Home Search

applications - search results

If you're not happy with the results, please do another search

​IBM Mainframe Containers Grow More Secure

Everything old is new again. In the 1960s, IBM's OS/650 mainframe operating system had two modes, MFT and MVT, in which process got its...

How Open Source Projects Are Pushing the Shift to Edge Computing

Gnanavelkandan Kathirvel of AT&T is sure of one thing: it will take a large group of open-source projects working together to push computing closer...

AT&T Details Open White Box Specs for Linux-Based 5G Routers

This week AT&T will release detailed specs to the Open Compute Project for building white box cell site gateway routers for 5G. Over the...

Top Five Reasons to Attend Hyperledger Global Forum

In just over two months, the global Hyperledger community will gather in Basel, Switzerland, for the inaugural Hyperledger Global Forum. With business and technical tracks...

Keeping the Software in Docker Containers Up to Date

Docker has radically changed the way admins roll out their software in many companies. However, regular updates are still needed. How does this work...

What Comes after Moore’s Law?

The literal meaning of Moore’s Law is that CMOS transistor densities double every 18 to 24 months. While not a statement about processor performance per se,...

Blockchain Development Made Easy: Getting Started with Hyperledger Iroha

Our ‘Blockchain development made easy’ series continues with Hyperledger Iroha, a simple blockchain platform you can use to make trusted, secure, and fast applications....

Building Security into Linux-Based Azure Sphere

It’s still a bit unsettling to see a Microsoft speaker at a Linux Foundation conference. Yet, at the recent Linux Security Summit, Ryan Fairfax,...

Redefining Security Technology in Zephyr and Fuchsia

If you’re the type of person who uses the word “vuln” as a shorthand for code vulnerabilities, you should check out the presentation from...

Shared Storage with NFS and SSHFS

Up to this point, my series on HPC fundamentals has covered PDSH, to run commands in parallel across the nodes of a cluster, and Lmod, to...