Anbernic unveiled the 'RG35XX,' a compact, pocket-sized gaming console that runs on a custom Linux operating system. The operating system is Anbernic's fork of Emulation Station, which allows for convenient navigation of retro games, especially when combined with Anbernic's function button, which acts as a back button and a quit button.
Escape Windows Linux Format style! We guide the first time Linux user through the install maze to escape Microsoft to software freedom. Discover how you can run Linux anywhere, any how and any time with one of the best beginner-friendly options: Elementary OS!
If you're interested, you can buy the Lenovo Yoga 7i using the links below. It's one of the best Lenovo laptops you can buy right now and a great option for almost any kind of user, especially since the 14-inch and 16-inch models cater to different people.
When the market for proprietary UNIX workstations collapsed, few vendors survived… and those that did seemed not to learn much from it.
OSnews has an interesting post on "the mass extinction of UNIX workstations," and makes a some good points. Some of them are interconnected: for instance, while a decade or two back, old UNIX kit was almost worthless and was often being thrown away, now it commands serious prices from collectors – and some things, notably the software to run on the machines, is totally unobtainable these days.
That's good news if you have the likes of an old SPARCstation in storage: You might be pleasantly surprised at what it's worth now.
Another big issue, though, is what the knowledge and the skills are worth. There are many people running Linux (and possibly more saliently FreeBSD) servers today who learned and polished their skills on this stuff. There are multiple forms of value in keeping old machines running: educational value, in seeing how things were done. Lessons in performance optimization, resource usage, scalability, and so on. In the 1990s it was not unknown for high end corporate email servers to support tens of thousands of users, in as little memory as a first-gen smartwatch (for instance the first Apple Watch had 512MB). Knowing how to do that is useful knowledge, even now.
Linux Mint 21.1 beta has just been released to look for bugs and issues. This release has a lot of cosmetic updates and some tools to make using the system smoother. It is an LTS, so it will be good to install for a number of years.
In this video, we are looking at how to install Gimp on KDE Neon.
Google likes to just randomly kill projects that are going well and that extends to the Chromium team as well who just ended JPEG XL when it was picking up a lot of steam and had massive industry support.
A Quick Overview of Fedora 37
Here are my top 5 picks for the best Open Source & Native Linux games. You can find these popular games in every Linux store front and nearly every Linux software repository. Linux has a rich history in native & open source gaming dating back into the 90s. Several of the games featured in this video are forks (or continuations) of those games! The games I featured here are based on what I know & have played up to today. I hope to discover more awesome Linux games and show case them next year! — Games Featured in Top 5 5. X
At the weekend, Linus Torvalds hit the button, releasing Linux 6.1 to the world. Among other security features is support for writing parts of the kernel in Rust.
Last month, the NSA pleaded with devs to switch to memory-safe languages—such as Rust. The reason: Most security vulnerabilities are caused by bugs in memory usage.
Linux’s initial focus is to write new device drivers in Rust. In today’s SB Blogwatch, we love to oxidize.
Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Disney voice actors.
In our v6.0 blog post we mentioned that Rust for Linux support was pending for v6.1: its basic infrastructure is now merged.
Moving on to other exciting news, thanks to Google and community efforts, this release cycle brings the much-awaited Multi-Generational Least-Recently-Used lists (MGLRU) mechanism giving outstanding performance improvements. As presented by the Google ChromeOS team and in the Android mini-conference at this year's Linux Plumbers Conference, the enhancements provided by MGLRU include an overall app launch time decrease of around 47%, direct reclaiming efficiency improved to a maximum of 43%, kswapd's CPU usage dropped by an outstanding 92%, and more.
Another remarkable advance is the introduction of the Kernel Memory Sanitizer (KMSAN), helping developers worldwide improve security by adding a code testing mechanism based on compiler instrumentation (for now, Clang only) that will detect various issues including information leaks, uninitialized variables, and more.
In the past, video editing in Linux significantly lagged behind other popular operating system. While there was a good range of software, the vast majority offered limited functionality. However, the situation dramatically improved, in part because of development on multimedia frameworks (such as GStreamer and MLT). Furthermore, the versatility of Linux video editors has improved markedly. Linux now represents an excellent platform for editing video.
You can easily master touch typing on your Linux desktop. All you need is a little bit of persistence and one of these typing tutor apps.
