Next Page: 10000

          

Microsoft Embedded Inside Linux

 Cache   
  • Linux Kernel 5.4 to Have Kernel Lockdown and ExFAT Support

    The lockdown feature aims to further strengthen Linux security by “restricting access to kernel features that may allow arbitrary code execution via code supplied by userland processes”.

    In simple words, even the root account cannot modify the kernel code. This will hep in cases where a root account is compromised, the rest of system won’t be easy to compromise specially on kernel level. In even simpler words, it enhances the Linux security.

    There are two lockdown modes: integrity and confidentiality.

    In integrity lockdown mode, kernel features that allow userland to modify the running kernel are disabled.

  • Linus Torvalds isn't worried about Microsoft taking over Linux

    But that doesn't mean the Microsoft leopard can't change its spots. Sure, he hears, "This is the old Microsoft, and they're just biding their time." But, Torvalds said, "I don't think that's true. I mean, there will be tension. But that's true with any company that comes into Linux; they have their own objectives. And they want to do things their way because they have a reason for it." So, with Linux, "Microsoft tends to be mainly about Azure and doing all the stuff to make Linux work well for them," he explained.

    Torvalds emphasized this is normal: "I mean, that's just being part of the community."

    As Eric Raymond pointed out in his seminal open-source work, The Cathedral and the Bazaar: "Every good work of software starts by scratching a developer's personal itch."


          

Sparky 5.9

 Cache   

SparkyLinux 5.9 “Nibiru” is out. This is a quarterly update of live/install media of the stable line, which is based on Debian 10 “Buster”.

The base system has been upgraded from Debian stable repos as of October 4, 2019.
It works on the Linux kernel 4.19.67 LTS.
As usually, new iso/img images provide small bug fixes and improvements as well.

Sparky project page and Sparky forums got new skins; no big changes about the colors but they are much mobile devices friendly now.

Read more


          

Linux 5.4-rc2

 Cache   

Back to the usual Sunday afternoon schedule, and -rc2 is out.

Nothing particularly stands out here. It's roughly one third arch
updates, one third drivers, and one third "misc" (kvm selftests,
networking, filesystems, core kernel, header files etc). No real
theme, just random fixes all over the place.

The diffstat is pretty flat too, which is just another sign of "small
fixes all over".

So nothing looks particularly worrisome, but usually rc2 is fairly
calm and it takes a while for any regressions to be noticed. And this
one was one of the nice small rc2's (5.2 and 5.3 rc2's were both
larger than usual), but maybe it's because it was also a day shorter.

Anyway, nothing for it but to go out and test, people. Go at it!

               Linus

Read more

Also: Linux 5.4-rc2 Released As The "Nesting Opossum"


          

Stable kernels 5.3.4, 5.2.19, 4.19.77, 4.14.147, 4.9.195, and 4.4.195

 Cache   
  • Linux 5.3.4

    I'm announcing the release of the 5.3.4 kernel.

    All users of the 5.3 kernel series must upgrade.

    The updated 5.3.y git tree can be found at:
    git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git#utm_source=googlier.com/page/2019_10_08/1316&utm_campaign=link&utm_term=googlier&utm_content=googlier.com linux-5.3.y
    and can be browsed at the normal kernel.org#utm_source=googlier.com/page/2019_10_08/1316&utm_campaign=link&utm_term=googlier&utm_content=googlier.com git web browser:
    https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...#utm_source=googlier.com/page/2019_10_08/1316&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

  • Linux 5.2.19
  • Linux 4.19.77
  • Linux 4.14.147
  • Linux 4.9.195
  • Linux 4.4.195

          

USB 4.0 support patches for the Linux kernel issued with 40 Gbps transfer rate

 Cache   

An official release of the USB 4 specifications was made in June. USB 4.0 allows two-track operation on existing USB Type C cables and up to 40 Gbps on certified cables while maintaining compatibility with USB3/USB2 and Thunderbolt 3.

There were 22 first patches on the Linux kernel mailing list that provided basic support for USB 4.0. USB 4 support in its current form consists of less than four thousand lines of new code in the kernel. The boot process is not too dramatic as USB4 is based on Thunderbolt and therefore reuses the existing Thunderbolt driver code in the kernel.

As we approach the release of USB 4, which will have speeds similar to Thunderbolt 3 (40 Gbps), PCIe compatibility and DisplayPort within the USB-C form factor, there are already drivers that support the new standard and ensure that the release and transition to the latest USB version run smoothly.

Read more


          

Desktop Leftovers

 Cache   
  • Short Topix: Julian Assange To Remain Jailed Pending Extradition To U.S.

    Say what? Microsoft Windows 11 running a Linux kernel? What'chu smokin'? Steven J. Vaughan-Nichols wrote such a speculative article for ComputerWorld.

    And actually, it makes perfect sense. Look at the unmitigated disaster that the Windows 10 updates have been. Week after week after week, we hear about how the Windows 10 updates have wrecked users computers or have otherwise gone seriously awry. Most (if not all) Linux users are Windows refugees, usually fleeing from the lack of desktop choice under Windows, the never-ending assault of virii and virus scanners, the endless battle with malware, etc., etc., etc. The list is nearly as long as the number of Linux users.

    Replacing the NT kernel, which is basically rotten, with the Linux kernel is certainly doable. Vaughan-Nichols makes the argument that using the Linux kernel that is passionately and enthusiastically upkept by an army of programmers from around the world makes perfect sense. He goes on to argue that many Windows users won't even have to be aware that Windows is running on a Linux kernel, as Windows can still be made to look like Windows. But the insides, the very core, will get an upgrade in stability and security.

    Sure, it sounds crazy. But who could have predicted that Microsoft would go from wanting to bury Linux and calling it a cancer under Steve Ballmer, to expressing love for Linux under Satya Nadella? Who could have predicted that Microsoft would open its extensive patent library to Linux and the FOSS community -- for free?

    Vaughan-Nichols goes on to point out that Microsoft could release its own version of Linux today, if it chose to. There's nothing to stop them. But Microsoft developers have been busy laying the groundwork with the Windows Subsystem for Linux (WSL), mapping Linux API calls to Windows, and vice versa.

  • "LIBOUTPUT" Proposed As New Library For Helping To Bring Up New Compositors & More

    Coming out of informal discussions from this week's X.Org Developers Conference in Montreal, a "liboutput" library has been proposed as a theoretical new library for helping to bring up Wayland compositors, X11 window managers, and anything else wanting to interface with DRM/KMS kernel interfaces. 

  • PCLinuxOS Family Member Spotlight: oulik.jan#utm_source=googlier.com/page/2019_10_08/1322&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

    My father of 91 uses Linux as well. (Lubuntu) With Windows, he often picked up a virus or other malware, and he has been running Linux virus free since six years now. He is very happy with Lubuntu. 

    My brothers were in the beginning quite negative about my father using Lubuntu, but now they tend to be neutral about it. 

    I tried to convince some friends of mine to use Linux, but they perceive it to be too complicated and too different. 

    Only two friends of mine like it. 


          

Ten Principles of True Friendship

 Cache   
The essence of friendship and getting along with people is to cultivate the ability of putting yourself in their place, and acting accordingly. Friendship is reciprocal. To be liked, one must be ready to make himself likable. That is why Epicurus, the great philosopher said, “Of all the means to insure happiness throughout the whole of life by far the most important is the acquisition of friends.”

What is friendship these days? Modern busy life hardly leaves room for friends. In the modern societies which are turning more and more consumerist and selfish, values of life seem to change faster than the latest model of cell phones. It has become very hard to find true friends who can share everything confidentially.

Ten necessary principles of friendship

1) Proper understanding is the kernel of real friendship. Hence the first principle of friendship is to understand and make others feel important. Since everybody in the world wants to be treated important, you have to be generous with praise and recognition of their accomplishments.

2) On your part, be amicable and congenial to others. Always arguing or striking up a quarrel on the least excuse may irritate any friendship and cause a deathblow to friendship. Listen to others and encourage them to talk about themselves.

3) Try to look at friendship positively and appreciate others. Make them feel comfortable with your friendship so that they enjoy your appreciation, advice and help. Let them experience that they are important to you.

4) Friendship should not be just a lip service. It should be real and fostered in heart. Selfish motivated friendships will dwindle and disappear very soon. Try to understand your friend’s mind, his likes and dislikes, and his moods. Try to adjust yourself, though you do not have to tolerate any undesirable attitude. Tolerance is one of the foundations upon which friendship is built, as no one is absolutely perfect.

5) Be careful about your words. . The habit of talking carelessly, of not being able to keep a secret, is at the root of friendships breaking up.

6) They should be reliable and faithful. Never give way to any suspicion and keep your word, no matter how difficult the circumstances may be. They should be assured of your faithfulness. They should realize that you will go to any lengths to keep your promise.

7) Do not desert and betray your friend in any situation especially in their adversities. Betrayal is the death blow to any friendship and shatters friendship. Never be carried away by the gossip mongers’ false tales.

8) Thiruvalluvar, a famous South Indian saint poet, says about the greatness of friendship, “Friendship should be timely like the hand protecting ones shame when the towel slips from the loin.” Stand by your friend in his anxieties and adversities. Try to help your friends in as many ways as possible. Let them feel that they have some one who cares them really.

9) Friendship should not be a mere flattery. Some people do not like their mistakes to be criticized, as it gives them a sense of inferiority. It is the duty of a friend to correct him properly whenever he goes out of track..

10) Do not forget that only constructive criticism can be of much help, provided it is appreciated and accepted. They should not taken as a wounding remark. Always try to share a common interest with your friend. Sharing serves as a bond, and also acts as the motivation for many shared activities. Many friendships spring up on a playing field, in an art gallery, or in places which cater to common interests.

 http://family.wikinut.com#utm_source=googlier.com/page/2019_10_08/4243&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

          

Корейская косметика Ayoume - новинка в моём волосяном гардеробе

 Cache   


Хочу поделиться с вами впечатлениями от корейской линейки косметики для волос Ayoume с муцином улитки Black Snail Prestige.
Про корейскую косметику я знаю много хорошего. Но именно линейки для волос никогда не применяла, поэтому было вдвойне интересно.
Вот, что я нашла в сети про бренд
Ayoume
Инновационный корейский бренд Ayoume специализируется на изготовлении натуральной косметики и специализированных приборов. Благодаря им уходовые процедуры, обычно выполняемые в салонах красоты, доступны дома без боли и инъекций. Работа компании основана на простой философии: каждая женщина – прекрасный цветок, который требует особого ухода. Косметика бренда позволит полностью раскрыться этому цветку.

Ayoume предлагает качественную продукцию, которая доступна абсолютно всем. В ассортименте представлен большой выбор средств по демократичной цене. Для производства косметических средств применяются натуральные компоненты и современные технологии, они отличаются высоким качеством и эффективностью

В линейку входят:
— Шампунь для волос с муцином улитки (Black Snail Prestige Shampoo), 240 мл 770-790р.
— Маска для волос с муцином улитки (Black Snail Prestige Treatment) 240 мл 720-750р.

Вот так вот выглядит эта парочка. Оформление стильное и минималистичное: чёрные коробочки с белым и бежевым шрифтом. Каждый флакончик упакован в картонную коробку и смотрится, действительно, премиально.
Давайте покрутим каждый флакон.

Шампунь для волос с муцином улитки (Black Snail Prestige Shampoo Ayoume)

Чёрная картонная упаковка. На ней выделяется глянцевое тиснение Ayoume. На 3-х сторонах нанесена информация на английском, корейском языках, есть русская наклейка: состав, способ применения, меры предосторожности, характеристики упаковки (листайте галерею).





Внутри такой же красивый флакон с крышкой-помпой. Такая крышка для меня большой плюс: пользоваться ей очень удобно.



Ощущения от использования
«По одёжке» встретила я нового гостя хорошоblush. Давайте посмотрим, что внутри.
Мой тип волос — вьющиеся, при этом сами пряди у хрупкие, склонны к ломкости. Мне важно, чтобы очищение было деликатным, но качественным.
Состав
Water, Disodium Laureth Sulfosuccinate, Butylene Glycol, Cocamide MEA, Cocamidopropyl Betaine, Cetrimonium Chloride, PEG-150 Distearate, Glycerin, Peat Water, Fragance, Hydroxyacetophenone, Trehalose, Sodium Cloride, Glycol Distearate, Polyquaternium-10, Polyquaternium-7, Citric Acid, Ethylhexylglycerin, Snail Secretion Filtrate (629ppm), Disodium EDTA, Olea Europaea (Olive) Fruit Oil, Argania Spinosa Kernel Oil, Sodium Benzoate, Glycyrrhiza Glabra (Licorice) Root Extract, Punica Granatum Fruit Extract, Laminaria Japonica Extract, Honey Extract, Phenoxyethanol, 1 2- Hexanediol

Состав достаточно мягкий (без SLS, SLES). Содержит увлажнители (глицерин и бутилен гликоль). Мягким и увлажняющим шампунь оказался и на деле.
При выдавливании на ладошку производит впечатление немного маслянистого, средней густоты, непрозрачный, с лиловым оттенком.
Запах лёгкий, цветочный.На волосах не остаётся.


Результат
При первом намыливании пенится плохо, при повторном получается уже густая шапка.
⚘Экономичный: шампунь хорошо распределяется, не требуется много, чтобы распределить по всей голове;
⚘Промывает хорошо, при этом не сушит, не путает волосы, наоборот, увлажняет;
⚘Кожу головы очищает, после него остаётся ощущение свежести. Не вызвал ни зуда, ни стянутости, ни каких-то других неприятностей.
Шампунь подошёл мне отлично!
По 10-балльной шкале поставлю 9-ку
только за то, что ожидаемый мной муцин оказался ближе к концу состава. Тем не менее, пользуюсь с удовольствием.

Маска для волос с муцином улитки (Ayoume Black Snail Prestige Treatment)
Выглядит также строго и стильно, как и старший брат-шампунь.

Оформление практически одинаковое: тиснение, наклейка на русском, состав, инфо про упаковку — размещено по всем 4 сторонам коробочки. Если хотите рассмотреть со всех сторон — фото в галерее.




И вот такой флакон с помпой внутри


Ощущения от использования
От хорошей маски я жду увлажнения и/или питания, кондиционирования (последнее необязательно, потому что всё равно закрываю бальзамом), поддержания здоровья волос и (бонусом) красивого внешнего вида.
Давайте посмотрим, что можно получить от этой маски, изучив
Состав
Water, Cetyl Alcohol, Cetrimonium Chloride, Glyceryl Stearate, Glycerin, Stearyl Alcohol, Dimethicone, Amodimethicone, Cyclopentasiloxane, PEG-100 Stearate, Myristyl Alcohol, Fragance, Butylene Glycol, Cyclohexasiloxane, Lauryl Alcohol, Decylene Glycol, Trideceth-12, Laurylpyridinium Chloride, Propanediol, Snail Secretion Filtrate (629ppm), Disodium EDTA, PCA Ethyl Cocoyl Arginate, Glycerylamidoethyl, Methacrylate/Stearyl Methacrylate Copolymer, Pisum Sativum (Pea) Peptide, 1,2-Hehanediol, Ethylhexylglycerin

В основе маски жирные спирты, глицерин, есть также сопутствующий увлажняющий компонент бутилен гликоль и силиконы — должен хорошо приглаживать волосы.
При выдавливании из помпы получаем густой белый непрозрачный крем. Также показался мне немного маслянистым. Несмотря на это смывается хорошо, не перегружает волосы.
Аромат лёгкий, цветочный, похож на шампунь.


Результат
Маска хорошо наносится на волосы: она густая, не стекает. Экономична: на мою длину требуется 2-3 нажатия дозатора.
Держу 15-20 минут, затем смываю.
⚘Хорошо смягчает волосы;
⚘В комплексе с шампунем придаёт объём, но не пушит;
⚘ Волосы очень приятные на ощупь, ощущаются увлажнёнными и здоровыми.
⚘ Легко смывается, не перепитывает, даже при постоянном использовании.

В целом маска мне понравилась. Оценю на 8 баллов:
— из-за того, что муцин в составе после ароматизатора;
— возможно, это мой личный «загон», но хотелось бы ещё органических увлажнителей и масел поближе к началу списка.

Вот так выглядят волосы после шампуня+маски Ayoume Black Snail Prestige+бальзам другой серии.

Мне нравятся:
tulipБлеск;
tulipОбъем без пушения — очень хорошо держится даже прикорневой;
tulipКончики неплохо себя чувствуют, почти не секутся и не ломаются. Хотя они к этому очень склонны при неподходящем уходе. Они мягкие и упругие.
Просят стрижки, конечно. Планирую заняться.
tulipВолосы очень приятные на ощупь, к ним хочется прикасаться;
tulipПослушные: хорошо держат форму и легко укладываются;

Итог
Линейка для волос Ayoume Black Snail Prestige мне понравилась в использовании: приятно брать в руки, легко выдавливать, удобно наносить и смывать.
Порадовал и результат: живые, ухоженные, объемные волосы. Они хорошо укладываются и красиво блестят. Чувствуется, что они получили те компоненты, которые им нужны, и довольны.
Состав отвечает современным технологиям в производстве косметики для волос: содержит эффективные увлажняющие и питательные компоненты, мягкие очищающие ПАВ, пептиды.
За счёт составов линейка подойдёт любому типу волос. Думаю, даже девушкам с тонкими или окрашенными прядями будет с ней комфортно.

И, хотя я не могу пользоваться всё время одной и той же маркой, с удовольствием возвращаюсь к Ayoume, чередуя с другой любимой косметикой.

Любите ли вы «корейцев»? Пишите в комментариях о своем опыте.
          

Ангельские покупки. Так похожи, но такие разные

 Cache   

Всем привет!


Несмотря на мои хомячьи запасы, судя по всему, никогда не заканчивающиеся, я мечтаю о новых средствах в своем уходе. Год назад мои волосы пережили серьезный стресс (уже упоминала об этом), благодаря чему я потеряла всю красоту и густоту длины моих волос… Но плохой опыт — тоже опыт, поэтому я не отчаиваюсь, а упорным трудом восстанавливаю то, что было) И самое главное, что я поняла за этот период — лучшим мотиватором для меня являюсь я сама. Пересматриваю былые фотографии, пускаю слюни и жду, когда снова буду любоваться таким богатством воочию heart_eyes



Это лирическое отступление не просто так… Топчась на одном месте, я начала анализировать: а какие средства, из того многообразия, что я пробовала, давали мне классный, рабочий результат? Пересматривая фото и перечитывая свои же посты, я поняла, что одним из лучших для моих волос был уход от Angel Professional hearts Попробовав их однажды, они запали в душу, судя по всему, навсегда.

Так как ухода в обиходе много, и его нужно тоже заканчивать, я решила не скупать сразу все средства, а остановиться на «сильном». Мой выбор пал на 2 маски — питательный морской крем из классической серии и новой для меня голубой красавице Двойное восстановление. Поэтому один продукт является для меня полноценной новинкой (да и в принципе у бренда она появилась относительно недавно), а вот другая — притянутая за уши, но всё же ставшая вновь открытием для меня и моих волос. Покупки не совсем осенние, но по традиции они должны были хорошенько «вылежаться» smile Поэтому в уход активно внедряю их именно сейчас.

Писать на сайте про питательный крем Angel уже, наверное, моветон smile Но какие покупки, такой и пост прошу простить smile

Повествование начну параллельно про обе маски, так как в своем оформлении они имеют много общего.

Внешний вид


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM

Квадратный бочонок, ставший классикой. Мягкие углы, позитивный апельсиновый оттенок, поднимающий настроение. Внушительная, пузатенькая.

Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл

Баночка ровно такая же, как и у классической версии 500 мл. Квадратная форма, до боли узнаваемая и родная. Откручивающаяся крышка на резьбе. Защитная пластиковая мембрана внутри. Бирюзовое цветовое решение, напоминающее отсылку к цвету Тиффани. Очень нравится, как эти баночки смотрятся на ванной полочке.



Под крышечкой каждой маски была защитная пластиковая мембрана. Особого функционального значения после вскрытия средств она не несёт (если маску/и не придётся транспортировать), поэтому от неё смело можно избавиться.



Консистенция


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM

Сливочная, тающая, питательная. Это прям крем, самый настоящий. Менее плотная, чем у зелёной маски. Распределять по волосам одно удовольствие — я будто мажу крем для торта heart_eyes Расход средний. Цвет — кремовый.





Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл

По текстуре маска густая, плотная, сливочная, питательная, напоминающая очень густую сметану/ряженку. При нанесении она обволакивает собой каждый волосок. Я наношу её прям много, расход у меня получается совсем не экономичным за счет её густоты. Для более рационального нанесения беру маску небольшими горошинками и начинаю распределять с концов, постепенно поднимаясь выше. Промазываю тщательно, чтобы волосы струились, распутывались под пальцами после очищения шампунем.
Цвет маски также слегка бирюзовый.





Отмечу, что обе маски довольно-таки густые по текстуре. Ложка «стоит» в обеих. Но зелёная всё же чуть плотнее, насыщеннее, чем классическая оранжевая, соответственно и распределяется по длине чуть сложнее.



Аромат


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM

Когда ко мне попала в руки вновь эта оранжевая красавица, я сразу окунулась в ностальгию от её прекрасного аромата. Он такой знакомый, родной. Очень нежный, цветочный, с нотами сладости. Приятный, ненавязчивый. Абсолютно не приедается. На волосах остается непродолжительное время а жаль.

Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл

Отдушка, как и полагается Ангелу, также приятная. Цветочные нотки, не раздражающие и не бьющие в нос. Но аромат всё же чуть сильнее и интенсивнее, чем у классики. Описать сложно, но на мой нюх, тут больше и сладости, и цветов. Но всё же он не конфликтующий. В первый вечер после мытья ощущаю его нотки, на следующий день уходит окончательно.



Информация от производителя


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM
Насыщен NMF (интенсивно увлажняющий экстракт) из глубоководных водорослей Deepsea-alga, питает и глубоко увлажняет волосы, позволяет переносить увлажняющие липиды и смягчающие вещества в структуру волоса. Этот уникальный процесс помогает сохранить необходимый баланс влаги, придавая волосам, эластичность и бархатистость, усиливает естественный блеск. Включает в себя различные экстракты растений, способствует восстановлению клеточных мембран и предотвращает их от окисления. Идеален для сухих и поврежденных волос.
Применение: распределить необходимое количество крема между ладонями и нанести на чистые, вымытые, влажные волосы от корней до самых концов. Для оптимального результата рекомендовано использовать вапоризатор, климазон или обернуть волосы нагретым влажным полотенцем. Время выдержки от 5 до 20 минут, зависит от степени интенсивности кондиционирования волос. По истечении времени тщательно промыть теплой водой.

Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл
Маска Green Dual Repair Hair подходит для всех типов волос. Эффективно ухаживая за ослабленными и поврежденными волосами. Проникая глубоко в стержень волоса она восстанавливает его поврежденные участки. Экстракт бурых водорослей Padina Pavonica насыщвет ослабленные, тонкие, зрелые и длинные волосы коллагеном, делая их очень эластичными и шелковистыми. Протеины королевского риса глубоко увлажняют и восстанавливают. Масла арганы, макадамии и виноградных косточек питают и защищают от негативного воздействия внешней среды. Кератин в составе маски придает плотность волосам и восстанавливает их после окрашивания и химических процедур.
Активные компоненты:
white_check_markЭкстракт бурых водорослей,
white_check_markпротеины риса,
white_check_markмасло арганы,
white_check_markмасло макадамии,
white_check_markкератин,
white_check_markмасло виноградных косточек.

Применение: На вымытые и отжатые полотенцем волосы нанесите 5-10 мл маски, выдержать 3-7 минут, можно с применением тепла для усиления эффекта. Смыть водой.

Состав


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM

Aqua, Citrate Alcohol, Dimethicone, Grape Seed Oil, Cetyl Trimethyl Ammonium Chloride, Cyclomethicone, Amodimethicone, Nmf, Isopropil Palmate, Marine Collagen, D-Panthenol, Hydroxypropylcellulose, Citric Acid, Cl19140( Fd&C Yellow No. 5) Ci 73360 (Fd&C Red No.30)

Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл

Aqua(water), Cetearyl Alcohol, Glycerin, Vitis Vinifera (Grape) Seed Oil, Cetyl Alcohol, Ceteareth – 33, Padina pavonica extract, Iris Florentina Root Extract, Argania spinosa kernel oil, Hydroxypropyl Guar, Amodimethicone, Hydrolyzed Wheat Protein, Cetrimonium Chloride,, Keratin, Macadamia tarnifolia seed oil, Parfum/Frangrance, Citric Acid, Phenoxyethanol, Cl 19140, Cl 42090

Применение


Обе маски, на мой взгляд, не моментальные. Они для того, чтобы устроить себе ритуал, полностью расслабиться, понаслаждаться в пенной ванне, выдерживая их на волосах минут 20.

Да, чем дольше — тем лучше. Хотя бывает наношу и на 10 минут, когда особо не располагаю временем.

Смываются маски полностью, но постоять под душем придётся чуть дольше, чем, например, с Гидрой. При смывании нет ощущения кондиционирования. Да, волосы распутаны, но гладкости, скользкости нет. Сразу возникает желание закрыть всё это дело кондиционером. Но, скажу так, это по необходимости.

У меня тонкие волосы, и без нанесения бальзама эффект также есть, он заметен. Бальзам понадобится пористым, поврежденным волосам. Я наношу по настроению, когда понимаю, что НАДО девушки такие девушки smile .


Впечатления


Крем -маска питательная PH 3 500г. / WATER ELEMENT NURSING CREAM

Перечитывала свои прошлые посты, где делилась впечатлениями об этой маске… И, спустя время, она всё также шикарна и любима мной hearts

heavy_check_mark Даже с первого применения я заметила, как волосики сразу ожили. Эта безумная мягкость… Волосы падали на плечи и так укутывали их, будто в уютный плед. Никаких торчащих волосков по длине, всё приглажено.

heavy_check_mark Нет «плохого» утяжеления. Волосы нереально упругие, плотные, блестящие. Обычно тандем ОЧЕНЬ мягких волос и при этом плотных для меня недоступен. Это либо мягкость и лёгкость, либо плотность и жёсткость. Но не с этой маской! Волосы мягкие, но при этом такие хлёсткие, напитанные до самых кончиков. Они очень подвижные, упругие heart_eyes

heavy_check_mark Больше всего в ней, конечно же, увлажнения и питания. Всё ощущаю примерно в равных количествах: увлажнение даёт мягкость, а питание — упругость.

heavy_check_mark Кондиционирующий эффект выражен на 4. То есть при смывании волосы распутаны после шампуня, но особой гладкости, скользкости нет. Если волосы, как у меня — тонкие, не пористые, то это в принципе и достаточно. В остальных случаях лучше не пренебрегать кондиционером/бальзамом на пару минут для запечатывания.

heavy_check_mark Отметила также то, что на второй и третий день после мытья волосы всё также радуют. Сохраняется мягкость, подвижность кончиков. На ощупь волосы приятные, гладенькие.

Несмотря на нашу долгую разлуку, пользуясь маской вновь, я понимаю — всё-таки она очень крутая! purple_heart Не может не радовать её накопительный эффект что в принципе типично для данной марки — с каждым применением эффект всё более ярко выражен, волосы выглядят всё лучше и лучше.




Маска двойное восстановление, Angel Green Dual Repair Hair Mask 500 мл

С данной маской всё не так прозаично. Во всяком случае я её пока не поняла. Не было возможности отметить результат при её систематичном использовании, а лишь от раза к разу…

heavy_check_mark Начну с того, что у кондиционирующий эффект от восстанавливающей маски еще менее выражен, чем от питательного крема. К сожалению, если использовать шампунь из разряда «чуть по жёстче», то полной распутанности я не чувствую (особенно если была долгая прогулка при сильном ветре — проверено). Тут и у меня возникает желание нанести после неё кондиционер.

heavy_check_mark Во-вторых, эффект значительно разнится с питательным кремом. Тут преобладает восстановление с меньшей примесью питания.

heavy_check_mark Соответственно, мягкости от этой маски заметно меньше. Зато появляется плотность, объём, даже пышность. Волос будто больше в объёме (спасибо входящему в состав кератину за это). Нет и азиатской гладкости. Но большая часть длины у меня поврежденная, особенно мелированные пряди — списываю на это. На здоровых волосах, думаю, будет по другому. HellerOst писала об удачном тандеме зеленой маски и увлажняющего кондиционера — я так попробовать ещё не успела, пыталась раскусить её в чистом виде/с родным кондиционером. Попробую найти ей «запечатыватель» из имеющихся у меня в арсенале (хотя об оранжевом кондиционера Ангел уже тоже давно мечтаю, но пока добиваю запасы).

heavy_check_mark Ну и тут явно заметно, что кончикам не хватило ухода. Они топорщатся, лежат в разные стороны, не приглажены. Вид среза получается не ах-ти.

heavy_check_mark Не могу не похвалить маску за офигенный блеск. Волосы после неё искрятся, красиво переливаются на солнышке, и это явно её заслуга. Если мучает нехватка блеска, то я бы посоветовала обратить на неё внимание.





Сравнивая на фото визуальный эффект от масок Ангел, отчетливо заметно, что питательный крем лучше приглаживает, в меру утяжеляет. От восстанавливающей маски по длине остаются торчуны, которые плохо поддаются даже несмывашкам.

Не спешу делать окончательные выводы о зеленой маске. Нет, она неплохая, вполне имеет место быть. Свято верю, что я просто не до конца её раскусила. Многие за Ангелом заметили склонность к накопительному эффекту. Вспоминая свои первые впечатления от оранжевой маски, понимаю, что тоже не понимала восторга. Но со временем познакомилась с ней получше и она стала любимицей. Надеюсь, приструню и зелёную неопределенность, найду к ней подход.

Что касается оранжевой, то это классная рабочая увлажняющая лошадка. Очень рада, что окунулась в некую ностальгию и снова балую ей свои волосы. Опытные хэирманьяки нашли в линейках бренда Dancoly еще более сильные продукты. До других серий Ангела и Виесо я пока не добралась, но это лишь пока.


Пост получился больше похожим на битву банок, но я не специально, так вышло smile broken_heart

Надеюсь, не утомила. Благодарю за внимание! Всем шикарных волос! heartpulse


          

Dominique Leuenberger: Dominique Leuenberger: openSUSE Tumbleweed – Review of the week 2019/40

 Cache   

Dear Tumbleweed users and hackers,

Back on a weekly cadence for the reviews. So this time I again only review a single week, in which Tumbleweed has seen 4 snapshots being published (0926, 0927, 0930 and 1002).

The snapshots contained these updates (and more, as usual):

  • filesystem: Add /usr/libexec and /usr/local/libexec
  • glibc 2.30
  • Linux kernel 5.3.1
  • strace 5.3

There are more things being staged. Some of the more interesting areas of work:

  • libeconf integration into openSUSE: move default config files from /etc to /usr/etc
  • systemd 243
  • Linux kernel 5.3.2 and beyond
  • poppler 0.81.0
  • GStreamer 1.16.1
  • KDE Plasma 5.17.0: current alphas are staged and being tested
  • util-linux to enable libeconf integration
  • openssl 1.1.1d: breaks nodejs8, nodejs10 and python3

          

News

 Cache   
     I will be rebooting all Intel-based servers later this evening or very early Saturday morning (near midnight), in order to load new kernels that address yet another newly discovered Intel exploit.      When I recompiled the client mail server … Continue reading
          

Kernel Season’s Nacho Cheddar Seasoning 2-Pack Only $5.38 Shipped at Amazon

 Cache   
With only 2 calories per serving, Kernel Season's Nacho Cheddar seasoning is gluten-free, Kosher and a great way to flavor your favorite food.
          

/kernel/mido/viviakernel/ViviaKernel-R6T.zip

 Cache   
none
          

Samsung launches Chromebook 4 and 4+

 Cache   
Chromebooks used to be glorified web browsers running atop the Linux kernel, but these days, they are far more useful. If you need more than just web apps, you can now run Android apps and traditional desktop Linux programs on Chrome OS. Best of all, you can run them all side by side, making it all feel like a cohesive experience -- it doesn't feel like you are using a mixture of software intended for different platforms. Today, Samsung launches its latest Chrome OS laptops -- the 11.6-inch Chromebook 4 and 15.6-inch Chromebook 4+. The former weighs just 2.6 pounds,… [Continue Reading]
          

LXer: Canonical Releases Major Kernel Security Update for Ubuntu 19.04 and 18.04 LTS

 Cache   
Published at LXer: Canonical has released today a new major Linux kernel security for Ubuntu 19.04 and Ubuntu 18.04 LTS operating systems to address eighteen security vulnerabilities. Read...
          

The untold story behind the world’s first major internet attack: The Morris Worm via Mashable! [Video]

 Cache   

An excellent documentary on the first computer worm and the beginnings of the Internet. — Douglas

Our connected world comes with countless risks. Viruses, worms, spyware, ransomware, backdoors, Trojans: The language of cybersecurity is relatively new, but we have quickly become fluent. The misuse of technology has become the darkest danger of the digital age. Bad actors, emboldened by our inability to properly secure crucial systems and networks, are launching increasingly sophisticated attacks. No system is safe.

But in the beginning — the very, very beginning — computers inspired utopian visions of a better future, a world in which we were all digitally connected to one another and living in harmony.

Then came the Morris Worm. 

