Do you have an old desktop PC or laptop? We have happy news to you. You can reuse it, rather than throw it away or leaving it unused. To revive your computer, install a GNU/Linux operating system that supports old computers and is actively supported. This will give your old computer a fresh life once again, for general purpose, as well as for specific purpose like multimedia creativity and programming. You can receive latest software and security updates by using one of them on your old machine. Finally, we compile these choices in alphabetical order from antiX to Zorin OS that still support up to 15 years old computers a.k.a. 32-bit PCs with tens of thousands latest software packages. Happy computing!
Previously I mentioned having AMD VCN h264 support. Today I added initial support for the older UVD engine[1]. This is found on chips from Vega back to SI.
I've only tested it on my Vega so far.
I also worked out the "correct" answer to the how to I send the reset command correctly, however the nvidia player I'm using as a demo doesn't do things that way yet, so I've forked it for now[2].
What is Environment Variable in Linux? The variable is a path of the executable files that Linux systems can recognize globally on the Command terminal or by any other application. For example, We can open firefox via the command terminal by simply typing its name rather than the whole path of the actual executable file where it resides. In the same way when we install Java its executable binary can be used by other applications easily even GUI ones.
Making things happen on a regular and predictable schedule is important on computers. It's important because, as humans, we can sometimes be bad at remembering to do things reliably because we get distracted, have too much on our minds, or we're on holiday. Computers are really good at doing things on a schedule, but a human has to program the computer before the computer takes action.
In a way, the cron system is an easy and rudimentary introduction to programming. You can make your computer do what you want it to do just by editing a file. You don't even have to know where the file is kept. You have only to type in a simple command, enter the "recipe" you want your computer to follow, and save your work. From then on, your computer executes your instructions at the specified time until it is told to stop.
By design, cron is not a complex system. Here's what you need to know about it.
Hello, friends. We really like Docker and Jenkins so I thought why not make a post about both? Yeah, that’s a good idea. So, in this post, you will learn how to run Jenkins with Docker Compose. The process is simple and quick to do.
In this tutorial, we will show you how to install CUDA on Linux Mint 20. For those of you who didn’t know, The Nvidia CUDA toolkit is an extension of the GPU parallel computing platform and programming model. It allows your applications to use different types of GPUs very conveniently.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a CUDA Nvidia on a Linux Mint 20 (Ulyana).
Python is an object-oriented, high-level programming language. As of today, Python 3.10 is the latest stable version available for productions environments. Most of the Debian-based Linux distribution includes older versions of Python in software repositories. Also, the Debian packages are not available for all distributions. This tutorial has been tested on Ubuntu 20.04 Linux system.
This tutorial will help you to how to install Python 3.10 on Ubuntu, Debian, and LinuxMint systems using source code. T
RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL that a group of community volunteers maintains. RPM Fusion is not a standalone repository but an extension of Fedora’s default packages that could not be included due to Fedora being bound by the same legal restrictions as Red Hat.
The RPM Fusion repository comes in two flavors, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.
In the following tutorial, you will learn how to install RPM Fusion on your Fedora 35 operating system.
When buying an Android smartphone, users may notice that there are some unwanted applications (bloatware), which are installed but cannot be removed, because these applications are installed in the system. And in order to change the system rules and be able to remove the default apps installed in the system, the user needs root privileges.
But, rooting in android in my country, can void the warranty if the smartphone was recently purchased. So I don't recommend doing this. If you don't like some of the default applications on your smartphone, users can actually disable them. But sometimes some default applications cannot be disabled.
KernelCare is fabulous kernel update tool by CloudLinux. We started testing this kernel patch in a few servers and the result has been truly amazing, allowing us to avoid server downtime after kernel updates because of each server reboot we had to apply after the kernel was updated. Today we will show you how to run a KernelCare installation.
Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).
Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.
Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).
Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.
As a frequent Ansible user, I'm always looking at ways to simplify my playbooks and save time during playbook debugging. One of my favorite features for writing robust Ansible playbooks is its support for tags. This article introduces tags, walks through some common tag scenarios, and outlines more advanced usage.
In a Linux system, you can easily rename a file using mv command. But, if you have multiple files which you want to rename, in this situation you need some extra tools or built-in Linux utilities for solving this problem.
In this tutorial, we learn the different methods to rename multiple files in a Linux system at once.
I’ve often struggled with procrastination, and to-do applications have been lifesaving. I sometimes find myself needing a reminder to just focus on getting the most important task done before working on anything else.
With that in mind, I created a simple photo frame to sit on my desk and remind me of my most important task of the day using e-paper and a Raspberry Pi. I wanted to use e-Paper specifically since it’s low-power and not as distracting as a standard display would be. If you’re the kind of person who likes a simple reminder of your most important tasks, here’s how to build it for yourself.
Apache JMeter is open-source like any other Apache foundation project. It is meant to analyze system functional behavior by running performance tests, regression tests, stress tests, and database servers based on different technologies. However, earlier it was designed to test only web applications.
JMeter is Java-based, hence can be used to know what would be the performance of various applications and software. It sends a request to web or application servers for different loads by simulating browser behavior. The scripting language for JMeter is Groovy (an object-oriented programming language used for the Java platform). Browser plugins are also supported in this testing platform.
Being a Linux enthusiast implies that you are familiar with both the hardware and software entities of your system.
The usual style of executing a command on a Linux terminal is to simply run it and wait for it to gracefully exit. Once the command exits, you can then proceed to execute other commands in succession. This is what is known as running commands in the foreground. As the word suggests, you can visually see the output of the command on the terminal.
Sometimes, however, running commands in the foreground can present a set of challenges. The command can take too long to exit causing you to waste precious time and other times, it can be totally attached to the shell session leaving you stuck.
In such cases, running a command in the background is your best bet. You can send a command(s) to the background as you concurrently execute other commands in the foreground. This improves the efficiency of working on the terminal and saves you time.
In this guide, we focus on how you can run Linux shell command or script in the background.
Linux top command is widely used by Linux system administrators in real time to check system resources utilization such as CPU, disk I/O, system load average, running processes and memory utilization.
I usually use Oracle OSWatcher Black Box (OSWbb) to collect various system data to diagnose performance issues for a period of time.
But if you want to collect a list of processes that consume high CPU and memory on your system for a specific period of time, you can do this using the top command.
To redirect the top command output to a text file, the top command must be executed in batch mode.
In this guide, we will show you how to capture the top command output in files for a specific duration for troubleshooting performance issues.
Automation pervades most other contemporary IT trends. Cloud and cloud-native? You’re talking about automation. Security and DevSecOps? Again, you’re talking about automation. Talent and culture? Yep, you’re still talking about automation.
IT is both in the midst of its own automation transformation and also an indispensable catalyst of organization-wide automation strategies. It’s actually difficult to exaggerate the role that automation is playing in businesses and industries of all kinds today. (The “automate all the things” meme has a kernel of truth to it.)
Resilience, in the context of psychology, refers to ability to adapt well to adversity, trauma, tragedy, or other sources of significant stress. Being resilient has benefits for both individuals and organizations – as has clearly been on display over the last two tumultuous years.
CIOs know well how their team members’ capacity to adjust positively to workplace pressures, changes, and setbacks contributes to the IT function’s performance.
Because resilience is a set of learnable skills and approaches rather than a fixed characteristic, there are ways that IT leaders can help to build and hone resilience among their people. “Just as with ourselves, fostering resilience in our teams is a matter of helping them build skills and mindset that support a hopeful, solution-oriented response to obstacles, challenges, and unanticipated change,” says Erika Andersen, leader readiness consultant and author of Change from the Inside Out.
However, doing this well requires a nuanced understanding of what constitutes resilience and a deft touch in encouraging this critical capability in healthy ways. Here are some ways IT leaders can help their team members develop and deploy their resilience:
The latest versions of Red Hat Software Collections and Red Hat Developer Toolset for Red Hat Enterprise Linux (RHEL) 7 are now generally available. Software Collections 3.8 delivers the latest stable versions of many popular open source runtime languages, web servers, and databases natively to the world’s leading enterprise Linux platform. These components are supported for up to five years, helping to enable a more consistent, efficient, and reliable developer experience.
Here's a quick overview of the updated development tools and collections you'll find in this release.
Since 2019, the Call for Code Engagement Awards have recognized organizations that have answered the call and exhibited a deep commitment to Call for Code.
Call for Code inspires a community of change agents to build, contribute to, and deploy solutions for the most pressing global social issues and humanitarian causes. As Call for Code has grown over the last few years, so have the ways corporations and universities have stepped up and engaged with us to help drive tech-for-good solutions. These organizations help us make Call for Code solutions tangible and scalable. Some have provided pathways for their employees to participate in our global challenge. Others have hosted spot challenges to address causes that align with both their own corporate responsibility goals as well as the issues of focus for Call for Code, such as natural disasters, climate change, COVID-19, and racial justice. Whether they provided technology or data sets for challenge participants to use in their solutions, or offered deployment support for winning solutions, or brought Call for Code initiatives into the classroom as a way to engage university students, every one of our sponsors and partners has been instrumental in the success of Call for Code initiatives.
This year a new Call for Code Ecosystem Engagement Award has been added, providing us the opportunity to also recognize non-profit organizations that are essential in ensuring Call for Code solutions are applicable to real-world problems and adopted by impacted communities to create real change.
We’re pleased to announce the full list of 2021 Call for Code Engagement Award winners. The Call for Code team is so grateful for the collaboration and commitment from all of this year’s award recipients, as well as our dedicated sponsors.
The std::array notation in C++ is an alternate method of declaring and initializing the arrays in C++. However, a question might arise in your mind that when we can declare and initialize the arrays already, then why do we even need this notation in the first place? In this article, we will try to explore the answer to this question. After that, we will share some examples with you to demonstrate the usage of the std::array notation in C++ in Ubuntu 20.04.
The std::array Notation in C++:
We have already stated that the std::array notation in C++ is an alternate method of declaring and initializing the arrays. However, we still need to figure out the need to use this notation. Generally, there are two types of arrays in C++, i.e., static and dynamic. Both these types of arrays have their pros and cons. The static arrays lose all the information regarding their size once they are passed to a function as a pointer, whereas the dynamic arrays’ deallocation is very problematic.
Therefore, the std::array notation is used to make the best usage of both of these types, i.e., using this particular notation, a static array never loses the information that it contains even when it is passed to a function. This is exactly why we use this notation in C++. You will learn more about the usage of this notation in C++ by going through the next section of this article.
I finally started to translate Japanese Perl Zemi to English.
Perl Zemi | Perl Zemi|Perl Installation, Perl Tutorial, Many Examples
Perl Zemi is Japanese Perl Tutorial site which is well known and red in Japan. Most of all Japanese Perl users know Perl Zemi and read the document repeatedly.
PHP contains many built-in functions to read the content of any existing non-empty file. The file_get_contents() is one of the built-in functions of PHP to read the entire content of an existing file as a string. The syntax of this function is given below.
Array variables are used to store multiple values where each value is accessed by using the index value. Sometimes we need to search a particular element in an array for programming purposes. The in_array() is a built-in function of PHP to search specific elements into an array. It searches data in a case-sensitive manner. The way to use this function for searching value in an array has been described in this tutorial.
The JSON is a popular data format that is used to serialize and transmit structured data between the web server and application because the JSON file is human-readable and lightweight. The json_encode() is a built-in function of PHP that converts the array or object into JSON data for various purposes. The various uses of this function have shown in this tutorial.
The password_verify() function is used to match the hash password with the original password. Another function, password_hash() is used to generate the hash value based on the hashing algorithm, cost, and salt value. The password_verify() function contains all hashing information to verify the hash with the password. The uses of this function have been shown in this tutorial by using multiple examples.
When a PHP script is used in multiple files for programming purposes, then it is better to write the script in one file and include the file in those files without writing where the script is required. PHP has many built-in functions to include any existing file in a script. These are require(), require_once(), include(), and include_once().
