The Latest

Web Security

As I write these words, many Ruby on Rails developers are worried. more>>

Raspberry Pi

Raspberry Pi: the Perfect Home Server

Ever since the announcement of the Raspberry Pi, sites all across the Internet have offered lots of interesting and challenging uses for this exciting device. Although all of those ideas are great, the most obvious and perhaps least glamorous use for the Raspberry Pi (RPi) is creating your perfect home server. more>>

Effects of Cloud Computing on Open-Source Compliance

Since the emergence of strong cloud service providers like Amazon Web Services, Google and Rackspace, software development and deployment is increasingly taking place in the cloud. more>>

Android Candy: MightyText, Mighty Awesome

I'll admit, I've always been impressed with Apple's iMessage program. With its integration into texting, it seamlessly combines instant messaging and SMS into a single communication stream. Whether on an iPhone, iPod, iPad or Macintosh, the messages can be seen and sent to other Apple devices. more>>

Linux Kernel News - June 2013

As always the Linux kernel community has been busy moving the Linux mainline to another finish line and the stable and extended releases to the next bump in their revisions to fix security and bug fixes. It is a steady and methodical evolution process which is intriguing to follow. Here is my take on the happenings in the Linux kernel world during June 2013. more>>

Sleep as Android

I sleep poorly. In fact, insomnia has plagued me for years. As it turns out, even when I think I'm sleeping well, I'm usually not. There's nothing worse than a shoddy night's sleep followed by an abrupt alarm going off when you've finally settled into a deep slumber.

Enter: Sleep as Android. more>>

Setting TV Free

My 2006-vintage Sony Bravia flat-screen "Full HD" TV has Linux inside. I can tell because it comes with a two-page printout of the GPL, included almost as a warning. "Watch out", it seems to say. "This TV comes infected with freedom." Not that it's worth hacking: you can make breakfast in the time that passes between a click on the remote and a change on the screen. more>>

Linux Journal Networking Cover

July 2013 Issue of Linux Journal: Networking

When our house was built a few years ago (after our house fire), one of the things I wanted was a house wired for Ethernet connectivity. more>>

Future Techies

“Knowledge is Power,” said James Broughton. more>>

New Products

Please send information about releases of Linux-related products to newproducts@linuxjournal.com or New Products c/o Linux Journal, PO Box 980985, Houston, TX 77098. Submissions are edited for length and content.

More PXE Magic

In this article, I've decided to follow up on a topic I wrote about not in my column directly, but as a feature article called "PXE Magic" in the April 2008 issue. more>>

Cribbage: Sorting Your Hand

We've been working on writing code for the game Cribbage, and last time, I created the code needed to pick a random subset of six cards out of a "deck" and display them in an attractive format—like this: $ sh cribbage.sh Card 0: 7C Card 1: 5H Card 2: 9H Card 3: 10S Card 4: 5D Car more>>

Sometimes It's Okay to Point

Mom always said, "It's not nice to point." I'd argue Mom didn't manually enter long, cumbersome URLs, however. We're all familiar with services like TinyURL, but because we're Linux folks, we tend to prefer doing such things on our own. As with almost everything in Linux, there's more than one way to skin a cat, and in this article, I explore a bunch. more>>

Speed Up Your Web Site with Varnish

Varnish is a program that can greatly speed up a Web site while reducing the load on the Web server. According to Varnish's official site, Varnish is a "Web application accelerator also known as a caching HTTP reverse proxy". more>>

Non-Linux FOSS: libnotify, OS X Style

One of the things I dislike about using Irssi in a terminal window on OS X is that I often miss the screen flash when someone mentions my name in IRC. With some fancy SSH tunneling (maybe more on that some other issue) and a really cool pop-up notification tool, if someone mentions my name, I can't miss it. more>>

Containers—Not Virtual Machines—Are the Future Cloud

Cloud infrastructure providers like Amazon Web Service sell virtual machines. EC2 revenue is expected to surpass $1B in revenue this year. That's a lot of VMs. more>>

Lock-Free Multi-Producer Multi-Consumer Queue on Ring Buffer

Nowadays, high-performance server software (for example, the HTTP accelerator) in most cases runs on multicore machines. Modern hardware could provide 32, 64 or more CPU cores. In such highly concurrent environments, lock contention sometimes hurts overall system performance more than data copying, context switches and so on. more>>

Weechat, Irssi's Little Brother

It may not be fair to call Weechat the little brother of Irssi, but in my short introduction to it, that's what it felt like. If Weechat didn't seem quite as powerful as Irssi to me, I definitely can say that it is better-looking out of the box. So, little brother has one thing going for him! more>>

One Tail Just Isn't Enough

Although it's difficult for me to look at this piece's title and not think of mutant felines, it doesn't make the statement any less true. If you've ever used the tail command on log files, you'll instantly appreciate multitail. My friend (and LJ reader) Nick Danger introduced me to multitail, and I can't believe how useful it is. more>>

Introduction to MapReduce with Hadoop on Linux

When your data and work grow, and you still want to produce results in a timely manner, you start to think big. Your one beefy server reaches its limits. You need a way to spread your work across many computers. You truly need to scale out. more>>

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix