Hands on 3 day Linux Kernel Internals Training course

LinuxCertified, Inc. announced its next three day, hands-on course that provides attendees with experience in creating Linux kernel source code within various subsystems of the Linux kernel. This course teaches attendees to acquaints developers with the fundamental subsystems, data structures, and API of the [url=http://www.linuxcertified.com/linux-kernel-internals.html]Linux kernel [/url] This class is scheduled for October 28th – 30th, 2018.

Source: LXer

Making better use of your Linux logs

Linux systems maintain quite a collection of log files, many of which you are probably rarely tempted to view. Some of these log files are quite valuable though and options for exploring them might be more interesting and varied than you imagine. Let’s look at some system logs and get a handle on some of the ways in which log data might be easier to probe.

Log file rotation

First, there’s the issue of log rotation. Some Linux log files are “rotated”. In other words, the system stores more than one “generation” of these files, mostly to keep them from using too much disk space. The older logs are then compressed, but left available for a while. Eventually, the oldest in a series of rotated log files will be automatically deleted in the log rotation process, but you’ll still have access to a number of the older logs so that you can examine log entries that were added in the last few days or weeks when and if you need to look a little further back into some issue you’re tracking.

To read this article in full, please click here

Source: Network World

Bro becomes Zeek

The Bro network security monitoring project has announced
a name change to “Zeek”. “On the Leadership Team of the Bro Project,
we heard clear concerns from the Bro community that the name ‘Bro’ has
taken on strongly negative connotations, such as ‘Bro culture’. These send
a sharp, anti-inclusive – and wholly unintended and undesirable – message
to those who might use Bro. The problems were significant enough that
during BroCon community sessions, several people have mentioned substantial
difficulties in getting their upper management to even consider using
open-source software with such a seemingly ill-chosen, off-putting
name.

Source: LWN

AMD Dual EPYC 7601 Benchmarks – 9-Way AMD EPYC / Intel Xeon Tests On Ubuntu 18.10 Server

Arriving earlier this month was a Dell PowerEdge R7425 server at Phoronix that was equipped with two AMD EPYC 7601 processors, 512GB of RAM, and 20 Samsung 860 EVO SSDs to make for a very interesting test platform and our first that is based on a dual EPYC design with our many other EPYC Linux benchmarks to date being 1P. Here is a look at the full performance capabilities of this 64-core / 128-thread server compared to a variety of other AMD EPYC and Intel Xeon processors while also doubling as an initial look at the performance of these server CPUs on Ubuntu 18.10.

Source: Phoronix

BrandPost: When Will We Be Able to Purchase 802.11ax Access Points and Client Devices?

Today we focus on when new 802.11ax access points and client devices will become available. The Wi-Fi industry has made these questions uniquely difficult to answer, but this blog explains what we expect to happen. If you have the patience, save these predictions for rereading toward the end of 2019!

The three important milestones along the path to commercial equipment are the IEEE 802.11ax standard, the Wi-Fi Alliance 11ax certification, and integrated circuit chips. These are a sequence in time, but with a lot of overlap.

The First Milestone: IEEE
The IEEE writes standards: very detailed definitions of the packet formats, fields, and functions that make the protocols work. IEEE 802.11ax is written as an amendment to the current 802.11 standards and eventually will be folded into the mainstream 802.11 document. Even as an amendment, however, it is 600 pages long. Getting every detail of such a standard correct requires scrutiny from many experts, and the IEEE process involves reviewing drafts and submitting comments and corrections, which then update new drafts, and are reviewed again.

To read this article in full, please click here

Source: Network World