Open-source News

23-Way Graphics Card Comparison With Shadow of the Tomb Raider On Linux

Phoronix - Mon, 11/18/2019 - 22:05
Earlier this month Feral Interactive released the Linux port of Shadow of the Tomb Raider. For those wondering about the AMD Radeon vs. NVIDIA GeForce performance for this Vulkan-powered Linux game port, here are benchmark results on 23 different graphics cards.

Vulkan 1.1.128 Released With Performance Query Extension

Phoronix - Mon, 11/18/2019 - 20:31
Vulkan 1.1.128 is out with various corrections and clarifications to this graphics/compute API specification but it also comes with one exciting new extension...

GCC 10 Feature Development Is Over - Now The Focus Turns To Bug Fixing

Phoronix - Mon, 11/18/2019 - 20:18
GCC 10 has moved to its next stage of development that shifts away from feature work to instead general bug fixing with hopes of shipping the GNU Compiler Collection 10 release in the months ahead...

Schedutil Frequency Invariance Revised For Better Intel Performance + Power Efficiency

Phoronix - Mon, 11/18/2019 - 17:29
SUSE developer Giovanni Gherdovich has sent out the latest patches on supporting frequency invariance within the kernel's scheduler code and ultimately making use of it for select Intel CPUs to yield not only better raw performance but also power efficiency...

Cheat sheet for Linux users and permissions

opensource.com - Mon, 11/18/2019 - 16:02

The Linux operating system is a true multi-user OS, meaning it assumes that there's data on every computer that should be protected, whether in the interest of privacy, security, or system integrity.

Linux uses file ownership and permissions to manage file and folder access. 

For administrators who deal with different user environments all day, this system is easy to understand, calculate, and control.


read more

How internet security works: TLS, SSL, and CA

opensource.com - Mon, 11/18/2019 - 16:02

Multiple times every day, you visit websites that ask you to log in with your username or email address and password. Banking websites, social networking sites, email services, e-commerce sites, and news sites are just a handful of the types of sites that use this mechanism.

Every time you sign into one of these sites, you are, in essence, saying, "yes, I trust this website, so I am willing to share my personal information with it." This data may include your name, gender, physical address, email address, and sometimes even credit card information.


read more

How to use regular expressions in awk

opensource.com - Mon, 11/18/2019 - 16:00

In awk, regular expressions (regex) allow for dynamic and complex pattern definitions. You're not limited to searching for simple strings but also patterns within patterns.

The syntax for using regular expressions to match lines in awk is:

word ~ /match/

The inverse of that is not matching a pattern:


read more

Initial Patches Wire In C++20 Coroutines For The GCC Compiler

Phoronix - Mon, 11/18/2019 - 14:47
The GNU Compiler Collection continues picking up new features aligned for the upcoming C++20 standard. The latest are patches pending on the mailing list for implementing coroutines in C++...

How to Disable NetworkManager in CentOS/RHEL 8

Tecmint - Mon, 11/18/2019 - 14:36
In Linux, the Network Manager is a daemon that handles the detection of active networks and configuration of network settings. When up and running, the network manager automatically detects active network connections, where wireless...

Zswap Could See Better Performance Thanks To A B-Tree Search Implementation

Phoronix - Mon, 11/18/2019 - 13:26
For those using Zswap as a compressed RAM cache for swapping on Linux systems, the performance could soon see a measurable improvement...

Inside the Book of Red Hat

Red Hat News - Mon, 11/18/2019 - 13:00

Shared stories are the cornerstone of community. And in open organizations like Red Hat—where community is paramount—shared stories are especially important to the collective identity that binds participants together.

Pages