Our old friend Robert Love, whose popular Kernel Korner column long graced these pages, has updated his classic book Linux Kernel Development to a new 3rd edition. Published by Addison-Wesley, this work details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial for those writing and developing kernel code, as well as for programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the kernel's major subsystems and features, including its design, implementation and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which is intended to appeal to readers with a variety of interests and needs. Updated content includes an all-new chapter on kernel data structures, details on interrupt handlers and bottom halves, extended coverage of virtual memory and memory allocation and more.
Hosting service providers may want to read on about the new LVE Wrappers from CloudLinux, tools that let the server owner control the exact CPU usage for individual users and applications. LVE Wrappers are based on CloudLinux's Lightweight Virtual Environment technology that allows administrators to control CPU usage on a server at the tenant or application level. It does so by isolating specific hardware resources in a lightweight container and prevents one tenant on a shared server from affecting others. LVE Wrappers, which start individual applications and dæmons inside LVE environments, allow for control of resources for each application, which allows for greater flexibility and stability on the overall server infrastructure. The software is available to all CloudLinux subscribers.
Authors Tony Mullen and Claudio Andaur have set out to prove that the amazing open-source 3-D animation software Blender isn't just for hobbying anymore. Their new book Blender Studio Projects: Digital Movie-Making, now out from Sybex, shows readers how to do on Blender what one typically has done with high-end (and high-priced) apps Maya and 3ds Max. Sybex bills the book as “a real-world, roll-up-your-sleeves guide that plunges straight into step-by-step instructions designed to help you build skills and create solid assets for film, video and games.” The companion DVD includes starter, intermediate and final files, as well as movie files to help you every step of the way.
Managing ERP apps can require the patience of Job, which is why CAST Software released its new Analysis and Measurement Software for SAP, Siebel and PeopleSoft. The product's mission is to bring consistent and objective measurement of these platforms and eliminate costly customization errors in critical business applications. CAST's own studies of ERP installations showed a large percentage of issues that normally go undetected in functional testing and result in serious performance, stability and maintainability problems. For instance, 80% of database interactions in ERP installs are handled improperly, leading to significant business disruption. Environments like SAP, Siebel and PeopleSoft, says CAST, require a deceptively high level of customization. Because manual measurement of quality is expensive and time consuming, automation is useful for exposing flaws that cause applications to perform erratically.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide