System76 will ship Coreboot-powered firmware, a new OS for the apocalypse, and more open source news
Oct13

System76 will ship Coreboot-powered firmware, a new OS for the apocalypse, and more open source news

In this edition of our open source news roundup, we cover System76 shipping Coreboot-powered firmware, a new OS for the apocalypse, and more open source news! read...

Read More
Everything you need to know about Grace Hopper in six books
Oct11

Everything you need to know about Grace Hopper in six books

Grace Hopper is one of those iconic figures that really needs no introduction. During her long career in the United States Navy, she was a key figure in the early days of modern computing. If you have been involved in open source or technology in general, chances are you have already heard several anecdotes about Grace Hopper. The story of finding the first computer bug, perhaps? Or maybe you have heard some of her nicknames: Queen of...

Read More
How a business was built on podcasts for Linux: The story of Jupiter Broadcasting
Oct11

How a business was built on podcasts for Linux: The story of Jupiter Broadcasting

I spend a lot of time on the road and enjoy listening to podcasts about a variety of topics. read...

Read More
5 ways to contribute to open source during Hacktoberfest
Oct11

5 ways to contribute to open source during Hacktoberfest

There’s always a lot to get excited about in October: sweater weather, pumpkin spice, Halloween costumes, and for the last three years, Hacktoberfest. read...

Read More
Achieve high-scale application monitoring with Prometheus
Oct10

Achieve high-scale application monitoring with Prometheus

Prometheus is an increasingly popular—for good reason—open source tool that provides monitoring and alerting for applications and servers. Prometheus’ great strength is in monitoring server-side metrics, which it stores as time-series data. read...

Read More
DevSecOps pipelines and tools: What you need to know
Oct10

DevSecOps pipelines and tools: What you need to know

DevOps is well-understood in the IT world by now, but it’s not flawless. Imagine you have implemented all of the DevOps engineering practices in modern application delivery for a project. You’ve reached the end of the development pipeline—but a penetration testing team (internal or external) has detected a security flaw and come up with a report. Now you have to re-initiate all of your processes and ask developers to...

Read More