At Xerox’s Palo Alto Research Center, programmers were developing high-speed networks and the means by which computers could communicate with one another. This was the birth of the internet, and programmers’ ambitions pushed the limits of the imagination. But no one in Palo Alto could’ve imagined how bringing computers together would allow one bad actor to tear the system apart.

Read The untold story behind the world’s first major internet attack: The Morris Worm via Mashable!


* A portion of each sale from Amazon.com#utm_source=googlier.com/page/2019_10_08/23306&utm_campaign=link&utm_term=googlier&utm_content=googlier.com directly supports our blogs
** Many of these books may be available from your local library. Check it out!


An interesting link found among my daily reading


          

Kernel Patch Protection aka "PatchGuard"

 Cache   

Originally posted on: http://brustblog.net/archive/2006/10/30/95540.aspx#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

If anyone has been following this technology closely, there have been a lot of complaints by some of the security vendors regarding PatchGuard. I first heard about this technology at TechEd 2006 in a lot of the Vista sessions.

The recent controversy caused me to do a little more research in to this technology and the issues surrounding it.

The official name for this technology is called Kernel Patch Protection (KPP) and it's purpose is to increase the security and stability of the Windows kernel. KPP was first supported in Windows Server 2003 SP1, Windows XP, and Windows XP Professional Edition. The important thing to understand about this support is that it is for x64 architectures only.

KPP is a direct outgrowth of both customer complaints regarding the security and stability of the Windows kernel and Microsoft's Trustworthy Computing initiative, announced in early 2002.

In order to understand the controversy surrounding KPP, it is important to understand what KPP actually is and what aspects of the Windows operating system it deals with.

What is the Kernel?

The kernel is the "heart" of the operating system and is one of the first pieces of code to load when the operating system starts. Everything in Windows (and almost any operating system, for that matter) runs on a layer that sits on top of the kernel. This makes the kernel the primary factor in the performance, reliability and security of the entire operating system.

Since all other programs and many portions of the operating system itself depend on the kernel, any problems in the kernel can make those programs crash or behave in unexpected ways. The "Blue Screen of Death" (BSoD) in Windows is the result of an error in the kernel or a kernel mode driver that is so severe that the system can't recover.

What is Kernel Patching?

According to Microsoft's KPP FAQ, kernel patching (also known as kernel "hooking") is

the practice of using internal system calls and other unsupported mechanisms to modify or replace code or critical structures in the kernel of the Microsoft Windows operating system with unknown code or data. "Unknown code or data" is any code or data that is not provided by Microsoft as part of the Windows kernel.

What exactly, does that mean? The most common scenario is for programs to patch the kernel by changing a function pointer in the system service table (SST). The SST is an array of function pointers to in-memory system services. For example, if the function pointer to the NtCreateProcess method is changed, anytime the service dispatch invokes NtCreateProcess, it is actually running the third-party code instead of the kernel code. While the third-party code might be attempting to provide a valid extension to the kernel functionality, it could also be malicious.

Even though almost all of the Windows kernels have allowed kernel patching, it has always been an officially unsupported activity.

Kernel patching breaks the integrity of the Windows kernel and can introduce problems in three critical areas:

  • Reliability
    Since patching replaces kernel code with third-party code, this code can be untested. There is no way for the kernel to assess the quality of intent of this new code. Beyond that, kernel code is very complex, so bugs of any sort can have a significant impact on system stability.
  • Performance
    The overall performance of the operating system is largely determined by the performance of the kernel. Poorly designed third-party code can cause significant performance issues and can make performance unpredictable.
  • Security
    Since patching replaces known kernel code with potentially unknown third-party code, the intent of that third-party code is also unknown. This becomes a potential attack surface for malicious code.

Why Kernel Patch Protection?

As I mentioned earlier, the primary purpose of KPP is to protect the integrity of the kernel and improve the reliability, performance, and security of the Windows operating systems. This is becoming increasingly more important with the prevalence of malicious software that is implementing "root kits". A root kit is a specific type of malicious software (although it is usually included as a part of another, larger, piece of software) that uses a variety of techniques to gain access to a computer. Increasingly, root kits are becoming more sophisticated and are attacking the kernel itself. If the rootkit can gain access to the kernel, it can actually hide itself from the file system and even from any anti-malware tools. Root kits are typically used by malicious software, however, they have also been used by large legitimate businesses, including Sony.

While KPP is a good first step at preventing such attacks, it is not a "magic bullet". It does eliminate one way to attack the system...patc#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.comhing kernel images to manipulate kernel functionality. KPP takes the approach that there is no reliable way for the operating system to distinguish between "known good" and "known bad" components, so it prevents anything from patching the kernel. The only official way to disable KPP is by attaching a kernel debugger to the system.

KPP monitors certain key resources used by the kernel to determine if they have been modified. If the operating system detects that one of these resources has been modified it generates a "bug check", which is essentially a BSoD, and shuts down the system. Currently the following actions trigger this behavior:

  • Modifying system service tables.
  • Modifying the interpret descriptor table (IDT).
  • Modifying the global descriptor table (GDT).
  • Using kernel stacks that are not allocated by the kernel.
  • Patching any part of the kernel. This is currently detected only on AMD64-based systems.

Why x64?

At this point, you may begin to wonder why Microsoft chose to implement this on x64 based systems only. Microsoft is again responding to customer complaints in this decision. Implementing KPP will almost certainly impact comparability of many legitimate software, primarily security software such as anti-virus and anti-malware tools, which were built using unsupported kernel patching techniques. This would cause a huge impact on the consumer and also on Microsoft's partners. Since x64-based machines still make up the smaller install base (although they are gaining ground rapidly) and the majority of x64-based software has been rewritten to take advantage of the newer architecture, the impact is considered to be substantially smaller.

So...why#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.com the controversy?

Since KPP prevents an application or driver from modifying the kernel, it will, effectively, prevent that application or driver from running. KPP in Vista x64 requires any application drivers be digitally signed, although there are some non-intuitive ways to turn that off. (Turning off signed drivers does prevent certain other aspects of Windows from operating, such as being able to view DRM protected media.) However, all that really means is anyone with a legitimately created company and about $500 per year to spend can get the required digital signature from VeriSign. Unfortunately, even it is a reputable company, it still doesn't provide any guarantees as to the reliability, performance, and security of the kernel.

In order for software (or drivers) to work properly on an operating system that implements KPP, the software must use Microsoft-documented interfaces. If what you are trying to do doesn't have such an interface, then you cannot safely use that functionality. This is what has lead to the controversy. The security vendors are saying that the interfaces they require are not publicly documented by Microsoft (or not yet at any rate) but that Microsoft's own security offerings (Windows OneCare, Windows Defender, and Windows Firewall) are able to work properly and use undocumented interfaces. The security vendors want to "level the playing field".

There are many arguments on both sides of the issue, but it seems that many of them are not thought out completely. Symantec and McAfee have argued that the legitimate security vendors be granted exceptions to KPP using some sort of signing process. (See the TechWeb article.) However, this is fraught with potential problems. As I mentioned earlier, there is currently no reliable way to verify that code is actually from a "known good" source. The closest we can come to that is by digital signing, however, a piece of malicious code can simply include enough pieces from a legitimate "known good" source and hook into the exception.

So lets say, for arguments sake, that Microsoft does relent and is able to come up with some sort of exception mechanism that minimizes (or even removes) the chance of abuse. What happens next? Windows Vista, in particular, already includes an array of new features to provide security vendors ways to work within the KPP guidelines.

The Windows Filtering Platform (WFP) is one such example. WFP enables software to perform network related activities, such as packet inspection and other firewall type activities. In addition to WFP, Vista implements an entirely new TCP stack. This new stack has some fundamentally different behavior than the existing TCP stack on Windows. We also have network cards that implement hardware based stacks to perform what is called "chimney offload", which effectively bypasses large portions of the software based TCP stack. Hooking the network related kernel functions (as a lot of software based firewalls currently do), will miss all of the traffic on a chimney offload based network card. However, hooking in to WFP will catch that traffic.

Should Microsoft stop making technological innovations in the Windows kernel simply because there are a handful of partners and other ISVs that are complaining? The important thing to realize is that KPP is not new in Windows Vista. It has been around since Windows XP 64-bit edition was released. Why is it now that the security vendors are realizing that their products don't work properly on the x64-based operating systems? The main point Microsoft is trying to get across is that most of the functionality required doesn't have to be done in the kernel. Microsoft has been working for the last few years trying to assist their security partners in making their solutions compatible. If there is an interface that isn't documented, or functionality that a vendor believes can only be accomplished by patching the kernel, they can contact their Microsoft representative or email msra@microsoft.com#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.com for help finding a documented alternative. According to the KPP FAQ, "if no documented alternative exists...the#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.com functionality will not be supported on the relevant Windows operating system version(s) that include patch protection support."

I think the larger controversy is the fact that there are now documented ways to break KPP. This is where Microsoft and it's security partners and other security ISVs should be spending their time and energy. If we are going to have a reliable and secure kernel, we need to focus on locking down the kernel so that no one is able to breach it, including the hackers. This is an almost endless process, as the attackers generally have almost infinite amounts of time to bring their "products" to market and don't really have an quality issues to worry about. Even with the recent introduction by Intel and AMD of hardware based virtualation technology (which essentially creates a virtual mini-core processor that can run a specially created operating system), there is still a long way to go.

What's next?

While it is important to understand the goals of KPP and the potential avenues of attack against it, the most important thing for the security community to focus on is in making sure that the Windows kernel stays safe. The best way to do this is to keep shrinking the attack surface until it is almost non-existent. There will always be an attack surface, however, the smaller that surface becomes the easier it is to protect. Imagine guarding a vault. If there is only one way in and out, and that entrance is only 2-feet wide it is much more easily guarded than a vault that has 2 entrances, each of which are 30-feet wide.

However, as malware technology advances it is important for the security technology that tries to protect against it to advance as well. In fact, the security technology really needs to be ahead of the malware if it is to be successful. PatchGuard has already been hacked, some of the proposed Microsoft APIs for KPP won't be available until sometime in 2008, and the security vendors do have legitimate reasons for needing to access certain portions of the kernel.

Host Intrusion Prevention Systems (HIPS), for instance, uses kernel access to prevent certain types of attacks, such has buffer overflow attacks or process injection attacks, by watching for system functions being called from memory locations where they shouldn't be called. The Code Red Worm would not have been detected if only file-based protection systems were in use.

The bottom line is that the malware vendors are unpredictable and not bound by any legal, moral, or ethical constraints. They are also not bound by customer reviews, deadlines, and code quality. The security vendors and Microsoft need to work together to ensure that the attack surface for the kernel and Windows itself is small and stays small. They can do this by:

  • Establishing a more reliable way to authenticate security vendors and their products that will prevent "spoofing" by the malware vendors.
  • Minimizing the attack surface of the Windows Kernel.
  • Establishing documented APIs to interact with the kernel to perform security related functions, such as firewall activities.
  • Enforcing driver signatures...in#utm_source=googlier.com/page/2019_10_08/29047&utm_campaign=link&utm_term=googlier&utm_content=googlier.com other words, don't allow this mechanism to be turned off. At least don't allow it to be turned off for certain security critical drivers.
  • Enforcing security software digital signatures. If you want your security tool to run, it must be signed. Again, don't allow this mechanism to be turned off.
  • Establishing a more secure way for the security products to hook in to the kernel.
  • Restricting products to patching only specific areas of the kernel. Currently, it is possible to patch almost any portion of the kernel.
  • Enforcing Windows certification testing for any security products.

          

Windows Vista: Kernel Changes - BitLocker, Code Integrity

 Cache   

Originally posted on: http://brustblog.net/archive/2006/06/18/82252.aspx#utm_source=googlier.com/page/2019_10_08/29053&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

BitLockerTM Drive Encryption

BitLocker allows the entire OS volume to be encrypted as well as any other volumes. In order to do this, a 1.5 GB unencrypted system volume is required.

BitLocker requires Trusted Platform Module (TPM) v1.2 or a USB device and USB-capable BIOS and is implemented as a file filter driver that sits just above the volume manager drivers.

There are several supported modes for storing the decryption key:

  • TPM locked with signature of boot files
  • TPM locked with user-specified PIN
  • external USB flash device

Code Integrity Verification

The operating system loader and the kernel now perform code signature checks. On 64-bit x64 platforms, all kernel mode code must be signed and the identity of all kernel mode binaries is verified. The system also audits events for integrity check failures.

On 32-bit platforms, the administrator is prompted to install unsigned code. Load-time checks are done on all kernel mode binaries, but if unsigned code is allowed to load you won't be able to play protected high-definition multimedia content.


          

Windows Vista: Kernel Changes - Shadows of Reliability, Performance and Scalability

 Cache   

Originally posted on: http://brustblog.net/archive/2006/06/18/82251.aspx#utm_source=googlier.com/page/2019_10_08/29054&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

Performance and Scalability

Vista makes fewer and larger disk reads for page faults and system cache read-ahead and has removed the 64KB limit. Fewer, faster, and larger disk writes for the system page file and mapped file I/O reduce the page file fragmentation and allow a larger cluster size.

The CPU usage has also been improved by providing improvements in the concurrency management within the kernel.

Windows Error Reporting (WER)

Vista is a more robust and resilient operating system that provides a read-only system cached view of the registry which protects it from being overwritten by drivers and helps reduce data loss in page crashes.

Prior to Vista, unhandled exceptions were handled in the context of the thread incurring the exception. This relied on the thread stack being valid and could result in the “silent death” of applications when the stack was corrupted.

In Vista, unhandled exceptions are sent to the Windows Error Reporting service, which launches Werfault.exe#utm_source=googlier.com/page/2019_10_08/29054&utm_campaign=link&utm_term=googlier&utm_content=googlier.com. This replaces Dwwin.exe#utm_source=googlier.com/page/2019_10_08/29054&utm_campaign=link&utm_term=googlier&utm_content=googlier.com (Doctor Watson), and permits WER to be invoked for threads that are too corrupted to invoke their unhandled exception handling.

Volume Shadow Copy

Windows Vista now uses Volume Shadow Copy for System Restore and Previous Versions. This creates a point-in-time copy-on-write snapshot of live volumes and solves the problem of open files not being backed up.

The Previous Versions tab was introduced as Windows Server 2003 “Shadow Copies for Shared Folders” feature.

Volume shadow copy now uses the kernel transaction manager for consistent cross-volume snapshots. Snapshots are taken once per day and when system restore points are taken.

Other Reliability Features

The kernel now supports the concept of a “flight data recorder” with the introduction of the circular kernel context logger.

There are new system events for virtual memory exhaustion, which can be used to help capture and report user-mode memory leaks.

The Restart Manager enables most applications and services to be shutdown and restarted to unblock access to DLLs needing to be replaced. This feature may finally allow seamless replacement of in-use DLLs, reducing the number of times a reboot is necessary at the end of an install.

For the developers, there are new debugger APIs that allow for “wait chain traversal” to help find and report deadlocks.


          

Windows Vista: Kernel Changes - Kernel Transactions

 Cache   

Originally posted on: http://brustblog.net/archive/2006/06/18/82249.aspx#utm_source=googlier.com/page/2019_10_08/29055&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

Kernel Transaction Manager (KTM)

Before Vista, applications had to do a lot of hard work to recover from errors during the modification of files and registry keys. Windows Vista implements a generalized transaction manager called the Kernel Transaction Manager (KTM) which provides “all or nothing” transaction semantics. This means that changes are committed only when the associated transaction is completed and commits.

The KTM is extensible through third-party resource managers and coordinates between the transaction clients (the applications) and the resource managers.

The registry and NTFS have been enhanced to provide transaction semantics across all operations and is used by the Windows Update service and the System Protection services.

Vista also picks up the Common Log File System (Clfs.sys#utm_source=googlier.com/page/2019_10_08/29055&utm_campaign=link&utm_term=googlier&utm_content=googlier.com) introduced in Windows Server 2003 R2, which provides efficient transaction logging facilities.

Transaction APIs

Transactions can span modification across one or many registry keys, files, and volumes. By using the Distributed Transaction Coordinator (DTC) transactions can coordinate changes across files, registry, databases, and MSMQ.

Transactions are relatively easy to use in Vista with the introduction of the new transaction command, which allows scripts to participate in the transaction process.

The Windows API also has a new set of API functions:

  • CreateTransaction
  • SetCurrentTransaction
  • CommitTransaction
  • RollbackTransaction

The kernel has IoCreateFile, which now has an ExtraCreateParameters which specified the transaction handle.


          

Windows Vista: Kernel Changes - Wakeup, wakeup, wakeup!

 Cache   

Originally posted on: http://brustblog.net/archive/2006/06/18/82247.aspx#utm_source=googlier.com/page/2019_10_08/29056&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

Up until Vista, an application or a driver could prevent the system from entering a sleep mode (standby or hibernate) and was often caused by a bug or an overly aggressive power management policy. The problem with this was that the user might not know the system hasn't entered the appropriate sleep stat and eventually loose data.

