Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Debian for WDTV Live (running WDLXTV) - Inc. Build Essentials
Back in 2010, b-rad released Debian Squeeze (MIPSEL) for a WDLXTV hacked WDTV:
http://forum.wdlxtv.com/viewtopic.php?f=43&t=494&start=0
I've placed a copy on SourceForge with the script to chroot the image on a hacked WDTV Live (WDLXTV).
Since then, Squeeze is no longer supported, so Debian moved the source repo's.
The original "/etc/apt/sources.list" file needs to be changed:
deb http://archive.debian.org/debian-archive/debian/ squeeze main contrib non-free
deb-src http://archive.debian.org/debian-archive/debian/ squeeze main contrib non-free
You can then install Squeeze packages: eg:
apt-get update
apt-get install debian-archive-keyring
apt-get install build-essential
Which gives you a basic GCC environment.
...
Permits interaction with transmission-daemon via OSD menu, on the WDTV live HD media player. Requires: WDLXTV custom firmware, FW base version 1.02.21, and Transmission app.bin.
A simple application that send remote command to your WDTV Live box (using WDlxTV firmware by B-rad) using Telnet. Also some plugins using WDTVExt by pibos.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.