schmonz.com is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #OpenSource

dch :flantifa: :flan_hacker: boosted

[?]jbz »
@jbz@indieweb.social

wireguard-fpga: Full-throttle, wire-speed hardware implementation of Wireguard VPN, using low-cost Artix7 FPGA with opensource toolchain

github.com/chili-chips-ba/wire

    [?]FreeBSD Foundation »
    @FreeBSDFoundation@mastodon.social

    🎓 2025 Google Summer of Code participant Aaron Espinoza ran a project to test FreeBSD device drivers written in Rust. Here’s a short introduction to that piece of work.

    Watch Aaron’s GSoC talk: youtu.be/y82-t1tDLWg?si=9n6X3u
    💻 Explore the code: github.com/Acesp25/rustkld

    We’re grateful to Aaron, his mentors, and the FreeBSD/GSoC community for advancing this work.

    👉 What are your thoughts on using Rust for FreeBSD driver development?

      [?]Dendrobatus Azureus »
      @Dendrobatus_Azureus@mastodon.bsd.cafe

      I've been only able to read this IT note today due to band with constraints. It read like a Stephen King short. Horrific!

      IMHO, In my humble opinion, the company involved used tactics that I can describe as blatantly criminal.

      I have some stories and I may talk about one in another post, using similar of obfuscation techniques

      You would be wise to read this story at least twice.

      Read between the lines.

      Observe that the company was selling open source services yet used criminal tactics to keep people locked in

      Link

      it-notes.dragas.net/2025/10/08

      The image is a screenshot of a mobile messaging application interface, likely a text message or similar platform. The screen displays a portion of a message exchange, with the focus on text content. The top portion of the screen shows the time “11:06” along with cellular network and battery indicators. Below that is the text of a note from an "Author," reading: "Important Note: Before we begin, an important clarification. What follows is a story based on real events from my career. However, to protect the privacy of the people and companies involved, I have deliberately mixed things up: technologies, contexts, and specific details have been modified or merged with other experiences. Therefore invite you to read this story not as a strict chronicle of a single event, but as an archetype of a widespread problem in the IT world: vendor lock-in and predatory business practices. Any attempt to identify the specific company or software would lead to an incorrect conclusion. More about it here." The bottom portion shows a notification about an incoming phone call and a message bubble indicating a sent message. At the very bottom of the screen is a navigation bar with icons for Home, Checkmark, and a Chat bubble, and also a URL: "notes.dragas.net".

Provided by @altbot, generated privately and locally using Gemma3:27b

🌱 Energy used: 0.182 Wh

      Alt...The image is a screenshot of a mobile messaging application interface, likely a text message or similar platform. The screen displays a portion of a message exchange, with the focus on text content. The top portion of the screen shows the time “11:06” along with cellular network and battery indicators. Below that is the text of a note from an "Author," reading: "Important Note: Before we begin, an important clarification. What follows is a story based on real events from my career. However, to protect the privacy of the people and companies involved, I have deliberately mixed things up: technologies, contexts, and specific details have been modified or merged with other experiences. Therefore invite you to read this story not as a strict chronicle of a single event, but as an archetype of a widespread problem in the IT world: vendor lock-in and predatory business practices. Any attempt to identify the specific company or software would lead to an incorrect conclusion. More about it here." The bottom portion shows a notification about an incoming phone call and a message bubble indicating a sent message. At the very bottom of the screen is a navigation bar with icons for Home, Checkmark, and a Chat bubble, and also a URL: "notes.dragas.net". Provided by @altbot, generated privately and locally using Gemma3:27b 🌱 Energy used: 0.182 Wh

        [?]VM (Vicky) Brasseur »
        @vmbrasseur@social.vmbrasseur.com

        Grateful to see that @sovtechfund has funded @igalia to work on for Servo, the Rust-based, next-gen web browser engine.

        igalia.com/2025/10/09/Igalia,-

          [?]nixCraft 🐧 »
          @nixCraft@mastodon.social

          A cross platform desktop app that works on linux, macos, and windows devices for downloading video and audio files from 100s of different websites.

          github.com/aandrew-me/ytDownlo

            [?]Hyde 📷 🖋 :debian: »
            @hyde@lazybear.social

            Greg Wilson boosted

            [?]Erioldoesdesign »
            @erioldoesdesign@hachyderm.io

            Interview at the fantastic publication unprinted (www.unprinted.design author Ozgu Ozden) about the open source design contributions to civic tech OSS projects workshop from Design Matters Tokyo 25!

            unprinted.design/articles/desi

            ✨More designers making OSS technology have fantastic user experiences ✨

            Thank you to Yuki Kawabe for being my co-interviewee and a fantastic workshop partner.

