An image kernel is a small matrix used to apply effects like the ones you might find in Photoshop or Gimp, such as blurring, sharpening, outlining or embossing. They’re also used in machine learning for ‘feature extraction’, a technique for determining the most important portions of an image. In this context the process is referred to more generally as “convolution” (see: convolutional neural networks.)
Source: Image Kernels explained visually
Home manufacturing tutorial for robot builders, model makers, and other hobbyists
Source: Guerrilla guide to CNC machining, mold making, and resin casting
What we are going to do is a basic variant of a process generally known as reverse engineering. You start examining the device with common tools (USB is quite descriptive itself). Then you capture the data that the device exchanges with its existing (Windows) driver, and try to guess what it means. This is the toughest part, and you’ll need some experience and a bit of luck to reverse engineer a non-trivial protocol.
via DRIVE IT YOURSELF: USB CAR | Linux Voice.
Sometimes things go wrong, and instances can go down in unexpected ways. Even if the instance has disappeared, OpenStack might still think it’s there. If this happens, one way to deal with it is to delete these phantom instances directly from OpenStack’s database. This guide will show you how to do that with a simple script.
via 5 new guides for mastering OpenStack | Opensource.com.
In this tutorial, we’ll develop a simple kernel module that creates a /dev/reverse device. A string written to this device is read back with the word order reversed (“Hello World” becomes “World Hello”). It is a popular programmer interview puzzle, and you are likely to get some bonus points when you show the ability to implement it at the kernel level as well. A word of warning before we start: a bug in your module may lead to a system crash and (unlikely, but possible) data loss.
via Be a kernel hacker | Linux Voice.
I’ve collected 50 UNIX / Linux sysadmin related tutorials that we’ve posted so far. This is lot of reading. Bookmark this article for your future reference and read it whenever you get free time.
via 50 UNIX / Linux Sysadmin Tutorials.
Note: SELinux does not let you side step DAC Controls. SELinux is a parallel enforcement model. An application has to be allowed by BOTH SELinux and DAC to do certain activities. This can lead to confusion for administrators since the process gets Permission Denied. Administrators see Permission Denied means something is wrong with DAC, not SELinux labels.
via Your visual how-to guide for SELinux policy enforcement | opensource.com.\
DAC=Discretionary Access Control
SELinux is a powerful labeling system, controlling access granted to individual processes by the kernel. The primary feature of this is type enforcement where rules define the access allowed to a process is allowed based on the labeled type of the process and the labeled type of the object.
For regular users SELinux can be a complete PITA which usually needs to be disabled or set to just log the violation only. I recall in past years installing some service and trying to figure out why it wouldn’t work until the logs revealed I didn’t have things set up in a way SELinux wants. Currently I try and minimize SELinux violations because it seems like it has a point most of the time.
In Unix/Linux you can execute your perl scripts by typing “perl <filename>” at command prompt. But before you do that make sure you have both Perl and its Tk module. Most linux distributions have perl – but quite a few don’t have the Tk module. Make sure that the system you are using have the Tk module. If you don’t have it, go to http://www.cpan.org and download the perl module. Or you can use the perl’s CPAN module to install the Tk module. To do this, open a terminal and enter the following command
perl -MCPAN -e shell
cpan> install Bundle::CPAN
cpan> reload cpan
cpan> install Tk
via Perl/Tk Tutorial – Create GUI with Perl’s Tk Module.