Language Selection

English French German Italian Portuguese Spanish


Syndicate content Slashdot: Linux
News for nerds, stuff that matters
Updated: 27 min 32 sec ago

KDE Plasma 5.22 Released

27 min 32 sec ago

SUSE IPO Disappoints

27 min 32 sec ago

Canonical Launches Ubuntu 21.04 'Hirsute Hippo'

Sunday 30th of May 2021 01:58:06 PM

More in Tux Machines

GCC 11 Compiler Performance Benchmarks With Various Optimization Levels, LTO

Given the recent forum discussion stemming from the -O3 optimization level still too unsafe for the Linux kernel (in part due to older, buggy compilers) and some users wondering about the current -O2 versus -O3 compiler optimization level impact, here is a fresh round of reference benchmarks using GCC 11.1 on Fedora Workstation 33 looking at various optimization levels and optimizations tested on dozens of different application benchmarks to see the overall impact on performance. With the recent optimization level discussions and not having done any thorough optimization level comparison tests and link-time optimization (LTO) testing of the recently released GCC 11, here is this Monday article for those interested in compiler optimizations. Read more

today's leftovers

  • the end of freenode

    My first experience with IRC was in 1999. I was in middle school, and a friend of mine ordered a Slackware CD from Walnut Creek CDROM. This was Slackware 3.4, and contained the GNOME 1.x desktop environment on the disc, which came with the BitchX IRC client. At first, I didn’t really know what BitchX was, I just thought it was a cool program that displayed random ascii art, and then tried to connect to various servers. After a while, I found out that an IRC client allowed you to connect to an IRC network, and get help with Slackware. At that time, freenode didn’t exist. The Slackware IRC channel was on DALnet, and I started using DALnet to learn more about Slackware. Like most IRC newbies, it didn’t go so well: I got banned from #slackware in like 5 minutes or something. I pleaded for forgiveness, in the way redolent of a middle schooler. And eventually, I got unbanned and stuck around for a while. That was my first experience with IRC. [...] For a few years, all was well, until the end of July 2002, when DALnet started being the target of Distributed Denial of Service attacks. We would of course, later find out that these attacks were at the request of Jason Michael Downey (Nessun), who had just launched a competing IRC network called Rizon. [...] In early 2006, lilo launched his Spinhome project. Spinhome was a fundraising effort so that lilo could get a mobile home to replace the double-wide trailer he had been living in. Some people saw him trying to fundraise while being the owner of freenode as a conflict of interest, which lead to a falling out with a lot of staffers, projects, etc. OFTC went from being a small network to a much larger network during this time. One side effect of this was that the atheme project got spun out into its own organization:, which continues to exist in some form to this day. The project was founded on the concept of promoting digital autonomy, which is basically the network equivalent of software freedom, and has advocated in various ways to preserve IRC in the context of digital autonomy for years. In retrospect, some of the ways we advocated for digital autonomy were somewhat obnoxious, but as they say, hindsight is always 20/20. [...] Self-hosting is really what makes IRC great: you can run your own server for your community and not be beholden to anyone else. As far as IRC goes, that’s the future I feel motivated to build. This concludes my coverage of the freenode meltdown. I hope people enjoyed it and also understand why freenode was important to me: without lilo‘s decision to take a chance on a dumbfuck kid like myself, I wouldn’t have ever really gotten as deeply involved in FOSS as I have, so to see what has happened has left me heartbroken.

  • A few thoughts on Fuchsia security

    Of course, under the hood, a lot is different. We built a brand new message-passing kernel, new connectivity stacks, component model, file-systems, you name it. And yes, there are a few security things I'm excited about.

  • Claudio Cambra: First week of Google Summer of Code 2021

    A year ago I’d just finished my History degree and I had no idea how to code. This year, I’m taking part in Google Summer of Code! I’m super happy to get the chance to learn more about how KDE software works, and to finally contribute to a project I’ve been using for years. Over the summer, I’ll be working with KDE developers to create productivity-focused components for Plasma Mobile that work with Akonadi, KDE’s personal information management framework. Akonadi is a super useful piece of kit: it allows developers to tap into a user’s synchronised e-mails, contacts, calendars, providing a seamless experience in productivity tools. I’ll be working on this project with my mentor Carl Schwan, who also helped me during my time doing Season of KDE, and Devin Lin.

  • Bas Nieuwenhuizen: Making Reading from VRAM less Catastrophic

    In an earlier article I showed how reading from VRAM with the CPU can be very slow. It however turns out there there are ways to make it less slow. The key to this are instructions with non-temporal hints, in particular VMOVNTDQA. The Intel Instruction Manual says the following about this instruction: “MOVNTDQA loads a double quadword from the source operand (second operand) to the destination operand (first operand) using a non-temporal hint if the memory source is WC (write combining) memory type. For WC memory type, the nontemporal hint may be implemented by loading a temporary internal buffer with the equivalent of an aligned cache line without filling this data to the cache. Any memory-type aliased lines in the cache will be snooped and flushed. Subsequent MOVNTDQA reads to unread portions of the WC cache line will receive data from the temporary internal buffer if data is available. “ (Intel® 64 and IA-32 Architectures Software Developer’s Manual Volume 2) This sounds perfect for our VRAM and WC System Memory buffers as we typically only read 16-bytes per instruction and this allows us to read entire cachelines at time. It turns out that Mesa already implemented a streaming memcpy using these instructions so all we had to do was throw that into our benchmark and write a corresponding memcpy that does non-temporal stores to benchmark writing to these memory regions.

  • Adrift - Alan Pope's blog

    Over the weekend I participated in FOSS Talk Live. Before The Event this would have been an in-person shindig at a pub in London. A bunch of (mostly) UK-based podcasters get together and record live versions of their shows in front of a “studio audience”. It’s mostly an opportunity for a bunch of us middle-aged farts who speak into microphones to get together, have a few beers and chat. Due to The Event, this year it was a virtual affair, done online via YouTube. Joe Ressington typically organised the in-person events, but with a lack of skills in video streaming, Martin Wimpress and Marius Quabeck stepped in to run the show behind-the-scenes.

  • PostgreSQL Weekly News - June 13, 2021
  • PostgreSQL JDBC 42.2.21 Released

    The JDBC project is proud to announce the latest version 42.2.21.

  • Vincent Fourmond: Solution for QSoas quiz #2: averaging several Y values for the same X value

    This post describes two similar solutions to the Quiz #2, using the data files found there. The two solutions described here rely on split-on-values. The first solution is the one that came naturally to me, and is by far the most general and extensible, but the second one is shorter, and doesn't require external script files.

Python Programming

  • How to Send Email Using Python – Linux Hint

    The Simple Mail Transfer Protocol (SMTP) seems to be an e-mail standard for transmitting and directing messages among email systems. The smtplib package in Python creates an SMTP customer conference entity that could be cast off to direct an email to any computer on the Internet that has an SMTP or ESMTP listening service. In this tutorial, we will let you know about the methods to send emails using SMTP in your system. We have been using the Spyder new version to do our email send implementation via python in Ubuntu 20.04. Login from your Ubuntu 20.04 system to start implementing it.

  • Python String Concatenation Examples – Linux Hint

    In computing, string combining is an overall common process. Concatenating strings in Python may be expressed in a variety of ways. This tutorial will look at various methods for concatenating strings inside a Python application. To concatenate strings with a delimiter, we may use the join() method. It is beneficial to have a character sequence, such as a list or perhaps a tuple of characters. Then, use the join() method with an empty string whenever you don’t want a delimiter. Use these methods according to your needs. Whenever concatenation requires any formatting, just use format() as well as f-string functions. It’s worth noting that f-string only works with Python 3.6 and higher. Let’s have a look at each one of them.

  • Python Socket Programming – Linux Hint

    Socket programming is a method of allowing two nodes within a network to interact with one another. One socket (node) reads on a certain port upon an IP address. Whereas, the former one connects with it. The client connects towards a server and the server creates the auditor socket. These are the true foundations of online surfing. To put it simply, there is indeed a server as well as a client. Integrating the socket package and creating a basic socket are the first steps in socket programming. At the time of implementing this article, we have been using Ubuntu 20.04 Linux system. Here are some examples of Python Socket Programming.

  • Analyzing Data in Histogram in Python – Linux Hint

    In Data Visualization, we use graphs and charts to represent data. The visual form of data makes it easy for data scientists and everybody to analyze data and draw the results. The histogram is one of the elegant ways to represent distributed continuous or discrete data. And in this Python tutorial, we will see how we can analyze data in Python using Histogram. So, let’s get started!

Security Leftovers

  • G-7 agrees to fight forced labor, ransomware, corruption [iophk: Windows TCO]

    Group of Seven (G-7) leaders on Sunday announced their commitments to cutting forced labor practices out of global supply chains in a shot at China, as well as efforts to stop ransomware attacks and root out corruption.

    The three priorities will be outlined in a joint communique, to be released at the conclusion of the summit in the United Kingdom and signed by the heads of state of the U.S., the U.K., Canada, Italy, France, Japan and Germany.

  • US, Russia Spar on Cyberattacks Ahead of Biden-Putin Summit [iophk: Windows TCO]

    The United States and Russia sparred Sunday about responsibility for debilitating cyberattacks as U.S. President Joe Biden and Russian President Vladimir Putin prepared for their summit in Geneva on Wednesday.

    U.S. Secretary of State Antony Blinken told ABC’s “This Week” show, “No responsible country should be in the business of harboring in any way criminal organizations engaged in cyberattacks, including ransomware.”

  • VW says data breach at vendor impacted 3.3 million people in North America

    Volkswagen Group of America said on Friday an unauthorized third party obtained limited personal information about customers and interested buyers from a vendor that its Audi Volkswagen brands and some U.S. and Canadian dealers used for digital sales and marketing.