KVM has made a place for itself among the industry’s most outstanding hypervisors for Linux. Currently, this hipervisor is deployed in a wide variety of processor architectures; even in mobile devices.
In addition, KVM is an important element in Network Functions Virtualization (NFV), since it drives the networking software to hardware with high performance and low cost.
Top500.org has published one more time the list of the 500 world’s most powerful supercomputers. And once more, Linux is the operating system with the strongest presence in these machines.
98’8% of supercomputers run Linux, and the remaining 1,2% run Unix.
This list is published twice a year and the last six rankings had Tianhe-2 in the first position. This supercomputer was developed by China’s National University of Defense Technology
The Linux Foundation has recently announced Open API Initiative (OAI), a project that will extend the Swagger specification and format to create an open technical community within which members can easily contribute to building a vendor neutral, portable and open specification for providing metadata for RESTful APIs.
This open specification will allow both humans and computers to discover and understand the capabilities of the respective services with a minimal amount of implementation logic. The Initiative will also promote and facilitate the adoption and use of an open API standard.
The very same week Fedora 23 is going to be released, the Fedora Project has announced Fedora Developer Portal, a website to help developers working on projects with Fedora as main operating system or inside a virtual machine.
In this new portal they’ll find the guidelines to get an install development tools, language runtimes and databases. They will also learn different distribution and deployment options using COPR and OpenShift.
Would you like to improve the performace of your GNU Linux distro? Thanks to its flexibility we can maximize it. There are a lot of ways to do it, such as using Swappines configurations, removing unnecesary kernel modules, setting up the kernel more cleanly…
One of these options is Cache Pressure, which enables maximizing RAM memory to change the way the kernel introduces data blocks in the core memory. Making a few changes, our device’s performance will be improved in every respect: when you run programs, play or any multimedia content…
A botnet made up of Linux computers is generating over 150 Gbps per second denial-of-service attacks (DDoS), which are seriously threatening some companies, since they are much more powerful than infraestructures can usually support.
This botnet is targeting around 20 sites each day, 90% located in Asia. The most common targets are online gaming and educational sites.
The malware feeding the botnet is called XOR DDoS and it was identified in September 2014 for the first time. Now, a the security response team from Akamai Technologies has discovered a new wave of attacks.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.