![Trusted Platform Modules: Locksmith in the Basement? Trusted Platform Modules: Locksmith in the Basement?](https://cdn.magzter.com/Linux For You/1727421237/articles/39GnysiHV1729164398022/TRUSTED-PLATFORM-MODULES-LOCKSMITH-IN-THE-BASEMENT.jpg)
Once upon a time there was a town where people traded very valuable items. But the town had notorious thieves that kept stealing these items. So the people built a special lockbox and kept the items in them for trading. This was a strong box and could not be broken or destroyed to get the contents inside it. The only way to do that was by unlocking it. The box had two keyholes and did not have any fixed keys. A locksmith could make special keys for the box in pairs — if one of the keys in the pair was used to lock the box, only the second key in the same pair could unlock it.
This lockbox was used widely and it worked well. People kept one key of the pair outside their homes in a publicly visible place. Anyone who wanted to give them something made a copy of that key. They then kept that item in the person’s lockbox, used this copied key to lock it, and handed over the box. The second key of the pair was kept by the owner securely and not given to anyone, and only he or she could unlock the box with this second key. The thieves stopped stealing these lockboxes because they were unable to open them without the correct keys.
This worked very well for ages. But then some thieves broke into the homes of people and started stealing the second key that was with the owner. And once they got the key, they stole the contents from the lockboxes. This became a menace in no time as the thieves started stealing the keys from more and more people, who started losing the valuables kept in the lockboxes.
To overcome this challenge, people in the town started making vaults to keep their keys safely. These vaults were unbreakable and strong so the thieves could not steal the keys. The second key was kept in the vault and taken out only when needed.
But this, too, did not work for long because the thieves were able to find the keys to the vault to unlock it. Then they stole the keys from the vault!
Diese Geschichte stammt aus der October 2024-Ausgabe von Open Source For You.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der October 2024-Ausgabe von Open Source For You.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
![Red Hat unveils Red Hat OpenShift Virtualization Engine Red Hat unveils Red Hat OpenShift Virtualization Engine](https://reseuro.magzter.com/100x125/articles/148/1974748/iKWwmvYpQ1738067591582/RED-HAT-UNVEILS-RED-HAT-OPENSHIFT-VIRTUALIZATION-ENGINE.jpg)
Red Hat unveils Red Hat OpenShift Virtualization Engine
Red Hat OpenShift Virtualization Engine is a new edition of Red Hat OpenShift that offers a dedicated solution for organisations to leverage the virtualisation capabilities already available within Red Hat OpenShift.
![Spring AI: A Door to GenAI Heaven for Java Developers Spring AI: A Door to GenAI Heaven for Java Developers](https://reseuro.magzter.com/100x125/articles/148/1974748/hu8J5jOlJ1738065650032/SPRING-AI-A-DOOR-TO-GENAI-HEAVEN-FOR-JAVA-DEVELOPERS.jpg)
Spring AI: A Door to GenAI Heaven for Java Developers
Let's explore the Spring AI framework and its advantages, and look at how it is helping Java developers adopt AI.
![Significant security vulnerabilities drive the release of Rsync 3.4 Significant security vulnerabilities drive the release of Rsync 3.4](https://reseuro.magzter.com/100x125/articles/148/1974748/9F8_ki36D1738067500143/SIGNIFICANT-SECURITY-VULNERABILITIES-DRIVE-THE-RELEASE-OF-RSYNC-34.jpg)
Significant security vulnerabilities drive the release of Rsync 3.4
Rsync, the widely used utility for incremental file transfers and synchronisation, has released version 3.4. This update isn't packed with exciting new features but is instead critical due to several newly disclosed security vulnerabilities.
![NVIDIA puts Grace Blackwell at every AI developer's fingertips NVIDIA puts Grace Blackwell at every AI developer's fingertips](https://reseuro.magzter.com/100x125/articles/148/1974748/8SzatJcZi1738067285778/NVIDIA-PUTS-GRACE-BLACKWELL-AT-EVERY-AI-DEVELOPERS-FINGERTIPS.jpg)
NVIDIA puts Grace Blackwell at every AI developer's fingertips
NVIDIA has introduced NVIDIA Project DIGITS, a groundbreaking personal AI supercomputer designed to empower AI researchers, data scientists, and students NVIDIA® NVIDIA GRACE BLACKWELL with the immense capabilities of the NVIDIA Grace Blackwell platform.
![Top Tools for DevOps, Cybersecurity, and Cloud Management in 2025 Top Tools for DevOps, Cybersecurity, and Cloud Management in 2025](https://reseuro.magzter.com/100x125/articles/148/1974748/X9BhIP3xm1738063965087/TOP-TOOLS-FOR-DEVOPS-CYBERSECURITY-AND-CLOUD-MANAGEMENT-IN-2025.jpg)
Top Tools for DevOps, Cybersecurity, and Cloud Management in 2025
In 2025, organisations will continue to rely on open source tools to retain a competitive edge. We look at why the best tools for DevOps, cybersecurity and cloud management will remain relevant and how best to integrate them into your organisation.
![CREW: Open source platform to improve human-AI interaction CREW: Open source platform to improve human-AI interaction](https://reseuro.magzter.com/100x125/articles/148/1974748/v7JdzeKei1738067145220/CREW-OPEN-SOURCE-PLATFORM-TO-IMPROVE-HUMANAI-INTERACTION.jpg)
CREW: Open source platform to improve human-AI interaction
As human-AI collaboration deepens, critical questions arise: How should humans and AI complement one another? What kind of feedback enhances AI training? How can trust in AI be optimised to balance collaboration without over-reliance? Researchers at Duke University are addressing these challenges through CREW-an innovative platform designed to advance human-AI teaming.
![Red Hat completes the acquisition of Neural Magic Red Hat completes the acquisition of Neural Magic](https://reseuro.magzter.com/100x125/articles/148/1974748/GRbPQQAPN1738067430536/RED-HAT-COMPLETES-THE-ACQUISITION-OF-NEURAL-MAGIC.jpg)
Red Hat completes the acquisition of Neural Magic
Red Hat, Inc., has announced the completion of its acquisition of Neural Magic, a trailblazer in software and algorithms that accelerate generative AI (GenAI) inference workloads.
![The Do's and Don'ts for Software Architects The Do's and Don'ts for Software Architects](https://reseuro.magzter.com/100x125/articles/148/1974748/B_0gEr6Ts1738063947528/THE-DOS-AND-DONTS-FOR-SOFTWARE-ARCHITECTS.jpg)
The Do's and Don'ts for Software Architects
Here's a list of best practices for software architects as well as the common mistakes they should try not to fall prey to.
![openSUSE's Tumbleweed introduces Wayland support for the LXQt desktop environment openSUSE's Tumbleweed introduces Wayland support for the LXQt desktop environment](https://reseuro.magzter.com/100x125/articles/148/1974748/JezmN60Cy1738067329409/OPENSUSES-TUMBLEWEED-INTRODUCES-WAYLAND-SUPPORT-FOR-THE-LXQT-DESKTOP-ENVIRONMENT.jpg)
openSUSE's Tumbleweed introduces Wayland support for the LXQt desktop environment
The openSUSE Project has announced that its Tumbleweed rolling release distribution now includes Wayland support for users of the LXQt desktop environment.
![A Guide for Software Architects: Common Mistakes and Best Practices A Guide for Software Architects: Common Mistakes and Best Practices](https://reseuro.magzter.com/100x125/articles/148/1974748/-9kh2vXnZ1738066616299/A-GUIDE-FOR-SOFTWARE-ARCHITECTS-COMMON-MISTAKES-AND-BEST-PRACTICES.jpg)
A Guide for Software Architects: Common Mistakes and Best Practices
Software architects play an invaluable role in the digital transformation of an organisation. To make a mark, they must imbibe certain qualities and avoid common errors.