News

opensource.jpg

OSS project
This upcoming free webinar -- from Capital One and The Linux Foundation -- will provide the necessary information to get your open source project underway with proven best practices.

Free Webinar on Starting a Collaborative Open Source Project

Starting a collaborative open source software project involves more than a great idea and the code to get it going. Much of the work involves deciding how you want your community of developers to build and evolve the code. But there’s no need to be intimidated by the process. This upcoming free...
Read 0 Comments

apache-iot.png

Apache IoT
We provide a look at some highlights of the Apache IoT track at ApacheCon North America, to be held in Miami from May 16-18.

Get a Preview of Apache IoT Projects at Upcoming ApacheCon

The countdown until ApacheCon North America has begun. The blockbuster event will be in Miami this year and runs May 16-18. The Apache community is made up of many niche communities and ApacheCon offers something for all of them. Here, Roman Shaposhnik, Director of Open Source, Pivotal Inc., who...
Read 1 Comments

Open Source Groups Provide New Licensing Resources

Newcomers to free and open source software (FOSS) might be bewildered by the variety of licenses that dictate how users can use community offerings. For example, the Open Source Initiative lists nine "popular licenses" and Wikipedia lists dozens more coming in a variety of flavors for different...
Read 0 Comments

New Strain of Linux Malware Could Get Serious

A new strain of malware targeting Linux systems, dubbed "Linux/Shishiga," could morph into a dangerous security threat. Eset on Tuesday disclosed the threat, which represents a new Lua family unrelated to previously seen LuaBot malware. Linux/Shishiga uses four different protocols -- SSH, Telnet,...
Read 0 Comments

Compose your Infrastructure, Don’t Micromanage It

TLDR: Leverage Kubernetes annotations across your cluster to declaratively configure management of monitoring and logging. Two of the largest surfaces of applications that make contact with infrastructure are monitoring and logging, and this post talks how to approach both these needs in a scalable...
Read 0 Comments

What's a Service Mesh? And Why Do I Need One?

tl;dr: A service mesh is a dedicated infrastructure layer for making service-to-service communication safe, fast, and reliable. If you’re building a cloud native application, you need a service mesh! Over the past year, the service mesh has emerged as a critical component of the cloud native stack...
Read 0 Comments

How to Get Started Learning to Program

There's a lot of buzz lately about learning to program. Not only is there a shortage of people compared with the open and pending positions in software development, programming is also a career with one of the highest salaries and highest job satisfaction rates. No wonder so many people are looking...
Read 0 Comments

workstation-security.jpg

Backup and storage
Safe and reliable backups are a must for all system administrators. Here are some guidelines to consider for your own peace of mind.

How to Safely and Securely Back Up Your Linux Workstation

Even seasoned system administrators can overlook Linux workstation backups or do them in a haphazard, unsafe manner. At a minimum, you should set up encrypted workstation backups to external storage. But it’s also nice to use zero-knowledge backup tools for off-site/cloud backups for more peace...
Read 0 Comments

Release Update: Prometheus 1.6.1 and Sneak Peak at 2.0

After 1.5.0 earlier in the year, Prometheus 1.6.1 is now out. There’s a plethora of changes, so let’s dive in. The biggest change is to how memory is managed. The -storage.local.memory-chunks and -storage.local.max-chunks-to-persist flags have been replaced by -storage.local.target-heap-size. ...
Read 0 Comments

Google Zero-Trust Security Framework Goes Beyond Passwords

With a sprawling workforce, a wide range of devices running on multiple platforms, and a growing reliance on cloud infrastructure and applications, the idea of the corporate network as the castle and security defenses as walls and moats protecting the perimeter doesn’t really work anymore. Which is...
Read 0 Comments

Pages

Click Here!