Showing headlines posted by bob
« Previous ( 1 ... 690 691 692 693 694 695 696 697 698 699 700 ... 1214 ) Next »Containers Running Containers with LinuxKit
Some genuinely exciting news piqued my interest at this year’s DockerCon, that being the new operating system (OS) LinuxKit, which was announced and is immediately on offer from the undisputed heavyweight container company, Docker. The container giant has announced a flexible, extensible operating system where system services run inside containers for portability. You might be surprised to hear that even includes the Docker runtime daemon itself.
Rugged i.MX6 SBC offers open source Linux and Android support
NutsBoard.org’s upcoming 3.5-inch, i.MX6-based “Pistachio” SBC follows the recently released TI AM3352 based “Almond” COM, Walnut carrier, and mini-PC. Shortly after Taiwan-based startup NutsBoard.org shipped a TI Sitara AM3352 based, 68 x 38mm Almond computer-on-module, the company went to Computex last week to show off an upcoming Pistachio SBC built around the NXP i.MX6.
An introduction to timekeeping in Linux VMs
Keeping time in Linux is not simple, and virtualization adds additional challenges and opportunities. In this article, I'll review KVM, Xen, and Hyper-V related time-keeping techniques and the corresponding parts of the Linux kernel.
Timekeeping is the process or activity of recording how long something takes. We need "instruments" to measure time. The Linux kernel has several abstractions to represent such devices:
read more
OpenPOWER secure and trusted boot part 2 - Protecting system firmware with OpenPOWER secure boot
Protection of system firmware against malicious attack is paramount to server
security. If an attacker is able to inject malicious code at the firmware level, no security
measure at the operating system level can fully guarantee the trust of the system. IBM
OpenPOWER servers support secure boot of system firmware to ensure the system boots only
authorized firmware. When the system boots, each firmware component is verified against a
cryptographic signature and integrity-checked against a secure hash of the component. If any
check fails, secure boot prevents the system from booting until the problem is
corrected.
Open Source and the Artificial Intelligence Frontier
The open source arena continues to rapidly converge with the field of artificial intelligence (AI). Not only are technology industry titans contributing meaningful tools to the community, but international players and billionaires are making contributions. Meanwhile, some of our smartest people are also laser-focused on keeping AI development open and safe.
Why is openness so difficult?
If being open is so great, why isn't everyone embracing it? Answering this requires asking a few more questions:
Why is it so hard for leaders and organizations to introduce and maintain policies and processes designed to create open environments?
Why are technology firms and millennial-driven startups more likely to see the value in open strategies?
Most leaders in large organizations are more than capable of running successful open systems—so why aren't they doing it?
read more
TI Sitara SoC for industrial Ethernet offers choice of dev boards
TI’s Linux-driven, Cortex-A8 “Sitara AMIC110” SoC with PRU-ICSS is designed for multiprotocol industrial Ethernet and fieldbus communications. Texas Instruments has announced the AMIC110, the first in a series of Sitara AMIC SoCs designed to “help developers convert existing non-networked designs such as motor drives to networked systems by adding industrial Ethernet.” The SoC’s single-core, 300MHz […]
Software Defined Networking (SDN) explained for beginners
Over the past few years, Software Defined Networking (SDN) has been a key buzz in the computer networking/IT industry. Today, more and more companies are discussing SDN to leverage it for their business and future growth plans.
How to upgrade your system BIOS using FreeDOS
It is not often that most of us need to update the BIOS in our host computers.
In fact, most motherboard manufacturers, including Intel, recommend against upgrading BIOS unless there is a specific problem that an upgrade to a specific BIOS level will fix. Most sysadmins also would agree that "if it is not broken, don't fix it." Upgrading BIOS just to get to the latest level is counter-productive in terms of the time it takes, but also can cause problems that did not previously exist.
read more
Open hardware groups spread across the globe
After our group of friends founded a small open hardware community in El Salvador a few years ago, we felt alone in the region. The open hardware movement had developed in a creative explosion of projects and (thanks to the popularization of 3D printing and digital technologies such as Arduino) under a common understanding of how to develop new physical products.
read more
5 great KDE apps to help you study
There are countless websites that offer educational resources for people of all ages. Many of them are easy to find through your favorite search engine and also free to use. However, there are disadvantages to many of them, such as:
read more
Securing Private Keys on a Linux Sysadmin Workstation
In this last article of our ongoing Linux workstation security series for sysadmins, we’ll lay out our recommendations for how to secure your private keys. If you’re interested in more security tips and a list of resources for more reading (to go further down the rabbit hole of Linux security), I recommend that you download our free security guide for sysadmins.
3.5-inch Apollo Lake SBC offers four USB 3.0 ports
Axiomtek’s 3.5-inch, extended temp “CAPA312” SBC offers Apollo Lake SoCs, dual GbE ports, dual mini-PCIe slots, SATA and HDMI ports, and four USB 3.0 ports. The CAPA312 is a more advanced version of Axiomtek’s recent CAPA318, a 3.5-inch board that similarly offers the dual-core Celeron N3350 and quad-core Pentium N4200 from Intel’s latest Apollo Lake […]
Why you should certify your open hardware
The open source hardware movement has been gaining momentum since 2010 with new industries joining the community at a rapid pace. In fact, the maker and 3D printing markets are expected to become a US$ 8.5 billion market by 2020.
read more
How to verify a Fedora ISO file
After downloading a fresh version of a Fedora ISO, it is a good habit to get in to to verify the downloaded file. The benefits of verification are two-fold: integrity and security. Verification of your ISO confirms if the file... Continue Reading →
Linux Join Command Tutorial for Beginners (5 examples)
Sometimes, you may want to combine two files in a way that the output makes even more sense. For example, there could be a file containing name of continents, and another file containing names of countries located in these continents, and the requirement is to combine both files in a way that a continent and the corresponding country appear in the same line.
3 off-the-shelf Linux computers compared
While the options for Linux computers from commercial vendors are still needles in the proverbial haystack of OEM Windows equipment out there, there are more and more options available to a consumer who wants a good, solid device that's ready-to-use with no messing around. Still, there are more Linux OEM computers than I could look at for one article—and the options tend to be different in Europe than they are in the United States, with providers like Entroware that don't ship to the latter at all.
How to master feedback loops and excel in the workplace
In most situations, from getting clothing advice to seeking peer review of the next scientific discovery, we harness the help of people around us in order to discuss and analyze potential next steps. Hardly anyone thinks up a perfect solution right off the bat; it's an iterative process full of trials and errors, adjustments, and new experiments.
And it's a process we can always improve. This chapter offers some advice for doing just that.
What are feedback loops?
Feedback loops are supposed to be great and solve all sorts of problems. So what are they, exactly?
read more
New Mozilla Poll: Americans from Both Political Parties Overwhelmingly Support Net Neutrality
Our survey also reveals that a majority of Americans do not trust the government to protect Internet access?
Set Up a CI/CD Pipeline with a Jenkins Pod in Kubernetes (Part 2)
In Part 1 of our series, we installed Docker, Minikube, and kubectl. We also got an image repository running on our cluster in Minikube, and tested the process of building and pushing an image using our Hello-Kenzan app.
« Previous ( 1 ... 690 691 692 693 694 695 696 697 698 699 700 ... 1214 ) Next »