1_r/devopsish

1_r/devopsish

54637 bookmarks
Custom sorting
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Download the Framework Laptop image of Project Bluefin. Make sure you select Intel or AMD depending on the mainboard in your device: Create a USB stick using Fedora Media Writer (Windows or Mac or Linux) Insert your USB drive (8GB or larger). Note that it will be reformatted, so make sure you are ok with erasing any data that is on it. After installing Fedora Media Writer, run it. Choose Select .iso file, browse to bluefin-gts.iso and select it. Click the Write button. Once the USB drive...
·universal-blue.discourse.group·
Installing Bluefin onto a Framework Laptop 16 - Framework Laptops - Universal Blue
Introducing new DNS Diagnostics Tooling
Introducing new DNS Diagnostics Tooling
In the wake of releasing a massive update of the 'domain' library, we launched DNS Investigation, aka "dnsi".
·blog.nlnetlabs.nl·
Introducing new DNS Diagnostics Tooling
zero-gpu-explorers (ZeroGPU Explorers)
zero-gpu-explorers (ZeroGPU Explorers)
Org profile for ZeroGPU Explorers on Hugging Face, the AI community building the future.
·huggingface.co·
zero-gpu-explorers (ZeroGPU Explorers)
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
More than a consolation prize for ESXi users, Broadcom's surprising move makes advanced virtualization tools more accessible than ever - empowering students, hobbyists, and independent developers.
·zdnet.com·
Not touching it with a ten foot pole but interesting | VMware's Fusion Pro and Workstation Pro are now free for personal use - here's how to access them
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulnerabilities of fault-tolerant storage devices, resource allocation software, and distributed file systems to acoustic injection attacks in UDCs. With a realistic testbed approximating UDC server operations, we empirically characterize the capabilities of acoustic injection underwater and find that an attacker can reduce fault-tolerant RAID 5 storage system throughput by 17% up to 100%. Our closed-water analyses reveal that attackers can (i) cause unresponsiveness and automatic node removal in a distributed filesystem with only 2.4 minutes of sustained acoustic injection, (ii) induce a distributed database's latency to increase by up to 92.7% to reduce system reliability, and (iii) induce load-balance managers to redirect up to 74% of resources to a target server to cause overload or force resource colocation. Furthermore, we perform open-water experiments in a lake and find that an attacker can cause controlled throughput degradation at a maximum allowable distance of 6.35 m using a commercial speaker. We also investigate and discuss the effectiveness of standard defenses against acoustic injection attacks. Finally, we formulate a novel machine learning-based detection system that reaches 0% False Positive Rate and 98.2% True Positive Rate trained on our dataset of profiled hard disk drives under 30-second FIO benchmark execution. With this work, we aim to help manufacturers proactively protect UDCs against acoustic injection attacks and ensure the security of subsea computing infrastructures.
·arxiv.org·
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
New WiFi Vulnerability: The SSID Confusion Attack
New WiFi Vulnerability: The SSID Confusion Attack
This vulnerability exploits a design flaw in the WiFi standard, allowing attackers to trick WiFi clients on any operating system into connecting to a untrusted network.
·top10vpn.com·
New WiFi Vulnerability: The SSID Confusion Attack
What Do You Do When A.I. Takes Your Voice? (Gift Article)
What Do You Do When A.I. Takes Your Voice? (Gift Article)
Two voice actors say an A.I. company created clones of their voices without their permission. Now they’re suing. The company denies it did anything wrong.
·nytimes.com·
What Do You Do When A.I. Takes Your Voice? (Gift Article)
Are we in Apple's post-iPad era?
Are we in Apple's post-iPad era?
The new Pro and Air only raise more questions about where the tablet fits in Apple's lineup.
·macworld.com·
Are we in Apple's post-iPad era?
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
Of course Apple is designing its own AI chips for its data centers. This will give them an end-to-end, cloud-to-edge, AI system that its competitors will not be able to match any time soon.
And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.
·digitstodollars.com·
“And if all the other hyperscalers are designing their own chips, it makes sense that Apple would as well.” 🤔🤔🤔| Why is Apple Making a Data Center Chip?
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews
There are many searchers who have been using Google daily that are heading to the Google Web Search Help forums to ask how they can turn off the new AI Overviews within the Google Search results. As you know, AI Overviews started to roll out on Tuesday and some searchers simply do not want it.
there is no way to opt out
·seroundtable.com·
Oof… “there is no way to opt out” | Searchers Want To Turn Off Google AI Overviews
Openwashing
Openwashing

Openwashing

SHOP TALK Openwashing /ō-pən-wä-shĭng/ An accusation against some A.I. companies that they are using the “open source” label too loosely. Credit...Luci…

May 17, 2024 at 10:31AM

via Instapaper

·nytimes.com·
Openwashing
OSPOs for Good 2024 | Office of the Secretary-General's Envoy on Technology
OSPOs for Good 2024 | Office of the Secretary-General's Envoy on Technology

OSPOs for Good 2024 | Office of the Secretary-General's Envoy on Technology

Date 9 – 10 July 2024 Venue United Nations Headquarters, New York Mode In-person with hybrid panels Event Description The second edition of the OSPOs for Good…

May 17, 2024 at 09:53AM

via Instapaper

·un.org·
OSPOs for Good 2024 | Office of the Secretary-General's Envoy on Technology
Proton (@protonprivacy@mastodon.social)
Proton (@protonprivacy@mastodon.social)
@ChrisShort@hachyderm.io @thisismissem@hachyderm.io The name/address of the terrorism suspect was actually given to police by Apple, not Proton. The terror suspect added their real-life Apple email as an optional recovery address in Proton Mail. Proton can't decrypt data, but in terror cases Swiss courts can obtain recovery email. Setting a recovery email is optional, and you can read about other recovery methods here: https://proton.me/support/set-account-recovery-methods
·mastodon.social·
Proton (@protonprivacy@mastodon.social)
Took a full week to get my things moved. A solid week in the guillotines while trying to clean up this mess | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions
Took a full week to get my things moved. A solid week in the guillotines while trying to clean up this mess | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions
Ascension Michigan's pharmacies cannot fill prescriptions, the health system said Wednesday. This is ongoing fallout from last week's ransomware attack.
·freep.com·
Took a full week to get my things moved. A solid week in the guillotines while trying to clean up this mess | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
A CISA official breaks with the government narrative and tells the FCC that SS7 and similar networks and protocols have been used to track people in the U.S. in recent years.
·404media.co·
Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
Yes, it took me a week and we're almost done shifting things away from Ascension | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions
Yes, it took me a week and we're almost done shifting things away from Ascension | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions
Ascension Michigan's pharmacies cannot fill prescriptions, the health system said Wednesday. This is ongoing fallout from last week's ransomware attack.
·freep.com·
Yes, it took me a week and we're almost done shifting things away from Ascension | Fallout from Ascension cyberattack continues: Michigan pharmacies can't fill prescriptions