Showing headlines posted by bob
« Previous ( 1 ... 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 ... 1207 ) Next »Purdue, Red Hat Collaborating
Purdue University and Red Hat Inc., the world's leading open-source solutions, are collaborating to create a two-year doctoral research position for Discovery Park's Research Center for Open Digital Innovation.
Raspberry Pi Model B+ price drops to $25
The RPi Foundation announced a $10 price cut for the Raspberry Pi Model B+ and launched a “Sense HAT” add-on. Meanwhile, Pi competition continues to emerge.
RTFM? How to write a manual worth reading
Definition: RTFM (Read The F'ing Manual). Occasionally it is ironically rendered as Read The Fine Manual, a phrase uttered at people who have asked a question that we, the enlightened, feel is beneath our dignity to answer, but not beneath our dignity to use as an opportunity to squish a newbie's ego.
read more
Using Hiera with Puppet
With Hiera, you can externalize your systems' configuration data and
easily understand how those values are assigned to your servers. With
that data separated from your Puppet code, you then can encrypt sensitive
values, such as passwords and keys.
Dedicated to documentation (a call for proposals)
Nobody appreciates good documentation. Instead, good documentation is simply there, existing, answering questions, solving problems, and quietly serving its purpose. The bad—or the complete lack of—documentation, on the other hand, you notice.
read more
Oracle proposes to deliver of Java 9 SDK on September 22nd, 2016
Oracle's chief architect of the Java Platform Group, Mark Reinhold, has outlined a “proposed schedule for JDK 9” that will see it delivered on Thursday, September 22nd, 2016.
Tor Cloud Shut Down Amid Lack of Support
The Tor Project has shuttered its cloud proxy service citing security vulnerabilities, usability bugs and a lack of resources. Tor offers its users the capacity to surf the Web anonymously, bouncing traffic through a series of relay servers so that no observer at any point can tell where that user's traffic is traveling to or coming from.
Why tools like Docker, Vagrant, and Ansible are hotter than ever
The complexity of application stacks keeps going up. Way, way up. Application stacks have always been complicated, but never like this. There are so many services, so many tools, so much more compute power available, so many new techniques to try, and always the desire, and the pressure, to solve problems in newer and cooler and more elegant ways.
3 big lessons I learned from running an open source company
It all sounds so straightforward: Put your code up on GitHub or start/join a project at the Apache Software Foundation (ASF), build a community of like-minded individuals, start a company, take in some funding, and then IPO. Or maybe not.
Elasticsearch Honeypot Snares 8,000 Attacks Against RCE Vulnerability
Hackers have taken an interest in Elasticsearch, a popular enterprise search engine. A researcher based in Texas, whose own Elasticsearch server was hacked, today published results collated from a honeypot he built to get a sense of how widespread attacks are against the vulnerability that did in his server.
For Venom security flaw, the fix is in: Patch your VM today
Don't think you're vulnerable? You might want to double check that.
Samsung taps Yocto for dual- and octa-core IoT modules
Samsung unveiled a series of IoT-focused “Artik” SoCs and modules, including dual- and octa-core COMs that integrate wireless radios and run Yocto Linux. After Samsung acquired home automation hub vendor SmartThings, we imagined it would quickly convert the RTOS-based system to Tizen Linux. Instead the Gen 2 SmartThings hub announced in January ran another Linux […]
Canonical tips Snappy projects involving Acer, GE, Microsoft
Canonical announced collaborative, cloud-oriented IoT projects using the lightweight Ubuntu Snappy OS with Acer (aBeing One), GE (ChillHub), and Microsoft. In January, When Canonical announced its lightweight, IoT-oriented Snappy version of its Ubuntu Core OS, it was revealed that Snappy was baked into the Ninja Sphere home automation hub, as well as a special version […]
News: Linux Top 3: Tails 1.4, 4MLinux 12 and TinyCore Linux 6.2
Minor updates abound for interesting distros
Practical Python programming for non-engineers
"Learn to code" is the new mantra for the 21st century. What’s often lost in that statement is exactly what makes programming so useful if you’re not planning to switch careers and become a software engineer. Just because we’re surrounded by computers doesn’t mean the average person needs to be able to reprogram their smart fridge.
read more
Communication is the key to herding cats
John Dickinson is Director of Technology at SwiftStack and Program Team Lead (PTL) of the OpenStack Swift project. Last year, he gave us an update on Swift's progress with Storage policies: Coming to an OpenStack Swift cluster near you for Opensource.com. In this follow up interview, John offers tips for improving community collaboration on open source projects, and gives us a preview of his upcoming OpenStack Summit talk.
read more
The best way to protect passwords may be creating fake ones
Password managers are a great way to supply random, unique passwords to a high number of websites. But most still have an Achilles’ heel: Usually, a single master password unlocks the entire vault.
MIPS-based Linux hacker SBC gets squared
Imagination released a new version of its MIPS-based Creator CI20 hacker board with a squared-off design, better WiFi, and a built-in FlowCloud IoT API.
How to install Tonido private cloud server on Ubuntu Linux
Tonido is a free application that allows you to access files on your computer from a web browser, from your handheld or any DLNA capable device. The Tonido server enables you to sync files between different devices and to share them securely with your friends so you have a private and secure Cloud. This tutorial is about installing Tonido server on Ubuntu Linux.
Urgent Kernel Patch for Ubuntu
Linux is engineered with security in mind. In fact, the most fundamental security mechanisms are built right in to the kernel itself, which makes it extremely hard for malicious code to bypass.
« Previous ( 1 ... 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 ... 1207 ) Next »