Open source software is now the foundation for the vast majority of applications across all industries, however many of those industries are struggling to manage open source risk. Organizations, regardless of industry, must do a better job maintaining open source components given their critical natu...

Jeff Bezos last week announced he will be stepping down from his role of CEO Amazon. Bezos is following Microsoft's lead and putting his cloud executive Andy Jassy in charge of the company. Given that Microsoft was exceedingly successful with putting Satya Nadella in the same role, it would seem tha...

More than 90 percent of IT leaders surveyed for a recent report expect to expand their cloud services in the next one to three years. Despite this testament to the benefits of cloud adoption, enterprises may find a lack of qualified IT workers to fill those positions. A majority of cloud team leader...

As the next step in its Linux expansion program, Lenovo has launched Linux-ready ThinkPad and ThinkStation PCs pre-installed with Canonical's Ubuntu technology. The company also now brings Linux certification to its ThinkPad and ThinkStation Workstation portfolio, along with easing deployment for de...

With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you ha...

Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X...

Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital securi...

Canonical has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloa...

Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the thr...

Eclypsium has released new research that identifies and confirms unsigned firmware in WiFi adapters, USB hubs, trackpads and cameras used in Windows and Linux computer and server products from Lenovo, Dell, HP and other major manufacturers. Eclypsium also demonstrated a successful attack on a server...

OPINION

You’ve Come a Long Way, Linux-Baby

When Linux first emerged from its cocoon in a frenzied Usenet thread, it is doubtful that almost anyone imagined the project would ascend to global prominence. Even more astonishingly, its dominance was driven as much, if not more, by its adoption by the private sector -- although it posed an antith...

Like a lot of folks, I'm a tad sick of Intel. Last month we learned of its second big security scandal in as many years. Once again, the company not only neglected to disclose the problems in a timely way but also lacked a plan to recall the failed parts. Once again, buyers likely will have to cripp...

Aside from malware and viruses, nothing has the potential to be more dangerous to your computer's health than power outages. Here is how to ensure your computer keeps it boot on when a power failure turns the lights off. With the approach of the turbulent summer season, it is important to know what ...

The high-tech industry once again is in a tizzy over flaws discovered in Intel CPUs -- four new microarchitectural data sampling vulnerabilities. MDS is a sub-class of previously disclosed vulnerabilities that sample data leaked from small structures within the CPU using a locally executed speculati...

What is your experience with cryptocurrency so far?
Loading ... Loading ...

LinuxInsider Channels