Typing fast and accurately is an essential skill in the 21st century, as dictation software isn't yet up to the task of ridding your work of superfluous "ums," "ahs," repetition, and random punctuation.
Typing tutors can help increase your speed to the level where words flow from your fingertips efficiently and smoothly.
In this video, I am going to show how to install deepin 20.8.
Linux (or its shells) is a powerful tool that can manage to perform all tasks on a workstation or server without a single hitch, giving you complete control over your system.
Like managing the background process, setting up a web server, monitoring the network devices, handling a single or group of users, taking backups, and many more.
All users having complete control over the system can also be damaging to the system. That is why you restrict the normal users by taking sudo permissions.
The Boost C++ libraries are a collection of open-source C++ libraries that provide support for tasks and functionalities commonly used in C++ development. The Boost libraries are highly respected among C++ developers and are widely used in many applications and software projects.
The Boost libraries are designed to be portable, well-documented, and easy to use. They are distributed under the Boost Software License, which allows them to be used for both open-source and commercial projects. The Boost libraries cover a wide range of topics, including utilities, algorithms, data structures, and many others.
The swap file is used when your system is running out of memory (RAM) and will use some portion of your disk to keep the processes running.
Though it's a good idea to always have some swap on your system. But if you have more than enough system memory and want to save some gigs from your main drive and in that case, you may remove the swap file from Ubuntu.
And in this tutorial, I will show you how to remove the swap file step by step.
The 'at' command is most useful for scheduling one-time jobs in Linux.
ClickUp helps your teams and team managers to plan, track and manage any type of work for your project management needs. It’s simple to use, and it offers most of the features your teams require to get things done.
But did you know ClickUp has a desktop application that includes at least one feature your teams could seriously benefit from? The app is available for Linux, macOS and Windows, and it adds native desktop notifications to the experience. That feature alone is worth installing the desktop application.
Think about it: You use ClickUp every day to stay ahead of your project’s demanding schedule. Although you can get notifications in the browser, for that to work, you have to have the ClickUp tab running and your browser configured to allow desktop notifications. If your browser doesn’t allow you to configure per-site notifications, you could easily be inundated with them.
In this tutorial, we will show you how to install AnyDesk on Fedora 37. For those of you who didn’t know, AnyDesk is my favorite proprietary remote desktop application for connecting to remote Linux and Windows machines. With AnyDesk, users can securely access and control another computer as if they were sitting right in front of it, even over low-bandwidth or unreliable connections. This can be useful for providing remote support, collaborating with team members, or accessing files and applications on a different computer. To use AnyDesk on Linux, you will need to install the AnyDesk software on both the remote and the local computer, and then use the AnyDesk address of the remote computer to establish a connection.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the AnyDesk remote desktop on a Fedora 37.
In this tutorial, we learn the shortcuts or commands to delete all lines from a file in the VIM or VI text editor on Linux instead of pressing the Del key again and again.
VIM or VI is a popular text editor available in almost all Linux operating systems by default. We can use it to edit files using the command line interface. This text editor is light in weight, however for beginners it is quite complicated. But once you have familiarized yourself with the different operating modes, you can no longer do without the helpful services of the lean, but almost arbitrarily expandable editor.
By default, all PostgreSQL connections are insecure, which can cause security issues when run in high-traffic production environments.
Mono is a free and open-source .NET Framework-compatible, cross-platform development framework. It implements Microsoft’s .NET legacy for a number of platforms using a single codebase, including Windows, macOS, and Linux. Mono can be thought of as a toolkit working much like Microsoft’s .NET Framework does, however it is released as Free and open-source software under the MIT license rather than being proprietary software.
The main goal of Mono is to allow for the creation of .net applications on different platforms without restrictions from other toolsets. This includes the same DLL file format so that no code has to be rewritten for new platforms and the same infrastructure for executing .NET applications so that the same APIs can be used.
BIND or Berkeley Internet Name Domain is free and open-source DNS Server software.
vnStat is a free, open-source, and console-based network traffic monitoring tool for Linux operating system. Lightweight and low CPU usage.
Need to mess with your camera on your Linux desktop? Unfortunately, many webcam manufacturers don’t support Linux. That’s ok, though. Try out Cameractls. It’s an advanced webcam application that allows users to fine-tune their webcam settings with ease.
