Language Selection

English French German Italian Portuguese Spanish

IBM, Red Hat, and AlmaLinux

Filed under
Red Hat
  • Kube by Example expands training curriculum with new learning paths for Kubernetes developers

    We see Kubernetes as the foundation for hybrid cloud, and hybrid cloud as the future of IT. The technology remains among both the most loved and most wanted tools in this year’s Stack Overflow Developer survey. Given its prevalence and strategic importance, we have also seen developers seeking out and engaging with Kubernetes-focused training resources like Kube by Example, an online destination for free Kubernetes-focused tutorials, news and community interaction.

    As the company behind the industry’s leading enterprise Kubernetes platform, Red Hat has backed Kube by Example and is diligently working to establish it as the premier destination for developers and operators to sharpen their Kubernetes skills in a hands-on environment.

  • Celebrating Ada Lovelace with 4 career lessons from women in technology

    Ada Lovelace is known as the first computer programmer. Mainly known for her work with Charles Babbage’s Analytical Engine in the 1800s, she was the first to recognize that the machine could do more than simple calculation — that it could follow a set of instructions (a program) to perform tasks. While Babbage’s computer was never built, Lovelace is credited with writing up an algorithm to be carried out by such a machine. Now, every year in mid-October, we celebrate women tech pioneers on Ada Lovelace Day.

  • Igor Seletskiy Steps Down to Assure AlmaLinux Independence - FOSS Force

    Today Igor Seletskiy, co-founder and CEO of CloudLinux, announced that he’s stepped down from his role as chairman of the board at the AlmaLinux Foundation, and is also vacating his seat on the board of directors.

    The foundation, which he started earlier this year, produces AlmaLinux, a drop-in replacement for Red Hat’s CentOS Linux that Seletskiy announced in December, shortly after Red Hat said it was moving the Linux distribution from its traditional role as a downstream clone of Red Hat Enterprise Linux to sit upstream as RHEL’s “nightly build.”

    A replacement was needed because many organizations, including many Fortune 500 enterprises, use CentOS in production as a way to take advantage of RHEL’s stability without having to pay for support contracts.

    Both Seletskiy and the AlmaLinux Foundation are very clear there’s no palace intrigue behind this move. The new distro’s founder is stepping down not because of some power struggle within the organization, but because he wants the distro he birthed to have a life of its own as an independent project.

  • Why can't I use sudo with rootless Podman?

    I was recently asked: Why can't I run rootless Podman containers when I log into a user via sudo or su? The problem is a bit complex to explain, so I'll start with an example.

  • Digital transformation: 3 myths the pandemic busted

    When the pandemic struck, most organizations had no choice but to accelerate their digital technology adoption. Many condensed into a matter of months what might otherwise have been years of consideration, strategizing, and change.

    According to a survey by McKinsey, the pandemic sparked a seven-year increase in the rate at which companies developed digital or digitally enhanced offerings. It accelerated the digitization of their customer and supply-chain interactions and internal operations by three to four years.

    This shift sparked a new reality for today’s organizations to remain competitive and meet customers’ changing needs. But while enterprises have certainly dedicated more resources to the process of digital transformation, many misconceptions still remain.

More on AlmaLinux

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Programming Leftovers

  • p6steve: raku at Monterey Docks (part II)
  • Convert a String to JSON Python

    In Python, strings are a series of elements or items. The strings are unchangeable objects. We cannot change the string after their declaration. “JavaScript Object Notation” is the full form of JSON. In Python, the ‘JSON files contain information that is readable for humans. The elements appear in the form of pairs. In web APIs, the information we send and receive is usually in the form of a dictionary string. To utilize this information, we extract consequential data. For this, we have to convert this information to dictionary format for more operations. JSON provides several techniques for serializing and deserializing “JSON”. The process of changing the string to “JSON” is called serializing. And the process of converting the JSON to a string is known as deserializing. Serialization is the opposite of deserialization. Several methods are used to convert strings to JSON.

  • How Do You Repeat a String n Times in Python?

    In Python, we utilize the asterisk operator to repeat a string. This operator is indicated by a “*” sign. This operator iterates the string n (number) of times. The “n” is an integer value. After repetition, a new string is created. The operation requires two arguments: a string and an integer value. We multiplied the string by a specific number for the repetition of string n times. Repeating the string merges the copy into an identical string. The asterisk operator repeats the string up to a definite length.

  • How Do I Check If a String Is Empty in Python?

