The show has been dormant for some time (years) but its back.
October 01, 2014
Hacker Public Radio HPR1609: Sigil And The Process Of The Epub In FOSS
Here are some links to the software discussed in this episode
Hacker Public Radio HPR1608: Interviews at Lincoln LUG
In today's show, Philip Newborough interviews fellow members of Lincoln LUG. Each interviewee is asked 3 simple questions:
What was your first experience of Linux?
What distro and desktop environment/window manager are you currently using?
What tools/utilities/applications can you not live without?
The participating LUG members were not given the questions in advance and the resulting answers were quite varied. Hopefully, this collection of interviews will provide you, the listener, with a good understanding of the broad mix of Linux users who attend Lincoln LUG.
The members who were interviewed, in order, were:
Note: Lincoln LUG meets on the 3rd Wednesday of each month at the Lincoln Bowl. The interviews were conducted outside the bowl and some background noise can be heard, we hope this does not affect your enjoyment of this episode.
Phone Losers Snow Plow Show – September 30th, 2014 – Hobo Recycling
Here's an hour of hoboness brought to you by Gizmo, where we prank call Petcos and trick them into killing all their kittens and puppies. We also call a few rich residents about their bad recycling habits.
September 29, 2014
Hacker Public Radio HPR1607: Migrating from Drupal 6 to Nikola
I talk about the migration of my blog from Drupal 6 to Nikola. I explain
why I wanted to migrate, and I tell about the script I used.
Details and scripts can be found on my blog:
September 28, 2014
Hacker Public Radio HPR1606: Howto VNC Klaatu talks about how to get to VNC up and running. It
focuses on x11vnc but basically it applies to any variety.
Virtual Network Computing
From Wikipedia, the free encyclopedia
In computing, Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.
VNC is platform-independent – There are clients and servers for many GUI-based operating systems and for Java. Multiple clients may connect to a VNC server at the same time. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa.
VNC was originally developed at the Olivetti & Oracle Research Lab in Cambridge, United Kingdom. The original VNC source code and many modern derivatives are open source under the GNU General Public License.
There are a number of variants of VNC which offer their own particular functionality; e.g., some optimised for Microsoft Windows, or offering file transfer (not part of VNC proper), etc. Many are compatible (without their added features) with VNC proper in the sense that a viewer of one flavour can connect with a server of another; others are based on VNC code but not compatible with standard VNC.
VNC and RFB are registered trademarks of RealVNC Ltd. in the U.S. and in other countries.
Hacker Public Radio HPR1605: 38 - LibreOffice Calc - simple Descriptive Statistics
In Statistics there are generally speaking two types of analysis, broken down between Descriptive and Inferential statistics. The difference has to do what what claims you are making about the data. If you are simply stating something about the data (e.g. there were more men than women in the sample) that is descriptive. But if you make a claim that something is not likely to occur by chance, for instance, or that something is statistically significant (and both of those statements are essentially the same thing) then you are in the realm of inferential statistics. Calc has functions to do both kinds of analysis, and this tutorial will examine some of the common descriptive statistics in Calc and how they are used. - For more go to http://www.ahuka.com/?page_id=844
Hacker Public Radio HPR1603: GUADEC 2014: Matthew Garrett Interview
This year's GUADEC, the Gnome Users and Developers Conferen
was held in Strasbourg, France. Keynote Speaker was free software activist Matthew Garrett.
He held an inspiring speech on the Linux and Gnome desktop and laid out his vision for both.
Afterwards, I was able to ask him a few questions.
For any reactions, mail me at mail (at) linuxohneangst.net
our own podcast (in German): http://linuxohneangst.net
September 22, 2014
Hacker Public Radio HPR1602: An Open Source News Break from Opensource.com
In this episode: Data-driven journalism with Journalism++, open source password management, and open electronics with Spark.
Hacker Public Radio HPR1601: Howto Install LAMP If you're just starting out as a web developer or
designer, you should know about LAMP and how to use it. This episode
introduces you to the basics.
LAMP (software bundle)
From Wikipedia, the free encyclopedia
LAMP is an acronym for an archetypal model of web service solution stacks, originally consisting of largely interchangeable components: Linux, the Apache HTTP Server, the MySQL relational database management system, and the PHP programming language. As a solution stack, LAMP is suitable for building dynamic web sites and web applications.
Hacker Public Radio HPR1599: Interview with Ingmar Steiner from the MaryTTS project
In today's show Ken interviews Ingmar Steiner who is the lead developer for the mary text to speech project. MaryTTS is an open-source, multilingual text-to-speech synthesis system written in pure java and is released under the LGPL. During the interview we get a history of the project, and dive into speech synthesis and we look at how to make your own voices.
