The history of Xorg and the x window system is far older than Linux and any project that long is going to have a troubled history, Im impressed that we even have a functioning display server in 2022.
Today we are looking at Linux Mint 21, Cinnamon edition. It is based on Ubuntu 22.04, Linux Kernel 5.15, Cinnamon 5.4, and uses about 1GB of ram when idling. Enjoy!
In this video, we are looking at Linux Mint 21, the Cinnamon edition.
Fedora dumps CC0. What does this mean for open source developers? Doc Searls, Shawn Powers and Jonathan Bennett discuss on FLOSS Weekly the implications of this move from Fedora and how it relates to developers. Intel plants its flag in the discrete GPU marketspace with ARC GPU. Shawn Powers feels this is a very good thing.
SCaLE 19x was so much fun! In the second video in a series that will cover this year's event, I'll play back conversations I've had with three really awesome people: Monica Ayhens-Madon (Community Representative at Canonical), Tim Wilkinson (Technologist and Contributor for AREDN), and Adam Balla (Content Producer for System76). These individuals are very passionate about their projects, and the conversations we had were a lot of fun. Check it out! (And there's definitely more to come).
I'm announcing the release of the 5.18.16 kernel.
All users of the 5.18 kernel series must upgrade.
The updated 5.18.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.18.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
thanks,
greg k-h
There's a proposal to remove the code for the DECnet networking protocol from the Linux kernel… but what was DECnet anyway?
Microsoft software engineer Stephen Hemminger has proposed removing the DECnet protocol handling code from the Linux kernel. The timing is ironic, as this comes just two weeks after VMS Software Inc announced that OpenVMS 9.2 was really ready this time…
That announcement, of course, came some months after the first time it announced [PDF] version 9.2, as we covered in The Reg in May.
The last maintainer of the DECnet code was Red Hat's Christine Caulfield, who flagged the code as orphaned in 2010. The change is unlikely to vastly inconvenience many people: VMS is the last even slightly mainstream OS that used DECnet, and VMS has supported TCP/IP for a long time. Indeed, for decades, the oldest email in this reporter's "sent" folder was a 1993 enquiry about the freeware CMUIP stack for VMS.
The first part of this series covered principles of locking engineering. This part goes through a pile of locking patterns and designs, from most favourable and easiest to adjust and hence resulting in a long term maintainable code base, to the least favourable since hardest to ensure it works correctly and stays that way while the code evolves. For convenience even color coded, with the dangerous levels getting progressively more crispy red indicating how close to the burning fire you are! Think of it as Dante’s Inferno, but for locking.
As a reminder from the intro of the first part, with locking engineering I mean the art of ensuring that there’s sufficient consistency in reading and manipulating data structures, and not just sprinkling mutex_lock() and mutex_unlock() calls around until the result looks reasonable and lockdep has gone quiet.
[...]
Simple, dumb locking is good locking, since with that you have a fighting chance to make it correct locking.
Daniel Vetter continues his series on locking in the kernel.
In this guide we are going to install Postgresql 14 in Rocky Linux 9.
Postgresql is an open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. Postgres, is a free and open-source relational database management system emphasizing extensibility and SQL compliance. It was originally named POSTGRES, referring to its origins as a successor to the Ingres database developed at the University of California, Berkeley. PostgreSQL is used as the primary data store or data warehouse for many web, mobile, geospatial, and analytics applications. PostgreSQL can store structured and unstructured data in a single product.
PGAdmin is a web-based GUI tool used to interact with the Postgres database sessions, both locally and remote servers as well. You can use PGAdmin to perform any sort of database administration required for a Postgres database.
pgAdmin 4 is designed to meet the needs of both novice and experienced Postgres users alike, providing a powerful graphical interface that simplifies the creation, maintenance and use of database objects.
In this guide, we are going to set up pgAdmin 4 in a container, the web based administration tool for the PostgreSQL database.
Chroot is a Linux/Unix utility that can change or modify the root filesystem. With the help of the chroot command, you can easily create an isolated filesystem inside your primary filesystem. Chroot is especially helpful to make your work and home environment separated or if you want a test environment to test software in isolation.
One of my favorite utilities on the Linux command-line, and block storage is one of my favorite features on Linode's platform, so in this article I get to combine both of these together - because what I'm going to be doing is show you how to use rsync to copy data from one server to another, in the form of a backup. What's really cool about this, is that this example will utilize block storage.
Note: I'll be using the Nextcloud server that was set up in a previous article, but it doesn't really matter if it's Nextcloud - you can back up any server that you'd like.
My dad has an Acer Chromebook 14 CB3-431, codenamed Edgar. Google just stopped supporting it with ChromeOS, but it’s still working well. Luckily, Google also just released the first stable version of ChromeOS Flex.
I decided to install the full UEFI image to the Chromebook from https://mrchromebox.tech/ so that starting Flex would be as easy as possible. That went well after finding and removing the write protect screw.
Central limit theorems (CLT) are a class of theorems in probability theory stating that the sum of a sufficiently large number of weakly dependent random variables that have approximately the same scale (none of the terms dominates, does not make a decisive contribution to the sum), has a distribution close to normal. Since many random variables in applications are formed under the influence of several weakly dependent random factors, their distribution is considered normal. In this case, the condition must be observed that none of the factors is dominant. Central limit theorems in these cases justify the application of the normal distribution.
Today we are looking at how to install GDevelop on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
This article shows you the best practices for creating tar.gz archives from the command line in Linux using the tar command.
Using the tar command to create tar.gz archives in Linux is a must-have skill for any Linux administrator. For this reason, in this article, we will show you how to create tar.gz archives in Linux using real-world examples following best practices.
Additionally, if you want to learn how to extract tar.gz files in Linux, check out our excellent guide, “How to Extract tar.gz File in Linux by Using the Command Line.”
Follow through this tutorial to learn how to install Malcolm network traffic analysis tool on Ubuntu 22.04. Malcolm is a network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs. The PCAP files or Zeek logs can be uploaded to Malcolm via browser, forwarded via the forwarders or can capture live traffic, parses and normalize the traffic for visualization via OpenSearch dashboards or Arkime. Read more about Malcolm network traffic analysis tool and its features on their page.
In this tutorial, we will show you how to install ClamAV on Rocky Linux 9. For those of you who didn’t know, ClamAV is an open-source antivirus engine for detecting trojans, viruses, malware, adware, rootkits, and other malicious threats. ClamAV offers a Command-line scanner, a Milter interface for Sendmail, an Advanced database updater, and built-in support for archive formats, ELF executables + Portable Executable files, and popular document formats. Though it was created for Unix, it is also available in third-party versions for BSD, Linux, macOS, OpenVMS, OSF, and Solaris.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the ClamAV open-source antivirus on Rocky Linux. 9.
Git is the most widely-used distributed version control system on the planet. It’s free, open-source and can handle anything from small to massive projects. Git makes it easy to create new project repositories on your local drive or clone them from remote repositories.
Nearly 75% of all mobile phones run Android, based on the Linux kernel, and most servers that host websites and other content run on Linux. There are also several Linux distributions that individuals and organizations use to get their work done every day.
Being new to Linux can be overwhelming since the look and feel of the distributions is quite different from what most Windows and macOS users are accustomed to. Furthermore, the command line interface can make learning to use Linux seem like rocket science.
In this guide, we walk you through basic file manipulation commands and all the best Linux commands that every user should know. While this guide is based on Ubuntu 18.04, you should be able to use the commands on other distros just as easily.
Between 2022-07-27 and 2022-08-03 there were 28 New Steam games released with Native Linux clients. For reference, during the same time, there were 284 games released for Windows on Steam, so the Linux versions represent about 9.9 % of total released titles. Here’s a quick pick of the most interesting ones...
Hundreds of new Linux distros spawn each year, with many becoming the norm among the community. Here are some new distros for you to try in 2022.
As an open-source operating system, Linux continues to rule the market, even in 2022. The highly malleable Linux kernel has come a long way, evolving into many avatars and spawning different desktops suitable for numerous use cases.
As is custom, a slew of new Linux distributions has become available to believers looking for high-tech computing on low-end hardware. Each distro comes with its unique USP, which makes it stand out amongst its competitors.
Without further ado, here are the top most-anticipated Linux distros within the open-source software community, which are worth a mention.
Peppermint OS’s goal was always to provide a familiar operating system environment to new Linux users. Initially derived from Ubuntu, Peppermint OS was rebased on Debian Stable earlier this year, a release that came almost three years after the previous version, Peppermint 10.
On August 2nd, 2022, Joseph Dickson announced that the first Devuan-based release of Peppermint OS is now ready for mass deployment, targeting everyone who doesn’t want systemd in their system and wants to build a 100% free computer without any proprietary software.
Members of openSUSE’s Adaptable Linux Platform (ALP) community workgroup had a successful install workshop on August 2 and are transitioning to two install feedback sessions.
The first feedback session is scheduled to take place on openSUSE’s Birthday on August 9 at 14:30 UTC. The second feedback session is scheduled to take place on August 11 during the community meeting at 19:00 UTC.
Attendees of the workshop were asked to install MicroOS Desktop and temporarily use it. This is being done to gain some feedback on how people use their Operating System, which allows the work groups to develop a frame of reference for how ALP can progress.
 In 2015, Slax Linux, a lightweight and portable GNU/Linux distribution based on Slackware Linux, disappeared from the Linux scene. Two years later, in late 2017, Slax Linux developer Tomas Matejicek announced the release of a new version of Slax Linux based on Debian GNU/Linux, not Slackware.
In mid-July 2022, Tomas Matejicek announced that “having nothing better to do” he is considering bringing back the Slackware-based version, and today he released a new Slax release based on Slackware 15.0.
Slax 15.0, the lightweight Live CD Linux distro, is now available, re-based back to its roots on Slackware Linux.
Slax is a portable and fast Linux operating system with a modular architecture and beautiful design that can be operated from a USB stick. It supports many filesystems, including NTFS, FAT, EXT4, and Btrfs.
The ability to persist data is one of the key features that distinguishes Slax from other Live CD Linux distributions. In other words, if you run Slax from a read-only media, such as a CD/DVD, it only saves system modifications in memory, which you lose when rebooting.
At Red Hat, we strive for transparency with our customers. It is who we are. It is what we do. But transparency in product security can be tricky. We must provide our customers with the information they need to make informed decisions without opening ourselves or them up to attacks. With the uptick in software supply chain attacks over the last couple of years, we have harnessed a particular focus on software supply chain security within our Product Security organization.
Generally, automation involves “the use of technology to perform tasks with reduced human assistance,” says Red Hat. “Any industry that encounters repetitive tasks can use automation, but automation is more prevalent in the industries of manufacturing, robotics, and automotives, as well as in the world of technology — in IT systems and business decision software.”
“Automation has been a cornerstone of the manufacturing industry for decades,” explains Sarah White, but now companies are automating IT and software processes as well.
Specifically, Red Hat says, “IT automation, sometimes referred to as infrastructure automation, is the use of software to create repeatable instructions and processes to replace or reduce human interaction with IT systems.” In terms of software, automation can help improve efficiency and solve workflow challenges.
 NVIDIA Jetson AGX Orin 32GB production module is now in mass production and available, after the 12-core Cortex-A78E system-on-module was first announced in November 2021, and the Jetson AGX Orin developer kit was launched last March for close to $2,000.
Capable of up to 200 TOPS of AI inference performance, or up to 6 times faster than the Jetson AGX, the NVIDIA Jetson AGX Orin 32GB can be used for AI, IoT, embedded, and robotics deployments, and NVIDIA says nearly three dozen partners are offering commercially available products based on the new module.
“Is there anyone who doesn’t love music? No matter what gadget you use, you always love to listen to music that pleases your ears. Android is the widely used OS in smartphones, and there are several music player applications available on app stores. But many of us get confused while picking up the best music player for our Android device. Several factors must be taken care of while selecting a good music player application. Today we are going to list out the 10 best music players for Android in 2022 that you can use to listen to your favorite music anywhere, anytime.
Not all the applications hosted on the play store are legit, as some of them show a lot of ads while others lag a lot while operating. To avoid you from such malicious applications, we have prepared a well-researched and detailed list of music players for Android. So, let’s have a look.”
This year, nine students from the Universidad Autónoma de la Ciudad de México (UACM), one of the most important universities in the country and in the capital of Mexico, have joined the social service programme that LibreOffice offers to all Mexican students. This is a record number in the three semesters that the programme has been running at the university.
GTK4 screenshot of writer using true GtkScrollbars rather than themed Vcl ScrollBars. Long press enters gtk's usual fine control mode for scrolling.
Ghost blog is an open-source blogging platform, headless CMS for individuals and enterprise. We have been using it for years since the early version.
Thanks to its developers and the community, Ghost blog came a long way in the recent releases by adding the search, improving the backend, the SEO features and more.
However, the community is still small comparing to WordPress or other competitors, so it may look like there is no enough free open-source themes, but there are many.
Therefore, we write this post as a guide for open-source Ghost themes for anyone who are sticking to the open-source realm.
After a long time passed without any BuildStream updates, I’m proud to finally announce that unstable BuildStream 2 development phase is coming to a close.
As of the 1.95.0 beta release, we have now made the promise to remain stable and refrain from introducing any more API breaking changes.
At this time, we are encouraging people to try migrating to the BuildStream 2 API and to inform us of any issues you have via our issue tracker.
[...]
Plugins which used to be a part of the BuildStream core, along with some additional plugins, have been migrated to the buildstream-plugins repository. A list of migrated core plugins and their new homes can be found in the porting guide.
Sometimes, competing for business means coming up with better products than your rivals. And other times, competing means just not screwing up while your competitor stumbles. For the heated battle between AMD and its archrival, Intel, when it comes to compute engines in the datacenter, AMD is in the fortunate position of being able to leverage both tactics at the same time.
And we say fortunate, we mean that AMD is raking in money and rapidly re-investing it into the further expansion of its business as well as buying up the stock that will allow it to reward employees who have worked hard for this day to come.
