Linux and plethorization
Why is it that Linux distros divide and multiply? And do we have a better name for how and why that's done than, say, "forking"?
For the many years I've been writing about Linux, it has always amazed me that no distro ever wins, in the sense that it vanquishes many opponents in the marketplace. Instead success breeds other successes through forks, variants and derivations by other labels.
In explaining how this works recently, I used the verb "plethorize" and the noun "plethorization", both derived from the noun plethora, which comes to us from Greek via Latin. In the Greek it meant "fullness". As synonyms Wiktionary lists "(excess, abundance): glut, surfeit, superfluity, slew". So I suggest that plethorize would mean to create abundance, and plethorization would be a generalized process of doing that.
What makes Linux an ideal example of plethorization is its abundantly useful nature. It lends itself toward endlessness in the ways it gives you to try, fail, retry, succeed and improve. That's why it's hard to fight against it. Whacking at it becomes like the sorcerer's apprentice taking an ax to his magic broom. Each splinter becomes a new magic broom. The difference with Linux is that all the magic brooms go off in their own directions, try different approaches, and improve in their own ways, all along sharing the results with everyone who is interested.
Anyway, here's the beginning of an experiment. On Google today we see these search results:
I used the + to force exact returns.
It'll be interesting to see how those change.
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide