Home Search
for - search results
If you're not happy with the results, please do another search
Linux For Beginners: Understanding The Many Versions Of Ubuntu
But did you know there are seven different "flavors" of Ubuntu?*
I'll briefly explain the kind of user each Ubuntu version is designed for, what differentiates them...
cregit: Token-Level Blame Information for the Linux Kernel
Who wrote this code? Why? What changes led to this function’s current implementation?
These are typical questions that developers (and sometimes lawyers) ask during their...
Linus Torvalds: After Big Linux Performance Hit, Spectre v2 Patch Needs Curbs
Major slowdowns caused by the new Linux 4.20 kernel have been traced to a mitigation for Spectre variant 2 that Linux founder Linus Torvalds...
Three SSH GUI Tools for Linux
At some point in your career as a Linux administrator, you’re going to use Secure Shell (SSH) to remote into a Linux server or...
Practical Networking for Linux Admins: TCP/IP
Get to know networking basics with this tutorial from our archives.
Linux grew up with a networking stack as part of its core, and networking is one of...
5 Easy Tips for Linux Web Browser Security
If you use your Linux desktop and never open a web browser, you are a special kind of user. For most of us, however,...
An Introduction to Udev: The Linux Subsystem for Managing Device Events
Udev is the Linux subsystem that supplies your computer with device events. In plain English, that means it's the code that detects when you...
Machine Learning for Operations
Managing infrastructure is a complex problem with a massive amount of signals and many actions that can be taken in response; that’s the classic...
The Growing Significance Of DevOps For Data Science
DevOps involves infrastructure provisioning, configuration management, continuous integration and deployment, testing and monitoring. DevOps teams have been closely working with the development teams to...
6 Best Practices for High-Performance Serverless Engineering
When you write your first few lambdas, performance is the last thing on your mind. Permissions, security, identity and access management (IAM) roles and...