Seven years ago, when the Epyc comeback plan was formulated, AMD could not have dreamed in a million years that Intel’s vaunted foundries would run into so many troubles with 10 nanometer and then 7 nanometer processes. The current situation has created as big of a gap for AMD to exploit as Intel’s stubborn decision to put forth the Itanium architecture as the future of datacenter compute back in the late 1990s and early 2000s, which gave AMD the immense opportunity to peddle 64-bit Xeon-compatible Opteron processors against 32-bit Xeons (which Intel initially refused to bit-wise embiggen) and 64-bit – and mostly non-compatible – Itaniums.
Over the last year we have been busy planning the expansion of our free open source silicon design and manufacturing program to further grow the community of developers and companies building custom silicon, and build a thriving ecosystem around open source hardware.
Today, we’re excited to announce an expansion of this program and our partnership with GlobalFoundries. Together, we're releasing the Process Design Kit (PDK) for the GlobalFoundries 180MCU technology platform under the Apache 2.0 license, along with a no-cost silicon realization program to manufacture open source designs on the Efabless platform. This open source PDK is the first result of our ongoing partnership with GF. Based on the scale and breadth of GF’s technology and manufacturing expertise, we expect to do more together to further access and innovation in semiconductor development and manufacturing.
NVIDIA, which makes graphics processing units (GPUs) for gaming systems, high-end PCs and handheld devices, has issued fixes for several high-severity vulnerabilities in its graphics drivers for Windows and Linux that in some cases could lead to code execution.
The graphics driver (also known as the NVIDIA GPU Display Driver) is the software component that allows the device’s operating system and application to use its enthusiast gamer-optimized graphics hardware. NVIDIA’s graphics driver has previously been found to contain serious flaws, including ones disclosed in May that could allow attackers to execute arbitrary code and, in some cases, perform guest-to-host escapes on systems running virtual machines.
VMware has released security updates to address multiple vulnerabilities in VMware’s Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector, and vRealize Automation. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
The wait for meaningful legal protection of people’s privacy in India — long under ever-increasing attack — has just gotten longer. The government has withdrawn the Personal Data Protection Bill, which had been in the works for three years, slamming the brakes indefinitely on privacy safeguards in India. This decision, and the government’s consistent failure to advance a meaningful, people-centric data protection law, comes with a steep cost to human rights in the world’s largest democracy.
The initial 2019 version of the legislation, and the following 2021 draft with recommendations by a parliamentary committee, each failed to adequately protect privacy and granted excessive discretionary powers to the government. However, these iterations could have served as a basic foundation that lawmakers could subsequently improve, creating a law that would have strengthened Indians’ rights and control over their personal data. The government’s withdrawal of the bill without any discussion in parliament, and without presenting a concrete replacement, deepens the uncertainties and risks surrounding privacy and erodes people’s confidence in the government.
“As India celebrates 75 years of independence, we are also marking 12 years since policymakers first proposed a federal-level privacy and data protection law, and over five years since the Supreme Court of India ruled that privacy was a fundamental right, requiring government action to safeguard our personal data,” said Raman Jit Singh Chima, Asia Pacific Policy Director and Senior International Counsel at Access Now. “Today, far too many sessions of parliament have passed with zero progress on the Personal Data Protection Bill, when it should have been the top priority. The government’s withdrawal of legislation and failure to say when we will move forward on a strengthened, people-centric data protection law — one that does not privilege the interests of government and the tech sector over fundamental rights — is wholly unacceptable.”
Within a matter of weeks, Jamaica will roll out a pilot program for the National Identification System (NIDS) — a voluntary biometric digital identification system created through the National Identification and Registration Act (NIRA). The Jamaica NIDs program is going ahead in spite of the very real privacy and security risks civil society has identified, as well the potential for the new digital ID to enable discrimination or even exclusion of vulnerable communities from government services and benefits.
Before passing the NIRA, the Jamaican parliament failed to resolve all of the concerns that we and our partners flagged. Our hope is that other countries considering implementing similar programs will avoid making the same mistakes.
The U.S. Consumer Product Safety Commission fined the company $13 million dollars for knowingly selling such items as “a portable speaker model that posed an explosion hazard, hoverboards linked to 16 reports of burn injuries and knives that broke and caused multiple lacerations requiring stitches.”
The company also sold infant products that were known to have actually caused infants to be killed.
T.J. Maxx runs stores under that name, Marshalls, and HomeGoods.
The CPSC Web site lists at least 19 products that T.J. Maxx sold which it knew were recalled and dangerous to the American public.
The problem going on here is that T.J. Maxx mainly runs stores for poor people. You see them in run down shopping malls and low end strip malls.
They bring shoppers in mainly by selling things that didn’t sell at larger stores because of serious design flaws, but also due to liquidation sales.
* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.