Open-source News

AMD ACO Begins Using Navi NGG For Tessellation + Vertex Shaders

Phoronix - Tue, 04/07/2020 - 20:22
The AMD "ACO" compiler backed by Valve for offering a faster shader compiler back-end than AMDGPU LLVM for the RADV open-source Radeon Vulkan driver has begun making use of Navi's NGG "Next-Gen Geometry" hardware...

GNU MediaGoblin Announces They Are Still Alive

Phoronix - Tue, 04/07/2020 - 19:24
One of several GNU projects that have been silent in recent years is MediaGoblin, the effort to provide a free and decentralized web platform for sharing of digital media...

F2FS Introduces Zstd Compression Support With The Linux 5.7 Kernel

Phoronix - Tue, 04/07/2020 - 18:33
The Flash-Friendly File-System (F2FS) updates have been sent in for the very active Linux 5.7 kernel...

15 years of Git: How to get started or learn something new

opensource.com - Tue, 04/07/2020 - 15:04

If there's anything that's changed software in the past two decades, Git is at the top of the list.


read more

Love or hate chat? 4 best practices for remote teams

opensource.com - Tue, 04/07/2020 - 15:03

Chat is a part of most people's daily lives, especially if you work in tech, and especially if you work with teammates located in different parts of the world. It can be a great way to achieve these goals:


read more

How to use pyenv to run multiple versions of Python on a Mac

opensource.com - Tue, 04/07/2020 - 15:02

Managing a local Python development environment continues to be a challenge, even for experienced developers. While there are well-documented strategies for package management, there is another step necessary to ensure you are running the version of Python you need when you need it.


read more

How to avoid man-in-the-middle cyber attacks

opensource.com - Tue, 04/07/2020 - 15:00

Whether you're sending data on your computer or talking to someone online, you want to assume some level of security and privacy.

But what if a third party is eavesdropping online, unbeknownst to you? And worse, what if they're impersonating someone from a business you trust in order to gain damaging information? This could put your personal data into the hands of dangerous, would-be thieves.

Welcome to what's called a man-in-the-middle (MITM) attack.


read more

How to Reset Forgotten Root Password in Debian 10

Tecmint - Tue, 04/07/2020 - 14:22
In this brief tutorial, you will learn how to reset a forgotten root password in a Debian 10 system. This will help you regain the ability to log in as the root user and...

Pages