Language Selection

English French German Italian Portuguese Spanish

Interviews

Linux Foundation Certified System Administrator: Lorenzo Paglia

Filed under
Linux
Interviews

The Linux Foundation offers many resources for developers, users, and administrators of Linux systems, including its Linux Certification Program. This program is designed to give you a way to differentiate yourself in a job market that's hungry for your skills.

To illustrate how well these certifications prepare you for the real world, this series features some of those who have recently passed the certification exams. These testimonials should help you decide if either the Linux Foundation Certified System Administrator (LFCS) or the Linux Foundation Certified Engineer (LFCE) certification is right for you. In this installment, we talk with LFCS Lorenzo Paglia.

Read more

How I Use Android: Franco.Kernel and Focus creator Francisco Franco

Filed under
Android
Interviews

Now we're talking! This isn't for everyone, and it may sound obvious, but I wouldn't be able to live without ADB and Fastboot.

For folks who don't know what it is, ADB is the Android Debug Bridge. It's a very powerful binary that lets you access your phone from your computer's terminal to do all sorts of magical commands.

Read more

Techright’s Roy Schestowitz on All Things Free Tech

Filed under
Interviews

Do you love Microsoft? Dr. Roy Schestowitz doesn’t. He also led a “Boycott Novell” movement back when there was a Novell to boycott, and he has crusaded against other tech companies, especially regarding software patents. It is, as they say, “Clean indoor work, but somebody has to do it.” And Roy is that somebody.

Read more

A conversation with Salvatore Sanfilippo, creator of the open-source database Redis

Filed under
Interviews
OSS

In case you haven’t heard, Redis is one of the most widely used databases in the world. It’s one of the most popular software projects on GitHub, right up there with tools from Facebook and Google.

Read more

Arthur Buliva: How do you Fedora?

Filed under
Interviews

Arthur is from Kenya and first used Linux in 2002 when he was a freshman in college. During that time, open source software was just starting to be used in Kenya. He used Red Hat Linux 8 at the time, which he eventually upgraded to Red Hat Linux 9.

When asked about his childhood heroes, Arthur replied, “I grew up watching Indiana Jones on a VCR. Boy, did I wish I had a whip just like Indie’s!” He is an avid mountain biker and dog trainer. During the day, Arthur works as a software engineer at the United Nations office in Nairobi. At night, he interacts with open source software communities and chases after dogs he trains.

Read more

How a student in India got started with open source

Filed under
Interviews
OSS

I have always been an open source enthusiast. And when I heard about the awesome community from my brother I just couldn't wait to join in. He has always motivated me to do great things. I'm always enthusiastic to learn new things. Contributing to open source organizations, meeting amazing people and communities, and, of course, a deep interest of writing code have motivated me to join the summer training. I believe that I am able to achieve all these things after I joined the summer training and the great community DGP LUG.

Read more

Bringing Mozilla to the IoT era

Filed under
Interviews
Moz/FF

Rabimba has been involved in open source since the summer of 2014, when he was connected to Mozilla for the first time through the company's investments into Firefox OS in India. In this interview, I ask him how he got involved in open source, what he's currently working on, and how get got involved in contributing to Mozilla.

Read more

Q&A: Jonathan Riddell on the release of KDE neon User Edition 5.6

Filed under
KDE
Interviews

I’m thrilled to be part of the first project to bring KDE’s flagship desktop software to our users direct from the KDE community. We had to fill in a few gaps in what Plasma offers its users to complete the experience but we did that by working in Plasma rather than doing our work separately. So we added bootup themes for Grub and Plymouth and we’ve worked to make sure the app store, Discover, covers the whole archive. But the most important feature is what Neon is intended to be, a Plasma 5.6 desktop as the developers intended it.

Read more

High-Availability Allows Business Continuity, Says Dietmar Maurer, Proxmox CTO

Filed under
Linux
Interviews
OSS

Proxmox Server Solutions GmbH -- based in Vienna, Austria -- offers enterprise server virtualization solutions, including the open source project Proxmox Virtual Environment (VE), which combines container-based virtualization and KVM/QEMU on one web-based management interface. The company was founded in 2005 by brothers Martin and Dietmar Maurer. In 2014, the company joined the Linux Foundation to deepen its commitment to virtualization technologies such as KVM.

In this exclusive interview, Dietmar Maurer, CTO of Proxmox, talks about how virtualization is driving the modern IT infrastructure and how high availability (HA) directly affects business operations.

Read more

Linux Foundation Certified System Administrator: Gustavo Gómez Morales

Filed under
Linux
Interviews

I started using Linux in 1996. The idea of an open source operating system, where it's possible to access and customize a lot of things, amazed me.

Read more

Syndicate content

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud