Home Blog Page 264

Oracle Sponsors KubeCon + CloudNativeCon + Open Source Summit China 2019

Oracle is a committed and active member of the Linux community and is a gold sponsor of KubeCon + CloudNativeCon + Open Source Summit China 2019 (Shanghai, June 24-26, 2019). A founding platinum member of The Linux Foundation® and also a platinum member of Cloud Native Computing Foundation® (CNCF®), Oracle is dedicated to the worldwide success of Linux for organizations of all sizes…

Click to Read More at Oracle Linux Kernel Development

Linux Foundation Board Elects Longtime Community Members to Chair and Vice Chair

The Linux Foundation today is announcing its new Board Chair Nithya Ruff and Vice Chair Wim Coekaerts, both of whom bring a long history of contribution, collaboration and developer advocacy to their new positions. Both existing board members, these new roles will allow them to deepen their stewardship and support for Linux and open source projects across industries.

Read More »

Kubernetes 1.15 Released

The Kubernetes community has announced the release of Kubernetes 1.15, the second release of 2019. The release focuses on Continuous Improvement and Extensibility. Work on making Kubernetes installation, upgrade and configuration even more robust has been a major focus for this cycle for SIG Cluster Lifecycle. The release comes in time just before KubeCon + CloudNativeCon Shanghai, which will bring the larger cloud-native community together in China. Read more about what’s new in Kubernetes 1.15 here.

Embracing open source could be a big competitive advantage for businesses

As companies chase the transformational technologies that will deliver exponential returns, they should turn their attention from the “what” to the “how.” One type of software underpins many of the most exciting, cutting-edge innovations today, including AI, cloud, blockchain, and quantum computing: open source.

Read More »

Are Your Linux Servers Really Protected?

When thinking about IT security, one area that may not readily come to mind is the physical security of an enterprise’s servers. It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.

Read More »

Linux Kernel 5.2 Will Address Industrial Operations, Two-Factor Authentication

Currently, at release candidate 3, the Linux 5.2 kernel is coming soon and promises to offer quite a host of impressive new features and improvements. Lets take a look at some of the highlights.

New Features

Fieldbus Subsystem

One of the new features that should excite anyone who deals with automated industrial systems is the introduction of the new Fieldbus Subsystem. Fieldbus is crucial in connecting different systems in industrial environments, and with this addition, the Linux kernel can now natively communicate with field instruments (such as those used in manufacturing plants) as a part of a control system.

Read More at The New Stack »

Linux’s Broadening Foundation

It’s time to embrace 5G, starting with the Edge in our homes and hands.

In June 1997, David Isenberg, then of
AT&T Labs Research, wrote a landmark
paper titled “Rise of the Stupid
Network”
. You can still find it here. The
paper argued against phone companies’ intent to make their own systems
smarter. He said the internet, which already was subsuming all the world’s
phone and cable TV company networks, was succeeding not by being smart, but
by being stupid. By that, he meant the internet “was built for intelligence at
the end-user’s device, not in the network”.

In a stupid network, he wrote, “the data is boss, bits are essentially free,
and there is no assumption that the data is of a single data rate or data
type.” That approach worked because the internet’s base protocol, TCP/IP, was
as general-purpose as can be. It supported every possible use by not caring
about any particular use or purpose. That meant it didn’t care about data
rates or types, billing or other selfish concerns of the smaller specialized
networks it harnessed. Instead, the internet’s only concern was connecting end
points for any of those end points’ purposes, over any intermediary networks,
including all those specialized ones, without prejudice. That lack of
prejudice is what we later called neutrality.

The academic term for the internet’s content- and purpose-neutral design is
end-to-end. That design was informed by “End-to-End Arguments in System
Design”
, a paper by Jerome Saltzer, David P. Reed and David D. Clark,
published in 1980. In 2003, David
Weinberger
and I later cited both papers in
“World of Ends: What the Internet Is and How to Stop Mistaking It for
Something Else”
. In it, we explained:

When Craig Burton describes the Net’s stupid architecture as a hollow
sphere comprised entirely of ends, he’s painting a picture that gets at
what’s most remarkable about the Internet’s architecture: Take the value out
of the center and you enable an insane flowering of value among the connected
end points. Because, of course, when every end is connected, each to each and
each to all, the ends aren’t endpoints at all.

And what do we ends do? Anything that can be done by anyone who wants to
move bits around.

The web the world needs can be ours again, if we want it

People everywhere are demanding basic consumer protections.

We want our food to be healthy to eat, our water to be clean to drink, and our air to be safe to breathe.

This year people have started to demand more of the internet as well, however, there persists an expectation that on the internet people are responsible for protecting themselves. You should not have to worry about trading privacy and control in order to enjoy the technology you love. Tech companies have put the onus on people to read through their opaque terms and conditions tied to your data and privacy to use their services. The average privacy policy from a tech company is thousands of words and written at a level that often requires legal training to interpret. As such the vast majority of people don’t bother to read, and just click through these agreements trusting that the companies have their interests at heart.

Read More at blog.mozilla.org »

Linux Foundation Statement on Huawei Entity List Ruling

We have received inquiries regarding concerns about a member subject to an Entity List Ruling. [1] The Huawei Entity List ruling was specifically scoped to activities and transactions subject to the Export Administration Regulations (EAR).

Open Source Software Not involving Encryption

The Linux Foundation is a free and open source software organization whose project communities publish collaboratively developed software publicly. All software published by Linux Foundation projects is made available to the public without restrictions other than those imposed by the open source licenses. Software that is published publicly, such as open source software, is not subject to the EAR [2], and therefore not relevant to the Entity List Ruling.

Read Blog Post »

8 ways your company can support and sustain open source

Shaking hands, networking

The success of open source continues to grow; surveys show that the majority of companies use some form of open source, 99% of enterprises see open source as important, and almost half of developers are contributing back.

read more