"architectures" tag

Top 10 Open Source security tools

This article covers popular Open Source security tools which are used as a layered approach for securing your network. The layered-security approach centers on maintaining appropriate security measures and procedures at five different…

Secure Your SCADA Network Using Honeypot

Supervisory Control and Data Acquisition (SCADA) is an integrated part of a process control network. By actually damaging some critical infrastructure assets, including a nuclear plant and launch of a satellite, the Stuxnet…

Here’s How You Can Choose the Right Database For Your Business!

Choosing a database is a long term decision and altering that decision later can be a difficult and expensive proposition. So, IT managers need to get it right the first time around. Choosing…

Hardware access kit

Device Drivers, Part 8: Accessing x86-Specific I/O-Mapped Hardware

This article, which is part of the series on Linux device drivers, continues the discussion on accessing hardware in Linux. The second day in the Linux device drivers’ laboratory was expected to be…

Accessing hardware in Linux

Device Drivers, Part 7: Generic Hardware Access in Linux

This article, which is part of the series on Linux device drivers, talks about accessing hardware in Linux. Shweta was all jubilant about her character driver achievements, as she entered the Linux device…

Let's set up QEMU first!

The Quick Guide to QEMU Setup

In this series of articles, we will explore the basics of QEMU, OS installation, QEMU networking and embedded system development for the ARM architecture. In this first part, let’s begin with the basics….

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.