Tags: System Administration

alan-ho-node-interactive.png

Alan Ho Node.js Interactive
Serverless systems scale really well -- even handling an onslaught from Pokemon Go -- according to Google's Alan Ho speaking at Node.js Interactive.

Serverless Computing Is the Stack Reimagined

Alan Ho's presentation at Node.js Interactive centered on serverless -- a technology he has been working on since he founded InstaOps (acquired by Apigee, which was then acquired by Google) a few years ago. What is Serverless? In Ho's own words, "Serverless computing is the code execution model...
Read 0 Comments

How to get started with a VPN in Linux

The most popular way to circumvent censorship is with a VPN (Virtual Private Network).  As the name suggests, a virtual network allows you to connect to another server and establish an encrypted tunnel between it and your internet-capable device.  Read more at Tech Radar
Read 0 Comments

Intel's BigDL Deep Learning Framework Snubs GPUs for CPUs

Last week Intel unveiled BigDL, a Spark-powered framework for distributed deep learning, available as an open source project. With most major IT vendors releasing machine learning frameworks, why not the CPU giant, too? What matters most about Intel's project may not be what it offers people...
Read 0 Comments

Linux Foundation Certified System Administrator: Munzali Garba

The Linux Foundation offers many resources for developers, users, and administrators of Linux systems. One of the most important offerings is its Linux Certification Program. The program is designed to give you a way to differentiate yourself in a job market that's hungry for your skills. How well...
Read 0 Comments

ntp-time.jpg

NTP
In this first of a three-part series, Chris Binnie looks at why NTP services are essential to a happy infrastructure.

Arrive On Time With NTP -- Part 1: Usage Overview

Few services on the Internet can claim to be so critical in nature as time. Subtle issues which affect the timekeeping of your systems can sometimes take a day or two to be realized, and they are almost always unwelcome because of the knock-on effects they cause. Consider as an example that your...
Read 0 Comments

Public Cloud on the Rise While Private Cloud Usage Declines

The use of public clouds has nearly doubled to 57 percent from 30 percent since 2012, while private cloud use has dropped to 40 percent from 52 percent, according to an Interop ITX and InformationWeek survey. Even further, the respondents who use a private cloud estimate a 12 percent drop between...
Read 0 Comments

17 Essential Skills for Growing Performance Engineers

Performance engineering as a discipline goes back several decades. I’ve heard firsthand accounts of testing and optimization of software from the 1960s. Still, much of what we practice today has built up in the last twenty years or so, since the first generation of commercial performance testing...
Read 0 Comments

A Quick Guide to Network Administrator Course and Jobs

A career in network administration is full of opportunities today. With the world becoming more digitalized and the emergence of a booming IT industry, there are countless new prospects and jobs being shaped every year. With the increase in computer and software led companies, there is an even...
Read 0 Comments

lets-encrypt-security.jpg

Let's Encrypt
We’re incredibly close to a Web that is more encrypted than not, says Josh Aas in this update from the Let’s Encrypt project.

3 Lessons in Web Encryption from Let’s Encrypt

As exciting as 2016 was for encryption on the Web, 2017 seems set to be an even more incredible year. Much of the infrastructure and many of the plans necessary for a 100 percent  encrypted Web really solidified in 2016, and the Web will reap the rewards in 2017. Let’s Encrypt is proud to have been...
Read 0 Comments

security-tips.jpg

security tips
In this series, we’ll cover essential information for keeping hackers out of your system. Watch the free webinar on-demand for more information.

How to Keep Hackers out of Your Linux Machine Part 2: Three More Easy Security Tips

In part 1 of this series, I shared two easy ways to prevent hackers from eating your Linux machine. Here are three more tips from my recent Linux Foundation webinar where I shared more tactics, tools and methods hackers use to invade your space. Watch the entire webinar on-demand for free. Easy...
Read 2 Comments

Pages

Click Here!