<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:foaf="https://xmlns.com/foaf/0.1/" xmlns:og="https://ogp.me/ns#" xmlns:rdfs="https://www.w3.org/2000/01/rdf-schema#" xmlns:schema="https://schema.org/" xmlns:sioc="https://rdfs.org/sioc/ns#" xmlns:sioct="https://rdfs.org/sioc/types#" xmlns:skos="https://www.w3.org/2004/02/skos/core#" xmlns:xsd="https://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/taxonomy/term/22">
  <channel>
    <title>Industry News</title>
    <link>https://www.linuxjournal.com/taxonomy/term/22</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Say Hi to Subutai</title>
  <link>https://www.linuxjournal.com/content/say-hi-subutai</link>
  <description>  &lt;div data-history-node-id="1339510" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12234f1.png" width="321" height="600" alt="Torso" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/alex-karasulu-0" lang="" about="https://www.linuxjournal.com/users/alex-karasulu-0" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Alex Karasulu&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
&lt;em&gt;I learned about Subutai from Philip Sheldrake of the Digital Life
Collective (and much else) and thought it deserved attention here at
&lt;em&gt;Linux Journal&lt;/em&gt;, so I offered this space for that. Alex Karasulu did most
of the writing, but it was a team effort with help from Jon 'maddog' Hall, Philip
Sheldrake
and Steve Taylor.—Doc Searls&lt;/em&gt;
&lt;/p&gt;

&lt;h3&gt;
What Is Subutai?&lt;/h3&gt;

&lt;p&gt;
&lt;a href="https://subutai.io"&gt;Subutai&lt;/a&gt; is an open-source project and platform that lets anyone share,
barter or rent computer resources to create clouds from the edge rather
than centralized locations. Available devices can
attach to these clouds hovering on the edge. We started calling it &lt;a href="https://en.wikipedia.org/wiki/Social_cloud_computing"&gt;Social
Cloud Computing&lt;/a&gt;,
but technically, Subutai is a dynamic p2p multi-cloud made possible thanks
to &lt;a href="https://en.wikipedia.org/wiki/LXC"&gt;Lightweight Linux Containers&lt;/a&gt;
and software-defined networking. Think &lt;a href="https://aws.amazon.com/vpc"&gt;Amazon's Virtual Private Cloud&lt;/a&gt;,
but running on your computers and the
computers of social contacts who share their computer resources with
you. Or, think AirBnB on computers for the people's cloud.
&lt;/p&gt;
&lt;p&gt;
Subutai partners with the Digital Life Collective, a member co-operative
that researches, develops, funds and supports what we call "tech we
trust"—those technologies that put the individual's autonomy,
privacy and dignity first, or that support those technologies that
do. Our tech, not their tech.
&lt;/p&gt;

&lt;p&gt;
We work together so Subutai can help prevent our privacy from being
compromised and our every action from being analyzed. That means not
being tied to large cloud providers and giving us the option to use
resources we have on hand.
&lt;/p&gt;

&lt;h3&gt;
How Does It Work?&lt;/h3&gt;

&lt;p&gt;
You set how much of your computers' resources you're willing to share
with others. Rules and quotas are used to share with contacts from
your social-media accounts. Once your network of friends, family and
colleagues share with you, the stage is set to create clouds across
shared computer resources.
&lt;/p&gt;

&lt;p&gt;
When someone creates a cloud, peer computers authorized to share
resources with the cloud's owner swarm together (like bees) to form
an n-way virtual private network (VPN). A peer is a group of computers
with resources that can be shared with others. A peer can be a rack of
computers or a single virtual machine running on your laptop.
&lt;/p&gt;

&lt;p&gt;
Peers contribute resources into the VPN as Linux container hosts. Whatever
the underlying hardware, operating system or virtualization technology,
resources are presented canonically to environments as containers. The VPN
provides secure connectivity between these containers across the internet.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/say-hi-subutai" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 05 Oct 2017 10:42:47 +0000</pubDate>
    <dc:creator>Alex Karasulu</dc:creator>
    <guid isPermaLink="false">1339510 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Getting Sticky with It</title>
  <link>https://www.linuxjournal.com/content/getting-sticky-it</link>
  <description>  &lt;div data-history-node-id="1339444" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12139magnetsf1.jpg" width="750" height="563" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/shawn-powers" lang="" about="https://www.linuxjournal.com/users/shawn-powers" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Shawn Powers&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Although they might not be so good for credit cards or floppy disks, magnets
are one of those things that always have fascinated me. For the past
few years, I've wanted to get a set of the round Zen Magnets to play
with—they're sort of like an extra science-y version of LEGOs. Unfortunately,
before I was able to purchase any, the US government banned their sale!
&lt;/p&gt;

&lt;p&gt;
Recently, the folks at Zen Magnets won their long legal battle
and are able to sell tiny, strong magnets again. The regular-size
Zen Magnets aren't available yet, but thankfully, production once again
can begin. In the meantime, I was able to order "micromagnets" from the same
company. They work just like Zen Magnets, but are tinier. I decided
to order a couple sets, because I'm impatient and also to support the
company who fought the battle allowing magnets to be sold in
the US once again.
&lt;/p&gt;
&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12139magnetsf1.jpg" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
&lt;strong&gt;These are what I made last night with my new micromagnets. I can
hardly wait for the full-size ones!&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
To read about the legal battle, check out the blog &lt;a href="https://zenmagnets.com/magnet-ban-cleared-game-on"&gt;here&lt;/a&gt;.
And while you're there,
feel free to pre-order some Zen Magnets. I sure did!
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/getting-sticky-it" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 19 Jul 2017 13:33:09 +0000</pubDate>
    <dc:creator>Shawn Powers</dc:creator>
    <guid isPermaLink="false">1339444 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>FreeDOS Is 23 Years Old, and Counting</title>
  <link>https://www.linuxjournal.com/content/freedos-23-years-old-and-counting</link>
  <description>  &lt;div data-history-node-id="1339436" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/fdfish-color-text.jpg" width="471" height="600" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/jim-hall" lang="" about="https://www.linuxjournal.com/users/jim-hall" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Jim Hall&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
The FreeDOS Project has just reached its 23rd birthday! This is a major
milestone for any free software or open-source software project.
&lt;/p&gt;

&lt;p&gt;
If you don't know about FreeDOS, it's a small project that replaces
MS-DOS, which was the mainstay operating system for most personal computers in
the 1980s and 1990s. During that era, I was a huge MS-DOS fan. I used DOS for
everything and considered myself a DOS "power-user". I even wrote my own
utilities and tools to expand the MS-DOS command-line environment and make DOS
more useful.
&lt;/p&gt;

&lt;p&gt;
I was aware of other operating systems, of course. In the early 1990s, my
university installed Windows in the PC computer labs. But if you remember Windows
3.1 at the time, it was a pretty rough environment. I didn't like that you
could interact with Windows only via a mouse; there was no command line. I
preferred working at the command line.
&lt;/p&gt;

&lt;p&gt;
So I was understandably distressed in 1994 when I read via various tech magazines
that Microsoft planned to eliminate MS-DOS with the next version of Windows. I
decided that if the next evolution of Windows was going to be anything like
Windows 3.1, I wanted nothing to do with it.
&lt;/p&gt;

&lt;p&gt;
But what to do? If Microsoft killed MS-DOS, what would be left for those of us
who preferred typing at the DOS command line? Sure, there was Linux, but
Linux couldn't run MS-DOS applications—and there were a lot of great DOS
applications.
&lt;/p&gt;

&lt;p&gt;
I decided to create my own version of DOS. And on June 29, 1994, I posted an
announcement to a discussion group, which said in part:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
A few months ago, I posted articles relating to starting a public
domain version of DOS.  The general support for this at the time was
strong, and many people agreed with the statement, "start writing!"
So, I have...
&lt;/p&gt;

&lt;p&gt;
Announcing the first effort to produce a PD-DOS.  I have written up a
"manifest" describing the goals of such a project and an outline of
the work, as well as a "task list" that shows exactly what needs to be
written.  I'll post those here, and let discussion follow.
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;
Our "PD-DOS" project (for "Public Domain DOS") quickly grew into
FreeDOS. And 23 years later, FreeDOS is still going strong!
&lt;/p&gt;
&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/install09.png" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
Today, many people around the world install FreeDOS to play classic DOS games,
run legacy business software or develop embedded systems. These days, I think
that still represents most of the usage of FreeDOS. Although I'll admit most
people probably run FreeDOS to play DOS games, and that's okay with me. Just
because it's an old game doesn't mean it's boring—and DOS had a lot
of great games.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/freedos-23-years-old-and-counting" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 30 Jun 2017 20:49:57 +0000</pubDate>
    <dc:creator>Jim Hall</dc:creator>
    <guid isPermaLink="false">1339436 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>From vs. to + for Microsoft and Linux</title>
  <link>https://www.linuxjournal.com/content/vs-microsoft-and-linux</link>
  <description>  &lt;div data-history-node-id="1339280" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12132f1.jpg" width="686" height="383" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/doc-searls" lang="" about="https://www.linuxjournal.com/users/doc-searls" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Doc Searls&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
In November 2016, &lt;a href="https://www.linuxfoundation.org/announcements/microsoft-fortifies-commitment-to-open-source-becomes-linux-foundation-platinum"&gt;Microsoft
became a platinum member of the Linux Foundation&lt;/a&gt;, the primary
sponsor of top-drawer Linux talent (including Linus), as well as a leading organizer
of Linux conferences and source of Linux news.
&lt;/p&gt;

&lt;p&gt;
Does it matter that Microsoft has a long history of fighting Linux with patent claims?
Seems it should. Run a Google search for "microsoft linux patents", and you'll get almost
a half-million results, most of which raise questions. Is Microsoft now ready to
settle or drop claims? Is this about keeping your friends close and your enemies
closer? Is it just a seat at a table it can't hurt Microsoft to sit at?
&lt;/p&gt;

&lt;p&gt;
Maybe it will help to look at patents in general, rather than any of the ones you'll
find in contention (or potential contention) at that last link.
&lt;/p&gt;

&lt;p&gt;
The history of patents, at least in the US, is thick with ironies, such as the one we
see here, starting with &lt;a href="https://press-pubs.uchicago.edu/founders/documents/a1_8_8s12.html"&gt;Thomas
Jefferson's famous letter to Isaac McPherson in 1813&lt;/a&gt;.
Here's the relevant excerpt:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
Stable ownership is the gift of social law, and is given late in the progress of
society. It would be curious then, if an idea, the fugitive fermentation of an
individual brain, could, of natural right, be claimed in exclusive and stable
property. If nature has made any one thing less susceptible than all others of
exclusive property, it is the action of the thinking power called an idea, which an
individual may exclusively possess as long as he keeps it to himself; but the moment
it is divulged, it forces itself into the possession of every one, and the receiver
cannot dispossess himself of it. Its peculiar character, too, is that no one possesses
the less, because every other possesses the whole of it. He who receives an idea from
me, receives instruction himself without lessening mine; as he who lights his taper at
mine, receives light without darkening me. That ideas should freely spread from one to
another over the globe, for the moral and mutual instruction of man, and improvement
of his condition, seems to have been peculiarly and benevolently designed by nature,
when she made them, like fire, expansible over all space, without lessening their
density in any point, and like the air in which we breathe, move, and have our
physical being, incapable of confinement or exclusive appropriation. Inventions then
cannot, in nature, be a subject of property. Society may give an exclusive right to
the profits arising from them, as an encouragement to men to pursue ideas which may
produce utility, but this may or may not be done, according to the will and
convenience of the society, without claim or complaint from anybody.
&lt;/p&gt;&lt;/blockquote&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/vs-microsoft-and-linux" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 07 Feb 2017 10:51:34 +0000</pubDate>
    <dc:creator>Doc Searls</dc:creator>
    <guid isPermaLink="false">1339280 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Steven Ovadia's Learn Linux in a Month of Lunches (Manning Publications Co.)</title>
  <link>https://www.linuxjournal.com/content/steven-ovadias-learn-linux-month-lunches-manning-publications-co</link>
  <description>  &lt;div data-history-node-id="1339176" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12060f8.jpg" width="261" height="327" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/james-gray" lang="" about="https://www.linuxjournal.com/users/james-gray" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;James Gray&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Yes, Steven Ovadia's new book for Linux "noobs" is titled
&lt;em&gt;Learn Linux in a Month of Lunches&lt;/em&gt;, but readers may
need two-hour lunches
and weekends to attain the ambitious goal implied in the title. No matter
though,
because this "study while dining" series of books from &lt;a href="https://manning.com"&gt;Manning
Publications&lt;/a&gt; offers a fine approach to learning the essentials of our
beloved OS, from installation to networking, installing software and
securing a system. 
&lt;/p&gt;

&lt;p&gt;
Readers just curious about Linux or needing to get up
and running for their jobs will appreciate how this book concentrates on
need-to-know tasks. By digesting targeted, easy-to-follow, compact lessons,
readers learn how to use the command line, customize a desktop, print,
choose the right application for their needs and more. Readers who make it
to the end of the book are treated to topics like filesystems, GitLab
and using Linux professionally—for example, certifications. Although new Linux users
may be overwhelmed at first, Ovadia's book illustrates how learning
Linux doesn't have to be hard, and the payoff is great.
&lt;/p&gt;
&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12060f8.jpg" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/steven-ovadias-learn-linux-month-lunches-manning-publications-co" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 05 Oct 2016 13:45:00 +0000</pubDate>
    <dc:creator>James Gray</dc:creator>
    <guid isPermaLink="false">1339176 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Senet IoT Foundry</title>
  <link>https://www.linuxjournal.com/content/senet-iot-foundry</link>
  <description>  &lt;div data-history-node-id="1339175" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12060f7.jpg" width="650" height="204" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/james-gray" lang="" about="https://www.linuxjournal.com/users/james-gray" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;James Gray&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Startup companies and even large enterprises may not be able to harness the
full range of skills required to deliver vertically complete IoT solutions
to their customers. To assist these companies in getting to market and
solving their customers' problems, &lt;a href="https://senetco.com"&gt;Senet&lt;/a&gt; introduces Senet IoT Foundry,
a suite of development services—training, development tools,
a network sandbox and technical consulting services—that help IoT
solution developers create and launch LoRa-compliant IoT products and
applications. 
&lt;/p&gt;

&lt;p&gt;
Senet calls itself the first and only North American provider
of public, LoRa-based, low-power, wide-area networks (LPWANs) for Internet
of Things (IoT) applications, putting it in a strong position to support
companies in their commercialization of LoRa-based LPWAN products and
solutions. 
&lt;/p&gt;

&lt;p&gt;
Senet is a contributing member of the LoRa Alliance and was the
first in North America to gain FCC certification on LoRa-based sensors and
gateways. As a result, the company claims to possess a treasure chest of
high-level designs, best practices and development tools that can benefit
other ecosystem partners. Users of Senet IoT Foundry services can opt to
follow the Foundry's four-step development program, or pick and choose
the services they need most.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/senet-iot-foundry" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 04 Oct 2016 11:30:00 +0000</pubDate>
    <dc:creator>James Gray</dc:creator>
    <guid isPermaLink="false">1339175 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Updates from LinuxCon and ContainerCon, Toronto, August 2016</title>
  <link>https://www.linuxjournal.com/content/updates-linuxcon-and-containercon-toronto-august-2016</link>
  <description>  &lt;div data-history-node-id="1339139" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/linuxcon-na-2016-banner.png" width="370" height="127" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/john-s-tonello" lang="" about="https://www.linuxjournal.com/users/john-s-tonello" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;John S. Tonello&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;h3&gt;
The Future of Linux: Continuing to Inspire Innovation and Openness&lt;/h3&gt;


&lt;p&gt;
The first 25 years of Linux has transformed the world, not just computing, and the next 25 years will continue to see more growth in the Open Source movement, The Linux Foundation Executive Director Jim Zemlin said during the opening keynote of LinuxCon/ContainerCon in Toronto on Monday, August 22, 2016.
&lt;/p&gt;

&lt;p&gt;
"Linux is the most successful software project in history", Zemlin said, noting that the humble operating sytem created by Linus Torvalds 25 years ago this week is behind much of today's software and devices.
&lt;/p&gt;

&lt;p&gt;
But the message of Linux is far more than software, Zemlin said. It's about the open exchange of ideas that's world-changing and inspiring. The concept of sharing has changed how the world thinks about technology and how it's made, he said.
&lt;/p&gt;

&lt;p&gt;
"We've learned that you can better yourself while bettering others at the same time", he said. "We're building the greatest shared technology asset in the history of computing."
&lt;/p&gt;

&lt;p&gt;
In the coming years, Zemlin predicts an even more rapid shift to open source, particularly in a world that now makes it nearly impossible to deploy software without collaborating and taking advantage of open resources.
&lt;/p&gt;

&lt;p&gt;
The Linux Foundation itself seeks to build on the work of the past 25 years by working to create and support standards for security and open-source rights, and increasing the diversity of the Open Source movement, Zemlin said.
&lt;/p&gt;

&lt;h3&gt;
Vendor Spotlight: Anchore—Container Management with an Eye to Deployment&lt;/h3&gt;
&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/Anchore_Logo-1024x563.jpg" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
When it comes to deploying containers, it's still a bit of the Wild West—particularly if you're hosting a shared cluster. What's really inside each container? Is the OS current? Is the security sufficient? Are there unpatched bugs?
&lt;/p&gt;

&lt;p&gt;
&lt;a href="www.anchore.com"&gt;Anchore&lt;/a&gt;, one of the container-related sponsors at LinuxCon 2016 and ContainerCon being held this week in Toronto, seeks to change that. The company offers a product (now in beta) that aims to provide container image management and analytics. According to CTO and co-founder Daniel Nurmi, the Anchore tools allow you to create a set of standards and test your containers against those standards before you deploy them to production. If you have a shared environment, the tools can give you insight into the often opaque nature of containers. Learn more &lt;a href="https://www.anchore.com"&gt;here&lt;/a&gt;.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/updates-linuxcon-and-containercon-toronto-august-2016" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 23 Aug 2016 13:00:00 +0000</pubDate>
    <dc:creator>John S. Tonello</dc:creator>
    <guid isPermaLink="false">1339139 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Contrast Security's Contrast Enterprise</title>
  <link>https://www.linuxjournal.com/content/contrast-securitys-contrast-enterprise</link>
  <description>  &lt;div data-history-node-id="1339079" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12028f2.jpg" width="400" height="129" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/james-gray" lang="" about="https://www.linuxjournal.com/users/james-gray" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;James Gray&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12028f2.jpg" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;p&gt;
With more and more businesses running on the Node.js server-side JavaScript
runtime environment, application vulnerabilities are a growing threat to
entire organizations. The antidote to this problem, says Contrast Security,
is the new Contrast Enterprise, which is marketed as the only application
security product that enables the discovery and remediation of Node.js
security vulnerabilities in real time. Contrast Enterprise achieves this
without disrupting software development processes or involving application
security experts. 
&lt;/p&gt;
&lt;p&gt;
Product features include high levels of accuracy so that
developers don't burn cycles chasing false alarms; continuous operation
throughout the Agile development process—that is, no security scans or waiting
for results; and deep security instrumentation for identifying
vulnerabilities across Node.js deployments, such as APIs, microservices,
containers and libraries.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/contrast-securitys-contrast-enterprise" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 02 Jun 2016 21:27:39 +0000</pubDate>
    <dc:creator>James Gray</dc:creator>
    <guid isPermaLink="false">1339079 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>diff -u: What's New in Kernel Development</title>
  <link>https://www.linuxjournal.com/content/diff-u-whats-new-kernel-development-14</link>
  <description>  &lt;div data-history-node-id="1338856" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/kernel_8.jpg" width="100" height="100" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/zack-brown" lang="" about="https://www.linuxjournal.com/users/zack-brown" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Zack Brown&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Over time, memory can become more and more fragmented on a system,
making it difficult to find contiguous blocks of RAM to satisfy ongoing
allocation requests. At certain times the running system may compact
regions of memory together to free up larger blocks, but &lt;em&gt;Vlastimil
Babka&lt;/em&gt; recently pointed out that this wasn't done regularly enough to
avoid latency problems for code that made larger memory requests.
&lt;/p&gt;

