Language Selection

English French German Italian Portuguese Spanish

December 2018

5 Best Android Emulators for Linux

Filed under
OS
Android
Linux

The emulator is software on a computer system that behaves like another computer system. When I am talking about Android Emulators for Linux, it means a program for Linux that runs like the Android environment. It is used by developers and testers to test their apps for Android using the Linux system. You can run Android apps and games on your Linux system. Emulators are also used by gamers to run Android games on their system. I have already listed best Android Emulators for PC but that basically included Android Emulators for Windows and Mac. So, I decided to make a dedicated list of Android Emulators for Linux.

Read more

Puppy Linux Tahr 6.0.5 review: Tahrpup 6.0.5 Features and Advantages

Filed under
Reviews

By now you have got the point that instead of the small size Puppy Linux provides lots of tools for customizing the desktop. Options including the wallpaper changer, theme changer, theme maker, icon changer, etc. there are many more to explore.

Read more

From Nexus to Android One: a brief history of purist Android phones

Filed under
Android

Android has been around for so long, and in so many forms, that the open-source operating system has evolved on multiple fronts thanks to the frantic competition among the many vendors using the platform.

For all the bells and whistles of Samsung, LG and HTC, there’s always been a market for something a little purer – a 'stock' OS that strips away all the third-party bloat for an experience that’s as close to Google’s vision of Android as it’s possible to get.

From the evolution of Google's Nexus smartphone range (and their successors, the improving Google Pixel phones) to the simultaneous innovation of Android One, pure Android devices have carved out more than one niche for themselves. It’s been quite the journey, and the story isn’t over yet...

Read more

Programming: Learning and Python

Filed under
Development

KDE: Akademy, BSD, Krita and Lays Rodrigues

Filed under
KDE
  • Me, at Akademy 2018 - Winds of Change - FOSS in India Recap (late post

    Akademy is an annual conference organized by the KDE Community. It’s the place where contributors of all kinds from past and present meet, showcase their work and discuss things that shape the future of the KDE Software. This year's Akademy was held in the TU Wien, in the beautiful and historic city of Vienna, Austria.

    First of all, I'd like to apologize for being late on this post as just after reaching home, I had a minor motorcycle accident, and which was followed shortly by prolonged illness.

    I've been a KDE guy since the beginning of my technology career as an open source evangelist, entrepreneur, and developer. This year, I got the opportunity to showcase my work in front of the great people I've always admired.

    [...]

    The current state of India in regards to Free and Open Source Software is somewhat optimistic, with more and more states of India bringing in IT policies which gives priority to free and open source solutions.

  • Modern KDE on FreeBSD

    New stuff in the official FreeBSD repositories! The X11 team has landed a newer version of libinput, opening up the way for KDE Plasma 5.14 in ports. That’s a pretty big update and it may frighten people with a new wallpaper.

    What this means is that the graphical stack is once again on-par with what Plasma upstream expects, and we can get back to chasing releases as soon as they happen, rather than gnashing our teeth at missing dependencies. The KDE-FreeBSD CI servers are in the process of being upgraded to 12-STABLE, and we’re integrating with the new experimental CI systems as well. This means we are chasing sensibly-modern systems (13-CURRENT is out of scope).

  • KDE4 on FreeBSD, post-mortem

    The KDE-FreeBSD team has spent the past month or more, along with FreeBSD ports committers and maintainers who have other KDE4-related ports, in bringing things up-to-date with recent KDE-Frameworks-based releases, with hunting down alternatives, and with making the tough call that some things are just going away. Thanks to Rene for doing the portmgr commits to clean it up (r488762, r488763, r488764 and followups to remove KDE4-options from other ports) .

  • Interview with Phoenix

    What I love about Krita is that it doesn’t take up that much RAM compared to other softwares I have used. It makes it really easy to record speedpaints for YouTube.

  • [Krita] Statistics Are Fun!

    Collectively we removed 648,887 lines of code and added 996,142 lines of code. Of course… Lines of code and numbers of commits doesn’t say a whole lot. But we’ve currently got 580,268 lines of C++, 12,054 lines of Python code out of a total of 607,193 lines of code. There are 30 libraries, 151 plugins, 243 automated tests (of which 5 are failing).

  • New home page =D

    Using Vuetify framework, that is built above Vue.Js I was able to build a new landing page with information about me and the stuff that I do. On that page you will be able to find my projects, presentations and contact information. I’ve also added a page of Tips & Tricks with content that I think that has value.

Screenshots/Screencasts: Peppermint OS, Chakra Linux and AcademiX

Filed under
GNU
Linux

OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation

Filed under
Linux
Security

It's been nearly one year to the day since the Spectre and Meltdown vulnerabilities were made public. While the security vulnerabilities were quickly buttoned up in the Linux space, kernel developers continue working to offset the performance overhead introduced by these mitigations. They made a lot of overhead reductions in 2018 while still there are some patch-sets pending still for bettering the experience. One of these patch-sets was known as "Relpolines" but now has been updated and morphed into what is being called Optpolines.

Relpolines were announced a few months ago by a VMware developer as having lower overhead than Retpolines -- the return trampolines introduced as part of the Spectre mitigations back in January. The dynamic indirect call promotion work by VMware has been working on pairing relative calls and trampolines to reduce the overall Retpoline overhead. VMware found with their original patches it could deliver a 10% performance improvement to the Nginx web server, +4% for Redis, and other minor performance improvements -- well, recovering previously lost performance.

Read more

Also: The Linux Kernel In 2018 Summed Up: Spectre/Meltdown, CoC, Speck Fears, New Features

Open-Source / Linux Letdowns For 2018

Filed under
OSS

While 2018 was a grand year for open-source and Linux as we've been recapping all of the highlights in recent days on Phoronix, it wasn't without some shortcomings or areas that have yet to pan out... As we end 2018, for some interesting New Year's Eve discussions in the forums, here is a look at some of the biggest Linux/open-source letdowns of the year.

Here are what I personally consider to be some of the biggest letdowns of the year. Feel free to chime in with your own open-source letdowns in the forums.

Read more

What Is Ubuntu? The Past and Present of the Ubuntu Linux Distro

Filed under
Ubuntu

Ubuntu is the most popular Linux distribution in the world. It may (or may not) be the best, but it is definitely the most popular. The distribution, or packaged “brand” of Linux, is developed by Canonical Ltd. for use on desktops, servers, and many other applications.

Ubuntu is also the most popular operating system in the cloud. It’s the operating system Google built its Android development tools around. Ubuntu was the first Linux distribution supported by Valve for Steam. When most people think of Linux, they’re probably thinking about Ubuntu.

Read more

More in Tux Machines

Programming/Development: C++, Go, Mozilla/Firefox and Python

  • Deliverable 1 : [✓]
    Seems okay, far better than the initial results. Although I should say, I deviated from what I thought I would need to write. First I assumed that I don’t have to write another boost::graph wrapper for KisPaintDevice, but I had to. That was one heck of an experience. In one of the last few posts, I ranted on Dmitry’s interpretation of the Graph, turns out we were on the same page but I understood his explanation the wrong way. I should put more attention to details from now on I guess. All the pixels are connected to each other, but they only have an edge between them if they are adjacent. If in center, the out degree would be 8, if in corners, 3 and if in edges, 5. There are some other cases too, but I will leave them for the moment. While writing the wrapper, I also got to know some of the cool features and techniques of C++, which I will be writing posts on as soon as I get some time, concepts, traits, avoiding virtual functions and what not. It is commendable that how boost approaches boost::astar_search, there is not a single virtual function, you don’t have to inherit anything (you can though for safety), just templates and traits, you are done.
  • Go Creeping In
    I’ve seen the inside of the Google and Amazon tech stacks. There are common threads that run through them and also, I bet, through most BigTechCos. Here and there down the stack is a lot of C++ and vestigial remnants from earlier days, Perl or PHP or whatever. Out in front of humans, of course, JS. But in between, there are oceans and oceans of Java; to a remarkable degree, it runs the Internet. Except for, here and there, you find a small but steadily increasing proportion of Go.
  • Stand by for FPR14 SPR1 chemspill
    Mozilla has shipped a fix for MFSA2019-18 in Firefox 67.0.3 and 60.7.1. This exploit has been detected in the wild, and while my analysis indicates it would require a PowerPC-specific attack to be exploitable in official TenFourFox builds (the Intel versions may be directly exploited, however), it could probably cause drive-by crashes and we should therefore ship an urgent fix as well. The chemspill is currently undergoing confidence tests and I'm shooting to release builds before the weekend. For builders, the only change in FPR14 SPR1 is the patch for bug 1544386, which I will be pushing to the repo just as soon as I have confirmed the fix causes no regressions.
  • PyPI Now Supports Two-Factor Login via WebAuthn
  • Understanding Python assignment
  • How to Publish Your Own Python Package to PyPI
  • PyCoder’s Weekly: Issue #373 (June 18, 2019)
  • EuroPython 2019: Community Discounts
  • EuroPython 2019: Inviting European Python Conference Organizers

