Using Docker-Compose to Simplify Multi-Container Builds

One of the primary advantages of containers is the ability to quickly deploy a single, discrete application with a known configuration, fully supported within the container. However, as we all know, within our enterprise organizations, most applications do not run on their own – most have to connect to and use search services, databases, and more. Let’s take a look at how to build a multi-container environment, managed with a single utility in order to simplify your deployments. (more…)

The Lost Art of Disk Quota Management

Once upon a time, disk space was at a premium (in fact, most compute resources were). Many times, companies and educational institutions provided access to systems via a shell (telnet or SSH) to their employees or students. Since those resources were at a premium, they had to be divided amongst the users in various forms. The most common resource that required strict controls was disk space. Even today, you may need to occasionally limit the disk space (or number of files) that a user account can use. It is one of those system administration functions that is used less often, but it is an important topic to understand (and is one of the objectives on the recently launched LPIC-1: System Administrator – Exam 1 Certification Prep Course here at Linux Academy). Let’s take a look at some of what goes into restricting disk space for your user community. (more…)

AWS Shield

Cloud Compliance – How AWS Shield Plays a Part

In our last article, we took a look at some of the most common compliance regulations that affect IT organizations and their cloud stratagem. Understanding the requirements around compliance can help to inform your cloud infrastructure plans, but is only part of the equation. Today, I want to talk about how the recently announced (AWS re:Invent 2016) AWS Shield can help organizations put some of the complex issues into perspective in a more comprehensive policy. (more…)


Information Security Compliance – What is it and how does it affect my organization?

Compliance, in general, continues to be of heavy concern to most information technology organizations. The regulations tend to be “under-understood” and understanding their impact to your organization (both from a time, cost and personnel perspective) can be challenging, particularly as they apply to organizations migrating to the cloud. Today, we are going to take a look at some of the most common compliance regulations for information technology, while in a future article we will explore some of the protections and options we have when moving to the cloud. (more…)


Dockerizing Desktop Applications

Everyone has heard of Docker and the container revolution it has sparked. Using Docker to containerize server applications has revolutionized how applications are deployed in the Enterprise, due to increased speed and consistency without regard to underlying distribution or architecture. However, not many are really looking at how Docker can improve your desktop experience as much as your server deployments. Let’s take a look at some Docker desktop containers for popular applications and why we might use them. (more…)

Azure Header Background Image

Microsoft Azure – Setting Up the CLI and Launching a VM

Microsoft continues to deliver on their promise to embrace open source. With dozens of officially supported Linux distributions and open source services available on their Azure platform, anyone can deploy workloads to their cloud platform regardless of the operating system of choice. Today, we are going to show you how to set up the Microsoft Azure CLI and use it to launch a virtual machine in the cloud. (more…)

Quick Start Header Background Image

Linux Academy Quick Start – What You Need to Get Going!

At Linux Academy, we pride ourselves on the depth and breadth of the courses that we offer our student community. You can often find our courses laid out with fifty or more videos comprising dozens of hours, hundreds of quiz questions, dozens of hands-on exercises and labs, as well as a comprehensive study guide collection and flash cards. However, whether it’s because you need a break or you just need to get started using a new technology, we have recently launched Linux Academy Quick Start™. (more…)

Behind the scenes

Making a Difference at Linux Academy

Content creator and Linux Academy instructor, Terry Cox, shares his experience working at Linux Academy.

This will not be your typical post here on Linux Academy. However, I hope you will still learn something.

A Special Thanks

I wanted to take a moment and say a special thank you to our community of students and everyone else at Linux Academy. No, this is not a farewell, just a time to appreciate everyone enabling me to be a part of something like Linux Academy.

Very few times in our lives are we presented with an opportunity like the one I have here. Throughout the majority of my career, I have held a variety of positions: From entry level application developer to the management of large engineering teams. As a result, my responsibilities have been varied and have not always aligned with my passions or interests. This is pretty status quo for anyone, particularly in Information Technology.

Then I joined Linux Academy; part time at first, because of the popularity and demand for the service at the price point we offer. Suddenly, I was able to participate in a like-minded community of technology professionals and those new to the industry. Now, I had an opportunity to work on things I was passionate about as well as be part of a large group with perspectives that ran the gamut of Linux, AWS, Open Source and even Windows. (more…)


Personal Security – Importing, Verifying and Signing PGP Keys

In our last article, we went over how to create keys that we can share with others. Before we get into using them in our email program of choice, we have to know a bit more about how to work with the keys we get from others. In today’s article, we will be discussing how to import keys that we receive from others as well as how to then verify the other person’s identity with their key and then signing it, so our software knows it is trusted. (more…)