Open-source News

AMD Announces Radeon Open Compute ROCm 3.0

Phoronix - Mon, 11/18/2019 - 22:30
AMD just sent out their press release for SuperComputing 19 week in Denver. It turns out being released for SC19 is the latest major iteration of Radeon Open Compute, ROCm 3.0...

23-Way Graphics Card Comparison With Shadow of the Tomb Raider On Linux

Phoronix - Mon, 11/18/2019 - 22:05
Earlier this month Feral Interactive released the Linux port of Shadow of the Tomb Raider. For those wondering about the AMD Radeon vs. NVIDIA GeForce performance for this Vulkan-powered Linux game port, here are benchmark results on 23 different graphics cards.

Vulkan 1.1.128 Released With Performance Query Extension

Phoronix - Mon, 11/18/2019 - 20:31
Vulkan 1.1.128 is out with various corrections and clarifications to this graphics/compute API specification but it also comes with one exciting new extension...

GCC 10 Feature Development Is Over - Now The Focus Turns To Bug Fixing

Phoronix - Mon, 11/18/2019 - 20:18
GCC 10 has moved to its next stage of development that shifts away from feature work to instead general bug fixing with hopes of shipping the GNU Compiler Collection 10 release in the months ahead...

Schedutil Frequency Invariance Revised For Better Intel Performance + Power Efficiency

Phoronix - Mon, 11/18/2019 - 17:29
SUSE developer Giovanni Gherdovich has sent out the latest patches on supporting frequency invariance within the kernel's scheduler code and ultimately making use of it for select Intel CPUs to yield not only better raw performance but also power efficiency...

Cheat sheet for Linux users and permissions

opensource.com - Mon, 11/18/2019 - 16:02

The Linux operating system is a true multi-user OS, meaning it assumes that there's data on every computer that should be protected, whether in the interest of privacy, security, or system integrity.

Linux uses file ownership and permissions to manage file and folder access. 

For administrators who deal with different user environments all day, this system is easy to understand, calculate, and control.


read more

How internet security works: TLS, SSL, and CA

opensource.com - Mon, 11/18/2019 - 16:02

Multiple times every day, you visit websites that ask you to log in with your username or email address and password. Banking websites, social networking sites, email services, e-commerce sites, and news sites are just a handful of the types of sites that use this mechanism.

Every time you sign into one of these sites, you are, in essence, saying, "yes, I trust this website, so I am willing to share my personal information with it." This data may include your name, gender, physical address, email address, and sometimes even credit card information.


read more

How to use regular expressions in awk

opensource.com - Mon, 11/18/2019 - 16:00

In awk, regular expressions (regex) allow for dynamic and complex pattern definitions. You're not limited to searching for simple strings but also patterns within patterns.

The syntax for using regular expressions to match lines in awk is:

word ~ /match/

The inverse of that is not matching a pattern:


read more

Pages