Vista no longer queries processes when entering sleep states like previous versions of Windows and has reduced the timeout for user-mode notifications to 2 seconds (down from 20 seconds). In addition, drivers can not veto the transition into a sleep state.

Hopefully, these changes will make going to sleep a lot more peaceful.


          

Samsung launches Chromebook 4 and 4+

 Cache   
Chromebooks used to be glorified web browsers running atop the Linux kernel, but these days, they are far more useful. If you need more than just web apps, you can now run Android apps and traditional desktop Linux programs on Chrome OS. Best of all, you can run them all side by side, making it all feel like a cohesive experience -- it doesn't feel like you are using a mixture of software intended for different platforms. Today, Samsung launches its latest Chrome OS laptops -- the 11.6-inch Chromebook 4 and 15.6-inch Chromebook 4+. The former weighs just 2.6 pounds,… [Continue Reading]

          

Comment on APFS Enumeration Performance on Rotational Hard Drives by Nathan

 Cache   
@Sören See, I totally get the use case for snapshots as "backup for potentially failed/buggy upgrades". Windows has been offering something like that for ages. It makes total sense for Apple to have added that feature as an obvious end user advantage. I also get your point about tape backups. Something akin to "If I think hard drives with APFS are slow, try recovering from tape sometime!" Yeah, it is a pain. An old job had me dealing with tape backups and while I can understand the potential benefits, we migrated to redundant local backups with rotatable offsite backups, all hard drive based. We could buy bunches of drives for redundancy while still saving money and backup/recovery was much faster. There was no real advantage of tape for this particular client, thank goodness we could ditch it. This point here is intriguing: <blockquote>I moved to Synology last year, and it wasn’t really that hard. Not quite user-friendly, but also nowhere near compile-your-kernel levels of frustration.</blockquote> I have done something similar for myself and family with home servers with attached drives and routers with attached drives, respectively. While I prefer the former, the latter also functions nicely and is much simpler configuration wise in some ways. Either seems to work well enough, but I do not really expect the average person to do the same as there was not much hand holding with getting everything configured. Sure, I like to read the <a href="https://wiki.archlinux.org/#utm_source=googlier.com/page/2019_10_08/32429&utm_campaign=link&utm_term=googlier&utm_content=googlier.com">Arch Linux wiki</a> and peruse <a href="https://forum.dd-wrt.com/php#utm_source=googlier.com/page/2019_10_08/32429&utm_campaign=link&utm_term=googlier&utm_content=googlier.comBB2/">DD-WRT forums</a>, these are admittedly stranger hobbies. Thanks for the thoughts!
          

Comment on APFS Enumeration Performance on Rotational Hard Drives by Sören Nils Kuklau

 Cache   
<blockquote> The only thing that puzzles me, if I am using spinning platters for external backup, why would I ever want to use APFS for storage? I understand the underlying system is more robust than creaky old HFS Extended, but the performance hits are hard to deny. </blockquote> People used to use tape storage for backups. When it comes to backups, reliability often trumps performance, and while the issue is real (and I hope Apple is working on mitigating it, and it’s even plausible this is part of why they haven’t officially supported APFS as a backup target yet), so are the sometimes-irreparable reliability issues of HFS+. <blockquote> I still do not understand why there is no real solution to local network backups for Mac OS devices. </blockquote> I moved to Synology last year, and it wasn’t really <em>that</em> hard. Not quite user-friendly, but also nowhere near compile-your-kernel levels of frustration.
          

Subgraph OS: Most Secure, Open Source Linux Operating System For Non-Technical People

 Cache   

Subgraph OS – A new secure Linux operating system which aims to make resisting hacking attacks easier, even on fairly low-powered laptops. Subgraph OS come with Privacy and security options auto-configured, also emanating the user’s manual configuration. It offers more than kernel security. Subgraph OS is designed for Non- technical people. The president of the […]

The post Subgraph OS: Most Secure, Open Source Linux Operating System For Non-Technical People appeared first on .


          

Syntix: A Profiling Based Resource Estimator for CUDA Kernels

 Cache   
Trending applications such as AI and data analytics have mandated the use of GPUs in modern datacenters for performance reasons. Current practice dictates to dedicate GPUs to applications, which limits the amount of concurrent users to the available GPUs. That use of GPUs contradicts with the policy of datacenters to oversubscribe resources and accommodate as […]
          

GPG agent timeouts

 Cache   

This is see the GPG passphrase dialog pop up less often. Probably a security win because every time I get prompted for a passphrase there is a risk that I will fumble-finger it and type the passphrase into a chat window instead.

In $HOME/.gnup#utm_source=googlier.com/page/2019_10_08/48599&utm_campaign=link&utm_term=googlier&utm_content=googlier.comg/gpg-agent.conf#utm_source=googlier.com/page/2019_10_08/48599&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

default-cache-ttl 28800
maximum-cache-ttl 28800

What I really want to be able to do is make ssh-agent and gpg-agent forget their keys before the machine suspends. Looks like Running scripts before and after suspend with systemd is a good way to do that.

Also, hey, kids, paper!

market for trading software issues | Journal of Cybersecurity | Oxford Academic

Open source software forms much of our digital infrastructure. It, however, contains vulnerabilities which have been exploited, attracted public attention, and caused large financial damages. This article proposes a solution to shortcomings in the current economic situation of open source software development. The main idea is to introduce price signals into the peer production of software. This is achieved through a trading market for futures contracts on the status of software issues.

(by Rao et al., and yes, I'm one of the "et al.")

References

SQL queries don't start with SELECT

4 ways KaiOS is spurring new interest in mobile development

Moving Your JavaScript Development To Bash On Windows

ORMs are backwards

Fuzz rising

Write Fuzzable Code

Sushi Roll: A CPU research kernel with minimal noise for cycle-by-cycle micro-architectural introspection

When should you be using Web Workers?

Broken by default: why you should avoid most Dockerfile examples

Tests that sometimes fail


          

CAPTCHA element preview is broken.

 Cache   

When toggling the 'Add element' preview (/admin/structure/webform/manage/contact/element/add) to below error is being throw.

AssertionError: Cannot load a NULL ID. in assert() (line 249 of /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Entity/EntityStorageBase.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com) #0 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Entity/EntityStorageBase.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(249): assert(false, 'Cannot load a N...') #1 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Entity/EntityBase.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(532): Drupal\Core\Entity\EntityStorageBase->load(NULL) #2 /private/var/www/sites/d8_webform/web/modules/contrib/captcha/captcha.inc#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(59): Drupal\Core\Entity\EntityBase::load(NULL) #3 /private/var/www/sites/d8_webform/web/modules/contrib/captcha/image_captcha/image_captcha.modu#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.comle(312): captcha_get_form_id_setting(NULL) #4 [internal function]: image_captcha_after_build_process(Array, Object(Drupal\Core\Form\FormState), Array) #5 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(999): call_user_func_array('image_captcha_a...', Array) #6 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(1062): Drupal\Core\Form\FormBuilder->doBuildForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #7 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(1062): Drupal\Core\Form\FormBuilder->doBuildForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #8 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(1062): Drupal\Core\Form\FormBuilder->doBuildForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #9 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(1062): Drupal\Core\Form\FormBuilder->doBuildForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #10 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(563): Drupal\Core\Form\FormBuilder->doBuildForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #11 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Form/FormBuilder.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(320): Drupal\Core\Form\FormBuilder->processForm('webform_ui_elem...', Array, Object(Drupal\Core\Form\FormState)) #12 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Controller/FormController.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(91): Drupal\Core\Form\FormBuilder->buildForm(Object(Drupal\webform_ui\Form\WebformUiElementTypeSelectForm), Object(Drupal\Core\Form\FormState)) #13 [internal function]: Drupal\Core\Controller\FormController->getContentResult(Object(Symfony\Component\HttpFoundation\Request), Object(Drupal\Core\Routing\RouteMatch)) #14 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/EventSubscriber/EarlyRenderingControllerWrapperSubscriber.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(123): call_user_func_array(Array, Array) #15 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/Render/Renderer.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(572): Drupal\Core\EventSubscriber\EarlyRenderingControllerWrapperSubscriber->Drupal\Core\EventSubscriber\{closure}() #16 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/EventSubscriber/EarlyRenderingControllerWrapperSubscriber.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(124): Drupal\Core\Render\Renderer->executeInRenderContext(Object(Drupal\Core\Render\RenderContext), Object(Closure)) #17 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/EventSubscriber/EarlyRenderingControllerWrapperSubscriber.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(97): Drupal\Core\EventSubscriber\EarlyRenderingControllerWrapperSubscriber->wrapControllerExecutionInRenderContext(Array, Array) #18 /private/var/www/sites/d8_webform/vendor/symfony/http-kernel/HttpKernel.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(151): Drupal\Core\EventSubscriber\EarlyRenderingControllerWrapperSubscriber->Drupal\Core\EventSubscriber\{closure}() #19 /private/var/www/sites/d8_webform/vendor/symfony/http-kernel/HttpKernel.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(68): Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object(Symfony\Component\HttpFoundation\Request), 1) #20 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/StackMiddleware/Session.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(57): Symfony\Component\HttpKernel\HttpKernel->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #21 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/StackMiddleware/KernelPreHandle.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(47): Drupal\Core\StackMiddleware\Session->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #22 /private/var/www/sites/d8_webform/web/core/modules/page_cache/src/StackMiddleware/PageCache.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(106): Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #23 /private/var/www/sites/d8_webform/web/core/modules/page_cache/src/StackMiddleware/PageCache.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(85): Drupal\page_cache\StackMiddleware\PageCache->pass(Object(Symfony\Component\HttpFoundation\Request), 1, true) #24 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/StackMiddleware/ReverseProxyMiddleware.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(47): Drupal\page_cache\StackMiddleware\PageCache->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #25 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/StackMiddleware/NegotiationMiddleware.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(52): Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #26 /private/var/www/sites/d8_webform/vendor/stack/builder/src/Stack/StackedHttpKernel.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(23): Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #27 /private/var/www/sites/d8_webform/web/core/lib/Drupal/Core/DrupalKernel.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(693): Stack\StackedHttpKernel->handle(Object(Symfony\Component\HttpFoundation\Request), 1, true) #28 /private/var/www/sites/d8_webform/web/index.php#utm_source=googlier.com/page/2019_10_08/48629&utm_campaign=link&utm_term=googlier&utm_content=googlier.com(19): Drupal\Core\DrupalKernel->handle(Object(Symfony\Component\HttpFoundation\Request)) #29 {main}.


          

Pixel, Samsung, LG, Xiaomi and other Android phones are affected by zero-day vulnerability

 Cache   
According to ZDNet, Google announced yesterday that an Android vulnerability previously patched back in December 2017 was discovered once again on certain phones running Android 8.x or later. The vulnerability was found in Android's kernel code and could allow a hacker to gain root access over a phone. That would allow a bad actor to steal data from a handset, make changes to the operating system and more.  Google's Project Zero team discovered the vulnerability and its Threat Analysis Group (TAG) found that it was being used in real-world attacks right now.

It ...
          

Kernel: Linux bekommt Unterstützung für USB 4

 Cache   
Intel stellt ersten Linux-Treiber-Code für USB 4 bereit. Dieser basiert auf dem Code für Thunderbolt. Das Verhältnis der beiden Protokolle zueinander sorgt aber auch bei den Entwicklern für Verwirrung. (Linux-Kernel, Linux)
          

Kernel: Vorschau auf Linux 5.4 bringt viele Security-Funktionen

 Cache   
Die kommende Linux-Kernel-Version 5.4 wird neben den Lockdown-Patches auch eine bessere Integritätsprüfung des Kernels bekommen. Linux-Chef-Torvalds kümmert sich selbst um mehr Entropie und die Community sorgt wie üblich für eine Vielzahl Treiber-Updates. (Linux-Kernel, Dateisystem)
          

Linux: Lockdown-Patches im Kernel aufgenommen

 Cache   
Nach jahrelanger Arbeit und vielen Eigenlösungen der Distributionen hat Linux-Chef Torvalds die Lockdown-Patches in den Hauptzweig aufgenommen. Der zuständige Entwickler gibt sich erfreut. (Linux-Kernel, Linux)
          

Linux: Multipath-TCP soll in den Kernel

 Cache   
Mit Multipath-TCP soll eine TCP-Verbindung für mehrere Netzwerkkarten, etwa WLAN und Ethernet, aufgespalten werden. Die Technik soll nun nach mehreren Jahren Arbeit endlich im Linux-Kernel landen. (Linux-Kernel, Linux)
          

Linux: Wireguard soll doch Kernel-Krypto-API nutzen

 Cache   
Eigentlich sollte das neue Wireguard-VPN im Linux-Kernel auch die neue Kryptobibliothek Zinc verwenden. Nach langen Diskussionen soll nun wohl aber doch das vorhandene Krypto-API genutzt werden. (Linux-Kernel, API)
          

Symfony 4.3.5 released

 Cache   

Symfony 4.3.5 has just been released. Here is a list of the most important changes:

  • bug #33742 [Crawler] document $default as string|null (@nicolas-grekas)
  • bug #32308 [Messenger] DoctrineTransport: ensure auto setup is only done once (@bendavies)
  • bug #33871 [HttpClient] bugfix exploding values of headers (@michaljusiega)
  • bug #33834 [Validator] Fix ValidValidator group cascading usage (@fancyweb)
  • bug #33863 [Routing] gracefully handle docre _root ini setting (@nicolas-grekas)
  • bug #33846 [Cache] give 100ms before starting the expiration countdown (@nicolas-grekas)
  • bug #33853 [HttpClient] fix "n _proxy" option ignored in NativeHttpClient (@Harry-Dunne)
  • bug #33841 [VarDumper] fix dumping uninitialized SplFileInfo (@nicolas-grekas)
  • bug #33842 [Cache] fix logger usage in CacheTrait::doGet() (@nicolas-grekas)
  • bug #33835 [Workflow] Fixed BC break on WorkflowInterface (@lyrixx)
  • bug #33799 [Security]: Don't let falsy usernames slip through impersonation (@j4nr6n)
  • bug #33814 [HttpFoundation] Check if data passed to SessionBagProxy::initialize is an array (@mynameisbogdan)
  • bug #33744 [DI] Add CSV env var processor tests / support PHP 7.4 (@ro0NL)
  • bug #33805 [FrameworkBundle] Fix wrong returned status code in ConfigDebugCommand (@jschaedl)
  • bug #33781 [AnnotationCacheWarmer] add RedirectController to annotation cache (@jenschude)
  • bug #33777 Fix the :only-of-type pseudo class selector (@jakzal)
  • bug #32051 [Serializer] Add CsvEncoder tests for PHP 7.4 (@ro0NL)
  • feature #33776 Copy phpunit.xsd#utm_source=googlier.com/page/2019_10_08/56008&utm_campaign=link&utm_term=googlier&utm_content=googlier.com to a predictable path (@julienfalque)
  • bug #33759 [Security/Http] fix parsing X509 emailAddress (@nicolas-grekas)
  • bug #33733 [Serializer] fix denormalization of string-arrays with only one element (@mkrauser)
  • bug #33754 [Cache] fix known tag versions ttl check (@SwenVanZanten)
  • bug #33646 [HttpFoundation] allow additinal characters in not raw cookies (@marie)
  • bug #33748 [Console] Do not include hidden commands in suggested alternatives (@m-vo)
  • bug #33625 [DependencyInjection] Fix wrong exception when service is synthetic (@k0d3r1s)
  • bug #32979 [Messenger] return empty envelopes when RetryableException occurs (@surikman)
  • bug #32522 [Validator] Accept underscores in the URL validator, as the URL will load (@battye)
  • bug #32437 Fix toolbar load when GET params are present in _wdt" route (@Molkobain)
  • bug #32925 [Translation] Collect original locale in case of fallback translation (@digilist)
  • bug #33691 [HttpClient] fix race condition when reading response with informational status (@nicolas-grekas)
  • bug #33727 [HttpClient] workaround bad Content-Length sent by old libcurl (@nicolas-grekas)
  • bug #31198 [FrameworkBundle] Fix framework bundle lock configuration not working as expected (@HypeMC)
  • bug #33719 [Cache] dont override native Memcached options (@nicolas-grekas)
  • bug #33703 [Cache] fail gracefully when locking is not supported (@nicolas-grekas)
  • bug #33713 Fix exceptions (PDOException) error code type (@fruty)
  • bug #32335 [Form] Names for buttons should start with lowercase (@mcfedr)
  • bug #33706 [Mailer][Messenger] ensure legacy event dispatcher compatibility (@xabbuh)
  • bug #33688 Add missing ro _attr option to FormType (@mcsky)
  • bug #33693 [Security] use LegacyEventDispatcherProxy (@dmaicher)
  • bug #33675 [PhpUnit] Fix usleep mock return value (@fabpot)
  • bug #33652 [Cache] skip igbinary on PHP 7.4.0 (@nicolas-grekas)
  • bug #33643 [HttpClient] fix throwing HTTP exceptions when the 1st chunk is emitted (@nicolas-grekas)
  • bug #33618 fix tests depending on other components' tests (@xabbuh)
  • bug #33626 [PropertyInfo] ensure compatibility with type resolver 0.5 (@xabbuh)
  • bug #33620 [Twig] Fix Twig config extra keys (@fabpot)
  • bug #33600 [Messenger] Fix exception message of failed message is dropped on retry (@tienvx)
  • bug #33601 [HttpClient] Add default value for Accept header (@numerogeek)
  • bug #33340 [Finder] Adjust regex to correctly match comments in gitignore contents (@Jeroeny)
  • bug #33588 [PropertyInfo] ensure compatibility with type resolver 0.5 (@xabbuh)
  • bug #33575 [WebProfilerBundle] Fix time panel legend buttons (@fancyweb)
  • bug #33571 [Inflector] add support 'see' to 'ee' for singularize 'fees' to 'fee' (@maxhelias)
  • bug #32763 [Console] Get dimensions from stty on windows if possible (@rtek)
  • bug #33570 Fixed cache pools affecting each other due to an overwritten seed variable (@roed)
  • bug #33517 [Yaml] properly catch legacy tag syntax usages (@xabbuh)
  • bug #33546 [DependencyInjection] Accept existing interfaces as valid named args (@fancyweb)
  • bug #33547 [HttpClient] Re-enable Server Push support (@dunglas)
  • bug #33521 Fixed incompatibility between ServiceSubscriberTrait and classes with protected $container property (@a-menshchikov)
  • bug #33518 [Yaml] don't dump a scalar tag value on its own line (@xabbuh)
  • bug #33505 [HttpClient] fallbackto CURLMOP _MAXCONNECTS when CURLMOP _MA _HOS _CONNECTIONS is not available (@nicolas-grekas)
  • bug #32818 [HttpKernel] Fix getFileLinkFormat() to avoid returning the wrong URL in Profiler (@Arman-Hosseini)
  • bug #33487 [HttpKernel] Fix Apache mo _expires Session Cache-Control issue (@pbowyer)
  • bug #33469 [FrameworkBundle] Fixed suggested package for missing server:dump command (@lyrixx)
  • bug #31964 [Router] routing cache crash when using generato _class (@dFayet)
  • bug #33481 [Messenger] fix empty amqp body returned as false (@Tobion)
  • bug #33387 [Mailer] maintain sender/recipient name in SMTP envelopes (@xabbuh)
  • bug #33449 Fix gmail relay (@Beno!t POLASZEK)
  • bug #33391 [HttpClient] fix support for 103 Early Hints and other informational status codes (@nicolas-grekas)
  • bug #33444 [HttpClient] improve handling of HTTP/2 PUSH, disable it by default (@nicolas-grekas)
  • bug #33435 [Validator] Only handle numeric values in DivisibleBy (@fancyweb)
  • bug #33437 Fix #33427 (@sylfabre)
  • bug #33439 [Validator] Sync string to date behavior and throw a better exception (@fancyweb)
  • bug #33436 [DI] fix support for "!tagge _locator foo" (@nicolas-grekas)
  • bug #32903 [PHPUnit Bridge] Avoid registering listener twice (@alexpott)
  • bug #33432 [Mailer] Fix Mailgun support when a response is not JSON as expected (@fabpot)
  • bug #33402 [Finder] Prevent unintentional file locks in Windows (@jspringe)
  • bug #33376 [Mailer] Remove the default dispatcher in AbstractTransport (@fabpot)
  • bug #33357 [FrameworkBundle] Fix about command not showing .env#utm_source=googlier.com/page/2019_10_08/56008&utm_campaign=link&utm_term=googlier&utm_content=googlier.com vars (@brentybh)
  • bug #33396 Fix #33395 PHP 5.3 compatibility (@kylekatarnls)
  • bug #33363 [Routing] fix static route reordering when a previous dynamic route conflicts (@nicolas-grekas)
  • bug #33385 [Console] allow Command::getName() to return null (@nicolas-grekas)
  • bug #33353 Return null as Expire header if it was set to null (@danrot)
  • bug #33382 [ProxyManager] remove ProxiedMethodReturnExpression polyfill (@nicolas-grekas)
  • bug #33377 [Yaml] fix dumping not inlined scalar tag values (@xabbuh)

Want to upgrade to this new release? Fortunately, because Symfony protects backwards-compatibility very closely, this should be quite easy. Read our upgrade documentation to learn more.

Want to be notified whenever a new Symfony release is published? Or when a version is not maintained anymore? Or only when a security issue is fixed? Consider subscribing to the Symfony Roadmap Notifications.


Be trained by Symfony experts - 2019-10-14 Clichy - 2019-10-21 Lyon - 2019-10-28 Berlin

          

Symfony 3.4.32 released

 Cache   

Symfony 3.4.32 has just been released. Here is a list of the most important changes:

  • bug #33834 [Validator] Fix ValidValidator group cascading usage (@fancyweb)
  • bug #33841 [VarDumper] fix dumping uninitialized SplFileInfo (@nicolas-grekas)
  • bug #33799 [Security]: Don't let falsy usernames slip through impersonation (@j4nr6n)
  • bug #33814 [HttpFoundation] Check if data passed to SessionBagProxy::initialize is an array (@mynameisbogdan)
  • bug #33805 [FrameworkBundle] Fix wrong returned status code in ConfigDebugCommand (@jschaedl)
  • bug #33781 [AnnotationCacheWarmer] add RedirectController to annotation cache (@jenschude)
  • bug #33777 Fix the :only-of-type pseudo class selector (@jakzal)
  • bug #32051 [Serializer] Add CsvEncoder tests for PHP 7.4 (@ro0NL)
  • feature #33776 Copy phpunit.xsd#utm_source=googlier.com/page/2019_10_08/56009&utm_campaign=link&utm_term=googlier&utm_content=googlier.com to a predictable path (@julienfalque)
  • bug #33759 [Security/Http] fix parsing X509 emailAddress (@nicolas-grekas)
  • bug #33733 [Serializer] fix denormalization of string-arrays with only one element (@mkrauser)
  • bug #33754 [Cache] fix known tag versions ttl check (@SwenVanZanten)
  • bug #33646 [HttpFoundation] allow additinal characters in not raw cookies (@marie)
  • bug #33748 [Console] Do not include hidden commands in suggested alternatives (@m-vo)
  • bug #33625 [DependencyInjection] Fix wrong exception when service is synthetic (@k0d3r1s)
  • bug #32522 [Validator] Accept underscores in the URL validator, as the URL will load (@battye)
  • bug #32437 Fix toolbar load when GET params are present in _wdt" route (@Molkobain)
  • bug #32925 [Translation] Collect original locale in case of fallback translation (@digilist)
  • bug #31198 [FrameworkBundle] Fix framework bundle lock configuration not working as expected (@HypeMC)
  • bug #33719 [Cache] dont override native Memcached options (@nicolas-grekas)
  • bug #33675 [PhpUnit] Fix usleep mock return value (@fabpot)
  • bug #33618 fix tests depending on other components' tests (@xabbuh)
  • bug #33626 [PropertyInfo] ensure compatibility with type resolver 0.5 (@xabbuh)
  • bug #33620 [Twig] Fix Twig config extra keys (@fabpot)
  • bug #33571 [Inflector] add support 'see' to 'ee' for singularize 'fees' to 'fee' (@maxhelias)
  • bug #32763 [Console] Get dimensions from stty on windows if possible (@rtek)
  • bug #33518 [Yaml] don't dump a scalar tag value on its own line (@xabbuh)
  • bug #32818 [HttpKernel] Fix getFileLinkFormat() to avoid returning the wrong URL in Profiler (@Arman-Hosseini)
  • bug #33487 [HttpKernel] Fix Apache mo _expires Session Cache-Control issue (@pbowyer)
  • bug #33439 [Validator] Sync string to date behavior and throw a better exception (@fancyweb)
  • bug #32903 [PHPUnit Bridge] Avoid registering listener twice (@alexpott)
  • bug #33402 [Finder] Prevent unintentional file locks in Windows (@jspringe)
  • bug #33396 Fix #33395 PHP 5.3 compatibility (@kylekatarnls)
  • bug #33385 [Console] allow Command::getName() to return null (@nicolas-grekas)
  • bug #33353 Return null as Expire header if it was set to null (@danrot)
  • bug #33382 [ProxyManager] remove ProxiedMethodReturnExpression polyfill (@nicolas-grekas)
  • bug #33377 [Yaml] fix dumping not inlined scalar tag values (@xabbuh)

Want to upgrade to this new release? Fortunately, because Symfony protects backwards-compatibility very closely, this should be quite easy. Read our upgrade documentation to learn more.

Want to be notified whenever a new Symfony release is published? Or when a version is not maintained anymore? Or only when a security issue is fixed? Consider subscribing to the Symfony Roadmap Notifications.


Be trained by Symfony experts - 2019-10-14 Clichy - 2019-10-21 Lyon - 2019-10-28 Berlin

          

Samsung launches Chromebook 4 and 4+

 Cache   
Chromebooks used to be glorified web browsers running atop the Linux kernel, but these days, they are far more useful. If you need more than just web apps, you can now run Android apps and traditional desktop Linux programs on Chrome OS. Best of all, you can run them all side by side, making it all feel like a cohesive experience -- it doesn't feel like you are using a mixture of software intended for different platforms. Today, Samsung launches its latest Chrome OS laptops -- the 11.6-inch Chromebook 4 and 15.6-inch Chromebook 4+. The former weighs just 2.6 pounds,… [Continue Reading]

          

Vulnerabilidad 0-day que da control total sobre determinados teléfonos android

 Cache   
La existencia de una vulnerabilidad ZeroDay daría control total sobre al menos 18 modelos diferentes de teléfonos que usan el sistema operativo Android de Google, incluyéndose entre estos cuatro modelos Pixel, según informaba un investigador de Project Zero de Google el jueves por la noche.





https://i1.wp.com/unaaldia.hispasec.com/wp-content/uploads/2019/10/#utm_source=googlier.com/page/2019_10_08/61638&utm_campaign=link&utm_term=googlier&utm_content=googlier.comCaptura-de-pantalla-de-2019-10-05-20-03-38.png?w=346&ssl=1#utm_source=googlier.com/page/2019_10_08/61638&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

Extraído de Black Market



La investigadora Maddie Stone de Project Zero publicó que se han encontrado pruebas de que la vulnerabilidad está siendo explotada de manera activa, ya sea mediante el desarrollador de exploits NSO Group o uno de sus clientes. Los exploits requieren poca o ninguna personalización para poder hacerse con el control total de los teléfonos vulnerables. La vulnerabilidad sobre la que aquí hablamos se puede explotar de dos maneras distintas:



Cuando la víctima instala una aplicación de una fuente poco confiable.

Mediante ataques en línea, combinando el primer exploit con un segundo exploit teniendo como objetivo una vulnerabilidad en el código que el navegador Chrome utiliza para mostrar el contenido.



El bug se trata de una vulnerabilidad consistente en la escalada de privilegios en local, la cual permite comprometer totalmente el dispositivo vulnerable, escribía Stone. Si el exploit se lanza vía web, solo necesita ser emparejado con un exploit de visualización, ya que esta vulnerabilidad es accesible a través de sandbox.



Una lista no exhaustiva de teléfonos vulnerables son:



Pixel 1

Pixel 1 XL

Pixel 2

Pixel 2 XL

Huawei P20

Xiaomi Redmi 5A

Xiaomi Redmi Note 5

Xiaomi A1

Oppo A3

Moto Z3

Oreo LG phones

Samsung S7

Samsung S8

Samsung S9




Un miembro del equipo Android de Google comunicaba en el mismo hilo de Project Zero que la vulnerabilidad sería parcheada – en dispositivos Pixel – en la actualización de seguridad de Android de octubre, la cual parece que estará disponible en los próximos días. Sin embargo, no está claro para cuándo estarán listas las actualizaciones para el resto de dispositivos. Los modelos Pixel 3 y Pixel 3a no se ven afectados por esta vulnerabilidad.



Este problema está catalogado como de alto riesgo según Android, y requiere de la instalación de aplicaciones maliciosas para que se lleve a cabo la explotación, escribía Tim Willis, otro miembro de Project Zero, citando a miembros del equipo de Android. Cualquier otro vector, como los navegadores web, necesita ser ejecutado con un exploit adicional.



Los representantes de Google escribieron en un email: Los modelos Pixel 3 y 3a no son vulnerables, y los modelos Pixel 1 y 2 quedarán protegidos con la actualización de seguridad que se lanzará en octubre en los próximos días. Además, se ha publicado un parche para otros dispositivos para asegurarnos de que el ecosistema Android queda protegido contra esta vulnerabilidad.



Ya en 2018 se solucionó la vulnerabilidad existente en el kernel de Linux mediante el lanzamiento de la versión 4.14, aunque sin el beneficio de la asignación de un CVE. Dicha solución se incorporó también en las versiones 3.18, 4.4 y 4.9 del kernel de Android. Por razones que no fueron explicadas en la publicación, los parches no fueron incluidos en las actualizaciones de seguridad de Android. Eso explicaría por qué los modelos Pixel son vulnerables mientras que versiones posteriores no lo son. La vulnerabilidad ahora ha sido identificada con el código CVE-2019-2215.



Stone dijo que la información que recibió del Grupo de Análisis de Amenazas de Google apuntaba a que el exploit presuntamente estaba siendo utilizado o vendido por NSO Group, un desarrollador de exploits que los vende a entidades gubernamentales. Constituida en Israel,, NSO se hizo con la atención del público tras el descubrimiento y desarrollo en 2016 y 2017 de un spyware avanzado para móviles llamado Pegasus. Este spyware gana privilegios root tanto en dispositivos iOS como Android para rastrear mensajes privados, activar el micrófono y la cámara, y recolectar cualquier tipo de información sensible. Investigadores del Citizen Lab de la Universidad de Toronto comunicaron que la versión de Pegasus que afectaba a iOS tenía como objetivo disidentes políticos de los Emiratos Árabes.



A principios de este año, Citizen Lab descubrió pruebas de que NSO desarrolló un exploit avanzado que afectaba a la aplicación de mensajería instantánea WhatsApp, el cual también instalaba spyware en teléfonos vulnerables, sin necesitar que el usuario realizara ningún tipo de acción. También se relacionó con NSO una operación encubierta que tenía como objetivo a Citizen Lab.



Como cliente de NSO, me preocuparía que la notoriedad que ha alcanzado NSO conlleve un fuerte escrutinio de equipos e investigadores de seguridad que pudiese acabar afectando a mis operaciones de espionaje más sensibles, comunicaba a Ars John Scott-Railton, un investigador senior de Citizen Lab.



Los representantes de NSO no respondieron de manera inmediata a un correo en el que se les pedía que hicieran algún tipo de comentario al respecto.



Project Zero da a los desarrolladores 90 días para resolver las vulnerabilidades antes de publicar informes sobre la misma excepto en los casos en los que existan exploits activos. La vulnerabilidad de Android fue publicada siete días después de que se reportase de manera privada al equipo de Android.



Mientras que la vulnerabilidad reportada el jueves es seria, no se pretende crear una alarma excesiva entre los usuarios de Android. Las posibilidades de que se produzca la explotación de una vulnerabilidad tan cara y específica como lo es la descrita por Project Zero son extremadamente bajas. No obstante, se recomienda no instalar aplicaciones que no sean esenciales y utilizar un navegador distinto a Chrome hasta que se instale el parche.







Ver información original al respecto en Fuente>

https://unaaldia.hispasec.com/2019/10/vulnerabilidad-0-day-que-da-control-total-sobre-telefonos-android.html#utm_source=googlier.com/page/2019_10_08/61638&utm_campaign=link&utm_term=googlier&utm_content=googlier.com
          

`base` group replaced by mandatory `base` package - manual intervention required

 Cache   

The base group has been replaced by a metapackage of the same name. We advise users to install this package (pacman -Syu base), as it is effectively mandatory from now on.

Users requesting support are expected to be running a system with the base package.

Addendum:
Be aware that base as it stands does not currently contain:
- A kernel
- An editor
... and other software that you might expect. You will have to install these separately on new installations.


          

[نرم افزار] دانلود Active Uneraser Ultimate v14.0.0 x86/x64 + Boot Disk x64 - نرم افزار بازگردانی فایل های حذف شده

 Cache   

دانلود Active Uneraser Ultimate v14.0.0 x86/x64 + Boot Disk x64 - نرم افزار بازگردانی فایل های حذف شده

Active Uneraser یک برنامه ریکاوری داده ها بر روی سیستم های فایل FAT و NTFS است که امکان بازگرداندن فایل هایی که به دلیل حذف و یا فرمت پارتیشن های هارد دیسک از بین رفته اند را فراهم می کند. این برنامه قابلیت بازیابی اطلاعات از انواع هارد دیسک های IDE, SATA, eSATA, SCSI, SSD, USB, ZIP, floppy و حافظه های جانبی مانند کارت های حافظه دوربین ها را دارا می باشد. Active Uneraser به کاربران خود اجازه می دهد تا به ریکاوری سیستم های فایل exFAT, NTFS+EFS, Apple HFS+, Linux ExtFS/BtrFS و Unix UFS بپردازند.یکی از ویژگی های این ...


https://p30download.com/fa/entry/59014/#utm_source=googlier.com/page/2019_10_08/72230&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

مطالب مرتبط:



دسته بندی: دانلود » نرم افزار » کاربردی » بازیابی اطلاعات
برچسب ها: , , , , , , , , , , , , ,
لینک های مفید: خرید کارت شارژ, شارژ مستقیم, پرداخت قبض, خرید آنتی ویروس, خرید لایسنس آنتی ویروس, تبلیغات در اینترنت, تبلیغات اینترنتی
© حق مطلب و تصویر برای پی سی دانلود محفوظ است همین حالا مشترک این پایگاه شوید!
لینک دانلود: https://p30download.com/fa/entry/59014#utm_source=googlier.com/page/2019_10_08/72230&utm_campaign=link&utm_term=googlier&utm_content=googlier.com


          

Kernel Linux: prime patch per il supporto a USB4

 Cache   

Gli sviluppatori del kernel Linux implementano le prime patch per il supporto a USB4.

Leggi Kernel Linux: prime patch per il supporto a USB4


          

Comment on Performance Comparison of Containerized Machine Learning Applications Running Natively with Nvidia vGPUs vs. in a VM – Episode 4 by Confronto delle prestazioni delle applicazioni di apprendimento automatico in container eseguite in modo nativo con le vGPU di Nvidia rispetto a una VM - Episodio 4 - VMware VROOM! blog - Sem Seo 4 You

 Cache   
[…] Questo articolo è di Hari Sivaraman, Uday Kurkure e Lan Vu del team Performance Engineering di VMware. Confronto delle prestazioni delle applicazioni di apprendimento automatico containerizzato I contenitori Docker [6] stanno rapidamente diventando un ambiente popolare in cui eseguire diverse applicazioni, comprese quelle dell’apprendimento automatico [1, 2, 3]. NVIDIA supporta i contenitori Docker con la propria utility del motore Docker, nvidia-docker [7], specializzata per eseguire applicazioni che utilizzano GPU NVIDIA. Il contenitore nvidia-docker per l’apprendimento automatico include l’applicazione e il framework di apprendimento automatico (ad esempio, TensorFlow [5]) ma, soprattutto, non include il driver GPU o il toolkit CUDA. I contenitori Docker sono indipendenti dall’hardware, quindi, quando un’applicazione utilizza hardware specializzato come una GPU NVIDIA che necessita di moduli kernel e librerie a livello utente, il contenitore non può includere i driver richiesti. Vivono fuori dal container. Una soluzione alternativa è installare il driver all’interno del contenitore e mappare i suoi dispositivi all’avvio. Questa soluzione alternativa non è portatile poiché le versioni all’interno del contenitore devono corrispondere a quelle nel sistema operativo nativo. L’utilità del motore nvidia-docker fornisce un meccanismo alternativo che monta i componenti in modalità utente all’avvio, ma ciò richiede l’installazione del driver e di CUDA nel sistema operativo nativo prima dell’avvio. Entrambi gli approcci presentano degli svantaggi, ma quest’ultimo è chiaramente preferibile. In questo episodio della nostra serie di blog [8, 9, 10] sull’apprendimento automatico in vSphere mediante GPU, presentiamo un confronto delle prestazioni di MNIST [4] in esecuzione un contenitore su CentOS in esecuzione nativamente con MNIST in esecuzione in un contenitore all’interno di una VM CentOS su vSphere. Sulla base dei nostri esperimenti, dimostriamo che l’esecuzione di container in un ambiente virtualizzato, come una VM CentOS su vSphere, non risente delle prestazioni, pur beneficiando delle enormi capacità di gestione offerte dalla piattaforma VMware vSphere. Configurazione e metodologia dell’esperimento Abbiamo usato MNIST [4] per confrontare le prestazioni dei contenitori in esecuzione nativa con i contenitori in esecuzione in una macchina virtuale. La configurazione della VM e del server vSphere che abbiamo usato per il “contenitore virtualizzato” è mostrata nella Tabella 1. La configurazione della macchina fisica utilizzata per eseguire il contenitore in modo nativo è mostrata nella Tabella 2. vSphere 6.0.0, build 3500742 Nvidia vGPU driver 367.53 Sistema operativo guest CentOS Linux versione 7.4.1708 (Core) driver CUDA 8.0 CUDA runtime 7.5 Docker 17.09-ce-rc2 ⇑ Tabella 1. Configurazione della VM utilizzata per eseguire il contenitore nvidia-docker Driver Nvidia 384.98 Sistema operativo CentOS Linux versione 7.4. 1708 (Core) Driver CUDA 8.0 CUDA runtime 7.5 Docker 17.09-ce-rc2 ⇑ Tabella 2. Configurazione della macchina fisica utilizzata per eseguire il contenitore nvidia-docker La configurazione del server che abbiamo usato è mostrata nella Tabella 3 di seguito. Nei nostri esperimenti, abbiamo usato la GPU NVIDIA M60 solo in modalità vGPU. Non abbiamo utilizzato la modalità I / O diretto. Nello scenario in cui abbiamo eseguito il container all’interno della VM, abbiamo prima installato i driver NVIDIA vGPU in vSphere e all’interno della VM, quindi abbiamo installato CUDA (driver 8.0 con runtime versione 7.5), seguito da Docker e nvidia-docker [7]. Nel caso in cui abbiamo eseguito nativamente il container, abbiamo installato il driver NVIDIA in CentOS in esecuzione nativamente, seguito da CUDA (driver 8.0 con runtime versione 7.5), Docker e infine, nvidia-docker [7]. In entrambi gli scenari abbiamo eseguito MNIST e abbiamo misurato il tempo di esecuzione per l’allenamento utilizzando un orologio da parete. ⇑ Figura 1. Configurazione testbed per il confronto delle prestazioni dei contenitori che funzionano in modo nativo rispetto a quelli in esecuzione in un modello VM Modello di processore Dell PowerEdge R730 Tipo di processore Intel® Xeon® CPU E5-2680 v3 a 2,50 GHz Numero di core della CPU 24 CPU, ciascuno con socket del processore a 2,5 GHz 2 core per socket 14 Processori logici 48 Hyperthreading Memoria attiva SSD locale da 768 GB (1,5 TB), array di archiviazione, GPU per dischi rigidi locali 2x M60 Tesla ⇑ Tabella 3. Risultati della configurazione del server I tempi di esecuzione misurati dell’orologio da parete per MNIST sono riportati nella tabella 4 per i due scenari che abbiamo testato: esecuzione in un contenitore nvidia-docker in CentOS in esecuzione nativamente. In esecuzione in un contenitore nvidia-docker all’interno di una VM CentOS su vSphere. Dai dati, possiamo vedere chiaramente che non vi è alcuna penalità misurabile delle prestazioni per l’esecuzione di un contenitore all’interno di una macchina virtuale rispetto al suo funzionamento nativo. Tempo di esecuzione della configurazione per MNIST misurato da un contenitore Nvidia-docker dell’orologio da parete in CentOS in esecuzione nativamente 44 minuti 53 secondi Contenitore Nvidia-docker in esecuzione in una macchina virtuale CentOS su vSphere 44 minuti 57 secondi ⇑ Tabella 4. Confronto del tempo di esecuzione per MNIST in esecuzione… Fonte […]
          

Comment on UK Labour’s Annual Conference Reveals an Ongoing Struggle for the Party’s Soul by UK Labour’s Annual Conference Reveals an Ongoing Struggle for the Party’s Soul – The Kernel Post

 Cache   
[…] Source link […]
          

Linux

 Cache   
* Linux is the kernel of an operating system. * Linux was built on the Unix tradition. * Linux was originally developed by Linus Torwalds of Finland, who currently owns the Linux trademark. * Linux stands for Linus' Unix. * Using the open source code of the Linux kernel, people have been developing operating systems based on the Linux kernel. These are called the "Linux distributions".
          

LINUX/KERNEL NETWORK SOFTWARE ENGINEER - Mojatatu Networks - Ottawa, ON

 Cache   
Network Kernel (by kernel we mean Linux) Hacking. We are innovators in the emerging and rapidly evolving Software Defined Networking space.
From Mojatatu Networks - Mon, 29 Jul 2019 10:55:28 GMT - View all Ottawa, ON jobs
          

Elive 3.7.14 beta released + 64 BIT

 Cache   

After a long time of development, the Elive Team is proud to announce the release of the beta version 3.7.14 !
This new version includes:

  • Updated to a Debian-Buster base, with kernel 5.2.9 and lots of updated applications
  • Hardware support for UEFI, SecureBoot, nvme disks, optional 64BIT builds, etc…
  • Dedicated dock-bar with multiple features!
  • Audio player directly on the desktop with controls and covers
  • Enhanced stability stronger than ever before
  • Temporary desktop for development based on E16, offering an
  • Check more in the Elive Linux website.


              

    Building Certified Concurrent OS Kernels

     Cache   
    Ronghui Gu’s, CertiKOS, selected as a “Research Highlight” in the Communications of the ACM.
              

    Software Engineer

     Cache   
    TX-Austin, Overall Responsibilities: To implement security modules for Coral’s embedded Linux OS. Implementation of trusted kernel and boot for NXP i.MX Top 3 Daily Responsibilities: Assist with the development and configuration of Mendel OS (based on Debian Linux) Focus on Software Engineer (SE) Linux security features to secure the platform for our customers Implement ARM Trust Framework (ATF) and trusted
              

    Zero-day vulnerability gives attackers full control of Android phones

     Cache   

    Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi.

    The vulnerability is a use-after-free memory condition in the Android Binder component that can result in privilege escalation. The flaw was patched without a CVE identifier in Dec. 2017 in the Linux 4.14 LTS kernel, the Android Open Source Project’s (AOSP) 3.18 kernel, the AOSP 4.4 kernel and AOSP 4.9 kernel.

    To read this article in full, please click here


              

    PR_END_OF_FILE_ERROR after kernel update (6 replies)

     Cache   
    I hope someone more knowledgeable than I am can help here.

    A day or two ago I ran some routine updates on my Ubuntu Server 18.04. 
    No big deal, right?  The only unusual thing was the kernel updated as
    well, but I've updated the kernel on this machine many times before with
    no problems.  This time, however, was different.

    The updates ran with no difficulty, I rebooted the server to start using
    the new kernel, and that's when the troubles began.  Ever since, when I
    try to go to the server from a browser, I get an error message that says
    "PR_END_OF_FILE_ERROR"  I Googled this error and the suggestion was made
    that it was a flaw with my SSL certificates.  I reinstalled those, but
    to no avail.  I'm still getting the same error.

    I'm sorry to have run on this long about the problem, but I wanted to
    give as much info as I have.  Any further information is available on
    request.

    Help!

    Ken

    --
    Registered Linux user #483005

    If you ever think international relations make sense, remember this:
    because a Serb shot an Austrian in Bosnia, Germany invaded Belgium.

    _______________________________________________
    nginx mailing list
    nginx@nginx.org#utm_source=googlier.com/page/2019_10_08/95190&utm_campaign=link&utm_term=googlier&utm_content=googlier.com
    http://mailman.nginx.org/mailman/listinfo/nginx#utm_source=googlier.com/page/2019_10_08/95190&utm_campaign=link&utm_term=googlier&utm_content=googlier.com
              

    Climate Technology Primer (Part 1)

     Cache   
    Here’s the first of a series of blog articles on how technology can help address climate change: • Adam Marblestone, Climate technology primer (1/3): basics. Adam Marblestone is a research scientist at Google DeepMind studying connections between neuroscience and artificial intelligence. Previously, he was Chief Strategy Officer of the brain-computer interface company Kernel, and a […]
              

    RAM: What it is and when do you need more?

     Cache   
    Your phone needs RAM to operate, but why? And how much? It looks like Vivo is going to be selling a phone with 10GB of RAM. That's almost as much as many gaming PCs, and about 6GB more than most phones. It has a lot of folks scratching their heads and asking why in the world does it need 10GB of RAM, and does that mean my phone with 4GB needs more? This wouldn't be the first time we've seen phones come with oodles of RAM. The OnePlus 5T has an 8GB configuration, and seeing 6GB inside some phones is becoming fairly common. Let's talk about what RAM is, how your phone uses RAM, and why a phone would have 250% more of it than "necessary". What is RAM RAM (Random Access Memory) is short-term digital storage. Computers (and yes, your phone is a computer) use RAM mostly to hold data that active applications — along with the CPU and operating system's kernel — are using because RAM is very fast when it comes to reading and writing. Even the fastest hard drive or flash storag...
              

    September 28th, 2004

     Cache   

    So it begins...


              

    Mountains of Ketchup

     Cache   
    By Rebelstar without a cause
     
    Genre: Adventure sauce
     
    Mountains of Ketchup (a pun on the ZX Spectrum adventure classic Mountains of Ket of course) marks Rebelstar’s 15th entry to this year’s CGC.  First impressions suggest a rather simple poorly presented BASIC adventure (though is faithful to Ket’s layout) but don’t be fooled – still condiments run deep.



    I like the use of action keys instead of typing commands, and the fact there is no limit on how much you can carry (though I’m not sure if I could carry a lawnmower and a mine detector at the same time in reality).
     
    I’m not going to spoil the surprise but in addition to the simple text puzzles, there are some built in arcade style mini-games embedded in MOK which brought the biggest smile to my face.
     

    Mountains of ketchup is tinged with tripe but is an excellent kernel of an idea that I’d love to see expanded upon.  I have to say I was disappointed it finished so quickly!
     
    It’s crap, but play it, really – it’s great.

    Thankyou Rebelstar!

    <What the hell are the slippers for?>
     
    Download here.
    Download Game Map.

              

    Lavender Mint Whipped Body Butter, Goat Milk, Shea and Cocoa Butter With Vitamin C, 8 Oz. Jar, Handmade by GaGirlNaturals

     Cache   

    18.25 USD

    Lavender Mint Whipped Body Butter, Goat Milk, Shea and Cocoa Butter With Vitamin C, 8 Oz. Jar, Handmade

    Lavender Mint is a fabulously, well-balanced herbal blend of earthy lavender flowers and fresh peppermint and spearmint sprigs.

    Want a handmade body butter that is skin softening and moisturizing and also has many wonderful benefits for your skin? Then, you have found a body butter for you! My handmade goat milk based whipped body butter is a luxurious treat for your skin. Made with goat milk, vitamin C, shea and cocoa butters, coconut, apricot kernel, avocado, olive, grape seed, pomegranate seed, argan, rose hip seed, and vitamin E oils to nourish your skin and provide many skin loving benefits.

    Goat milk contains alpha-hydroxy acids that help to exfoliate dry, dead skin cells, contains probiotics which helps protect the skin from ultra violet light, contains high amounts of protein, fat, iron, vitamin A, B6, B12, C, D, E, and many more. These vitamins and minerals help slow down aging, help the skin rebuild, add elasticity, and help retain skin moisture, is readily absorbed into the skin, and very moisturizing. Vitamin C helps build collagen, protects against ultra violet rays, and contains antioxidants. Rose hip seed oil contains retinoic acid, a natural form of vitamin A. Pomegranate Seed oil is powerfully antioxidant and anti-inflammatory; and it is known to significantly boost epidermal cellular regeneration. Avocado, apricot kernel, olive, grape seed and coconut oils are readily absorbed into the skin, and very moisturizing.

    My handmade products are made to order fresh for you.

    *Paraben, propylene glycol, gluten, and phthalate free.*

    Ingredients: Distilled water, sunflower oil, soya oil, vegetable glycerin, potassium sorbate, meadow foam oil, jojoba oil, goat's milk, aloe vera, vitamin c, shea butter, cocoa butter, coconut oil, pomegranate seed oil, olive oil, apricot kernel oil, avocado oil, grape seed oil, argan oil, rose hip seed oil, vitamin E oil, stearic acid, cetyl alcohol, emulsifying wax, palmitic acid

    ** Please note that cosmetic products like soaps and lotions can begin to melt if left in high temperatures. Please note your tracking information and try to be available to receive your package promptly.**

    My Credentials:

    I have a Master Cosmetology License and a Certificate
    In Natural Health and Healing.

    [*Type*] - Name trademarks and copyrights are properties of their respective manufacturers and/or designers. These versions are NOT to be confused with the originals and GaGirlNaturals has no affiliation with the manufacturers/designers. This description is to give the customer an idea of scent character, not to mislead, confuse the customer or infringe on the manufacturers/designer's name and valuable trademark.


