Operating Systems IllustrationOPERATING SYSTEMS

CONTAINERS VERSUS OPERATING SYSTEMS: What Does a Distro Provide? The most popular docker base container image is either busybox, or scratch. This is driven by a movement that is equal parts puritanical and pragmatic. The puritan asks “Why do I need to run init(1) just to run my process?” The pragmatist asks “Why do I need a 700 meg base image to deploy my application?” And both, seeking immutable deployment units ask “Is it a good idea that I can ssh into my container?” But let’s step back for a second and look at the history of how we got to the point where questions like this are even a thing. Read more
[DAVE.CHENEY.NET]

EUROPE: Barcelona Abandons Windows and Office, Goes with Linux Instead. In another entire-city-abandons-Microsoft affair, Barcelona has announced that it’s dumping Windows and Office in order to migrate to Linux and other open source solutions. The idea is, obviously enough, to save money by not paying subscription fees to Microsoft, because the beauty of open source software is that it’s free. Read more
[TECHRADAR.COM]

MICROSOFT: Ends Mainstream Support for Windows 8.1. Windows 8.1 users are now left without mainstream support, as Microsoft officially pulls the plug on the operating system. The company will still continue to offer security updates until 2023, when all support for the platform will end. Read more.
[KITGURU.NET]

TECH TIP: Keeping Up With the Meltdown and Spectre Bugs. Is it safe to install the Windows patch for these new Spectre and Meltdown bugs? Do they affect Linux? (And who names these security flaws, anyway?) Find out the answer. Read more.
[NYTIMES.COM]

==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2017 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-december-2017.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Operating Systems – Daily Tech Update – January 17, 2018

Leave a Reply