Language Selection

English French German Italian Portuguese Spanish

OpenSource.com

Syndicate content
Updated: 2 hours 53 min ago

How to use MapTool to build an interactive dungeon RPG

15 hours 50 min ago

In my previous article on MapTool, I explained how to download, install, and configure your own private, open source virtual tabletop so you and your friends can play a role-playing game (RPG) together. MapTool is a complex application with lots of features, and this article demonstrates how a game master (GM) can make the most of it.


read more

A beginner's guide to Linux permissions

15 hours 51 min ago

One of the main benefits of Linux systems is that they are known to be less prone to security vulnerabilities and exploits than other systems. Linux definitely gives users more flexibility and granular controls over its file systems' security permissions. This may imply that it's critical for Linux users to understand security permissions. That isn't necessarily true, but it's still wise for beginning users to understand the basics of Linux permissions. 


read more

Why your workplace arguments aren't as effective as you'd like

15 hours 52 min ago

Transparent, frank, and often contentious arguments are part of life in an open organization. But how can we be sure those conversations are productive—not destructive?


read more

5 transferable higher-education skills

Monday 17th of June 2019 07:49:00 AM

My transition from a higher-education professional into the tech realm was comparable to moving from a pond into an ocean. There was so much to learn, and after learning, there was still so much more to learn!

Rather than going down the rabbit hole and being overwhelmed by what I did not know, in the last two to three months, I have been able to take comfort in the realization that I was not entirely out of my element as a developer. The skills I acquired during my six years as a university professional gave me the foundation to be successful in the developer role.


read more

Use ImageGlass to quickly view JPG images as a slideshow

Monday 17th of June 2019 07:48:00 AM

Welcome to today’s episode of "How Can I Make This Work?" In my case, I was trying to view a folder of JPG images as a slideshow on Windows 10. As often happens, I turned to open source to solve the issue.


read more

What's your favorite "dead" language?

Monday 17th of June 2019 07:00:00 AM

We recently asked our writers this question: what's your favorite "dead" language? Some of the responses were not at all what we were expecting. For starters, perhaps we should have specified that we were asking about programming languages.

"Latin." —Chris Short

"Middle English. Pre-Chaucer, really (which feels a little modern). Something like Malory's 'Le Morte D'Arthur' is about right." —Mike Bursell


read more

What is a Java constructor?

Friday 14th of June 2019 07:51:00 AM

Java is (disputably) the undisputed heavyweight in open source, cross-platform programming. While there are many great cross-platform frameworks, few are as unified and direct as Java.


read more

Learning by teaching, and speaking, in open source

Friday 14th of June 2019 07:35:00 AM

"Everything good, everything magical happens between the months of June and August."

When Jenny Han wrote these words, I doubt she had the open source community in mind. Yet, for our group of dispersed nomads, the summer brings a wave of conferences that allow us to connect in person.


read more

A data-centric approach to patching systems with Ansible

Friday 14th of June 2019 07:35:00 AM

When you're patching Linux machines these days, I could forgive you for asking, "How hard can it be?" Sure, a yum update -y will sort it for you in a flash.


read more

Open hardware for musicians and music lovers: Headphone, amps, and more

Thursday 13th of June 2019 07:02:00 AM

The world is full of great open source music players, but why stop at using open source just to play music? You can also use open source hardware to make music. All of the instruments described in this article are certified by the Open Source Hardware Association (OSHWA). That means you are free to build upon them, remix them, or do anything else with them.


read more

IPython is still the heart of Jupyter Notebooks for Python developers

Thursday 13th of June 2019 07:01:00 AM

I recently wrote about how I find Jupyter projects, especially JupyterLab, to be a magical Python development experience. In researching how the various projects are related to each other, I recapped how Jupyter began as a fork from IPython. As Project Jupyter's The Big Split™ announcement explained:


read more

Continuous integration testing for the Linux kernel

Thursday 13th of June 2019 07:00:00 AM

With 14,000 changesets per release from over 1,700 different developers, it's clear that the Linux kernel moves quickly, and brings plenty of complexity. Kernel bugs range from small annoyances to larger problems, such as system crashes and data loss.


read more

Why use GraphQL?

