We look into Video Enhance AI giving some examples and talking about how it works.
We look into how to use the Slim 4 framework. First, we will talk about the difference between the Slim 3 generated code from OpenAPI and then we will look at the new requirements for Slim 4 and how to run it in a production environment.
I go through a recent PR I created on the Ceph project. This contribution was something that solved a problem that really annoyed me when I’ve used the dashboard regularly the last weeks during a large upgrade/migration.
We look into creating a Samba share on Debian. Then we connect to it from Windows 11 so we can work on our project in Windows and transfer data over Samba and run it in Linux.
We look into installing OpenStack using Kayobe. OpenStack is a compute cluster solution with a lot of different services that could handle many task such as storage, network, compute and orchestration.
We look into the PWNKit vulnrability and how it works. PWNKit is a linux exploit that have been in linux environments for over 12 years. We look at how it works and what is required to be vulnrable and different approaches to secure your system.
We look into Kerla a Linux kernel written in the rust language. We talk about the use cases Kerla could be used for and what its future plans might be.
We look into how to use Zenity showing by some examples. Zenity is a graphical tool for your scripting to show dialog boxes on the GUI and return the result from Zenity back to your script.
We look into using the cephadm tooling to bootstrap and configure a small cluster with 3 drives and multiple hosts. We go into how cephadm administers different resources and shares them between hosts. Installing main host First we need curl in order to fetch the cephadm application sudo apt install -y curl Then we download…
We are looking into the vulnrability of Log4J version 2 and how to mitigate the exploit. We also look at the differences of version 1 and version 2 of Log4J