APS Sistemas

Bridging Matrix Sip via Verto

9 minute read Published:

Connect Matrix to conventional telephony
Nov 30, 2014 One of the final remaining missing bits of Matrix today is specifying and implementing the Application Service (AS) APIs which allow you to easily extend Matrix with custom server-side functionality. The AS APIs should let you perform any arbitrary manipulation on chatroom contents, modulo end-to-end encryption constraints – e.g. machine translation; archiving/searching contents; interactive automated services; conferencing; firing push notifications and other hooks; etc. If you really want to look behind the curtain, the bug tracking the development (somewhat out-of-date) is at SPEC-34.

Build container images in Kubernetes and Google Container Builder without privileges

1 minute read Published:

Google Cloud
Building images from a standard Dockerfile typically relies upon interactive access to a Docker daemon, which requires root access on your machine to run. This can make it difficult to build container images in environments that can’t easily or securely expose their Docker daemons, such as Kubernetes clusters (for more about this, check out the 16th oldest open Kubernetes issue. To overcome these challenges, we’re excited to introduce kaniko, an open-source tool for building container images from a Dockerfile even without privileged root access.

C With Classes

5 minute read Published:

C Programming
This is a thought experiment. I couldn’t imagine someone would go to this trouble without just using C++ instead. Someone on Reddit asked recently if structs could be used to emulate classes. Early on when learning Java, it was explained to me that the difference between a struct and a class is that a class can do something. I don’t know how accurate that is, but we can certainly call function pointers from a struct:

It`s Time to Rebuild the Web

7 minute read Published:

The World Wide Web
The web was never supposed to be a few walled gardens of concentrated content owned by a few major publishers; it was supposed to be a cacophony of different sites and voices. Anil Dash’s “The Missing Building Blocks of the Web” is an excellent article about the web as it was supposed to be, using technologies that exist but have been neglected or abandoned. It’s not his first take on the technologies the web has lost, or on the possibility of rebuilding the web, and I hope it’s not his last.

The Loginataka

6 minute read Published:

Hacker How-To
Speak, O Guru: How can I become a Unix Wizard? O, Nobly Born: know that the Way to Wizardhood is long, and winding, and Fraught with Risks. Thou must Attune thyself with the Source, attaining the arcane Knowledge and Conversation of the System Libraries and Internals. Yea; and such an all-consuming Time and Energy Sink is this as to greatly Imperil thy Grade Point Average (if one thou hast), not to mention thy Sex Life (if one thou hast).

Epidemiological Modeling of Online Social Network Dynamics

1 minute read Published:

The last decade has seen the rise of immense online social networks (OSNs) such as MySpace and Facebook.
The last decade has seen the rise of immense online social networks (OSNs) such as MySpace and Facebook. In this paper we use epidemiological models to explain user adoption and abandonment of OSNs, where adoption is analogous to infection and abandonment is analogous to recovery. We modify the traditional SIR model of disease spread by incorporating infectious recovery dynamics such that contact between a recovered and infected member of the population is required for recovery.

Manifiesto Por La Guerrilla Del Acceso Abierto

3 minute read Published:

Manifiesto de Aaron Swartz
La información es poder. Pero como con todo poder, hay quienes lo quieren mantener para sí mismos. La herencia científica y cultural del mundo completa, publicada durante siglos en libros y journals, está siendo digitalizada y apresada en forma creciente por un manojo de corporaciones privadas. ¿Querés leer los papers que presentan los más famosos resultados de las ciencias? Vas a tener que mandarle un montón de plata a editoriales como Reed Elsevier.

Servidor OpenVPN en Ubuntu LTS

26 minute read Published:

Configura tu propia VPN con OpenVPN
Introducción ¿Quieres acceder a Internet de forma segura desde tu teléfono inteligente o portátil cuando está conectado a una red no confiable como la WiFi de un hotel o cafetería? Una Red Privada Virtual (VPN) le permite atravesar redes no confiables de forma privada y segura como si estuviera en una red privada. El tráfico emerge del servidor VPN y continúa su viaje hasta el destino. Cuando se combina con conexiones HTTPS, esta configuración le permite proteger sus inicios de sesión y transacciones inalámbricas.