Apps like Instagram have made photo filters commonplace. I actually
don't mind the vintage look for quick cell-phone snapshots, but a filter
can do only so much. At first glance, Repix is another one of those
"make your photo cool" apps that does little more than add a border and
change saturation levels. more>>
Our "Embedded Linux" issue of Linux Journal is just around the corner, and we want YOUR project to be in it! Whether you're embedding a Beagle Bone Black into a dish so you can automatically feed your black Beagle a bone, or you're developing an Arduino-based butler to answer your front door -- we want to hear about it! more>>
There's an old quote from Jamie Zawinkski that goes: "Some people, when confronted with a problem, think ‘I know, I'll use regular expressions.’ Now they have two problems." Even people like me who like regular expressions laugh at the truth in that quote, because we've seen the consequences when someone doesn't think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people.
A few columns ago, I started a series aimed at helping everyone improve
their privacy and security on the Internet. The first column in this
series was an updated version of a Tor column I wrote a few years
I don't know how many readers know this, but my very first Linux
column ("Browse the Web without a Trace", January 2008) was about how
to set up and use Tor. Anonymity and privacy on the Internet certainly
take on a different meaning in the modern era of privacy-invading
software and general Internet surveillance. more>>
Scheduling means different things depending on the audience. To many
in the business world, scheduling is synonymous with workflow management.
Workflow management is the coordinated execution of a collection of
scripts or programs for a business workflow with monitoring, logging and
execution guarantees built in to a WYSIWYG editor. more>>
David Herrmann wanted to disable the
virtual terminal subsystem in order to
save space on a kernel that didn't need a VT. But, he still wanted to see
kernel oops output for debugging purposes. The problem was that only the VT
subsystem would display oops output—and he'd just disabled it.
It seems like every day there's a new mobile game that takes the world by
storm. Whether it's Flappy Bird or Candy
Crush, there's something about
simple games that appeals to our need for quick, instant gratification.
I don't game as much as I used to. Although I've certainly spent
countless hours of my life in front of a Nintendo, SNES, or after that, playing a
first-person shooter on my computer (Linux only, thank you), these days,
my free time tends to go toward one of the many nongaming hobbies I've
High-performance computing (HPC) for the past ten years has been
dominated by thousands of Linux servers connected by a uniform
networking infrastructure. The defining theme for an HPC cluster lies
in the uniformity of the cluster. more>>
Portable apps aren't anything new. There are variations of "single
executable apps" for most platforms, and some people swear by keeping
their own applications with them for use when away from home. I don't
usually do that, as most of what I do is on-line, but there is one
In my last few articles, I looked at several different Python modules
that are useful for doing computations. But, what tools are available to
help you analyze the results from those computations? Although you could
do some statistical analysis, sometimes the best tool is a graphical
representation of the results. more>>
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.