Showing headlines posted by bob
« Previous ( 1 ... 963 964 965 966 967 968 969 970 971 972 973 ... 1176 ) Next »Inside the Open Container Project: How Docker plans to unite the container market
Linux Foundation-led effort promises a single spec for all
DockerCon 2015 For a while, it looked as though software containers were heading for the kind of standards squabble that has plagued the tech industry too often in its history.…
Rugged vehicle PC offers power protection, wireless options
Aaeon’s rugged, Linux-ready “Boxer” PC for vehicles offers a 4th Gen Core CPU, dual GbE and four 10/100 PoE LAN ports, mini-PCIe expansion, and a SIM slot. The Boxer-6301VS Embedded Box PC joins the aging, Atom D510 based AEV-6312 as Aaeon’s only other in-vehicle computer. There will soon be more, however, as Aaeon says it […]
Why are there still so many website vulnerabilities?
The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.
CII takes steps to make open-source software safer
The Linux Foundation's Core Infrastructure Initiative is taking on three new major open-source security projects and Linux security expert Emily Ratliff has been hired to oversee CII.
New Freescale i.MX7 SoCs take on low-power Linux IoT
Freescale unveiled two Linux-ready, 28nm i.MX7 SoCs with one or two Cortex-A7 cores, Cortex-M4 MCUs, and much lower power consumption than the i.MX6. The single-core, 800MHz i.MX7 Solo (i.MX7S) and dual-core, 1GHz i.MX7 Dual (i.MX7D) follow last month’s single-core i.MX6 UltraLite as the first i.MX system-on-chips to move to a Cortex-A7 architecture. The i.MX7 Series […]
How encryption keys could be stolen by your lunch
By studying the electronic signals, researchers have shown it is possible to deduce keystrokes, figure out what application a person is using or discover the secret encryption keys used to encrypt files or emails.
How to edit Movie Subtitles on the Linux Desktop
Here's is a quick guide on how to load and edit subtitles on GNOME Subtitles and Subtitle Editor. The movie that I will be using for this tutorial is a documentary called “The Pirate Bay Away From Keyboard” released in 2013 under a Creative Commons (CC) license.
“EPIC” fail—how OPM hackers tapped the mother lode of espionage data
Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management. But on Thursday, officials from OPM, the Department of Homeland Security, and the Department of the Interior revealed new information that indicates at least two separate systems were compromised by attackers within OPM's and Interior's networks.
The rise of creativity propels open data forward
The Greek mathematician and philosopher Plato, when asked of the Socratic dialogue The Republic, "Will we say of a painter, that he makes something?," answered "Certainly not, he merely imitates." Plato did not believe in art as a form of creativity. In fact, many great ancient cultures like Ancient Greece and Ancient India lacked the concept of creativity.
Art was seen as a form of discovery and not creation.It was a common belief that creativity happens to a selected few as a consequence of some form of divine intervention.
read more
How to build CubiKG, a DiY heart and activity tracking device
A few weeks ago, my doctor told me to keep an eye on my heart with the help of DiY toolkit BITalino, and I wrote about it in Why my doctor prescribed me open hardware. Although I could keep slapping a bunch of cables and a PCB on me every day (Figure 1), miniaturized physiological computing devices are pretty fun to build and play with—at least for me—so I decided to make myself something more practical.
read more
Can Wikipedia Survive?
One of the biggest threats it faces is the rise of smartphones as the dominant personal computing device. A recent Pew Research Center report found that 39 of the top 50 news sites received more traffic from mobile devices than from desktop and laptop computers, sales of which have declined for years.
Attack Gave Chinese Hackers Privileged Access to U.S. Systems
Undetected for nearly a year, the Chinese intruders executed a sophisticated attack that gave them “administrator privileges” into the computer networks at the Office of Personnel Management, mimicking the credentials of people who run the agency’s systems, two senior administration officials said. The hackers began siphoning out a rush of data after constructing what amounted to an electronic pipeline that led back to China...
OSVR supports Android, Linux gaming at E3, and more
Hello, open gaming fans! In this week's edition, we take a look at OSVR's support of Android, Linux games at E3, and more!
Linux Security The Complete Manual, on sale now!
Learn how to keep your system and your online life as secure and private as possible with our digital special.
Wireless media streaming speaker has Android touchscreen
Zettaly’s portable, “Avy” wireless speaker runs Android 4.4 and features a 7-inch touchscreen, 10W speakers, a web cam, and up to 40GB of storage.
Run Linux in the AWS cloud
Power up your own virtual Linux instance on EC2 and run it free for a year.
LinkedIn and Facebook tools, IBM boosts Apache Spark, and more open source news
In this week's edition of our open source news roundup, we take a look at LinkedIn and Facebook open sourcing tools, IBM giving Apache Spark a boost, and more!
Reddit to Move to HTTPS-Only
In the two years since the details of the NSA's deep penetration of the Internet infrastructure began to emerge, there has been a major movement afoot among Web companies to encrypt more and more of their resources and services. The latest large property to make this move is Reddit, which by the end of the month will move to an HTTPS-only model for its sites.
Top 10 botnet targets in the U.S. and worldwide
Every day, the security team at network services provider Level 3 Communications monitors approximately 1.3 billion security events; mitigates roughly 22 distributed denial of service (DDoS) attacks; and removes, on average, one control and command (C2) server network.
Top 5: Docker contributions, DevOps is 10% tech, and more
This week, we highlight NY State's open data portal, how to be a Docker contributor, an exclusive interview with Robyn Bergeron of Elastic, the latest release of Blender and it's cool new features, and and interview with Jen Krieger, an Agile coach at Red Hat.
« Previous ( 1 ... 963 964 965 966 967 968 969 970 971 972 973 ... 1176 ) Next »