Tux Machines

IBM: Fedora, Flatpak, and Oracle Linux

Posted by Roy Schestowitz on Dec 14, 2025

Plans for KDE Plasma 6.6 and GNOME Will Reject Shell Extensions With AI-Generated So-called 'Code' (Slop)
Programming Leftovers

Kevin Fenzi: infra weekly recap: mid december 2025

↺ Kevin Fenzi: infra weekly recap: mid december 2025
Another busy week for me and Fedora infrastructure in general, and also the last working week of the year for me. I am out on vacation for the holidays and back 2026-01-12.
Of course I will be around and checking in for outages/urgent issues and working on things in the community that I find enjoyable.

Sebastian Wick ☛ Sebastian Wick: Flatpak Pre-Installation Approaches

↺ Sebastian Wick: Flatpak Pre-Installation Approaches
Together with my then-colleague Kalev Lember, I recently added support for pre-installing Flatpak applications. It sounds fancy, but it is conceptually very simple: Flatpak reads configuration files from several directories to determine which applications should be pre-installed. It then installs any missing applications and removes any that are no longer supposed to be pre-installed (with some small caveats).
For example, the following configuration tells Flatpak that the devel branch of the app org.test.Foo from remotes which serve the collection org.test.Collection, and the app org.test.Bar from any remote should be installed: [...]

GPU Confidential Computing using Oracle Linux 9

↺ GPU Confidential Computing using Oracle Linux 9
GPUs offer unparalleled computing power and are the backbone of today’s computations at scale. Organizations leverage GPUs to train their models, run simulations and perform data analysis. These computations might utilize sensitive and top-secret data, which require special protection at each step. Data must be encrypted when sent across the network (in-transit) and in storage (at-rest). Confidential Computing adds protection of data during computations (in-use) by creating an isolated and trusted environment where data cannot be read or altered by the third party. Enabling Confidential Computing requires a couple of configuration steps but no code changes to the compute workload.
gemini.tuxmachines.org