The history command in Linux is a useful tool that allows users to view a list of previously executed commands. This command is especially useful for users who frequently use the command line interface (CLI) to execute a series of commands, as it allows them to easily access and repeat previous commands without having to remember and type out the full command.
The history command was first introduced in the Unix operating system in the early 1970s, and has been a staple of the Linux CLI ever since. This command is typically used in conjunction with other commands, such as grep, to search for specific commands in the history list.
Whether you’re managing a network at work or just watching out for your home systems, it’s important to understand your network connections--how you communicate with public systems and those on the local network. This article covers some of the most important commands available on Linux to help you get a clear understanding of your local network and how it reaches outside.
While the links provided include important tips on using network commands, some include commands that have been deprecated in favor of newer commands. Some of the most important commands to know today include ip a, ip neigh, ping, tracepath, dig, tcpdump and whois.
Your PC has broken down, and you can’t get to the repair shop until the weekend. A deadline is due, and all you have is a Raspberry Pi single-board computer.
What do you do?
Well, you use the Raspberry Pi. But what about all those important office and productivity apps? Incredibly, all the office software you need is available on Raspberry Pi, from word processors and spreadsheets to video conferencing and cloud storage.
System administrators can allow a user to execute any command without any passwords using Sudo rights, also known as superuser do. This command temporarily elevates privileges, allowing users to do crucial tasks without logging in as the root user. As a result, you must authenticate yourself by entering your login credentials into the system, confirming that you have the appropriate rights to perform tasks.
However, providing this information again overtakes time, but there is a way that you can use it to disable the authentication. As a result, this article will show you how to create a password-less sudo on Ubuntu and Linux Mint.
Many Linux distributions ship Bash as the default login shell, but if you want to replace it with another shell like ZSH or Fish, then you can use the chsh command to change the existing or specific user login shell.
In this article, you will learn the usage of the chsh command with practical examples.
In UNIX/Linux, the mkdir command is used to create single or multiple directories (also referred to as folders in some operating systems) in the current working directory.
If the specified directory is already present in the current working directory, then the “File exists” error will be thrown unless the “-p” flag is not assigned.
Apart from that, you can also specify the permission in character or numeric while creating the directory, but to perform all this action, you should have proper permissions.
In this article, you will learn all about the mkdir command with practical examples.
Kdenlive 22.12 Release Adds Useful New Features Kdenlive is an open-source cross-platform video editing software built by the KDE community, which has been around since 2003.
Built using Qt and KDE Frameworks, it has been the editor of choice for many users out there.
Recently, the latest upgrade to it i.e Kdenlive 22.12 has been made available, let me take you through the release.
KDE’s Kdenlive video editor released version 22.12 this Monday! See what’s new and how to install guide for Ubuntu 22.04 and Ubuntu 22.10.
The new release of the video editor overhauled the whole guide/marker system. The new ‘Guides’ dock is available to seek, search, sort and filter all marker and guide.
Kdenlive 22.12 also improved support for Glaxnimate integration. It now sends the content of the timeline to Glaxnimate (need version >= 0.5.1) which then shows it as background, which makes it much easier to create animations that play together with your videos.
Are you an avid user of Ubuntu’s desktop icons extension but wish it did just a little bit more? If so, there’s an enhanced GTK4 version you need to check out.
The perfunctorily-titled ‘Gtk4 Desktop Icons NG’ extension is a direct fork of the regular Desktop Icons NG extension that Ubuntu has shipped with since Ubuntu 21.04 (trivia: that extension is itself a fork of the original desktop icons extension created by GNOME developers).
So what’s special about it?
Previously on Futures, Work-Stealing, and such.
One thing I admired during the early days of Python Twisted was how it took advantage of the language to write asynchronous code which read as synchronous. Pretty much all the modern languages now have some form of this in stackless or stackfull form.
C has been able to do it for ages but it generally doesn’t play well outside of constrained applications. The primary things you have to worry about are functional tooling like debuggers (thread apply all bt wont show you all your fibers) and features like thread-local-storage.
If you’re careful about when you suspend your fiber, the later isn’t so much of an issue. Where it can become a serious issue is if you do something like call an intermediate function which uses callbacks and the callback suspends. In this case, the intermediate function (out of your control) might have some TLS state cached on the stack, which of course could be modified before resume is called.
