This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and cloud skills further. Each month, we will kick off our community content with a live study group, allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.
Great news for all of our Linux Academy students; Red Hat Enterprise is already available to try out in Linux Academy’s Cloud Playground! We have more information on t he release in general and all the new features in our podcast Linux Action News and episode 105. Creating Confined Users in SELinux.
Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic. Graf points out that there is another session by Brendan Gregg on using BPF to do analysis performance and profiling. Why is it necessary to rethink how networking and security is handled?
You can deploy your application in the configuration you choose on Amazon Linux and Ubuntu. An event view shows change history to simplify root cause analysis. Next to these solutions you can of course manage your compute resources directly, for example using CloudWatch, AutoScaling and Elastic LoadBalancing.
Speaking of Ivan, he pointed out this post with 45 Wireshark challenges to help you improve your network analysis skills. Here’s a handy list of deprecated Linux network commands and their replacements. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. This is a view shared by Ivan Pepelnjak.)
The rise of the disaggregated network operating system (NOS) marches on: this time, it’s Big Switch Networks announcing expanded hardware support in Open Network Linux (ONL) , upon which its own NOS is based. I use OTR with Adium on OS X, and OTR with Pidgin on my Fedora Linux laptop.). Servers/Hardware. Docker Inc. release.
Golub calls out a few particular sessions—protein folding, data analysis in sports, and extending a video game—and then unveils that these sessions are being presented by kids under the age of 13. Golub gives a “shout out” to the technologies underpinning modern Linux containers (namespaces, cgroups, etc., Enhancing portability.
Russell Bryant has a couple great articles on OVN— how to test OVN’s “EZ Bake” release with DevStack as well as an article on implementing OpenStack security groups using OVN ACLs (which in turn leverage the integration between Open vSwitch and the Linux kernel’s conntrack module). More on Clair from TechCrunch here.).
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content