InfoWorld editors and reviewers pick the best hardware, software, development tools, and cloud services of the year Read More ▶ | | | Escalation privilege vulnerability is present in the keyrings facility used by the kernel to store sensitive information like encryption and authentication keys Read More ▶ | | Fed up with GitHub ignoring requests for common improvements, dozens of open source project leaders are airing their frustration Read More ▶ | | Check out these Linux distros now -- they have a big 2016 ahead of them Read More ▶ | | | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ | | | |