Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 ... 7359 ) Next »
How To Verify NTP Setup (Sync) is Working or Not In Linux?
2DayGeek: Learn, whether the NTP setup is working or not in Linux using following three commands?
Netcat Command with Examples
Netcat (or nc) is a command-line utility that reads and writes data across network connections, using the TCP or UDP protocols. It is one of the most powerful tools in the network and system administrators arsenal and it as considered as a Swiss army knife of networking tools.
How to Verify Authenticity of Linux Software with Digital Signatures
Downloading online software always come with a risk. Learn how you can verify the authenticity of Linux software by checking their digital signatures.
Apparent Staffing Problems at the Linux Foundation
There are signs that something has changed inside the Linux Foundation, whose chief and main site have not said a thing since April 25th while advertising ‘Microsoft positions’ inside the Foundation
Aging in the open: How this community changed us
A community will always surprise you.
That's not an easy statement for someone like me to digest. I'm not one for surprises. I revel in predictability. I thrive on consistency.
read more
i.MX8M Mini based module features Grylfalcon neural accelerator
SolidRun’s “i.MX 8M Mini SOM” runs Linux on NXP’s up to quad-core, 1.8GHz -A53 i.MX8M Mini and works with the HummingBoard Pulse board. The module has 4GB RAM, optional WiFi/BT, and a 24 TOPS/W Gyrfalcon Lightspeeur 2803S NPU. SolidRun announced an i.MX8M Mini based compute module aimed at “a wide range of IoT and industrial […]
The "From Mac to Linux" Issue
What you are reading right now is a Linux magazine—with a focus on Apple computers running macOS. (Or MacOS. Or however Apple is doing the capitalization nowadays.) I know, it's weird. It's extremely weird—like cats and dogs living together weird.
Playing the Victim -- Show the World That Too Much Freedom Hurts Development
What the Halloween documents teach us about Microsoft’s mindset and strategy
The Linux desktops last, best shot
With Microsoft cutting off support for Windows 7, the Linux desktop may finally get its day in the sun. But are Linux companies ready to take advantage of their opportunity?
Monitoring Disk I/O on Linux with the Node Exporter
Monitoring disk I/O on a Linux system is crucial for every system administrator. In this tutorial, we are going to build another dashboard that monitors the disk I/O usage on our Linux system, as well as filesystems and even inodes usage.
not the only way to do it on a Linux system.
System76 Launching Reborn Gazelle Laptops, Red Hat Has Joined the Business Coalition for the Equality Act, Fedora Accepting Submissions for Fedora 31 Supplemental Wallpapers, Linux 5.2-rc3 Is Out and
News briefs for June 3, 2019.
How To Free Up Space In The /boot Partition On Ubuntu, Debian, Or Linux Mint
This article explains how to free up space in the /boot partition on Ubuntu, Debian, Linux Mint, Pop!_OS, elementary OS, and other Debian or Ubuntu based Linux distributions.
A Beginners Guide To Cron Jobs
Basic usage of Cron Jobs with practical examples.
How to Install FreeIPA Client on Ubuntu Server 18.04
FreeIPA is a free and open source Identity, Policy, and Audit (IPA) suite sponsored by RedHat. It's an IPA solution combination of Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS Bind, Dogtag, Apache web server, and Python.
How to configure networking with Netplan on Ubuntu
In this article, we will learn how to configure networking in Ubuntu using Netplan. We will see both static and dynamic IP configuration.
Using the Hash Command to Manipulate the Bash Command Hash Table
The bash shell keeps a hash table for all the commands run in your current shell. It uses this table to quickly look up the full path of an executable without searching PATH. In this article we will discuss how to manipulate this table using the bash builtin hash command.
Popular Linux Distributions for Security Testing
Linux is the go-to choice for security testing dues to the advantages it offers. In this article, we will show you some special purpose Linux distributions for performing security-related tasks.
Microsoft’s Handbook: Work With the System, Use OEMs and Your Legal Team
Microsoft’s tactics against GNU/Linux have not changed much in two decades, they’re just framed differently
How to set up virtual environments for Python on MacOS
If you're a Python developer and a MacOS user, one of your first tasks upon getting a new computer is to set up your Python development environment. Here is the best way to do it (although we have written about other ways to manage Python environments on MacOS).
Submissions now open for the Fedora 31 supplemental wallpapers
Have you always wanted to start contributing to Fedora but don’t know how? Submitting a supplemental wallpaper is one of the easiest ways to start as a Fedora contributor. Keep reading to learn how. Each release, the Fedora Design team works with the community on a set of 16 additional wallpapers. Users can install and […]
« Previous ( 1 ... 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 ... 7359 ) Next »