The task of require() and require_once() are the same, but the one difference is that the require() function does not check the file has been included before or not but the require_once() function check the file has been included before or not. If the file has been included in the script before, then the require_once() function will not include the same file again. How the require_once() function is used to include files in PHP has been shown in this tutorial.
The unset() function is used to reset any variable that has been defined earlier. Two types of variables are used in any programming language. One is a global variable and another is a local variable. The variable defined outside the function is called a global variable that is accessible from anywhere in the script. The variable defined inside the function is called a local variable that is accessible inside the function only.
If the unset function is used for the local and global variables, then it resets both variables locally. That means the value of the global variable remains unchanged that was defined before changing inside the function. The $GLOBALS array or global keyword can be used to unset the global variable permanently. The uses of this function to reset PHP variables have shown in this tutorial.
The var_dump() function is a built-in function of PHP to find out the information about the value and data type of one or more variables. It also provides information about the length of the data for the string variable. The information about both scalar and compound variables can be retrieved by using this function. Different uses of this function have been shown in this tutorial.
To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.
We have released date gem version 3.2.1, 3.1.2, 3.0.2, and 2.0.1 that include a security fix for a regular expression denial of service vulnerability (ReDoS) on date parsing methods. An attacker can exploit this vulnerability to cause an effective DoS attack.
What exactly does one do after leaking thousands of documents from the world's most powerful social media company? For Frances Haugen, the answer is obvious: start a youth movement. Facebook has faced stinging criticism over the whistleblower's document drop, not least the revelations that the company knew its Instagram photo app had the potential to harm teen mental health.
"Devastating." "Disturbing." "Horrific." "Shameful."
Advocacy groups, human rights defenders, fellow reporters, and other readers of The New York Times were outraged Saturday after journalists Dave Philipps and Eric Schmitt published their investigation into a deadly 2019 U.S. airstrike in Syria and all that followed.
The Jerusalem-based rights group B'Tselem released a report Sunday that accuses Israel's "apartheid regime" of using settler-colonist violence to take control of Palestinian farmland and pastureland, focusing on nearly 11 square miles in the illegally occupied West Bank.
"The settlers are not defying the state; they are doing its bidding."
How freakish and biblical our climate emergency could become was illustrated this week in the Upper Egyptian city of Aswan, which was struck in November by rolling lightning storms, downpours, snow, and a plague of scorpions. High winds blew the deadly Egyptian black, fat-tailed scorpions from the surrounding desert into the city and into people’s homes. The scorpions killed three persons with their venom and left hundreds sickened, as Egyptian rescue crews tried to distribute the antidote.
U.S. President Joe Biden and Chinese President Xi Jinping are expected to hold a virtual summit on Monday evening, their most high-profile meeting yet following phone calls in February and September. It comes at a moment of immense uncertainty and flux in the U.S.-China relationship, and its outcome has the potential to set the two sides on a course they will follow for the remainder of Biden's presidency, for better or for worse.
“Collectively and individually we are still falling short,” bellowed Obama, in his signature manner. “We have not done nearly enough to address this crisis. We are going to have to do more. Whether that happens or not to a large degree is going to depend on you.”
The crux of Obama’s speech was directed at the world’s youth, placing the burden of curtailing climate change on their shoulders. No doubt, if the planet's young people were in charge of COP26, there wouldn’t be empty pledges and sneaky cop-outs (like the US/India/China/Russia refusing to end their coal production), there would be tangible goals, and harsh, real-world consequences for not abiding by these agreements.
China’s latest blanket ban did send the [cryptocurrency] space in a tizzy for a while. But then, don’t we already know that Bitcoin and Altcoins are particularly good at ‘bouncing back’.
Speculations and possibilities aside, China’s [cryptocurrency] crackdown in 2021 has been rather uncompromising. Despite being considered a running joke by experts, which is to fade out in time, the tough approach hasn’t been all that pleasant for the traders. With the latest announcement coming in with disparate figures, exchanges like CoinSwitch Kuber reported an almost 30 per cent fall in weekend transactions immediately after the ban was reported.
