Juliana Elise Radon 7lbs 9oz
From the Next Cloud Blog:
Today is a big day. The Nextcloud community is launching a new product and solution called Nextcloud Talk. It’s a full audio/video/chat communication solution which is self hosted, open source and super easy to use and run. This is the result of over 1.5 years of planing and development.
For a long time it was clear to me that the next step for a file sync and share solution like Nextcloud is to have communication and collaboration features build into the same platform. You want to have a group chat with the people you have a group file share with. You want to have a video call with the people while you are collaborative editing a document. You want to call a person directly from within Nextcloud to collaborate and discuss a shared file, a calendar invite, an email or anything else. And you want to do this using the same login, the same contacts and the same server infrastructure and webinterface.
So this is why we announced, at the very beginning of Nextcloud, that we will integrate the Spreed.ME WebRTC solution into Nextcloud. And this is what we did. But it became clear that whats really needed is something that is fully integrated into Nextcloud, easy to run and has more features. So we did a full rewrite the last 1.5 years. This is the result.
Nextcloud Talk can, with one click, be installed on ever Nextcloud server. It contains a group chat feature so that people and teams can communicate and collaborate easily. It also has WebRTC video/voice call features including screen-sharing. This can be used for one on one calls, web-meetings or even full webinars. This works in the Web UI but the Nextxloud community also developed completely new Android and iOS apps so it works great on mobile too. Thanks to push notifications, you can actually call someone directly on the phone via Nextcloud or a different phone. So this is essentially a fully open source, self hosted, phone system integrated into Nextcloud. Meeting rooms can be public or private and invites can be sent via the Nextcloud Calendar. All calls are done peer to peer and end to end encrypted.
So what are the differences with WhatsApp Calls, Threema, Signal Calls or the Facebook Messenger?
All parts of Nextcloud Talk are fully Open Source and it is self hosted. So the signalling of the calls are done by your own Nextcloud server. This is unique. All the other mentioned solutions might be encrypted, which is hard to check if the source-code is not open, but they all use one central signalling server. So the people who run the service know all the metadata. Who is calling whom, when, how long and from where. This is not the case with Nextcloud Talk. Mo metadata is leaked. Another benefit is the full integration into all the other file sharing, communication, groupware and collaboration features of Nextcloud.
So when is it available? The Version 1.0 is available today. The Nextcloud App can be installed with one click from within Nextcloud. But you need the latest Nextcloud 13 beta server for now. The Android and iOS apps are available in the Google and Apple App Stores for free. This is only the first step of course. So if you want to give feedback and contribute then collaborate with the rest of the Nextcloud community.
ModEdit: Added Tags
The 5.0 release supports the latest guest or host operating systems including: Mac OS X Yosemite, Windows 10, Oracle Linux, Oracle Solaris, other Linux operating systems, and legacy operating systems. New capabilities in Oracle VM VirtualBox 5.0:
Paravirtualization Support for Windows and Linux Guests: Significantly improves guest OS performance by leveraging built-in virtualization support on operating systems such as Oracle Linux 7 and Microsoft Windows 7 and newer.
Improved CPU Utilization: Exposes a broader set of CPU instructions to the guest OS, enabling applications to make use of the latest hardware instruction sets for maximum performance.
Support of USB 3.0 Devices: Guest operating systems can directly recognize USB 3.0 devices and operate at full 3.0 speeds. The guest OS can be configured to support USB 1.1, 2.0, and 3.0.
Bi-Directional Drag and Drop Support for Windows: On all host platforms, Windows, Linux and Oracle Solaris guests now support “drag and drop” of content between the host and the guest. The drag and drop feature transparently allows copying or opening of files, directories, and more.
Disk Image Encryption: Data can be encrypted on virtual hard disk images transparently during runtime, using the industry standard AES algorithm with up to 256 bit data encryption keys (DEK). This helps ensure data is secure and encrypted at all times, whether the VM is sitting unused on a developer's machine or server, or actively in use.
Never thought I would see this.....
Wonder what the cost will be
ScreenConnect Free is free for personal use.
Examples of non-commercial cases are:
1 concurrent; 3 access agents
Today we are excited to announce free HTTPS for all custom domains hosted on WordPress.com. This brings the security and performance of modern encryption to every blog and website we host.
Dear Valued Customer,
Just over three years ago we started Pertino with the lofty vision of reinventing wide-area networking for the cloud, mobile and IoT era. The impetus at the time was straightforward: if someone with limited systems experience could spin-up one or more compute instances in the cloud in just minutes, why couldn’t we do the same thing for WANs?
