Using Linux in a Training Environment
Once a solid proposal has been constructed, present your case. Try to leave a solid impression of Linux with your attendees. Some key Linux points to hit on include:
Availability of tools and software solutions
Network capabilities (TCP/IP, IPX, AX.25, etc.)
Unfortunately, most folks still perceive Linux as a toy. In your presentation, be sure to point out the efforts of major industry players, such as Caldera and WordPerfect. Let them know that Linux is quite capable of providing a solid solution for your organization.
Linux is a viable solution platform. Our nationwide network of training centers is a living testament to that statement. With the proper direction, its proliferation in the workplace can continue on an upward trend. The Linux operating system reminds me of an expansion baseball team. It has a lot of fans, but nowhere near the fan base of an established and proven team. It is young and full of promise, and one day, just maybe, it will win the pennant.
Scott Burkett is a full time C/Unix technical instructor for Decision Consultants, Inc. (DCI) (http://www.dcicorp.com/), one of the country's largest software services consulting firms. He has worked with a variety of languages on multiple platforms. Scott is one of the co-authors of the of The Linux Programmer's Guide , part of the Linux Documentation Project and the author of The Linux Bootkit. An accomplished webmaster, he has set up web sites for the Southeast Region of DCI (http://www.computerppl.com/) and The Tampa Bay Linux GNU Technical Society (http://www.intnet.net/). Scott can be reached through the Internet as firstname.lastname@example.org.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide