Language Selection

English French German Italian Portuguese Spanish

Programming: Java, R, and Raku/Perl

Filed under
Development
  • 4 things cloud-native Java must provide

    Because of Java and Enterprise Java's history, an application built on a traditional Java stack, even if it is optimized for cloud-native environments, requires more memory and takes longer to start than applications built on other popular languages. With modern platforms like Kubernetes, Istio, and Knative, the need to have smaller runtimes that can scale up, down, and even down to zero is becoming more and more important.
    So, what should cloud-native Java look like in order to enable people to develop, build, run, debug, and deploy in an immutable infrastructure without a steep learning curve? How easily can developers evolve cloud-native Java for serverless applications on demand?

  • Excellent Free Tutorials to Learn R

    The R language is the de facto standard among statisticians for the development of statistical software, and is widely used for statistical software development and data analysis. R is a modern dialect of S, one of several statistical programming languages designed at Bell Laboratories.

    R is much more than a programming language. It’s an interactive suite of software facilities for data manipulation, calculation, and graphical display. R offers a wide variety of statistical (linear and nonlinear modelling, classical statistical tests, time-series analysis, classification, clustering, …) and graphical techniques, and is highly extensible. The ability to download and install R packages is a key factor which makes R an excellent language to learn. What else makes R awesome? Here’s a taster.

  • 2020.02 Important Things

    Sterling Hanenkamp (of Raku Async Advent fame) has written an endearing blog about their position with regards to the renaming of Perl 6 to Raku and the important things in life. (/r/rakulang comments).

More in Tux Machines

Security Leftovers: BlueTooth, Spectre/Meltdown and Huawei Disputes

  • BlueTooth Security Risks

    Security risks involving bluetooth vulnerabilities include techniques known as: bluebugging, bluesnarfing, bluejacking, denial of service and exploits for different holes. When a device is configured in discoverable an attacker may try to apply these techniques. Today mobile security was strongly increased and most attacks fail, yet sometimes security holes are discovered and new exploits emerge. As mobile devices prevent the user from installing unmonitored software freely most of attacks are difficult to carry out. This tutorial describes the most common Bluetooth attacks, the tools used to carry out these attacks and the security measures users can take to prevent them. [...] While bluetooth attacks aren’t widely used (when compared with other types of attacks like phishing or DDOS) almost every person carrying a mobile device is a potential victim, therefore in our countries most people are exposed, also through bluetooth, to sensitive data leak. On the other hand most manufacturers already patched devices to protect them from almost all attacks described above, but they only can issue a fix after the vulnerability was discovered and published (like with any vulnerability). While there is not defensive software the best solution is to keep the device turned off in public spaces, since most attacks require a short range you can use the device safely in private places. I hope you found this tutorial on Bluetooth Security Risks useful. Keep following LinuxHint for more tips and updates on Linux and networking.

  • Arm Has Many Changes On Tap For Linux 5.6 From Spectre/Meltdown Bits To New RNG

    While the Linux 5.5 kernel isn't even released yet, it's ideally coming out on Sunday should there not be a one week delay. But in any event Arm's Will Deacon has already sent in the pull request of the ARM architecture changes for Linux 5.6.

  • The Pentagon pushes back on Huawei ban in bid for ‘balance’

    Huawei may have just found itself an ally in the most unexpected of places. According to a new report out of The Wall Street Journal, both the Defense and Treasury Departments are pushing back on a Commerce Department-led ban on sales from the embattled Chinese hardware giant. That move, in turn, has reportedly led Commerce Department officials to withdraw a proposal set to make it even more difficult for U.S.-based companies to work with Huawei. Defense Secretary Mark Esper struck a fittingly pragmatic tone while speaking with the paper, noting, “We have to be conscious of sustaining those [technology] companies’ supply chains and those innovators. That’s the balance we have to strike.”

today's howtos

Devices/Embedded With GNU/Linux

Easy Librem 5 App Development: Flashlight

In my first post on easy application development on the Librem 5 I discussed how to turn a simple shell script that takes a screenshot into a full graphical app with only a few extra lines of code. In this post I will follow up with an even simpler application that took about twenty minutes to write with much of that time involved in reading documentation. My Bright Idea The interesting thing about smart phones is how many other devices they have replaced beyond a regular phone. For instance, there used to be a market for small, pocket-sized digital cameras, but now many people just use the cameras on their smart phones. While some people still do keep a pocket flashlight with them, many people just use the light on their smart phone. I realized that a flashlight app would be another great way to showcase just how easy it is to develop applications for the Librem 5. As applications go the requirements are pretty simple: you need a button to turn on the light, a button to turn off the light, and a button to close the app. Read more