    The strings are unchangeable. We cannot modify the string after defining it. Different operations are performed on strings. If we have a string that contains only whitespaces in it, that string is not considered empty. It contains the size of the non-zero value. So, if len() method and “not” operator is applied on this type of string, it considers whitespace as an element of the string. Sometimes in Python, we want to check whether the specified string is blank or not. To check the emptiness of the given string, use the “not” operator to utilize the variable of string instead of a condition, or utilize the equal operator to match an empty string. Now, we are going to explain numerous methods...

  • Static Method C++

    A method in C++ is also known as a function, and using methods in C++ promotes the concept of modular programming and code reusability. It means the methods that are once written can be called repetitively for as many times as needed without having the necessity of writing them every time.

  • C++ Unsigned Integers

    The integer data type in C++ is further divided into many sub-types. One such sub-type is the unsigned integers. The unsigned integers are capable of storing only the positive whole numbers. The unsigned integers in C++ are preferred while manipulating bits in operating systems since you have limited storage space. Moreover, they can also be used for array indexing since the index of an array can never be negative. This article is devoted to the discussion of the unsigned integers in C++ in Ubuntu 20.04.

  • C++ Getline function

    Getline() is used to get the input string from the user in one or more lines until a special character comes (delimiter). It is a predefined function and uses a library in the program, as its definition is present inside the library’s header file.

  • C++ Pointer Arithmetic

    Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). How an exponent can be used for raising a number to a certain power in C++ is discussed in this article.

  • Exponents in C++ to Raise a Number in Power

    Within mathematics, we have always used the term raise to the power for calculating a number having some power exponent on it. This can be said as (base number) raise to the power (exponent). So, within today’s article, we will see how an exponent can be used for raising a number to a certain power in C++. Make sure to have a G++ compiler already installed and configured on your Linux operating system. Let’s start implementing today’s article by opening the shell terminal using the shortcut “Ctrl+Alt+T”. As the terminal is opened now, we can start implementing our examples.

  • Bit masking in C++

    Bit masking is a process that is used to access a specific bit in the bytes of data. This phenomenon is used when you are performing the process of iteration. A bitmask is said to be a mask of a sequence of N –bits that are used to encode a part of our collection. These elements of the mask can be set or cannot be. There are bitwise operators to create or toggle the bits. These operators are used to turn on the off bit or vice-versa. To use the C++ programs in executing them on Linux, you need to have the Ubuntu file configured and in running state. Moreover, the user must have some knowledge of the C++ language. C++ source codes are written in the text editor. Whereas for the execution process, use the Ubuntu terminal. A bitmask is also said to be a simple mask that is a sequence of n bits. It encodes the subset of the collection. The element ‘I’ is present in the subset of the ‘ith’ bit is set in the mask. For the set of elements having nth bytes, there are chances of having a 2N mask corresponding to a subset.

  • Deep Copy C++

    The copy means the same to the same replica of an original object. Within programming, there are different methods to create copies of objects. The copy of objects, variables can be done with a copy constructor or using the default assignment operator “=”. Two types of copies can be made within the C++ code, i.e., shallow and deep copy. You can use one to copy any variable or object in the code. When our object has variables that are dynamically allocated throughout the program, we need to create a Deep copy of such type of object. This article will see how a Deep copy can be created in C++.

  • An Introduction to MATLAB: Structure and Application

    Programming is the core of a modern computer. You can not even think of an alive computer without programming. There are several languages to do computer programming, and each of them has its special field. Some are known for scientific computation, and some are specialized for making the building blocks of an operating system. MATLAB is also a very popular programming language. Today we are going to get an absolute introduction to MATLAB and its wide application in today’s world. Although there is a wide variety of programming languages available there in the virtual world, we have chosen MATLAB for several important reasons. It is a compact language for heavy-duty works. We are going to discover each and every detail of MATLAB in this journey. Stay with us to learn. The more you know, the more you grow.

Security Leftovers

  • Vulnerability in firmware of MediaTek DSP chips used in many smartphones - itsfoss.net

    Researchers from Checkpoint have identified three vulnerabilities (CVE-2021-0661, CVE-2021-0662, CVE-2021-0663) in the firmware of MediaTek DSP chips, as well as a vulnerability in the MediaTek Audio HAL audio processing layer (CVE-2021- 0673). In case of successful exploitation of vulnerabilities, an attacker can organize eavesdropping on the user from an unprivileged application for the Android platform. In 2021, MediaTek accounts for approximately 37% of shipments of specialized chips for smartphones and SoCs (according to other data, in the second quarter of 2021, MediaTek’s share among manufacturers of DSP chips for smartphones was 43%). Among other things, MediaTek DSP chips are used in flagship smartphones by Xiaomi, Oppo, Realme and Vivo. MediaTek chips, based on the Tensilica Xtensa microprocessor, are used in smartphones to perform operations such as processing sound, images and video, in computing for augmented reality systems, computer vision and machine learning, as well as implementing fast charging.

