Security tips

Security Tips for Installing Linux on Your SysAdmin Workstation

Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation....
Read 0 Comments
hardware discovery

Deep Hardware Discovery With lshw and lsusb on Linux

In today's stupendous roundup, we will dig into the beloved lshw (list hardware) and lsusb (list USB) commands. This is a wonderful rabbit hole to fall down...
Read 0 Comments
Manasi Navare

Fixing the Linux Graphics Kernel for True DisplayPort Compliance, Or: How to Upstream a Patch

If you’ve ever hooked up a Linux computer to a DisplayPort monitor and encountered only a flickering or blank screen, we’ve got good news for you. A graphics...
Read 0 Comments

Enterprise Container DevOps Steps Up its Game with Kubernetes 1.6

Managing containers isn't easy. That's where such programs as Docker swarm mode, Kubernetes, and Mesosphere can make or break your containers initiatives....
Read 0 Comments

Chain of Command Example

The idea is that a cache is often first because it's so fast. We can, of course, write a giant master function with other functions.. One objective of the...
Read 0 Comments

Trivial Transfers with TFTP, Part 1: Why Use It?

Sometimes we find ourselves using technologies that -- although we may not realize it -- stem from way back in the history of the Internet. The other day, I...
Read 0 Comments

Cloud Foundry Launches Its Developer Certification Program

Cloud Foundry, a massive open source project that allows enterprises to host their own platform-as-a-service for running cloud applications in their own data...
Read 0 Comments


Click Here!