Home Blog Page 1435

Data Storage Demands Complicated by Data Variety

A survey of data scientists reveals it is not only the volume of data, but the different types of data collected that is causing storage headaches.

Read more at eWeek

The Linux Kernel Might Use FreeBSD’s Capsicum Security Framework

A Linux kernel developer is working on porting FreeBSD’s CAPSICUM security framework over to the Linux kernel…

Read more at Phoronix

Using Udev Without Systemd Is Going To Become Harder

Since the udev code-base was merged with systemd, it’s become more difficult to use udev without systemd, but it’s only going to become incredibly difficult to handle once KDBUS has been merged into the mainline Linux kernel…

Read more at Phoronix

We Need Tools to Monitor the Third Generation of Software

CA’s James Harvey talks about the third generation of application software and what it means to IT administration.

Garrett: Self-Signing Custom Android ROMs

Matthew Garrett explains how to get an Android device to refuse to boot an operating system that has not been signed by the device’s owner. “It’s annoying and involves a bunch of manual processes and you’ll need to re-sign every update yourself. But it is possible to configure Nexus devices in such a way that you retain the same level of security you had when you were using the Google keys without losing the freedom to run whatever you want.

Read more at LWN

Gartner: Worldwide PC, Mobile Device Market to Grow in 2014

Gartner says that mobile device sales are not only on the rise, but the traditional PC market is also recovering from a drop in 2013.

ScreenFetch – An Ultimate System Information Generator for Linux

We mostly rely on integrated tools in Linux to get the system information in GUI, with little or no change with the change in Desktop Environment. A classic look of GUI System information tool on my Debian Jessie. When it comes to Command Line Interface, we have commands which shows all the system…

Read more at TecMint

How to Set Up Two-Factor Authentication for SSH Login on Linux

With many high-profile password leaks nowadays, there is a lot of buzz in the industry on “multi-factor” authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have “physical” access to (e.g., one-time passcode generated by their mobile phone). […]
Continue reading…

    Read more at Xmodulo

    Open Source’s Identity Crisis

    Free and open source software

    For Karen Sandler, software freedom isn’t simply a technical matter. Nor is it a purely ideological one.

    It’s a matter of life and death.

    read more

    Read more at OpenSource.com

    Kernel Prepatch 3.16-rc4

    Linus has released the 3.16-rc4 prepatch. “Things have calmed down nicely, and everything seems pretty normal.

    Read more at LWN