  • CronRAT: A New Linux Malware That's Scheduled to Run on February 31st [Ed: This is not about "Linux" and Linux isn't how or why this malware gets on systems in the first place]

    Researchers have unearthed a new remote access trojan (RAT) for Linux that employs a never-before-seen stealth technique that involves masking its malicious actions by scheduling them for execution on February 31st, a non-existent calendar day. Dubbed CronRAT, the sneaky malware "enables server-side Magecart data theft which bypasses browser-based security solutions," Sansec Threat Research said. The Dutch cybersecurity firm said it found samples of the RAT on several online stores, including an unnamed country's largest outlet.

  • Unexpected database server downtime, affecting bugs, forums, wiki

    Due to an unexpected breakage on our database servers, several Gentoo websites are currently down. In particular, this includes Forums, Wiki, and Bugzilla. Please visit our Infrastructure status page for real-time monitoring and eventual outage notices.

Graphics: RenderDoc, Mesa, and Vulkan

  • RenderDoc 1.17 Released For This Leading Open-Source Graphics Debugging Tool - Phoronix

    RenderDoc 1.17 released this week as the newest version of this leading cross-platform, cross-API graphics debugging utility. RendertDoc 1.17 continues to be a gem for developers working with Vulkan and OpenGL along with Direct3D 11/12. RenderDoc as the MIT-licensed frame-capture-based graphics debugger works extremely well for game/engine developers as well as GPU driver developers in working through different issues.

  • DMA-BUF Feedback Support For Wayland Lands In Mesa 22.0's EGL Code - Phoronix

    Landing in Mesa on Black Friday was DMA-BUF Feedback support within the EGL code as another important step forward for Wayland. Introduced earlier this week was Wayland Protocols 1.24 and the primary addition to that collection of protocols is DMA-BUF feedback support. The DMA-BUF "feedback" support is important for Wayland multi-GPU systems where needing to know more information about the GPU device used by the compositor and for being able to efficiently exchange buffers between the secondary and primary GPUs.

  • RADV Vulkan Driver Finally Adds VK_KHR_synchronization2 Support - Phoronix

    The Mesa Radeon Vulkan driver "RADV" has added support for the prominent VK_KHR_synchronization2 extension introduced earlier this year. Added back in February with Vulkan 1.2.170 was VK_KHR_synchronization2 for simplifying the core synchronization APIs of this industry-standard graphics API. VK_KHR_synchronization2 makes Vulkan synchronization handling easier to deal with Those interested in the changes with the "synchronization2" revision can see this Khronos blog post going over the Vulkan synchronization handling in detail along with the changes from this extension.

Kernel: Futex2, Fixes, and Other New Features for Linux 5.16

  • Futex2 Brings Linux Gaming To The Next Level - Invidious

    Futex2 has been a work in progress by Valve and collabora for a very long time and it seems like it's finally going to make it's way into the kernel.

  • Patch out for Alder Lake Linux bug that reminds of the Windows 11 Ryzen CPPC issue - Neowin

    Linux boss Linus Torvalds merged earlier today several important patches for Intel CPU generally related to performance states (P-states) on Linux.

  • Linux 5.16 Merges Fix For One Of The Intel Alder Lake Issues - Phoronix

    Merged this Friday afternoon into the Linux 5.16 development kernel is fixing a performance issue affecting some Intel Alder Lake motherboards. The fix merged a short time ago is the item previously covered within Linux ITMT Patch Fixes Intel "Alder Lake" Hybrid Handling For Some Systems. As explained in that prior article, TurboBoost Max 3.0 / ITMT (Turbo Boost Max Technology) code within the kernel isn't being enabled for some systems, particularly if overclocking or even any memory XMP / optimal settings. The ASUS Z690 board I've been primarily using for the i9-12900K was affected as are numerous other boards. I've also heard reports of some motherboards running purely stock are even having this issue.

  • Intel Preparing USI Stylus Support For Linux - Phoronix

    Intel open-source driver engineers have been working on USI stylus support for the Linux kernel. The Universal Stylus Initiative (USI) aims to offer interoperability of active styluses across touchscreen devices. The Universal Stylus Initiative has a goal of allowing all styluses that comply with USI to work across devices. USI is backed by the likes of Google who wants to see USI working uniformally across Chromebooks, Dell and other hardware vendors, Intel is also involved and leading the upstream Linux support patches, and peripheral vendors like Logitech are also supporting the standard. Other big names like Wacom, Samsung, and many other players from desktop to laptops to mobile.