Showing headlines posted by bob

« Previous ( 1 ... 939 940 941 942 943 944 945 946 947 948 949 ... 1148 ) Next »

Fedora users in APAC are heading to Pune, India

  • Fedora Magazine (Posted by bob on Jun 12, 2015 10:54 AM EDT)
  • Groups: Fedora; Story Type: News Story
Every year, Fedora users and developers in the Asia Pacific (APAC) region meet up at the annual FUDCon (Fedora Users & Developers Conference) to learn how to do get more out of Fedora, and plan the future of our OS.... Continue Reading →

Longtime Linux user contributes to Pacemaker, founds new project

  • Opensource.com (Posted by bob on Jun 12, 2015 9:57 AM EDT)
  • Groups: Linux; Story Type: News Story
I got started with Linux in the late 90s. I worked in the Bell Labs Denver datacenter and had done lots of different kinds of work with UNIX since 1978; switching systems, and tools, and datacenter work, and we always had the source code for every kind of UNIX we had installed. read more

How to use Avidemux for Video Editing

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Jun 12, 2015 8:03 AM EDT)
  • Groups: Linux; Story Type: News Story
Thankfully, the open source world offers many good choices when it comes to video editing. Some of the most popular choices are the PiTiVi, OpenShot, Kdenlive and Blender. Avidemux is another one - maybe the one with the worst name, but being one of the oldest (five years old) it is now quite mature and stable as well as relatively feature rich.

Power over Ethernet for your Pi

  • Linux User & Developer - the Linux and FOSS mag for a GNU generation (Posted by bob on Jun 12, 2015 7:05 AM EDT)
  • Groups: GNU, Linux, Developer; Story Type: News Story
New HAT module provides power and an Ethernet connection with a single cable

Saving laptop power with powertop.

  • Fedora Magazine (Posted by bob on Jun 12, 2015 2:30 AM EDT)
  • Groups: Fedora; Story Type: News Story
If there’s one thing you want from a laptop, it’s long battery life. You want every drop of power you can get to work, read, or just be entertained on a long jaunt. So it’s good to know where your power is going. You can... Continue Reading →

Fanless box-PCs run Linux on Intel Haswell and Avoton

Logic Supply unveiled three fanless industrial PCs, including two using Intel 4th Gen Core processors and one with a quad- or octa-core Atom “Avoton” SoC. Logic Supply’s Linux-ready ML600 Series computers represent the next generation in the company’s ML series after last year’s ML400 Series. The systems are available pre-loaded with Ubuntu 14.04 LTS 64-bit, […]

Who's afraid of DNS? Nominet's new 'turing' tool visualises hidden security threats

UK domain registrar Nominet has shown off a striking new visualisation tool called 'turing' that large organisations can use to peer into their DNS traffic to trace latency issues and spot previously invisible botnets and malware.

"Don't Hack Me! That's a Bad Idea," Says Eugene Kaspersky to APT Groups

Earlier today, the boss of Kaspersky Labs appeared in a cheerful mood at a press conference in London, called to offer clarifications on the cyber-attack at a company office, conducted by one of the most mysterious advanced persistent threat (APT) groups identified to date.

Gettin' Sticky with It

In last month's issue, I talked about Linux permissions (see "It's Better to Ask Forgiveness..." in the May 2015 UpFront section). I could have covered SUID, GUID and sticky bit in the same article, but it seemed like a lot to cover in one sitting.

Change is brutal, even in an open organization

  • Opensource.com (Posted by bob on Jun 11, 2015 5:55 PM EDT)
  • Groups: Red Hat; Story Type: News Story
Change management is one of the most popular topics in business literature, and something I first encountered during my evening MBA studies while I was working at Red Hat. The most surprising thing that I learned in business school, which I continue to think of often, is the fact that so many organizational change initiatives fail (some say more than 70%; my professor said 90%), despite the fact that we have a well documented and proven formula for their success. Do 70% of leaders of change initiatives forget to read the book? read more

Raspberry Pi stays sky high in 2015 Hacker SBC Survey

Our 2015 Hacker SBC Survey has concluded, with 1,721 participants. Now it’s time to reveal 2015’s Top Ten Hacker SBCs, and the 20 winners of free boards. Last month, LinuxGizmos.com and the Linux Foundation’s Linux.com community website sponsored a 10-day SurveyMonkey survey that asked readers of both sites to choose their favorite three Linux- or […]

How to install Webmin on Ubuntu 15.04

Webmin is a web-based interface for system administrators of Linux systems. It is quite simple, using any web-browser you can set up user accounts, Apache, Installations etc. Webmin helps all those who are not comfortable with the command line but want to manage their servers. This tutorial covers Installation and a little work around with Webmin on Ubuntu 15.04 (Vivid Vervet).

How TYPO3 meetups help improve the technology, community, and business

Peer-production is one of the strengths of open source projects. TYPO3, a self-organized project without corporate backing, always lived from the spirit of sharing ideas, work, and values. It’s not by accident that one of our core values is, "Inspire people to share." Over the years, as a result of the massive success of TYPO3 as a product, core team members became increasingly decoupled from the work with clients. Instead, they focused on the core development. read more

Linux powers DARPA Robotics Challenge winner

  • LinuxGizmos (Posted by bob on Jun 11, 2015 12:12 PM EDT)
  • Groups: Linux; Story Type: News Story
A Xenomai Linux based robot from Korea’s Team KAIST called the DRC-Hubo won the $2 million DARPA Robotics Challenge Finals, one of only three bots to complete the course on time. Judging by Silicon Valley’s reigning “Failure rocks!” mantra, this week’s DARPA Robotics Challenge Finals held earlier this week in Pomona, California, was a resounding […]

European Union's 5-year roadmap for IT needs open source

  • Opensource.com (Posted by bob on Jun 11, 2015 11:15 AM EDT)
  • Story Type: News Story
After months of preparation, the European Commission (EC) released its broad 5-year roadmap in early May for information and communications technology (ICT) policy, the Digital Single Market Strategy, or DSM. The plan is structured around three main pillars or goals, which include: read more

Documentation is a journey: 3 lessons learned from documenting Scribus

  • Opensource.com (Posted by bob on Jun 11, 2015 10:17 AM EDT)
  • Story Type: News Story
I'd like to use my own personal journey with open source documentation to illustrate how it's possible to begin with little to nothing and create—and then build on—your work and that of others. read more

Just how open will Apple allow Swift to be?

  • ZDNet | Linux and Open Source RSS (Posted by bob on Jun 11, 2015 7:26 AM EDT)
  • Groups: Linux; Story Type: News Story
Some people love that Apple is open sourcing its Swift programming languages. Others are taking a wait-and-see attitude about just how 'open' Apple will make Swift.

OPM Breach Exposes Agency's Systemic Security Woes

The massive hack at the Office of Personnel Management showed not just room for improvement but a lack of very basic security fundamentals -- and expertise.

Why an open web is important for India

Priyanka Nag is a technical writer for Red Hat and Mozilla Rep from India. Priyanka has been contributing to open source projects for the past four years. She started by editing Wikipedia pages, and then was introduced to Mozilla during an event at her college. She says that Mozilla was love at first sight, and soon after she became a Mozillian, she was hooked on the project. Now Priyanka is also a regular speaker at community events in India.

Mozilla Increases Rewards for Bug Bounty Program

After maintaining the same vulnerability rewards for five years, Mozilla decided to increase its monetary acknowledgement for bugs reported by external security researchers. The quality of the report, severity of the flaw and a clear description of how it can be exploited are important criteria for setting the value of the reward.

« Previous ( 1 ... 939 940 941 942 943 944 945 946 947 948 949 ... 1148 ) Next »