Showing headlines posted by bob

« Previous ( 1 ... 818 819 820 821 822 823 824 825 826 827 828 ... 1272 ) Next »

Quad-core, 64-bit ARM hacker SBC has onboard wireless and eMMC

The tiny, open-spec, Kodi-oriented “Khadas Vim” SBC has a quad-core, Cortex-A53 Amlogic S905X, plus WiFi, BT, 2GB RAM, and 8GB ($50) or 16GB ($65) eMMC. A Chinese startup called Khadas has launched an open source Khadas Vim single board computer that runs on the Amlogic S905X, a lower-cost upgrade to the quad-core, Cortex-A53 Amlogic S905 found on Hardkernel’s Odroid-C2 hacker SBC.

Swift Is Old, Why Should I Use it?

With emerging technology, there can be the thought that old is not good. It could lack the features and performance the business requires. Cloud technology changes so much, do we still need something like Swift that predates OpenStack?

Enforcing cluster-wide policies for a Kubernetes-based Docker cluster

  • IBM developerWorks : Linux (Posted by bob on Dec 21, 2016 7:40 PM EDT)
  • Groups: IBM, Linux; Story Type: News Story
This article explains how cluster-level policies can be enforced for Kubernetes by using PodSecurityPolicy.

How to find Android apps that respect user privacy

  • Opensource.com (Posted by bob on Dec 21, 2016 6:31 PM EDT)
  • Groups: Android; Story Type: News Story
Have you ever downloaded an Android app only to find that it wants access to all your phone's features and all of your data? This experience, while not ubiquitous, is frustratingly common. Even applications in the F-Droid repository are not immune to requesting permission to access things they should not even need to access. For example, there is a Minesweeper application in F-Droid that wants to be able to record audio and video. read more

Ticketmaster Chooses Kubernetes to Stay Ahead of Competition

  • Linux.com - Original Content; By Ian Murphy (Posted by bob on Dec 21, 2016 4:14 PM EDT)
  • Story Type: News Story; Groups: Linux
The company has begun to roll out a massive public cloud strategy that uses Kubernetes, an open source platform for the deployment and management of application containers, to keep everything running smoothly, and sent two of its top technologists to deliver a keynote at the 2016 CloudNativeCon in Seattle explaining their methodology.

Coopetition: All's fair in love and open source

  • Opensource.com (Posted by bob on Dec 21, 2016 3:05 PM EDT)
  • Story Type: News Story
"I have been up against tough competition all my life. I wouldn't know how to get along without it." —Walt Disney read more

How to wirelessly manage, control, and access your Android phone from Linux using Airdroid

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Dec 21, 2016 11:39 AM EDT)
  • Groups: Linux, Android; Story Type: News Story
What if you could access your phone from your computer? Yes, there are applications that not only let you access, but also manage as well as control your phone from your PC. If you have been looking for such a solution, look no further as in this tutorial we will discuss an application dubbed AirDroid, focusing on how you can use it to access/manage/control your Android phone from your Linux computer.

OpenSSL after Heartbleed

  • Linux.com; By Dawn Foster (Posted by bob on Dec 21, 2016 10:22 AM EDT)
  • Story Type: News Story; Groups: Linux
Despite being a library that most people outside of the technology industry have never heard of, the Heartbleed bug in OpenSSL caught the attention of the mainstream press when it was uncovered in April 2014 because so many websites were vulnerable to theft of sensitive server and user data. At LinuxCon Europe, Rich Salz and Tim Hudson from the OpenSSL team did a deep dive into what happened with Heartbleed and the steps the OpenSSL team are taking to improve the project.

Remote Logging With Syslog, Part 4: Log Rotation

  • Linux.com; By Chris Binnie (Posted by bob on Dec 21, 2016 5:48 AM EDT)
  • Story Type: News Story; Groups: Linux
In this final article in the series, I’ll look at the /etc/rsyslog.d/www-rsyslog.chrisbinnie.tld.conf and discuss some important networking considerations.

Container Security: Your Questions Answered

To help you better understand containers, container security, and the role they can play in your enterprise, The Linux Foundation recently produced a free webinar hosted by John Kinsella, Founder and CTO of Layered Insight.

Op-ed: Why I'm not giving up on PGP

Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."

Happy Holidays: Linux Mint get a major upgrade

With this long-term support Linux desktop, which is based on Ubuntu 16.04, Linux Mint is better than ever. Since I've already found Linux Mint 18 to be the best desktop out there of any sort, that's saying something.

ADUPS Android Malware Infects Barnes & Noble

ADUPS is an Android "firmware provisioning" company based out of Shanghai, China. The software specializes both in Big Data collection of Android usage, and hostile app installation and/or firmware control. Google has blacklisted the ADUPS agent in its Android Compatibility Test Suite (CTS).

Open education is about improving lives, not taking tests

  • Opensource.com (Posted by bob on Dec 20, 2016 7:30 PM EDT)
  • Story Type: News Story
While recently reading The Innovator's Mindset: Empower Learning, Unleash Talent and Lead, by George Couros, I was struck by the parallels between the author's thinking and that of Jim Whitehurst in The Open Organization: Igniting Passion and Performance. read more

Using Ceph as Block Device on CentOS 7

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Dec 20, 2016 4:04 PM EDT)
  • Groups: Linux; Story Type: News Story
Ceph is an open source storage platform, it provides high performance, reliability, and scalability. In this tutorial, I will show you step-by-step to install and configure a Ceph Block Device client to use Ceph as a filesystem on CentOS 7.

Give back this holiday: Language input needed for literacy project

  • Opensource.com (Posted by bob on Dec 20, 2016 2:56 PM EDT)
  • Story Type: News Story
The Christmas holiday is fast approaching and many of us are thinking about ways we can help others, both near and far. The world certainly needs as much help, kindness, and charity as it can get, and some of us give money, or food, and toys to help out. Whatever we can give out of our own abundance to make things just a little bit brighter for someone else. And, what do we have in abundance more than code? read more

How Linux got to be Linux: Test driving 1993-2003 distros

A unique trait of open source is that it's never truly EOL (End of Life). The disc images mostly remain online, and their licenses don't expire, so going back and installing an old version of Linux in a virtual machine and getting a precise picture of what progress Linux has made over the years is relatively simple. We begin our journey with Slackware 1.01, posted to the comp.os.linux.announce newsgroup well over 20 years ago. read more

Aaeon shows its first Apollo Lake COM

  • HackerBoards (Posted by bob on Dec 20, 2016 5:37 AM EDT)
  • Groups: Intel; Story Type: News Story
Aaeon’s “COM-APLC6” is a COM Express Compact Type 6 module with an Apollo Lake SoC and 2x SATA, 3x PCIe, 10x USB, 2x MIPI-CSI, and dual display support. After announcing Intel Apollo Lake based products including a 3.5-inch SBC (GENE-APL5), a thin Mini-ITX SBC (EMB-APL1), and a Pico-ITX SBC (PICO-APL1), Aaeon has now unveiled its […]

Hardening the Kernel to Protect Against Attackers

  • Linux.com - Original Content (Posted by bob on Dec 20, 2016 1:03 AM EDT)
  • Groups: Kernel, Linux; Story Type: News Story
The task of securing Linux systems is so mind-bogglingly complex and involves so many layers of technology that it can easily overwhelm developers. However, there are some fairly straightforward protections you can use at the very core: the kernel. These hardening techniques help developers guard against the bugs that haven’t yet been detected.

Best of Opensource.com: Programming

  • Opensource.com; By Greg Pittman (Posted by bob on Dec 19, 2016 10:45 PM EDT)
  • Story Type: Roundups; Groups: Community, PHP
This list of top programming articles from the year on Opensource.com, showcase the depth of the open source community's latest programming interests. If you share my curiosity for even the tiniest steps forward in open source programming tools and tricks, this article's for you.

« Previous ( 1 ... 818 819 820 821 822 823 824 825 826 827 828 ... 1272 ) Next »