Focus: Internationalization and Emerging Markets
Having recently returned from CeBIT in Hannover, Germany, where Jon “maddog” Hall of Linux International took excellent advantage of his precious opportunities to explain what Linux offers to key German cabinet members, I have a better understanding of the enthusiasm Western Europe reserves for Linux. Attendees who stopped by the Linux Journal booth to express their fervor included Dutch, German, English, French, Spanish, Portuguese and Belgian. But this is to be expected. What Linux enthusiast is unfamiliar with SuSE and Mandrake? Linux is, after all, the offspring of a European mind.
What has surprised me somewhat more is something I've discovered since beginning to work for Linux Journal--the impact Linux has had in other corners of the globe, in fact in every corner of the globe. For instance, what I found to be the most impressive Linux product displayed at CeBIT was neither European nor American, but the Mobile Multimedia Communicator offered by Galleo, an Israeli company. Of course I shouldn't have been surprised as Linux started as an international endeavor, a child of the Internet with little regard for geographical boundaries, and cost (except as it relates to internet connectivity) doesn't really constitute a barrier. As I'm sure our readers have noticed, our contributors reside in diverse parts of the world and face diverse computing challenges. Their solutions demonstrate the scalability and flexibity Linux offers.
In these pages Michael Stafford reviews The Hacker Ethic in which Linus Torvalds explains the entertainment value of hacking, the pleasure derived from computer creation. Perhaps this pleasure that so easily transcends national boundaries has something to do with the worldwide success of Linux. Linux, by nature of its flexibility and learning curve, encourages enthusiasm for hacking—something those who employ the more “user-friendly” OSes miss out on.
However, it's not all peace, love and Linux warm fuzzies as Wayne Marshall, in his article “Algorithms in Africa” on page 72 points out. Linux is perhaps best known for powering the Internet, and internet connectivity is behind the hopes to bridge the Digital Divide said to exist between developed nations and those termed Third World. Wayne, a favorite regular contributor who has been living in Guinea for some time, highlights the fact that the divide is less than digital, though still informational—and the Western world may be on the ignorant side.
John Biggs recently spent two years in Poland and in his article “Linux in Poland”, on page 80, discusses to what point Linux has been embraced there and what obstacles remain.
Finally, Jorge Eduardo Nieto Lema reminds us of the potential advantages open-source software presents to nations having more important things to worry about than licensing fees. On page 82 he explains the Linux Terminal Server Project that allows setting up diskless workstations that boot from a Linux network server, a real boon to companies on a tight budget. Jorge tells of his experiences setting up the LTSP for a Colombian company and explains the installation.
—Richard Vernon, Editor in Chief
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide