-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Open Hardware and Linux Devices


Posted by Roy Schestowitz on Feb 24, 2023,

updated Feb 24, 2023


ZBMINI Extreme Zigbee smart switch review with Home Assistant

Programming Leftovers



RISC-V computer system on Open Source Hardware FPGA iCE40HX8K-EVB runs UNIX xv6 using only FOSS (free and open source hard- and software)


↺ RISC-V computer system on Open Source Hardware FPGA iCE40HX8K-EVB runs UNIX xv6 using only FOSS (free and open source hard- and software)


> He managed to build RISC-V computer running Unix xv6 using only FOSS.



Introducing the Lapdock Kit


↺ Introducing the Lapdock Kit


> With the Lapdock kit, you can turn your Librem 5 or Librem 5 USA into a PureOS laptop. While your Librem 5 is fully able to run desktop apps on its own, once attached to the Lapdock, you can take advantage of the extra screen space, battery power, and extra ports.


> The Lapdock offers a USB-C with an adapter to a full-sized USB, allowing you to attach just about any USB device to your Librem 5.


> You also get an extra Micro USB slot and a headphone jack.The Lapdock also ships with a large internal battery, keeping your Librem 5 topped off while in use.



Mini PC equipped with 12th Gen Intel processors and dual 2.5GbE ports


↺ Mini PC equipped with 12th Gen Intel processors and dual 2.5GbE ports


> The KC12 is a compact Mini-PC featuring the Intel Core i5-1240P and the Intel Core i7-1240P. The device is equipped with 2x HDMI 2.0, 2x M.2280 slots, 1x Thunderbolt, Wi-Fi6/Bluetooth 5.0 connectivity and other various peripherals.



More vulnerabilities in industrial systems raise fresh concerns about critical infrastructure hacks


↺ More vulnerabilities in industrial systems raise fresh concerns about critical infrastructure hacks


> The reports provide a startling view of some long-known risks inside industrial systems that are receiving fresh attention after such high-profile cyberattacks as the Colonial Pipeline and JBS meat packing ransomware incidents. That increased attention means that both researchers trying to defend critical systems — along with malicious hackers looking to infiltrate them — are more focused than ever on industrial systems.


> “We’re seeing capabilities out there that could have destructive capabilities, safety impacts: think Triton and Trisis, and think Pipedream,” said Puesh Kumar, director of the Cybersecurity, Energy Security, and Emergency Response at the Energy Department.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Fri Jun 14 04:54:23 2024