All posts by wiredgorilla


Google Tries New Rules to Curtail Harassment of Employees

The rules encourage “productive conversations” and prohibit disclosing personal information about a Google employee to subject them to harassment.


In Upholding Trump’s Travel Ban, the Supreme Court Harms Scientists

The repercussions of Tuesday’s decision will be felt not just by individual families, but by American universities and scientific fields more generally.

Git Version Control: Soon with Automatic Deployment!

This is the sixth and final blog post in a series around Git and a new feature in version 72, Git Version Control.  See the full list of entries in this series at the end of this post! This post talks about something that we’re adding in Version 74, which we expect will be entering EDGE sometime during the first week of July, and will be headed to CURRENT sometime in July!  If you have been …


Tech Companies Deflect Blame for Opioid Crisis Ahead of FDA Summit

The tech and pharmaceutical industries are sparring over who bears more responsibility for an opioid crisis that kills more than 115 Americans a day.

Kinsta Kingpin: Interview with Kevin Muldoon

You can find Kevin on Twitter or LinkedIn. This is our recent interview with him, as part of our Kinsta Kingpin series. Q1: What is your background, & …

The post Kinsta Kingpin: Interview with Kevin Muldoon appeared first on Kinsta Managed WordPress Hosting.


Trump’s Trade War Won’t Hurt China. It Could Hurt US Tech

Proposed restrictions take aim at Chinese investments in the US that are declining anyway.

How to Enable NUX Dexktop Repository on RHEL/CentOS 7/6

Nux Dextop is a third-party RPM repository that contains multimedia and desktop packages for Enterprise Linux distributions such as RHEL, CentOS, Oracle Linux, Scientific Linux and more. It includes a number of graphical applications...

Facebook partners on open source AI development tools ONNX and PyTorch 1.0

arrows cycle symbol for failing faster

Facebook and its partners in the artificial intelligence (AI) community are building open source tools to accelerate AI development and make the ecosystem more interoperable. Following are the latest updates on these initiatives.

read more

4 ways Flutter makes mobile app development delightful

mobile app development

I’m going to let you in on a secret: For years I hated mobile development. I wanted to like it—mobile was the future! It was cool! It was low-power! It was a way to connect with users whose first exposure to computers did not come from traditional desktop platforms! And yet… development was a slow, frustrating experience for me. Instead, I sequestered myself over in the entirely problem-free area of web development and mourned the disappearance of the HTML blink tag (kidding).

read more

Why libraries need to get with apps and APIs

library card catalog with open

As an open education supporter, I’ve been following the progress of FOLIO, a community effort built around the idea that “the future of libraries is open” (a phrase that also forms the group’s acronym, FOLIO). FOLIO is a partnership between libraries and vendors that is developing an open source library services platform (LSP).

read more

Ansible reboot a Debian/Ubuntu Linux for kernel update and wait for it nixCraft

How can I reboot a Debian or Ubuntu Linux server/host remotely using an Ansible playbook for kernel update and wait for it to come back again?Introduction: It is pretty standard to update a large number

New – Amazon Linux WorkSpaces

Over two years ago I explained why I Love my Amazon WorkSpace. Today, with well over three years of experience under my belt, I have no reason to return to a local, non-managed desktop. I never have to worry about losing or breaking my laptop, keeping multiple working environments in sync, or planning for disruptive […]

How to Spot a Phishing Email

A new well-designed phishing email has been aimed at cPanel users recently, and we want to help all of our users stay safe. What is Phishing? Phishing, by definition, is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing emails can be sent to any email address. The most effective phishing emails make use …


Apple News Tries to Avoid Facebook’s Mistakes With Midterm Elections Section

From now until November, every Apple News user in the US will see a curated section of stories about the midterm elections.


Red Hen, Trump, and the Weaponization of Yelp

Online reviews have become battlegrounds for political speech, for better or worse. It’s in the best interest of platforms like Yelp and TripAdvisor to control it.


How Social Networks Set the Limits of What We Can Say Online

A researcher argues it’s time to take a new look at Section 230 of the Communications Decency Act—a 20-year-old law that shields internet platforms from liability for material posted by users.

Tuned – Automatic Performance Tuning of CentOS/RHEL Servers

To maximize the end-to-end performance of services, applications and databases on a server, system administrators usually carry out custom performance tunning, using various tools, both generic operating system tools as well as third-party tools....


Andreessen Horowitz Lends Credence to Crypto With New Fund

The high-profile venture capital firm hires its first female general partner, a former federal prosecutor, to manage the $300 million fund.


Using Library Science to Map the Child Separation Crisis

Scholars at Columbia University organized a six-day “crisis researchathon” to try to answer one question: Where are the children?


It’s Time You Learned About Quantum Computing

A researcher explains quantum computing in terms anyone can understand—even an 8-year-old.