But either way, dex (wip title newlib) has support for fibers now which can be spawned using dex_scheduler_spawn(). Fiber stacks are given a guard page so that stack overflows are still guarded. It tries to do a bit of madvise() when it makes sense to.
First and foremost I want to thank GNOME for sponsoring my visit to Kuala Lumpur, Malaysia. It was nice meeting the people who have similar interests and also who actually build the GNOME I use and love.
All of them absolutely love open source and the work they do. And most of all, they were all excited and happy to showcase their art. Those would be one of the most engaging communications I’ve had in quite a while.
There were people from Singapore, Malaysia, India, Denmark, Hong Kong, Albania, Italy, and USA. I attended all that talks I could and apologize for the ones I missed owing to sleeping late in the morning due to my body clock. Malaysian time is 2h30m ahead of Indian time.
One reason it was bought is to do OpenEmbedded builds, freeing up my main workhorse Lenovo desktop computer. It is doing that right now, and indications are the build will take about three days.
I never timed the build on the Lenovo, as it stopped many times and had to fix recipes. Now it looks like will run right through. This is the new OE Kirkstone build, and compiling a whopping 1,620 packages, including biggies such as Chromium and LibreOffice.
When the build started yesterday, the CPU temperature crept over 80€°C, which was a concern. I read somewhere that at 90€°C there will be possible CPU damage. EasyOS has Wcpufreq, launched via the "System" menu, and I played with some frequency scaling. Settled on "powersave" mode, running at a constant 1.4GHz. CPU temperature dropped to around 50€°C.
openSUSE Leap 15.3 will reach the Ãâ¢nd-of-Life on December 31. So if you’re still using it, it’s time to upgrade to Leap 15.4. Here’s how to do it.
On December 13, 2022, openSUSE Leap 15.3 will reach the End-of-Life (EOL) and will no longer be supported. Unfortunately, this means there will be no further security updates or bug fixes for the operating system.
In other words, those who continue to use EOL versions will be exposed to vulnerabilities because these discontinued versions no longer receive security and maintenance updates.
So, if you are currently using openSUSE Leap 15.3, it is time to upgrade to a newer version to continue receiving security updates and bug fixes. This article will show you how to upgrade from openSUSE Leap 15.3 to the currently supported Leap 15.4 version.
Creation of an official Fedora Spin shipping the Budgie Desktop environment.
I’ve been spending some of my time off in the last few days pondering replacing my old reliable home server with something new and shiny. I figured this might be a good time to write up some thoughts around this.
On behalf of the Fedora Design Team, I am excited to invite the Fedora community to the Creative Freedom Summit January 17-19th, 2023. This free virtual event focuses on promoting open source creative tools, features, and benefits of use. The Summit is open to anyone interested in learning more about open source tools, how and why to use them, as well as connecting with other creatives working in the open source ecosystem.
To attend the event, join the Creative Freedom Summit Element chat. The Element chat is where you can watch the live stream of the sessions, connect with others, and get updates about the event. The event will also be streamed live to the Creative Freedom Summit LinuxRocks Peertube Channel.
The opportunities and the market for artificial intelligence are growing rapidly, and organizations are increasingly relying on it to improve productivity and profitability. However, AI deployment is not without risks – including customer privacy, bias, and security concerns. As AI becomes more embedded in decision-making, the potential to amplify both the positive and negative impacts of decisions at scale escalates.
To fully realize the transformative potential of AI, we must responsibly harness the technology and establish a framework of trust. Resources and guidance can help organizations avoid potentially harmful situations and look optimistically at how this disruptive technology can benefit humanity.
It’s essential to develop a comprehensive responsible AI framework that includes practices, tools, governance, responsibilities, and more. This framework should enable responsible AI by design, resulting in increased transparency and trust across the AI lifecycle.
There are new iso images of Sparky 2022.12 Special Editions ready to go.
Sparky “GameOver” Edition features a lightweight desktop, a very large number of preinstalled games, useful tools and scripts. Built for gamers.
Sparky “Multimedia” Edition uses a lightweight desktop environment and features a large set of tools for creating and editing graphics, audio, video and HTML pages.
Sparky “Rescue” Edition is an operating system which works in a live DVD/USB mode only (no installation on a hard drive). The Live system contains a large set of tools for scanning and fixing files, partitions and operating systems installed on hard drives.
The December update of Sparky Special Edition iso images features Linux kernel 6.0.12 of the 6.0 line, and other updated packages from Debian and Sparky testing repos as of December 12, 2022.
Dec 13, 2022, RISC-V Summit, San Jose – Canonical joins the RISC-V summit again and showcases the progress achieved in 2022. Followed by the enablement of the first RISC-V board – SiFive Unmatched in 2021, Canonical Ubuntu continues to explore more opportunities with various partners.
- Siemens Digital Industries Software today announced that its SokolTM Flex OS software now supports RISC-V embedded development with the availability of one of the industry’s first commercially supported, extensible, and customizable Linux€® platforms for the RISC-V architecture. Based on the popular, open-source Yocto Project industry standard, Siemens‘ Sokol Flex OS helps embedded developers create customized, Linux-based systems for RISC-V architectures with ease, security and confidence.
I assume many of you are watching the Twitter soap, waiting for the moment that the social media platform burns down completely. Its fresh owner Elon Musk is abusing his newfound powers to vent his far-right extremist ideas, firing most of Twitter’s employees, shutting down the content moderation team, and so on.
You should definitively be looking for an alternative if you are interested in socially interacting with other people through online platforms. And especially if you represent a business or an organization and use Twitter as a communication medium, you must absolutely reconsider whether you are using the right platform.
A lot of people have been looking for alternatives to satisfy their Twitter habits. That process already started in February 2022 when Musk announced his intention to buy Twitter. But after completing that deal and essentially taking over daily operations, there has been a massive exodus. The platform which is absorbing most of this exodus as new users seems to be Mastodon. But Mastodon is a different platform than Twitter and a lot of new users struggle with the concepts. There’s a lot of documentation but not everyone reads documentation prior to jumping into the action.
I will share some pointers that may help you make the decision to move to Mastodon and getting all setup there.
I first got involved with LibrePlanet as a volunteer a few years back. By that point, I'd enjoyed participating in the conference via IRC and watching the talks online for a few years, and I was looking for ways to get involved. As I couldn't make it to Boston to attend LibrePlanet in person, I volunteered online, with tasks such as helping watch over the conference IRC channels and answering questions as best as I could. I seemed to have done a decent job, since the FSF folks later asked if I could do the same for a few non-LibrePlanet online FSF events too, which I gladly accepted.
Having enjoyed both participating and volunteering for LibrePlanet, I thought it would be great if I could give a talk of my own, too. This only became possible for me after 2020 with the possibility of doing remote presentations. Since I sadly cannot attend the event in person currently, this was a welcome side-effect of the conference temporarily switching to an online-only format. So, I submitted a proposal to talk about "Jami and how it empowers users" for LibrePlanet 2021, which was accepted and became my first LibrePlanet talk. Though presenting, or even just submitting a talk at a large conference like LibrePlanet, may sometimes seem like an intimidating task, I had a great time presenting mine, thanks in no small part to the FSF staff and other volunteer organizers, as well as the audience members.
We’re happy to announce that Linux App Summit 2023 will take place in Brno, Czech Republic on April 21–23, 2023. For 2023 Linux App Summit (LAS) will again be held as a hybrid event, allowing attendees and speakers to join virtually or in person at our venue in Brno. Linux App Summit (LAS) is a conference focused on building a Linux application ecosystem. LAS aims to encourage the creation of quality applications, seek opportunities for compensation for FOSS developers, and foster a thriving market for the Linux operating system. Everyone is invited to attend! Companies, journalists, and individuals who are interested in learning more about the Linux desktop application space and growing their user base are especially welcome. The call for papers and registration will be open soon. Please check linuxappsummit.org for more updates in the upcoming weeks.
Mozilla has released security updatesââ¬Â¯to address vulnerabilities in Thunderbird, Firefox ESR, and Firefox. An attacker could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review Mozilla’s security advisories for Thunderbird 102.6, Firefox ESR 102.6, and Firefox 108 for more information and apply the necessary updates.
Surprise! Bugzilla’s not dead yet. :-)
So I posted a bunch of this a few months ago on the developers mailing list but it’s time to get it in front of a bigger audience. :-)
I am trying to kick-start getting stuff moving again with Bugzilla since most of the core Bugzilla volunteers have had job changes over the last few years that have left them with less time to spend on the project, so things have been very slow going for a while. For those that don’t know, I’ve been more or less of a figurehead of a project leader for a number of years now, not having much time to spend on Bugzilla, but not having anyone in a position to be able to step in to replace me, and only stepping in myself to make decision calls when the other developers were at an impasse. I’ve attempted to hand off control of the project to someone else twice in the last 10 years or so, and both times, the person I was about to hand off to got a new job and didn’t have time for it anymore just before we were about to do the hand-off (on the plus side, that happened before they took over and not after). It takes a while for someone to build the trust needed to know I’m leaving it in good hands, so without a lot of active developers it’s hard to get someone in place to do that. But I’ve had some life changes of my own now, which actually give me more time to spend on Bugzilla finally, so I’m getting back in the saddle and taking direct control again. I’ve probably poked at it more in the last 5 or 6 months than I have in the last 5 or 6 years combined.
Bugzilla project lead Dave Miller has posted a plan for several upcoming releases of the bug-tracking tool. The post starts with: "Surprise! Bugzilla’s not dead yet. :-)". It is, in effect, an update to his August posting to the Bugzilla developers mailing list. In the new post, he outlines the plan for releases of multiple branches, lists specific areas where help is needed, and describes some project infrastructure improvements.
Before we close the year, we wanted to take a moment to reflect and look back on what we accomplished in 2022. This year continued to be a roller coaster ride of ups and downs, and we know how important it is to have something in life you can rely on. So, here at Firefox, we continued to focus on the features that mattered the most and meet you where you are at. If there’s one thing you can count on, it’s that Firefox will always deliver the best web experience wherever you are.
Copyleft protects Free Software from becoming proprietary. Free Software chess engine Stockfish filed a lawsuit when ChessBase distributed parts of Stockfish work under a proprietary license, violating GPL-3.0 obligations. Checkmate! Stockfish was victorious. ChessBase must comply fully with GPL-3, hire a Free Software Compliance Officer, and list their Free Software elements online, before they can distribute the Stockfish software or make it publicly available again.
[...]
Registration for Youth Hacking 4 Freedom ends on 31st December. The coding contest welcomes 14-18 year old Europeans who wants to hack a Free Software project of their choice and win cash prizes. As some of the winners from the last edition stated, participating was a lot of fun and a great opportunity. Check our video with the winners presenting their projects in Brussels. Share this opportunity among your friends and community! Moreover, you can send it to schools, teachers, and young people in your region.
The PHP development team has announced the immediate availability of PHP 8.2.0 of the popular general-purpose scripting language.
According to the website, PHP 8.2 is a major update of the PHP language, offering many new features, including read-only classes, new standalone types, performance improvements, and more.
According to the documentation, “as of PHP 8.2.0, a class can be marked with the readonly modifier. Marking a class as readonly will add the readonly modifier to every declared property, and prevent the creation of dynamic properties. Moreover, it is impossible to add support for them by using the AllowDynamicProperties attribute. Attempting to do so will trigger a compile-time error.”
To correctly clone a JavaScript object, you can use the Object.assign() method to create a new object with the properties of the original object.
To detect mouse wheel events in JavaScript, you can use the addEventListener() method to register a function that will be called whenever a “wheel” event is fired.
This blog will give you a brief overview of profiling C and C++ applications. Additionally, it will lay before you all of the tools available, with the purpose of aiding you in choosing the right tools at the right times.
[...]
Before we look at the actual tools, let’s go over the steps to profiling. It’s quite important to have a technique for doing this properly, to avoid the trap of changing something hoping it’s better, committing it, and going home without making sure that you’ve actually improved things. So the way to do that is by, first, assessing what is important in terms of performance in your project. Is it the CPU usage? Is it the off CPU time, when your application is sleeping or waiting for something to happen? Is it memory allocations? Is it the battery usage that is the problem? Do you want to improve the frame rate? It can be many, many different things, not just one. It’s a whole set of measures.
[...]
Another tool you can use to measure performance is perf, which is part of the Linux kernel. That means it supports all of the architectures of the Linux kernel, including x86, ARM, PPC, and so on. Unfortunately, perf has no user interface. It’s a command line tool that is pretty difficult to use. So, we at KDAB wrote a tool called Hotspot, which is a graphical interface for the measurements made by perf.
For the Inkscape project and its users, interoperability with other software packages, both free and commercial, is of high importance. The PLC has decided to hire a developer for the equivalent of 1.5 months (part-time schedule available) to implement importing functionality of a file format for which Inkscape yet lacks proper support. An extension of the project to up to 3 months (with additional compensation) may be granted depending on the success of the first half.
While the Inkscape team consists entirely of volunteers, this will be a paid contractor role.
The work may start between 2023-02-15 and 2023-03-15, and assuming a full-time schedule, will be finished around 2023-05-01. Applications may be submitted until Monday, Jan 9, 2023, 23:59 UTC.
Cryostat is a container-native JVM application that provides a secure API for profiling and monitoring containers with JDK Flight Recorder. In the newest release, Cryostat 2.2, three new and updated views for archived JDK flight recordings managed by Cryostat have been added to the web client, along with new recording filters and enhanced features for recording metadata and custom labels.
[...]
When we first come upon the view, we can see a card that includes three tabs, one titled All Targets, the second titled All Archives, and the last titled Uploads. By default, the All Targets view will be selected. A checkbox on this view includes the option to Hide targets with zero recordings. By unchecking the box, we can see all targets Cryostat has discovered, with or without any associated archived recordings.
What good is a floating point operation embodied in a vector or matrix unit if you can’t get data into fast enough to actually use the compute engine to process it in some fashion in a clock cycle? The answer is obvious to all of us: Not much.
People have been talking about the imbalance between compute and memory bandwidth for decades, and every year the high performance computing industry has been forced to accept less and less memory bandwidth per floating point operation because increasing memory bandwidth is exceedingly difficult in a fashion that doesn’t also end up being very pricey.
According to NordPass’ latest list of top 200 most common passwords in 2022, “password” is the most popular choice, followed by “123456”, “123456789”, “guest” and “qwerty“.
The Federal Bureau of Investigation (FBI) and CISA have updated joint Cybersecurity Advisory AA22-335A: #StopRansomware: Cuba Ransomware, originally released on December 01, 2022. The advisory has been updated to include additional indicators of compromise (IOCs).
The following versions of APC Easy UPS Online, an uninterruptible power supply (UPS) monitoring software, are affected:
APC Easy UPS Online Version 2.5-GA and prior (Windows 7, 10, 11, Windows Server 2016, 2019, 2022)
APC Easy UPS Online Version 2.5-GA-01-22261 and prior (Windows 11, Windows Server 2019, 2022)
CISA has released three (3) Industrial Control Systems (ICS) advisories on December 13, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
Citrix has released security updates to address a critical vulnerability (CVE-2022-27518) in Citrix ADC and Citrix Gateway. An attacker could exploit this vulnerability to take control of an affected system. This vulnerability has been exploited in the wild.
As Elon Musk has decimated Twitter’s workforce and welcomed back some of the platform’s most polarizing figures, many Twitter users have decided they’ve had enough of his chaos and are migrating to smaller, niche platforms.
This influx of users to platforms such as Mastodon, Hive, and Post, which have a fraction of Twitter’s resources, raises the question whether these social media upstarts can cope with the privacy and security concerns of a rapidly growing user base — ranging from how smaller platforms secure private messages to how they would respond to law enforcement requests for data.
“For any company that is suddenly having this huge blow up in size as a communications outlet, I think it’s a very reasonable question and concern,” said Jake Laperruque, deputy director of the Center for Democracy and Technology’s Security and Surveillance Project. “Odds are you’re going to start getting more if not a lot more law enforcement demands for private communications. And the question is: Do you have the resources to handle those?”
At a grocery store checkout in the Jordanian refugee camp of Azraq, Sameera Sabbouh stares wide-eyed into a scanner to pay for her shopping - her iris scan unlocking payment from a digital aid account with the help of blockchain technology.
Many of the nearly 40,000 Syrians who live in the camp recognise the convenience of the cashless, card-free payment method, which verifies recipients’ identity by referencing a U.N. database, but few said they like it.
“It’s really tiring. It doesn’t take the eye scan in the first try - it is two or three times before it takes the scan,” said Sabbouh, a mother-of-two from Aleppo who fled the city in 2015. “I would rather have my fingerprint scanned.”
One of our favourite projects and kindred endeavours from this last decade has been The Appendix, a quarterly journal of experimental history published between 2012 and 2015. Among the many innovative features they included in their online offering was an index, pointing to pages on their site instead of those bound in a book. In 2019, Appendix co-founder and publisher Brian Jones joined the PDR team, and we have been dreaming about having an index of our own ever since. We are pleased to announce — thanks to Brian’s wonderful work — that it has finally arrived!
Why index a site like ours? Writing about Conrad Gessner, who believed that the index was second only to the printing press in its importance for knowledge, Dennis Duncan describes the sixteenth-century naturalist’s notion that there are two ways to use an index: “after reading the main text, and before. In other words, as a reminder and as a foretaste.” In compiling an index that spans more than a decade of writing and images on the Public Domain Review, we certainly hope it will serve our readers in both ways — helping to resurface favoured pieces and draw attention to new works, creators, and ideas. It is a third use, however, that excites us most about the PDR Index: its ability to track chance resonances, collect accidental symmetries, and chart themes that only become visible on an indexical scale.
Sometimes these connections are “baked in”, as it were, such as when visualisations of scintillating scotoma mingle with schematics of military architecture under the heading of fortifications — a term Victorian migraine patients used to describe the haloed phenomena’s folds. Other times, unremarkable actions gain surprising properties in retrospect. A simple act like folding, present in the background of various posts, comes to the fore as a creative process, used across centuries to summon faces out of pillow cases, table linens, and spilled ink. Faces leads us to images of anthropomorphic landscapes, also indexed under concealment, a heading which, in turn, opens onto a cluster of fin-de-siècle efforts at hiding messages in plain sight, whether through ciphers or illustrations of insects. It is a quixotic goal (see Quixote, Don), but we hope, at times, our index might offer pleasures analogous to those felt by the codebreaker: a chance to decipher questions, dreams, and anxieties that recur without coordination across period and place.
God gave us a brief space of clear skies, in-between two larger masses of cloud passing west to east (per what I saw on GOES). I had seen on the NWS forecast a prediction of lower cloud cover in the early morning, but was surprised when the skies cleared up around 9pm last night. Part of me wanted to head out that night, but I was just too tired. But I was able to get in a brief morning session from about 4:30-5:30am AKST, using the boat launch area.
I was introduced to free jazz around the age of eighteen, and as an improvising pianist I was struck by the rhythmic sophistication of Cecil Taylor. Occasionally I would find his albums at record stores, or a library cleaning up its archive of LPs nobody listened to. For Olim must have been the first one I bought. The percussive articulation and skewed rhythms certainly had some influence on my own playing. As I found more albums, I also became aware of the stylistic closed-mindedness, or cohesion if you will, of Taylor's music. There are a number of elements and patterns that recur, such as the rapid arabesques of small clusters, the symmetrical melodic shapes mirrored in left and right hand, and a texture of arpeggiated chords reminiscent of a Chopin C minor study. The rhetoric and formal layout often remain recognisable. At worst, it may appear as a lack of creativity. Although the style is unique, it's not inimitable, as Marilyn Crispell has demonstrated in a few of her early recordings.
In March of 2021 I added a picture to the "Files" section of my capsule, listing every mobile phone I've ever had and when I used them. In that picture, I listed the Samsung Galaxy Note 8 as my current smartphone and the F(x)Tec Pro1 X as my next smartphone.
Today, 21 months later, I'm still using my Galaxy Note 8, and I'm still waiting for my Pro1 X to arrive.
The Pro1 X story has been an absolute disaster, an incessant comedy of errors that would be hilarious if it didn't cause such a blow to the reputation of F(x)Tec. From the initial revelation of a scam by a dubious chip supplier to a rushed and buddy redesign project to a contractual dispute with the company's shipping partner, F(x)Tec has had to overcome one crushing defeat after another. I believe the company truly did want to make a top-of-the-line device that appealed to keyboard lovers and tinkerers alike, but the horrible hand they've been dealt has left them in a likely unrecoverable position.
I'm not exactly sure how to phrase what I'm talking about so I'll try my best to elaborate. Essentially, I'm trying to reduce the number of times I pull my phone out to look at the screen. As I dug deeper into my phone use habits, I found I use the clock and alarm functions on my phone a lot. I've been a watch-wearer for most of my life, but I am now more inclined to use it more functionally rather than as an accessory.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.