Home Search
bit - search results
If you're not happy with the results, please do another search
Linux Kernel 4.10 Released — Happy Anniversary!
Kernel 4.10 has the honor of being christened the "Anniversary Edition" by Linus Torvalds. I'm guessing this is because of the recent 25th anniversary...
Linux Security Fundamentals Part 5: Introduction to tcpdump and wireshark
Start exploring Linux Security Fundamentals by downloading the free sample chapter today. DOWNLOAD NOW
In this exercise, we learn about two of the most useful tools for...
Open Source Networking: Disruptive Innovation Ready for Prime Time
Innovations are much more interesting than inventions. The “laser” is a classic invention and “FedEx” is a classic innovation. Successful innovation disrupts entire industries...
How The Linux Foundation is Advancing Next-Gen Internet Infrastructure
The breadth of the The Linux Foundation (affectionately known as The LF) is often overlooked due to its eponymous name. However, what may not...
Video: Linus Torvalds on How to Build a Successful Open Source Project
Linux creator Linus Torvalds took the stage at Open Source Leadership Summit this week to share some of his secrets to success in building...
Time-Travel Debugging with ChakraCore and Node.js
ChakraCore is the Core part of Microsoft Edge's JavaScript Engine as used in Windows 10. It’s a standalone JavaScript engine in its own right...
How to Integrate Video Streaming Into Your C or C++ Application Using Nex Gen...
The Nex Gen Media Server is a small-footprint shared library that allows users to easily build video media and telephony applications. It supports several...
5 Tips on Enterprise Open Source Success From Capital One, Google, and Walmart
Some of the world’s largest and most successful companies gathered this week at Open Source Leadership Summit in Lake Tahoe to share best practices...
3 Good Command-Line Audio and Graphics Apps for Linux
It is often faster to use command-line apps to play audio files and preview images than to futz around launching and using a graphical...
How To Shrink Attack Surfaces with a Hypervisor
A software environment’s attack surface is defined as the sum of points in which an unauthorized user or malicious adversary can enter or extract...








