The Polaris/Vega Performance At The End Of Mesa 18.3 Feature Development

With Mesa 18.3 feature development having wrapped up at the end of October, here are some benchmarks showing how the updated RadeonSI and RADV drivers are performing for this code that is now under a feature freeze before its official release around the end of November. AMD Radeon Vega and Polaris graphics cards were tested with a slew of NVIDIA graphics cards also tested on their respective driver to show where the Linux gaming GPU performance is at as we head into the 2018 holiday shopping season.

 

 

These tests were done on Ubuntu 18.10 but with switching to Linux 4.19 stable and Mesa 18.3-devel built against LLVM 8.0 SVN for showing the current open-source RadeonSI OpenGL and RADV Vulkan performance potential for Polaris/Vega GPUs. The Radeon cards tested were the RX 560, RX 580, RX Vega 56, and RX Vega 64 graphics cards.

For putting the current Radeon Mesa performance into perspective, the NVIDIA 410.73 driver was benchmarked with the GTX 980 Ti, GTX 1060, GTX 1070, GTX 1070 Ti, GTX 1080, GTX 1080 Ti, RTX 2070, and RTX 2080 Ti based on the newer graphics cards I had available for benchmarking.

Tests were done form the Intel Core i9 9900K box with Ubuntu 18.10 while running a variety of OpenGL and Vulkan gaming benchmarks, including the few Steam Play capable game benchmarks so far. All of these benchmarks were handled by our open-source Phoronix Test Suite benchmarking software.

Source

Samsung finally launches Linux on DeX beta program

Samsung DeX attached to a screen and peripherals.

  • Samsung has launched the Linux on DeX beta trial, bringing Linux to select devices.
  • The beta program currently includes the Galaxy Note 9 and Galaxy Tab S4.
  • Registration closes on December 14, so you still have more than a month to sign up.

Samsung DeX is a pretty handy bit of software in theory, giving users a computer-style experience when hooked up to the big screen. The company announced it was bringing Linux to DeX last year, and it’s finally launched the beta program this week.

The Korean firm sent an email to users who had previously pre-registered their interest in Linux on DeX, notifying them of the beta program’s launch. Once you’ve registered via the email (or the Linux on DeX website), Samsung will send users a confirmation email and a follow-up message with instructions to download the Linux on DeX app. Then again, I haven’t received the latter email just yet, so don’t expect to be up and running within minutes.

In any event, the beta is a private affair at this point, and supports the Galaxy Note 9 and Galaxy Tab S4 right now. Samsung hasn’t clarified whether other devices, such as the Galaxy S9, Galaxy Note 8, and Galaxy S8 will eventually receive the app.

 

Best Android phones (November 2018): Our picks, plus a giveaway

With Android thoroughly dominating the mobile industry, picking the best Android phones is almost synonymous with choosing the best smartphones, period. While Android phones have few real opponents on other platforms, internal competition is incredibly …

The Linux on DeX app supports the Ubuntu 16.04 LTS distribution, and requires at least 8GB of storage space and 4GB of RAM. The latter figure suggests that older flagships might be supported yet. Programs also need to be built for the ARM 64-bit architecture, so it seems like you won’t be able to run any old Linux program.

The registration page is accessible via the button below. You’ll need a Google account to sign up and a Samsung account to actually use the service. Sign-ups end on December 14, 2018, so you’ve still got over a month to spare.

Source

Download Fedora Jam KDE Live 29

Fedora Jam KDE Live is an easy-to-use, free and open source GNU/Linux distribution, a spin (remix) of the widely used Fedora operating system tailored specifically for musicians and audio enthusiasts, allowing them to easily produce digital music.

Distributed as 32 and 64-bit Live DVDs

Fedora Jam KDE Live CD is distributed as two Live DVD ISO images, offering complete support for the 64-bit, as well as the 32-bit architectures. It can be installed on a local or external drive, or used directly from the live media.

