Tags: eBook

open-business.jpg

Open source management
Major companies and industries are quickly building out their open source programs, and the open source community is responding. The Linux Foundation is just one resource that organizations can turn to when advancing their open source strategies.

Enterprise Open Source Programs: From Concept to Reality

How pervasive is open source in today’s businesses? According to the 2016 Future of Open Source Survey from Black Duck and North Bridge, a mere three percent of respondents say they don't use any open source tools or platforms. Leveraging open source has also become a key avenue for fostering new...
Read 0 Comments

network-security.jpg

Workstation Security
There are several ways you can reduce the impact of a compromised browser, but the truly effective ways will require significant changes in the way you operate your workstation. Learn what The Linux Foundation sysadmin team recommends.

4 Best Practices for Web Browser Security on Your Linux Workstation

There is no question that the web browser will be the piece of software with the largest and the most exposed attack surface on your Linux workstation. It is a tool written specifically to download and execute untrusted, frequently hostile code. It attempts to shield you from this danger by...
Read 0 Comments

5 Fun Projects for Raspberry Pi 3

The Raspberry Pi is a great way to learn Linux and embedded systems or to advance your understanding through tinkering. Potential projects range from simple software installs and home automation, to complex robotics and supercomputing.  In this e-book you’ll find 5 fun projects to get you started,...
Read 0 Comments

Open Source Groups Provide New Licensing Resources

Newcomers to free and open source software (FOSS) might be bewildered by the variety of licenses that dictate how users can use community offerings. For example, the Open Source Initiative lists nine "popular licenses" and Wikipedia lists dozens more coming in a variety of flavors for different...
Read 0 Comments

workstation-security.jpg

Backup and storage
Safe and reliable backups are a must for all system administrators. Here are some guidelines to consider for your own peace of mind.

How to Safely and Securely Back Up Your Linux Workstation

Even seasoned system administrators can overlook Linux workstation backups or do them in a haphazard, unsafe manner. At a minimum, you should set up encrypted workstation backups to external storage. But it’s also nice to use zero-knowledge backup tools for off-site/cloud backups for more peace...
Read 1 Comments

kubernetes-family-tree.jpg

Kubernetes
The Kubernetes family tree shows how Borg has inspired current datacenter systems and the underlying technologies used in container runtimes today.

How Google's Borg Inspired the Modern Datacenter

In part one of this series, What Is Kubernetes?, and in part two, Why Choose Kubernetes to Manage Containerized Applications?, we learned what Kubernetes does, its architecture, and how it compares to similar container orchestrators. Now we'll learn how Kubernetes was descended from the secret...
Read 0 Comments

other-solutions.png

other solutions
Kubernetes is a mature and feature-rich solution for managing containerized applications, but it's not the only one; here are four others that you might be familiar with.

Why Choose Kubernetes to Manage Containerized Applications?

We're learning about Kubernetes in this series, and why it is a good choice for managing your containerized applications. In part 1, we talked about what Kubernetes does, and its architecture. Now we'll compare Kubernetes to competing container managers. One Key Piece of the Puzzle As we discussed...
Read 0 Comments

fig-2-kubernetes-users.png

Kubernetes users
Enterprises are adopting Kubernetes at a rapid pace.

What Is Kubernetes?

Kubernetes is open source software for automating deployment, scaling, and management of containerized applications. The project is governed by the Cloud Native Computing Foundation, which is hosted by The Linux Foundation. And it’s quickly becoming the Linux of the cloud, says Jim Zemlin,...
Read 0 Comments

workstation-security-githubpub-linuxcom-hero-2.jpg

Workstation Security Checklist
In this series, we’ll lay out a set of baseline recommendations for Linux workstation security. This article covers some considerations you should weigh when choosing a distribution.

How to Choose the Best Linux Distro for SysAdmin Workstation Security

Learn how to work from anywhere and keep your data, identity, and sanity. DOWNLOAD NOW If you’re a systems administrator choosing a Linux distribution for your workstation, chances are you’ll stick with a fairly widely used distro such as Fedora, Ubuntu, Arch, Debian, or one of their close spin-...
Read 3 Comments

incremental-compliance-fig4.png

Open source compliance
Incremental compliance is the idea that you need to ensure compliance of whatever source code changes took place between the initial compliant baseline and the current version.

How to Maintain Open Source Compliance After Code Changes

The previous article in this series covered how to establish a baseline for open source software compliance by finding exactly which open source software is already in use and under which licenses it is available. But how do you make sure that future revisions of the same product (or other products...
Read 0 Comments

Pages

Click Here!