OpenMary development page: http://mary.opendfki.de/
New HomePage: http://lnv-90208.sb.dfki.de/
Orca : https://wiki.gnome.org/action/show/Projects/Orca?action=show&redirect=Orca
Hacker Public Radio HPR1598: Hashing and Password Security
Today, the most common way of providing security in giving access to data or systems is through the use of passwords. Practically every online site now expects you to create an account with a password, which will let you post comments, order products, conduct business, or just post to social media. The implication is that insisting on passwords provides some level of security. Now, following on our last tutorial we should ask a few questions about just how effective this measure is, since someone posting in your name to Twitter is significantly different from someone accessing your bank account. And since the assets being protected are very different, it would be reasonable to approach the problem of security somewhat differently in these cases. But given the ubiquity of passwords as the authentication for online accounts, we need to look at the security involved. Note that I am approaching this from the standpoint of the owner of the site in question for this tutorial, and will follow up with a
look at your own role in this. - For more go to http://www.zwilnik.com/?page_id=640
Hacker Public Radio HPR1597: Extravehicular Activity EVA - The Rules for Extravehicular Activity
Here I dip into the NASA experience of and rules for Extravehicular Activity, prompted at first by watching a film called The Europa Report, directed by Sebastian Cordero (2013).
WARNING - THIS PODCAST CONTAINS SPOILERS
While I have some gripes about the film, I was impressed by its general failfulness to the science
It thought to find life on Europa, a moon of Jupiter considered by real exobiologists and planetary scientists to be a good candidate
Neil deGrasse Tyson made a cameo appearance
The portrayal of Europa's geography and character
Having to drill through the ice to get at the sea below
The behaviour of the crew as scientists and engineers
Science consultant on the film was Kevin Hand, an astrobiologist and expert on Europa at NASA's Jet Propulsion Laboratory
To my mind, the scientists were behaving like scientists and the engineers behaved like engineers. To follow along it might help to recall their names
Captain - Willam Xu
Pilot - Rosa Dasque
Chief scientist - Daniel Luxembourg
Marine biologist - Katya Petrovna
Junior engineer - James Corrigan
Chief engineer - Andrei Blok
All was going scientifically until the director drove the plot forward with two EVA incidents
EVA-1 : Flash back episode, engineers James and Andre go out to fix a failed communications circuit
Andre rips his suit
James gets squirted with rocket fuel
Only one astronaut survives
I have problems with this becuase it's just too clumsey for trained professional astronauts. Where are the decontamination procedures, the tethers, the special tools?
EVA-2 : Down on the surface, Marine biologist Katya decides to walk out alone
Tourtured debate in the ship
Of four able and expendable crew members, none go with her
Katya does not come back alive
With this I am shouting at the screen "No Way! Where's the fracking operating manual? No one goes EVA on their own"
So, that is why I researched the NASA rules for Extravehicular Activity. And I found that none of these events would have happened the way they were shown, had the crew, who were so professional in every other way, followed the NASA procedures.
The two astronauts issue
The most recent occasion where an astronaut went solo EVA was in 1971, when David Scott stuck his head out of the airlock of Apollo 15.
Most recent before that was in 1966, when Buzz Aldrin went EVA from Gemini 12 (Gemini craft only had two crew).
Since 1971, there have been 358 space walks and every single one has had two crew.
I found no written regulation, but de-facto, nobody leaves the spacecraft alone.
NASA documents on the internet discuss in exhaustive detail all condiderations for EVA. What I present is a cherry-picked handful. I could not cover all of it
reasons for EVA
procedures for safe conduct
International Space Station (ISS) EVA Procedures Checklists
Presuming that all the equipment maintenance checks, and readiness checks have alread been done
30 minutes of Airlock preparation and testing
30 minutes of changing components for the suit to fit the astronaut
170 minutes of EVA-Prep
Then you are ready to depressurise and leave the airlock
EVA might last 2 - 8 hours
30 minute procedure to take the suit off
10 minute procedure to disconnect internal equipment
Recharge & maintain the Extravehicular Mobility Unit (EMU)
Clean & maintain the Suit
Although this podcast is about EVA, it does reference the science in a film that I enjoyed and respect very much, so here is a gem that I only came across while researching the landing site.
In the scientific journal Nature, Volume 479, 16 November 2011, Britney Schmidt et al, of University of Texas, Austin, published a paper titled "Active formation of 'chaos terrain'
over shallow subsurface water on Europa." In the paper these authors suggest that in the Conemara zone of the Chaos Terrain, an area on the surface of Europa, the ice may be as little as 3 km thick.
Then in the film the Conemara Chaos was the targetted landing zone and the drill broke through the ice at a depth of 2800m.
Well there is one more thing that the podcast says, but it is the ultimate spoiler. So if you have not already listened to the podcast, I highly recommend that you watch the film first.
Early Spacewalks: http://en.wikipedia.org/wiki/List_of_spacewalks_and_moonwalks_1965-1999
Late Spacewalks: http://en.wikipedia.org/wiki/List_of_spacewalks_since_2000
NASA Manual on Systems Integration Standards: http://msis.jsc.nasa.gov/sections/section14.htm
NASA payload Safety Conference, Feb 2000: http://paso.esa.int/5_training_materials/training_22_materials.pdf
EVA-22 Cassidy and Parmitano complete ISS spacewalk: http://www.nasaspaceflight.com/2013/07/eva-22-cassidy-parmitano-iss-spacewalk-eva-22/
EVA-23 terminated due to Parmitano EMU issue: http://www.nasaspaceflight.com/2013/07/astronaut-duo-us-spacewalk-outside-iss/
Extravehicular Activity Operations Overview: http://www.colorado.edu/ASEN/asen3036/EVAOverview.pdf