As is often the case, building something truly disruptive is harder and takes longer than expected. But here we are today with hundreds of companies of all sizes using Pertino to “spin-up” virtual overlay networks across the Internet—connecting workforces, workloads and devices of all kinds spanning 90 countries with over 60 terabytes/month of traffic.
We’re just getting started. We have ambitious plans to add virtualized, policy-based services that will extend the visibility, security and control of your Pertino networks end-to-end. Additionally, we aspire to extend our SDN-powered cloud platform to support new hybrid WAN, overlay networking and enterprise IoT use cases.
The good news is that we’re not taking the next leg of our journey alone. I’m pleased to announce that Pertino has been acquired by Cradlepoint, the global leader in cloud-delivered 4G LTE network solutions for SMB, enterprise and government organizations. Cradlepoint shares our vision for next generation enterprise WANs—simplified, software-defined, cloud-delivered and ready to handle the demands of cloud, mobility and IoT. One such demand will be the need for secure and reliable 4G LTE connections. With over 15,000 customers and 1.3 million units installed worldwide, including 50% of the Fortune 100, 75% of top retailers and 25 of the top U.S. city governments, Cradlepoint brings to Pertino a new level of scale and capabilities.
So, what does this mean for you as a current or prospective customer of Pertino? Most importantly, the Pertino cloud networking service continues in full force. We are integrating our sales and support functions in early Q1 2016 to improve your engagement experience. And we’re putting the finishing touches on an exciting roadmap for 1H 2016. It includes new Pertino policy and security features and integrated solutions that will extend our Cloud Networking Engine platform with software-defined 4G LTE networking capabilities.
Today is a new day for Pertino as we become Cradlepoint, but our journey to transform wide-area networking for the cloud, mobile and IoT era remains the same. If you're a current Pertino customer, thank you for trusting your networking to us and stay tuned for more exciting developments. If you haven’t checked us out in a while, start your 30-day free trial today and see what’s new.
Please contact us at [email protected] with any questions you may have regarding today’s announcement. If you’re interested in learning more about Cradlepoint’s 4G LTE network solutions, just send us an email at [email protected].
Co-founder & CEO
Pertino—now part of Cradlepoint
Here is my kickstart file:
#version=DEVEL # System authorization information auth --enableshadow --passalgo=sha512 # Use CDROM installation media cdrom # Use text mode install text # Only Use SDA ignoredisk --only-use=sda # Keyboard layouts keyboard --vckeymap=us --xlayouts='us' # System language lang en_US.UTF-8 # Network information network --bootproto=dhcp --device=enp0s3 --ipv6=auto --activate network --hostname=localhost.localdomain # Root password rootpw --plaintext root # System timezone timezone America/New_York --isUtc # System bootloader configuration bootloader --append=" crashkernel=auto" --location=mbr --boot-drive=sda autopart --type=lvm # Partition clearing information clearpart --none --initlabel # Reboot after installation reboot %packages @^minimal @core kexec-tools %end %addon com_redhat_kdump --enable --reserve-mb='auto' %end
Save as ks.cfg
When you boot into the CentOS7 minimal CD press press TAB and erase what’s in there and type:
vmlinuz initrd=initrd.cfg ks=http://YOURDOMAIN/ks.cfg
FINALLY GOT IT!
The problem was the npm -install -g npm - was using a wrong version of npm (should have read the output closer)
The full version of XO is sooooooooo nice!
My next steps are:
If you read this blog on a regular basis, you probably use the little tool called SSH, especially its ubiquitous and most popular implementation OpenSSH.
Maybe you’re savvy enough to only use it with public/private keys, and therefore protect yourself from dictionary attacks. If you do then you know that in order to configure access to a new host, you need to make a copy of a public key available to that host (usually by writing it to its disk). Managing keys can be painful if you have many hosts, especially when you need to renew one of the keys. What if DNSSEC could help?
With version 6.2 of OpenSSH came a feature that allows the remote host to retrieve a public key in a customised way, instead of the typical authorized_keys file in the ~/.ssh/ directory. For example, you can gather the keys of a group of users that require access to a number of machines on a single server (for example, an LDAP server), and have all the hosts query that server when they need the public key of the user attempting to log in. This saves a lot of editing of authorized_keys files on each and every host. The downside is that it's necessary to trust the source these hosts retrieve public keys from. An LDAP server on a private network is probably trustworthy (when looked after properly) but for hosts running in the cloud, that’s not really practical.
DNSSEC is helpful here. That's right: now that we can verify responses from a DNS server, we can safely store public keys in DNS records!