TUXEDO Computers have returned with a splash today to show off their new Polaris 15 and 17 Linux laptops. They've been refreshed and upgraded with some powerful updated components with both AMD and Intel options.
"The choice between AMD and Intel has never been more difficult, as both processors are now almost on par - so our customers have a hard decision to make." — Herbert Feiler, CEO TUXEDO Computers
A team of scientists from Switzerland’s University of Applied Sciences Graubünden claim they have broken the world record for calculating the value of Pi. The researchers used a supercomputer to calculate the value of Pi to 62 trillion digits, breaking previous records set by Google and Engineer Timothy Mullicon, who holds the current record for calculating Pi’s value to 50 trillion digits.
“The calculation of the new pi-digit world record by the DAViS team at the University of Applied Sciences in Graubünden took 108 days and 9 hours. It is therefore almost twice as fast as the record that Google set in its cloud in 2019, and around 3.5 times as fast as the last world record from 2020," the researchers said in a statement.
Not only can the financial risks associated with security breaches be significant, but further cost can come in the form of user trust, which in light of evolving use cases post-Covid-19, can be even more critical to businesses.
With offices changing and transport networks set to adapt in line with new commuter behaviors, IoT solutions need to be safety-first to ensure they can guarantee positive user experiences that do not provoke alarm or concern. The customer confidence that is achieved through having a secure, user-friendly IoT device enables further development and investment. As the world moves into a ‘new normal’, it is vital that trust is at the heart of this, and safety-first IoT is the most effective means of achieving this.
IoT device manufacturers of all sizes should review and commit to developing and executing a sound cybersecurity strategy for all new products. As the threat landscape becomes more complex, manufacturers should leverage trusted computing technologies to provide more agility and speed of deployment - to be safe in the knowledge that all layers of security are implemented to protect against the growing sophistication of the threats of the future.
In the August 2021 survey we received responses from 1,211,444,849 sites across 263,733,974 unique domains and 11,327,711 web-facing computers. This reflects a loss of 4.99 million sites, but a gain of 1.64 million domains and 67,600 computers.
The number of unique domains powered by the nginx web server grew by more than a million this month, while Apache's count fell by 916,000. This has extended nginx's lead in the domains metric, giving it a 29.8% share compared with Apache's 25.5%.
OpenResty gained 234,000 domains, but its market share remained static at 14.5%, while Cloudflare gained 726,000 domains and increased its market share to 7.72%.
The number of web-facing computers using nginx has continued to increase, this month by 49,000 (+1.18%). There are now 4.19 million web-facing computers running nginx, compared with 3.52 million that run Apache. Microsoft follows in third place with 1.38 million computers.
The web-facing computers metric has painted a remarkably stable trend over the past several years, as is evident in the graph below, with both Microsoft and Apache steadily falling while nginx has progressively climbed to first overtake Microsoft in 2017, and then Apache during 2020. There has also been a rise in "Other" web servers, which includes several nginx-based spinoffs such as OpenResty and Tengine.
1:28 The News 24:36 Security Update 28:51 Bi-Weekly Wanderings 42:30 Announcements & Outro
First up in the news OpenSSH takes another step, Firefox and Thunderbird match now, Lots of new releases and AV1 headed for kernel support
In security, you were this close to having all games on Steam
Then in our Wanderings Joe started Joe’s Plumbing Service and I’ve been boring
Things are worse than we ever thought, but that doesn't prevent us from taking a victory lap.
When 21-year-old Linus Torvalds, a then computer science student from Helsinki, released a new type of computing system built on a kernel he created on Aug. 25, 1991, he laid the foundation for what became the Linux operating system.
Today the Linux community is estimated to be 86 million users strong. It has become the backbone of large enterprises and is installed in government systems and embedded in devices worldwide.
That percentage of Linux users is a bit misleading. When we dig down under that 86 million figure, we find that server, network, and enterprise use of Linux is extensive. But the number of desktop Linux users is vastly less large.
[...]
The Linux desktop offers users a reliable and rigorously secure computing alternative to Windows and macOS. But with no real marketing plan for desktop Linux, typical computer users are clueless that Linux exists as a viable and free operating system.
Even computer users preferring other platforms benefit from Linux. It has been ported to more hardware platforms than any other operating system, thanks to the popularity of the Linux-based Android operating system.
Android is the world’s most beloved consumer operating system (OS), powering billions of smartphones, tablets, smart TVs, and other gadgets all around the globe. While there are many other popular operating systems in use, none have accomplished quite such a broad reach as Android. The OS’ success story is a long and winding one but today we’re looking back to the true origin story.
Although Google (rightly) takes the credit for Android’s development, the operating system’s early building blocks owe their existence to the similarly ubiquitous but lesser-recognized Linux OS. Today, Linux distributions span Debian, Fedora, Ubuntu, and many, many others, powering PCs, servers, and Raspberry Pis all around the globe.
On August 25, 1991, Linus Torvalds posted his famous message to the comp.os.minix USENET group...
Today is the 30th birthday of our favorite operating system Linux. It is one of the biggest day in the history of technology. Right now, Linux is one of the most popular and powerful operating systems that is being used in wide range of sectors. It is powering laptops to mobiles, washing machines to super computers and so on.
It was on this day 30 years ago that a younger Linus Torvalds announced a free operating system to the comp.os.minix group and from there it exploded across servers, desktops and plenty more.
Now one of the most popular operating systems in the world, you can find it nearly everywhere you look including 100% of the top 500 supercomputers. There's a Linux distribution for everything, and Linux is what will also be powering the upcoming Steam Deck with Valve using SteamOS that's based on Arch Linux. What Torvalds said "won't be big and professional like gnu" has changed the world.
A year ago, I first announced libei - a library to support emulated input. After an initial spurt of development, it was left mostly untouched until a few weeks ago.
[...]
First, a short recap of what libei is: it's a transport layer for emulated input events to allow for any application to control the pointer, type, etc. But, unlike the XTEST extension in X, libei allows the compositor to be in control over clients, the devices they can emulate and the input events as well. So it's safer than XTEST but also a lot more flexible. libei already supports touch and smooth scrolling events, something XTest doesn't have or is struggling with.
Terminology refresher: libei is the client library (used by an application wanting to emulate input), EIS is the Emulated Input Server, i.e. the part that typically runs in the compositor.
Loongson this summer rolled out their 3A5000 processors built on their own "LoongArch" ISA. While the company continues claiming that LoongArch is "not MIPS", the Linux kernel code they continue proposing for the mainline Linux kernel points to it being a close facsimile to MIPS.
LoongArch is the Chinese company's effort to have a domestic processor not dependent upon foreign technology. While the company has long produced MIPS-based processor designs, with their new processors they are using LoongArch as they describe as "a new RISC ISA" for the Chinese CPU market.
AMD engineers continue working on preparing the Linux kernel for the Frontier supercomputer.
Much of the Frontier bring-up for the Linux kernel over the past number of months has been around supporting the coherent interconnect between AMD EPYC CPUs and the Instinct "Aldebaran" GPUs/accelerators with allowing CPUs coherent access to the GPU memory. The latest patch series out today for the Linux kernel is again focused on this GPU device memory handling.
AMD is building the world's fastest supercomputer, Frontier, which will deliver exascale-class performance for the US Oak Ridge National Laboratory (ORNL). The supercomputer brings a lot of new technologies to the table, and AMD is laying the groundwork for the software stack that will enable the Frontier to run smoothly. As reported by Phoronix, that work continues in the form of newly-submitted Linux kernel patches.
The Frontier supercomputer is a $600 million project that aims to provide more than 1.5 ExaFLOPs of computational power that will be used by ORNL for work on various government projects. Using next-generation EPYC processors and Radeon Instinct graphics cards from AMD, this system will bring a combination of novel memory, storage, and processing elements into one system.
Today marks the 30th birthday of Linux since it was announced by Linus Torvalds. Meanwhile in just a few days the Linux 5.14 kernel is expected to be released as stable. Here is a look back at the most prominent features coming for this kernel release.
In our close monitoring and testing of Linux 5.14 over the past number of weeks, here is what has us most excited with this forthcoming kernel:
- Continued bring-up around Intel Alder Lake support. Some more pieces / device IDs are still landing for Linux 5.15 but it appears Linux 5.14 should have Alder Lake in fairly good shape... One of the big additions for 5.14 was having Alder Lake P graphics support enabled. The elephant remains though around Thread Director with there not yet being any Linux scheduler patches -- queued or otherwise staging -- around Thread Director on Linux.
Earlier this month the AMD Ryzen 5 5600G and Ryzen 7 5700G desktop APUs officially launched for retail availability. Unfortunately we were not seeded with any review sample for being able to conduct Linux testing on these Zen 3 APUs with Vega graphics, but ended up purchasing one afterwards due to the number of readers inquiring about the Linux support. Here are some preliminary benchmarks of the AMD Ryzen 7 5700G.
By now those potentially interested in the Ryzen 7 5700G are likely familiar with all of the technical details, but as a recap the 5760G offers eight Zen 3 cores plus SMT for sixteen threads. The Ryzen 7 5700G has a 3.8GHz base clock with 4.6GHz maximum boost clock. There is a 4MB L2 cache, 16MB L3 cache, and this APU has a 65 Watt TDP. On the graphics side is Radeon Vega 7 graphics with eight graphics cores.
Keeping tabs on your passwords can be a daunting task. Often you are prone to forgetting them with time especially after prolonged periods of inactivity. Most users result in writing them down somewhere on a sticky note or notebook, which is considered a risky practice. Unintended or malicious users can get hold of them and your guess is as good as mine what can happen next.
Password managers help users to improve their online security by not only securing their passwords but also assisting them to generate strong and randomized passwords and encrypting them in a digital vault. There are numerous password managers and they vary in features and the computing platform that they are supported. In this guide, we highlight some of the most popular and 8 best password managers for Linux in 2021. We have incorporated both free as well premium plan password managers.
Have you ever thought about building your own small social network for you, your family, relatives, community, or team? Let's say, something like Facebook but on a small scale for private use!
Well, all you need is a self-hosted social network software and a server, and this article is to choose from the best open-source self-hosted social medial solutions.
If you ever think about it, computers are exceedingly stupid. Even the most powerful CPU can’t do very much. However, it can do what it does very rapidly and repeatably. Computers are so fast, they can appear to do a lot of things at once, too and modern computers have multiple CPUs to further enhance their multitasking abilities. However, we often don’t write programs or shell scripts to take advantage of this. However, there’s no reason for this, as you’ll see.
Plug is not the only interface with the middleware layer. Absinthe also comes with a middleware layer of its own and we can use it similarly to implement authorization for queries, mutations, and subscriptions.
If we want to authorize our GraphQL API and don’t want to do that within business logic (for various reasons), we can write a middleware that will handle it. I wrote about using Plug for authorization, but using a plain Plug wouldn’t work in this case.
Since GraphQL is essentially a graph, we need to cover authorization for all nested queries. Absinthe middleware can do that for us, and might also be used for specific query fields, which is quite handy.
Using a Bash script, you can ensure certain configuration parameters are set in your sshd_config file.
Bash is the default shell on most Linux systems these days. It can be used as an interactive command-line interpreter as well as a scripting language to automate common tasks. This article shows you how to use a Bash script to ensure specific configuration parameters are set in your /etc/ssh/sshd_config file.
TICKR is a news ticker desktop widget - a feed reader that displays news headlines as a small scrolling text line (ticker) on your desktop, available for Linux and Microsoft Windows.
Add your favorite website RSS feeds to TICKR, and the tool will show the latest headlines scrolling in a thin, semi-transparent window similar to those available on news TV channels. Hovering the mouse over the ticker pauses the scrolling, while pointing the mouse to a headline shows an excerpt of the article in a tooltip. Left-click the headline in TICKR to open it in your web browser.
This scrolling news desktop widget comes with the ability to import and export feeds (OPML), as well as a GUI to manage your RSS feeds, which includes some popular RSS feeds, and allows you to add, remove, re-arrange, enable or disable feeds.
So you are planning to switch from Windows to Linux, or have just switched to Linux? Oops!!! what I am asking! For what else reason would you have been here.
Follow this Docker Compose approach to make an easy deployment of Isso on a server based on the official Dockerfile from the devs.
Ubuntu operating systems come with AppArmor, a Linux kernel security module that allows the system administrator to restrict programs’ capabilities with per-program profiles. Profiles can allow network access, raw socket access, and permission to read, write, or execute files on matching paths. Rhel family users would notice this is similar to Selinux; however, they work a bit differently and have pros and cons each.
The following will cover how to enable and disable AppArmor and individual profiles; normally, most users would not need to adjust any settings with AppArmor, but if the need arises, some simple commands are all needed in the tutorial will explain.
Debian is known for its stability and reliability and preferred choice to set up a server for businesses and organizations. Debian recently got the latest release called Bullseye. Bullseye comes with many enhancements and upgrades. It offers a list of desktop environment support such as Gnome 3.38, KDE Plasma 5.20, LXDE 11, LXQt 0.16, and MATE 1.24. Moreover, this release has now 11,000 new packages and driverless printing and scanning support. This update also removes many obsolete packages. The manual page has also got significant improvements.
Seeing these enhancements and features will push every Debian user to upgrade except for the production servers. The production servers should wait for few months before upgrading to Debian 11 “Bullseye”. If you are using Debian 10 Buster and in search of a procedure to upgrade to Debian 11 then you are on the right spot.
This write-up will give you a thorough guide on how to upgrade from Debian 10 to Debian 11 Bullseye.
In this tutorial, we will show you how to install HAProxy on AlmaLinux 8. For those of you who didn’t know, HAProxy is one of the most popular open-source load balancing software, which also offers high availability and proxy functionality. It is particularly suited for very high-traffic websites and powers quite a number of the world’s most visited ones.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the HAProxy high-performance TCP/HTTP load balancer on AlmaLinux 8. You can follow the same instructions for Rocky Linux.
All systems, applications, and software generate information that is stored in files called logs. These logs must be constantly monitored to ensure the proper functioning of the system in question and prevent errors or security risks. They are often scattered over several servers and, as the volume of data increases, their management becomes more and more complex.
Graylog is a free and open-source enterprise-grade log management system that comprises Elasticsearch, MongoDB, and a Graylog server. It consists of the main server, which receives data from its clients installed on different servers, as well as a web interface, which is used to view the data collected by the server. Graylog is a similar tool like Splunk and LogStash.
In this tutorial, we learn how to install Graylog 4 on Ubuntu 20.04. We will also secure the Graylog server with an SSL certificate using Let's Encrypt.
Gulp is a free, open-source, and cross-platform JavaScript toolkit that allows you to automate many development tasks. It is a task runner built on Node.js and npm and used for automating many time-consuming tasks such as minification, concatenation, cache busting, unit testing, linting, optimization, etc. Gulp plugins are simple and designed to do a single job.
In this post, we will show you how to install Gulp on CentOS 8.
Basically, a Linux terminal environment enables a user to carry out various system functionalities like file management, system update, and applications management through a variety of executable commands. What if you are able to achieve all these Linux terminal environment objectives but in a flexible manner?
Brackets code editor is an open-source program. It is a code editor that assists web developers and designers in developing the front-end interface and also backend code of their websites. It is quite light in weight. It is compatible with a wide range of operating systems, including macOS, Windows, and Linux.
We've covered some of the most important features of this code editor program. This program allows the user to work on many files at the same time. It supports the installation of many extensions. Almost all file types are supported by the brackets code editor. This tool is the ideal solution if you want to modify big amounts of code.
A computer system without proper backup is as vulnerable as a piece of software without updates. The problem comes when we want to restore our system to a particular time point and can’t find the right tool to do so. In this guide, I will show you two tools that you can use to back up a Linux system. This tutorial doesn’t need a particular distribution running on your machine. You can have whatever you need. You must know how to choose a backup tool for Linux which is efficient and faster to get things done.
Using the terminal is something inevitable for every Linux user. It is quite like a chatbox that allows you to talk to your machine. Using the terminal efficiently can reduce your workload a lot. To use the terminal with ease, every user must know a lot of the Linux terminal shortcuts. Utilizing the Linux terminal shortcuts is the key difference between a power Linux user and a regular user.
Just master the command line shortcuts; you will have such a comfortable feel with the terminal that you have never felt before. Stick to this post till the end to get a crystal clear concept about Linux terminal shortcuts.
Star Traders: Frontiers from Trese Brothers Games, probably one of the best space strategy RPGs around had a huge upgrade and now there's some proper mod support in. The mods work with the Steam Workshop, making it simple and you're just a few clicks away from adding in some extra content to an already ridiculously in-depth game.
[...]
Since the mod support is rather new, there's not a whole lot up there right now but they have a passionate and very active community of players so no doubt there will be plenty flowing in eventually. The mods that have released that the developer worked with during a Beta are impressive though. One named Merchant Marine: Fly Casual entirely rebalances the game taking inspiration by Space Opera and Western tales giving you small ships with small crews up against the universe - making it all a bit more intimate.
What looks to be the fourth time, Might and Delight have decided to push the release date for Book of Travels. It was originally due out in October 2020, then Q2 2021, then August 9 and then August 30 and now they've put up another announcement because it just isn't ready.
At least this time around, they're not giving a date to avoid further disappointment. Writing about the delay, they mentioned how their Beta testers reports indicated their team just need more time to make it stable.
Prepare for more retro-styled action with Stellar Valkyrie, another new GZDoom-powered first-person shooter coming to Linux. Developed by In The Keep Games it's one we missed from Realms Deep 2021.
In Stellar Valkyrie you'll be blasting through 8 different worlds each with their own theme, as you attempt to find your ex-girlfriend, Kat. As a bounty hunter, you'll also be dealing with contracts to earn Cryptobucks, which you can then use to purchase upgrades for weapons and equipment and going back to previous worlds with new equipment might even allow you to discover more apparently.
Psychonauts 2 from Double Fine Productions and Xbox Game Studios is out now for Windows but the native Linux support has been delayed with no current ETA.
Originally crowdfunded on the Fig website, where Double Fine pulled in close to four million dollars from Fig directly and backers, Linux has been a confirmed platform since day-1. Sadly though, shortly after our last article in an update on Fig they mentioned that Linux (and macOS) would arrive after release which was confirmed again in their Steam FAQ post.
With a great soundtrack and action that won't let your attention leave it, REVO is a fresh twin-stick bullet-hell that will make you sweat and it's great. The first release from Cosmic Misfit Studio it's inspired by the likes of Galaga, TRON, and The Last Starfighter so if you love retro themes and shoot 'em ups you're gonna love this.
From start to finish (if you ever finish such a game), REVO is absolutely dripping in style and the action is so intense your screen will be yelling at you in neon lights. It's quite a sight once it gets going, and you have a few different weapons unlocked to unleash on various types of enemies. Some come in fast swarms to keep your attention, while others are slow with powerful weapons you're really going to need to be quick on the stick to dodge. REVO doesn't even start off slowly, with it launching wave after wave following a brief intro.
Wasteland 3 : Cult of the Holy Detonation is the next expansion for the big RPG to come from inXile Entertainment. It was announced yesterday for the start of Gamescom 2021, and it's going to be the final narrative expansion. Since they're now owned by Xbox Game Studios, they're probably moving onto something with a higher budget.
"Deep within the Cheyenne Mountain military complex, mutant cults worship an ancient deity they call the Holy Detonation—a nuclear explosion held in stasis. Whether god, science experiment, or accidental miracle, the Detonation's energy could power Colorado Springs for hundreds of years, or level it in an instant. The warring cults have differing opinions on who should be allowed to honor their god, and you’re going to have to muscle your way to the altar.
It’s possible to deep dive into the virtual reality gaming world on your Linux system. Want to explore VR games on Linux? This article takes you through the top 3 VR games available on Linux.
Ready to get amazed? Let’s start.
VR games are the new-gen computer games enabled with virtual reality, in short, VR technology. It gives players a first-person perspective of all the gaming actions. As a participant, you can enjoy the gaming environment through your VR gaming devices, such as hand controllers, VR headsets, sensor-equipped gloves, and others.
VR games are played on gaming consoles, standalone systems, powerful laptops, and PCs compatible with VR headsets including HTC Vive, Oculus Rift, HP Reverb G2, Valve Index, and others.
Let's welcome Latte Dock v0.10.1 the 1st Official Bug Fix Release of v0.10.x branch!
In some systems Plasma Restore session mechanism is trying to restore Latte when you login to your desktop environment. Unfortunately this is not the intended way to autostart Latte. Please follow these steps in order to configure your system properly...
I started my involvement focusing my activity in Open Source topics and, when senior talent was hired in this field, I incrementally focused on the infotainment platform, as part of the CEO Office. In the meantime I went from being hired by MBition directly (Berlin part-time) to work fully remotely from Spain (Daimler Group Services Madrid), becoming the front-line of a set up that is being consolidated nowadays, not just in Spain, but in other countries too, providing the company a path to become a global remote-friendly organization.
I am specially proud of the relation built by MBition with KDE, as example of the mutual benefit that Open Source communities and companies can enjoy when the company, in this case MBition, do the homework and take the right steps to build a sustainable relation. It sets a great example for MBition on how to build similar kind of relations with other communities and, at the same time, it brings a very interesting player to the KDE ecosystem, willing to use the technologies developed in the open into their vehicles.
We review the elementary OS 6 Odin and give you some glimpse on how it went for our test drive.
Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation.
