Category Archives: Stiri IT Externe

X.Org/ Is Looking For Sponsors Or May Have To Cut Continuous Integration Hosting

X.ORG --

The cost of cloud hosting — or in particular hosting their own GitLab instance and running continuous integration (CI) support for projects — is putting financial strain on the X.Org Foundation.

The X.Org Foundation estimates their annual hosting expenses this year to top out at 75k USD and at 90k USD for 2021. The hosting is done within the Google Cloud. This cost doesn’t include that of any continuous integration runners but just the expenditures from storing and serving build artifacts and images from the cloud to external runners.

Due to rising costs and not having any guaranteed recurring sponsors while the current hosting costs being unsustainable, the X.Org Foundation may need to disable continuous integration (CI) functionality in the months ahead if they don’t obtain additional funding. The board estimates hosting without any CI functionality would cost around 30k USD annually. Currently they estimate they may need to cut their CI hosting in May~June should they not obtain extra sponsorships.

The X.Org Foundation board issued this early warning on the mailing list and as a call for any sponsors. If your organization is interested in helping to pick up this significant cloud tab, get in contact with the X.Org board. infrastructure was previously housed on servers at the likes of Portland State University and MIT, but their GitLab hosting setup is found in Google’s cloud. It seems like the other option would be trying to migrate CI efforts back to a dedicated server(s) or finding a lower-priced cloud provider. While hosted in Google Cloud, the extent of the gratis services that appear to be offered by Google at this point is hiring an administrator for the setup. These meeting notes indicate Google is willing to hire an admin as long as they can pick the administrator overseeing it.

The GitLab provides hosting not only for X.Org but also Wayland, Mesa, and related projects as well as to the likes of PipeWire, Monado XR, LibreOffice, and many other open-source/Linux desktop projects.

South Korea Government Considers Move to Linux… » Linux Magazine

The South Korean Government is on the verge of migrating from Windows 7 to Linux on the desktop. This began back in May 2019, when South Korea’s Interior Ministry announced the plans to look into making the switch. 

Since that initial date, the South Korean Ministry of Strategy and Planning announced the government is now exploring migrating over three million Windows 7 desktops over to Linux. According to Choi Jang-hyuk (head of the Ministry of Strategy and Finance), South Korea will resolve their dependency on Microsoft while reducing the budget by migrating to an open source operating system. 

What is driving this migration? It’s primarily a financial decision. The cost of migrating so many desktops from Windows 7 to Windows 10 would reach over $650 million dollars. With the Ministry of National Defense and the National Police Agency already using Harmonica OS 3.0 (based on Ubuntu Linux 18.04), and the Defense and the Ministry of Public Administration and Security using Gooroom Cloud OS (based on Debian), the choice to make the nation-wide switch to Linux made perfect sense. Once the migration officially begins, the Korean Postal Service will be moving to Korean-based TMaxOS, which includes a unique desktop environment and uses ToGate, a Chromium-based web browser.

Although this may be nothing more than a bid to get Microsoft to offer South Korea a significant discount for a Windows 7 to 10 migration, until that comes to fruition, it looks as though the move to Linux is happening.


Source link

GDB Debugger Adds Support For Debuginfod Web Server

GNU --

Debuginfod is the Red Hat led debug information HTTP web server distributed as part of elfutils and able to supply on-demand source code and ELF/DWARF debug files to debuggers / IDEs / other compiler tooling. The GDB debugger can now tap debuginfod for on-demand source files and debug information that isn’t present on the local system.

The motivation with debuginfod is to carry less developer “baggage” on local systems when it comes to debug files and potentially even source files. Particularly for organizations or cases like Linux distributions, a centralized debuginfod server could in turn supply the needed files to clients based upon the requested build ID. Red Hat has been working to expand the debuginfod support both for the GNU toolchain and also LLVM, among other possible users.

Following Binutils 2.34 adding debuginfod support, the GNU Debugger (GDB) now also supports connecting to debuginfod web servers.

As of this commit that landed on Wednesday, GDB can request debugging resources and source code from the remote server should it not find the needed files locally.

Unify NetOps and SecOps with SD-WAN Cloud Management

CIOs know that ubiquitous connectivity across domains—campus, branch, cloud, and edge; wired and wireless—is a baseline requirement for building a digital enterprise. But, as CISOs know, as the network fabric spreads to encompass devices and location-agnostic data and compute resources, the need for end-to-end integrated security is equally paramount. Add in the necessity to continuously monitor and maintain application performance throughout campus, branch, and edge locations, and you create an enormous workload for NetOps and SecOps teams. Often the result is a tug-of-war between the teams: one striving to keep the network optimized for performance and availability, the other striving to keep data, applications, and devices secure.

Conflict or Collaboration?

The problem of balancing the goals of NetOps with SecOps has a lot to do with how the network and all the connected devices and domains are being managed. Traditionally in NetOps, there have been separate consoles to configure, monitor, and analyze network domains – several for the data center, multiple for the campus wireless network, and still more for cloud, branch, and edge deployments.

Similarly, in order for SecOps to capture, log, and analyze traffic in all the various domains, special taps are installed where traffic is entering and leaving the domains. SecOps has an additional burden of storing all the traffic logs in case of a breach or successful malware attack in order to pinpoint the cause and prove appropriate steps are taken to remediate breaches and prevent future attacks.

Can NetOps and SecOps get to the point of collaboration instead of conflict? In fact, new cross-enterprise business initiatives are making collaboration a necessity.

Digital Transformation Projects Benefit from Unified Operations and Security

Deploying new multi-cloud applications or moving processes to the edge—retail outlets, branch offices, medical clinics—requires assurance that the network is responsive, always available, and secure. NetOps needs to work with Development teams to understand network SLAs and cloud usage requirements for the new apps. SecOps needs to ensure that the proper network permissions, segmentations, and polices are applied to the network at application launch time. NetSecOps collaboration is key to the timely deployment of next-generation applications with security and the required levels of performance.

Is there a technology platform that makes unification not only possible but also makes the transition a natural evolution rather than a forced organizational change? By combining a software-defined network fabric with single-console cloud management, SD-WAN can play a significant role in the unification of NetSecOps.

SD-WAN Unified Network Cloud Management for NetSecOps

A primary benefit of SD-WAN for unifying NetSecOps is the ability to provide a single, role-based management portal to configure and monitor network performance, segmentation, and security policies. Through the lens of SD-WAN cloud controllers, NetSecOps together can:

  • Install and configure branch SD-WAN routers remotely with Zero Touch Provisioning (ZTP).
  • Automatically route traffic through the most efficient and cost-effective path (MPLS, broadband, direct internet, LTE) using dynamic path selection.
  • Manage performance, security, and access policies for cloud onramps to SaaS and IaaS-hosted applications.
  • Set Quality of Experience (QoE) service levels for cloud and SaaS applications.
  • Remotely configure and manage at the branch level the application-aware firewalls, URL-filtering, intrusion detection/prevention, DNS-layer security, and Advanced Malware Protection (AMP) to secure branch traffic that is using direct internet connections to cloud applications.
  • Collaboratively configure segmentation rules that are uniformly applied across distributed locations to keep traffic separated—such as employee wireless access from payment system traffic—improving both performance and security.

Let’s double-click on two common yet difficult to manage situations—securing east-west branch traffic and accessing direct internet access SaaS/IaaS-hosted applications—to see how SD-WAN helps a unified NetSecOps team operate.

Managing and Protecting East-West Traffic Flow and Security in Branches

With the plethora of integrated security layers that come with SD-WAN, traffic entering and leaving a branch is thoroughly inspected for application infiltration, intrusion by malware, and known bad URLs. But there is still the tricky problem of when malware is introduced by a device inside the branch network.

In the days of spoke and hub WANs, traffic from each device within a branch would be backhauled to the enterprise data center for inspection and verification, and then back to the branch. This has always been a troublesome scenario for NetOps as the traffic load for just backhauling and inspecting interfered with traffic that legitimately had to go the data center for additional processing.

With SD-WAN, the firewalls and intrusion detection are incorporated into the branch routers so that traffic internal to the branch is also inspected as it traverses the local network, in addition, of course, to traffic exiting and entering the branch. The result is that SecOps maintains control over local traffic security while NetOps frees up bandwidth for priority traffic heading for the data center, SaaS applications in the cloud, and traffic to other branches—all managed via the SD-WAN controller shared by both teams.

Securing Access to SaaS Applications via Direct Internet Connections

The workforce is quickly becoming more dependent on applications hosted in SaaS cloud platforms, such as Office 365, which require routing through direct internet access. With SD-WAN, NetSecOps can focus on not just fine-tuning application performance but also the defenses that secure the valuable corporate data being transmitted over the internet connections to and from branch sites. By using SD-WAN onramps to SaaS and IaaS clouds, the network selects the path that is the most effective to handle Azure, AWS, or Google Cloud workloads while the built-in layers of security provide protection with DNS URL filtering, advanced malware protection, and application-aware firewalls. Both application performance and security are managed by NetSecOps via the SD-WAN cloud controller portal.

Fostering Collaboration Among NetOps and SecOps is Key to Network Agility

With SD-WAN’s ability to manage operations and security via the same cloud portal, it really is achievable to create a NetSecOps team that promotes collaboration to maximize device and application QoE and security. Unifying these two critical functions helps create an agile network that makes digital transformation projects possible while keeping ahead of advanced security threats. 

Source link

Game Porting Firm Feral Interactive’s Days Could Be Numbered With Compulsory Strike-Off


Prominent Linux and macOS game porting firm Feral Interactive looks like it may be dissolving.

The UK-based Feral Interactive Limited has its first gazette notice for compulsory strike-off. A compulsory strike-off from the UK Companies House register is basically bringing the company to an end and cease to exist as a legal entity pending any objections to said strike-off.

The paperwork was just filed. Feral has employed dozens of developers in London for porting games from Windows to macOS and Linux as well as Android and some mobile platforms. Feral was founded in 1996 by David Stephen.

We reached out to Feral Interactive this morning and are waiting to find out what is happening to their Linux/macOS game porting operations moving forward.

In recent time we have seen several prominent Feral developers move to other companies as a possible sign of the times. There also has been criticism of the company’s corporate culture on the likes of Glassdoor.

Shutting down of Feral would be a big blow to the Linux gaming community with Feral being responsible for many of the major native Linux games like the F1, Total War, and Tomb Raider franchises. Though Feral has faced competition over the past two years now from Steam Play that is allowing countless Windows games to run nicely on Linux thanks to their Wine-based Proton + DXVK.