Language Selection

English French German Italian Portuguese Spanish

Linux on Servers and Networks

Filed under
Server
  • Parity Check: Expectations Around Monitoring Have Changed

    Monitoring software company BigPanda recently published its second annual State of Monitoring report, which provides data and a few answers. It is based on responses from over 1,500 IT pros. When comparing the 2017 and 2016 reports we found that many things have not changed. The top IT concerns are about security and downtime. The top IT monitoring challenges are quick remediation of service disruptions, getting money to buy monitoring tools and reducing the number of unimportant alerts being generated. Interestingly, even the top performance key performance indicators (KPIs) are the same, with customer satisfaction cited by 73 percent, followed service level agreements (SLAs) compliance, incident volume and mean time to repair (MTTR).

  • IT Automation Best Practices for Network Engineers and Architects

    Software-defined networking (SDN) for L2 and L3 (layer two and three) networking and network function virtualization (NFV) for L4-L7 network services have remained elusive for many IT departments due to the lack of maturation of the technology or specialized skills needed to implement them. But, network automation doesn’t have to be an all or nothing proposition. Software-defined approaches for application and networking services combined with scripting and orchestration tools such as Ansible are enabling practical approaches to network automation that doesn’t require boiling the ocean. In this article, I’ll examine some best practices for network automation in L4-L7 services that can drive immediate improvements in your network.

  • Serverless: Redefining DevOps

    There is a dramatic shift underway in how many in house, and commercial, DevOps tools are being created and used

    The growth in interest in serverless computing continues at pace, and for many organisations serverless technologies such as AWS Lambda, Azure Functions or Google Cloud Functions are becoming an essential part of their development and operations toolkit.

  • IT Workers Say Their Companies Are Migrating to Virtual Infrastructures, Study Says

    An overwhelming 86 percent of respondents to a Chef survey of IT practitioners have completed or are in the progress of migrating from a physical infrastructure to a virtual one.

    Chef interviewed more than 1,500 global IT workers that use Chef servers and found that many emerging and legacy technologies are being rebuilt around the needs of developers. In addition, companies are piloting and adapting new technologies like cloud, containers, and microservices in search of speed.

  • ARM Antes Up For An HPC Software Stack

    The HPC community is trying to solve the critical compute challenges of next generation high performance computing and ARM considers itself well-positioned to act as a catalyst in this regard. Applications like machine learning and scientific computing are driving demands for orders of magnitude improvements in capacity, capability and efficiency to achieve exascale computing for next generation deployments.

    ARM has been taking a co-design approach with the ecosystem from silicon to system design to application development to provide innovative solutions that address this challenge. The recent Allinea acquisition is one example of ARM’s commitment to HPC, but ARM has worked with the HPC community to develop compilers, libraries, and other key tools that are now available for ARM HPC deployments in 2017.

  • Mesosphere Extends Data Services Reach

    In general, Hsu says, IT organizations are making it clear that they need platforms that go well beyond merely orchestrating containers and images. Applications running in production environments require access to a full range of services that IT operations teams need to be able to manage at scale, he says. Container orchestration engines such as Kubernetes may meet the requirements of an individual developer, but most IT operations teams are looking manage multiple applications accessing hundreds of services that all need to be centrally managed, says Hsu.

More in Tux Machines

Fedora: Anaconda Improvements, Greenboot, Fedora Scientific Vagrant Boxes and Abhishek

  • Anaconda improvements in Fedora 28
    Fedora 28 was released last month, and the major update brought with it a raft of new features for the Fedora Installer (Anaconda). Like Fedora, Anaconda is a dynamic software project with new features and updates every release. Some changes are user visible, while others happen under the hood — making Anaconda more robust and prepared for future improvements.
  • Lorbus: Introducing: greenboot
    Not too long ago, I applied to Google Summer of Code for the student scholarship position together with a Fedora project ideated by Peter Robinson, who is the principal IoT architect at Red Hat, named Fedora IoT: Atomic Host Upgrade Daemon. As you may be guessing by now, I was very fortunate and the proposal was accepted! The coding phase started on the 14th of May and in this blog post I’ll try to give a little insight into my first month working on the project.
  • Pre-release Fedora Scientific Vagrant Boxes
    I am very excited to share that sometime back the Fedora project gave the go ahead on my idea of making Fedora Scientific available as Vagrant boxes starting with Fedora 29. This basically means (I think) that using Fedora Scientific in a virtual machine is even easier.
  • [Week 5] GSoC Status Report for Fedora App: Abhishek

Red Hat News

  • An Open Source Load Balancer for OpenShift
    A highly-available deployment of OpenShift needs at least two load balancers: One to load balance the control plane (the master API endpoints) and one for the data plane (the application routers). In most on-premise deployments, we use appliance-based load balancers (such as F5 or Netscaler).
  • Red Hat Beefs Up Platform as a Service Suite
    Red Hat has begun shipping Red Hat Fuse 7, the next major release of its distributed, cloud-native integration solution, and introduced a new fully hosted low-code integration platform as a service (iPaaS) offering, Fuse Online. With Fuse 7, the vendor says expanding its integration capabilities natively to Red Hat OpenShift Container Platform, an enterprise Kubernetes platform. Fuse gives customers a unified solution for creating, extending and deploying containerized integration services across hybrid cloud environments.
  • Red Hat ‘Fuses’ Low Code Development and Data Integration
    Red Hat, a provider of open source solutions, has announced Red Hat Fuse 7, the next major release of its distributed, cloud-native integration solution, and introduced a new fully hosted low-code integration platform as a service offering, Fuse Online. With Fuse 7, Red Hat is expanding its integration capabilities natively to Red Hat OpenShift Container Platform, a comprehensive enterprise Kubernetes platform. Fuse gives customers a unified solution for creating, extending and deploying containerized integration services across hybrid cloud environments.
  • The GPL cooperation commitment and Red Hat projects
    As of today, all new Red Hat-initiated open source projects that opt to use GPLv2 or LGPLv2.1 will be expected to supplement the license with the cure commitment language of GPLv3. The cure language will live in a file in the project source tree and will function as an additional permission extended to users from the start. This is the latest development in an ongoing initiative within the open source community to promote predictability and stability in enforcement of GPL-family licenses. The “automatic termination” provision in GPLv2 and LGPLv2.x is often interpreted as terminating the license upon noncompliance without a grace period or other opportunity to correct the error in compliance. When the Free Software Foundation released GPLv2 in 1991, it held nearly all GPL-licensed copyrights, in part a consequence of the copyright assignment policy then in place for GNU project contributions. Long after the Linux kernel and many other non-GNU projects began to adopt the GPL and LGPL, the FSF was still the only copyright holder regularly engaged in license enforcement. Under those conditions, the automatic termination feature of GPLv2 section 4 may have seemed an appropriate means of encouraging license compliance.
  • Monness Believes Red Hat (NYSE: RHT) Still Has Room to Grow
  • Comparing Red Hat (RHT) & Autoweb (AUTO)
  • As Red Hat (RHT) Share Value Rose, Calamos Advisors Upped Its Position by $300,831; Chilton Capital Management Increases Stake in Equinix (EQIX)
  • Blair William & Co. IL Buys 23,279 Shares of Red Hat Inc (RHT)

Total War: WARHAMMER

Red Hat changes its open-source licensing rules

From outside programming circles, software licensing may not seem important. In open-source, though, licensing is all important. So, when leading Linux company Red Hat announces that -- from here on out -- all new Red Hat-initiated open-source projects that use the GNU General Public License(GPLv2) or GNU Lesser General Public License (LGPL)v2.1 licenses will be expected to supplement the license with GPL version 3 (GPLv3)'s cure commitment language, it's a big deal. Read more