Standards—a fairly innocuous word that seems to create a storm of controversy whenever it is spoken. Everyone agrees it is a good thing, but no one agrees on what standards should encompass or how they should be enforced. Whether for auto parts or operating systems, standardization can be a big plus for the consumer.
The Linux operating system, unlike other software products, has multiple sources—each distribution represents a different implementation. The differences are generally in the installation software and methods (RPM vs. DEB packages, for example); however, nothing is currently in place to prevent a company from adding a feature to the operating system and still call it Linux. Other companies are free to adopt the feature, but this is not required.
This month, we look at the Linux standardization efforts. Two things are very clear in the standards debate:
Distributions want to remain unique in order to maintain marketplace advantage.
Users and manufacturers of applications software (ISVs) want applications that will run on whichever distribution they own, i.e., they want applications to run on all distributions.
These two things are not mutually exclusive. After all, users do not want one distribution to become the Linux “Microsoft” (it might be one other than their favorite), so users too are all for uniqueness in distributions. And no distribution wants to be the odd man out—the distribution on which a major application doesn't work; so, the distributions also are for compatibility. Developers more than anyone want standards that will enable them to write programs that will work across all distributions without hassle. Thus, it appears as if all sides have a common ground on which to meet.
Setting and following standards is the only way to ever ensure cross-distribution compatibility for applications. However, standards that are defined in a rigid and finely detailed manner will be ignored by developers as unrealistic and difficult to follow. Finding that optimum position between standards that are too lax and those that are too rigid is the laudable goal of the Linux Standards Base Project. Dan Quinlan, the project leader, tells us about the plans of the LSB in his article in this issue.
To find out where all the distributions stand on this issue, Norman Jacobowitz talked to representatives of each by e-mail and at the LinuxWorld Expo. Some were more forthcoming than others; see who said what in Norman's article this month.
Want to express your opinions? Join the discussion groups on Linux Journal Interactive, http://interactive.linuxjournal.com/.
—Marjorie Richardson, Editor in Chief
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide