Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 ... 7359 ) Next »
Why IBM Choosing Arvind Krishna Over Jim Whitehurst Was Wise
It was widely expected that Red Hat's Jim Whitehurst would be Ginni Rometty's successor. Instead, the job is going to Arvind Krishna -- and that's probably a good thing.
Raspberry Pi 4: Chronicling the Desktop Experience – Emulate Home Computers – Week 15
A glaring omission from my RPI4 blog to date is gaming on this wee machine. There’s so many games to play on the machine, it’s difficult to know where to begin. I’ll start with something that shouldn’t be taxing on the machine. Emulating home computers. Specifically, the Amiga, ZX Spectrum, and Atari ST. They were hugely popular home computers targeted heavily towards games, but also ran other types of software.
Getting started with GnuCash
For the past four years, I've been managing my personal finances with GnuCash, and I'm quite satisfied with it. The open source (GPL v3) project has been growing and improving since its initial release in 1998, and the latest version, 3.8, released in December 2019, adds many improvements and bug fixes.
read more
The Y2038 problem in the Linux kernel, 25 years of Java, and other industry news
As part of my role as a senior product marketing manager at an enterprise software company with an open source development model, I publish a regular update about open source community, market, and industry trends for product marketers, managers, and other influencers. Here are five of my and their favorite articles from that update.
read more
Guess Access / Kiosk Mode on a Linux System
Easily create a restricted user to allow guest access to your system or to create a Linux based kiosk. The xguest package makes this a snap!
How To Prevent Files And Folders From Accidental Deletion Or Modification In Linux
chattr (abbreviation of Change Attribute) is a command line tool used to prevent files and folders from accidental deletion or modification in Unix-like distributions.
How to Install and Use AIDE Advanced Intrusion Detection Environment on CentOS 8
AIDE stands for "Advanced Intrusion Detection Environment" is one of the most popular tools for monitoring changes to Linux-based operating systems. In this tutorial, we will show you how to install and use AIDE to detect intrusions on CentOS 8.
Data quality in iNaturalist downloads
In contrast to biodiversity records from some museums and herbaria, data from the citizen-science project iNaturalist is relatively free of character, structure, format and content errors.
RK3288 SBC offers HDMI 2.0 plus M.2 and mini-PCIe expansion
Boardcon’s “Idea3288” runs Android 7.1.2 on a quad -A17 Rockchip RK3288 via a “CM3288” module with 2GB LPDDR3 and 8GB eMMC. The SBC offers GbE with PoE, WiFi/BT, M.2, mini-PCIe, and display I/O including a 4K ready HDMI port. Boardcon announced the 135 x 90mm Idea3288 as a smaller Rockchip RK3288 SBC alternative to its […]
TLP 1.3 Linux Laptop Battery Extender Released
After being in development for 8 months, TLP 1.3 was released with a new configuration scheme, tlp-stat improvements, and a workaround for laptops reporting incorrect AC or battery status, among others.
Nasty Linux, macOS sudo bug found and fixed
Who'da thought hiding passwords behind asterisks as you entered the characters could be a security problem?
Stuck for a new game? Here's over 50 great games released for Linux in 2019
I know how it is, you look at your list of games and think "I need something new!" and then you click around Steam, GOG, Humble, itch and more and end up going back to the safety of what you already know. Here to help with that!
Top Command - A Best Tool to Monitor Linux System Performance
2DayGeek: The top command enables you to identify high memory and cpu processes on Linux.
Gather information from Instagram with python.
Being a Python coder, I like to experiment with all kinds of open source tools shared on the major platform Github through which coders from the whole world develop projects by collaborating with each other. As an Instagram user, I decided to try some Python applications which can help to interact with it from the command line.
How to Install Xrdp Server (Remote Desktop) on CentOS 8
Xrdp is an open-source implementation of the Microsoft Remote Desktop Protocol (RDP) that allows you to graphically control a remote system. With RDP, you can log in to the remote machine and create a real desktop session the same as if you had logged in to a local machine.
Give an old MacBook new life with Linux
When I installed Apple's MacOS Mojave, it slowed my formerly reliable MacBook Air to a crawl. My computer, released in 2015, has 4GB RAM, an i5 processor, and a Broadcom 4360 wireless card, but Mojave proved too much for my daily driver—it made working with GnuCash impossible, and it whetted my appetite to return to Linux. I am glad I did, but I felt bad that I had this perfectly good MacBook lying around unused.
How to Install Ubuntu 19.10 with ZFS as Root File System
The latest Ubuntu 19.10 (Eoan Ermine) operating system is the first Ubuntu Linux release to ship with support for ZFS as the root filesystem, also called ZFS on Root.
Vimium Helps You To Browse The Web With Vim Keybindings
This tutorial explains how to browse the web with Vim Keybindings using Vimium browser extension.
Linux Still Not a Threat to Windows 10’s Home Domination
The death of Windows 7 was seen by many as a major opportunity for the Linux world to gain new users, especially as many of the devices where Microsoft’s 2009 operating system was installed were running on old hardware.
Open-Source Security Projects: Choosing a Brandable .com Domainhegt/he
LinuxSecurity would like to thank NameEstate.com for contributing this article.The importance of an open-source security project name can’t be overstated. A name serves as a first impression. It’s your first chance to tell people who you are and what you do. An impactful name is the best way to convey your value and what you can offer to clients. So, when it comes to open source security projects, finding a name that shows you are capable, trustworthy, and secure can determine your reach and success.
« Previous ( 1 ... 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 ... 7359 ) Next »