Home Blog Page 116

Free Course Explores WebAssembly Modules from the Cloud to the Edge

With our world being increasingly driven by apps and the microservices that support them, adoption of WebAssembly (Wasm) continues to accelerate. WebAssembly is a stack-based virtual machine that can greatly improve the performance and capabilities of websites and, despite the name, nearly any other kind of non-web platform you can imagine.

Besides making browsers much more powerful, this technology may extend beyond the scope of mere websites. It isn’t just for browsers; Wasm is currently being used in cloud, mobile, low-level networking, and edge-based environments.

This is why The Linux Foundation is today releasing a new, free, online training course, WebAssembly Actors: From Cloud to Edge (LFD134x). The course explores the portability, efficiency, and security of WebAssembly modules and how to leverage a number of open source frameworks to create distributed and seamlessly connected actors that can be deployed in a browser, on a laptop, in the cloud, on a Raspberry Pi, or practically anywhere.

This course is designed for developers who have built or are building microservices and have experienced a high degree of friction in cloud native application development. Developers looking to embrace the simplicity of Functions as a Service (FaaS) without the overhead of cloud providers or sacrificing the ability to experiment and test locally and in any other environment will gain significant value from this course.

Kevin Hoffman, the author of “Programming WebAssembly with Rust”, “Cloud Native Go”, and over a dozen books on various aspects of the .NET Framework, created this course. He has presented at a number of conferences and events over the past 2 years on WebAssembly, and at dozens of previous conferences on everything from .NET to Spring Boot to Redis and even at Apple’s WWDC.

The course is free to audit on edX.org for seven weeks, or a verified certification of completion is available for a fee, which includes a full year of course access. Enroll today and start improving your cloud native application development with Wasm!

The post Free Course Explores WebAssembly Modules from the Cloud to the Edge appeared first on Linux Foundation – Training.

Please Participate In Hyperledger’s 2021 Blockchain Brand Survey

Together with Linux Foundation Research, Hyperledger is conducting a survey to measure the market awareness and perceptions of Hyperledger and its projects relative to other blockchain platforms used in the technology industry, specifically identifying myths and misperceptions. Additionally, the survey seeks to help Hyperledger articulate the perceived time to production readiness for products and understand motivations for developers that both use and contribute to Hyperledger technologies.

  • Participants who complete the survey will receive a 50 percent discount on attendance to Hyperledger Global Forum, June 8-10, 2021
  • Please participate now; we intend to close the survey in early June. 
  • Privacy and confidentiality are important to us. Neither participant names, nor their company names, will be displayed in the final results. 
  • This survey should take no more than 20 minutes of your time.

Click here to access the Brand Survey

A beginner’s guide to creating redirects in an .htaccess file

Use the .htaccess file to manage web sites on shared web hosting platforms.
Read More at Enable Sysadmin

Analyzing cases for and against setting swap space on cloud instances

Analyzing cases for and against setting swap space on cloud instances

To swap or not to swap? That is the cloud question.
Major Hayden
Tue, 5/18/2021 at 2:28pm

Image

Photo by Rakicevic Nenad from Pexels

If you want to start an argument with a Linux user, ask about swap memory. Some praise it as a cushion or as a safety net while others disparage it as a crutch and a destroyer of system performance. Born in the 1960s, swap memory has evolved over the years on Linux to serve two essential functions:

Topics:  
Linux  
Linux Administration  
Cloud  
Read More at Enable Sysadmin

Enroll in Instructor-Led Training and You’ll Now Receive a Free Gift

We’ve heard from enrollees in our instructor-led training that they miss the Chomebook we previously provided with these course enrollments. So, effective immediately, we are offering you the chance to select a free gift if you enroll in one of our instructor-led training courses!

For those in the United States

Individuals in the USA who enroll in instructor-led training will be able to select from a variety of Linux-powered gifts from Best Buy. The options will change with time, but you should expect to be able to choose from things like:

Chomebooks
Android tablets
Fitness trackers
Smart watches
Smart speakers
And more!

After enrolling in your course, you will receive an email with a link where you’ll see all your options and can select the one that suits you best. 

For those outside the United States

Those outside the USA will receive a $300 refund on their course fees. This refund will be applied to the payment card used to purchase the training course. After much research, allowing our customers to use these funds to purchase something in their local market was more practical than trying to ship from the US and have to deal with long lead times, export restrictions and customs charges.

Click here to learn more about this great new benefit!

The post Enroll in Instructor-Led Training and You’ll Now Receive a Free Gift appeared first on Linux Foundation – Training.

7 Linux networking commands that every sysadmin should know

There are a few commands that should always be in your sysadmin toolbox. Get to know these 7 essential networking commands.
Read More at Enable Sysadmin

Enhancing Linux security with Advanced Intrusion Detection Environment (AIDE)

Part two of a multipart series covering Linux security.
Read More at Enable Sysadmin

How to pass extra variables to an Ansible playbook

Learn how to pass variables to your Ansible playbooks makes them more portable and flexible.
Read More at Enable Sysadmin

How do you handle NIST’s separation of duty requirements?

How do you handle NIST’s separation of duty requirements?

Separation of duty can put stress on smaller organizations. How do you handle the requirements?
khess
Mon, 5/17/2021 at 3:22pm

Image

Image by Free-Photos from Pixabay

Sysadmins, as you know, wear a lot of different hats–meaning that sysadmins do a lot of different jobs and typically have ultimate power in all of them. The all-powerful root user account and its highly-protected password are good examples of that ultimate power. For those of you who perform work that falls under certain regulations, like those of Department of Defense (DoD) project, you may have to comply with guidelines from the National Institute of Standards and Technology (NIST) 800-171, which includes the separation of duties (Control 3.1.4).

Topics:  
Linux  
Linux Administration  
Regulatory Compliance  
Read More at Enable Sysadmin

How to enhance Linux user security with Pluggable Authentication Module settings

Using these tips, you can dramatically increase the strength of user passwords with Pluggable Authentication Module settings.
Read More at Enable Sysadmin