andrewsteggles
By: andrewsteggles

October 31, 2018 1:20 pm

510 views

Do You Need to Market your Open Source Project?

It’s an interesting question and one that I was asked to tackle recently at the Open Source Summit event in Scotland. Let’s first talk about what we mean by marketing. The Chartered Institute of Marketing defines marketing as "the management process responsible for identifying, anticipating and satisfying customer requirements […]

Read More


Alexander Bergmann
By: Alexander Bergmann

October 4, 2018 2:03 pm

950 views

DNSSEC – Root Zone KSK Rollover (11th of October)

In just one week from now it will be the first time that the DNS Root Zone Key Signing Key (KSK) will be rolled over and replaced with a new key. This long planed procedure was actually planed one year ago, but postponed because of data that suggested that a significant number of resolvers where […]

Read More


bmwiedemann
By: bmwiedemann

August 29, 2018 2:23 pm

1,320 views

Extending trust in our binaries: No backdoors have been found

I have written earlier on the advantages of reproducible builds One of the advantages of reproducible builds is that it allows to verify, that no backdoors have been added into a binary at build time. For that, you just have to build the same source with the same toolchain on your trusted machine. If the […]

Read More


Flavio Castelli
By: Flavio Castelli

August 14, 2018 2:45 pm

1,668 views

Hackweek project: Docker registry mirror

As part of SUSE Hackweek 17 I decided to work on a fully fledged docker registry mirror. You might wonder why this is needed, after all it’s already possible to run a docker distribution (aka registry) instance as a pull-through cache. While that’s true, this solution doesn’t address […]

Read More


mvarlese
By: mvarlese

August 7, 2018 7:27 am

1,027 views

Accelerate your network with OvS-DPDK

Introduction First of all, to set some expectations to you, this blog-post does not focus on what DPDK or OpenVSwitch (OvS) are but it tries to provide the information required to have them running on a SUSE distribution. If you require detailed information about DPDK or OvS design, architecture, internals or API then please […]

Read More


Lawrence Kearney
By: Lawrence Kearney

July 16, 2018 3:22 am

1,704 views

Deploying SLURM using SLE HPC patterns

The expansion of High Performance Computing (HPC) beyond the niches of higher education and government realms to corporate and business computing use cases has been on the rise. One catalyst of this trend is increasing innovation in hardware platforms and software development. Both respectively drive down the cost of deploying supercomputing services with each iteration […]

Read More


Alexander Bergmann
By: Alexander Bergmann

June 27, 2018 1:31 pm

1,962 views

Secure Boot Network Installation

1. Preboot Execution Environment (PXE) We have to start with the standard PXE setup that is used for decades for disk-less client bootstrapping. The client requests an IP address and gets it together with the information where to find a boot file that can be loaded via TFTP. In our case the network connection […]

Read More


bmwiedemann
By: bmwiedemann

June 26, 2018 9:32 am

3,253 views

reproducible builds in openSUSE and SLE

If you have been watching the news during the last 2-3 years, you might occasionally have heard about reproducible builds.   What are reproducible builds? The reproducible-builds project says “Reproducible builds” aim to provide a verifiable path from software source code to its compiled binary form. In its simplest form […]

Read More


Lawrence Kearney
By: Lawrence Kearney

June 17, 2018 2:20 am

4,601 views

The SSSD, Active Directory, and growing SLES integration

From both feature and security perspectives, integrating Linux systems with Active Directory environments has been a challenge for their respective system administrators and organisations. However, modern Linux distributions include the System Security Services Daemon (SSSD) which addresses many of the legacy shortcomings handily. The daemon uses identity and authentication providers (and other service providers) to […]

Read More


Lawrence Kearney
By: Lawrence Kearney

June 14, 2018 2:37 am

1,923 views

SLES, PAM, SSSD, and MFA Soup

Multi-factor authentication (MFA) solutions are becoming the standard for many user facing IT services. Most visibly with web applications, corporate VPNs, self-service portals and online banking platforms to name but a few. Extending MFA to the realm of system administration to harden access to the Linux operating system itself is becoming an established […]

Read More