One of the nicer features of the Linux command line is the ability to move processes between the foreground and the background. It’s a common misunderstanding for new users to the command line that once they run a command that they can only carry out a single command at a time unless they use some form of multiplexer such as screen.
Informative Monday mornings with 100TB’s Technology News Roundup: Microsoft Announces Blockchain ID Initiative; CoreOS Torus Aims to Simplify Distributed Storage; EU Sets 2020 Goal for Research Open Access; Microsoft Launches Early-Stage VC Programme; BBC micro:bit Priced, Heading for July Launch.
Today people access the web on a whole range of devices, from the smallest smartwatch to the largest workstation. Smartphones alone come in a myriad of shapes and sizes, sporting an array of screen dimensions and resolutions. While there’s no doubting the convenience of having a window on the web wherever and whenever you need one, the experience of navigating sites on a device for which they weren’t originally designed can often be fraught – and occasionally impossible.
This week 100TB brings you the highlights from the world of science and technology: physics and medical biology investigate cancer cells; a possible Earth-like planet far far away is discovered; man’s best friend sniffs out malaria; Levis and Google create a clever jean jacket.
It’s 5am. You’ve staggered out of bed, rubbing your bleary eyes as you wait for the coffee machine to finish its painstaking dripping, and you’re impatiently waiting for that urgent boost of caffeine. You don’t want to go to work, you feel stuck and bored. As you sip your coffee, you think about that brilliant idea in your head, the one which just won’t go away, and you doodle a few thoughts on how to turn that idea into a reality onto your napkin. As you shake and rattle on the train on the way to work, you realize that you want to help other people and that maybe, just maybe, now is the time to take that chance.
The File Transfer Protocol (FTP) has existed since the 1970s, and is pretty much the de facto standard in copying files to and from a dedicated server or VPS to use in web hosting environments. Unfortunately, it has a number of limitations, such as the fact that its default configuration commands and user credentials are transmitted in plain text, meaning they can be easily read if the communication is intercepted, a simple task if WiFi is being used.
The video game market is still making waves, causing conversations and disrupting conventions. Today, games are played by an almost equal split between genders and age groups; they are seen as a tool for building strategic thinking skills and have become a valid form of entertainment and relaxation.
One of the key objectives for maintaining proper security of a system is that users are only granted the exact levels of access that they need to perform their roles, and nothing more. While this is something that users will generally find annoying and sometimes complain about, it is important that user accounts provide the minimum opportunities for system compromise should the user’s account itself be compromised by an attacker.