Speed achieved by the 350-node Cplant98 cluster running Linux at Sandia National Laboratory: 125.2GFLOPS
Where 125.2GFLOPS places the Sandia system in the current TOP 500 list of supercomputers: 53
Position of microsoft.com among the top sources of visitors to the new linux.com: 1
Number of microsoft.com visitors in the first two weeks of linux.com's operation: 15,000
Total age of Phat Linux's two founders: 30
Number of Net-connected computers whose spare CPU cycles are devoted to searching for extraterrestrial intelligence by SETI: 625,253
Total CPU time of all those computers: 99,799,890 hr 45 min 38.8 sec (11,392.68 years)
Number of “results” returned by all that terrestrial intelligence: 2,258,824
Percentage of those results produced by Linux platforms: 12
Position of Linux among all platforms in results performance: 2
Professional attendees at Linux Expo Paris 99: 5000
Number of exhibitors and vendors at Linux Expo Paris 99: 87
vi rocks. It also rules. So says Vassilii's Editors Sucks-Rules-O-Meter, which mines the verbs on Altavista and pronounces vi the winner over Emacs and all the other editors as a subject of those two superlatives. As of July 3, vi had a 350/10 rules/sucks ratio. And it looks like Linus isn't the only one out there who hates Emacs—a sentiment he shared with us on a recent panel that also featured Emacs creator Richard Stallman. Emacs' rules/sucks ratio is 22/59. This meter can be found at http://www.tarunz.org/~vassilii/srom/and is updated weekly. Thanks to Vassilii Khachaturov.
Want a new domain name? Good luck. We are at the bottom of the .com barrel, and the .net and .org barrels must be getting fairly low too. While the urban legend says every word in the dictionary has been sold for .com use, “misstep” is still there. So is “dodder”. A lot of two-word combos (such as hunkerdown) are gone as well, but a few (such as stupiddog) are still there. But your chances of getting the domain you want are being reduced every second by the sharks who buy domains from Network Solutions for $70 and then sell them for far higher prices (up to millions of US$) to the unfortunates who came too late to buy direct.
Thus, your only two strategic naming choices are anonymous or strange—or both. Why not create a front company with a camouflage name like “Symnetix.com”, while your actual business will be an enterprise NT replacement service called “Bizfloss.com”? If you do that, remember who your friends are when you file for that IPO (initial public offering).
To save you a bit of work, I went through the familiar whois routine to scope out the possibilities. They are mighty slim. Let's say you are in the bug zapper business and want “bzzt.com”. Well, Allan Henning of Stockton, California has already grabbed that one. How about dropping a z? Nope; “bzt.com” belongs to Hovinga Holding in the Netherlands. How about adding a z? Wrong again; “bzzzt.com” has gone to the Mikluhomaklai Sensation Corp. in Omsk, Siberia. Okay, how about one more z? Voilà! You can have it. Now prepare to spend the rest of your business life saying, “that's bzzzzt.com with four Z's.”
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide