Learn how to develop for and bring applications to the Linux environment. Get up to speed quickly with the necessary tools for Linux application development and learn about special features offered by Linux.
Students will learn KVM from the ground up with a focus on QEMU and libvirt, as well as Xen, and will understand how these and other related open source components can be assembled to create a virtual IT infrastructure. There is a focus on practical deployment skills, securing the virtual infrastructure, and administering solutions. There will also be detailed material about using containers. There are low-level lab exercises focused on virtual images and snapshots, deployment, VM creation and maintenance, integration with networking infrastructure, device pass-through and more.
Learn the methods and internal infrastructure of the Linux kernel, focussing on the important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled.
Learn the basic methods and internal infrastructure of the Linux kernel, grasping both the theoretical and practical underpinnings.
This course helps you master the tools used by system administrators in enterprise Linux environments, including maintaining software and hardware, updating, configuring, troubleshooting and securing systems, using a variety of Linux enterprise distributions.
Software Freedom Law Center, the pro-bono law firm led by Eben Moglen, Professor of law at Columbia Law School and the world's foremost authority on Free and Open Source Software law held its annual fall conference at Columbia Law School, New York on Oct. 28. The full-day program featured technical and legal presentations on Blockchain, FinTech, Automotive FOSS and GPL Compliance by industry and community stalwarts.
This course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.
When it comes to OpenStack cloud computing distributions, now offered by a variety of vendors, we are at a tipping point. As businesses and organizations demand flexible solutions for deploying cloud solutions based on OpenStack, competition is fierce. With so many vendors competing in this arena, market consolidation was bound to arrive, and it is here. What will the key differentiator be going forward? That would be support.
Security of the boot chain is a vital component of any other security solution, said Matthew Garrett of CoreOS in his presentation at Linux Security Summit. If someone is able to tamper with your boot chain then any other security functionality can be subverted. And, if someone can interfere with your kernel, any amount of self-protection the kernel might have doesn’t really matter.