A survey of data scientists reveals it is not only the volume of data, but the different types of data collected that is causing storage headaches.
The Linux Kernel Might Use FreeBSD’s Capsicum Security Framework
A Linux kernel developer is working on porting FreeBSD’s CAPSICUM security framework over to the Linux kernel…
Using Udev Without Systemd Is Going To Become Harder
Since the udev code-base was merged with systemd, it’s become more difficult to use udev without systemd, but it’s only going to become incredibly difficult to handle once KDBUS has been merged into the mainline Linux kernel…
We Need Tools to Monitor the Third Generation of Software
CA’s James Harvey talks about the third generation of application software and what it means to IT administration.
Garrett: Self-Signing Custom Android ROMs
Matthew Garrett explains how to get an Android device to refuse to boot an operating system that has not been signed by the device’s owner. “It’s annoying and involves a bunch of manual processes and you’ll need to re-sign every update yourself. But it is possible to configure Nexus devices in such a way that you retain the same level of security you had when you were using the Google keys without losing the freedom to run whatever you want.“
Gartner: Worldwide PC, Mobile Device Market to Grow in 2014
Gartner says that mobile device sales are not only on the rise, but the traditional PC market is also recovering from a drop in 2013.
ScreenFetch – An Ultimate System Information Generator for Linux
We mostly rely on integrated tools in Linux to get the system information in GUI, with little or no change with the change in Desktop Environment. A classic look of GUI System information tool on my Debian Jessie. When it comes to Command Line Interface, we have commands which shows all the system…
How to Set Up Two-Factor Authentication for SSH Login on Linux
With many high-profile password leaks nowadays, there is a lot of buzz in the industry on “multi-factor” authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have “physical” access to (e.g., one-time passcode generated by their mobile phone). […]
Continue reading…
Open Source’s Identity Crisis

For Karen Sandler, software freedom isn’t simply a technical matter. Nor is it a purely ideological one.
It’s a matter of life and death.