Wednesday 12th of June 2019 07:08:00 AM

GraphQL, as I wrote previously, is a next-generation API technology that is transforming both how client applications communicate with backend systems and how backend systems are designed.


read more

The bits and bytes of PKI

Wednesday 12th of June 2019 07:03:00 AM

In two previous articles—An introduction to cryptography and public key infrastructure and How do private keys work in PKI and cryptography?—I discussed cryptography and public key infrastructure (PKI) in a general way. I talked about how digital bundles called certificates store public keys and identifying information.


read more

How to write a loop in Bash

Wednesday 12th of June 2019 07:00:00 AM

A common reason people want to learn the Unix shell is to unlock the power of batch processing. If you want to perform some set of actions on many files, one of the ways to do that is by constructing a command that iterates over those files. In programming terminology, this is called execution control, and one of the most common examples of it is the for loop.

A for loop is a recipe detailing what actions you want your computer to take for each data object (such as a file) you specify.


read more

What is a Linux user?

Tuesday 11th of June 2019 07:02:00 AM

Editor's note: this article was updated on Jun 11, 2019, at 1:15:19 PM to more accurately reflect the author's perspective on an open and inclusive community of practice in the Linux community.


read more

How to find your Jenkins admin password on Kubernetes

Tuesday 11th of June 2019 07:01:00 AM

The tooling to make Kubernetes easier to navigate is so good at times, I get surprised when I can't find a simple way to get an answer. As someone who doesn't use Kubernetes day-to-day, any intermediate level of troubleshooting turns into an afternoon of first, questioning my sanity and second, considering a job as a shepherd or something else that's away from the keyboard.


read more

Teaching algorithmic ethics requires an open approach

Tuesday 11th of June 2019 07:00:00 AM

Artificial intelligence (AI) tools and other algorithmic systems are increasingly impacting social, political, and economic structures around us. Simultaneously, and as part of this impact, these systems are increasingly used to inform—or directly make—decisions for policymakers and other institutional leaders.


read more

Why containers and Kubernetes have the potential to run almost anything

Monday 10th of June 2019 03:00:00 PM

In my first article, Kubernetes is a dump truck: Here's why, I talked about about how Kubernetes is elegant at defining, sharing, and running applications, similar to how dump trucks are elegant at moving dirt.


read more

Try a new game on Free RPG Day

Monday 10th of June 2019 07:02:00 AM

Have you ever thought about trying Dungeons & Dragons but didn't know how to start? Did you play Traveller in your youth and have been thinking about returning to the hobby? Are you curious about role-playing games (RPGs) but not sure whether you want to play one? Are you completely new to the concept of tabletop gaming and have never heard of RPGs until now? It doesn't matter which of these profiles suits you, because Free RPG Day is for everyone!


read more

More in Tux Machines

today's howtos

All Linux, all the time: Supercomputers Top 500

Starting at the top, two IBM-built supercomputers, Summit and Sierra, at the Department of Energy's Oak Ridge National Laboratory (ORNL) in Tennessee and Lawrence Livermore National Laboratory in California, respectively to the bottom -- a Lenovo Xeon-powered box in China -- all of them run Linux. Linux supports more hardware architectures than any other operating system. In supercomputers, it supports both clusters, such as Summit and Sierra, the most common architecture, and Massively Parallel Processing (MPP), which is used by the number three computer Sunway TaihuLight. When it comes to high-performance computing (HPC), Intel dominates the TOP500 by providing processing power to 95.6% of all systems included on the list. That said, IBM's POWER powers the fastest supercomputers. One supercomputer works its high-speed magic with Arm processors: Sandia Labs' Astra, an HPE design, which uses over 130-thousand Cavium ThunderX2 cores. And, what do all these processors run? Linux, of course. . 133 systems of the Top 500 supercomputers are using either accelerator or co-processor setups. Of these most are using Nvidia GPUs. And, once more, it's Linux conducting the hardware in a symphony of speed. Read more

Red Hat and SUSE Leftovers

  • Are DevOps certifications valuable? 10 pros and cons
  • Kubernetes 1.15: Enabling the Workloads
    The last mile for any enterprise IT system is the application. In order to enable those applications to function properly, an entire ecosystem of services, APIs, databases and edge servers must exist. As Carl Sagan once said, “If you wish to make an apple pie from scratch, you must first invent the universe.” To create that IT universe, however, we must have control over its elements. In the Kubernetes universe, the individual solar systems and planets are now Operators, and the fundamental laws of that universe have solidified to the point where civilizations can grow and take root. Discarding the metaphor, we can see this in the introduction of Object Count Quota Support For Custom Resources. In English, this enables administrators to count and limit the number of Kubernetes resources across the broader ecosystem in a given cluster. This means services like Knative, Istio, and even Operators like the CrunchyData PostgreSQL Operator, the MongoDB Operator or the Redis Operator can be controlled via quota using the same mechanisms that standard Kubernetes resources have enjoyed for many releases. That’s great for developers, who can now be limited by certain expectations. It would not benefit the cluster for a bad bit of code to create 30 new PostgreSQL clusters because someone forgot to add a “;” at the end of a line. Call them “guardrails” that protect against unbounded object growth in your etcd database.
  • Red Hat named HPE’s Partner of the Year at HPE Discover 2019
    For more than 19 years, Red Hat has collaborated with HPE to develop, deliver and support trusted solutions that can create value and fuel transformation for customers. Our work together has grown over these nearly two decades and our solutions now include Linux, containers and telecommunications technologies, to name just a few. As a testament to our collaboration, HPE has named Red Hat the Technology Partner of the Year 2019 for Hybrid Cloud Solutions.
  • Demystifying Containers – Part II: Container Runtimes
    This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples paired with the historic background will guide you from the beginning with a minimal Linux environment up to crafting secure containers, which fit perfectly into todays’ and futures’ orchestration world. In the end it should be much easier to understand how features within the Linux kernel, container tools, runtimes, software defined networks and orchestration software like Kubernetes are designed and how they work under the hood.
  • Edge > Core > Cloud: Transform the Way You Want
    For more than 25 years, SUSE has been very successful in delivering enterprise-grade Linux to our customers. And as IT infrastructure has shifted and evolved, so have we. For instance, we enabled and supported the move to software-defined data centers as virtualization and containerization technologies became more prevalent and data growth demanded a new approach.
  • SUSE OpenStack Cloud Technology Preview Takes Flight
    We are pleased to announce that as of today we are making a technology preview of a containerized version of SUSE OpenStack Cloud available that will demonstrate a future direction for our product. The lifecycle management for this technology preview is based on an upstream OpenStack project called Airship, which SUSE has been using and contributing to for some time. This follows our open / open policy of upstream first and community involvement.

NSA Back Doors in Windows Causing Chaos While Media is Obsessing Over DoS Linux Bug

  • U.S. Government Announces Critical Warning For Microsoft Windows Users
    The United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has gone public with a warning to Microsoft Windows users regarding a critical security vulnerability. By issuing the "update now" warning, CISA has joined the likes of Microsoft itself and the National Security Agency (NSA) in warning Windows users of the danger from the BlueKeep vulnerability. This latest warning, and many would argue the one with most gravitas, comes hot on the heels of Yaniv Balmas, the global head of cyber research at security vendor Check Point, telling me in an interview for SC Magazine UK that "it's now a race against the clock by cyber criminals which makes this vulnerability a ticking cyber bomb." Balmas also predicted that it will only be "a matter of weeks" before attackers started exploiting BlueKeep. The CISA alert appears to confirm this, stating that it has, "coordinated with external stakeholders and determined that Windows 2000 is vulnerable to BlueKeep." That it can confirm a remote code execution on Windows 2000 might not sound too frightening, this is an old operating system after all, it would be unwise to classify this as an exercise in fear, uncertainty and doubt. Until now, the exploits that have been developed, at least those seen in operation, did nothing more than crash the computer. Achieving remote code execution brings the specter of the BlueKeep worm into view as it brings control of infected machines to the attacker.
  • Netflix uncovers SACK Panic vuln that can bork Linux-based systems