8 creepy commands that haunt the terminal
Oct31

8 creepy commands that haunt the terminal

It’s that time of year again: The weather gets chilly, the leaves change colors, and kids everywhere transform into tiny ghosts, goblins, and zombies. But did you know that Unix (and Linux) and its various offshoots are also chock-full of creepy crawly things? Let’s take a quick look at some of the spookier aspects of the operating system we all know and love. read...

Read More
How open source hardware increases security
Oct31

How open source hardware increases security

Hardware hacks are particularly scary because they trump any software security safeguards—for example, they can render all accounts on a server password-less. Fortunately, we can benefit from what the software industry has learned from decades of fighting prolific software hackers: Using open source techniques can, perhaps counterintuitively, make a system more secure. Open source hardware and distributed manufacturing can...

Read More
What a Coding Dojo taught me about agile
Oct31

What a Coding Dojo taught me about agile

In their article, What is agile?, Jen Krieger, Daniel Oh, and Matt Takane discuss what we at Red Hat consider the most important sentence of the Agile Manifesto: “We are uncovering better ways of developing software by doing it and helping others do it.” read...

Read More