TCS logo TimburyDotOrg is owned and operated by Timbury Computer Services. For over ten years, Timbury Computer Services has shown home, small business and corporate clients how to use Linux and Open Source software to maximize efficiency and lower costs.

Updates: The TimburyDotNet web hosting site redesign is complete. Linux-only hosting!More...
Sep
13th

I’ll Gladly Pay You Tuesday for a Hamburger Today

Author: Shawn Powers | Files under syndicated

My day job pays me on the 15th and last day of every month, unless those
days land on a weekend, in which case I get paid the Friday before. With
those rules, creating a Google Calendar event is shockingly difficult. In
fact, it’s not possible to create a recurring event with those rules using
Google’s GUI scheduling tool.
more>>


Sep
12th

Watermarking Images–from the Command Line

Author: Dave Taylor | Files under syndicated

Us geeks mostly think of the command line as the best place for text
manipulation. It’s a natural with cat,
grep and shell scripts. But
although you can’t necessarily view your results from within a typical
terminal window, it turns out to be pretty darn easy to analyze and
manipulate images from within a shell script.
more>>


Sep
5th

Classifying Text

Author: Reuven M. Lerner | Files under syndicated

In my last few articles, I’ve looked
at several ways one
can apply machine learning, both supervised and
unsupervised. This time, I want to bring your attention to a
surprisingly simple—but powerful and widespread—use of machine
learning, namely document classification.
more>>


Aug
24th

Jmol: Viewing Molecules with Java

Author: Joey Bernard | Files under syndicated

Let’s dig back into some chemistry software to see what kind
of work you can do on your Linux machine. Specifically, let’s look at
Jmol, a Java application that is available as both a desktop application
and a web-based applet.
more>>


Aug
22nd

Integrating Web Applications with Apache

Author: Andy Carlson | Files under syndicated

When you deploy a web application, how do end users access it?
Often web applications are set behind a gateway device through which
end users can access it. One of the popular products to act as
an application gateway on Linux is the Apache Web Server. Although it can
function as a normal web server, it also has the ability to connect through
it to other web servers.
more>>


Aug
17th

Manipulate Images with ImageMagick

Author: Dave Taylor | Files under syndicated

In my last
article
, I had some fun looking at the children’s game of rock,
paper, scissors, writing a simple simulator and finding out that some
strategies are better than others. Yes, I used “strategy” and
“rock, paper, scissors” in the same sentence!
more>>


Aug
15th

The Post-TV Age?

Author: Shawn Powers | Files under syndicated

The most basic cable package from Charter (Spectrum?) costs me more than $70
per month, and that’s without any equipment other than a single cable
card. It’s very clear why people have been cutting the cord with cable
TV companies. But, what options exist? Do the alternatives
actually cost less? Are the alternatives as good? more>>


Aug
10th

Unsupervised Learning

Author: Reuven M. Lerner | Files under syndicated

In my last few articles, I’ve looked into machine learning and
how you can build a model that describes the world in some way. All of
the examples I looked at were of “supervised learning”, meaning
that you loaded data that already had been categorized or classified in
some way, and then created a model that “learned” the ways
the inputs mapped to the outputs. more>>


Aug
1st

Sysadmin 101: Automation

Author: Kyle Rankin | Files under syndicated

This is the second in a series of articles on systems administrator
fundamentals. These days, DevOps has made even the job title “systems
administrator” seem a bit archaic, much like the “systems
analyst” title it
replaced. These DevOps positions are rather different from sysadmin jobs in
the past. more>>


Jul
25th

Postmortem: What to Do After a Security Incident

Author: Susan Sons | Files under syndicated

Incidents happen. Vulnerabilities happen. The quality of your response
can make the difference between a bad day and a disaster. What happens
after the response can make the difference between endless firefighting
and becoming stronger with every battle. A quality postmortem analysis
is free ammunition. more>>