Language Selection

English French German Italian Portuguese Spanish

Running Tux Machines

Filed under
Site News

Roy Schestowitz

TUX Machines has become an integral part of our life right here in this humble home. It's a rewarding experience but also a demanding experience. I personally write my articles in the lounge (which is no 'press room') and it requires many hours of digging and researching news. In Tux Machines, unlike in Techrights for example, it's mostly about finding news of high relevance and importance, and finding them fast! Timing counts. We don't want readers to waste their time wading/going through irrelevant, unimportant and out-of-date reports.

24/7 coverage of news is easy for us. Rianne works mostly at daytime, whereas I usually work at nights (customers are mostly government/public sector and they require 24/7 coverage). When Rianne is working I take over the responsibilities at Tux Machines and vice versa. We swap responsibilities like this when it comes to housework as well; we work out together when we are out of the house (also separately in terms of gym sections, e.g. cardiovascular/weights). This week we go to yoga classes as much as 5 times, but we usually just to Town for other facilities like pool, table tennis, sauna (men and women separately), gym, etc. This is our main escape from Tux Machines; given Wi-Fi (scarce coverage but definitely existent in Manchester City Centre), we sometimes update Tux Machines while out of the house as well.

The site forums are now open for participation and every registered member can add blog posts and push them to the front page (now that we've got the spam epidemic under control). Please do consider participating. This week, as in previous weeks, we are seeing a ~10% growth in traffic (week-to-week), perhaps owing to the slight redesign, loading speeds (Varnish cache), and very frequent updates. We check for news once in a few hours in order to keep abreast of breaking events.

Running Tux Machines will hopefully become more of a community effort over time. Anyone who is logged in can now submit stories. Unless this gets abused by spammers, we will keep it that way.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

The Share/Save button

I wish you would considering moving that Share/Save button from under the Read More Links. Dang thing keeps popping up when I move my cursor over to Read More.

The button

Someone else reported a similar issue, whereupon we made the button much smaller. Let's see if we can move it into just pertinent nodes.

Done

The buttons were removed from the front page.

Dr. Roy Running Tux Machines Now?

Where the h3ll have I been lately that I missed this important transformation at one of my favorite sites?

I hope all is well with Susan L. I've been a fan of Tux Machines a lot longer than I've been registered here. I finally got around to registering a few years ago so I could reply to comments others had made to my Nocturnal Slacker v1.0 articles that Susan had linked to here.

Having followed your own site (Techrights), Dr. Roy, for quite some time, I'm confident that you'll do us all proud here at Tux Machines.

Very COOL! Smile

Regards,

V. T. Eric Layton (AKA Nocturnal Slacker, vtel57... and other names Wink )
Tampa, Florida, USA
http://vtel57.com

Thanks

Thanks for the kind words. I had linked to Nocturnal Slacker dozens of times in the past. I usually picked up the links from Susan.

Indeed, and Thanks!

I always received tons of traffic whenever you or Susan linked to one of my posts. One of these days, I will kick start my article writing back into motion on Nocturnal Slacker v1.0.

Stay tuned... Smile

Excellent

We'll keep an eye open for it.

More in Tux Machines

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).

Red Hat News

Development News: LLVM, New Releases, and GCC

PulseAudio 10 and Virtual GPU in Linux

  • PulseAudio 10 Coming Soon, Using Memfd Shared Memory By Default
    It's been a half year since the debut of PulseAudio 9.0 while the release of PulseAudio 10 is coming soon. PulseAudio 9.99.1 development release was tagged earlier this month, then usually after x.99.2 marks the official release, so it won't be much longer now before seeing PulseAudio 10.0 begin to appear in Linux distributions.
  • Experimenting With Virtual GPU Support On Linux 4.10 + Libvirt
    With the Linux 4.10 kernel having initial but limited Intel Graphics Virtualization Tech support, you can begin playing with the experimental virtual GPU support using the upstream kernel and libvirt.