Bird watcher with Raspberry Pia project by scuescu |
k3ka project by hgalalabdelazizahmed |
Contributing to Linux Kernel securityan idea by pperego Description |
Investigate and model Ceph cluster performancea project by LarsMB Predicting the non-functional properties of a Ceph cluster can be quite difficult. There are many inputs in the hardware setup and software configuration that affect the resulting availability, reliability and performance (latency and throughput at nominal levels and during degraded and rebuild times). |
Secure keyboardan idea by mwilck This idea was inspired by the recent discussion on the "talk" mailing list about the (in)security of the German ID card. The Chaos Computer Club and other researchers claim that the ID card is insecure. Actual attacks that have been demonstrated are based on keyloggers. |
|
iSCSI integration in Warewulfa project by ncuralli Description |
Support listing resources for hierarchical namespaces in Kubernetesan invention by comurphy |
Do something useful with the TPMan idea by mwilck Almost all our laptops, and many servers, feature a TPM today. The TPM doesn't have the best reputation in the community because it could be used to lock down platforms or do nasty things with DRM. Under normal conditions on PCs, the TPM is controlled by the system owner and could actually be useful for almost anything involving crypto. Unfortunately the integration of the TPM in the OS is essentially non-existent. The introduction of the TPM2.0 standard complicates matters, because we now have two different devices with different APIs. |
AI Pianoan idea by lin_ma
|