              

    Guilty Type Whipped Body Butter, Goat Milk, Shea and Cocoa Butter With Vitamin C, Handmade by GaGirlNaturals

     Cache   

    9.75 USD

    Guilty Type Whipped Body Butter, Goat Milk, Shea and Cocoa Butter With Vitamin C, Handmade

    Compare my perfume with Guilty fragrance

    Guilty Type is daring, feminine, rich and sophisticated. It has fruity floral notes of geranium, lilac, and peach mingled with white pepper, amber and patchouli.

    Want a handmade body butter that is skin softening and moisturizing and also has many wonderful benefits for your skin? Then, you have found a body butter for you! My handmade goat milk based whipped body butter is a luxurious treat for your skin. Made with goat milk, vitamin C, shea and cocoa butters, coconut, apricot kernel, avocado, olive, grape seed, pomegranate seed, argan, rose hip seed, and vitamin E oils to nourish your skin and provide many skin loving benefits.

    Goat milk contains alpha-hydroxy acids that help to exfoliate dry, dead skin cells, contains probiotics which helps protect the skin from ultra violet light, contains high amounts of protein, fat, iron, vitamin A, B6, B12, C, D, E, and many more. These vitamins and minerals help slow down aging, help the skin rebuild, add elasticity, and help retain skin moisture, is readily absorbed into the skin, and very moisturizing. Vitamin C helps build collagen, protects against ultra violet rays, and contains antioxidants. Rose hip seed oil contains retinoic acid, a natural form of vitamin A. Pomegranate Seed oil is powerfully antioxidant and anti-inflammatory; and it is known to significantly boost epidermal cellular regeneration. Avocado, apricot kernel, olive, grape seed and coconut oils are readily absorbed into the skin, and very moisturizing.

    4 Oz. Jar.

    My handmade products are made to order fresh for you.

    *Paraben, propylene glycol, gluten, and phthalate free.*

    Ingredients: Distilled water, sunflower oil, soya oil, vegetable glycerin, potassium sorbate, meadow foam oil, jojoba oil, goat's milk, aloe vera, vitamin c, shea butter, cocoa butter, coconut oil, pomegranate seed oil, olive oil, apricot kernel oil, avocado oil, grape seed oil, argan oil, rose hip seed oil, vitamin E oil, stearic acid, cetyl alcohol, emulsifying wax, palmitic acid

    ** Please note that cosmetic products like soaps and lotions can begin to melt if left in high temperatures. Please note your tracking information and try to be available to receive your package promptly.**

    My Credentials:

    I have a Master Cosmetology License and a Certificate
    In Natural Health and Healing.

    [*Type*] - Name trademarks and copyrights are properties of their respective manufacturers and/or designers. These versions are NOT to be confused with the originals and GaGirlNaturals has no affiliation with the manufacturers/designers. This description is to give the customer an idea of scent character, not to mislead, confuse the customer or infringe on the manufacturers/designer's name and valuable trademark.


              

    Chai Tea Whipped Body Butter, Goat Milk, Shea and Cocoa Butter With Vitamin C, 4 Oz. Jar, Handmade by GaGirlNaturals

     Cache   

    18.25 USD

    Chai Tea is a fabulous aroma of just the right amount of gourmet tea leaves, rich spices, and vanilla soy milk.

    Top Notes: Green Tea Leaves, Red Rooibos Tea, Sheer Tangerine
    Mid Notes: Silver Needle Tea, Black Pekoe Tea, Wisteria
    Base Notes: Haitian Vetiver, Creamy Musk, Crystal Amber, Vanilla Soy Milk, Cinnamon Bark, Nutmeg

    Want a handmade body butter that is skin softening and moisturizing and also has many wonderful benefits for your skin? Then, you have found a body butter for you! My handmade goat milk based whipped body butter is a luxurious treat for your skin. Made with goat milk, vitamin C, shea and cocoa butters, coconut, apricot kernel, avocado, olive, pomegranate seed, argan oil, and vitamin E oils to nourish your skin and provide many skin loving benefits.

    Goat milk contains alpha-hydroxy acids that help to exfoliate dry, dead skin cells, contains probiotics which helps protect the skin from ultra violet light, contains high amounts of protein, fat, iron, vitamin A, B6, B12, C, D, E, and many more. These vitamins and minerals help slow down aging, help the skin rebuild, add elasticity, and help retain skin moisture, is readily absorbed into the skin, and very moisturizing. Vitamin C helps build collagen, protects against ultra violet rays, and contains antioxidants. Rose hip seed oil contains retinoic acid, a natural form of vitamin A. Pomegranate Seed oil is powerfully antioxidant and anti-inflammatory; and it is known to significantly boost epidermal cellular regeneration. Avocado, apricot kernel, olive, and coconut oils are readily absorbed into the skin, and very moisturizing.

    My products are handmade to order fresh for you.

    8 oz jar

    Ingredients: Distilled water, sunflower oil, soya oil, vegetable glycerin, potassium sorbate, meadow foam oil, jojoba oil, goat's milk, aloe vera, vitamin c, shea butter, cocoa butter, coconut oil, pomegranate seed oil, olive oil, apricot kernel oil, avocado oil, rose hip seed oil, vitamin E oil, stearic acid, cetyl alcohol, emulsifying wax, palmitic acid

    ** Please note that cosmetic products like soaps and lotions can begin to melt if left in high temperatures. Please note your tracking information and try to be available to receive your package promptly.**


              

    Linux to get kernel 'lockdown' feature

     Cache   
    New Linux kernel "lockdown" module to limit high-privileged users -- even root -- from tampering with some kernel functionality.
              

    BeOS-Inspired Haiku Making Progress On ARM, Various Kernel Improvements

     Cache   
    Phoronix: BeOS-Inspired Haiku Making Progress On ARM, Various Kernel Improvements Just last week marked the one year anniversary since shipping...
              

    A Comparison Study on Nonlinear Dimension Reduction Methods with Kernel Variations: Visualization, Optimization and Classification. (arXiv:1910.02114v1 [stat.ML])

     Cache   

    Authors: Katherine C. Kempfert, Yishi Wang, Cuixian Chen, Samuel W.K. Wong

    Because of high dimensionality, correlation among covariates, and noise contained in data, dimension reduction (DR) techniques are often employed to the application of machine learning algorithms. Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), and their kernel variants (KPCA, KLDA) are among the most popular DR methods. Recently, Supervised Kernel Principal Component Analysis (SKPCA) has been shown as another successful alternative. In this paper, brief reviews of these popular techniques are presented first. We then conduct a comparative performance study based on three simulated datasets, after which the performance of the techniques are evaluated through application to a pattern recognition problem in face image analysis. The gender classification problem is considered on MORPH-II and FG-NET, two popular longitudinal face aging databases. Several feature extraction methods are used, including biologically-inspired features (BIF), local binary patterns (LBP), histogram of oriented gradients (HOG), and the Active Appearance Model (AAM). After applications of DR methods, a linear support vector machine (SVM) is deployed with gender classification accuracy rates exceeding 95% on MORPH-II, competitive with benchmark results. A parallel computational approach is also proposed, attaining faster processing speeds and similar recognition rates on MORPH-II. Our computational approach can be applied to practical gender classification systems and generalized to other face analysis tasks, such as race classification and age prediction.


              

    AKM$^2$D : An Adaptive Framework for Online Sensing and Anomaly Quantification. (arXiv:1910.02119v1 [stat.ML])

     Cache   

    Authors: Hao Yan, Kamran Paynabar, Jianjun Shi

    In point-based sensing systems such as coordinate measuring machines (CMM) and laser ultrasonics where complete sensing is impractical due to the high sensing time and cost, adaptive sensing through a systematic exploration is vital for online inspection and anomaly quantification. Most of the existing sequential sampling methodologies focus on reducing the overall fitting error for the entire sampling space. However, in many anomaly quantification applications, the main goal is to estimate sparse anomalous regions in the pixel-level accurately. In this paper, we develop a novel framework named Adaptive Kernelized Maximum-Minimum Distance AKM$^2$D to speed up the inspection and anomaly detection process through an intelligent sequential sampling scheme integrated with fast estimation and detection. The proposed method balances the sampling efforts between the space-filling sampling (exploration) and focused sampling near the anomalous region (exploitation). The proposed methodology is validated by conducting simulations and a case study of anomaly detection in composite sheets using a guided wave test.


              

    Tensor-based algorithms for image classification. (arXiv:1910.02150v1 [cs.LG])

     Cache   

    Authors: Stefan Klus, Patrick Gelß

    The interest in machine learning with tensor networks has been growing rapidly in recent years. The goal is to exploit tensor-structured basis functions in order to generate exponentially large feature spaces which are then used for supervised learning. We will propose two different tensor approaches for quantum-inspired machine learning. One is a kernel-based reformulation of the previously introduced MANDy, the other an alternating ridge regression in the tensor-train format. We will apply both methods to the MNIST and fashion MNIST data set and compare the results with state-of-the-art neural network-based classifiers.


              

    Pi-PE: A Pipeline for Pulmonary Embolism Detection using Sparsely Annotated 3D CT Images. (arXiv:1910.02175v1 [eess.IV])

     Cache   

    Authors: Deepta Rajan, David Beymer, Shafiqul Abedin, Ehsan Dehghan

    Pulmonary embolisms (PE) are known to be one of the leading causes for cardiac-related mortality. Due to inherent variabilities in how PE manifests and the cumbersome nature of manual diagnosis, there is growing interest in leveraging AI tools for detecting PE. In this paper, we build a two-stage detection pipeline that is accurate, computationally efficient, robust to variations in PE types and kernels used for CT reconstruction, and most importantly, does not require dense annotations. Given the challenges in acquiring expert annotations in large-scale datasets, our approach produces state-of-the-art results with very sparse emboli contours (at 10mm slice spacing), while using models with significantly lower number of parameters. Using a large, real-world dataset characterized by complex PE types and patients from multiple hospitals, we present an elaborate empirical study and provide guidelines for designing highly generalizable pipelines.


              

    Enabling Distributed-Memory Tensor Completion in Python using New Sparse Tensor Kernels. (arXiv:1910.02371v1 [cs.DC])

     Cache   

    Authors: Zecheng Zhang, Xiaoxiao Wu, Naijing Zhang, Siyuan Zhang, Edgar Solomonik

    Tensor computations are increasingly prevalent numerical techniques in data science.However, innovation and deployment of methods on large sparse tensor datasets are made challenging by the difficulty of efficient implementation thereof.We provide a Python extension to the Cyclops tensor algebra library, which fully automates the management of distributed-memory parallelism and sparsity for NumPy-style operations on multidimensional arrays.We showcase this functionality with novel high-level implementations of three algorithms for the tensor completion problem: alternating least squares (ALS) with an implicit conjugate gradient method, stochastic gradient descent (SGD), and coordinate descent (CCD++).To make possible tensor completion for very sparse tensors, we introduce a new multi-tensor routine that is asymptotically more efficient than pairwise tensor contraction for key components of the tensor completion methods.Further, we add support for hypersparse matrix representations to Cyclops.We provide microbenchmarking results on the Stampede2 supercomputer to demonstrate the efficiency of this functionality.Finally, we study the accuracy and performance of the tensor completion methods for a synthetic tensor with 10 billion nonzeros and the Netflix dataset.


              

    Rethinking Kernel Methods for Node Representation Learning on Graphs. (arXiv:1910.02548v1 [cs.LG])

     Cache   

    Authors: Yu Tian, Long Zhao, Xi Peng, Dimitris N. Metaxas

    Graph kernels are kernel methods measuring graph similarity and serve as a standard tool for graph classification. However, the use of kernel methods for node classification, which is a related problem to graph representation learning, is still ill-posed and the state-of-the-art methods are heavily based on heuristics. Here, we present a novel theoretical kernel-based framework for node classification that can bridge the gap between these two representation learning problems on graphs. Our approach is motivated by graph kernel methodology but extended to learn the node representations capturing the structural information in a graph. We theoretically show that our formulation is as powerful as any positive semidefinite kernels. To efficiently learn the kernel, we propose a novel mechanism for node feature aggregation and a data-driven similarity metric employed during the training phase. More importantly, our framework is flexible and complementary to other graph-based deep learning models, e.g., Graph Convolutional Networks (GCNs). We empirically evaluate our approach on a number of standard node classification benchmarks, and demonstrate that our model sets the new state of the art.


              

    Deep Kernel Learning via Random Fourier Features. (arXiv:1910.02660v1 [cs.LG])

     Cache   

    Authors: Jiaxuan Xie, Fanghui Liu, Kaijie Wang, Xiaolin Huang

    Kernel learning methods are among the most effective learning methods and have been vigorously studied in the past decades. However, when tackling with complicated tasks, classical kernel methods are not flexible or "rich" enough to describe the data and hence could not yield satisfactory performance. In this paper, via Random Fourier Features (RFF), we successfully incorporate the deep architecture into kernel learning, which significantly boosts the flexibility and richness of kernel machines while keeps kernels' advantage of pairwise handling small data. With RFF, we could establish a deep structure and make every kernel in RFF layers could be trained end-to-end. Since RFF with different distributions could represent different kernels, our model has the capability of finding suitable kernels for each layer, which is much more flexible than traditional kernel-based methods where the kernel is pre-selected. This fact also helps yield a more sophisticated kernel cascade connection in the architecture. On small datasets (less than 1000 samples), for which deep learning is generally not suitable due to overfitting, our method achieves superior performance compared to advanced kernel methods. On large-scale datasets, including non-image and image classification tasks, our method also has competitive performance.


              

    The asymptotic spectrum of the Hessian of DNN throughout training. (arXiv:1910.02875v1 [cs.LG])

     Cache   

    Authors: Arthur Jacot, Franck Gabriel, Clément Hongler

    The dynamics of DNNs during gradient descent is described by the so-called Neural Tangent Kernel (NTK). In this article, we show that the NTK allows one to gain precise insight into the Hessian of the cost of DNNs: we obtain a full characterization of the asymptotics of the spectrum of the Hessian, at initialization and during training.


              

    Correlations between Word Vector Sets. (arXiv:1910.02902v1 [cs.CL])

     Cache   

    Authors: Vitalii Zhelezniak, April Shen, Daniel Busbridge, Aleksandar Savkov, Nils Hammerla

    Similarity measures based purely on word embeddings are comfortably competing with much more sophisticated deep learning and expert-engineered systems on unsupervised semantic textual similarity (STS) tasks. In contrast to commonly used geometric approaches, we treat a single word embedding as e.g. 300 observations from a scalar random variable. Using this paradigm, we first illustrate that similarities derived from elementary pooling operations and classic correlation coefficients yield excellent results on standard STS benchmarks, outperforming many recently proposed methods while being much faster and trivial to implement. Next, we demonstrate how to avoid pooling operations altogether and compare sets of word embeddings directly via correlation operators between reproducing kernel Hilbert spaces. Just like cosine similarity is used to compare individual word vectors, we introduce a novel application of the centered kernel alignment (CKA) as a natural generalisation of squared cosine similarity for sets of word vectors. Likewise, CKA is very easy to implement and enjoys very strong empirical results.


              

    Deformable Kernels: Adapting Effective Receptive Fields for Object Deformation. (arXiv:1910.02940v1 [cs.CV])

     Cache   

    Authors: Hang Gao, Xizhou Zhu, Steve Lin, Jifeng Dai

    Convolutional networks are not aware of an object's geometric variations, which leads to inefficient utilization of model and data capacity. To overcome this issue, recent works on deformation modeling seek to spatially reconfigure the data towards a common arrangement such that semantic recognition suffers less from deformation. This is typically done by augmenting static operators with learned free-form sampling grids in the image space, dynamically tuned to the data and task for adapting the receptive field. Yet adapting the receptive field does not quite reach the actual goal -- what really matters to the network is the "effective" receptive field (ERF), which reflects how much each pixel contributes. It is thus natural to design other approaches to adapt the ERF directly during runtime.

    In this work, we instantiate one possible solution as Deformable Kernels (DKs), a family of novel and generic convolutional operators for handling object deformations by directly adapting the ERF while leaving the receptive field untouched. At the heart of our method is the ability to resample the original kernel space towards recovering the deformation of objects. This approach is justified with theoretical insights that the ERF is strictly determined by data sampling locations and kernel values. We implement DKs as generic drop-in replacements of rigid kernels and conduct a series of empirical studies whose results conform with our theories. Over several tasks and standard base models, our approach compares favorably against prior works that adapt during runtime. In addition, further experiments suggest a working mechanism orthogonal and complementary to previous works.


