Showing headlines posted by bob
« Previous ( 1 ... 167 168 169 170 171 172 173 174 175 176 177 ... 1158 ) Next »LoRaWAN HAT for Raspberry Pi offers GPS, too
Seeed has launched a $19.90 “WM1302 Raspberry Pi HAT” to house an $89.90, Semtech SX1302 based WM1302 LoRaWAN Gateway Module. The HAT also supplies a GPS chip. For a total of $109.80, Seeed can set you up with its recently introduced WM1302 LoRaWAN Gateway Module, which is available on a new WM1302 HAT for the […]
New Jetson TX2 NX appears on compact edge AI computers
Aaeon has unveiled a pair of edge AI systems based on Nvidia’s new Jetson TX2 NX: The “Boxer-8230AI” offers 5x GbE while the “Boxer-8233AI” has dual GbE with PoE/PSE plus HDMI in and out. Aaeon is a prolific manufacturer of new embedded systems by any measure. Yet, many of its Boxer line of fanless, compact […]
How to create a user on Linux EC2 instance on AWS and add a public key to it using a shell script
Creating a user and adding a public key to it can be very tedious. In this article, we will see how this process can be automated using a shell script which can help us avoid human errors that can arise if we do the task manually.
AWSs Shane Miller to head the newly created Rust Foundation
Shane Miller, Amazon Web Services Senior Engineering Manager will take on the job of the newly created Rust Foundation's first chairperson.
Asahi Linux devs merge effort to run Linux on Apple M1 silicon into Kernel
Slated for inclusion in version 5.13, due about three months from now. The Asahi Linux project, an effort to bring the Linux kernel to Apple’s M1 silicon, has merged its work and is on track to have it accepted in version 5.13 of the kernel.…
What is Git cherry-picking?
Whenever you're working with a group of programmers on a project, whether small or large, handling changes between multiple Git branches can become difficult. Sometimes, instead of combining an entire Git branch into a different one, you want to select and move a couple of specific commits. This procedure is known as "cherry-picking."
Reflections on One Year as the CEO of Mozilla
If we want the internet to be different we can’t keep following the same roadmap. I am celebrating a one-year anniversary at Mozilla this week, which is funny in a …
How to Install Joomla with Apache and Let's Encrypt SSL on Debian 10
Joomla is a free and open-source content management system used to create, modify and manage the content of a website. In this tutorial, I will show you how to install Joomla CMS with Apache and Let's Encrypt on Debian 10.
What Googles API copyright win over Oracle means
The experts agree this Supreme Court decision was a victory for developers and open-source software.
Toughened up Xavier NX edge AI system has four GSML cam links
Eurotech’s rugged “BoltGPU 10-31” edge AI and transport computer runs Linux on a Jetson Xavier NX and supplies 2x GbE, 2x USB 3.1 Gen2, DP, WiFi 6, 3x M.2, isolated CAN and DIO, and 4x GSML cam inputs. Eurotech announced a BoltGPU 10-31 “subsystem” for rugged edge AI applications including rolling stock, automotive, and heavy-duty […]
How to create Cloudwatch alarms for an SQS Queue on AWS
CloudWatch metrics for SQS queues are collected and pushed to CloudWatch at one-minute intervals automatically. These metrics are provided at no charge in CloudWatch for both standard and FIFO queues. In this article, we will create an alarm for the "NumberOfMessagesSent" metric.
5 commands to level-up your Git game
If you use Git regularly, you might be aware that it has several reputations. It's probably the most popular version-control solution and is used by some of the biggest software projects around to keep track of changes to files. It provides a robust interface to review and incorporate experimental changes into existing documents.
read more
Xen releases a new version 4.15 after a slightly delayed development process
Teases new ‘Hyperlaunch’ tech that will allow booting of whole VM fleets
The Xen project has released another upgrade to its open source hypervisor.…
Protect external storage with this Linux encryption system
Many people consider hard drives secure because they physically own them. It's difficult to read the data on a hard drive that you don't have, and many people think that protecting their computer with a passphrase makes the data on the drive unreadable.
This isn't always the case, partly because, in some cases, a passphrase serves only to unlock a user session. In other words, you can power on a computer, but because you don't have its passphrase, you can't get to the desktop, and so you have no way to open files to look at them.
read more
Why I love using bspwm for my Linux window manager
Some folks like to rearrange furniture. Other folks like to try new shoes or redecorate their bedroom on the regular. Me? I try out Linux desktops.
After drooling over some of the incredible desktop environments I've seen online, I got curious about one window manager in particular: bspwm.
A swarm in May is worth a load of hay, is it? JetBrains Code With Me collaborative programming tool released
Swarm programming with audio, video, and everyone editing at once – what could go wrong? JetBrains today pushed out Code With Me, formerly in preview, a plugin to support remote collaborative coding, as well as updates to its Java and Ruby IDEs.…
How to Install Erlang Programming Language on Debian 10
Erlang is a general-purpose programming language and runtime environment. In this tutorial, I will show you how to install Erlang on Debian 10.
Get started with batch files in FreeDOS
On Linux, it's common to create shell scripts to automate repetitive tasks. Similarly, on FreeDOS, the open source implementation of old DOS operating systems, you can create a batch file containing several FreeDOS commands. Then you can run your batch file to execute each command in order.
IBM creates a COBOL compiler - for Linux on x86
What’s this got to do with Big Blue's hybrid cloud obsession? Cloudifying COBOL ... until you repent and go back to z/OS
IBM has announced a COBOL compiler for Linux on x86.…
Using network bound disk encryption with Stratis
Learn how to use Stratis and Tang to manage disk encryption over the network at scale.
« Previous ( 1 ... 167 168 169 170 171 172 173 174 175 176 177 ... 1158 ) Next »