libbyclark's picture

When Razvan Rughinis began teaching the introductory operating systems course at University Politehnica of Bucharest in Romania 10 years ago, he was challenged to get students interested in Linux and keep them interested for the entire three-month course.

jzemlin's picture

For the last ten years open source has expanded into more and more segments of the computing industry. But as we review 2014, a new story emerges: software development has fundamentally shifted toward an open source model. Especially for the infrastructure software used for scale-out computing, open source is the de facto choice; in fact, it’s virtually impossible to find examples of scale-out infrastructure that is not open source.

jennifercloer's picture

The Linux Foundation recently announced its 2014 Linux training scholarship winners.This year marked the strongest demand we’ve ever seen for this program with more than 1,000 applications received. Reading through the submissions it became clear that learning Linux is widely recognized as a smart strategy for building a successful career. From every corner of the world, up and coming developers and sysadmins want to be able to tap into this massive opportunity.

Corbet's picture

Every year, the Linux Kernel Summit brings together about 100 core kernel developers and subsystem maintainers to discuss issues of importance to the development community as a whole.  The 2014 Summit, held August 18-20 in Chicago (just before LinuxCon North America) covered a wide range of topics and made a number of decisions.  But there is one outcome from this event that merits especially wide attention: the development community is getting better at what it does.

emsearcy's picture

You have likely heard by now about the "Heartbleed" SSL vulnerability (CVE-2014-0160). Put simply from the perspective of a user of the Internet, this vulnerability means that for the last two years, any secure "your-browser-shows-a-lock" site you went to might have not really been secure, and an attacker could have been intercepting your passwords or sensitive data just like they can on "regular" non-SSL sites.

rcunningham's picture

In Part 1 of this series, I introduced awscli, a powerful command line interface which can be used to manage AWS services.

mricon's picture

Welcome to the second installment of the "PGP Web of Trust" series. In this part we'll explore "Trusted Introducers" and "Meta-Introducers" in cryptography; how PGP implements "Meta-Introducers"; how PGP trust-signatures work in practice; and what keyservers are and how to use one to keep track of people's public keys.

mdolan's picture

Blog post by Mike Dolan, director of members services, The Linux Foundation

There are many open source software projects out there today and any list of open source licenses alone shows you how much project diversity is out there. Just take a look at Github, Apache, Eclipse or The Linux Foundation and you’ll find thousands of developers collaborating on the software that literally runs the world.

rstreif's picture

With an average number of 315 weddings per day, Las Vegas definitely takes a top spot on the list of locations for forging bonds. Ever since Ford CEO Alan Mulally's keynote at CES 2010 the automotive industry has come back to Sin City in early January for dates with consumer technologies. CES 2014 was no different except maybe that this time cars have taken center stage at the annual event. One could claim that the two industries have finally exchanged rings.

gregkh's picture

Now that linux.conf.au is over, there has been a bunch of information running around about the status of kdbus and the integration of it with systemd. So, here’s a short summary of what’s going on at the moment.