From a Linux Mobile Platform Expert

Ibrahim Haddad

Subscribe to Ibrahim Haddad: eMailAlertsEmail Alerts
Get Ibrahim Haddad via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Ibrahim Haddad

The emergence of commodity supercomputing has driven clusters based on the Linux operating system into engineering and scientific research organizations that couldn't afford their own supercomputing resources before. But Linux clusters have the potential to become a hot topic in traditional information technology circles as well. The coming year may well be the technology tipping point when Linux cluster technology escapes its current home in research organizations and inhabits the traditional data center. Building Clustered Linux Systems by Robert Lucke, recently published by Prentice Hall Professional Technical Reference and HP Books, attempts to provide a starting point for organizations interested in building or evaluating their first Linux cluster. We took this opportunity to have a chat with Robert and ask him a few questions on the subject of Linux and cluste... (more)

OSDL's Data Center Linux

Data Center Linux (DCL), one of four OSDL initiatives, has the goal to accelerate Linux adoption in corporate data centers. DCL provides a center of gravity for developers, users, vendors, and the open source community to work together to improve Linux capabilities and feature requirements, accelerating the development and adoption of Linux in the data center. As is the case with the Carrier Grade Linux (CGL) initiative, many OSDL member companies, organizations, and individuals are involved with the DCL initiative with a special focus on services, databases, and DCL mission-cri... (more)

"Secure Coding in C and C++" A Linux.SYS-CON.com Interview With Robert Seacord

Robert C. Seacord, a senior vulnerability analyst at the CERT/Coordination Center at Carnegie Mellon University, has just published the book Secure Coding in C and C++ (Addison-Wesley, 2005). I sat down with him to discuss software security in the Linux environment and elsewhere. LWM: There's an ongoing debate over whether Linux is more secure than Windows. Some people argue that since Linux's source code is freely available, it makes it easy for hackers to implement hacks and break into Linux systems, whereas this becomes more difficult with proprietary operating systems. What'... (more)

D@TA Protection and the Linux Environment

Organizations that gather and store critical information have to protect it. While there are tried and true techniques for data protection, there are also new and innovative ones. These new practices and tools greatly enhance an organization's ability to protect mission-critical data. Linux and Open Source users are specially challenged when trying to take advantage of much of this new technology. We asked technology analyst Tom Petrocelli about what is new and interesting in data protection. Tom is president of Technology Alignment Partners (www.techalignment.com) and author of... (more)

The Unofficial How-To of Open Sourcing

Open source software is shifting the software industry into a new paradigm, moving from developing proprietary code behind closed doors to developing code that can be shared, modified and redistributed openly. Key benefits associated with this shift is reducing development cost and software components complexity, developing re-usable common-off-the-shelf software assets, while increasing flexibility and using common enablers. Organizations that embrace the open source model and follow it when it influences positively their ways of building software, will increase their chances to... (more)