The very same week Fedora 23 is going to be released, the Fedora Project has announced Fedora Developer Portal, a website to help developers working on projects with Fedora as main operating system or inside a virtual machine.
In this new portal they’ll find the guidelines to get an install development tools, language runtimes and databases. They will also learn different distribution and deployment options using COPR and OpenShift.
Would you like to improve the performace of your GNU Linux distro? Thanks to its flexibility we can maximize it. There are a lot of ways to do it, such as using Swappines configurations, removing unnecesary kernel modules, setting up the kernel more cleanly…
One of these options is Cache Pressure, which enables maximizing RAM memory to change the way the kernel introduces data blocks in the core memory. Making a few changes, our device’s performance will be improved in every respect: when you run programs, play or any multimedia content…
A botnet made up of Linux computers is generating over 150 Gbps per second denial-of-service attacks (DDoS), which are seriously threatening some companies, since they are much more powerful than infraestructures can usually support.
This botnet is targeting around 20 sites each day, 90% located in Asia. The most common targets are online gaming and educational sites.
The malware feeding the botnet is called XOR DDoS and it was identified in September 2014 for the first time. Now, a the security response team from Akamai Technologies has discovered a new wave of attacks.
CloudOpen will be held in Dublin next October 5th, 6th & 7th. This conference organized by The Linux Foundation is designed to provide a collaboration and education space to advance the open cloud.
This event gathers together the Open Source projects, products, technologies and companies that comprise the cloud and are driving the cloud, big data and networking ecosystems.
On 17 September 1991 Linus Torvalds uploaded Linux kernel version 0.01 to a FTP in the University of Helsinki. It counted a bit more than 10.000 lines of code.
At that time, he didn’t realize what that shy gesture will mean, since nowadays Linux runs inside a lot of devices we use dialy, such as browsers, smartphones, routers and even intelligent objects.
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.