Home Blog Page 394

Good Compliance Practices Are Good Engineering Practices

Ibrahim Haddad: It is true that open source software has to a large extent simplified the process of software procurement. The traditional procurement model for proprietary software has always been heavy on the front end, as it involves trial and evaluation, negotiation related to possible customizations, licensing terms, fees, and several other factors. With open source, it is still true that you should evaluate the software, compare it to other possible alternatives, and evaluate if the license of that software is in line with how you plan to use it.

However, this is generally the extent of the initial effort. Once you ship a product, you then must demonstrate that you have respected the terms of the licenses attached to the open source components. That may mean providing a written office, publishing all copyright, attribution and license notices, and/or making available source code including any modifications you have introduced.  Obligations will vary based upon the terms of the open source license and how the code is used.

Companies must make open source compliance an engineering priority, as it is the best way to display their fulfillment of the license obligations. 

Read more at The Linux Foundation

Alphabet’s Outline Software Lets Anyone Run a Homebrew VPN

A VIRTUAL PRIVATE network, that core privacy tool that encrypts your internet traffic and bounces it through a faraway server, has always presented a paradox: Sure, it helps you hide from some forms of surveillance, like your internet service provider’s snooping and eavesdroppers on your local network. But it leaves you vulnerable to a different, equally powerful spy: Whoever controls the VPN server you’re routing all your traffic through.

To help solve that quagmire, Jigsaw, the Alphabet-owned Google sibling that serves as a human rights-focused tech incubator, will now offer VPN software that you can easily set up on your own server—or at least, one you set up yourself, and control in the cloud. And unlike older homebrew VPN code, Jigsaw says it’s focused on making the setup and hosting of that server simple enough that even small, less savvy organizations or even individual users can do it in minutes.

Read more at WIRED

Kubernetes: The “Distributed” Linux of the Cloud

Kubernetes is the first CNCF project to graduate — this means it is “mature and resilient enough to manage containers at scale across any industry in companies of all sizes.” We talked with Chris Aniszczyk, COO of CNCF about Kubernetes’ popularity, what’s next for this technology and what other projects are in line for graduation.

JAXenter: Kubernetes recently became the first CNCF project to graduate. What does this mean for CNCF and what’s going to change now that Kubernetes graduated?

Chris Aniszczyk: The CNCF Technical Oversight Committee (TOC) voted for Kubernetes to become CNCF’s first project to graduate as it has proven to be mature and resilient enough to manage containers at scale across any industry in companies of all sizes. 

Read more at Jaxenter

Enhanced FTP

LFTP is an alternative to the FTP command set, which supports many protocols and offers countless parameters.

Although pretty much outdated, the File Transfer Protocol (FTP) still plays a significant role. For 20 years, LFTP has offered a greatly expanded command set for the command line that handles secure transmissions, without being excessively difficult to handle.

FTP dates back to 1985. Designed for transferring files between two computers, FTP is a relic from the infancy of modern IT. Today it has lost much of its former importance, not least because of some serious security problems: It neither encrypts the FTP username and password, nor protects the data against manipulation during transfer.

FTP via SSL (FTPS) or SSH (SFTP) counteracts these weaknesses. The two methods are considered to be equally secure, and they encrypt both data and metadata during transmission. In most cases, SFTP proves to be more flexible and much simpler in practice.

Read more at Linux Magazine

Google Skaffold Automates Kubernetes Orchestration

Google is throwing an automation tool to developers looking to use Kubernetes to orchestrate enterprise applications. That assistance is coming from a command line tool dubbed Skaffold that can help continuous development for Kubernetes applications.

Vic Iglesias, a solutions architect at Google, noted in a blog post that Skaffold allows developers to more closely mirror production methods within an enterprise. It does this by allowing developers to work on application source code in their local environment. That code can then be updated and ready for validation and testing in the developer’s local or remote Kubernetes clusters.

Read more at SDxCentral

Keynote: A Conversation with Linux and Git Creator Linus Torvalds

Linus Torvalds at Open Source Summit: “In the kernel community, we’ve come to the realization that it’s not about the small guy against the companies; it’s about collaboration.”

Building Helm Charts From the Ground Up: An Introduction to Kubernetes

Helm can make deploying and maintaining Kubernetes-based applications easier, said Amy Chen in her talk at KubeCon + CloudNativeCon.

 

Linux Powered Autonomous Arctic Buoys

At Embedded Linux Conference Europe, Satish Chetty explained his work on a Linux-driven sensor buoy deployed to monitor sea ice off the north coast of Alaska.

 

State of AGL: Plumbing and Services

Konsulko’s Matt Porter and Scott Murray ran through the major components of the AGL’s Unified Code Base at Embedded Linux Conference Europe.

Read more

uniprof: Transparent Unikernel Performance Profiling and Debugging

In this talk from Xen Summit, Florian Schmidt, a researcher at NEC Europe, describes uniprof, a unikernel performance profiler that can also be used for debugging.