Home Blog Page 672

Eben Moglen on GPL Compliance and Building Communities: What Works

Software Freedom Law Center, the pro-bono law firm led by Eben Moglen, Professor of law at Columbia Law School and the world’s foremost authority on Free and Open Source Software law held its annual fall conference at Columbia  Law School, New York on Oct. 28. The full-day program featured technical and legal presentations on Blockchain, FinTech, Automotive FOSS and GPL Compliance by industry and community stalwarts.

The program culminated in remarks by Moglen that highlighted the roles of engagement and education in building effective, ever-lasting communities. While expressing his gratitude to his colleague, friend and comrade Richard M. Stallman, Moglen emphasized the positive message relayed by Greg Kroah-Hartman and Theodore Ts’o –earlier in the day– for creating win-win solutions and spreading users’ freedom.

Here is a video and the transcript of his remarks.

Transcript:

I know that the very worst thing you can do is to assign yourself the speech between the end of the conference and the drinks. The only sensible use for this time is the thanks, which I will of course get to in just a moment. I am going to trench upon your patience just for a little while for some substantive thoughts that this afternoon raised for me.

As you can see, I have had a plan for today, which was a plan about how the law of free software interacts with the technical future. There was a particular point, which was to discuss not just blockchain in itself, but the nature of the coming change in how we think about data that we share. I wanted to point to the software engineering consequences of that change for free software itself.

The other subject that we have been talking about today—which I think is crucial to the combination of ideas we have presented here—is the particular form the discussion about copyright compliance and license violation has now entered. I wanted to talk to you about this subject even before some events I referred to this morning, which have brought it into yet sharper relief for me.

We are not and we never were copyright maximalists. We did not do what we have been doing for the past 30 years to build free software on the basis of the assumption that freedom required us to chase down and punish everybody who ever made a mistake or who even deliberately misused copyrighted software made for sharing.

When I began to work with Richard Stallman in 1993, GPLv2 was 18 months old. And although I had been thinking about what all of this meant for some little while, I was working on making the world safe for public key encryption, so the free software copyright licensing system was something of which I was only dimly aware.

And in the course of the first crypto wars, Richard Stallman contacted me, said he had a problem and could I help him with it. And I said, “Yes. I use emacs every single day, and it will be a very long time before you exhaust your entitlement to free legal help from me.”

So I went and did what he needed done, and then I thought to myself, “this is the most important place for a lawyer to work right now.”

“If I could just sit on Richard Stallman’s email stream and have him send me what he thinks needs a lawyer—because anybody in the world who had a problem that involved freedom and computers knew one email address, and that was rms@gnu.org—pretty soon I could figure out what it was that actually needed doing.”

Very rapidly I realized that what needed doing was getting people to spontaneously comply with law instead of having to fight them each and every time.

Spontaneous compliance is the only conceivable way to run a legal system, I must tell you. The United States is a country with an extraordinary amount—apparently—of complaining about taxes every four years or every two. But every year, Americans pay their taxes, and they don’t do it because they see crowds of people sent to jail. They do it because spontaneous compliance is the way law really works.

The problem of legal engineering which presented itself to me in 1993 and the problem we are still talking about this afternoon is how to ensure spontaneous legal compliance, not how to figure out an adequate degree of coercion which will make an adequate degree of compliance at the other end.

The fundamental problem as it presented itself to me in 1993 is the problem as it still presents itself to me now. Coercion does not work if you have to do so much of it that you can’t afford it. And coercion only works so long as you never lose any fight anywhere, which is why you have to keep equipping your police with bigger and bigger guns and there is always the risk that they will use them.

I did not want then and I do not want now to pretend that the way that we secure compliance with copyright law with respect to free software is by chasing down people and making them comply.

It is important every once in a while to set an example. Therefore it is important every once in a while to declare that you’re in a last- resort situation, and there’s nothing else that you can do but to resort to litigation.

I understand that, at the present time, there are a large number of people who are living in that expanding boundary of free software use and redistribution that we have all been talking about. Given where they work—the particular software they work on, the particular forms of downstream use that are most important to them—they run into infringement situations in this outer boundary area, and they therefore believe that everybody in the world doesn’t get it about free software, and even that everybody in the world is a crook and that everybody in the world is trying to steal free software and make bad use of it.

What I thought was so important about Greg [Kroah-Hartman] and Ted [T’so] and the point that they came here to make today was this: they say that if you are sitting in the middle of the single most commercially valuable free software project in the world, and you have thousands of people helping you to make it, fighting with every single infringing person is not the way to win.

Converting every single person is the way to win. Fighting can only conceivably be valuable if it is on the way to converting people. It cannot possibly stand on its own.

I have some fine clients and wonderful friends in this movement who have been getting rather angry recently. There is a lot of anger in the world, in fact, in politics. Our political movement is not the only one suffering from anger at the moment. But some of my angry friends, dear friends, friends I really care for, have come to the conclusion that they’re on a jihad for free software. And I will say this after decades of work—whatever else will be the drawbacks in other areas of life—the problem in our neighborhood is that jihad does not scale.

What we have been hearing this afternoon from the lawyers I have been friends and colleagues and occasional professional adversaries with over these decades is that in the industrial use of free software scale is what matters. And we on our side in the community of free software makers have to understand that scale is what matters to us too.

The problem with jihad is not that it’s not virtuous or that making people obey the rules is somehow wrong. I like policemen and police forces a lot. But I know that the amount of policing necessary to produce perfect compliance is an amount of policing we can neither afford nor tolerate in the society where we live.

So regrettably, I have to draw some factual conclusions to your attention:

First, if at any time in our long association over the past 23 years—this century, last century, it doesn’t matter: If Richard Stallman and I had gone to court and sued a major global public company on a claim of copyright infringement that was weak enough to be thrown out of court on a motion to dismiss, we would have destroyed the GPL straightaway. If we had shown that we were prepared to risk large on coercion, even against a bad actor in our own judgement—if we had done that without adequate prepa- ration to be sure that we won—we would have lost an example of coercion and nobody would have trusted us again. I did sue people. It’s true.

Greg referred to the way in which when the busybox developers thought they wanted to start suing and I did it for them, the results may not have been the ones they most wanted. That happens with clients all the time, particularly clients who go to court: They get something which is not quite what they wanted. But I thought that it was important then because busybox was being embedded in everything. And in the moment at which we were then living, in which the frontier of use and redistribution was expanding so rapidly, it seemed to me that it was necessary to get people’s attention.

And I thought then, as I think now, that the people whose attention you need to get are the people who don’t pick up the phone when you call them.

We thought that people you can’t contact, people you can’t get to answer the phone, people who will never spontaneously comply—they won’t even answer your mail—may be the right people to make an example of.

But on the night before we filed the busybox cases in 2009, I chased down in Japan at 2:00a.m. the general counsel of one of the organizations we were going to sue the next day—a very large very powerful, very reputable company.

And I said to him, “If you give me your personal assurance that you’re going to fix this problem, tomorrow you will not be sued. I will take your word for it. Nothing more.”

And he said yes, and I said yes. And they were not sued the following day because all we wanted was for people to pay attention and bring their engagement to the party. Even at that level, too much coercion—and we are still arguing about whether that was enough or too much—too much coercion was surely not what I wanted to apply.

Second: If when Scott and Terry and their colleagues at IBM and Hewlett- Packard first began to come to free software, when they first wanted to recommend it and use it and maybe even distribute it themselves or encourage other people to distribute it for them, we had criticized them for not being non-profit virtuous enough, if we had said “we are suspicious of you,” let alone if we had threatened, “one step over the line buster and we will sue you”—everything else that we wanted to do would have become impossible immediately.

If we had not acted as Greg and Ted said that they must act on behalf of the great project that we all love, if we had not welcomed everybody with open arms and made clear that the commercial exploitation of the software was our hope not our fear, we would have achieved absolutely nothing that really mattered to use about freedom.

Third: We spent years scrupulously getting work-for-hire disclaimers from every business and every university that employed or educated a contributor to GNU. Every time we took a right, we took a disclaimer to be sure. If there was any question that anybody needed to be contacted, we negotiated those disclaimers as long and as carefully as it took. The people who gave us work-for-hire disclaimers, they didn’t “get” free software, I assure you. They were simply being asked to say that it wasn’t work-for-hire, that some programmer who worked for them was working on a project in her or his spare time.

But suppose we hadn’t gotten those disclaimers—suppose we hadn’t proved to everybody that we were not trying to solicit rights on which they had a claim—if we had, for example, gone around and asked people to give us rights and software they had written while working at other companies, without every talking to those company’s lawyers. In that case not only would we have destroyed all trust, not only would we have made it absolutely impossible to achieve what we really wanted, I would have put my law license in danger. I think that all three of those are uncontroversial propositions.

But in case you’re inclined to doubt any of those propositions, I have to tell you that people in my world, people in my neighborhood, people in my movement, people in many cases whom I trained, have conducted those same experiments over the last two years. The results have not been any different than I would have expected. We have created for ourselves some troubles. And there are other people out there creating troubles for us.

Here [shows slide] is a current NSF funding solicitation for a free software-intended project. NSF is in fact soliciting a research funding application from a client of mine which makes free software. And this solicitation is designed to support them. Except it isn’t, because they’re a GPL’ed project:

All projects agree to distribute all source code that has been authored while working on an NSF/BigCorp award under a BSD, Apache or other equivalent open source license. Software licenses that require as a condition of use, modification and/or distribution that the software or other software incorporated into, derived from or distributed with the software be licensed by the user to third parties for the purpose of making and/or distributing derivative works are not permitted. Licenses not appropriate thus include any version of GNU General Public License (GPL) or Lesser/Library GPL (LGPL), the Artistic License (e.g., PERL), and the Mozilla Public License.

Don’t even think of applying for research funding if you’re going to make copyleft free software.

Now if you think that that’s a little much, how about this, from the same solicitation?

Awardees may file patent applications, providing that they grant to BigCorp a non-exclusive, worldwide, royalty-free, sub-licensable license to all intellectual property rights in any inventions or works of authorship resulting from research conducted under the joint award. So, as it turns out, not only can you patent some software here but all your intellectual property rights—that is including your copyright since it’s all works of authorship—will be non-exclusively licensed to Big Corp. I have changed Big Corp’s name to protect the theoretically innocent.

This is a current DARPA funding solicitation also for a project that makes free software:

The program will emphasize creating and leveraging open source technology and architecture. Intellectual property rights asserted by proposers are strongly encouraged to be aligned with non- viral open source regimes. Exceptions for proprietary technology will be considered only in compelling cases. Make sure to carefully document and explain these reasons in submitted proposals.

Once again, you are strongly urged to make wonderful open source software under this award. Don’t think of using copyleft. We don’t want you to. So have to put a special explanation in the grant request, which is of course equivalent to “thanks but no thanks.”

This I must tell you: if you want to talk about curing cancer, cure this for me. This is more dangerous than all the copyright infringement by accident or de- liberation occurring out there in the free software world right now. This will make copyleft wither away.

Because throughout the research infrastructure in this wonderful great country of ours, if copyleft is not allowed, then a whole generation of the most talented people we work with will come to the conclusion— before they get their BA, before they get their doctorate, or before they decide to go and do something in industry—they will already have concluded that there is something wrong with copyleft and you shouldn’t use it.

I don’t know any way to sue this out of existence. I don’t know any way to deal with this militarily. This is a diplomatic challenge. This is a diplomatic challenge that requires lawyers who know how to do this work, which is not done by lawyers who sue people.

It is not about coercion. It is not even about encouraging people to convert. It’s about reversing a problem that we have partially brought on ourselves and which other people are taking advantage of “bigly,” if you ask me.

This is where the limits of counseling meet the limits of coercion: the real answer is that you have to have a great big ecosystem and everybody has to believe in it. Or else you have to have as many lobbyists as BigCorp, and they have to be spread all over the research infrastructure, assuring copyleft’s future.

So what I want to say about all of this is that we are now at a turning point. The good news of today is that this turning point should carry us all from the stages of fear and compliance to the stages of engagement and leadership. We are now actually ready. I don’t mean ready plus or minus three years or ready plus or minus the regulators of fintech. I mean we are ready now with, SPDX and OpenChain and better tooling and Debian machine-readable copyright files that read on everything that everybody really uses. We are ready to begin to reduce the costs of compliance and lowering the costs of finding how to comply, to a level which really will allow us to do what Greg and Ted were talking about: country-by-country and commercial environment- by-commercial environment all around the world, making things just work.

I remember how much Nokia admired Apple for the just-works zen of it all. I agree with [Jeremiah Foster] that it is awfully good that we got their Maemo development off the floor and into things like cars, because it was wonderful stuff. I’m not going to tell stories now about how hard it was to try to get Nokia not to fly into the side of the mountain with that stuff back in 2010. It was a sad experience.

But what we have now is the opportunity to avoid all the evolutionary dead ends that ever beset us.

We have an opportunity to put this free software where we want it, which is everywhere, and to make it do what we want, which is to spread freedom.
We’re not in a place where the difficulty is how do we get enough ammunition to force everybody to comply.
We don’t need ammunition.
We need diplomacy.
We need skill.
We need to work together better.
We need to understand how that working together purposively brings us to the point where everyone is not afraid of FOSS anymore and we are not worried about their complying anymore.
We are just all engaging and leading the task of making free software.

But I have to convince a lot of people of that, and not all of them are on the so-called other side.

That process is going to be a complicated one It’s going to take a couple of years. We have some backing up to do and some moving forward to do at the same time. And although anarchism is good at moving in many directions simultaneously, it is not always good at understanding where it has to back up and where it has to move forward.

But this will make us.

Because the long-term threats to copyleft are not to be found in people who aren’t doing it quite right. The long-term threats to copyleft are not to be found in the idea that too many people are getting away with too much and we have to go and get on our motorcycles and run them down and pull them over to the side of the road and give them a ticket. That’s simply not the model that is relevant right now. And not everybody fully understands that.

So from my point of view, the purpose of today—with blockchain, and thinking about what the lawyering we’ve all done for decades means, and the purpose of talking to the clients about what they really need—is to make the point that we are not going to war to save the GPL.

That’s not where we are right now. We’re not even going to war to save copyleft right now. We are certainly not going to war to save any projects right now. That’s just destroying the village in order to save it. And we’ve never been that kind of lawyers. And we’re not going to become that kind of lawyers.

What we do have is a real problem in deciding how to make copyleft relevant forever. There are a lot of smart people in this room who in their quiet moments face- to-face with me or with other people here have been known to say, ”You know, I think copyleft might be becoming irrelevant now.

”It was good. It put some principles deep in everybody’s minds. It gave everybody a real sense about what our aspirations are.

“But from an operational point of view, we don’t need it anymore.”

I fear that copyleft’s most powerful supporters have helped to bring people to that conclusion. The purpose of today—even before news reached me from the outer world—the purpose of today was to say that’s also not where we are.

Where we are is: copyleft is a great idea that changed the world. It needs refreshment now in order to appeal to a younger generation of people who write programs for sharing.
In order to make it appeal to those people who write programs for sharing, we need to make it simpler to use, quicker to understand, and better at doing all the jobs it’s supposed to do. And we need to refrain from going unnecessarily to war.

The lessons that we learned over the last quarter century are still good: That way won’t work. I agree with the people who have suggested that if a campaign of coercive compliance is carried just a moment too far, willingness to use copyleft among the rational businesses of the world will decline to a point which is dangerous to freedom, because I do believe that copyleft is important to freedom.

Indeed, I think it’s crucial to freedom. Indeed, that’s what I was taught by the greatest computer programmer I’ve ever known.

So my point here—if it’s okay just to have a point when people should already be drinking and dancing—my point is let’s not get confused. This is not war time. This is diplomacy time. Skill counts. Agility counts. Discretion counts. Long credibility counts. Ammunition? Ammunition is worthless because wherever we fire it, we work everywhere and it’s only going to hit us.

*****
Now I don’t have to keep us much longer, because what is left is thanks. My thanks of course begin with the people I work with, without whom all of this would not be possible.
I’ve trained a lot of lawyers, and I choose carefully whom I work with, or at least I believe I do, which means I’m right about half the time.

But with Mishi I am right 100% of the time. I have a legal director and a law partner and a partner in policy-making around the world who teaches me every single day, and who I deeply believe will be here when I have fallen under the bus. There’s no kind of gratitude like the gratitude of knowing that you’ve got a partner who’s got your back.

To Daniel Gnoutcheff, who has spent all day long making everything work. Daniel’s job is running our network and keeping our firewall up and keeping the NSA out and easy stuff like that. When I say to him, “so you’re a multimedia guy and you’re running a conference, and everything will work and the stream will be perfect and we will do free software video streaming and live audio,” he says, “Okay, that’s true.” You understand why I need to thank him particularly. I saw him leave our internal IRC channel this morning at 1:25a.m. and I thought, “he’s going to be back at 8:15?” Thank you.

Tanisha Madrid, who keeps our money and our time and who had to go and get her two kids after she had to go and drop them off this morning on the way in order to be here at 8:15a.m. too—she won’t be on the stream, but my deepest thanks.

To my associate Daniel Byrnes, who is now learning the trade with us and who is still a really good front-end HTML5 programmer and therefore helps me with what we need to do in that respect.

To Alice Wang and our other apprentices and hangers-on and people who have helped today, I can’t tell you how important it is that we can just do a thing and people will turn up and help.

All of that is part of what I need to say. Now, I am a guy who needs a personal assistant. I have gotten to the stage where I really am quite incompetent in the world. Michael Weholt came to me earlier this fall, and I think he thought that he could probably do the job. And then we said, “Oh and by the way, you’re putting on a conference.” And he said, “well I’ve never put on any conferences, but as long as it’s not the Academy Awards.” And of course it isn’t the Academy Awards, although here I am talking at midnight. Michael deserves a special round of thanks because he was worried as hell about it and he’s made everything work.

Once again to Keith Bergelt and OIN and to David Marr and Qualcomm Technology Industries, I’m grateful for particular support in making sure that there was sufficient free food and will be sufficient free beer.

But I do have one more thing to say; I do have one more kind of thanks to offer. And they are to me the deepest—and today at least—the most moving thanks of all. I cannot stand here before you without ending with my thanks to Richard Matthew Stallman. He invented the world I live in.

Years ago, Larry Lessig said that Richard Stallman had invented the twenty-first century. And I said, well, that may or may not be true, but any twenty-first century Richard Stallman did not invent is a twenty-first century I won’t consider it safe to live in. And that’s still true.

To my comrade, to my client, to my friend Richard Stallman: my deepest and most determined thanks. There is nothing, nothing in the world, that could ever divide us as much as we have been brought together by the dream that we have shared and that we continue to give our lives to. It could not have happened without one man’s thinking.

At Red Hat, there used to be—back in the old days before the Progress Energy Tower and all the wonderful things that have followed from Red Hat’s commercial success, back when it was just barely not Bob Young’s and fully Matthew Szulik’s—there used to be up on the wall in the reception area a painted motto. It said “Every revolution begins as an idea in one man’s mind,” which is a quotation from Ralph Waldo Emerson.

And deep in the American grain—as deep in the American grain as Ralph Waldo Emerson himself—is Richard Stallman, whose dream it was that made the revolution I’m still trying to kick down the road towards some finish line or other I won’t live to see. To him, to you, to all of us—to the people who have made this stuff, to the people who have shared the stuff, to the people who have rolled up the barbed wire and carried it away so we could all just do the work and not have to worry about it—to my friends, to my clients, to the lawyers who have inspired me to teach them, my deepest and most unending gratitude.

Thank you all for coming. Thank you for being here. Thank you for considering coming back, when next year, as Greg Kroah- Hartman says, we’ll talk about free software licensing and machine learning.

Until then, happy hacking.

Building a Trusted Open Source Software Supply Chain With OpenChain

There are many examples of collaboration all around us that stretch far beyond the type of collaboration in open source projects. As preparation for her keynote at LinuxCon Europe, Jilayne Lovejoy, Principal Open Source Counsel at ARM, watched a TED talk by Rodney Mullen and was inspired by how he talked about collaboration within the skateboarding community where he compared it to hackers within the open source community.

Lovejoy says, “You’d think the people in this room had an invented the whole concept of collaboration, but you can actually find examples of collaboration all around us, like in the way skateboarding evolved from freestyle to street skating by adapting to a new environment.” She talks about how the values underpinning collaboration are inherently compelling and goes on to talk about how “it’s about being motivated by the respect from your peers, the satisfaction of creating something others can use, and being part of a community that you helped build and you can see other people contributing that and taking it to the next level.”

However, within her own profession, lawyers don’t tend to work in a collaborative atmosphere. Even between people who work in open source, there are other things, like training materials and internal company policies, that we don’t always think to develop collaboratively with other people outside of our teams. 

OpenChain

Lovejoy asks, “How can we take the advantage of collaboration and apply it to making software moving through the supply chain, have less friction, and build trust. What if we had a collaborative group to solve this, to help define what the processes look like? Enter OpenChain. OpenChain is a new Linux Foundation collaborative project with a vision of a software supply chain where free and open source software is delivered with trust and consistent compliance information.”

There are three key areas within the OpenChain project:

  • Specification: Organized into 6 goals, the specification is the description of effective FOSS with requirements and rationale for why it’s important. The first version of the specification was released at LinuxCon Europe.
  • Curriculum: The initial set of training materials are available now, and they have begun working on a teacher’s guide to go along with these materials.
  • Conformance: This will contain a way to self-certify that you’ve met the requirements of the specification.

Lovejoy wants you or someone from your company to participate! 

“OpenChain is run like the other collaborative projects. Anyone can join. Anyone can participate. All the work is done in the open. Some of the things we’ll be working on and need help with includes working on the specification. We’ve got the first version out, but of course, we’re always going to make improvements and there’ll be other versions. Also, the curriculum slides I mentioned, we have the first version out, we’ll be working on those, … the teacher’s guide to go with those, the conformance questions, website issues and so forth and so on. My question to all of you is this. If someone from your company isn’t already following or contributing to OpenChain, who’s it going to be? When you go back to your office after spending time in this lovely city, who are you going to go have a chat with to get involved with OpenChain to make doing software business easier for all of us so we can focus on the more fun, challenging, and differentiating aspects of all of our jobs?”

Watch the entire talk to learn more about how you can contribute to OpenChain.

LinuxCon Europe videos

5 systemd Tools You Should Start Using Now

Once you get over systemd’s rude departure from the plain-text, script-laden System V of yore, it turns out to be quite nifty and comes with an equally nifty toolbox. In this article, we’ll be looking at four of those tools, plus one you’re probably already familiar with but haven’t used in the way you will see here.

So, without more ado…

coredumpctl

You can use this tool, as the name implies, to retrieve coredumps from systemd’s journal.

By running:

coredumpctl

you will get all coredumps in a summarized list. This list may go back weeks or even months.

Figure 1: coredumpctl lists all coredumps registered in the journal.

By using

coredumpctl dump filter

you get a more detailed output about the last coredump that matches the filter. So,

coredumpctl dump 1758

will show all the details of the last coredump with PID 1758. As systemd’s journal broaches more than one session (mine goes back to May, for example), it is conceivable that there are several unrelated coredumps from processes with the same PID.

Figure 2: The dump modifier allows you extract much more detail from the coredump.

Likewise, if you filter using the name of the executable, for example, with:

coredumpctl dump chrome

you will see only the latest coredump for chrome. This makes sense, because it is probably the one you want and the most relevant to your current problem.

You can filter coredumps using PID (as shown above), the name of the executable (also shown above), by specifying the path to the executable (it must contain at least one slash, as in /usr/bin/name_of_executable), or use one or several of journalctl‘s general predicates. An example of the latter would be:

coredumpctl dump _PID=1758

which would be the same as the coredumpctl dump 1758 we saw above.

Another, more interesting example of using journalctl predicates would be to use a coredump’s timestamp:

coredumpctl dump _SOURCE_REALTIME_TIMESTAMP=1463932674907840

For a list of all journalctl’s predicates, have a look at the JOURNAL FIELDS section in man systemd.directives.

If instead of using the dump option, you use

coredumpctl gdb 1758

you will get all the details of the coredump and you will open the GNU debugger (gdb) so you can start debugging right away.

bootctl

Just in case you missed the memo, systemd-boot and not GRUB, is also in charge of the booting firmware now. Yes! That is yet another thing systemd has gobbled down its hungry maw, at least on most modern machines with a UEFI firmware.

Although learning how to configure a boot manager from scratch goes beyond the scope of this post (if you are really interested, this article may prove helpful), when you have done your custom configuration, you will need to use bootctl to get it installed.

(If you’re a Linux newbie, fear not: you will probably never have to do any of what is covered in this section. Your distro will do it for you. This is for Linux control freaks, aka Arch users, who can’t resist messing with every single aspect of their system.)

You need to be root (or invoke the command with sudo) to use bootctl. This may be the first indication that you should treat this command with respect: Misusing bootctl can render your system unbootable, so be careful.

A harmless way of leveraging bootctl is to use it to check the boot status of your machine. Note that, unless /boot points directly to an FAT EFI partition, you will have to specify the route to the EFI boot partition manually using the --path= option. In my openSUSE, for example, I have to do:

bootctl --path=/boot/efi

This will list all the boot options and their variables. You can see what my boot looks like in Figure 3. This is the default behavior and is the same as bootctl --path=/boot/efi status.

Figure 3: The bootctl tool allows you to view and manipulate the boot manager settings.

The output shows where the boot binary is stored (ESP:) and each of the bootable options.

If you’ve built your own boot manager framework, you can install it with:

bootctl --path=/boot/path/to/efi install

This also generates the binary systemd-boot file and stores it in boot/path/to/efi/EFI/Boot and adds a call to it at the top of boot order list.

If you have a newer version than the one installed in the EFI partition, you can update your systemd-boot with:

bootctl --path=/boot/path/to/efi update

You can remove systemd-boot from your EFI partition with:

bootctl --path=/boot/path/to/efi remove

Needless to say, be careful with this last one.

systemd-cgtop

Similar to the classic top tool that tells you which process is hogging your resources, systemd-cgtop tells you which cgroup is eating up most of your CPU cycles and memory.

If you are not familiar with control groups — cgroups for short — they provide a way of partitioning off resources for groups of users and tasks. You can, for example, use cgroups to set the limits of CPU and memory usage on a machine shared between two different groups of users and the applications they use. There is a complete explanation with examples on how to use and implement cgroups here.

systemd relies heavily on cgroups to control its services and systemd-cgtop is how you check that none of the groups are getting out of hand. And, If it is, you can then kill the whole group without needing to actually hunt down each of the processes in the group and killing them individually.

Look at Figure 4. What you see there is the very image of a sane and happy system. Nothing is hogging resources, and only some of all the activity of all the cgroups is registering at all. But I could, for example, get rid of the auditd service if it were misbehaving. As it is not essential to keep the system running, I can do this with:

systemctl kill auditd.service

And… poof! It’s gone!

Figure 4: systemd-cgtop tells you how your cgroups are behaving.

In this case, auditd.service has only got to tasks associated with it, but, as you can see, some have literally hundreds, especially groups used for end users, so using systemctl to call cgroups is very convenient.

By the way, if you want to see the processes within a given cgroup, try this:

systemd-cgls /cgroup.name

For example, try this:

systemd-cgls /system.slice/NetworkManager.service

And you’ll see all the processes working under the NetworkManager sub-cgroup.

Conclusion

This was a just a taste of the tools systemd has for system administration. Not only are there many more (and we’ll be looking at a new batch in a future article), but also the options and combinations you can use with these instructions make them much more powerful than they seem at first glance.

If you would like to delve more deeply into systemd, use:

man systemd.index

to get an overview of all the man pages related with systemd.

Advance your career in Linux System Administration! Check out the online Essentials of System Administration course from The Linux Foundation — also offered in Spanish and Portuguese.

Top 10 Tech Predictions For 2017 From IDC

IDC released today its 10 IT industry predictions for 2017 in a webcast with Frank Gens, IDC’s senior vice president and chief analyst. The predictions covered many trends driving success today and in the future, from how the entire global economy will be re-shaped by digital transformation, the transition of all enterprises from being “digital immigrants” to being “digital natives,” the scaling up of innovation accelerators, the emergence of “the 4th platform” (a new set of technologies that will become mainstream in ten years), drastic changes in how enterprises connect to their customers, and the ecosystem becoming as important for business success as IP.

Here are IDC’s ten predictions:

Read more at Forbes

The Company of the Future

In the process of eating the world, software had traditional organizational structures for lunch. Analogies, methods and tactics that originated in the IT world have a major influence on general business thinking (as they should; the two are increasingly the same thing). Today, we talk about ‘new operating systems for organizations’, organisations are understood as networksagile management is all the buzz and every new company wants to be a lean startup, create an MVP and iterate from there.

Conversely, looking at new developments in technology can often give a hint at the future of business at large. I see three developments that have the potential to influence our company of the future in a major way.

  • Microservices
  • Blockchain
  • Industry 4.0

While this might read like a list of keynote topics at any major tech conference in 2016, let’s look further than the average trend report.

Read more at Thomas Euler’s Blog

Trireme Open-Source Security Project Debuts for Kubernetes, Docker

Network isolation isn’t the only way to secure application containers anymore, so Aporeto unveils a new security model for containers running in Docker or as part of Kubernetes cluster.

Dimitri Stiliadis co-founded software-defined networking (SDN) vendor Nuage Networks in 2011 in a bid to help organizations improve agility and security via network isolation. In the container world, however, network isolation alone isn’t always enough to provide security, which is why Stiliadis founded Aporeto in August 2015. On Nov. 1, Aporeto announced its open-source Trireme project, providing a new security model for containers running in Docker or as part of a Kubernetes cluster.

Read more at eWeek

5 Reasons to Opt for a Linux Rolling Distro vs. a Standard Release

There are a lot of reasons I recommend Ubuntu to Linux newbies. It’s well supported, reasonably stable, and easy to use. But I prefer to roll with Arch Linux myself. It has several compelling attributes, but one of its biggest pluses is that Arch is a rolling-release distribution.

What?

If you’re using Linux for the first time, there’s a pretty good chance your OS is what’s called a “versioned release” distribution. Ubuntu, Fedora, Debian, and Mint all release numbered versions of their respective operating systems. By contrast, a rolling-release distribution eschews versions altogether. Here are a few of the things you can expect from a rolling release.

Read more at PCWorld

What Is the Linux Kernel?

So Linux is 25 years old now. The Linux kernel was created by a Finnish student named Linus Torvalds in 1991 who at the time was a 21-year-old computer science student at the University of Helsinki, Finland . On 25 August 1991, Torvalds posted the following to comp.os.minix, a newsgroup on Usenet…

“I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386 (486) AT clones. This has been brewing since April, and is starting to get ready. I’d like any feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical layout of the file-system (due to practical reasons) among other things).

Read At LinuxAndUbuntu

Apcera Platform Primes Containers for Enterprise Deployment

Apcera today is launching what it claims is the first enterprise-grade container management platform. The idea is to provide a turnkey package that includes all the functions necessary for running containers — functions such as orchestration and networking, along with aspects such as security.

It would be like turning “containers” and their environment into a single product, packaged nicely and wrapped up with a bow. Something parallel is happening in OpenStack and cloud management, where startups such as Platform9 and ZeroStack are finding ways to figuratively shrink-wrap the cloud into an all-inclusive offering.

Here’s the tradeoff. Apcera made things simpler for the enterprise by selecting pieces of the environment ahead of time — orchestration, for example. There’s still a lot of flexibility to choose things like software stacks, but “we answered all the dependency questions for you,” says Josh Ellithorpe, Apcera’s lead architect.

Read more at SDxCentral

It’s Finally Legal To Hack Your Own Devices (Even Your Car)

Last Friday, a new exemption to the decades-old law known as the Digital Millennium Copyright Act quietly kicked in, carving out protections for Americans to hack their own devices without fear that the DMCA’s ban on circumventing protections on copyrighted systems would allow manufacturers to sue them. One exemption, crucially, will allow new forms of security research on those consumer devices. Another allows for the digital repair of vehicles. Together, the security community and DIYers are hoping those protections, which were enacted by the Library of Congress’s Copyright Office in October of 2015 but delayed a full year, will spark a new era of benevolent hacking for both research and repair.

Read more at WIRED