            Also thanks to Code for Japan (code4japan.org/) for collaborating on this workshop and Fu-Syuan Wang and Shin Okamoto for being the other fantastic designers in OSS supporting the workshop 💐

              🗳

              [?]Michael Blume »
              @BlumeEvolution@sueden.social

              Spreche heute beim in u.a. über und . Möchte dabei eine ggf. streitbare These vertreten: Ich prognostiziere, dass große - KIen a la - Grok & mit enormen - & Kapitalkosten mangels Geschäftsmodell eine weitere produzieren. Deren Platzen könne Milliardenwerte vernichten. Die Zukunft werde dagegen kleineren, spezialisierten - Anwendungen gehören.

              Wie siehst Du das?

              Halte ich auch für wahrscheinlich.:23
              Halte anderes Szenario für wahrscheinlicher.:2
              Habe noch keine / andere Meinung dazu.:2

                [?]FreeBSD Foundation »
                @FreeBSDFoundation@mastodon.social

                🎉 Congratulations to Kayla Powell on completing their Google Summer of Code 2025 project with FreeBSD!

                Programs like Google Summer of Code give students the opportunity to make meaningful, long-term contributions to FreeBSD while working closely with experienced mentors.

                Learn more about FreeBSD’s involvement in GSoC: freebsd.org/projects/summerofc

                What advice would you share with students or first-time contributors just starting their open-source journey?

                  [?]Jan Wildeboer 😷:krulorange: »
                  @jwildeboer@social.wildeboer.net

                  If you own or have access to an embroidery machine, or if you want to learn how the combination of and the [1] plugin works, I have created a mirror on where you can download all my stitching files as SVG and DST. CC0, so free to use in whatever way you like.

                  codeberg.org/jwildeboer/inksti

                  [1] inkstitch.org

                  A kitten with a bandana as stitching file.

                  Alt...A kitten with a bandana as stitching file.

                  The nerdcert logo as stitching file

                  Alt...The nerdcert logo as stitching file

                    dch :flantifa: :flan_hacker: boosted

                    [?]Terence Eden »
                    @Edent@mastodon.social

                    🆕 blog! “How to *actually* test your readme”

                    If you've spent any time using Linux, you'll be used to installing software like this:

                    The README says to download from this link. Huh, I'm not sure how to unarchive .tar.xz files - guess I'll search for that. Right, it says run setup.sh hmm, that doesn't work. Oh, I need to set the permissions. What was the…

                    👀 Read more: shkspr.mobi/blog/2025/10/how-t

                      [?]gyptazy »
                      @gyptazy@gyptazy.com

                      Automated Security Patch Management for clusters? The next major feature of comes with automated node patching on Proxmox clusters! This becomes real with the upcoming version 1.2.0!


                      ProxLB with upcoming new major features for Proxmox based clusters

                      Alt...ProxLB with upcoming new major features for Proxmox based clusters

                        [?]BastilleBSD :freebsd: »
                        @BastilleBSD@fosstodon.org

                        Want to contribute?

                        BastilleBSD is open-source.

                        Docs, testing, templates, feedback—all welcome.

                        Your expertise can help shape our next release!

                          [?]xinqu »
                          @xinqu@mastodon.bsd.cafe

                          Can't stop giggling about this. The problems you could encounter with comments in your code when read by the wrong people.

                          >> Lessons learned Open Sourcing the UK's Covid Tracing App - by Terence Eden <<


                          youtube.com/live/qdEMmM5g27M?s

                            [?]Ruth Cheesley (she/her) »
                            @rcheesley@mastodon.online

                            How do we claw our way back from a proprietary marketing stack towards digital sovereignty?

                            In my latest blog post, I've suggested a five step process to help you move from being fully colonised to fully sovereign. It's not something that will happen overnight. It takes time, commitment, policy change and dedicated resources, but it's increasingly becoming a vital pathway to owning your own marketing data:

                            ruthcheesley.co.uk/blog/digita

                              [?]pedestrian cyclist »
                              @odoruhako@mastodon.social

                              How would people transfer content that they might not want to share publicly, but that is generally "low risk"?
                              Let's say someone has a file of some copyrighted movie from 1985 on their disk and wants to share it with me. They have no specific tools, just an "ordinary PC". Also they are "just a friendly stranger", so probably no one will want to exchange any sensitive credentials to share the file... Also, they might not want to torrent it.

                                Back to top - More...