On the Web - Tune-up for IT at Doc's Garage
Senior Editor Doc Searls has spent a good portion of the last year or so talking to IT guys inside some big-name companies about how and where they are using Linux and open source. More than a single story, Doc's tapped in to a revolution in the way IT departments work. He's dubbed the revolution DIY-IT. Response to his reports has been overwhelming, so we've launched a new SSC Web site devoted to the DIY-IT movement. Here's Doc describing in his own words what this new site is:
Early last year, Don Marti assigned me to write a long piece about “how Linux helps make smart companies smarter”. What I found was there's a lot more going on out there than anybody's talking about in the mainstream press, or pretty much anywhere. It was nothing less than a vast reform movement inside IT (information technology) organizations everywhere—one in which the demand side was starting to supply itself. Much of this has been with Linux and other open-source tools and applications, but the phenomenon goes far beyond that. It's a cultural as well as a technical revolution, yet it's also very practical. It's about getting stuff done.
So, we decided to start a site on the Web where people involved in what we call DIY-IT—Do It Yourself IT—could talk about their work and report on trends happening in the field. We call it Doc Searls' IT Garage (garage.docsearls.com) or just IT Garage: a place for “News, ideas and real-world stories about how IT folks solve their own problems”. If it takes off, maybe it will become a print magazine, but we don't know yet. We're still shaking the thing down and signing up regular contributors.
If your company is part of the revolution or you'd like it to be, check out the site. See what you can learn and take back to the rest of the team. Or, if you've got your own story to share, write about it on the site.
Back on the Linux Journal site, after constructing this year's Ultimate Linux Box, Don Marti decided he needed to write about building the ultimate quiet Linux box. His article “This Linux Box Is Too Loud!” (www.linuxjournal.com/article/7601) is a roundup of computer-silencing techniques that work under Linux.
Finally, if you appreciated this month's article “Linux Serial Consoles for Servers and Clusters”, be sure to read Poul E. J. Petersen's Web article, “Project Hydra: the USB Multiheaded Monster” (www.linuxjournal.com/article/6518). Petersen writes, “It would be really cool to have a dedicated, remotely accessible console server with a lot of serial ports connected to all of our servers.” Read about how they accomplished exactly that using “a readily available USB bus with USB-to-serial adapters”.
As always, if you or your company has a cool new project or has found a better way of handling everyday tasks, send me an article proposal at firstname.lastname@example.org.
Heather Mead is senior editor of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide