Category Archives: Uncategorized

SMH10 e novo protótipo de capacete da Sena bluetooth

Como um entusiasta de música e de motocicletas, sempre gostei da possibilidade de ter um som de alta qualidade enquanto ando de moto.

Hoje em dia uso o comunicador Sena SMH10 que funciona muito bem para falar ao telefone, ouvir direções do GPS/Waze ou até mesmo gravar minha voz para a GoPro (usando outro acessório), mas para ouvir música não é lá estas coisas (o volume até é bem alto, mas com o barulho inevitável do vento no capacete acaba-se perdendo muito dos graves e qualidade geral do som).
Fiquei excitado em saber que a Sena Bluetooth que fabrica os comunicadores topo-de-linha como o 20s wstá com um protótipo de capacete com fones grandes, noise canceling ativo, além das funções de comunicador. A expectativa é chegar ao mercado americano no segunto trimestre de 2016, por cerca de 600 a 800 US dólares, o que coloca ele na categoria dos topo-de-linha também. Vamos aguardar!

Veja o video:

I recommend any IT professionals and enthusiasts to check out what “PureFlex System Manager” is all about…

I recommend any IT professionals and enthusiasts to check out what "PureFlex System Manager" is all about, in one of the webinars listed below.

IBM PureFlex™ System combines compute, storage, networking, virtualization and management into a single infrastructure system. An integral feature of the Pu

Recap of IBM Linux and Open-Source thought leaders participation of major conferences: – April 29-30…

Recap of IBM Linux and Open-Source thought leaders participation of major conferences:

– April 29-30 Computerworld Open Source Business Conference (OSBC)
https://www.eiseverywhere.com/ehome/50794/87762/
Jim Wasko on a Cloud panel, Gord Sissons on Hadoop and PowerLinux, Jean Staten-Healy on KVM and OpenStack panel.

– May 14-15 LF's Enterprise End User Summit
http://events.linuxfoundation.org/events/enterprise-end-user-summit/schedule
Jean Staten-Healy and Mike Day in two different talks about KVM, Dan Frye, our Open Systems Development VP talks about KVM on the Enteprise, Wilhelm Mild on Linux on System z, Paul McKenney on the kernel development panel, Sean Dague on Open Cloud, and Paul McKenney also talks about Bare Metal Performance

PowerLinux servers are also available for direct remote access through our Virtual Loaner Program..

PowerLinux servers are also available for direct remote access through our Virtual Loaner Program..

IBM VLP Virtual Loaner Program: Remote access to IBM hardware, software, and storage

Understanding the Java performance improvements seen on POWER7+ (The PowerLinux Community)

By Mauricio Oliveira Remarkable Java performance improvements are being seen on the latest IBM Power Systems featuring POWER7+ processors which have significantly bigger, 10MB L3 caches associated w…

Apresentação FISL 11: Segurança em Virtualização utilizando o KVM

Abaixo está o link para o PDF da minha apresentação utilizada no FISL 11 sobre “Segurança em Virtualização utilizando o KVM”.

Lembrando que eu devo abordar novamente este tópico na LinuxCon Brasil 2010, que acontecerá dia 31 de Agosto e 1° de Setembro deste ano – fique ligado na programação. Aproveito também para adiantar que eu devo conduzir um “Encontro de desenvolvedores profissionais de Linux” na mesma LinuxCon Brasil 2010. Deverá ser uma oportunidade para encontrar colegas das várias empresas que trabalham direamente com desenvolvimento do Sistema Operacional Linux, e debater sobre o mercado de trabalho, educação, e realizações. Entre em contato (klaus arroba klauskiwi.com) ou deixe um comentário se estiver interessado neste mini-summit.

Comentários, correções e dúvidas são sempre bem-vindas!

-Klaus

Apresentação em PDF: SegurancaKVM-Oo.org

New Blueprint available: Securing KVM guests and the host system

IBM recently made available another Blueprint of my authorship: Securing KVM guests and the host system.

The text, which also has a PDF version, brings a couple of steps and some discussion around the theme of KVM Security for the Red Hat Enterprise Linux running on IBM System x with Virtualization capability. Those include remote management aspects, host and guest security, a few suggestions for auditing and why not some image-at-rest cryptography?

The complete index follows:

  • Introduction
  • Securing KVM guests and the host system
    • Secured KVM remote management
    • Setting up secure remote management
    • Remote management using SSH tunnels
    • Remote management using SASL authentication and encryption
    • Remote management using TLS
  • Guest virtual network isolation options
    • Network port sharing with Ethernet bridges
    • Network port sharing using 802.1q VLANs
  • Auditing the KVM virtualization host and guests
    • Audit rules file
  • KVM guest image encryption
    • Using encryption in KVM guest images
    • Migrating existing guests to encrypted storage
    • Installing a new KVM guest
    • Storing encrypted guest images
  • Appendix A. Sample audit rules file
  • Appendix B. Troubleshooting

Feedback, comments, corrections and suggestions are welcome as always, and we now have a way to provide them directly in the text. Questions can be answered in the developerWorks Linux Security Community Forum.

xcryptolinz RPMs

In case anyone is looking for the xcryptolinz RPMs to support IBM cryptographic hardware in Secure Key mode (among other things) through the CCA API, they are actually placed in IBM’s software support page for cryptocards (link)

As of this posting, current version is 3.28-rc8, and only supported in the s390x architecture (System z).

Update:

IBM has released a new CCA library (ver. 4.0), supporting the newer IBM PCIe Cryptographic Coprocessor (aka CEX3C aka 4765) card.  The library now supports SHA-2 AES and RSA with modulus size up to 4096 bits (for capable hardware), besides other Secure-Key operations such as DES, 3DES and SHA-1.

Opencryptoki starting from version 2.3 supports (and in fact requires) this library in order to use the CCA token type.

If time permits, I’ll post more here about CCA support in openCryptoki in the future.

-Klaus

test libraries without ‘make install’

Quick oneliner to export LD_LIBRARY_PATH containing all the pathnames that brings a shared library (.so) file in, so the lazy ones like myself can sometimes risk running/testing software that uses these libraries without issuing a ‘make install’.

There are probably more clever/elegant ways to do that, but whatever:

export LD_LIBRARY_PATH=$(for j in \
  $(for i in \
    $(find . -name '*.so'); \
    do dirname $i; done | sort | uniq);\
  do readlink -f $j; done |\
  awk '{ printf "%s:", $0 }')