Skip to main content

Why Should You Learn About Linux?

The most important technology for IT professionals to understand may be Linux.
Linux is used everywhere. If you use the internet at all, you're already using Linux in your daily life. Perhaps the most obvious way in which you interact with Linux systems would be through browsing the worldwide web and using e-commerce sites to buy and sell products.
But Linux is used for much more than that. It manages point-of-sale systems and the world's stock markets. It is used to power smart TVs and in-flight entertainment systems. It powers most of the top 500 supercomputers in the world. Linux provides the foundational technologies powering the cloud revolution and the tools used to build the next generation of container-based microservices applications. Emerging software-based storage technologies and big-data solutions are being built on Linux.
In the modern datacenter, Linux and Microsoft Windows are the major players, and Linux is a growing segment in that space. Some of the many reasons to learn Linux:
  • If you're a Windows person, you'll need to interoperate with Linux.
  • If you're doing application development, it's likely your application or its runtime will be hosted on Linux.
  • If you're working in the cloud, your cloud instances may be based on Linux, and your private or public cloud environment will probably be based on Linux.
  • If you're working with mobile applications or the Internet of Things (IoT), the chances are great that the operating system of your device will be based on Linux.
  • If you're looking for new opportunities in IT, Linux skills are in high demand.

What makes Linux great?

There are many different answers to the question "What makes Linux great?", but three of them are:
  • Linux is open source software.
    Being open source doesn't just mean that you can see how the system works. You can also experiment with changes and share them freely for others to use. This means improvements are easier to make, enabling faster innovation.
  • Easy access to a powerful and scriptable command-line interface (CLI).
    From the beginning, Linux has been built around the basic design philosophy that allows all administration to be done from the CLI. This enables easier automation, deployment, and provisioning, and simplifies both local and remote system administration. Unlike other operating systems, these capabilities haven't had to be developed after the fact, and the assumptions of the system have always been to enable these important capabilities.
  • Linux is modular and operating system components can easily be replaced or removed.
    Components of the system can be upgraded and updated as needed. A Linux system can be a general-purpose development workstation, or an extremely stripped-down software appliance.

Comments

Popular posts from this blog

Special Permissions in linux

The setuid permission on an executable file means that the command will run as the user owning the file, not as the user that ran the command. One example is the passwd command: [student@desktopX ~]$ ls -l /usr/bin/passwd -rw s r-xr-x. 1 root root 35504 Jul 16 2010 /usr/bin/passwd In a long listing, you can spot the setuid permissions by a lowercase s where you would normally expect the x (owner execute permissions) to be. If the owner does not have execute permissions, this will be replaced by an uppercase S . The special permission setgid on a directory means that files created in the directory will inherit their group ownership from the directory, rather than inheriting it from the creating user. This is commonly used on group collaborative directories to automatically change a file from the default private group to the shared group, or if files in a directory should be

The Seven-Step Model of Migration

Irrespective of the migration approach adopted, the Seven-step Model of Cloud Migration creates a more rational point of view towards the migration process and offers the ability to imbibe several best practices throughout the journey Step 1: Assess Cloud migration assessments are conducted to understand the complexities in the migration process at the code, design and architectural levels. The investment and the recurring costs are also evaluated along with gauging the tools, test cases, functionalities and other features related to the configuration. Step 2: Isolate The applications to be migrated to the cloud from the internal data center are freed of dependencies pertaining to the environment and the existing system. This step cuts a clearer picture about the complexity of the migration process. Step 3: Map Most organisations hold a detailed mapping of their environment with all the systems and applications. This information can be used to distinguish between the

RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version

import tweepy /usr/lib/python2.7/dist-packages/requests/__init__.py:80: RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version!   RequestsDependencyWarning) Traceback (most recent call last):   File "<stdin>", line 1, in <module>   File "/usr/local/lib/python2.7/dist-packages/tweepy/__init__.py", line 14, in <module>     from tweepy.api import API   File "/usr/local/lib/python2.7/dist-packages/tweepy/api.py", line 12, in <module>     from tweepy.binder import bind_api   File "/usr/local/lib/python2.7/dist-packages/tweepy/binder.py", line 11, in <module>     import requests   File "/usr/lib/python2.7/dist-packages/requests/__init__.py", line 97, in <module>     from . import utils   File "/usr/lib/python2.7/dist-packages/requests/utils.py", line 26, in <module>     from ._internal_utils import to_native_string   File "/usr/lib/python2.

tag