Boot options à la Fedora Linux

Being derived from Fedora, the distro offers a boot menu that it identical in look and functionality with the one of the official Fedora Live DVDs. It allows users to try the operating system without installing it (live mode), as well as to test the RAM or boot an existing OS from the local disk.

Uses the beautiful KDE desktop environment

The distribution uses the beautiful KDE desktop environment, which features a traditional and familiar layout, comprised of a taskbar (panel) located on the bottom edge of the screen, as well as a Desktop Folder widget on the desktop.

Comes pre-loaded with a wide range of music-related apps

The operating system contains various open source audio creation applications, such as Audacity, Ardour, Frescobaldi, Musescore, and Qtractor, as well as the PulseAudio, ALSA and Jack sound servers. The latest LV2/LADSPA plugins are also included.

Among other open source applications that are included in Fedora Jam KDE Live CD, we can mention the Mozilla Thunderbird email and news client, Internet DJ Console graphical Shoutcast and Icecast client, Mozilla Firefox web browser, the entire Calligra office suite, Sieve mail filtering scripts editor, as well as all the standard KDE applications.

Source

Removing Duplicate PATH Entries | Linux Journal

The goal here is to remove duplicate entries from the PATH variable.
But before I begin, let’s be clear: there’s no compelling reason to
to do this. The shell will, in essence, ignore duplicates PATH entries;
only the first occurrence of any one path is important.
Two motivations drive this exercise.
The first is to look at an awk one-liner that initially
doesn’t really appear to do much at all.
The second is to feed the needs of those who are annoyed by
such things as having duplicate PATH entries.

I first had the urge to do this when working with Cygwin.
On Windows, which puts almost every executable in a different
directory, your PATH variable quickly can become overwhelming,
so removing duplicates makes it slightly less confusing
when you’re trying to decipher what’s actually in your PATH variable.

Your first thought about how to this might be to break up the path
into the individual elements with sed and
then pass that through sort and uniq to get rid of duplicates.
But you’d quickly realize that that doesn’t work, since you’ve
now reordered the paths, and you don’t want that. You want to keep
the paths in their original order, just with duplicates removed.

The original idea for this was not mine. I found the basic
code for it on the internet. I don’t remember exactly where, but
I believe it was on Stack Exchange.
The original bash/awk code was something like this:

PATH=$(echo $PATH | awk -v RS=: -v ORS=: ‘!($0 in a) ‘)

And it’s close. It almost works, but before looking at the output,
let’s look at why/how it works.
To do that, first notice the -v options. Those set the input
and output Record Separator variables that awk uses to separate
the input data into individual records of data
and how to reassemble them on output.
The default is to separate them by newlines—that is, each
line of input is a separate record.
Instead of newlines, let’s use colons as the separators,
which gives each of the individual paths in the PATH variable
as a separate record.
You can see how this works in the following where you change only
the input separator and leave the output separator as the newline,
and come up with a simple awk one-liner to print each of the elements
of the path on a separate line:

$ cat showpath.sh
export PATH=/usr/bin:/bin:/usr/local/bin:/usr/bin:/bin
awk -v RS=: ” <<<$PATH

$ bash showpath.sh
/usr/bin
/bin
/usr/local/bin
/usr/bin
/bin

So, back to the original code.
To help understand it, let’s make it look at bit more awkish by reformatting
it so that it has the more normal pattern { action }
or condition { action } look to it:

!($0 in a) {
a[$0];
print
}

The condition here is !($0 in a).
In this, $0 is the current input record, and a is an awk variable
(the use of the in operator, tells you that a is an array).
Remember, each input record is an individual path from the PATH variable.
The part inside the parentheses, $0 in a tests to see if the path
is in the array a.
The exclamation and the parentheses are to negate the condition.
So, if the current path is not in a, the action executes.
If the current path is in a, the action doesn’t execute,
and since that’s all there is to the script, nothing happens in that case.

If the current path is not in the array,
the code in the action uses the path as a key to
reference into the array.
In awk, arrays are associative arrays, and referencing a
non-existent element in an associate array automatically creates
the element.
By creating the element in the array, you’ve now set the array so
that the next time you see the same path element, your condtiion !($0 in a)
will fail and the acton will not execute.
In other words the action will execute only the first time that you see a path.
And finally, after referencing the array, you print the current path,
and awk automatically adds the output separtor.
Note that an empty print is equivalent to print $0.
Let’s see it in action:

$ cat nodupes.sh
export PATH=/usr/bin:/bin:/usr/local/bin:/usr/bin:/bin
echo $PATH | awk -v RS=: -v ORS=: ‘!($0 in a) ‘

$ bash nodupes.sh
/usr/bin:/bin:/usr/local/bin:/bin
:

As I said, it almost works.
The only problem is there’s an extra newline and an extra colon on
the following line.
The extra newline comes from the fact that echo is adding a newline
onto the end of the path, and since awk is not treating newlines as
separators, it gets added to the end of the last path,
which, in this case, causes it to look like awk failed to remove a duplicate.
But awk doesn’t see them as duplicates, it sees
/bin and /binn.
You can eliminate the trailing newline by using the -n option to echo:

$ cat nodupes2.sh
export PATH=/usr/bin:/bin:/usr/local/bin:/usr/bin:/bin
echo -n $PATH | awk -v RS=: -v ORS=: ‘!($0 in a) ‘

$ bash nodupes2.sh
/usr/bin:/bin:/usr/local/bin:

And you’re almost there, except for the trailing colon, which is not actually
a problem. Empty PATH elements will be ignored, but since you’ve come this
far on this somewhat pointless journey, you might as well go the distance.
To fix the problem, use awk’s printf command rather than print.
Unlike print, printf does not automatically include output record separators,
so you have to output them yourself:

$ cat nodupes3.sh
export PATH=/usr/bin:/bin:/usr/local/bin:/usr/bin:/bin
echo -n $PATH | awk -v RS=: ‘!($0 in a) ‘

$ bash nodupes3.sh
/usr/bin:/bin:/usr/local/bin

You may be a bit confused by this at first glance.
Rather than eliminating the trailing separtor,
you’ve reversed the logic, and you’re outputting the separator first,
then the PATH element, so instead of needing to eliminate the
trailing separator, you need to suppress a leading separator.
The record separator is output by the first %s format specifier
and comes from the length(a) > 1 ? “:” : “”,
so it is only printed when there’s more than one element in the array
(that is, the second and subsequent times).

As I said at the outset, there’s no reason you have to remove
duplicate path entries; they cause no harm.
However, for some, the simple fact that they are there is
reason enough to eliminate them.

Source

Introducing ODPi Egeria – The Industry’s First Open Metadata Standard | Linux.com

Organizations looking to better locate, understand, manage and gain value from their data have a new industry standard to leverage. ODPi, a nonprofit Linux Foundation organization focused upon accelerating the open ecosystem of big data solutions, recently announced ODPi Egeria, a new project that supports the free flow of metadata between different technologies and vendor offerings.

Recent data privacy regulations such as GDPR have brought data governance and security concerns to the forefront for enterprises, driving the need for a standard to ensure that data providence and management is clear and consistent—supporting the free flow of metadata between different technologies and vendor offerings. Egeria enables this, as the only open source driven solution designed to set a standard for leveraging metadata in line of business applications, and enabling metadata repositories to federate across the enterprise.

The first release of Egeria focuses on creating a single virtual view of metadata. It can federate queries across different metadata repositories and has the ability to synchronize metadata between different repositories. The synchronization protocol controls what is shared, with which repositories and ensures that updates to metadata can be made with integrity.

Read more at OpenDataScience

Source

Kkrieger Guid | GamersOnLinux

 

kkrieger80.jpg

.kkrieger was created to be a tech demo to see how small a game could be made. Not short, but small… as in capacity. Boasting beautiful graphics, textures, lighting, intricate level design, spooky enemies, small arsenal of weapons and sound effects. In its unfinished state, .kkrieger is about 100Kb in size. This is the most code optimized game ever made.

kkrieger90.jpg

Follow my step-by-step guide on installing, configuring and optimizing kkrieger in Linux with PlayOnLinux.

Tips & Specs:
To learn more about PlayOnLinux and Wine configuration, see the online manual: PlayOnLinux Explained

Mint 18.3 64-bit

PlayOnLinux: 4.2.12
Wine: 3.0

Wine Installation
Click Tools

Select “Manage Wine Versions”
wine01.png

Look for the Wine Version: 3.0

Select it
Click the arrow pointing to the right
wine02.png

Click Next

Downloading Wine

wine04.png

Extracting

Downloading Gecko

wine05.png

Installed

wine06.png

Wine 3.0 is installed and you can close this window

Download .kkrieger
If you do a Google search, you will find .kkrieger available on several websites

I downloaded it from here: http://www.acid-play.com/download/kkrieger

PlayOnLinux Setup
Launch PlayOnLinux

Click Install
kkrieger01.png

Click “Install a non-listed program”

kkrieger02.png

Select “Install a program in a new virtual drive”

Click Next
kkrieger03.png

Name the virtual drive: kkrieger

Click Next
kkrieger04.png

Check all three options:

 

  • Use another version of Wine
  • Configure Wine
  • Install some libraries

Click Next
kkrieger05.png

Select Wine 3.0

Click Next
kkrieger06.png

Select “32 bits windows installation”

Click Next
kkrieger07.png

Wine ConfigurationApplications Tab
Windows version: Windows XP

Click Apply
kkrieger08.png

Graphics Tab
Check “Automatically capture the mouse in full-screen windows”

check “Emulate a virtual desktop”
Desktop size: 800×600
Click OK
kkrieger09.png

PlayOnLinux Packages (DLLs, Libraries, Components)

Check the following:

 

  • POL_Install_corefonts
  • POL_Install_d3dx9
  • POL_Install_tahoma

Click Next
kkrieger10.png

Note: All packages should automatically download and install
At the “Browse” screen

Click Cancel
kkrieger11.png

Extract kkrieger-beta to Program Files in your new virtual drive

Full path:

Code:

/home/username/.PlayOnLinux/wineprefix/kkrieger/drive_c/Program Files

kkrieger12.png

Back to PlayOnLinux

Click Configure
kkrieger13.png

Select “kkrieger” on the left side

General Tab
Click “Make a new shortcut from this virtual drive”
kkrieger14.png

Select “pno0001.exe”

Click Next
kkrieger15.png

Name the shortcut: KKrieger

Click Next
kkrieger16.png

Select “I don’t want to make another shortcut”

Click Next
kkrieger17.png

Now select “KKrieger” under the virtual drive kkrieger

kkrieger18.png

Note: Click the + to download other versions of Wine. Click the down-arrow to select other versions of Wine.Display Tab
Virtual meory size: enter the amount of memory your video card/chip uses

kkrieger19.png

Close Configure

Select “KKrieger”

Click Run
kkrieger20.png

Note: click debug to see errors and bugs
If you want to run .kkrieger in full-screen, you will need to set your Linux Desktop to 1024×768 or 800×600

Conclusion:
.kkrieger ran perfectly as expected. I doubt the packages were even necessary, but I always install them as a base just in case. I played it windowed without any problems. At the end of the 10 min demo it says “… to be continued” but I haven’t see any further development on it or anything like it. I have read that it was a programmers nightmare because of the huge amount of work it takes to keep a game this small in capacity. I’m thankful someone actually tried it. Its so small that it could play on just about any device.

Gameplay Video:

Screenshots:kkrieger81.jpg

kkrieger83.jpg

kkrieger84.jpg

kkrieger93.jpg

kkrieger94.jpg

kkrieger89.jpg

Source

Choosing a printer for Linux

We’ve made significant strides toward the long-rumored paperless society, but we still need to print hard copies of documents from time to time. If you’re a Linux user and have a printer without a Linux installation disk or you’re in the market for a new device, you’re in luck. That’s because most Linux distributions (as well as MacOS) use the Common Unix Printing System (CUPS), which contains drivers for most printers available today. This means Linux offers much wider support than Windows for printers.

Selecting a printer

If you’re buying a new printer, the best way to find out if it supports Linux is to check the documentation on the box or the manufacturer’s website. You can also search the

Open Printing

database. It’s a great resource for checking various printers’ compatibility with Linux.

Here are some Open Printing results for Linux-compatible Canon printers.

The screenshot below is Open Printing’s results for a Hewlett-Packard LaserJet 4050—according to the database, it should work “perfectly.” The recommended driver is listed along with generic instructions letting me know it works with CUPS, Line Printing Daemon (LPD), LPRng, and more.

In all cases, it’s best to check the manufacturer’s website and ask other Linux users before buying a printer.

Checking your connection

There are several ways to connect a printer to a computer. If your printer is connected through USB, it’s easy to check the connection by issuing lsusb at the Bash prompt.

$ lsusb

The command returns Bus 002 Device 004: ID 03f0:ad2a Hewlett-Packard—it’s not much information, but I can tell the printer is connected. I can get more information about the printer by entering the following command:

$ dmesg | grep -i usb

The results are much more verbose.

If you’re trying to connect your printer to a parallel port (assuming your computer has a parallel port—they’re rare these days), you can check the connection with this command:

$ dmesg | grep -i parport

The information returned can help me select the right driver for my printer. I have found that if I stick to popular, name-brand printers, most of the time I get good results.

Setting up your printer software

Both Fedora Linux and Ubuntu Linux contain easy printer setup tools. Fedora maintains an excellent wiki for answers to printing issues. The tools are easily launched from Settings in the GUI or by invoking system-config-printer on the command line.

Hewlett-Packard’s HP Linux Imaging and Printing (HPLIP) software, which supports Linux printing, is probably already installed on your Linux system; if not, you can download the latest version for your distribution. Printer manufacturers Epson and Brother also have web pages with Linux printer drivers and information.

What’s your favorite Linux printer? Please share your opinion in the comments.

Source

Android Oreo dev kit showcases the Snapdragon 670

Intrinsyc’s Android 8.0 driven Open-Q 670 HDK mobile development kit for the octa-core Snapdragon 670 SoC features a 5.65-inch touchscreen, 6GB LPDDR4, 6GB eMMC, WiFi, BT, GPS, NFC, and optional camera and sensor boards.

The 170 x 170mm, Mini-ITX form-factor Open-Q 670 HDK is one of Intrynsic’s Android mobile “open frame” kits with a smartphone like touchscreen. Most recently, these include the Open-Q 845, which taps the high-end, AI-enhanced Snapdragon 845. The similarly Android 8.0 powered Open-Q 670 HDK is built around Qualcomm’s somewhat less powerful, but still octa-core Snapdragon 670, which was announced in August.

Open-Q 670 HDK, front and back

The Snapdragon 670 fills the space between the Snapdragon 660, which powers the

Open-Q 660 HDK

, and the newer Snapdragon 710. The Snapdragon 670 offers twice the performance of the 660, according to Intrinsyc.

The SoC has the same configuration as the Snapdragon 710: 2x 2GHz and 6x 1.7GHz Kryo 360 cores that are roughly equivalent to Arm’s high-end Cortex-A75 and Cortex-A55 cores, respectively. The Snapdragon 670 is further equipped with an Adreno 615 GPU, Hexagon 685 DSP, and Spectra 250 ISP for dual 16-megapixel cameras. On the Open-Q 670 HDK, the Snapdragon 670 can drive 4K30 8-bit encode and decode and can also perform simultaneous 4K30 decode and 1080p30 encode.

The Open-Q 670 HDK is loaded with 6GB LPDDR4, 64GB eMMC 5.1, and a microSD slot. On top of the board is a 5.65-inch, 2160 x 1080 touchscreen driven by 4-lane MIPI-DSI. You also get HDMI and USB Type-C based DisplayPort 1.3 ports. Three 4-lane MIPI-CSI connections are bundled on a single connector, and an audio jack and headers are available.

Open-Q 670 HDK
The board provides USB 3.1 host and micro-USB serial ports, as well as sensor, I2C, SPI, GPIO, and UART headers. You can power the kit with a 12V/5A input or a 3000mAh Li-Ion battery.

Wireless features include a Qualcomm 2.4/5GHz 802.11a/b/g/n/ac module with 2X2 MIMO, supported by a PCB antenna and MH4L antenna connector. Bluetooth 5.x with BLE is also available. In addition, there’s an NFC header and a Qualcomm SDR660 GNSS receiver with GPS/GLONASS/COMPASS/Galileo support and its own PCB antenna and SMA connector option.

Two optional daughter boards are available. First is a camera board with an IMX318 rear camera, IMX258 front camera, and OV2281 Iris camera. There’s also a sensor board with gas, pressure, Hall, UV, ALSP, magnetometer, accelerometer/gyro, humidity, and temperature sensors.

Further information

The Open-Q 670 HDK is available for $1,199. More information may be found on Intrinsyc’s Open-Q 670 HDK product and shopping pages.

Source

Linux cryptocurrency miners are installing rootkits to hide themselves

Security researchers from Trend Micro have stumbled upon a new malware strain that mines cryptocurrency on Linux computers, but which is also different from previously seen cryptominers because it downloads a rootkit to alter the operating system’s behavior and hide the unwanted high CPU usage that usually comes with cryptocurrency mining.

Currently, Trend Micro has not identified the way through which the malware –which they named KORKERDS– infects systems, but they don’t believe this recent wave of infections is the result of an intrusive mass-hacking campaign.

Instead, researchers believe crooks are using poisoned Linux applications that have been modified to silently download and install the KORKERDS cryptominers during the installation process of a legitimate app. Which app? Trend Micro hasn’t figured that out yet.

But researcher did say that the KORKERDS samples they’ve recently analyzed would do more than just install a Monero miner –also downloading and installing a rootkit, which they described as “a slightly modified/repurposed version of publicly available code.”

korkerds-installation.jpg
Image: Trend Micro

Besides allowing KORKERDS to survive OS reboots, the rootkit component also contained code a slightly strange feature.

Trend Micro says that KORKERDS’ authors modified the rootkit to hide the cryptominer’s main process from Linux’s native process monitoring tools.

“The rootkit hooks the readdir and readdir64 application programming interfaces (APIs) of the libc library,” researchers said. “The rootkit will override the normal library file by replacing the normal readdir file with the rootkit’s own version of readdir.”

This malicious version of readdir works by hiding processes named “kworkerds” –which in this case is the cryptominers’ process.

Linux process monitoring tools will still show 100 percent CPU usage, but admins won’t be able to see (and kill) the kworkerds process causing the CPU resource consumption problems.

Linux process monitoring tool showing 100% CPU usage, but kworkerds process responsible for this problem

Image: Trend Micro

Trend Micro’s KORKERDS report contains a technical breakdown of the malware’s infection routine, including file names, processes, and file hashes that Linux users may be interested in tracking and using for debugging possibly-infected systems.

Based on the fact that KORKERDS is distributed inside legitimate apps, this also suggests the malware might also be a threat to Linux desktop users as well, and not only to servers, where almost all Linux cryptominers have been observed in the past two years.

Linux users weren’t the only ones that have been targeted by sneaky cryptocurrency-mining malware. Trend Micro also published a second report yesterday on another malware strain that targeted Windows users and which also used various techniques in an attempt of staying hidden as much as possible on infected systems.

Source

WP2Social Auto Publish Powered By : XYZScripts.com