News

rich-bowen-linuxcon.png

Rich Bowen OpenStack
Rich Bowen of Red Hat provided a high-level view of OpenStack as a software project, an open source foundation, and a community of organizations in his talk at LinuxCon North America.

Exactly What Is OpenStack? Red Hat's Rich Bowen Explains

You've probably heard of OpenStack. It's in the tech news a lot, and it's an important open source project. But what exactly is it, and what is it for? Rich Bowen of Red Hat provided a high-level view of OpenStack as a software project, an open source foundation, and a community of organizations in...
Read 0 Comments

fuzz-testing.jpg

fuzz testing
Bamvor Jian Zhang of Huawei will share some ways to improve the trinity fuzzing tool for more efficient unit tests in his upcoming talk at LinuxCon Europe.

Improving Fuzzing Tools for More Efficient Kernel Testing

Fuzz testing (or fuzzing) is a software testing technique that involves passing invalid or random data to a program and observing the results, such as crashes or other failures. Bamvor Jian Zhang of Huawei, who will be speaking at LinuxCon Europe, realized that existing fuzz testing tools -- such...
Read 0 Comments

OPNFV Begins Its Colorado Trail

OPNFV today issued its third software release, ending the agonizing six-month period in which folks had to pronounce and spell Brahmaputra. (See OPNFV Issues Third Software Release.) This latest release continues the river theme but is sensibly named Colorado: It has other advantages as well,...
Read 0 Comments

East-West Encryption: The Next Security Frontier?

Microsegmentation, a method to create secure, virtual connections in software-defined data centers (SDDCs), has already emerged as one of the primary reasons to embrace network virtualization (NV). But some vendors believe that East-West encryption of traffic inside the data center could be the...
Read 0 Comments

Unpicking the Gordian Knot Around Blockchain Patents

Earliest mentions of the term “bitcoin” in patent titles and abstracts date back to around 2009, while the term “blockchain” begins to appear in patent titles from around 2011. As of June 22, 2016, there were 492 published patent families directed to the theme of blockchain and 192 relating to...
Read 0 Comments

What is DevOps? Bridget Kromhout Explains

Bridget Kromhout can be found traveling and speaking at conferences on a variety of DevOps topics. She is a global core organizer for devopsdays and is on the program committee for Velocity in addition to organizing local tech meetups in Minneapolis. She is a Principal Technologist for Cloud...
Read 0 Comments

Red Hat Platform-as-a-Service Cloud Loves Containers

When Red Hat launched its OpenShift Platform as a Service (PaaS) cloud in 2013, the focus was on making life easier for developers. OpenShift's theme remains the same but Red Hat has made it crystal clear that developing on the cloud today means using containers. The name says it all: Red Hat...
Read 0 Comments

SDN Platforms Boron, Hummingbird Released

Seen by some as competing for supremacy in the software-defined networking (SDN) controller space, the ONOS Project and the OpenDaylight Project just released respective platforms within one day of another. Today, the ONOS Project announced its eighth quarterly platform release, called Hummingbird...
Read 0 Comments

Containerized Production Environments: Networking, Security, and Storage

So you have an application that is composed around containers. You have lightweight base images, a centralized container registry, and integration with the deployment and continuous integration (CI) pipeline — everything needed to get containers working at full scale on your hardware. For running a...
Read 0 Comments

matthew-garrett-linux-security.png

Matthew Garrett
Security of the boot chain is a vital component of any other security solution, said Matthew Garrett of CoreOS in his presentation at Linux Security Summit.

Matthew Garrett Explains How to Increase Security at Boot Time

Security of the boot chain is a vital component of any other security solution, said Matthew Garrett of CoreOS in his presentation at Linux Security Summit. If someone is able to tamper with your boot chain then any other security functionality can be subverted. And, if someone can interfere with...
Read 0 Comments

Pages

Click Here!