Language Selection

English French German Italian Portuguese Spanish

Programming: Python, Java, and Perl

Filed under
Development
  • Time spent on the moon

    This post will illustrate two things: the amount of time astronauts have spent on the moon, and how to process dates and times in Python.

    I was curious how long each Apollo mission spent on the lunar surface, so I looked up the timelines for each mission from NASA. Here’s the timeline for Apollo 11, and you can find the timelines for the other missions by making the obvious change to the URL.

  • Java Constructor Tutorial

    The constructor tool is a very important and useful method used for object-oriented programming. It is not mandatory to declare a constructor for any class, and this tool is mainly used to initialize the object of the class at the time of object creation. The constructor does not work like other normal methods. Rather, the constructor tool is called automatically when an object is declared, and it allocates the memory location for the object. This tutorial will show you how different types of user-defined constructors can be implemented and used in Java class programming.

  • Java if, if-else, if-else-if

    The use of a control flow statement is a very common requirement for solving any programming problem. It is mainly used to generate a particular output based on the particular condition. This statement makes the decision based on the Boolean value return by the statement. The declaration of the if-else-if statement is quite similar to other programming languages like C, C++, etc. The uses of different ‘if’ statements in Java are explained in this tutorial.

  • Java Array Tutorial

    The array object is used to store multiple data in Java. This tool allocates particular memory locations serially based on the array size. An array object in Java can store any one type of primitive or non-primitive data. That means that it can store a list of integers, strings, objects, etc. So, all the values of an array can be data of a particular datatype. The index value of an array starts from 0, as in other programming languages. Both single- and multi-dimensional arrays can be declared in Java. A list of data can be organized and sorted very easily by using an array. The major limitation of arrays is that the size of the array is fixed and it cannot be changed at the run-time. This tutorial will show how array objects can be declared, initialized, accesses, and modified.

  • Java for loop

    Sometimes, it requires to execute some statements repeatedly for getting any particular output to solve a problem, and this type of task can be done easily by using any type of loop. Generally, three types of loops are supported by most of the programming languages. The ‘for’ loop is one of them. This loop is very useful for doing different types of programming tasks. How ‘for’ loop can be used in Java for multiple purposes is explained in this tutorial.

  • Perl7 is a fork of values

    Before reading this, you should watch this video where Bryan Cantrill explains a value-conflict between Joyent and Node.js, I believe we have a similar problem.

  • 8 tips for running a virtual hackathon

    Hackathons are events where developers, product managers, designers, and others come together to tackle problems over a short time period. They have become increasingly popular over the last 15 years after OpenBSD ran the first hackathon in June 1999.

    These events provide several benefits—greater engagement across the community, innovation and new ideas, awareness for the organizers, and networking opportunities for participants.

    Mattermost, an open source messaging platform for DevOps teams, has also run and participated in several hackathons to engage with the open source community. So far, in 2020, we participated in a hackathon to overcome the challenges of COVID-19 and ran a hackfest to create open source chatbots for developer workflows. Both had thousands of participants and were run completely virtually.

  • 2020 Call for Code Global Challenge submissions are closed

    We want to extend our deep appreciation to everyone who answered, supported, and championed the 2020 Call for Code Global Challenge. From building solutions to take on the impacts of climate change, to swiftly responding to the surge of the COVID-19 pandemic, we applaud you for your unwavering commitment to fighting back against these difficult times. This year has been unprecedented on many levels, but what we have seen from the Call for Code community is that when the chips are down, your innovation and problem-solving prowess rises up.

    As of July 31, submissions for the 2020 Call for Code Global Challenge are closed, but another chapter awaits — and it needs your help. Whether you are looking to take on COVID-19, climate change, natural disasters, or other pressing social issues, your code has a vital role to play. Brush up on your cloud skills while making a real difference and get involved with Call for Code open source projects supported by The Linux Foundation. Through your contributions, you could be recognized as a community champion. Visit Call for Code on Monday, August 3, and we’ll have details for you on how you can get involved and start making an impact in these projects. I would also encourage you to continue development on your own projects and to share your progress and any help needed in the Slack channel. Your contributions can have global impact well beyond the lifecycle of a single challenge.

  • HOW TO USE MALLOC FUNCTION IN C

    Malloc is a built-in function declared in the header file . Malloc is the short name for ‘memory allocation’ and is used to dynamically allocate a single large block of contiguous memory according to the size specified. There are two types of memory allocation static and dynamic. Static memory allocation is done at compilation time, and it doesn’t change at runtime. Dynamic memory allocation is allocating memory at runtime for this; we use malloc. Now the point is where from this memory is coming, so all dynamic requirements in C are fulfilled from the heap memory.

  • How to use pipe function in C language

    A pipe is a medium for communication between processes. One process writes data to the pipe, and another process reads the data from the pipe. In this article, we will see how the pipe() function is used to implement the concept using C language.

  • What every developer should know about consistency

    But we don’t live an ideal world - your request needs to reach the data store, which then needs to process the request and finally send back a response to you. All these actions take time and are not instantaneous: [...]

More in Tux Machines

Android Leftovers

Security Leftovers

  • Security updates for Monday

    Security updates have been issued by Debian (curl, libdbi-perl, linux-4.19, lua5.3, mediawiki, nfdump, openssl1.0, qt4-x11, qtbase-opensource-src, ruby-gon, and yaws), Fedora (f2fs-tools, grub2, libxml2, perl-DBI, singularity, xawtv, and xen), Mageia (cifs-utils, kio-extras, libproxy, mbedtls, nodejs, novnc, and pdns), openSUSE (bcm43xx-firmware, chromium, conmon, fuse-overlayfs, libcontainers-common, podman, firefox, libqt4, libqt5-qtbase, openldap2, ovmf, pdns, rubygem-actionpack-5_1, and tiff), SUSE (firefox, go1.14, ImageMagick, and libqt5-qtbase), and Ubuntu (firefox, gnuplot, libquicktime, miniupnpd, ruby-sanitize, and sudo). 

  • Mac, Linux Users Now Targeted by FinSpy Variants

    FinSpy has returned in new campaigns targeting dissident organizations in Egypt – and researchers uncovered new samples of the spyware targeting macOS and Linux users. The FinSpy commercial spyware is back in recently observed campaigns against organizations and activists in Egypt. While the spyware previously targeted Windows, iOS and Android users, researchers have discovered these campaigns using new variants that target macOS and Linux users.

  • Major hospital system hit with cyberattack, potentially largest in U.S. history [iophk: Windows kills]

    Universal Health Services did not immediately respond to requests for comment, but posted a statement to its website that its company-wide network “is currently offline, due to an IT security issue. One person familiar with the company’s response efforts who was not authorized to speak to the press said that the attack “looks and smells like ransomware.”

  • Ransomware reportedly to blame for outage at US hospital chain [iophk: Windows kills]

    The hospital system, which has more than 400 locations in the US and the UK, said in a statement on Monday that its IT network across several facilities was offline “due to an IT security issue.” No patient or employee data appears to have been compromised, according to the statement, which did not mention malware or ransomware.

  • Cyberattack hobbles major hospital chain’s US facilities [iophk: Windows kills]

    Universal Health Services Inc., which operates more than 250 hospitals and other clinical facilities in the U.S., blamed the outage on an unspecified IT “security issue” in a statement posted to its website Monday but provided no details about the incident, such as how many facilities were affected and whether patients had to be diverted to other hospitals.

  • Cybersecurity Software Firm McAfee Files for Nasdaq IPO

    The San Jose, California-based company listed the size of the offering as $100 million in a filing Monday with the U.S. Securities and Exchange Commission. The amount is a placeholder that will likely change.

    McAfee’s planned offering is part of a software IPO boom this year. The biggest listing for an operating company on a U.S. exchange is software maker Snowflake Inc., which raised $3.86 billion including so-called greenshoe shares this month.

Microsoft 365 outage affects multiple services

Microsoft Corp MSFT.O said late Monday a recent change it introduced likely caused a major outage, affecting users' access to multiple Microsoft 365 services, including Outlook.com and Microsoft Teams. The developer of Windows and Office software said it did not “observe an increase in successful connections” even after it rolled back the change to mitigate the impact. Read more

14 Best Free and Open Source Linux Compression Tools

Data compression is the process of storing data in a format that uses less space than the original representation would use. Compressing data can be very useful particularly in the field of communications as it enables devices to transmit or store data in fewer bits. Besides reducing transmission bandwidth, compression increases the amount of information that can be stored on a hard disk drive or other storage device. There are two main types of compression. Lossy compression is a data encoding method which reduces a file by discarding certain information. When the file is uncompressed, not all of the original information will be recovered. Lossy compression is typically used to compress video, audio and images, as well as internet telephony. The fact that information is lost during compression will often be unnoticeable to most users. Lossy compression techniques are used in all DVDs, Blu-ray discs, and most multimedia available on the internet. Read more