&lt;p&gt;
Vlastimil wanted to create a new per-CPU dæmon, called &lt;em&gt;kcompactd&lt;/em&gt;,
that would do memory compaction as an ongoing system activity.
&lt;/p&gt;

&lt;p&gt;
The basic objection, voiced by &lt;em&gt;David
Rientjes&lt;/em&gt;, was that creating a
whole new thread on all CPUs carried its own overhead issues. He suggested
having one of the other per-CPU threads simply take on the additional
memory compaction responsibilities. He identified the &lt;em&gt;khugepaged&lt;/em&gt; dæmon
as the best candidate.
&lt;/p&gt;

&lt;p&gt;
Vlastimil actually had identified khugepaged as a candidate and rejected
it, on the grounds that khugepage dealt only with &lt;em&gt;THP&lt;/em&gt; (Transparent
HugePages) memory use cases. These are an abstraction layer above regular
memory allocation, so it wouldn't cover all possible cases, only
user code that dealt with THPs.
&lt;/p&gt;

&lt;p&gt;
David argued that THP allocations were where most compaction problems
occurred, and that other allocation systems, like the &lt;em&gt;SLUB&lt;/em&gt; allocator (used
for highly efficient kernel allocations), were not part of the problem.
&lt;/p&gt;

&lt;p&gt;
Eventually, it came out that David actually envisioned two forms of memory
compaction. The first would be a periodic compaction effort that would
happen regardless of the state of RAM. The second would be a compaction
effort that would be triggered when particular regions of RAM were
detected as being overly fragmented. By splitting these two forms of
memory compaction from each other, David felt it would be possible
to piggy-back various pieces of functionality onto different existing
threads and avoid having to create a new per-CPU thread in the kernel.
&lt;/p&gt;

&lt;p&gt;
A final design did not get hashed out during the discussion, but no one
seemed to be saying that memory compaction itself was a bad goal. The
question always was how to implement it. &lt;em&gt;Mel
Gorman&lt;/em&gt; even suggested that
a fair bit of the work could be done from user space, via the &lt;em&gt;SysFS&lt;/em&gt;
interface. But, that idea wasn't explored during the discussion, so
it seems that only technical obstacles could get in the way of some
background memory compaction going into the kernel.
&lt;/p&gt;

&lt;p&gt;
One problem with enabling the &lt;em&gt;CONFIG_TRACING&lt;/em&gt; option in the kernel,
as &lt;em&gt;Tal Shorer&lt;/em&gt; recently pointed out, is that it would enable absolutely
every tracepoint, causing a significant performance penalty. It made
more sense, he felt, to allow users to enable tracepoints on just the
subsystems they were interested in testing.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/diff-u-whats-new-kernel-development-14" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 13 Oct 2015 17:25:32 +0000</pubDate>
    <dc:creator>Zack Brown</dc:creator>
    <guid isPermaLink="false">1338856 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>diff -u: What's New in Kernel Development</title>
  <link>https://www.linuxjournal.com/content/diff-u-whats-new-kernel-development-10</link>
  <description>  &lt;div data-history-node-id="1338746" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/kernel_6.jpg" width="100" height="100" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/zack-brown" lang="" about="https://www.linuxjournal.com/users/zack-brown" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Zack Brown&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
When you run a program as &lt;em&gt;&lt;strong&gt;setuid&lt;/strong&gt;&lt;/em&gt;, it runs with all the permissions of that
user. And if the program spawns new processes, they inherit the same
permissions. Not so with filesystem capabilities. When you run a program
with a set of capabilities, the processes it spawns do not have those
capabilities by default; they must be given explicitly.
&lt;/p&gt;

&lt;p&gt;
This seemed unintuitive to &lt;em&gt;&lt;strong&gt;Christoph
Lameter&lt;/strong&gt;&lt;/em&gt;, who posted a patch to change
&lt;em&gt;&lt;strong&gt;capability inheritance&lt;/strong&gt;&lt;/em&gt; to match the behavior of setuid inheritance. This
turned out to inspire some controversy.
&lt;/p&gt;

&lt;p&gt;
For one thing, filesystem capabilities never were defined fully in the
&lt;em&gt;&lt;strong&gt;POSIX&lt;/strong&gt;&lt;/em&gt; standard and appear only in a draft version of POSIX that later
was withdrawn, so there can't really be any discussion of whether one form of
capabilities is "more compliant" than another.
&lt;/p&gt;

&lt;p&gt;
There are other problems, such as the need to make sure that any changes to
capabilities don't break existing code and the need to make sure that any
ultimate solution remains secure.
&lt;/p&gt;

&lt;p&gt;
One problem with Christoph's idea was that it tied capability inheritance
to the file itself, but as &lt;em&gt;&lt;strong&gt;Serge Hallyn&lt;/strong&gt;&lt;/em&gt; pointed out, capabilities were
tied to both the file and the user executing the file. Ultimately, Christoph
decided to adapt his code to that constraint, introducing a new capability
that would list the inheritable capabilities available for the user to
apply to a given file.
&lt;/p&gt;

&lt;p&gt;
&lt;em&gt;&lt;strong&gt;Yalin Wang&lt;/strong&gt;&lt;/em&gt; recently made an abortive
effort to have &lt;em&gt;&lt;strong&gt;/proc/stat&lt;/strong&gt;&lt;/em&gt; list all
CPUs on a given system, not just the on-line ones. This would be a very
useful feature, because many modern systems bring CPUs on- and off-line at a
rapid pace. Often the number of CPUs actually in use is less important than
the number available to be used.
&lt;/p&gt;

&lt;p&gt;
He posted a patch to change /proc/stat accordingly, and &lt;em&gt;&lt;strong&gt;David Rientjes&lt;/strong&gt;&lt;/em&gt;
pointed out that the /&lt;em&gt;&lt;strong&gt;sys/devices/cpu&lt;/strong&gt;&lt;/em&gt; file would be a better location for
this. &lt;em&gt;&lt;strong&gt;Andrew Morton&lt;/strong&gt;&lt;/em&gt; also pointed out that
&lt;em&gt;&lt;strong&gt;/proc/cpuinfo&lt;/strong&gt;&lt;/em&gt; would be a good
location for this kind of data as well. So, there definitely was some
support for Yalin's idea.
&lt;/p&gt;

&lt;p&gt;
Unfortunately, it turned out that some existing code in the &lt;em&gt;&lt;strong&gt;Android&lt;/strong&gt;&lt;/em&gt; kernel
relied on the current behavior of those files—specifically desiring the
number of on-line CPUs as opposed to the total number of CPUs on the system.
With an existing user dependent on the existing behavior, it became a much
harder sell to get the change into the kernel. Yalin would have to show a
real need as opposed to just a sensible convenience, so his patch went
nowhere.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/diff-u-whats-new-kernel-development-10" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 17 Jun 2015 20:15:35 +0000</pubDate>
    <dc:creator>Zack Brown</dc:creator>
    <guid isPermaLink="false">1338746 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
