This was going to be an extended review of my Microsoft Surface Go 2, with performance benchmarks and comparisons to other computers, outlining its strengths and flaws, investigating the odd quirks that inevitably make every computer less-than-perfect. But after using this as my secondary PC for a month I realised that such a review would be boring because the Surface Go 2 is so unremarkably perfect.Continue reading Cyberpunk 2077 on Surface Go 2: RTX Online?
Last week the Australian Government passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, which allows certain government agencies to issue secret notices compelling Australian IT workers and software developers to insert secret malicious code into any software or computer systems, for the purpose of gaining access to the content of encrypted messages on the computers and smartphones of their users. This law is in effect right now. The next time you download an update for the banking app on your smartphone, or operating system updates for Windows and MacOS, or a firmware update for your modem/router, or a game update on your Playstation, your device might also be implanted with a secret backdoor enabling remote access and monitoring. I could be forced to add malicious code to this blog and it would be illegal for me to refuse, or to warn you about it. You can no longer trust any computer hardware or software that is created, configured, or sold by someone living under the legal jurisdiction of Australia. This is kind of a big deal.Continue reading The War on Privacy
RX Vega 56 launched in August 2017 with a blower-style stock cooler that is incapable of adequately handling the excess heat from this GPU at its full performance level. The default settings deliberately limit the power consumption and fan speed to keep it running comfortably within its physical limitations. Can it be improved with a different GPU cooler?
The R programming language uses Basic Linear Algebra Subprograms (BLAS) for performing common linear algebra operations such as vector addition, scalar multiplication, dot products, linear combinations, and matrix multiplication. R includes Netlib BLAS by default. Significant performance gains can be achieved by replacing that with a different BLAS library such as OpenBLAS or ATLAS.
Further gains are possible by intercepting certain calls to BLAS with NVIDIA’s NVBLAS. Operations that can benefit from running on a GPU will be automatically redirected to cuBLAS without any modification to your R code.
The AKiTiO Node Thunderbolt 3 eGFX Box is a 7Kg black metal powered external enclosure for connecting a full-size graphical processing unit (GPU) to any computer with a Thunderbolt 3 port. The front 12cm fan can be removed to make room for a water cooling radiator.
NASA JPL’s Orbiting Carbon Observatory 2 (OCO-2) was launched into sun-synchronous orbit around the Earth on July 2, 2014. It carries 3 grated spectrometers for measuring the spectrum of sunlight reflected off the surface of the earth, which is used to calculate the average concentration of Carbon Dioxide in the column of atmosphere beneath the satellite (XCO2). It takes 16 days to provide full coverage of the Earth’s surface.
I am using the R packages datadr and Trelliscope from the DeltaRho project (formerly called Tessera.io) to explore and visualise the XCO2 observations from the OCO-2 Level 2 Lite version 7R data product.
Why would you want to install every CRAN package? That’s a good question.
Step 1: Install CentOS 7 Linux.
Some R packages will not install without an active X window session, so if you are not logged in to a graphical interface on the machine you will need to connect via SSH with X-forwarding enabled, such as with PuTTY and VcXsrv on Windows.
Most of this guide must be run from the Linux terminal as the user who will be running R. That user must be allowed to run commands as root with sudo.
If you connect to the internet through a public WiFi hotspot, or at school or at work, the metadata and contents of your online communications can be intercepted and viewed (or altered) by the network operator or another malicious party on the network. One of the ways to protect your privacy is to send all of your internet traffic through a Virtual Private Network.
Unfortunately a lot of personal data can leak out when you join a new network but have not yet connected the VPN. This guide shows you how to configure the Linux iptables firewall to block all normal outgoing connections, and only allow connections to your VPN server.