Language Selection

English French German Italian Portuguese Spanish


Syndicate content
LinuxInsight - aggregated feeds
Updated: 3 min 15 sec ago

Phoronix: RADV Vulkan Performance Appears To Improve With Linux 4.11

Friday 24th of February 2017 08:24:17 PM
A few days ago I posted some results of surprise performance improvements for a Radeon RX 470 when testing the DRM-Next code queued for Linux 4.11. I've now tested that kernel on more systems and can confirm at least benefits more widespread for RADV's Vulkan performance.

LXer: Which is the best programming language for beginners?

Friday 24th of February 2017 07:52:13 PM
What is the best language for a budding programmer to get their start with? There are probably as many opinions about which language is best for beginners as there are languages to choose from. And the options change all of the time. When we asked this question two years ago, Python came out on top as the clear winner. But is it still the best choice today?read more

Reddit: Using badblocks on a LUN from a storage array: read-write test unneccessary?

Friday 24th of February 2017 07:14:26 PM

We had an incident on our storage array recently, that caused random (but not fatal) corruption in a number of LUNs used by our Oracle databases. Some database files were in a state where the database could access them, but any filesystem or app operations that attempted to read a certain block on the file, would result in I/O errors. Our current action plan has been to take each DB down, and run a badblocks scan on the affected filesystems. In our first case, we ran fsck with badblocks enabled, performing a full read-write test (fsck -cc -v /path/to/screwed/volume).

The scan found and repaired a number of blocks, which made the affected files readable again at the filesystem level- but the test took 18 hours to complete, which freaked out management. Some of our other affected database LUNs are much larger, and they don't like the idea of multi-day business impact while we perform filesystem scans.

When discussing the incident with our storage vendor, their SME mentioned that we shouldn't have to perform a full read-write test on the LUN's (logical) blocks, and that a read-only test would be good enough. To paraphrase, he said: "If you can't write to the (logical) block on your filesystem, you wouldn't be able to read from it either... so there is no point spending the time to test for writes against our LUN."

This just doesn't sound right to me. It seemed like he was suggesting that a write test on the logical blocks would be redundant, if the underlying physical blocks are writable according to the storage array. I was interested if anyone else had experiences / opinions on this? Some of our database LUNs are very large, and I don't want to run a check that requires multiple days of downtime if it isn't necessary. In those cases, I would likely do something different, like creating another LUN + filesystem, and using dd to export the files into a new, clean filesystem.

submitted by /u/feistypenguin
[link] [comments]

LinuxToday: What to do when people start hacking your culture

Friday 24th of February 2017 07:00:00 PM

When organizational rules exist, people will try to game them.

LXer: Open Source Hardware: From SBCs to Servers

Friday 24th of February 2017 06:43:36 PM
When you mention open source hardware, people typically think about community-backed hacker boards. However, the open hardware movement is growing on many fronts, including medical devices, rocketry and satellites, 3D printers, cameras, VR gear, and even laptops and servers.

LinuxToday: How To Instantly Share Files And Folders In Arch Linux

Friday 24th of February 2017 06:00:00 PM

Quickserve is a simple http server that allows you to share files quickly between Arch Linux systems and/or other operating systems.

Reddit: User Name Changed in Terminal Without Permission

Friday 24th of February 2017 05:38:59 PM

So here is a weird thing. I'm running Fedora 24 with kernel 4.79.200fc24x86_64. This morning I launched terminal to see steve@renees-iphone instead of steve@home the same thing has changed when I log in as root.

My problem is I have no idea what renees-iphone is, how it got there and what would have installed it. Other than deleting some cache a few days ago I have not logged in as root, and I have not made any changes to the system or installed any software in weeks. Other than switching to Xfinity wifi yesterday, nothing has changed with my computer, and even then I simply connected to a different network.

Any help would be greatly appreciated

submitted by /u/vertdeferk
[link] [comments]

Phoronix: Fresh RadeonSI Mesa Git Gaming Benchmarks On 7 Linux Desktops

Friday 24th of February 2017 05:35:00 PM
When posting last week our Windows 10 vs. Ubuntu Radeon benchmarks and Windows vs. Linux NVIDIA Pascal benchmarks and then the Windows vs. Linux relative performance analysis, as usual, it didn't take long for some to argue that the Linux gaming performance is actually faster but "Unity 7 is slower" and the similar FUD that is usually waged whenever looking at cross-platform performance.

LXer: Top 3 machine learning libraries for Python

Friday 24th of February 2017 05:34:59 PM
You don't have to be a data scientist to be fascinated by the world of machine learning, but a few travel guides might help you navigate the vast universe that also includes big data, artificial intelligence, and deep learning, along with a large dose of statistics and more

TuxMachines: today's leftovers

Friday 24th of February 2017 05:22:10 PM
  • LinuXatUSIL – Previas 2 for #LinuxPlaya

    Damian from GNOME Argentina explained us some code based on this tutorial and the widgets in Glade were presented.

  • RancherOS v0.8.0 released! [Ed: and a bugfix release, 0.8.1, out today]

    RancherOS v0.8.0 is now available! This release has taken a bit more time than prior versions, as we’ve been laying more groundwork to allow us to do much faster updates, and to release more often.

  • The Technicals For Red Hat, Inc. (RHT) Tell An Interesting Tale
  • Ubuntu 17.04 Beta 1 Released | New Features And Download

    Ubuntu 17.04 Zesty Zapus Beta 1 release is finally here. If you’re interested, you can go ahead and download the ISO images of the participating flavors, which are, Lubuntu, Kubuntu, Xubuntu, Ubuntu Budgie, Ubuntu GNOME, Ubuntu Kylin, and Ubuntu Studio. Powered by Linux kernel 4.10, these releases feature the latest stable versions of their respective desktop environments. This release will be followed by the Final Beta release on March 23 and final release on April 13.

  • Ubuntu 17.04 Beta 1 Now Available to Download

    The first beta releases in the Ubuntu 17.04 development cycle are ready for testing, with Xubuntu, Ubuntu GNOME and Ubuntu Budgie among the flavors taking part.

read more

TuxMachines: FOSS Policies

Friday 24th of February 2017 05:20:16 PM

read more

TuxMachines: Leftovers: BSD

Friday 24th of February 2017 05:19:20 PM

read more

TuxMachines: Security Leftovers

Friday 24th of February 2017 05:18:28 PM
  • Stop using SHA1 encryption: It’s now completely unsafe, Google proves

    Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm's use for security-sensitive functions should be discontinued as soon as possible.

    SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005. The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made.

    However, despite these efforts to phase out the use of SHA-1 in some areas, the algorithm is still fairly widely used to validate credit card transactions, electronic documents, email PGP/GPG signatures, open-source software repositories, backups and software updates.

  • on pgp

    First and foremost I have to pay respect to PGP, it was an important weapon in the first cryptowar. It has helped many whistleblowers and dissidents. It is software with quite interesting history, if all the cryptograms could tell... PGP is also deeply misunderstood, it is a highly successful political tool. It was essential in getting crypto out to the people. In my view PGP is not dead, it's just old and misunderstood and needs to be retired in honor.

    However the world has changed from the internet happy times of the '90s, from a passive adversary to many active ones - with cheap commercially available malware as turn-key-solutions, intrusive apps, malware, NSLs, gag orders, etc.

  • Cloudflare’s Cloudbleed is the worst privacy leak in recent Internet history

    Cloudflare revealed today that, for months, all of its protected websites were potentially leaking private information across the Internet. Specifically, Cloudflare’s reverse proxies were dumping uninitialized memory; that is to say, bleeding private data. The issue, termed Cloudbleed by some (but not its discoverer Tavis Ormandy of Google Project Zero), is the greatest privacy leak of 2017 and the year has just started.

    For months, since 2016-09-22 by their own admission, CloudFlare has been leaking private information through Cloudbleed. Basically, random data from random sites (again, it’s worth mentioning that every site that used CloudFlare in the last half year should be considered to having fallen victim to this) would be randomly distributed across the open Internet, and then indefinitely cached along the way.

  • Serious Cloudflare bug exposed a potpourri of secret customer data

    Cloudflare, a service that helps optimize the security and performance of more than 5.5 million websites, warned customers today that a recently fixed software bug exposed a range of sensitive information that could have included passwords and cookies and tokens used to authenticate users.

    A combination of factors made the bug particularly severe. First, the leakage may have been active since September 22, nearly five months before it was discovered, although the greatest period of impact was from February 13 and February 18. Second, some of the highly sensitive data that was leaked was cached by Google and other search engines. The result was that for the entire time the bug was active, hackers had the ability to access the data in real-time by making Web requests to affected websites and to access some of the leaked data later by crafting queries on search engines.

    "The bug was serious because the leaked memory could contain private information and because it had been cached by search engines," Cloudflare CTO John Graham-Cumming wrote in a blog post published Thursday. "We are disclosing this problem now as we are satisfied that search engine caches have now been cleared of sensitive information. We have also not discovered any evidence of malicious exploits of the bug or other reports of its existence."

read more This Week in Open Source News: Diversity Talk at OSLS Reveals Minority Challenges in Tech, ONAP Project Announced & More

Friday 24th of February 2017 05:00:01 PM
Title: This Week in Open Source News: Diversity Talk at OSLS Reveals Minority Challenges in Tech, ONAP Project Announced & More 24 FebLearn more How to Install Apache Directory Studio and Connect to an OpenLDAP Server

Friday 24th of February 2017 04:30:50 PM
Title: How to Install Apache Directory Studio and Connect to an OpenLDAP Server24 FebLearn more

LXer: The Secure Linux OS - Tails

Friday 24th of February 2017 04:26:22 PM
Some people worry a lot about security issues. Anyone can worry about their personal information, such as credit card numbers, on the Internet. They can also be concerned with someone monitoring their activity on the Internet, such as the websites they visit. To help ease these frustrations about the Internet anyone can use the Internet without having to “look over their shoulder”.

More in Tux Machines

Start with Scratch: Learn Linux by rolling your own distro

Linux From Scratch teaches you how to bake a complete Linux system, minus cutting-edge details like Docker -- although for those allergic to systemd, you can leave that out too Read more

10 Best Linux Desktop Environments And Their Comparison | 2017 Edition

The Linux world is full of open source software. You have the option of choosing from hundreds of distributions and customize them as per your will. No one slaps you with a copyright even if you change the source code of a distro to fork your Linux distro and release it with a new name. Only one thing the creators may ask you is to give them proper credits because they have also invested their efforts and time. Read more

Using Open Source to Empower Students in Tanzania

Powering Potential Inc. (PPI) aims to enhance education opportunities for students in Tanzania with the help of the Raspberry Pi and open source technology. “I believe technology is a vital part of the modern human experience. It enlightens. It ties us together. It broadens our horizons and teaches us what we can be. I believe everyone deserves access to these resources,” says Janice Lathen, Founding Director and President of PPI. Read more

IoT gateway runs mainline Linux on i.MX7

Compulab’s “IOT-GATE-iMX7” gateway runs mainline Linux on its CL-SOM-iMX7 COM, and offers optional GbE, 3G, WiFi, BT, and ZigBee. Compulab has launched a Linux-driven Internet of Things gateway built around its CL-SOM-iMX7 COM, featuring NXP’s power-sipping i.MX7 SoC. The embedded world is awash in i.MX6-based IoT gateways, but this is the first i.MX7 based model we’ve seen. Read more