the future of the Operating System - LinuxCon 2015 keynote

SPF13

The Future of the Operating System. What is an Operating System ? Operating Systems & Apps Over Time. OS in 1960s • IBM OS/360 – First OS that kept track of system resources (program, memory, storage) • CTSS – Introduce scheduling • Univac Exec 8, Burrows MCP, Multics. Linux + Docker 
 is the Future of Operating Systems. Given as a keynote at LinuxCon + CloudOpen Japan 2015.

Former VMware CTO Joins CloudFlare as Head of Engineering

Data Center Knowledge

Wants to help build always-on "Internet Operating System" at the edge of the network Read More. Shared

Control your Hyundai from your Smartwatch

CTOvision

The app is basically a scaled-down version of the Blue Link app already available for Android phones — you can start and stop the engine, lock and unlock the doors, find the car if you can''t remember where you parked it, and flash the lights, among other things. By Katie Kennedy.

Google’s Mysterious Fuchsia OS Developer Site Debuts With New Fascinating Details

CTOvision

Google’s mysterious Fuchsia OS has been a skunkworks project at the company for years now, with only small glimpses of the new operating system, and lots of buzz in the media every time some new development takes place. Earlier this year, Google hired a prominent Apple software engineer to help bring the new operating system […].

The Symbiosis Between Automation and Engineering

Scott Lowe

A little while ago Steve Beaver wrote a post titled “Is Automation Killing The Engineering?” ” In the post, Steve ponders whether the increased use of automation in today’s data centers is killing engineering knowledge. Is automation killing engineering? We can carefully engineer and hand-craft our solutions ( snowflake servers , anyone?), I believe there is a careful symbiosis between engineering and automation that we must maintain.

Grown-Up IT For Grown-Up Applications

Chuck's Blog - EMC

There’s now a burgeoning category "integrated" solutions intended to lessen that burden and produce more predictable results with less effort -- reference architectures, converged systems, hyperconverged systems and similar. Enter the notion of engineered systems.

AWS Elastic Beanstalk: A Quick and Simple Way into the Cloud - All.

All Things Distributed

Werner Vogels weblog on building scalable and robust distributed systems. Flexibility is one of the key principles of Amazon Web Services - developers can select any programming language and software package, any operating system, any middleware and any database to build systems and applications that meet their requirements. and Engine Yard , Springsource users have CloudFoundry. All Things Distributed.

Airware: Powering Drones For The Enterprise

CTOvision

To enable companies to take full advantage of commercial drones, Airware offers a common operating system that enables businesses to safely operate drones, manage a variety of aircraft and integrate aerial data into design, engineering, asset management and decision workflows.

What You Need to Know about iOS 9

CTOvision

Craig Federighi, Apple's senior VP of software engineering, has just demoed the new in OS X and iOS 9 operating systems. There are many more updates with the new OS X and iOS 9 operating systems.

Get TotalAV Essential AntiVirus for $19.99 (80% off)

Network World

The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires.

Study 62

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

For example, algorithms can include implicit and explicit bias by a creator, or algorithms on untrusted operating systems could be unknowingly controlled by outside parties. As systems and companies become more complex, relying solely on multiple passwords for identity confirmation becomes difficult and risky. Consider using an intelligent risk engine to automate certain parts of the process.

Get TotalAV Essential AntiVirus for $19.99 (80% off)

Network World

The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires.

Study 46

Take Heed or Risk Being Out of Support: IBM FileNet ECM Upgrade

Perficient - Digital Transformation

The latest version of IBM FileNet Content Manager will have: Content Process Engine support for the S3 connector. HP-UX Operating System. HP Itanium Operating System. Solaris Operating System. IBM released a new version of FileNet Content Manager, version 5.5, and will end support for all previous versions. Users will need to either upgrade their ECM infrastructure by April 30, 2019, purchase extended support, or risk losing support.

HP 40

IBM touts full data encryption in new Z series mainframes

Network World

The mainframe, called IBM Z or z14, introduces a new encryption engine that for the first time will allow users to encrypt all of their data with one click—in databases, applications or cloud services—with virtually no impact on performance. The new encryption engine is capable of running more than 12 billion encrypted transactions every day. IBM has introduced the 14th generation of its Z series mainframes, which still sell respectably despite repeated predictions of their demise.

Boeing Black Smartphone: Security, modularity and productivity

CTOvision

Key Features: Android™ Operating System : Convenient smartphone for Android usage. Hardware Crypto Engine : Protects stored and transmitted data. Embedded Secure Components : Enables trusted operations.

Understanding Cloud Computing for Your Business

CTOvision

Major cloud infrastructure services like Microsoft Azure and Amazon Web Services have fueled new hiring strategies, with 81% of enterprises adopting DevOps strategies and engineers. Carol M. Evenson.

Kaspersky researchers love “Mr. Robot” hacker but claim no Snowden ties

Network World

Most of the scenes are top class and the usage of tools, operating systems and other tiny details, from social engineering to opsec is very good. Malware researchers for Kaspersky Lab took to Reddit’s IAmA chat today and pronounced an affection for the hacker-hero TV show “Mr. Robot” but not NSA hacker Edward Snowden. Responding to a question about how they like it, the team’s global director Costin Raiu says, “Mr Robot is a strong 9.5 for me.

what every open source project needs

SPF13

spf13 Chief Operator @ Docker? ? You need users • No matter how good a project is, it can’t succeed without users • Unless you tell the world about your project, people will not come • Unnatural behavior for most engineers. Summary: small poll for my new operating system? Hello everybody out there using minix — I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386 (486) AT clones.

When Generic IT Infrastructure Doesn't Cut It

Chuck's Blog - EMC

Now think about everyone in IT who helps to make all that database magic happen: operations, architects, database administrators, business analysts, etc. In our data-driven world, databases are the engines that power our businesses.

Oracle 241

How to Choose a Container Management Platform

Perficient - Digital Transformation

These services provide rapid cluster provisioning options and leave many of the cluster management and host operating system tasks to the cloud provider. Example options: Google Kubernetes Engine (GKE).

When Good Analysts Have A Bad Day

Chuck's Blog - EMC

TL;DR version: a "true" private cloud is presumably sold and supported by a single vendor: hardware, operating system and hypervisor. VCE), we engineer everything in the stack -- and continue on through the database and applications.

Oracle 130

The Back-to-Basics Readings of 2012 - All Things Distributed

All Things Distributed

Werner Vogels weblog on building scalable and robust distributed systems. I am pretty sure some if not all of these papers deserved to be elected to the hall of fame of best papers in distributed systems. Feb 11 - A Survey of Rollback-Recovery Protocols in Message-Passing Systems , E.

Alleged NSA data dump contain hacking tools rarely seen

Network World

That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled. “It's terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University’s school of engineering.

Top 5 Online Marketing Tips to Improve Your Business

Galido

All the devices run on different operating systems, including Android, iOS, Windows, Linux among others. The aim of search engine optimization (SEO) is to enable search engines to find your website and rank the site so that it appears at the top of search results.

Technology Short Take 121

Scott Lowe

Once again we see that fooling the user is the most reliable way to gain access to a system. A new VPN security flaw has been uncovered that affects a wide range of UNIX- and Linux-based systems. I found this article on chaos engineering to be helpful in understanding the principles and concepts. The article also pointed me to this GitHub repository with chaos engineering resources. Operating Systems/Applications. Welcome to Technology Short Take #121!

40

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Nature has provided insights for engineers for years, inspiring technical solutions to challenges that replicate the elegant perfection of approaches that work in the natural world. Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. This approach mitigates risk when properly engineered and overseen, but it is always expensive.

Secure Pico Channels with DIDs

Phil Windley

Wrangler, the pico operating system, supports creating and using subscriptions. DIDs are used with blockchain-based resolution to create decentralized systems. We will also be working on integrating the Sovrin network with the pico engine.

Clouds Trend in 2019: DevOps as an Enabler

Perficient - Digital Transformation

The ultimate goal of any DevOps transformation is to optimize the flow of change through their internal, external, and hybrid systems. Without it, businesses are unable to operate at cloud scale or be cloud native and will instead fall further behind.

Back-to-Basics Weekend Reading - U-Net: A User-Level Network Interface

All Things Distributed

In what seems almost a previous life by now Thorsten was one of the top young professors in Distributed Systems and I had the great pleasure of working with him at Cornell in the early 90''s. The lack of low-latency made that distributed systems (e.g.

.Net 77

Top Tech Websites 2019

Galido

It involves advances in computer technology, machinery, and equipment developed from the application of scientific knowledge and a branch of knowledge dealing with engineering or applied sciences. Operating System & Software Blogs. TechWorld – Operating Systems.

Apple 63

Free Courses at Linux Academy – November 2019

Linux Academy

Linux Operating System Fundamentals. AWS offers a wealth of features allowing an experienced architect, engineer or developer to implement systems to meet any need.

Tech Blogs – Best Must Read Tech Resources 2019

Galido

It involves advances in computer technology, machinery, and equipment developed from the application of scientific knowledge and a branch of knowledge dealing with engineering or applied sciences. Operating System & Software Blogs. TechWorld – Operating Systems.

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Secure Network Engineering. href="[link] Control 19: Secure Network Engineering. With limited budgets and shortages of skilled people, senior executives are asking, “What do we need to do to protect our systems, and how much is enough?” For more on the top four mitigation strategies see the DSD site at: [link] These four strategies are: Application Whitelisting: this makes it much harder for adversaries to run code on your systems.

Why I Love The Oracle Cloud Strategy

Chuck's Blog - EMC

It's usually infrastructure only, it's still purchased and operated as plumbing, and there are few compatible public cloud offerings. Second, there is a full line of on-prem systems engineered for database, applications and analytics. They do things other systems can't do.

Oracle 202

Full Stack Journey Episode #1: Bart Smith

Scott Lowe

Bart shares some details about his journey from being a Microsoft-centric infrastructure engineer to what he calls a cloud-native full-stack engineer. Bart’s view is that a full-stack engineer knows about operations, the hardware stack (compute, storage, network), the software (network, operating system [OS], management, logging), and most importantly knows how to “code” an immutable infrastructure.