Advice for everyday Unix systems administration and some clever ways to approach more challenging problems.
IBM says Red Hat will continue to be a contributor to the open-source community and that Red Hat will continue its commitments with current partners even after IBM buys the company for 34 billion in the second half of 2019.
The latest and greatest release of Canonical's Ubuntu, nicknamed "Cosmic Cuttlefish" became available just recently. Images are available for all major public clouds. In addition, it provides improved gaming performance, a huge array o....
While nmap is generally used to probe business networks and perform security reviews, the tool can also provide interesting details on your systems and devices at home.
Red Hat's new vice president and general manager of its RHEL Business Unit, Stefanie Chiras, enthusiastically embraces the growing importance of Linux.
Log files on Linux can provide a lot of useful information on what's happening on your system. These commands can help you sort through the data and pinpoint problems.
Open source networking has become the "new norm," and many at the recent Open Networking Summit Europe said they’re seeing it play out in the industry.
The Fedora 29 beta release is ready for downloading and testing, including new support for containers and better performance on Arm machines.
Installing the Rust programming language on your Linux systems could turn out to be one of the more rewarding things you've done in years.
Use these commands to get insights on repositories that contain OS updates and applications and how that information is stored on your system.
Some command line tricks can make you even more productive on the Linux command line.
How to take a list of names, addresses, phone numbers and email addresses and turn it into a Google map.
The recently released 4.18 Linux kernel has already moved up to 4.18.5. How soon it lands on your system or network depends a lot on which Linux distributions you use.
The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.
Linux systems provide many ways to look at disk partitions. Here's a look at commands you can use to display useful information -- each providing a different format and with a different focus.
Many Linux commands now have options to make their output a little easier to digest. Here's a look at some that bring out the friendliness of our favorite operating system.
What can your Linux system tell you about the Linux kernel it's using? Let's do a little probing and see.
Encryption commands such as gpg can be used to secure your most sensitive files on Linux systems.
If you aren't using Kubernetes, it’s probably a good time to familiarize yourself with a technology that is dramatically changing the way applications are being deployed today.
Dstat provides valuable insights into Linux system performance, pretty much replacing older tools, such as vmstat, netstat, iostat, and ifstat.
Using the convert command, you can modify image files without having to open an image editor.
A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.
Learn what "snaps" are and why are they making the development and installation of Linux applications so trouble-free.
On Linux, files can be erased but still be recoverable. Here's what to do when you really want them gone.
There are a lot of control sequences available on Linux systems -- maybe even some you've never used.
The new supercomputer at Oak Ridge National Labs runs Red Hat Enterprise Linux and heralds a new level of cooperation between vendors.
The Linux comm command makes it easy to compare files or the contents of directories with its columnar output.
There's more to copying and renaming files on Linux than cp and mv. Try some commands and strategies that might surprise you and save you some time.
The logger command provides an easy way to add messages to the /var/log/syslog file from the command line or from other files.
We might all agree on the command line, but start talking about Linux, and we might find that the rules of how to pronounce the names of Unix commands are not universal.
Blacklisting modules prevents them from being loaded and used, and it is sometimes an important step in keeping a system running properly.
The colors used on the Linux command line are intended to provide an easy way to identify files by type. You can change them, but you should have a good reason before you do.
Cisco shares have risen nearly 20 percent in 2018, making it the best performer in the Dow. What changes have energized this surprising push to the top of tech?
In spite of the huge differences between Linux and Windows, sharing files between the systems is surprisingly easy. Here’s a look at two very different ways to make this happen.
How to use the expr, factor, jot, and bc commands to do math calculations on Linux systems.
How to use the find, locate, mlocate, which, whereis, whatis, and apropos commands to find files on Linux systems.
A new version of the Fedora Linux distro, Fedora 28, was released in its beta version. Here's a look at some of its new features.
Some see a lot of promise in the evolution of "fish" on Linux -- a shell with a some unusual behaviors.
With calendars on Linux, you can get more than just reminders of what day it is. Commands such as date, cal, ncal and calendar provide helpful information.
The "last" command provides some easy ways to see who has been logging into your system and when, but with a little more work, you can ask it to report on a specific time period.
Ava from Ava Robotics, a startup with deep technical ties to iRobot, brings her charming personality to the telepresence marketplace.
The ip command provides a lot of information on network interfaces. Here's some advice to help you understand what it's telling you.
Linux command history is not just about repeating commands. You can selectively decide what to remember and whether to record the date and time your commands were used.
Some Linux commands recurse without being asked, while others have to be nudged with just the right option. Here are some ways to use it to make you tasks easier.
When the Linux kernel detects something on the system violated the kernel's rules about proper behavior, it will shut the system down and issue an "oops."
Support for container technology deriving from Lawrence Berkeley National Lab is getting a boost in enterprise and commercial markets through the formation of a new company, Sylabs.
Named pipes aren't used all that often, but they provide some interesting options for inter-process communications.
Joe Brockmeier, a senior evangelist at Red Hat, explains the benefits of containers on Linux, how they work and how to prepare to use them.
IT leaders are under increased pressure to ensures systems can withstand natural disasters, attacks, and increasing storage and data accessibility needs.
Available this summer, the new BeamPro 2 promises more realistic telepresence visits with colleagues, customers, patients and others.