When thinking about IT security, one area that may not readily come to mind is the physical security of an enterprise’s servers. It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.
Linux Kernel 5.2 Will Address Industrial Operations, Two-Factor Authentication
Currently, at release candidate 3, the Linux 5.2 kernel is coming soon and promises to offer quite a host of impressive new features and improvements. Lets take a look at some of the highlights.
New Features
Fieldbus Subsystem
One of the new features that should excite anyone who deals with automated industrial systems is the introduction of the new Fieldbus Subsystem. Fieldbus is crucial in connecting different systems in industrial environments, and with this addition, the Linux kernel can now natively communicate with field instruments (such as those used in manufacturing plants) as a part of a control system.
Linux’s Broadening Foundation
It’s time to embrace 5G, starting with the Edge in our homes and hands.
In June 1997, David Isenberg, then of
AT&T Labs Research, wrote a landmark
paper titled “Rise of the Stupid
Network”. You can still find it here. The
paper argued against phone companies’ intent to make their own systems
smarter. He said the internet, which already was subsuming all the world’s
phone and cable TV company networks, was succeeding not by being smart, but
by being stupid. By that, he meant the internet “was built for intelligence at
the end-user’s device, not in the network”.
In a stupid network, he wrote, “the data is boss, bits are essentially free,
and there is no assumption that the data is of a single data rate or data
type.” That approach worked because the internet’s base protocol, TCP/IP, was
as general-purpose as can be. It supported every possible use by not caring
about any particular use or purpose. That meant it didn’t care about data
rates or types, billing or other selfish concerns of the smaller specialized
networks it harnessed. Instead, the internet’s only concern was connecting end
points for any of those end points’ purposes, over any intermediary networks,
including all those specialized ones, without prejudice. That lack of
prejudice is what we later called neutrality.
The academic term for the internet’s content- and purpose-neutral design is
end-to-end. That design was informed by “End-to-End Arguments in System
Design”, a paper by Jerome Saltzer, David P. Reed and David D. Clark,
published in 1980. In 2003, David
Weinberger and I later cited both papers in
“World of Ends: What the Internet Is and How to Stop Mistaking It for
Something Else”. In it, we explained:
When Craig Burton describes the Net’s stupid architecture as a hollow
sphere comprised entirely of ends, he’s painting a picture that gets at
what’s most remarkable about the Internet’s architecture: Take the value out
of the center and you enable an insane flowering of value among the connected
end points. Because, of course, when every end is connected, each to each and
each to all, the ends aren’t endpoints at all.And what do we ends do? Anything that can be done by anyone who wants to
move bits around.
The web the world needs can be ours again, if we want it
People everywhere are demanding basic consumer protections.
We want our food to be healthy to eat, our water to be clean to drink, and our air to be safe to breathe.
This year people have started to demand more of the internet as well, however, there persists an expectation that on the internet people are responsible for protecting themselves. You should not have to worry about trading privacy and control in order to enjoy the technology you love. Tech companies have put the onus on people to read through their opaque terms and conditions tied to your data and privacy to use their services. The average privacy policy from a tech company is thousands of words and written at a level that often requires legal training to interpret. As such the vast majority of people don’t bother to read, and just click through these agreements trusting that the companies have their interests at heart.
Linux Foundation Statement on Huawei Entity List Ruling
We have received inquiries regarding concerns about a member subject to an Entity List Ruling. [1] The Huawei Entity List ruling was specifically scoped to activities and transactions subject to the Export Administration Regulations (EAR).
Open Source Software Not involving Encryption
The Linux Foundation is a free and open source software organization whose project communities publish collaboratively developed software publicly. All software published by Linux Foundation projects is made available to the public without restrictions other than those imposed by the open source licenses. Software that is published publicly, such as open source software, is not subject to the EAR [2], and therefore not relevant to the Entity List Ruling.
8 ways your company can support and sustain open source
The success of open source continues to grow; surveys show that the majority of companies use some form of open source, 99% of enterprises see open source as important, and almost half of developers are contributing back.
Preparing Your Enterprise for the Worst With Disaster Recovery, Monitoring
With the rise of both man-made and natural disasters (including fires and earthquakes), the disaster recovery (DR) market has growing importance in protecting an enterprise and its user community, according to RackWare co-founder and CEO Sash Sunkara.
“It is a really critical requirement [for enterprises] and when people think about DR there are certain things that they should really think about when putting a plan together,” Sunkara said. This includes implementing the correct infrastructure monitoring and disaster recovery toolset so that an enterprise’s network, applications, and end-users don’t experience any downtime.
Read more at: SDx Central
The state of Linux graphic design tools in 2019
Before I begin this test of Linux graphic design tools, I should admit two things up front. First, I am a designer, not a software developer. Second, although I try to incorporate open source methodologies and principles wherever I can, my field pretty much demands that I use Adobe software on a sticker-emblazoned MacBook Pro. (I know, hate me if you must.) For the purposes of this research project, however, I am running Fedora 29 on a repurposed Mac Mini.
Read more at: OpenSource.com
K3OS: A Kubernetes OS Distro for Edge Computing
On the heels of its release of k3s, a lightweight Kubernetes distribution designed for the edge, Rancher Labs has announced an accompanying operating system called k3OS.
The k3OS preview release is available with support for x86 and ARM64. With k3OS, Kubernetes cluster configuration and the underlying OS configuration are defined with the same declarative syntax as other Kubernetes resources, meaning both can be managed together.
Rancher has been working with a number of customers including wind turbine company Goldwind Smart Energy on using Kubernetes in resource-constrained environments.
Read more at: The New Stack
How to Change User Password in Ubuntu
In this short quick article, we will show you how to change a user password in Ubuntu Linux using the graphical interface as well as the command line interface. As you are well aware, most operations on Ubuntu are applicable to its derivatives such as Linux Mint, Xubuntu, Lubuntu, and many others.
Read more at: TecMint