Home Search
google - search results
If you're not happy with the results, please do another search
Why Security Performance Will be Key in NFV
There is growing evidence that the data center is driving toward a more software-centric security model that will be core to network functions virtualization (NFV) and software-defined networking (SDN) technology....
Linux Security Summit Videos
Thank you for your interest in the recorded sessions from Linux Security Summit 2016! View all 19 sessions from the event below.
Keynote: Inside the...
Collabora’s Devs to Bring Performance Improvements to Emulated NVMe Devices
(As originally published on Softpedia, August 28, 2016)
Softpedia reported earlier this month that Collabora's developers contributed patches to the upcoming Linux 4.8 kernel to...
Spark Comparison: AWS vs. GCP
There’s little doubt that cloud computing will play an important role in data science for the foreseeable future. The flexible, scalable, on-demand computing power...
Tox Is Your New Secure Chat Application
In a previous article, I talked about the Ring communication app. The article proved quite popular and aside from drawing a bit of attention...
Which Countries Have Open-Source Laws on the Books?
...It’s become increasingly common over the past decade or so to see laws being passed to either mandate the use of open-source software or,...
Linux Kernel Developers on 25 Years of Linux
One of the key accomplishments of Linux over the past 25 years has been the “professionalization” of open source. What started as a small...
Linux Took Over the Web. Now, It’s Taking Over the World
ON AUGUST 25, 1991, a Finnish computer science student named Linus Torvalds announced a new project. “I’m doing a (free) operating system,” he wrote on...
Best Practices for Using Open Source in Your DevOps Toolchain
Last week, we hosted another episode of our Continuous Discussion (#c9d9) video podcast, featuring expert panelists discussing the benefits of using open source tools and how DevOps...

