Subscribe to feed
Updated: 20 min 47 sec ago

Customizing a Linux System for an Autonomous Arctic Monitoring Station

Wed, 12/27/2017 - 11:00
Title: Customizing a Linux System for an Autonomous Arctic Monitoring Station27 DecLearn more

Linux Kernel Developer: Shuah Khan

Wed, 12/27/2017 - 09:06

The Linux kernel development community remains extremely busy, as shown in the recent Linux Kernel Development Report, written by Jonathan Corbet and Greg Kroah-Hartman. Since the 4.7 release, just under 83,000 changesets have been merged from 4,319 individual developers representing 519 known corporations.

Transport-Layer Encryption vs End-to-End Encryption

Wed, 12/27/2017 - 04:30

It’s also important for learners to be able to distinguish what the encryption they are using to protect their information does and does not protect against. One way to clarify this conversation is to point out two different types of encryption for their information in transit: transport-layer encryption, and end-to-end encryption.

Squinting at ASCII on Linux

Tue, 12/26/2017 - 14:36

ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it works.

Unit Testing: Time-Consuming but Product-Saving

Tue, 12/26/2017 - 11:36

“Today i finally recognized that unit tests are a critical part of my programming flow” — Ashley Williams, Twitter.

Long-time Node.js advocate Ashley Williams kicked off her recent Twitter thread in the same sort of stream of consciousness that many devs go through when they are coming to terms with the truth: Unit testing is annoying but necessary.

The State of Netbooting Raspberry Pis

Tue, 12/26/2017 - 10:30

I'm going to walk you through a few of the pieces involved in net-booting a Raspberry Pi and then talk about the challenges of running cloud native apps on a net-booted RPi.

It's undeniable - Raspberry Pis capture the imagination of techies of all ages. Combine several Raspberry Pis into a cluster and you now have an x10 or x100 multiplier, but there are some problems with SD Cards. Netbooting is meant to fix this - but there are some limitations to its usefulness.

Read more at Alex Ellis blog

Kubeflow Project Tacks Machine Learning on Top of Kubernetes

Tue, 12/26/2017 - 09:30

The Kubernetes community is extending the reach of the container orchestration platform into the field of machine learning.

18 Cyber-Security Trends Organizations Need to Brace for in 2018

Sat, 12/23/2017 - 11:36

Enterprises, end users, and governments faced no shortage of security challenges in 2017. Some of those same challenges will continue in 2018, and there will be new problems to solve in 2018 as well.  

eWeek presents 18 security predictions for 2018 for the year ahead from 18 security experts.

Read more at eWeek

KubeCon + CloudNativeCon North America

Fri, 12/22/2017 - 12:32

The Cloud Native Computing Foundation’s flagship conference gathers adopters and technologists from leading open source and cloud native communities in Seattle, WA on December 11-13, 2018. Join Kubernetes, Prometheus OpenTracing, Fluentd, Linkerd, gRPC, CoreDNS, containerd, rkt, CNI and more, as the community gathers for three days to further the education and advancement of cloud native computing. 

Learn more

Event Title: KubeCon + CloudNativeCon North America22 DecLearn more

KubeCon + CloudNativeCon China 2018

Fri, 12/22/2017 - 12:27

KubeCon + CloudNativeCon gathers all CNCF projects under one roof. Join leading technologists from open source cloud native communities to further the advancement of cloud native computing.

Learn more


Event Title: KubeCon + CloudNativeCon China 201822 DecLearn more

Linux Kernel Summit

Fri, 12/22/2017 - 12:16

The Linux Kernel Summit brings together the world’s leading core kernel developers to discuss the state of the existing kernel and plan the next development cycle.

Event Title: Linux Kernel Summit22 DecLearn more

Linux Security Summit

Fri, 12/22/2017 - 12:12
  Event Title: Linux Security Summit 22 DecLearn more

KVM Forum

Fri, 12/22/2017 - 11:48

KVM Forum is an annual event that presents a rare opportunity for developers and users to meet, discuss the state of Linux virtualization technology, and plan for the challenges ahead.

Learn more


Event Title: KVM Forum22 DecLearn more

Open Source Summit Europe

Fri, 12/22/2017 - 11:41

The leading conference for technologists and open source industry leaders

Event Title: Open Source Summit Europe22 DecLearn more

Embedded Linux Conference Europe

Fri, 12/22/2017 - 11:35
  Event Title: Embedded Linux Conference Europe22 DecLearn more

Nethserver: An Ideal Server Platform for Your Small Business

Fri, 12/22/2017 - 10:10
Title: Nethserver: An Ideal Server Platform for Your Small Business22 DecLearn more

Fuzzing: An Old Testing Technique Comes of Age

Fri, 12/22/2017 - 07:30

Both proprietary and open source development tends to have more developers than testers. As a result, automated testing has become increasingly common. In the last year, fuzzing — testing with dummy or random data — has become particularly widespread, and its popularity seems likely to continue.

8 Takeaways from NIST’s Application Container Security Guide

Fri, 12/22/2017 - 06:00

Companies are leveraging containers on a massive scale to rapidly package and deliver software applications. But because it is difficult for organizations to see the components and dependencies in all their container images, the security risks associated with containerized software delivery has become a hot topic in DevOps. This puts the spotlight on Operations teams to find security vulnerabilities in the production environment.

How To Tell If Your Linux Server Has Been Compromised

Fri, 12/22/2017 - 05:36

A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends.

Disclaimer: If your server has been compromised by a state organization like the NSA or a serious criminal group then you will not notice any problems and the following techniques will not register their presence.

However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals.

Agrarian-Scale Kubernetes: Part 1

Fri, 12/22/2017 - 04:00

Visit the Kubernetes homepage, and one of the first things you’ll see is the promise of “Planet Scale.” The S-word is plastered across the pitch for Google’s managed version of Kubernetes as well (Google Kubernetes Engine, or “GKE”). Demand-based autoscaling! Support for thousands of host nodes! Cross-region federated clusters!