Open Source Articles

Page 4 of 123

Gulp - A Toolkit for Automating Painful Tasks in Development

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 250 Views

In the world of web development, developers often face repetitive tasks that can be mundane and time-consuming. These tasks include minifying JavaScript files, optimizing images for the web, compiling Sass or Less into CSS, and many others. This is where Gulp comes in. Gulp is a toolkit that helps automate these tedious tasks with ease. It is a popular open-source JavaScript-based task runner that allows developers to create automated workflows for their projects. Its simplicity in usage and flexibility in configuration makes it a great choice for any project. What is Gulp? Gulp is a task runner ...

Read More

How I Switched from Windows 10 to Linux Mint?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 865 Views

As an avid computer user, I have always believed that it is important to stay up-to-date with the latest technology. For years, I had been using the widely popular operating system, Windows 10. However, over time, I began to experience a range of issues with Windows that left me feeling frustrated and unsatisfied with my computing experience. Understanding the Differences Between Windows 10 and Linux Mint Overview of Windows 10 Operating System Windows 10 is a widely used operating system developed by Microsoft. It has a graphical user interface that allows users to interact with the computer ...

Read More

How to Change Kernel Runtime Parameters in a Persistent and Non-Persistent Way?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 803 Views

Kernel runtime parameters are settings that control the behavior of the Linux kernel on your system. These parameters can affect a wide range of system functions, such as memory allocation, network performance, and CPU scheduling. Understanding how to change these parameters is crucial for optimizing system performance and troubleshooting issues that may arise. There are two main ways to change kernel runtime parameters: non-persistent changes and persistent changes. Non-persistent changes modify the kernel's behavior temporarily, lasting only until you reboot your system. Persistent changes, on the other hand, modify the kernel's behavior permanently and persist across reboots. ...

Read More

How to Change User Password in Ubuntu?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

If you are a Linux user, there is no doubt that you have heard of Ubuntu OS. Ubuntu is an open-source operating system based on the Debian architecture and is one of the most popular distributions of Linux. Its user-friendly interface and versatile nature makes it a great operating system for both personal and professional use. As with any operating system, password security in Ubuntu is of utmost importance. With cyberattacks increasing day by day, secure passwords are essential to keep your information safe from unauthorized access. This guide aims to simplify the process of changing your user ...

Read More

How to Check and Patch Meltdown CPU Vulnerability in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 646 Views

Meltdown is a critical hardware vulnerability discovered in early 2018 that affects Intel processors and some ARM chips. This security flaw exploits speculative execution, allowing attackers to read sensitive data like passwords, encryption keys, and login credentials from kernel memory. Understanding and patching this vulnerability is essential for maintaining system security. Understanding the Meltdown Vulnerability Meltdown exploits a fundamental CPU optimization called speculative execution, where processors execute instructions before confirming they're needed to improve performance. The vulnerability allows unprivileged processes to access privileged kernel memory that should be protected. Meltdown Attack Process ...

Read More

How Linux Uses Sockets?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

Linux is an open-source operating system that has gained immense popularity for its stability and security. It is widely used in various fields such as web servers, embedded systems, and supercomputers. One of the key aspects of Linux is its efficient usage of sockets for interprocess communication. Sockets provide a flexible way to establish communication channels between different processes running on the same or different machines connected over a network. What are Sockets? Sockets are a fundamental concept in Linux networking, allowing communication between processes on different computers over a network. In simple terms, a socket is ...

Read More

Mutual exclusion in a distributed system

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 10K+ Views

Mutual exclusion in distributed systems is a fundamental principle that prevents concurrent processes or nodes from simultaneously accessing shared resources or critical sections. When multiple processes attempt to access the same resource concurrently, it can lead to race conditions, data corruption, and system inconsistencies. Unlike centralized systems, distributed systems lack shared memory and face challenges such as network delays, communication failures, and node failures. These factors make implementing mutual exclusion significantly more complex, requiring specialized algorithms and protocols to ensure proper coordination between distributed nodes. Approaches to Mutual Exclusion There are two main approaches to achieving mutual ...

Read More

N process Peterson algorithm

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 1K+ Views

The N-process Peterson algorithm addresses the critical section problem for multiple processes, extending beyond Peterson's original two-process solution. While Peterson's classic algorithm handles mutual exclusion between two processes, scaling it to N processes requires more sophisticated approaches like Lamport's Bakery Algorithm. How the N-Process Algorithm Works The N-process extension uses a ticket-based system where processes obtain numbered tickets to determine their order of access to the critical section. Here's how it operates: Each process wanting to enter the critical section gets a unique ticket number by incrementing a shared counter The process sets a "choosing" flag ...

Read More

Not Recently Used (NRU) page replacement algorithm

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 4K+ Views

The Not Recently Used (NRU) page replacement algorithm is a fundamental memory management technique used by operating systems to efficiently manage page replacement in virtual memory systems. Its primary goal is to identify and remove pages from memory that have not been accessed recently, making room for new pages when physical memory becomes full. How NRU Algorithm Works NRU uses two hardware bits associated with each page − a reference bit (R) and a modified bit (M). The reference bit is set when the page is accessed (read or written), and the modified bit is set when the ...

Read More

NTFS Junction Points

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 773 Views

NTFS Junction Points are a type of symbolic link in the Windows NTFS file system that allow you to create directory-level links within the same volume. They act as transparent redirections, making one directory appear at a different location while the actual data remains in its original place. Junction points provide a powerful mechanism for file system organization, application compatibility, and efficient storage management without physically moving files or disrupting existing pathways. How Junction Points Work Junction points use reparse points, a special NTFS feature that intercepts file system operations and redirects them to another location. When ...

Read More
Showing 31–40 of 1,225 articles
« Prev 1 2 3 4 5 6 123 Next »
Advertisements