today's howtos

All Linux, all the time: Supercomputers Top 500

Starting at the top, two IBM-built supercomputers, Summit and Sierra, at the Department of Energy's Oak Ridge National Laboratory (ORNL) in Tennessee and Lawrence Livermore National Laboratory in California, respectively to the bottom -- a Lenovo Xeon-powered box in China -- all of them run Linux. Linux supports more hardware architectures than any other operating system. In supercomputers, it supports both clusters, such as Summit and Sierra, the most common architecture, and Massively Parallel Processing (MPP), which is used by the number three computer Sunway TaihuLight. When it comes to high-performance computing (HPC), Intel dominates the TOP500 by providing processing power to 95.6% of all systems included on the list. That said, IBM's POWER powers the fastest supercomputers. One supercomputer works its high-speed magic with Arm processors: Sandia Labs' Astra, an HPE design, which uses over 130-thousand Cavium ThunderX2 cores. And, what do all these processors run? Linux, of course. . 133 systems of the Top 500 supercomputers are using either accelerator or co-processor setups. Of these most are using Nvidia GPUs. And, once more, it's Linux conducting the hardware in a symphony of speed. Read more

Red Hat and SUSE Leftovers

  • Are DevOps certifications valuable? 10 pros and cons
  • Kubernetes 1.15: Enabling the Workloads
    The last mile for any enterprise IT system is the application. In order to enable those applications to function properly, an entire ecosystem of services, APIs, databases and edge servers must exist. As Carl Sagan once said, “If you wish to make an apple pie from scratch, you must first invent the universe.” To create that IT universe, however, we must have control over its elements. In the Kubernetes universe, the individual solar systems and planets are now Operators, and the fundamental laws of that universe have solidified to the point where civilizations can grow and take root. Discarding the metaphor, we can see this in the introduction of Object Count Quota Support For Custom Resources. In English, this enables administrators to count and limit the number of Kubernetes resources across the broader ecosystem in a given cluster. This means services like Knative, Istio, and even Operators like the CrunchyData PostgreSQL Operator, the MongoDB Operator or the Redis Operator can be controlled via quota using the same mechanisms that standard Kubernetes resources have enjoyed for many releases. That’s great for developers, who can now be limited by certain expectations. It would not benefit the cluster for a bad bit of code to create 30 new PostgreSQL clusters because someone forgot to add a “;” at the end of a line. Call them “guardrails” that protect against unbounded object growth in your etcd database.
  • Red Hat named HPE’s Partner of the Year at HPE Discover 2019
    For more than 19 years, Red Hat has collaborated with HPE to develop, deliver and support trusted solutions that can create value and fuel transformation for customers. Our work together has grown over these nearly two decades and our solutions now include Linux, containers and telecommunications technologies, to name just a few. As a testament to our collaboration, HPE has named Red Hat the Technology Partner of the Year 2019 for Hybrid Cloud Solutions.
  • Demystifying Containers – Part II: Container Runtimes
    This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples paired with the historic background will guide you from the beginning with a minimal Linux environment up to crafting secure containers, which fit perfectly into todays’ and futures’ orchestration world. In the end it should be much easier to understand how features within the Linux kernel, container tools, runtimes, software defined networks and orchestration software like Kubernetes are designed and how they work under the hood.
  • Edge > Core > Cloud: Transform the Way You Want
    For more than 25 years, SUSE has been very successful in delivering enterprise-grade Linux to our customers. And as IT infrastructure has shifted and evolved, so have we. For instance, we enabled and supported the move to software-defined data centers as virtualization and containerization technologies became more prevalent and data growth demanded a new approach.
  • SUSE OpenStack Cloud Technology Preview Takes Flight
    We are pleased to announce that as of today we are making a technology preview of a containerized version of SUSE OpenStack Cloud available that will demonstrate a future direction for our product. The lifecycle management for this technology preview is based on an upstream OpenStack project called Airship, which SUSE has been using and contributing to for some time. This follows our open / open policy of upstream first and community involvement.