Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc
  • New Technologies Lead to New Linux and Cloud Training Options
  • Everything You Need to Know about the Cloud and Cloud Computing, Part II: Using the Cloud [Ed: Latest cloudwashing by IBM/LJ; just call it what it is: servers being pushed back to a mainframe era -- companies controlling all the servers.]
  • Kakoune: A Better Code Editor Heavily Inspired by Vim

    It comes with numerous text editing/writing tools such as contextual help, syntax highlighting, auto-completion while typing, and supports many different programming languages. It also implements multiple selections as an essential procedure for interacting with your text.

    In addition, Kakoune’s client/server architecture allows for multiple clients to connect to the same editing session.

  •  

  • New in Qt 5.11: improvements to the model/view APIs (part 1)

    The Qt model/view APIs are used throughout Qt — in Qt Widgets, in Qt Quick, as well as in other non-GUI code. As I tell my students when I deliver Qt trainings: mastering the usage of model/view classes and functions is mandatory knowledge, any non-trivial Qt application is going to be data-driven, with the data coming from a model class.

  • Akademy 2019 Call for Hosts

    The organization of this year's Akademy is in full swing: the official conference program is out, we have had an insightful interview with one of the keynote speakers, another is coming soon, and attendees are already booking flights and accommodation. The #akademy IRC channel on Freenode and the Telegram group are buzzing with messages, advice and recommendations.

  • GNOME Is Removing the Ability to Launch Binary Apps from Nautilus

    Last year Nautilus lost the ability to show desktop icons — now GNOME developers plan to drop another familiar feature.

    According to a code commit on Gitlab the famous file manager is set to lose the ability to run binaries and launch apps directly.

    Or, to put it another way, you won’t be able to double-click on programs, scripts or apps to launch them using Nautilus.

  • Mageia Blog (English) : Issues with the Grand Update?

    This should not be needed, as 32-bit libraries should be able to co-exist on a 64 bit install, as they may be needed for third party applications.

    Bug 23016 has been reopened to study this a bit more. For now, we’re watching for reports, and giving you the workaround of uninstalling the 32 bit library.

    It’s not that 32-bit isn’t able to mix with 64-bit in all cases, just in some, where there are files in the lib package that should be in a different (non-arch specific) package. In these two cases, it’s the /usr/share/locale/ files are in both the 32 and 64 bit packages, with identical names and paths.

    The rpm package manager allows a file to be owned by more than one package, provided the attributes are identical, but it blocks updating with a new version, since it’s trying to update one of the packages, but until the other version is updated too, there is a conflict. We’re keeping a watch-out for these packaging errors.

    It’s possible that if you’ve used DNF to do the update, rather than urpmi, you won’t have this problem; as we gather more information, we’ll add it to roundups in the coming weeks.

    While all this Grand stuff has been happening, we’ve also been doing plenty of the usual things, including over 300 packages into Cauldron.

More in Tux Machines

Android Leftovers

5 tips for choosing the right open source database

So, your company has a directive to adopt more open source database technologies, and they've recruited you to select the right direction. Whether you are an open source technology veteran or a newcomer, this is a daunting and overwhelming task. Over the past several years, open source technology adoption has steadily increased in the enterprise space. With its popularity comes a crowded marketplace with open source software companies promising that their solution will solve every problem and fit every workload. Be wary of these promises. Choosing the right open source technology—especially a database—is an important and difficult decision you can't make lightly. Read more

Today in Techrights

Security: Cracking, Elections and Apache

  • Hack [sic] on 8 adult websites exposes oodles of intimate user data

    A recent [crack] of eight poorly secured adult websites has exposed megabytes of personal data that could be damaging to the people who shared pictures and other highly intimate information on the online message boards. Included in the leaked file are (1) IP addresses that connected to the sites, (2) user passwords protected by a four-decade-old cryptographic scheme, (3) names, and (4) 1.2 million unique email addresses, although it’s not clear how many of the addresses legitimately belonged to actual users.

  • Professors discuss election security, voting systems at panel

    Amid questions of election security and potential system hacking in the upcoming midterm elections, Engineering prof. J. Alex Halderman spoke at the University of Michigan Alumni Center Thursday night about vulnerabilities in U.S. voting systems. Last June, Halderman appeared before the Senate Select Committee on Intelligence to testify about such.

    [...]

    “If an attack takes place, we won’t necessarily see the physical evidence," Halderman said. "The physical evidence that it took place is a discrepancy between what’s written on a piece of paper and what a computer total of that paper says. Because elections are so complicated, they’re so noisy, because the [crackers] can hide their traces in various ways, we won’t necessarily see when something like this happen for the first time. We've got to be ready.”

  • Apache Access Vulnerability Could Affect Thousands of Applications
    A recently discovered issue with a common file access method could be a major new attack surface for malware authors. Vulnerabilities in Apache functions have been at the root of significant breaches, including the one suffered by Equifax. Now new research indicates that another such vulnerability may be putting thousands of applications at risk. Lawrence Cashdollar, a vulnerability researcher and member of Akamai's Security Incident Response Team, found an issue with the way that thousands of code projects are using Apache .htaccess, leaving them vulnerable to unauthorized access and a subsequent file upload attack in which auto-executing code is uploaded to an application.