From the Editor
In his column this month, Rick Lehrbaum consolidates the embedded Linux arena into three basic categories: telecommunications infrastructure, handheld mobile devices and internet-edge devices (this includes server/gateway/firewall-type devices as well as digital set-top boxes). With the exception of the desktop, this includes just about everywhere one might expect to find Linux.
Rick has been tracking the progress of Linux in these areas for the last couple of years, reporting on tradeshows and devices that, exceptionally, ran Linux. However, that has changed very quickly, and now the trend that is impossible to ignore in Rick's columns is that the computing world is increasingly embedded, and embedded is increasingly Linux.
As Doc Searls has been saying often of late, “Linux has won.” Consequently, the success stories that were so compelling two or three years ago about some company switching their servers to Linux have long since ceased to be news. This doesn't mean that there aren't fights to be fought and progress to be made, but it does mean that Linux and the open-source development model have certainly been proven as viable for every level of computing.
An indication of the success of Linux was the Open Source Development Lab's announcement at LinuxWorld, New York earlier this year of the Carrier-Grade Linux Working Group initiative—also discussed by Rick (LJ, May 2002). The group's goal is to aid in the creation of any component necessary to make Linux the best choice for carrier-grade applications.
In a related event, Ibrahim Haddad, whom many readers will recognize as a fairly regular contributor to LJ, e-mailed me recently to let me know that, after three years of hard labor, Ericsson is taking some of his group's work to the Open Source community. Ibrahim works as a researcher at the Ericsson Corporate Unit of Research in Montréal, Canada. The most important part of the work that is being open-sourced is an architecture for security on telecom-grade Linux clusters. It is called DSI (Distributed Security Infrastructure). Ericsson will be sponsoring its development and is looking to the Open Source community for help. They have officially joined the OSDL to work with other members of the Carrier-Grade Linux Working Group.
The DSI team has authored an article in this issue explaining the project (see page 92). The project's web site is not yet up, but anyone interested in contributing to it may contact any of the team members listed at the end of the article.
Richard Vernon is editor in chief of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide