With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
The Secure Workspace for Remote Work
Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.
Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Mainly this project aims at easing startup and use of XCSoar (see xcsoar.org) on Kobo Mini. But the scope of use should not be limited solely to XCSoar.
The Launcher should be small in code size, reuse most of the original libraries, provide flexible configuration to any application that might be ported to the Kobo Mini. It supports customizable fonts, toolbox-pages, buttons (also graphical), labels, autostart and sleep timers.
mkinitramfs & mkinitrd replacement and (eventually) alternate /init
Many complex storage environments running within GNL/Linux could benefit from increased disassembly and resource remediation during shutdown. Underdog an alternate /init to create a "late" user context to resume control during shutdown to park media and detach network devices.
Currently there is a fully working initramfs (mkinitramfs/mkinitrd) replacement that is capable of building the early user context images both as separate files or built into the kernel image.
The working proof...
All Tini does is spawn a single child (Tini is meant to be run in a container), and wait for it to exit all the while reaping zombies and performing signal forwarding. It protects you from software that accidentally creates zombie processes, which can (over time!) starve your entire system for PIDs (and make it unusable). It ensures that the default signal handlers work for the software you run in your Docker image. For example, with Tini, SIGTERM properly terminates your process even if you...