News

workstation-security-githubpub-linuxcom-hero-2.jpg

Workstation Security Checklist
In this new blog series, we’ll lay out a set of baseline recommendations for Linux workstation security to help systems administrators avoid the most glaring security errors without too much inconvenience.

3 Security Features to Consider When Choosing a Linux Workstation

Learn how to work from anywhere and keep your data, identity, and sanity. DOWNLOAD NOW If your systems administrators are remote workers, you may wish to establish a set of guidelines to help ensure that their workstations pass core security requirements. This will help reduce the risk that they...
Read 0 Comments

john-hawley-elc.png

John Hawley
John “Warthog” Hawley, Intel’s evangelist for the MinnowBoard SBC, surveyed key open hardware trends at the Embedded Linux Conference Europe.

Open Source Hardware: From SBCs to Servers

When you mention open source hardware, people typically think about community-backed hacker boards. However, the open hardware movement is growing on many fronts, including medical devices, rocketry and satellites, 3D printers, cameras, VR gear, and even laptops and servers. At the Embedded Linux...
Read 0 Comments

The Logical Happens: Open-O Merges with ECOMP

We’ve noted in the past that two Linux Foundation open source projects seemed to be working on similar things: The Open-O project and open source ECOMP. Today, the Linux Foundation announced that the two groups are merging. The new name for the combined group is the Open Network Automation Platform...
Read 0 Comments

10 Most Common Reasons Kubernetes Deployments Fail (Part 1)

I've catalogued the most common reasons Kubernetes Deployments fail, and I'm sharing my troubleshooting playbook with you! Without further ado, here are the 10 most common reasons Kubernetes Deployments fail: 1. Wrong Container Image / Invalid Registry Permissions Two of the most common problems...
Read 0 Comments

Today's Leading Causes of DDoS Attacks

Last fall, we saw the biggest distibuted denial of service (DDoS) attack ever. This year we'll see even bigger ones. According to Akamai's latest State of the Internet Security report, here's what's behind them. First, you should know that while the total DDoS attacks only increased by 4 percent...
Read 0 Comments

How to Contribute to Open Source

Want to contribute to open source? Here's a guide to making open source contributions, for first-timers and for veterans, including: Why contribute to open source? What it means to contribute How to orient yourself to a new project Finding a project to contribute to And more... Read more at GitHub
Read 0 Comments

Valve Launches SteamVR Support for Linux

Valve has been giving Steam users Linux love since 2012, and it's not stopping with VR. The company just launched SteamVR for Linux, letting developers create Linux content for the HTC Vive VR headset, trackers and other hardware. The program is in beta, meaning developers must use an NVIDIA...
Read 0 Comments

china-mobile.jpg

China Mobile
China Mobile is one of the biggest telecom companies in the world, with more than 800 million users in China -- all of whom are served with open source technologies.

How China Mobile Is Using Linux and Open Source

China Mobile is one of the biggest telecom companies in the world, with more than 800 million users in China -- all of whom are served with open source technologies. During the 2016 Mobile World Congress, China Mobile declared that the operational support system running their massive network would...
Read 0 Comments

eduardo-silva-container-logging.png

Eduardo Silva
Eduardo Silva, a software engineer at Treasure Data, gave a crash course in distributed logging during his keynote at CloudNativeCon last November.

Distributed Logging for Containers

The era of microservices calls for a new approach to logging with built-in infrastructure for both aggregation and storage. Multiple applications running in isolated containers require a specialized approach to make sure all data is collected, stored and usable later. Eduardo Silva, a software...
Read 0 Comments

Evolution of Business Logic from Monoliths through Microservices, to Functions

The whole point of running application software is to deliver business value of some sort. That business value is delivered by creating business logic and operating it so it can provide a service to some users. The time between creating business logic and providing service to users with that logic...
Read 0 Comments

Pages

Click Here!