Showing headlines posted by bob

« Previous ( 1 ... 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 ... 1153 ) Next »

Wanna build a module for Google's Project Ara mix-and-match phone? Here are your specs

Developlent kit released for hardcore hardware hacks only Just days before its first Project Ara Developer Conference is scheduled to begin, Google has released the device's Module Developers Kit (MDK), a set of plans and documentation designed to get hardware hackers started building modules for the componentized, mix-and-match experimental smartphone.…

Speed Test for Nerds

Most people with Internet access in their houses have visited a speed-test Web site to make sure they're getting somewhere close to the speed they're overpaying for. Thankfully, my friend Charlie K. (I won't use his last name, because I didn't ask him if I could) posted a link on Google Plus to the speedtest-cli program.

DevOps amplifies your open source credentials

  • opensource.com (Posted by bob on Apr 10, 2014 9:58 AM EDT)
  • Story Type: News Story
Can you really do DevOps without sharing scripts or code? DevOps manifesto proponents value cross-functional teams, symbiotic relationships, and continual feedback loops. Effective DevOps initiatives create engaged communities where team interactions amplify personal actions. When technology teams find adopting a DevOps culture is more difficult than using DevOps tools, suggest the open source way as a path forward.

How to govern a project on the scale of OpenStack

  • opensource.com (Posted by bob on Apr 10, 2014 8:04 AM EDT)
  • Story Type: News Story
How an open source project is governed can matter just as much as the features it supports, the speed at which it runs, or the code that underlies it. Some open source projects have what I call a "benevolent dictator for life." Others are outgrowths of corporate projects that, while open, still have their goals and code led by the company that manages it. And of course, there are thousands of projects out there that are written and managed by a single person or a small group of people for whom governance is less of an issue than insuring project sustainability.

The Many Alternative Computing Worlds of Linux

Have you ever wondered what happened to Linux? Linux is the free software created through the open source development process that many technology enthusiasts had predicted would revolutionize the world of computing. It may not be widely known, but Linux did revolutionize computing. If you own an Android phone or a Kindle e-reader, you are a Linux user. Linux is at the core of those popular devices and is found in a variety of other places, from the world’s most powerful supercomputers down to the tiny Raspberry Pi device that is a favorite among electronics hobbyists.

Leaked images and video show simplified Android TV UI

[Updated Apr 9] — Leaked images and a CES 2014 demo of Google’s new Android TV user interface show a more streamlined and intuitive approach to the big screen than Google TV. Rumors of the impending sunsetting of Google TV have been around at least since September when Sony, Google’s most stalwart partner for its […]

Wallabag to serve your open source read-it-later app needs

  • opensource.com (Posted by bob on Apr 9, 2014 2:54 PM EDT)
  • Story Type: News Story
No matter how well organized you are, no matter how well you manage your time, you probably don't get the chance to read all of the interesting articles that you find when you find them. To get around that, you can use services like Readability, Instapaper, and Pocket that allow you clip articles and read them when you do have the time.

The Internet's 25 years and future with open source

  • opensource.com (Posted by bob on Apr 9, 2014 11:57 AM EDT)
  • Story Type: News Story
What began as ARPANET back in 1969, has become the Internet as we know it today. This year on March 12 marked 25 years of the World Wide Web. It all got started when... In March 1989 Tim Berners-Lee, a scientist working at CERN, submitted a proposal to develop a radical new way of linking and sharing information over the internet.(Source: home.web.cern.ch)

Making FLOSS circumvention tools safer for journalists and activists

  • opensource.com (Posted by bob on Apr 9, 2014 9:05 AM EDT)
  • Story Type: News Story
Software tools that bypass censorship and surveillance, also known as circumvention technology, are used in variety of contexts. Chinese citizens get around the Great Firewall to access censored sites and popular international social media platforms. Activists in Iran bypass government surveillance to post photos and video of anti-government demonstrations. Journalists in Mexico circumvent cartel surveillance to report on local drug-related violence. While circumvention tools have become more popular in recent years, many are shipped with little or no security review. This is precarious since any error could place end-users who are located in high-risk areas in danger.

Raspberry Pi morphs into $30 SODIMM-style COM

The Raspberry Pi Foundation unveiled the $30 Raspberry Pi Compute Module, an embeddable computer-on-module version of the Pi, plus a companion baseboard.

Debian: 2896-2: openssl: Summary

  • LinuxSecurity.com; By Benjamin D. Thomas (Posted by bob on Apr 9, 2014 6:23 AM EDT)
  • Story Type: Roundups, Security; Groups: Debian
Debian Security Report Summary

DNSSEC Part II: the Implementation

This article is the second in a series on DNSSEC. In the first one, I gave a general overview of DNSSEC concepts to lay the foundation for this article, which discusses how to enable DNSSEC for a zone using BIND. In this article, I'm going to dive right in to implementation.

The gift of Grace: COBOL's odyssey from Vietnam to the Square Mile

  • The Register; By Dominic Connor (Posted by bob on Apr 9, 2014 4:49 AM EDT)
  • Story Type: Editorial; Groups: Developer, IBM
Cobol is the language most associated with mainframes, especially the IBM System 360 whose 50th anniversary is being celebrated or at least commemorated this week. But when COBOL was first spawned in the mid-1950s, it wasn’t intended for programmers.

Google woos enterprise developers with 'Glass at Work' program

Early adopters get increased tech support Google is making a push to get its Glass headsets into the workplace with a new program, "Glass at Work", to entice coders to build enterprise applications for companies wanting to get into the wearable computing platform.…

Slackware: 2014-098-01: openssl: Security Update

New openssl packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

3.5-inch Atom E3800 SBC sports stackable expansion

WinSystems unveiled a Linux-ready, 3.5-inch SBC35-CC405 board with an Atom E3800 SoC, plus industrial temperature support, and MiniPCIe and “IO60? expansion.

Raspberry Pi Compute Module: new product!

Like proud parents, we want to free the core technology of the Raspberry Pi to go forth and become an integral part of new and exciting products and devices, and so today we are announcing the forthcoming Raspberry Pi Compute Module. The compute module contains the guts of a Raspberry Pi (the BCM2835 processor and 512Mbyte of RAM) as well as a 4Gbyte eMMC Flash device (which is the equivalent of the SD card in the Pi). This is all integrated on to a small 67.6x30mm board which fits into a standard DDR2 SODIMM connector (the same type of connector as used for laptop memory*)

Why open infrastructure matters in the cloud

When reading a recent article by Red Hat CEO Jim Whitehurst, I was struck by a comparison made between OpenStack and the interstate highway system. The article in Wall Street and Technology, called "OpenStack: Five things every executive needs to know," mostly focused on the high points of where OpenStack is in its development cycle. But the highway analogy stuck with me.

Securing SSH On Redhat/Centos With WiKID Two-Factor Authentication

  • HowtoForge - Linux Howtos and Tutorials - Linux (Posted by bob on Apr 8, 2014 2:55 PM EDT)
  • Groups: Ubuntu, Linux; Story Type: News Story
Securing SSH On Ubuntu With WiKID Two-Factor Authentication SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit.

How Git redefined open source software development

It's not hard to come up with a dozen different reasons why the rise of open source development has been a watershed event in both the software and hardware industries. All of us can build new web applications faster with our feet firmly planted on the shoulders of jQuery, Bootstrap, and Apache. Languages like Ruby, PHP, and Python power the Internet, and operating systems like Linux and FreeBSD provide the foundation for thousands of companies and services. But open source isn't just about the free tools we have access to, it's also about the community of developers that will help support crazy new ideas and give them a chance to thrive, grow, and change the world; ideas that would never see the light of day in a closed source world.

« Previous ( 1 ... 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 ... 1153 ) Next »