Language Selection

English French German Italian Portuguese Spanish

Tale of a Black Dog

Filed under
Linux

During last August's LinuxWorld Expo, there was one bit of technology which managed to captivate me: a small innocuous box called a Black Dog. I thought to myself, "I've got to get a chance to play with one of these." Now, you might think that a house with four dogs, six cats, and five ferrets would have no room for another dog, but adding the Black Dog to the mix is a small affair. Unlike its four-footed counterparts, this Black Dog takes very little room and very little care.

What is a Black Dog? It's a complete USB-powered Linux server which fits easily in the palm of your hand (see Figure 1). Powered by a 400-MHz PowerPC processor, 64 MB of RAM, and either 256 MB or 512 MB of flash, this pint-sized pet packs quite a bite (or is that "byte"?). Add to that the built-in biometric scanner, MMC expansion slot, and USB V2.0 interface that acts as both its power source and conduit to the network, and you have quite a set of teeth on this little computing animal. And, perhaps most surprising of all, the device's price tag comes close to its size: just US$199 for the 256-MB unit or US$239 for the 512-MB version.

The concept is very different than what is most in use today: the Black Dog is a parasitic server that draws power and networking connectivity from the system to which it is attached, while using its host to provide access into the device.

Full Article.

More in Tux Machines

Why the Open Source Stars Must Align

Open source projects like OpenStack, Docker, OPNFV and OpenDaylight are more supported and better funded than ever before. They mark a broader trend of large, active and well-resourced open source projects that are among the leaders in Big Data, cloud computing, operating systems and development practices. Open source has come a long way in 30 years – and its success marks a new era for the overall OSS community. But success does not come without potential pitfalls. One of the greatest obstacles to project success isn’t the proprietary competition – it’s the lack of communication between large open source projects like OpenStack and Docker. Read more

Myth Busting the Open-Source Cloud Part 1

On the contrary, open-source cloud computing products are designed from the outset with security in mind. For example, there are features such as identity management to monitor who has access to content, and data encryption to safeguard information while it’s at rest or in transit. Furthermore, open-source cloud software is peer-reviewed by community participants, leading to continuous improvements in the quality of security features and mechanisms. This community also monitors and rapidly discloses vulnerabilities and issues, and provides security updates to address them. Read more

What does an adult look like in an open source community?

You're no longer "just an adult." You're now trusted and looked to for opinions on how the community should grow. You're a community elder. You embody the history. You keep the history. You work together with other adults and elders to guide and make the community stronger. And to a certain extent, the community once again looks after you, just as it did in the first phase. Read more