              

    Convolutional Phase Retrieval via Gradient Descent. (arXiv:1712.00716v3 [stat.CO] UPDATED)

     Cache   

    Authors: Qing Qu, Yuqian Zhang, Yonina C. Eldar, John Wright

    We study the convolutional phase retrieval problem, of recovering an unknown signal $\mathbf x \in \mathbb C^n $ from $m$ measurements consisting of the magnitude of its cyclic convolution with a given kernel $\mathbf a \in \mathbb C^m $. This model is motivated by applications such as channel estimation, optics, and underwater acoustic communication, where the signal of interest is acted on by a given channel/filter, and phase information is difficult or impossible to acquire. We show that when $\mathbf a$ is random and the number of observations $m$ is sufficiently large, with high probability $\mathbf x$ can be efficiently recovered up to a global phase shift using a combination of spectral initialization and generalized gradient descent. The main challenge is coping with dependencies in the measurement operator. We overcome this challenge by using ideas from decoupling theory, suprema of chaos processes and the restricted isometry property of random circulant matrices, and recent analysis of alternating minimization methods.


              

    How to improve the interpretability of kernel learning. (arXiv:1811.10469v2 [cs.LG] UPDATED)

     Cache   

    Authors: Jinwei Zhao, Qizhou Wang, Yufei Wang, Yu Liu, Zhenghao Shi, Xinhong Hei

    In recent years, machine learning researchers have focused on methods to construct flexible and interpretable prediction models. However, an interpretability evaluation, a relationship between generalization performance and an interpretability of the model and a method for improving the interpretability have to be considered. In this paper, a quantitative index of the interpretability is proposed and its rationality is proved, and equilibrium problem between the interpretability and the generalization performance is analyzed. Probability upper bound of the sum of the two performances is analyzed. For traditional supervised kernel machine learning problem, a universal learning framework is put forward to solve the equilibrium problem between the two performances. The condition for global optimal solution based on the framework is deduced. The learning framework is applied to the least-squares support vector machine and is evaluated by some experiments.


              

    Finite-Sample Analysis for SARSA with Linear Function Approximation. (arXiv:1902.02234v2 [cs.LG] UPDATED)

     Cache   

    Authors: Shaofeng Zou, Tengyu Xu, Yingbin Liang

    SARSA is an on-policy algorithm to learn a Markov decision process policy in reinforcement learning. We investigate the SARSA algorithm with linear function approximation under the non-i.i.d.\ data, where a single sample trajectory is available. With a Lipschitz continuous policy improvement operator that is smooth enough, SARSA has been shown to converge asymptotically \cite{perkins2003convergent,melo2008analysis}. However, its non-asymptotic analysis is challenging and remains unsolved due to the non-i.i.d. samples and the fact that the behavior policy changes dynamically with time. In this paper, we develop a novel technique to explicitly characterize the stochastic bias of a type of stochastic approximation procedures with time-varying Markov transition kernels. Our approach enables non-asymptotic convergence analyses of this type of stochastic approximation algorithms, which may be of independent interest. Using our bias characterization technique and a gradient descent type of analysis, we provide the finite-sample analysis on the mean square error of the SARSA algorithm. We then further study a fitted SARSA algorithm, which includes the original SARSA algorithm and its variant in \cite{perkins2003convergent} as special cases. This fitted SARSA algorithm provides a more general framework for \textit{iterative} on-policy fitted policy iteration, which is more memory and computationally efficient. For this fitted SARSA algorithm, we also provide its finite-sample analysis.


              

    Kernel Trajectory Maps for Multi-Modal Probabilistic Motion Prediction. (arXiv:1907.05127v2 [cs.RO] UPDATED)

     Cache   

    Authors: Weiming Zhi, Lionel Ott, Fabio Ramos

    Understanding the dynamics of an environment, such as the movement of humans and vehicles, is crucial for agents to achieve long-term autonomy in urban environments. This requires the development of methods to capture the multi-modal and probabilistic nature of motion patterns. We present Kernel Trajectory Maps (KTM) to capture the trajectories of movement in an environment. KTMs leverage the expressiveness of kernels from non-parametric modelling by projecting input trajectories onto a set of representative trajectories, to condition on a sequence of observed waypoint coordinates, and predict a multi-modal distribution over possible future trajectories. The output is a mixture of continuous stochastic processes, where each realisation is a continuous functional trajectory, which can be queried at arbitrarily fine time steps.


              

    Aquarium: Cassiopea and Alewife Languages. (arXiv:1908.00093v2 [cs.PL] UPDATED)

     Cache   

    Authors: David A. Holland, Jingmei Hu, Ming Kawaguchi, Eric Lu, Stephen Chong, Margo I. Seltzer

    This technical report describes two of the domain specific languages used in the Aquarium kernel code synthesis project. It presents the language cores in terms of abstract syntax. Cassiopea is a machine description language for describing the semantics of processor instruction sets. Alewife is a specification language that can be used to write machine independent specifications for assembly-level instruction blocks. An Alewife specification can be used to verify and synthesize code for any machine described in Cassiopea, given a machine-specific translation for abstractions used in the specification. This article does not include an introduction to either the Aquarium system or the use of the languages. In addition to this version of the article being a draft, the Aquarium project and the languages are work in progress. This article cannot currently be considered either final or complete.


              

    Member of Technical Staff - Monitor Group - VMware - Bellevue, WA

     Cache   
    The machine monitor group is responsible for the CPU virtualization technology in VMware products. Excellent knowledge of OS kernel internals, including memory…
    From VMware - Tue, 25 Jun 2019 18:20:47 GMT - View all Bellevue, WA jobs
              

    Virtual Machine Monitor - Verification Engineer - VMware - Bellevue, WA

     Cache   
    Knowledge of OS kernel internals, including memory management, resource management, and interrupt architecture. E.g. relevant embedded programming experience.
    From VMware - Sun, 12 May 2019 18:20:55 GMT - View all Bellevue, WA jobs
              

    PMTS Silicon Design Engineer - 75306 - Advanced Micro Devices, Inc. - Austin, TX

     Cache   
    What you do at AMD changes everything. AMD and its subsidiaries are equal opportunity employers. Knowledge of OS internals and kernel parameter tuning…
    From Advanced Micro Devices, Inc. - Sat, 03 Aug 2019 01:33:11 GMT - View all Austin, TX jobs
              

    MTS Silicon Design Engineer - 75307 - Advanced Micro Devices, Inc. - Austin, TX

     Cache   
    What you do at AMD changes everything. AMD and its subsidiaries are equal opportunity employers. Knowledge of OS internals and kernel parameter tuning…
    From Advanced Micro Devices, Inc. - Sat, 03 Aug 2019 01:33:09 GMT - View all Austin, TX jobs
              

    HPC Server Performance Engineer- 73796 - Advanced Micro Devices, Inc. - Austin, TX

     Cache   
    What you do at AMD changes everything. AMD and its subsidiaries are equal opportunity employers. Knowledge of OS internals and kernel parameter tuning…
    From Advanced Micro Devices, Inc. - Wed, 01 May 2019 01:33:11 GMT - View all Austin, TX jobs
              

    Server Performance Architect - 73533 - Advanced Micro Devices, Inc. - Austin, TX

     Cache   
    What you do at AMD changes everything. AMD and its subsidiaries are equal opportunity employers. Knowledge of OS internals and kernel parameter tuning…
    From Advanced Micro Devices, Inc. - Wed, 01 May 2019 01:33:08 GMT - View all Austin, TX jobs
              

    Staff I Engineer - Monitor Group - VMware - Boston, MA

     Cache   
    Excellent knowledge of OS kernel internals, including memory management, resource management, and interrupt architecture. Exposure to VMs (Java or x86).
    From VMware - Thu, 27 Jun 2019 00:21:36 GMT - View all Boston, MA jobs
              

    Virtual Machine Monitor - Verification Engineer - VMware - Boston, MA

     Cache   
    Knowledge of OS kernel internals, including memory management, resource management, and interrupt architecture. E.g. relevant embedded programming experience.
    From VMware - Fri, 03 May 2019 00:20:59 GMT - View all Boston, MA jobs
              

    Virtual Machine Monitor - Verification Engineer - VMware - Palo Alto, CA

     Cache   
    Knowledge of OS kernel internals, including memory management, resource management, and interrupt architecture. E.g. relevant embedded programming experience.
    From VMware - Sun, 12 May 2019 18:20:55 GMT - View all Palo Alto, CA jobs
              

    Teaching the History of Film Craft (pt. 2)

     Cache   
    Teaching the History of Film Craft:

    The Scholarship

    (second in a series of posts. See the introductory post)

    As I mentioned in my first post, my main inspiration for teaching film craft has been the terrific scholarship in areas that I've been interested in. Not to take away from foundational studies, but over the last decade there has been a wave of good monographs on film craft.

    I don't have the time or space to compile full bibliographies here, and I've left off essays, unfortunately. Rather, I wish to suggest books that may serve as building blocks for a course syllabus or that could inspire a course. The list can also serve as a kernel for a bibliography for students in film history courses.

    The list below focuses on scholarly histories on film craft. I've bracketed theory (or related topics like star studies) for the moment, even though something like Michel Chion's work on sound could be an important addition to a sound course. Also, I'm omitting interviews, popular histories, trade press sources, and production-oriented books, though these are important for research projects.

    The ones with an asterisk are ones I've used in a class, either in part or whole.

    Behind the Silver Screen Series (Rutgers UP)
    I'd particularly recommend this series as a starting point. They're all organized chronologically with each essay tackling a different part of Hollywood history. The bibliography of each also points to useful resources. (And I'm in one of them, as disclosure.)

    Acting - Claudia Springer, Julie Levinson, eds.
    Animation - Scott Curtis, ed.
    Art Direction and Production Design - Lucy Fischer, ed.
    Cinematography - Patrick Keating, ed. *
    Costume, Makeup, and Hair - Adrienne L. McLean, ed.
    Directing - Virginia Wright Wexman, ed.
    Editing and Special/Visual Effects - Charlie Keil, Kristen Whissel, eds.
    Producing - Jon Lewis, ed.
    Sound: Dialogue, Music, and Effects - Kathryn Kalinak, ed. *
    Screenwriting - Andrew Horton, Julian Hoxter, ed. *

    General books
    Barry Salt, Film Style and Technology *
    David Bordwell, Janet Staiger and Kristin Thompson, Classical Hollywood Cinema *
    Steve Neale, ed., The Classical Hollywood Reader *
    Erin Hill, Never Done: A History of Women's Work in Media Production  
    John Gibbs and Douglas Pye, eds. Style and Meaning: Studies in the Detailed Analysis of Film

    Cinematography
    Patrick Keating, Hollywood Lighting from the Silent Era to Film Noir *
    Patrick Keating, The Dynamic Frame: Camera Movement in Classical Hollywood Cinema
    Joshua Yumibe, Moving Color: Early Film, Mass Culture, Modernism
    Scott Higgins, Harnessing the Technicolor Rainbow *
    Richard Misek, Chromatic Cinema *
    Christopher Beach, A Hidden History of Film Style
    Frances Guerin, A Culture of Light: Cinema and Technology in 1920s Germany
    Daisuke Miyao, The Aesthetics of Shadow: Lighting and Japanese Cinema *
    John Belton , Sheldon Hall, et al. Widescreen Worldwide *
    Nick Hall, The Zoom: Drama at the Touch of a Lever
    Todd Rainsberger, James Wong Howe *
    Harper Cossar, Letterboxed: The Evolution of Widescreen Cinema 

    Sound Design
    Donald Crafton, The Talkies 
    Helen Hanson, Hollywood Soundscapes: Film Sound Style, Craft and Production in the Classical Era 
    Jay Beck, Designing Sound: Audiovisual Aesthetics in 1970s American Cinema
    Jay Beck and Tony Grajeda, eds., Lowering the Boom: Critical Studies in Film Sound
    Mark Kerins, Beyond Dolby (Stereo): Cinema in the Digital Sound Age *
    Lilya Kaganovsky and Masha Salazkina, eds., Sound, Speech, Music in Soviet and Post-Soviet Cinema
    Vlad Dima, Sonic Space in Djibril Diop Mambety's Films

    Screenwriting
    Steven Price, A History of the Screenplay *
    Miranda Banks, The Writers: A History of American Screenwriters and Their Guild
    Douglas Hell, Prime-Time Authorship: Works about and by Three TV Dramatists *
    Rosanne Welch, When Women Wrote Hollywood: Essays on Female Screenwriters in the Early Film Industry

    Film Music
    Claudia Gorbman, Unheard Melodies: Narrative Film Music
    Jeff Smith, The Sounds of Commerce
    Kathryn Kalinak, Film Music: A Very Short Introduction
    David Neumeyer, The Oxford Handbook of Film Music Studies
    Kevin Donnelly, The Spectre of Sound: Music in Film and Television
    David Schroeder, Hitchcock's Ear: Music and the Director's Art

    Acting
    James Naremore, Acting in the Cinema
    Scott Balcerzack, Beyond Method: Stella Adler and the Male Actor

    Special Effects
    Lisa Bode, Making Believe: Screen Performance and Special Effects in Popular Cinema
    Julie Turnock, Plastic Reality: Special Effects, Technology, and the Emergence of 1970s Blockbuster Aesthetics

    Production Design/Location
    Joshua Gleich, Lawrence Webb, eds. Hollywood on Location: An Industry History
    R. Barton Palmer, Shot on Location: Postwar American Cinema and the Exploration of Real Place
    Daniel Steinhart, Runaway Hollywood: Internationalizing Postwar Production and Location Shooting

    Unfortunately some areas like editing and art direction are still underrepresented. And the scholarship is much stronger on Hollywood cinema than on other cinemas. But it's exciting to see so much great scholarship emerging in these areas of film history.
              

    SCS Students Named 2020 Siebel Scholars

     Cache   
    Tue, 10/08/2019

    Six Carnegie Mellon University students — five of them from the School of Computer Science — have been named 2020 Siebel Scholars, a highly competitive award that supports top graduate students in the fields of business, computer science, energy science and bioengineering.

    Established in 2000 by the Thomas and Stacey Siebel Foundation, the Siebel Scholars program awards grants to 16 universities in the United States, China, France, Italy and Japan. The top graduate students from 27 partner programs are selected each year as Siebel Scholars and receive a $35,000 award for their final year of studies. On average, Siebel Scholars rank in the top five percent of their class, many within the top one percent.

    Among the 93 total scholars are School of Computer Science students Michael Madaio, Eric Wong, Ken Holstein, Junpei Zhou and Amadou Latyr Ngom. They're joined by Elizabeth Reed, a Ph.D. student in the Department of Engineering and Public Policy.

    Human-Computer Interaction Institute (HCII) Ph.D. candidate Michael Madaio researches the design of algorithmic systems in the public sector, focusing on literacy education in developing countries. He was a research intern at the United Nations Institute for Computing and Society, and Microsoft Research's Fairness, Accountability, Transparency and Ethics in Artificial Intelligence group. He completed his master's degree in digital media studies at Georgia Institute of Technology, and a master's in education and a bachelor's in English literature at the University of Maryland, College Park.

    Eric Wong is pursuing his Ph.D. in machine learning. In 2012 he began researching the problem of molecular energy optimization, developing specialized kernels for geometrically structured data. He is currently interning at Bosch to bring advancements into the automotive industry with work on real sensor systems, both visual and physical.

    Ken Holstein, a fifth-year HCII Ph.D. student, is also a fellow of the Program in Interdisciplinary Educational Research (PIER). He has interned at Microsoft Research and holds a bachelor's degree in psychology from the University of Pittsburgh and master's in human–computer interaction from CMU.

    Language Technologies Institute master's student Junpei Zhou researches social good by using natural language processing and computer vision techniques. He has worked on flu forecasting and a public safety project to automatically pick up tweets to help police officers better handle emergency events. He has interned at Google and Alibaba, and holds a bachelor's degree in computer science from Zhejiang University.

    Amadou Latyr Ngom is pursuing his master's degree in the Computer Science Department at CMU. His research interests include applying compiler techniques to accelerate query execution for in-memory database management systems. He has interned at Zillow and Pure Storage, and graduated with a bachelor's degree in computer science from CMU.

    "Every year, the Siebel Scholars continue to impress me with their commitment to academics and influencing future society. This year's class is exceptional, and once again represents the best and brightest minds from around the globe who are advancing innovations in healthcare, artificial intelligence, the environment and more," said Thomas M. Siebel, chair of the Siebel Scholars Foundation. "It is my distinct pleasure to welcome these students into this ever-growing, lifelong community, and I personally look forward to seeing their impact and contributions unfold."

    For More Information

    Byron Spice | 412-268-9068 | bspice [at] cs.cmu.edu#utm_source=googlier.com/page/2019_10_08/145719&utm_campaign=link&utm_term=googlier&utm_content=googlier.com
    Virginia Alvino Young | 412-268-8356 | vay [at] cmu.edu#utm_source=googlier.com/page/2019_10_08/145719&utm_campaign=link&utm_term=googlier&utm_content=googlier.com

    News type

    News


    Next Page: 10000

    © Googlier LLC, 2019