Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc
  • Summing Up The AMD EPYC 7742 2P Performance In One Graphic

    If you didn't have a chance since last night to check out our benchmarks of the AMD EPYC 7742 and EPYC 7502 Linux performance, I certainly encourage you to do so. Even if you aren't a server enthusiast, it's incredible to see the engineering achievement of AMD with Zen 2 and how the race is certainly back on in the CPU space. If you are short on time, here's the quick summary of our initial AMD EPYC 7002 benchmark results. 

    As all independent reviewers seem to be in consensus, the EPYC 7002 series is a godsend for just about everyone, sans Intel. The EPYC 7002 line-up provides the most competitive option against Intel we've seen in the server space in many years if not ever, customers have these lower-cost CPUs that actually perform better and more power efficient in a majority of real-world workloads, and Rome further benefits consumers by reigniting Intel's engine and they will certainly need to respond in some manner by either (much) better pricing or some card up their sleeves.

  • How Can AMD EPYC "Rome" 7002 Series Be Even Better? Open-Source BIOS / Coreboot

    By now you've likely seen the fantastic performance out of AMD's new "Rome" 7002 series processors. The performance is phenomenal and generally blowing well past Intel's Xeon Cascade Lake processors. So that's all good and it can get even better outside of performance: I asked AMD about the prospects of Coreboot / open-source BIOS support and got a surprising response.

    At an event in Austin last month when AMD was talking up Rome, when they weren't talking about the new server CPU's performance potential they were often mentioning the chip's security. That set the stage for bringing up open-source support and Coreboot support without coming across as just an open-source zealot/nerd question. After all, if their lower-level bits were (again) open-source it would ensure a more auditable boot process and ensuring the integrity of their Platform Security Processor (PSP) and the like, which in this day and age is important and trying to ensure no nefarious back-doors to the system. Companies like Facebook and Google are also genuinely interested in this open-source functionality with their work on the likes of Coreboot and LinuxBoot.

  • Curbing Harassment with User Empowerment

    Typically, we want to communicate with strangers online, so this should be possible by default. But if we are being actively harassed, we can assume that further messages from strangers are unsafe, and switch our account to “safety mode”–rejecting messages, invites and other interactions from strangers. We can rely on our trusted contacts for help and support, including passing on well-wishes from strangers.

    At-risk individuals might choose to start their account in safety mode.

    Trusted caretakers might maintain lists of bad actors, but trusting a caretaker should require very careful consideration: What is their governance model? What is their appeals process? Do they leak information about list recipients?

  • Python and public APIs

    In theory, the public API of a Python standard library module is fully specified as part of its documentation, but in practice it may not be quite so clear cut. There are other ways to specify the names in a module that are meant to be public, and there are naming conventions for things that should not be public (e.g. the name starts with an underscore), but there is no real consistency in how those are used throughout the standard library. A mid-July discussion on the python-dev mailing list considered the problem and some possible solutions; the main outcome seems to be interest in making the rules more explicit.

    It should be noted that the Python language does not enforce any access restrictions at all; any program that can import a module can access any top-level name defined in it. All of the "rules" that govern access restrictions are simply conventions, though they are meant to delineate things that can be changed by a module maintainer without going through the usual deprecation cycle. A big part of the public API is effectively a list of names that the module maintainer promises not to change without a good deal of warning (at least two full development cycles).

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.