centos-logo

by Rich Alloway • No Comments on How to migrate from RHEL 7.4 to CentOS 7.4

How to migrate from RHEL 7.4 to CentOS 7.4

Part 1 of two-part walk-through of a migration from RHEL to CentOS, comparing the two alternatives...

Read More »

Jenkins CI

by Bill Burns • No Comments on How to integrate CodeDynamics memory leak detection into Jenkins

How to integrate CodeDynamics memory leak detection into Jenkins

Instructions on how to automatically detect memory leaks for HPC systems using CodeDynamics and the Jenkins continuous integration system...

Read More »

Wi-Fi zone

by Andrew Pomponio • No Comments on The KRACK vulnerability and how to prevent it

The KRACK vulnerability and how to prevent it

On the KRACK Wi-Fi vulnerability and what you can do to prevent it...

Read More »

come-in-were-open-sign

by Roy Sarkar • No Comments on What does enterprise open source support mean?

What does enterprise open source support mean?

Open source can be supported just as effectively as commercial software in the enterprise—here's how we do it...

Read More »

The_Linux_Foundation

by Mike Hagan • No Comments on Linux Foundation courses offered by open source experts

Linux Foundation courses offered by open source experts

Linux Foundation certifications give you a way to differentiate yourself in a job market. We’ve partnered with them to offer courses to help prepare you...

Read More »

Automotive security vulnerabilities image

by Walter Capitani • 2 Comments on Does the ‘V’ in GENIVI represent vulnerability?

Does the ‘V’ in GENIVI represent vulnerability?

Everywhere we look today, security’s in the news. Nowhere is this more evident than in the automotive sector. Rogue Wave Software engineers recently performed a security analysis of the GENIVI open source code base. Here's what they found...

Read More »

Scroll to top