Red Hat CEO Jim Whitehurst sees the business opportunity of a generation in what he calls a computing paradigm shift from client server to cloud architectures. “In those paradigm shifts, generally new winners emerge,” says Whitehurst and he intends to make sure Red Hat is one of those winners. His logic is sound and simple: disruptive technologies like the cloud that arise every couple decades level the playing field between large, established firms and smaller, innovative challengers since everyone, from corporate behemoth to a couple guys in a garage, starts from the same spot and must play by the same unfamiliar and changeable rules. With the cloud “there’s less of an installed based and an opportunity for new winners to be chosen,” Whitehurst adds. His mission is “to see that open source is the default choice for next generation architecture” and that Red Hat is the preferred choice, particularly for enterprise IT, of open source providers.
CyanogenMod 11.0 M7 Released
The CyanogenMod 11.0 M7 release is now available. Changes this time around include an overhaul of the theme chooser, a new calculator app, incorporation of ffmpeg for wider media format support, and more. “To get ahead of the inevitable questions, this release is based on Android 4.4.2. The 4.4.3 source has been merged into CM for nightlies, but given the source code was only made available last week, we chose not to rush the new code into the stable branch.“
Take Raspberry Pi, Build Your Own Private Cloud
A start-up is working on a Raspberry Pi-based network attached storage device that can be used to set up a private cloud.
Linux Basics: How To Install SSH Keys on the Shell
Linux Basics: How To Install SSH Keys on the Shell
SSH keys offer a highly secure manner of logging into a server with SSH as against mere dependence on a password. While a password stands the risk of being finally cracked, SSH keys are rather impossible to decipher using brute force. As a matter of fact, generating a key pair offers users two lengthy strings of characters corresponding to a public as well as a private key. Users can, thus, place the public key on any server, and subsequently unlock the same by connecting to it with a client that already possesses the private key. Upon matching up of the two keys, the system unlocks without any irksome dependence on a password. The security may be further smartly firewalled by guarding the private key with a passphrase.
How to Set Up Internet Connection Sharing With Iptables on Linux
In this tutorial, I’ll explain how to share a single Internet connection among multiple devices on Linux. While consumer-grade WiFi routers have become mainstream nowadays, making this problem a non-issue, suppose you don’t have one at home. However, say you have a Linux box already assembled with a modem and a LAN card. The modem […]
Continue reading…
The Land Where Skilled IT Workers Don’t Pay Tax. Yes, it Really Exists
Some countries in Eastern Europe have opted for an innovative way to hang onto their most talented IT staffers.
Has Microsoft Really Changed Its Attitude Toward Open Source?
Okay, I hate to be a Negative Ned here, but I’m firmly in the “trust but verify” camp when it comes to Microsoft and open source
Top 7 Desktop Environment for linux
Hi, This article is to update you regarding what are the desktop environment are there you should aware of. Standard Linux circulations regularly default to one of two desktop environments, KDE or GNOME. Both of these give clients an instinctive and attractive desktop, and also offering a verity of media inbuilt softwares, system programs, games, utilities, web development tools, programming tools and so on. These two desktops center all the more on giving clients a cutting edge computing environment with all the accessories emphasized in Windows OS, instead of minimizing the measure of system resources they require.
Storage Industry May Have Reached a Notable Tipping Point
NEWS ANALYSIS: The cloud has set in and a new, more distributed environment is controlling the storage landscape.