Linux and Open Source news headlines
Updated: 56 min 29 sec ago
Time series analysis (financial data, web logs, etc.) works best with row oriented databases. A traditional database consists of tables with data ordered by row (row-oriented). When data are organized by rows, data look-up can be done quickly by using a key-value to identify the row and then its associated data. When data are organized by column (column-oriented), operations on columns are extremely fast because there is no key-value look-up. This approach is used for time-series analysis. If you are a kdb+ user or are intrigued with time-series analysis, there are resources waiting for you. First, there is a free version of kdb+ (32 bit) available for download. The free version has all the functionality of the 64-bit version and can be used for commercial, non-commercial, or educational purposes.
OpenVPN wasn’t immune to the Heartbleed vulnerability in OpenSSL, and it’s not going to sidestep Shellshock either. Fredrick Stromberg, cofounder of Mullvad, a Swedish VPN company, reported that OpenVPN servers are vulnerable to Shellshock , the vulnerability in Bash plaguing Linux, UNIX and Mac OS X systems.
A group established to shield Linux from patent trolls has warned OpenStack will be the next big target for intellectual property hoarders. The Open Invention Network (OIN) reckons the open-source cloud is ripe for the plucking by trolls, who would easily be able to box off and claim core technologies as their own.
Increased demand on web based applications and services are putting more and more weight on the shoulders of IT administrators. When faced with unexpected traffic spikes, organic traffic growth, or internal challenges such as hardware failures and urgent maintenance, your web application must remain available, no matter what. Even modern devops and continuous delivery practices […]Continue reading...The post How to configure HTTP load balancer with HAProxy on Linux appeared first on Xmodulo.Related FAQs:How to set up a transparent HTTPS filtering proxy on CentOS How to set up Squid as a transparent web proxy on CentOS or RHEL How to analyze Squid logs with SARG log analyzer on CentOS What are useful CLI tools for Linux system admins How to create a site-to-site IPsec VPN tunnel using Openswan in Linux
Embedded systems need better securityIn a discussion that will sound familiar to Australian readers, US military development agency DARPA wants to create provably-secure software.…
elementary OS is a Linux distribution based on Ubuntu, and using solely this description users should not be impressed. Something else is happening with this operating system, something that is not fully understood.
This tutorial is the second part of the introduction to Linux command-line. In the first chapter I tried to make a brief introduction to the shell and the basic ways of moving around. Here I will talk about several useful commands, which may be needed on a day to day basis if you're working with the shell.
By getting all the major cloud providers fixed before the flaw was publicly disclosed, the Xen Project likely saved the IT world from a major security nightmare.
Version 7.4.2 of KNOPPIX is based on the usual picks from Debian 'Wheezy' and newer desktop packages from Debian 'testing' and Debian 'unstable'. It uses Linux kernel 3.16.3 and X.Org Server 1.16.1 for supporting current computer hardware. Changes: security fixes in Firefox (Iceweasel 32.0.3), Chromium (37.0.2062.120); GNOME desktop starts again using boot option 'knoppix desktop=gnome', if supported by graphics card; patch for the Bash shell against the 'Shellshock' bug in the environment variable parser; updated udev (215) and dBUS (1.8.8) for automatic hardware management and autostart of systemd components, updated LibreOffice (4.3.2), GIMP (2.8.14), KDE libraries (4.8.4), and more.
The PCLinuxOS Magazine staff is pleased to announce the release of the October 2014 issue.
The basic idea behind Blue Spike's patents is creating a digital fingerprint (which the patents refer to as an "abstract") of a file that allows it to be compared to other files (e.g. comparing audio files to see if they are the same song). In very general terms, the patents describe creating a "reference generator," an "object locator," a "feature selector," a "comparing device," and a "recorder." You will be amazed to learn that these five elements "may be implemented with software." That task, however, is left for the reader.Even worse, Blue Spike has refused to define the key term in its patents...https://www.techdirt.com/articles/20140930/15464228683/serial-litigant-blue-spike-wins-effs-stupid-patent-month-september.shtml