A web-based administration interface for Unix systems. Using Webmin you can configure DNS, Samba, NFS, local/remote filesystems, Apache, Sendmail/Postfix, and more using your web browser.
Exodus Desktop gives you a way to Secure, Manage, and Exchange your cryptocurrency in one beautiful application.
This blog post is about a new Kubernetes feature introduced in v1.22, which adds an additional security layer on top of the existing seccomp support. Seccomp is a security mechanism for Linux processes to filter system calls (syscalls) based on a set of defined rules. Applying seccomp profiles to containerized workloads is one of the key tasks when it comes to enhancing the security of the application deployment. Developers, site reliability engineers and infrastructure administrators have to work hand in hand to create, distribute and maintain the profiles over the applications life-cycle.
You can use the securityContext field of Pods and their containers can be used to adjust security related configurations of the workload. Kubernetes introduced dedicated seccomp related API fields in this SecurityContext with the graduation of seccomp to General Availability (GA) in v1.19.0.
The negative impact of poorly run meetings is huge. So leaders face a challenge: how do we turn poorly run meetings—which have a negative impact on team creativity, success, and even cause stress and anxiety—to meetings with positive outcomes? But to make the situation even tougher, we now find most meetings are being held remotely, online, where attendees' cameras are off and you're likely staring at a green dot at the top of your screen. That makes holding genuinely productive and useful meetings an even greater challenge.
Memory access is one of the most basic operations in computer programs. It is also an unending source of program errors in C programs, because memory safety was never really a programming language goal in C. Memory-related issues also comprise a significant part of the top 25 security weaknesses that result in program vulnerabilities.
Memory access also plays an important role in performance, which makes memory management a prime target for performance tuning. It is natural, then, that dynamic memory management in the C runtime should have capabilities that allow fine-grained tracking and customizable actions on allocation events. These features allow users to diagnose memory issues in their programs and if necessary, override the C runtime allocator with their own to improve performance or memory utilization.
This article describes the clash between the quest for flexibility and introspection, on the one hand, and performance and security protections on the other. You'll learn why this clash ultimately led to a major change in how memory allocation (malloc) is implemented in the GNU C Library, or glibc. We'll also discuss how to adapt applications that depended on the old way of doing things, as well as the implications for future versions of Fedora and Red Hat Enterprise Linux (RHEL).
IBM Observability by Instana APM provides a comprehensive observability platform for an entire enterprise, able to track requests spanning from mobile to mainframe, and supporting environments from bare metal machines to hybrid multi-cloud deployments.
Instana automatically discovers, maps and monitors infrastructure, platforms, services and applications in real time, and captures 100% of requests and transactions occurring across the environments.
To achieve this, Instana provides specific monitoring support for a broad and growing list of technologies, including a large set of programming languages and frameworks, web servers and proxies, messaging systems, and data stores. The following figure shows the technologies and capabilities, platforms, and systems that Instana supports.
Auto-Updating containers can be very useful in some cases. Podman provides mechanisms to take care of container updates automatically. This article demonstrates how to use Podman Auto-Updates for your setups.
A growing body of surveys and other research suggests that hybrid workplaces aren’t a short-term fad. Employee interest in a hybrid work model is particularly high: The overwhelming majority (83 percent) of more than 9,300 workers surveyed by Accenture said they’d prefer a hybrid model going forward, for example.
More business and technology leaders are evangelizing this approach - considering, implementing, or already managing hybrid teams.
“This is the future of work,” says Vivek Ranjan, chief human resources officer of Zensar. The firm had already embarked on a “work from anywhere” (WFA) transformation prior to the pandemic. It first rolled out in India, where the company has hired 500 remote employees, with plans to expand its hybrid WFA approach to its offices around the globe. “Hybrid workplaces are here to stay,” Ranjan says.
(Hybrid models entail some defined mix of both in-person and remote work. For more detail and examples, read our related article: What is a hybrid work model?)
Surveys also suggest there may be a difference of perspective between the C-suite and the rest of the organization in terms of building culture, equity, and other important issues in hybrid workplaces.
The Outreachy candidate is seated next to Chris Lamb at the DebConf19 dinner in Brazil. Despite the large expense of a long-haul flight from Europe to Brazil, the woman is not listed as a speaker. Notice the big gap between the two women: the Outreachy appears to be sitting closer to Lamb and has to lean away from him to speak to the other woman.
In July, we put aside 2400 EUR to fund Debian projects. We haven’t received proposals of projects to fund in the last months, so we have scheduled a discussion during Debconf to try to to figure out why that is and how we can fix that. Join us on August 26th at 16:00 UTC on this link.
We are pleased to announce that Jeremiah Foster will help out to make this initiative a success : he can help Debian members to come up with solid proposals, he can look for people willing to do the work once the project has been formalized and approved, and he will make sure that the project implementation keeps on track when the actual work has begun.
The Librem 5 phone is one of those rare computers that is getting faster and better with age. Find out how we are investing our time and resources to make the whole of mobile computing better.
This video compares PureOS 10 Byzantium to an outdated Librem 5 running PureOS 9 from June 2020:
The Altair 8800 is one of the most important machines in computer history and many consider it to be the first personal computer. But not many computer users today would recognize it as such. At release, it couldn’t even output video and users could only interact with the Altair 8800 through a terminal or the front panel. Now you can relive history by emulating an Altair 8800, complete with front panel, on your Arduino Mega.
The front panel on the Altair 8800 contained several status lights and toggle switches. Those are cryptic when compared to our modern graphical interfaces, but the Altair 8800’s front panel was integral for working with the machine. Users would load programs and even key in bootloaders using the front panel. The panel would also give you useful debugging information, such as if data was moving from one memory address to another. Interacting with that front panel is a necessity if you want to get the full Altair 8800 experience.
We’ve not released a time travel shield for Arduino yet. But when we do, this Eye of Agamotto project will be a perfect fit. So even though it may not bend time yet, it does everything else we’ve seen in Doctor Strange.
allotropia provides innovative open source solutions for the digital collaboration age. Our customers value sovereignty over their data, and love the way Open Source software enables them to innovate with agency. Adding Collabora Online to our portfolio is the ideal addition, with highly compatible migration paths into hybrid and fully web-based product development.
Collabora Online is the powerful LibreOffice-based online office that supports all major documents, spreadsheets and presentation file formats, which can all be easily integrated in many infrastructures and solutions. Key features are collaborative editing and excellent office file formatting support. Collabora Online is excellent for enterprises that need a powerful office suite in the Cloud, or on-premises, that protects their privacy and allows them to keep full control of their sensitive corporate data. Collabora Online enables Hosting and Cloud businesses to include document viewing and collaborative editing functionality into their service offerings.
So, current LibreOffice git version now has support for drawing based on Skia also for the Mac. Both Raster and Metal (the Mac GPU framework). Below is the obligatory screenshot, and here is the hey-it-can-be-faster video.
Freelancers are often required to track their progress, time, invoices, and tasks in organized fashion to boost their productivity. It is not that easy to find one solution to do everything within one place. But, we are lucky with Kimai.
Kimai is the ultimate freelancing management solution, as it offers more than project and time management. It includes invoices management, customer support, activities, expanses management and more.
It also contains, multi-user support, team management and improved sharing and collaboration features and options which help freelancers build teams and track project progress.
This time is default internal data structure of the object.
Default internal data structure of the Object::Pad is hash reference. It feels good for me.
Delta Air Lines on Wednesday said employees will have to pay $200 more every month for their company-sponsored healthcare plan if they choose to not vaccinate against COVID-19.
Advantech has added many key features to BIOS Wizard, the rapid custom BIOS configuration tool exclusively produced for its embedded hardware platforms. Now supporting Linux and Microsoft Windows, the latest version, BIOS Wizard 2.0, offers extra features that provide users even more control over their systems' startup behaviour.
These new features incorporate the capability to configure the boot order according to particular use cases, as well as the possibility to customise the sign-on message, enabling easy identification and tracking of customised BIOS versions.
The tool has greatly improved parsing compatibility for multiple UEFI based images, supporting many extra company products, including older generations.
Hacking and hackers are well-known terminologies in the world nowadays. When people hear these words, they adopt a false imagination related to crime.
As you know ethical hacking is a very sensitive area.
When you join the ethical hacking class then You will have learned some advanced skills related to cybersecurity and finding the vulnerability, which is really good and appreciable but you can not practice these skills in the real world.
Because doing any type of activity, for example scanning, finding vulnerability, compromise system are illegal.
illegal activities will send you jail definitely.
If You use your skills to hack a system without the owner’s permission, you could send you jail. So hacking is a very sensitive field.
"Given that the cloud holds a seemingly endless amount of computing power, hackers have a clear motive in stealing computing resources to run their cryptocurrency mining activities."