Language Selection

English French German Italian Portuguese Spanish

Programming: GCC, Git and More

Filed under
Development
  • AMD Ryzen Threadripper Compiler Tuning/Optimization Benchmarks With GCC 9, PGO

    For those interested in compiler optimization/tuning with AMD Ryzen Threadripper hardware, here are some follow-up benchmarks to Tuesday's GCC 9 vs. Clang 8 C/C++ Compiler Performance On AMD Threadripper, Intel Core i9. 

    The tests today are of GCC 9 at different tuning/optimization levels for reference purposes. Additionally there is a run when using Profile Guided Optimizations (PGO) for looking at the performance impact on GCC 9.

  • Inbox Zero

    Glyph has already written at length about how a full Inbox is a sign of misprioritized tasks. Saying "no" is one example (in other words, prioritizing away). But when saying "yes", it is a good idea to know when it can be done, when should you give up, and potentially apologize, and when should you give a heads-up that it is being delayed.

    [...]

    I read e-mail "when I get around to it". Usually several times a day. I do have notifications enabled on my phone, so I can easily see if the e-mail is urgent.

  • Signing Git Commits

    Often when people talk about GPG, they focus on encryption—GPG's ability to protect a file or message so that only someone who has the appropriate private key can read it. Yet, one of the most important functions GPG offers is signing. Where encryption protects a file or message so that only the intended recipient can decrypt and read it, GPG signing proves that the message was sent by the sender (whomever has control over the private key used to sign) and has not been altered in any way from what the sender wrote.

    Without GPG signing, you could receive encrypted email that only you could open, but you wouldn't be able to prove that it was from the sender. But, GPG signing has applications far beyond email. If you use a modern Linux distribution, it uses GPG signatures on all of its packages, so you can be sure that any software you install from the distribution hasn't been altered to add malicious code after it was packaged. Some distributions even GPG-sign their ISO install files as a stronger form of MD5sum or SHA256sum to verify not only that the large ISO downloaded correctly (MD5 or SHA256 can do that), but also that the particular ISO you are downloading from some random mirror is the same ISO that the distribution created. A mirror could change the file and generate new MD5sums, and you may not notice, but it couldn't generate valid GPG signatures, as that would require access to the distribution's signing key.

  • Control Anything with Alexa Using Node.JS
  • Random number with a normal distribution between 1 and X
  • Modular Perl in Red Hat Enterprise Linux 8
  • How to Check if String contains Substring in Java
  • Python for NLP: Working with the Gensim Library (Part 2)
  • Inheritance versus composition

    The idea of "inheritance" is something that most students learn about early on when they are studying object-oriented programming (OOP). But one of the seminal books about OOP recommends favoring "composition" over inheritance. Ariel Ortiz came to PyCon in Cleveland, Ohio to describe the composition pattern and to explain the tradeoffs between using it and inheritance.

    Ortiz is a full-time faculty member at Tecnológico de Monterrey, which is a private university in Mexico. He noted that the title of his talk, "The Perils of Inheritance", sounded like "clickbait"; he jokingly suggested that perhaps he should have named it: "4 dangers of inheritance; you won't believe number 3!". That elicited a good laugh, but he said that clickbait was not his intent.

    He has been teaching computer science for more than 30 years, using many languages, including Python. He likes Python and uses it for several courses, including data structures, web development, and compiler construction. He started with Python 2.0 in 2001 or so.

More in Tux Machines

Red Hat: New PHP Builds, End-to-End Encryption for Kubernetes Applications, Interns

  • PHP version 7.2.22RC1 and 7.3.9RC1

    Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests (for x86_64 only), and also as base packages. RPM of PHP version 7.3.9RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 30 or remi-php73-test repository for Fedora 28-29 and Enterprise Linux. RPM of PHP version 7.2.22RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 28-29 or remi-php72-test repository for Enterprise Linux.

  • Self-Serviced, End-to-End Encryption for Kubernetes Applications, Part 2: a Practical Example

    In part one of this series, we saw three approaches to fully automate the provisioning of certificates and create end-to-end encryption. Based on feedback from the community suggesting the post was a bit too theoretical and not immediately actionable, this article will illustrate a practical example. You can see a recording of the demo here.

  • The Tiger that interned at Red Hat

    From the start, Tiger just had the right idea about looking for a college. Instead of reading US World News’ rankings, basing his decisions on sports teams, or even aiming for the Ivy Leagues, Tiger set out to make his college search a data driven effort. He asked himself, first, where he wanted to work. For him, that was an almost typical answer for an aspiring young technology student: Google, Facebook, Red Hat and other big name tech firms. [...] Tiger's real name is Passawit Kaovilai, and he's now entering his third year at NC State. He said that many people in his native Thailand have nicknames, and that his translates well into any language, and is understood immediately. He was also born in the year of the tiger, so the name is a natural fit. Here at Red Hat, Tiger has taken on the duties of a technical marketing intern. That means he's been diving into Red Hat OpenShift 4 to help create documentation and learning tools for users in the field. That also means contributing to open source projects, and getting his handle out there on GitHub, however modestly.

Latest KDE Security Vulnerabilities Are Patched in Ubuntu and Debian, Update Now

A couple of weeks ago, the KDE community fixed a security vulnerability discovered by Dominik Penner in the KConfig component, the configuration settings framework of the KDE Plasma desktop environment, which could allow an attacker to execute malicious code through a specially crafted .desktop file included in an archive that was opened in the file manager. "Dominik Penner discovered that KConfig supported a feature to define shell command execution in .desktop files. If a user is provided with a malformed .desktop file (e.g. if it's embedded into a downloaded archive and it gets opened in a file browser) arbitrary commands could get executed. This update removes this feature," reads the Debian security advisory. Read more

Google brings Linux app support to some older Chromebooks (including Chromebook Pixel 2015)

Chrome OS started out as a browser-based operating system that could run web apps only. Eventually Google added support for Android apps, and then for Linux apps, making Chromebooks more useful as general-purpose laptops. But while most new Chromebooks feature out-of-the-box support for Android and Linux apps, many older models do not… and it looked like they never would. It turns out that may not be true after all: 9to5Google reports that Google seems to be testing an update that would bring Linux app support to the 2015 Chromebook Pixel, along with a number of other models released that year. Read more

Devices With Linux