety of pentesting and security assessment tools for network and systems analysis. These tools can perform such tasks as web application or network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis or exploitation.

[Source: Security Boulevard]