OBS Studio 29.0 comes more than four months after OBS Studio 28.0 and introduces support for media keys on Linux, a 3-band equalizer filter, an upward compressor filter, Websockets 5.1.0, as well as support for encryption and authentication for SRT and RIST outputs.
The new release also improves the NVIDIA Video and Audio filters by adding a Mask Refresh slider and support for temporal processing for better quality masking, adds the ability to mute individual browser docks, as well as the ability to inspect individual browser docks via right-clicking.
OBS Studio, the popular free and open-source video recording and live streaming software, announced a new major 29.0 today.
The new release came with great improvements for Windows users, including AMD AV1 Encoder for the RX7000 series GPUs, Intel AV1 Encoder for Arc GPUs, and Intel HEVC Encoder.
It also introduced native HEVC and ProRes encoders, including P010 and HDR and Desk View support for macOS.
Ventoy 1.0.87 has been rolled out for us, so click the button below to get the most recent version of Ventoy on your machine.
Are you a new Linux user who is looking for a best video player to play media content? Then here is a list of the top open-source video players to use on distributions such as Linux Mint, Ubuntu, Debian, Fedora, and more…
In today’s streaming world when most of us prefer to watch movies and shows online, PC video players’ popularity seems diminishing. Yet, if you are a content creator, for example, a Youtuber then you want to use a local video player either to play a downloaded video or exported one from some editing software.
Well, most of us would not look for some extra application because Linux distros come with a default media player. Nonetheless, looking for some alternative to the default video player then going though this list is not a bad idea.
This is a question with a subtle answer, which starts with how we use disks and what that implies for available spares. We always use disks in mirrored pairs, and the pairs are fixed; every partition of every disk has a specific partner. The first partition of the first SAS-connected disk is always mirrored with the first partition of the first SATA-connected disk, and so on. This means that in normal operation (when a disk hasn't failed), all spares also come in pairs; if the last partition of the first 'SAS' disk isn't used, neither will be the last partition of the first 'SATA' disk, so both are available as spares. In addition, we spread our partition usage across all disks, using the first partition on all pairs before we start using the second partition on any of them, and so on.
This basic guide will help to install, change and autostart screensavers in Ubuntu.
Screensavers are beautiful for desktops and should be available to everyone as part of their preferred OS. However, if you are an Ubuntu user, you might notice a blank screen for the screensaver. After dropping GNOME 3 (16.04 onwards), Ubuntu shows a blank screen for the screensaver.
Nmap (short for Network Mapper) is a free and open-source network scanning and security testing tool. Network administrators and security professionals use it to discover and assess the security of networks and devices. The following tutorial will teach you how to install and use Nmap on Fedora Linux with a desktop workstation or headless server using the command line terminal to install and use commands with the network scanner.
Thunderbird Mail is a free and open-source e-mail and news client developed by the Mozilla Foundation and is now maintained by an independent community. It is designed to be fast, reliable, and user-friendly, with many features and tools for managing e-mail and news accounts. Thunderbird allows users to send and receive e-mails and manage multiple e-mail accounts, calendars, and address books. It also includes support for spam filtering, message labeling, tagging, and search functionality.
In the following tutorial, you will learn how to install Thunderbird on a Fedora Linux desktop using one of two installation methods: DNF or Flatpak package manager using the command terminal.
Nomacs is a free, open-source image viewer. It is a lightweight, fast, customizable image viewer that allows users to view, edit, and manage their image files on a Fedora desktop. For users who may be thinking of installing Nomacs, it has features such as support for multiple file formats, image manipulation tools, raw images, and a customizable interface. In addition, Nomacs can synchronize images and folders between multiple devices, making it a convenient tool for organizing and viewing images.
The following tutorial will teach you how to install Nomacs Image Viewer on Fedora Linux using the Fedora default repository or alternative flatpak installation manager for those who want to use a much-updated version.
Hello techies, in this post we will show you how to configure DHCP server on Ubuntu 22.04 LTS step-by-step.
DHCP stands for Dynamic Host Configuration Protocol, it works on client-server architecture. DHCP server assign IPv4 and IPv6 automatically to clients (computers) on the network. DHCP Server offers a lease of IP address to client, if the clients request IP address and DHCP acknowledge it then client will get IP address for the lease time. If the lease time expires and clients wants to use the same IP address, then it must request IP address to DHCP server again.
The package files of the Linux distributions Ubuntu, Debian, and Linux Mint have the extension .deb. These package files are also called DEB files. There are many ways to install a DEB package file on Ubuntu/Debian/Linux Mint.
In this article, I will show you how to install DEB packages on Ubuntu/Debian/Linux Mint using different package managers.
If you are looking for a lightweight audio player for Ubuntu 22.04, Sayanora is worth checking. Sayanora is a customizable audio player written in C++. Moreover, it is supported by the Qt framework. The audio player is available for Linux and uses Gstreamer as its audio backend.
This guide covers Sayanora’s features and presents three ways of installing the Sayanora music player on Ubuntu 22.04.
TeXworks is a free and open-source graphical interface for creating and editing documents in the TeX typesetting system. It is designed to be easy to use, with a simple and intuitive interface that allows users to create professional-quality documents quickly. TeXworks includes syntax highlighting, spell checking, and automatic generation of a table of contents, making it a powerful and convenient tool for authors, publishers, and researchers.
In the following tutorial, you will learn how to install the latest version of TeXworks on Fedora Linux using two different methods of Fedora’s repository using the DNF package manager or the natively installed Flatpak third-party manager using the command line terminal. The tutorial will also show quick tips on how to update using the command line terminal and, if need be, remove the software.
Pinta is a free, open-source image editor for Windows, Mac, and Linux systems. It is designed to be simple and easy to use, making it an excellent choice for both beginners and experienced users. Pinta includes various features and tools for editing and manipulating images, such as support for layers, customizable brushes, and image effects. It also offers a fully customizable interface, allowing users to tailor the software to their specific needs.
In the following tutorial, you will learn how to install Pinta on Fedora Linux using the command line terminal and alternative methods using the default DNF package manager or for users that favor the most up-to-date version available with the Flatpak alternative method.
Random numbers have a wide range of applications all across programming. Testing for functionality is a big part of it. Generating unique IDs, passwords, or other random strings of characters is another big use case. There are several ways of generating random numbers in Bash, and today we will check them out.
Most current operating systems, including many small systems like IoT devices, use some form of NTP to sync time. NTP is lightweight and reasonably accurate in most use cases to synchronize time across the internet with millisecond accuracy [1]. Some protocols, like PTP, are more accurate but are designed for local networks and may require special hardware on the host [2]. Smaller systems with less stringent accuracy requirements sometimes use SNTP, a variant of NTP.
After experiencing issues trying to install the Amiga Emulator fsuae, I decided to install fsuae using the snap package instead.
I have experienced slow installation and performance issues using other snap packages in the past, but was surprised at how quickly this snap installed and also the performance of emulating the Amiga itself.
Discord is a messaging application. It is a social media platform where users communicate through text messages, video calls, and voice calls. Users can also share media and files on private chats and servers. Servers, in this case, refer to Discord’s way of referring to communities. Discord also supports screen sharing, an essential feature to be included in such a platform.
Another essential feature of this application is that it enables one to organize their server with categories and channels. This makes the server very tidy, making the information accessible. It is similar to Whatsapp and telegram.
Discord is a timely benefit application to many communities since it enables them to expand their projects, reach out to more people, and maintain a community of fans and followers. It is an all-in-one voice as well as text chat used by gamers. It is free, secure, and works on both desktops and phones. Discord is not open source; however, they provide a Linux client; hence many Linux users rely on it.
This app is available on various platforms, such as Windows, macOS, and Linux. This article has been tailored to walk you through the multiple steps needed when installing Discord on Fedora. Several ways can be used to install Discord in Fedora:
ripgrep-all is a search tool that wraps ripgrep (a powerful grep alternative) and enables it to search in pdf, odt, docx, movie subtitles, images, etc.
The first Proton Experimental update of 2023 from Valve has landed for Linux desktop and Steam Deck, plus Proton Next is live again with the upcoming release of Proton 7.0-6.
Switching from Windows or macOS to a Chromebook has its own perks, including a lightweight OS experience, fast performance, and great battery life. However, there are times when you miss your regular apps and want to run them on Chrome OS. On Windows and macOS, you can do it with the numerous virtualization software. However, the support for emulation is limited on Chromebooks. Nevertheless, we have found the 10 best emulators for Chromebook that let you use Windows programs, Android apps, and retro arcade games from old consoles. With these Chromebook emulators, you can run any software environment you want. On that note, let us jump to the list and check out the best Chromebook emulators.
A lot more to do, but already looking really good. Running MoManager, select a script for which there is not yet a .mo file, say /usr/sbin/firewall_ng.sh, there will be a popup asking if want automatic translation...
[...]
A note about the future of EasyOS. I have been releasing English, French and German .img files, but this is a very inefficient way of doing it. In future, intend to go back to the Puppy-way with langpack PET packages.
The FreeBSD Project has been working with Ampere Computing for several years, making sure that FreeBSD is well supported on Ampere CPUs, and using Ampere servers for building FreeBSD/arm64 package sets. Ampere recently provided the project with a pair of Ampere Altra systems, initially for platform bring-up and later to support performance improvements in FreeBSD.
[...]
We first powered it up with a FreeBSD snapshot image. Unfortunately our first experience was a kernel panic! Andrew Turner found the problem and had the fix ready in short order
DragonFly 6.4 is out – the release page has details or you can look at the tag summary.
AsiaBSDCon and BSDCan CFPs are online.. both are happening in the first half of the year, and I strongly recommend people looking into them.
Cloud7 is gathering opinions of the important names in the cloud, web hosting, cybersecurity, Linux, and other industries for 2022 in the Cloud7 Expert Series. Alongside their evaluations of 2022, they will share their expectations for the next year, 2023.
Sarwar Raza, Vice President and General Manager of Cloud Services at Red Hat, is currently responsible for the company’s cloud services portfolio and business unit. He holds a Bachelor’s degree in computer science and economics from Clark University and a Master’s in computer science from WPI. He previously worked for Totogi, Amazon Web Services, and Hewlett Packard Enterprise.
Red Hat has continued to work with our partners to better enable world class performance. Recently, AMD released its EPYC "Genoa" 4th Gen Data Center CPU, known as the AMD EPYC 9004 Series. With a die size of 5nm, AMD increased the core count to 96 cpu and 192 threads / socket with 384 MB L3 cache size. Other significant advances include 128 lanes of Gen5 PCIe and 12 channels of DDR5 RAM, for up to 6TB RAM per socket. Red Hat and AMD Genoa have achieved some leading performance benchmarks results for workloads running on Red Hat Enterprise Linux (RHEL) 8 and RHEL 9.
Addressing the current technology talent shortage is critical for both organizations and individuals. Forty-six percent of employers plan to increase their open source hiring this year, and they’ll need a steady pipeline of prospects to fill their open positions. For prospective employees, a career in IT means an average annual salary of more than $100,000, opportunities for growth and advancement, and the chance to work in a fast-paced and exciting industry.
However, not everyone can or wants to go to college for four years or more to receive a degree in Computer Science. That leaves a lot of potential IT workers with skills that are just waiting to be honed.
Chief information security officers must develop a comprehensive security investment strategy that considers human capital, even while qualified IT security professionals are in short supply.
By the time The Great Telco Debate (aka GTD) hit the ‘Softwarisation and the public cloud’ session, motions related to Open RAN and the progress being made by communications service providers (CSPs) to become digital service providers (DSPs) had already been discussed, dissected and voted upon, but there was still plenty of energy left in the debating chamber to discuss one of the hottest trends in the communications networking and services sector.
I previously wrote a high level overview of how Debian falsified harassment statements against Jacob Appelbaum.
Now it is time to look at the detail. Here is an exchange between Enrico Zini and Nicolas Dandrimont. They are both members of the Debian Account Managers team.
The key thing to note here is they are simply cutting and pasting smears about harassment from the Tor Project. The smears they are cutting-and-pasting do not come from real police or a court.
The Tor Project claims they hired an independent investigator. What qualifies somebody to be an investigator?
When claims were made about Jeffrey Epstein visiting MIT, the MIT management hired the law firm Goodwin Proctor to conduct the investigation. They told everybody that Goodwin Proctor was doing this work. People could bypass MIT and give reports directly to the lawyers. At the end of this process, MIT published the full report and the names of those who worked on the investigation.
Every step taken at the Tor Project was the opposite of the process followed by MIT. Their statement does not give any link to the report itself. Their statement does not identify the name of the investigator, the name of their firm or their credentials.
I thought the Linux world had settled on Btrfs as the “ZFS-like” file system for the platform, and had no idea Canonical had even been working on giving users the option to install to ZFS. With Btrfs already being the default on e.g. Fedora for a while now, it seems that is a better route to go for Ubuntu and other distributions than trying to make ZFS work.
GL.iNet Beryl AX (GL-MT3000) is a pocket-sized Wi-Fi 6 router running OpenWrt on a MediaTek MT7981B (Filogic 820) dual-core processor @ 1.3 GHz and equipped with a 2.5GbE port, a Gigabit Ethernet port, and a USB 3.0 port.
[...]
The router runs OpenWrt 21.02 with Linux 5.4. The firmware, mobile app, and detailed documentation are provided by the company. Note that both the system memory (512MB vs 1GB) and storage (256MB NAND vs 8GB eMMC) have much lower capacities than in the Brume 2, so some of the features may be missing, albeit the company still lists WireGuard, OpenWrt, and AdGuard Home, so we’ll find out when testing the software part. The router also consumes more and is quite heavier than the Brume 2, even than the “A” model with a metal enclosure. We’ll find out why in the teardown section.
Per Roku, streaming hours reached 23.9 billion in the fourth quarter and 87.4 billion for the entirety of 2022, a 19% increase year-over-year.
Kickstarter recently featured the HackyPi which is an educational embedded device designed for ethical hacking and compatible with Python and C/C++. The device is based on the Raspberry Pi RP2040 and it can run scripts automatically by connecting it via USB.
Banana Pi release another Raspberry Pi Pico alternative that expands the form factor, physically and technically. Now with onboard Stemma QT and USB-C.
[Tom Nardi] and I were talking on the podcast about 2022, and how it went from the hacker’s perspective. As the global chip shortage entered its second full year, we both thought back on the ways that we all had to adapt and work around the fact that we just couldn’t get the parts we were accustomed to picking up with ease.
It seems every day there’s a new microcontroller announcement for which the manufacturer is keen to secure your eyeballs. Today it’s the turn of Espressif, whose new part is the ESP32-P4, which despite being another confusingly named ESP32, is a high-performance addition to their RISC-V line-up.
The goal for version 1.0 is for Obnam to be an utterly boring backup solution for Linux command line users. It should just work, be performant, secure, and well-documented.
It is not a goal for version 1.0 to have been ported to other operating systems, but if there are volunteers to do that, and to commit to supporting their port, ports will be welcome.
Other user interfaces is likely to happen only after 1.0.
Yes, MacLynx is a real, honest to goodness port of Lynx 2.7.1 to the classic Mac OS, compatible all the way back to System 7. What makes it particularly interesting as a port is its partial integration with the Mac OS: the home page is set through Internet Config, it supports the Speech Manager, you can drop URLs on it and you can even click on links directly (cooooool!). I used it myself on my first Mac, a Macintosh IIsi, for which it was very well suited. It was released as a beta by its original author and no further releases were made, so a couple years back I decided to dust it off, reconstruct the toolchain and do some upgrades to it just for fun. It's probably the most practical browser you can run on a compact Mac, does very well on later 68Ks and runs just fine under A/UX. I build it with CodeWarrior Pro 2, CWGUSI 1.8.0 (comes with CW Pro 2) and Internet Config Programmer's Kit 1.4.
Originally, the idea was to port the msql-srv library from Rust to Java. For context, msql-srv makes it possible to create a fake MySQL/MariaDB server, which accepts MySQL connections and handles them with custom logic (instead of having a real database behind it).
If you’ve been to your doctor or to a hospital, or used an ATM it’s likely that the data was processed and stored in a MUMPS-based system. Despite the fact that 2016 represents its 50th anniversary the original design basics of MUMPS are still meeting commercial needs today and show little evidence of being displaced in healthcare or large financial institutions by either RDBMS or NoSQL. It would not be inaccurate to say that MUMPS is/was NoSQL long before ever becoming a gleam in the eye of Google researchers.
Data Science Applications in Banking, Companies require data in order to gain insights and make data-driven decisions.
Data science is a requirement for providing better services to customers and developing strategies for various banking operations.
Furthermore, banks require data in order to expand their operations and attract new customers.
It would have been around 2001. The term “AJAX” would not be invented until 2005. Lots of people had their own Geocities page, the typical instance of which was horrific yet in retrospect somehow wonderful. Dynamic web applications were server driven, with any use of JavaScript being only as a minor seasoning on the client side. Previously these applications had often been via Perl and CGI, but now PHP was rising in popularity. Plenty of Perl and PHP-based web forums abounded, forming the centres of little communities run by enterprising individuals. The phrase “dynamic HTML” (DHTML) was used to describe doing interesting and dynamic things by using JavaScript to manipulate HTML live, like making animated menus — a term which has now been long forgotten. Websites such as dynamicdrive.com (2004 archive copy) provided an archive of such scripts uploaded by various people.
At the same time, plenty of people didn't have access to a PHP host and were stuck with static web hosting, which was often free. This kind of free host would usually automatically inject advertising into their user's web pages. From time to time, a user of such a web host would want to create a password protected area of their website. Since doing this securely ordinarily would require some kind of server validation of the password, occasionally you would see people hack it by checking the password in (possibly mildly obfuscated) client side JavaScript. Of course, this was completely insecure.
The C language offers several possibilities and the use of different functions for sending and receiving the data over a socket. Each of them provides a different property or constraint. However, the “socket.h” header defines the recv() function which is specifically designed to read the socket files and provides options for receiving the mode, waiting, etc., making it most suitable for use in connections.
In this Linux Hint article, you will learn how to use the recv() function. One of the two functions are used to send and receive the data over a socket in the C language.
We will look at the syntax of this function and its theoretical description of how it works, the input and output arguments, and the data type that is accepted by each of them.
Arranging things in sequence is a task that we perform in daily life, whether it is arranged in ascending order or descending order. The process of arranging things in a proper sequence is called sorting. Ascending is increasing order and descending is decreasing order. In programming, we also perform the sorting using different algorithms. But one algorithm provides the quickest sorting which is “Quick Sort”. This sorting algorithm sorts the array faster than the other algorithms. It works on the divide and conquers rule, first sets a pivot point, and divides the array into two sub-arrays. Then, set a pivot for sub-arrays and the process goes on until we reach the end and the required array is sorted. This article explains an in-depth working of a quick sort in C++ with a practical coding example in ascending order.
In programming, we frequently encounter circumstances where we want to store a collection of data, whether they are of relevant or irrelevant datatypes. In C++, we already know about arrays, which are used to hold collections of information of relevant datatypes in adjacent memory addresses. But in structures, we can store the user-defined datatypes, they can be different datatypes or can be relevant datatypes. Structures carry a group of variables that have different datatypes but under one identifier which is “struct”. The “struct” is the reserved keyword in C++ language and a short form of structures that are used to develop the structures in the program. Let us just examine the syntax of Structures to gain a better understanding of the idea of structures and how we’re going to initialize them inside the C++ programming language.
Today, we use one of the datatypes of C++ programming language which is the int datatype, also known as integers. Through this, we will do the division operation in C++ language. As we know, the division is one of the basic methods of mathematics. We do division operations in mathematics so that we can partition a large group into smaller subgroups so that each group can get the same amount of items. In this tutorial, let us just explore more in-depth mathematical technique called division and see how we implement it in C++ programming language.
Today, we’ll talk about ASCII and how to utilize it in the C++ language for programming. ASCII stands for “American Standard Code for Information Interchange” and is a standardized information encoding technique that is used for communication between humans and computers electronically. Computers cannot understand the language of humans that is why to work with characters, numbers, punctuation, and other computer-related characters there are already predefined numeric values called ASCII values. Let us just explore how ASCII characters behave and how we may retrieve the value of any computer-related type of character inside the coding language C++ so that we can fully comprehend the notion of ASCII in the field of computer science.
Here, the goal is to benefit from the fact that a min-root heap always returns the smallest member. The initial entry of each linked list is the smallest element in its corresponding list since, in this technique, all the linked lists are already sorted. We take advantage of this circumstance by creating a min-heap out of the initial member of each linked list. The smallest element is then obtained by extracting the top element (root) of the min-heap. We get the smallest element across all linked lists by doing this. The next element is then added to the min-heap after we increase the pointer to the list that the freshly extracted element belongs to. A new element is taken from the min-heap, the linked list pointer that contains it is incremented, and the newly pointed element is then added to the min-heap. Until the min-heap is completely empty, this operation is repeated. Keep in mind that we continuously add the elements that we extract from the min-heap to a separate result list that we are keeping.
The method’s flexibility is a key benefit. With a few minor adjustments, this approach may also be used to combine the N sorted arrays. Some of the other ways fail to do this, but this approach succeeds even when all the linked lists are not the same size.
In the C++ programming language, many different types of data types are used to store the data. These data types are built-in datatypes. In the C++ language, one of these basic data types is “char” which is known as the character that has a buffer size of 1 byte. Whereas, “string” is not a built-in data type; it functions in a way that is similar to one when used simply. In simple words, it can store the characters similar to character arrays and allows the users to perform the operations on strings that are not possible with character arrays. Because the user sometimes wants to supply the string as an argument, we first transform the character array into a string. It is simpler to manipulate the strings when they are converted to a string object since we can then use a variety of methods and have overloaded operators such as the += operator method, pushback method, append method, etc.
We learned a lot about how to pass parameters in functions previously. We further discovered why parameters are passed and what we get in return from functions. However, we often did not supply any arguments or parameters to the main() function. In C++ programs, we can also pass the parameters in the main() function. These parameters are called command line arguments or command line parameters. We pass the parameters while running the program on the command prompt window just after the program’s name. These two parameters are “argc” and “argv”. The “argc” stands for argument count and it is used to store the non-negative integer type argument including the program name. The argv stands for argument vector because it is a character pointer of an array that stores the actual parameters.
There are several ways and functions to start the processes from a program. Each of them offers different solutions to the programmer depending on the needs of the particular case.
The execXX() family is a set of system functions that are defined in the “unistd.h” header to run a process from within a program. This family of functions allows us to send the input arguments to the executable that calls it which is why it is a very useful resource for interaction between processes.
In this Linux Hint article, you’ll learn all about the execv() function in the C language. We will look at its syntax, the theoretical description of how it works, the input and output arguments, and the type of data that each of them processes. You’ll also learn how to create and use the arrays of strings and pointers that are part of the input arguments of this family of functions and are passed to the calling process.
Then, we apply what we learned in a practical example that shows the correct implementation and calling of the execv() function.
In file handling, we don’t know how much data is stored in the file. Since the extent of data in filing is mostly unknown, how can we read the file in that case? When we don’t know how much data the file contains, we use the eof() method to read a file. The eof() method is “End of File” which reads the file until the control reaches the end of the file. This methodology is very suitable to present the data of files. The things we know about the files are the type of file data and the formatting style of the stored data. The eof() function allows us to determine when the file has reached its end.
EOF() is a bool-type constant method that returns true when the end of the file is reached and it returns false when there is still data to be read. It is a method of input-output stream class (ios) that reads the data of a file until the end is encountered.
Now part of the Linux Foundation umbrella, PyTorch is based on the Torch library and is used for applications in computer vision and natural language processing fields.
Package maintainers for open source framework PyTorch have said a malicious dependency imitating one of its own was available on a prominent code repository during the holiday season.
The shell programming languages can be used for a variety of tasks like conducting operations and doing repetitive tasks for the automotive industry. We may execute our commands, applications, and shell scripts in a shell environment. You provide input and the program is then executed using that input. A program’s output is shown when it has completed running. How to provide a file name as input to a shell script is addressed in this article. To accomplish this, a script must be created using the “#!/bin/bash” shell. Now, we’ll see how to do this step-by-step.
CAT is a command of Bash in the Linux operating system. CAT is the abbreviation of concentrate. In the Linux operating system, the cat command is used to display the file, read a file, or concentrate the content of the file as the name explains. It takes a file, reads its content or data, and then outputs the content of the files. It also helps us with the creation of files. This command comes with many options that help us to perform the actions with the file according to our needs.
The open and improved Bourne shell variant that is offered with the Linux and GNU computer systems is called Bash. Identical to the original, Bash also supports the command-line editing as an addition. The if-else statements are essentially statements that are used to make decisions, and they are quite beneficial. If the given condition is true, the provided if statement is printed. If it is false, the else statement is printed. We can utilize an if-else statement in one line in Bash. Before writing the script, we must add the Bash shell on Linux to run the Bash scripts.
Bash handles only the associative arrays and the one-dimensional numerically indexed arrays. In Bash scripting, arrays do not necessarily consist of a group of associated elements. The array elements can be strings and numbers because Bash does not differentiate between them. In this article, we will perform the deletion operations on the Bash arrays with different approaches. We need to know the index position of the element in the array or key to remove it from the array. The “unset” command is commonly used in Bash to remove an element.
The set command of Linux is used to set and unset specific options. These options manage the behavior of a given script and enable the task execution without error. In this article, we use the “x” option with the set command which informs the Bash to display the statements as they are processed. It is immensely useful for debugging when we need to determine which lines were executed and in what sequence. The set -x operation can be employed directly in an open Bash shell or within a Bash script. In the following examples, we use the set command with the “x” option to enable and disable the various functionalities.
Bash is a command interpreter and script. Like other forms of coding, it supports packet forwarding, variables, and functions. A script is a file with commands that the software may view and perform. In Linux, bash gives us positional parameters like “$0,” “$1,” “$2,” “$3,” etc. In this article, one of its positional parameters, “$0,” will be used.
Don’t want to push your code to a hosted Git repository? Then run your own Git server in-house. Gogs is the easiest way to do that. Here’s how to set it up.
Branching is a trivial exercise in Git. Unfortunately, trivial tasks rarely get due attention, and mistakes happen. If you’ve misnamed a branch, it’ll have to be renamed. Here’s how to do that.
Today, everything from your computer to your dryer has wireless communications built in, but devices weren’t always so unencumbered by wires. What to do when you have a legacy serial device, but no serial port on the computer you want to connect? [vahidyou] designed a wireless serial dongle to solve this conundrum.
2022 flew by fast, as the pandemic years really seem to be going. I wrote plenty this year, even went to a cool place like DEF CON 30 at the end of summer, and wrote about Ed25519 a few times. That got some traction.
Oh, and my blog has some more technology to it. You won't see this article until midnight my time! But I will have long since deployed it. Turns out I can do quite a bit of useful postprocessing with Cloudflare workers on a static website.
Subscription Fatigue: Caught a discussion on Mastodon today where Tim Bray talked about the problems with Mastodon’s “business model,” via Patreon Subscriptions and donations. I think Bray has a point, and I’ve been thinking a lot about the ever-growing list of monthly subscriptions I’ve been accumulating. I’m donating to Mastodon, Metafilter, to a handful of artists on Patreon and Bandcamp, various publications… $10 a month here, $5 there, $10 over here, pretty soon it starts adding up.
There's a good book on this topic for anyone interested in technology M&A that focuses on Google called Semi-Organic Growth. It follows Google's M&A strategy up until 2015 (when the book was published). At the end of the book, it makes some predictions about Google's 2015-era acquisitions, which drifted away from core search and distribution into more "moonshots." Interesting to read in both retrospective now that Google is pulling back many of these moonshots.
Picture the scene. You're in a pub and order, say, a cider or a cocktail. The local pub bore pipes up "What are you drinking that for? Real men drink..." and then names a brand of generic, piss-weak lager that is his substitute for a personality.
He's the same guy who insists that "real men" watch football, and can't quite believe that you have no opinion on last night's cup final.
This sort of behaviour is sometimes terms "fragile masculinity". It isn't that masculinity itself is a weak and feeble proposition - but that some people feel that masculinity needs defending because it is a brittle and narrow concept.
Our daughter was born in 2021, and suddenly she’s 19 months old. It’s killing me how fast time flies. It’s still amazing to watch her grow and learn new things. Looking at photos from early last year baffles me because she looks so different. It’s almost like I’m looking at another or multiple other persons. I’m really glad that I managed to find enough time for her. I still don’t work on weekends and evenings and I try to be home early every day, which allows me to spend a lot of time with her.
Some of my personal highlights this year were a weekend trip to Italy (Venice and Chioggia), our 4 week trip to Greece (Peloponnese and Athens), our road trip to Germany and The Netherlands (Freiburg, Utrecht, Rotterdam, Amsterdam), and of course moving to Graz.
Ancient Roman concretes have survived millennia, but mechanistic insights into their durability remain an enigma. Here, we use a multiscale correlative elemental and chemical mapping approach to investigating relict lime clasts, a ubiquitous and conspicuous mineral component associated with ancient Roman mortars. Together, these analyses provide new insights into mortar preparation methodologies and provide evidence that the Romans employed hot mixing, using quicklime in conjunction with, or instead of, slaked lime, to create an environment where high surface area aggregate-scale lime clasts are retained within the mortar matrix. Inspired by these findings, we propose that these macroscopic inclusions might serve as critical sources of reactive calcium for long-term pore and crack-filling or post-pozzolanic reactivity within the cementitious constructs. The subsequent development and testing of modern lime clast–containing cementitious mixtures demonstrate their self-healing potential, thus paving the way for the development of more durable, resilient, and sustainable concrete formulations.
A lot of us have a soft spot for retrocomputers, and there’s nothing quite like running original hardware. Unfortunately if you’re after the truly original touch then that means carrying along the family TV from 1982, and that’s where life becomes annoying. What if there were a way you could easily drive an LCD panel from a classic video controller? Help is at hand for owners of TI TMS9928A video chips, courtesy of [ukmaker], with a clever interface board that drives an SPI or parallel TFT.
Once [Hide-key] saw the likes of the banana and corn macro pads, they knew they had to throw their hat in this strange and wonderful ring. Some family members suggested a sunflower, and off they went looking for inspiring images, finally settling on a more iconic and less realistic design which we think is quite beautiful.
As a fervent fan of twiddly and twirly widgets and tactile budgets in a device’s user interface, [Steve M Potter] created a remote control (pendant) for his CNC machine, which he explains in a recent video that’s also linked down below. In addition to all the tactile goodness, what is perhaps most interesting about this controller is that it uses Espressif’s ESP-NOW protocol. This still uses the same 2.4 GHz as WiFi would, but uses a system more akin to the pairing of a wireless mouse or keyboard.
I gave myself a few goals to meet this year, one of which was to be more aware of how I use my phones. Whenever I reach for them, I take deliberate note and have them justify their intrusion, or their flip cases remain closed. I’ve found this reframing useful; I’m not denying myself permission, I’m the gatekeeper. Phones aren’t the boss, I am!
Officials have yet to comment on where the child might have obtained the weapon, which police described as a handgun.
Within the world of medical science fiction they are found everywhere: tiny robots that can zip through blood vessels and intestines, where they can deliver medication, diagnose medical conditions and even directly provide treatment. Although much of this is still firmly in the realm of science-fiction, researchers at Stanford published work last year on an origami-based type of robots, controlled using an external magnetic field. Details can be found in the Nature Communications paper.
Google Cloud did not provide a value for the agreement with the Kuwaiti government, but said it would encompass digitising government services, migrating and storing national data securely on the cloud and setting up a national digital skills programme.
The company aims to invest in a cloud region in Kuwait, its third announced in the Middle East after Qatar and Saudi Arabia, and said it plans to open an office on the ground without specifying a timeframe.
The F-35 fighter jet has been plagued by malfunctions and cost overruns for years, yet Congress continues to order up more. The bipartisan consensus to fund tools of war rather than pro-worker programs like affordable housing or childcare is still strong.
Martin Griffiths, a Briton who now runs the United Nations’ humanitarian work, co-founded and advises a private conflict resolution company that “works closely” with MI6. He was until recently the UN special envoy to Yemen.
The UK Ministry of Defence (MOD) secretively seconded a military officer to Yemen in 2019, it can be revealed. The officer was attached to the office of the then UN special envoy to Yemen, Martin Griffiths.
Declassified has shown that Griffiths’ is a founder of, and adviser to, a private conflict resolution company, Inter Mediate, that works with the UK’s Secret Intelligence Service, also known as MI6.
The MOD has told Declassified the military officer “works directly with and provides advice to the UN Special Envoy for Yemen regarding security and military issues relevant to the conflict in Yemen.”
The MOD added: “The military officer is not based in Yemen but has visited with the UN Special Envoy.”
Oil-rich Saudi Arabia is wooing Australians to help diversify its economy and lead the next energy revolution.
The Future Minerals Forum that begins in Riyadh on Tuesday with a ministerial roundtable includes international mining leaders, emerging minerals experts, top technologists, analysts and investors.
Although Australia’s resources minister Madeleine King is not attending, well-known names on the 200-plus list of speakers include BHP CEO Mike Henry, Rio Tinto chair Dominic Barton and Australian businessman Andrew Liveris.
BHP says it is participating as a world leader in finding and producing key future-facing minerals needed to meet global decarbonisation goals.
Mr Henry will do a fireside chat on “mining and owning the energy transition”.
Despite acknowledging "tremendous" public pressure to impose a ban on bump stocks, a firearm attachment used in the deadliest mass shooting in U.S. history, a federal appeals court on Friday rejected a 2019 Trump administration rule barring people from owning the instruments.
On January 6, a 66-year-old man and a 61-year-old woman were killed as a result of Russian artillery fire on Bakhmut and the surrounding territories in Ukraine’s Donetsk region, says the Ukrainian Prosecutor General’s office.
Ukrainian President Volodymyr Zelensky approved a decision by Ukraine’s National Security and Defense Council to impose personal economic sanctions against some Russian cultural and sports figures. The list includes three individuals who hold Ukrainian citizenship.
Since the evening of January 6, Russian Telegram channels have been reporting that Russian troops have made significant progress in Soledar, outside of Bakhmut in the Donetsk region, says BBC’s Russian Service. Ukrainian authorities deny Russian claims.€
Is “bad news” out of US Congress about an AUKUS nuclear submarine deal a blessing in disguise? Former submariner and senator Rex Patrick says US politicians, though acting in the interests of the US, may save Australia from itself, and $170 billion too. We are concerned that what was initially touted as a ‘do no harm’ opportunity to support Australia and the United Kingdom and build long-term competitive advantages for the US and its Pacific allies, may be turning into a zero-sum game for scarce, highly advanced U. SSNs,” wrote the Democrat and Republican heads of the Senate Armed Services Committee. “Over the past year, we have grown more concerned about the state of the US submarine industrial base as well as its ability to support the desired AUKUS SSN [Nuclear Submarine] end state”.
Having been a staff+ engineer located in Europe while working at a primarily North-American company last year, one piece of feedback I regularly got was that I seemed to know about many things happening, but many folks in my domain who got less synchronous time with me felt like they could not benefit from that. The teams I was directly working with were split roughly 60-40 between North America (East coast) and Europe, so more than half of the team members only overlapped with me during my already busy afternoons.
A bomb cyclone hit California this week, knocking out power, downing trees, and dumping massive amounts of water.
Some California residents are watching this precious H20 wash away and wondering, why can't we save the water for times when we desperately need it?
The state grapples with drought, but it's not as simple as putting out a big bucket, says hydrogeologist and professor at UC Santa Cruz, Andrew Fisher.
Professor Fisher spoke with NPR about the challenges facing the state, but also the opportunities that are already being worked on.
Scientists are warning Utah officials that the Great Salt Lake is shrinking far faster than experts previously believed, and calling for a major reduction in water consumption across the American West in order to prevent the lake from disappearing in the next five years.
Donald Trump’s political demise is a personal implosion...Yet, the movement he inspired and instigated is very much alive.
A statement by Smex and Democracy for the Arab World Now (Dawn) accused the Saudi government of using agents to act as independent editors on Wikipedia to "control information about the country".
This week in the United States of America, a former British colony on the North American continent, long-brewing political and social problems culminated in a messy speaker election in the lower chamber of the bicameral national parliament.
The Republican party, by far the more conservative of the two major parties in what effectively is a two-party political oligopoly, gained narrow majority in the chamber in November elections, but was unable to effectively execute on its new-found power. A small far-right splinter group within the party blocked the election of the speaker — a procedural position that has gradually become heavily politicized — demanding political favors in return for their votes. This resulted in four days of heated and often chaotic proceedings, at one point devolving into a brawl.
The filing by Musk’s attorneys also notes that Twitter has laid off about 1,000 residents in the San Francisco area since he purchased the company in late October.
“A substantial portion of the jury pool … is likely to hold a personal and material bias against Mr. Musk as a result of recent layoffs at one of his companies as individual prospective jurors — or their friends and relatives — may have been personally impacted,” the filing said.
Chinese fintech giant Ant Group on Saturday announced that its founder Jack Ma will no longer control the company. It said that post a series of shareholding adjustments, Ma gave up most of his voting rights.
Ma previously owned more than 50% of voting rights at Ant but the changes mean that his shareholding has fallen to 6.2%, as per a Reuters report.
According to Ant's IPO paper, filed in 2020, Ma owned only 10% stake in Ant, but he exercised control over the company through related entities. Hangzhou Yunbo, an investment vehicle for Ma, controlled over two other entities that own a combined 50.5% stake in Ant, as per the Reuters report.
What follows is an encore for a column I wrote in 2018 for the new progressive Democrats elected to the House of Representatives. The Democratic Party won control of the House in 2018, and again barely in 2020. There was no response nor adoption of any of these power-enhancing suggestions from any of the novice legislators in those two election cycles.
Last summer, while waiting for coffee at a diner in what I’ll just call a small town, I overheard three older men complaining about how schools are forcing children to swap genders. A server responded, “You’re not even allowed to talk about this anymore.” I thought to myself, “A, you’re talking about it right now, and B, where’s my coffee?”
Just one week into 2023, state legislatures across the United States are already planning to consider more than two dozen bills aiming to cut off transgender people's access to healthcare, with adults as well as minors targeted.
The world is confronting multiple, compounding crises, from COVID-19, energy, inflation, debt, and climate shocks to unaffordable living costs and political instability. The need for ambitious action cannot be greater. However, the return of failed policies such as austerity, now called “fiscal restraint” or “fiscal consolidation,” and a lack of effective taxation and debt-reduction initiatives threaten to exacerbate the macroeconomic instability and daily hardships that billions of people are facing. Unless policymakers change course, an “austerity pandemic” will make global economic recovery even more difficult.
Amid a surge of migrants arriving at the United States’ southern border the Biden administration has announced a slate of new enforcement measures, including a new parole program that would permit thirty thousand Haitians, Cubans, Nicaraguans, and Venezuelans to apply for asylum in the United States per month. But the new measure would also expel any migrants from those countries who attempt to cross the border under the controversial Trump-era policy known as Title 42.
French politicians paid tribute Saturday to Charlie Hebdo magazine staff and other victims of the January 2015 Islamist attacks, days after the satirical weekly's latest edition sparked outrage in Iran.
French President Emmanuel Macron tweeted the names of all 17 victims of a spate of attacks eight years ago in and around Paris, including the 12 people killed at the offices of Charlie Hebdo.
It is inevitable that the principle of freedom of speech should become a casualty when powerful people are obsessed with language and its capacity to shape the world. Revolutionaries of the postmodernist mindset would have us believe that societal change can be actuated through modifications to the language that describes it, which is why Max Horkheimer of the Frankfurt School maintained that it was not possible to conceive of the liberated world in the language of the existing world. As for the new puritans, they have embraced the belief that language is either a tool of oppression or a means to resist it. This not only accounts for their approval of censorship and “hate speech” legislation, but their inability to grasp how the artistic representation of morally objectionable ideas is not the same as an endorsement.
"This means they're afraid of our investigations," Temirov says about the authorities' methods. "Before, they simply didn't respond, they tried to explain themselves. But the more we kept doing investigations, the more difficult that became."
"This is how they’ve chosen to get rid of something that's in their way."
In December, a video shared on social media appeared to show Mr Kiir urinating on himself as the national anthem played at a function.
Six staff from the state broadcaster were detained this week.
The Committee to Protect Journalists (CPJ) is now calling for their release.
The two friends, Meerim alleges, became victims of blackmail by their employers. Within a year, Ajara had taken her life.
Meerim and Ajara are at the center of an investigation by RFE/RL’s Kyrgyz Service, known locally as Radio Azattyk, into the webcam industry in Kyrgyzstan, which serves as a regional hub in a multibillion-dollar global industry.
Even the act of defiance has to be discreet. On the wall of a private art gallery in Dubai, the raciest city in the United Arab Emirates (uae), is a set of office pigeon holes. They contain photographs of homemade sex toys: mere photographs because if they were real, Dubai’s police might seize them; they are home-made because importing them is banned.
In November 2021, a copyright lawsuit against pirate IPTV service ChitramTV ended in a $31m judgment in favor of plaintiff DISH Network. Almost immediately, however, the court withdrew judgment against the only defendant known to DISH. Since then, he has been conducting his own defense while making a mockery of the legal system. The judge's words, not ours.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.