Home Search

live - search results

If you're not happy with the results, please do another search

New Training Options Address Demand for Blockchain Skills

Blockchain technology is transforming industries and bringing new levels of trust to contracts, payment processing, asset protection, and supply chain management. Blockchain-related jobs are...

How to Plan Projects in the Open, Without the Stress

How can you define project requirements, engage multiple stakeholders, delegate work, and track progress—all in the open? Here's one tried-and-true method. Consider these questions: How do...

4MLinux: More Than Just Another Lightweight Distro

I don’t want to get up on yet another “Here’s another lightweight Linux distribution to revive your aging hardware” soapbox. So many distributions make...

Stack vs Heap. What’s the Difference and Why Should I Care?

I’m four months into the curriculum at Holberton School and we’ve solved multiple problems using the malloc, realloc, calloc and free functions in the C programming...

Heather Kirksey on Integrating Networking and Cloud Native

As highlighted in the recent Open Source Jobs Report, cloud and networking skills are in high demand. And, if you want to hear about the...

Google’s Fuchsia Adds Emulator for Running Linux Apps

Google has added a Guest app to its emergent and currently open source Fuchsia OS to enable Linux apps to run within Fuchsia as...

The Blockchain Beyond Bitcoin

Blockchain technologies have been made popular by the creation of bitcoin, but how exactly can a blockchain benefit an enterprise? A blockchain provides an...

A Broad Overview of How Modern Linux Systems Boot

For reasons beyond the scope of this entry, today I feel like writing down a broad and simplified overview of how modern Linux systems boot....

How to Build a Strong DevSecOps Culture: 5 Tips

We have a tendency in IT to treat security as fundamentally a technology problem. Hence, we also tend to focus on technology solutions. Tools and...

Evaluate a Product/Market Fit

How to identify when a fit has been achieved, and how to exit the explore stage and start exploiting a product with its identified...