Meanwhile, former Karnataka chief minister and Congress leader Siddaramaiah alleged that politicians and officials were involved in a Bitcoin scam in the state. Siddaramaiah has also claimed that there was an effort to cover up the alleged scam but did not mention who the politicians were.
However, the Karnataka government has referred 'bitcoin scam' to the Enforcement Directorate (ED) and Central Bureau of Investigation (CBI) because of the international nature of transactions.
In the beginning my co-founder and I were interested in entering the crypto market and starting our first fiat exchange platform for Central and Eastern Europe.
Finding reasons for local or state elections in national politics won’t necessarily produce a full picture, particularly in New Jersey, where voters have the habit of electing Democratic congressional and state legislative delegations, consistently voting Democrat in presidential elections but often voting for Republican governors. This time around, particularly in the New York City mayoral race and local races in the city’s Long Island suburbs, unfounded fears of crime waves that largely existed only in the feverish imaginations of right-wing commentators seemed to have tipped more than a few votes. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.
In the past two decades evangelicals in Latin America have gone from being marginalised foreign missionaries to powerful political mouthpieces. Explaining their rise as a religious phenomenon in which the lively “garage churches” of poor urban neighbourhoods displaced the theologically stick-in-the-mud Catholic church isn’t very enlightening. In quantitative terms, it seems simple enough: they’ve turned their numerical heft into political capital. But the important point is that the political arena in which they operate is neoliberalism for which, as a kind of theological superstructure or at least justification, they’ve become one of the Hydra’s many monstruous heads.
To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.
Every day, ICE locks up over 20,000 people in a sprawling nationwide network of more than 200 detention facilities. The ACLU believes that this system of mass incarceration of immigrants should be dismantled—it's unnecessary and inhumane. For as long as ICE maintains its detention network, though, it has a responsibility to create an oversight system that is actually effective at detecting, addressing, and deterring abuse of detained people. Our analysis of recent ICE inspection documents shows that ICE's inspection system remains ineffective at identifying violations by detention facilities and ensuring compliance with detention standards, allowing facilities with clear records of poor conditions, including some of the deadliest facilities, such as the Stewart Detention Facility in Georgia, to evade accountability.
Rittenhouse's defense, though, argued that the method used by a state investigator to enlarge the photos couldn't be trusted to accurately show Rittenhouse's actions.
James Armstrong, a senior forensic imaging specialist with the Wisconsin State Crime Lab, acknowledged on the stand Thursday that enlarging an image requires the addition of pixels. But prosecutors said the software Armstrong used is widely accepted - as is the method he used to enlarge the photos.
Software programs used to analyze video evidence provide several ways to enlarge photo or videos, based on algorithms. The attorneys' debate over which is more accurate created a technical slog as testimony wound down this week.
The British Medical Journal€ (now€ The BMJ) is one of the oldest and most respected medical journals in the world that also has a history of publishing some excellent investigative journalism. For instance, over a decade ago, it was€ The BMJ€ that published investigative journalist Brian Deer’s articles€ recounting the strong evidence indicating that Wakefield’s case series published in€ The Lancet€ that linked the measles-mumps-rubella (MMR) vaccine to autism was based on fraud. That study launched the modern iteration of the antivaccine movement and is, as I like to say, the study that launched a thousand quackeries directed at autistic children to “cure” them of their “vaccine-induced autism.” The headline of Deer’s accompanying commentary after his account of how the “case against the MMR was fixed” even referred to Wakefield’s study as “Piltdown medicine“, after the€ infamous Piltdown Man fraud.€
I thought this was a critical moment to stop merely reading about the abuses Amazon workers face, and to work there myself, while hiding my identity as an organizer who advocates for workers’ rights. I wanted to understand on the ground level what the work environment is like. Most importantly, I wanted to understand what kind of organization we will need to challenge and confront not only Amazon, but the entire system of just-in-time delivery and logistics, which has become central to our contemporary economy and its accompanying inequalities.
P2P release group EVO has built quite a reputation in recent years by being the first to release pirated copies of screeners and popular movies. But what drives the group to take such an immense risk? Talking to TorrentFreak, EVO says that it's mostly fun and partly motivated by Hollywood's profit focus.