Home Search

for - search results

If you're not happy with the results, please do another search

Linux For Beginners: Understanding The Many Versions Of Ubuntu

But did you know there are seven different "flavors" of Ubuntu?*  I'll briefly explain the kind of user each Ubuntu version is designed for, what differentiates them...

cregit: Token-Level Blame Information for the Linux Kernel

Who wrote this code? Why? What changes led to this function’s current implementation? These are typical questions that developers (and sometimes lawyers) ask during their...

Linus Torvalds: After Big Linux Performance Hit, Spectre v2 Patch Needs Curbs

Major slowdowns caused by the new Linux 4.20 kernel have been traced to a mitigation for Spectre variant 2 that Linux founder Linus Torvalds...

Three SSH GUI Tools for Linux

At some point in your career as a Linux administrator, you’re going to use Secure Shell (SSH) to remote into a Linux server or...

Practical Networking for Linux Admins: TCP/IP

Get to know networking basics with this tutorial from our archives. Linux grew up with a networking stack as part of its core, and networking is one of...

5 Easy Tips for Linux Web Browser Security

If you use your Linux desktop and never open a web browser, you are a special kind of user. For most of us, however,...

An Introduction to Udev: The Linux Subsystem for Managing Device Events

Udev is the Linux subsystem that supplies your computer with device events. In plain English, that means it's the code that detects when you...

Machine Learning for Operations

Managing infrastructure is a complex problem with a massive amount of signals and many actions that can be taken in response; that’s the classic...

The Growing Significance Of DevOps For Data Science

DevOps involves infrastructure provisioning, configuration management, continuous integration and deployment, testing and monitoring.  DevOps teams have been closely working with the development teams to...

6 Best Practices for High-Performance Serverless Engineering

When you write your first few lambdas, performance is the last thing on your mind. Permissions, security, identity and access management (IAM) roles and...