Showing headlines posted by Scott_Ruecker
« Previous ( 1 ... 127 128 129 130 131 132 133 134 135 136 137 ... 1236 ) Next »Geek Guide: Purpose-Built Linux for Embedded Solutions
The explosive growth of the Internet of Things (IoT) is just one of several trends that is fueling the demand for intelligent devices at the edge. Increasingly, embedded devices use Linux to leverage libraries and code as well as Linux OS expertise to deliver functionality faster, simplify ongoing maintenance, and provide the most flexibility and performance for embedded device developers.
How To Create a Transparent Proxy through the Tor Network to Protect Your Privacy Online with archtorify & kalitorifyhegt/he
With the growing number of espionage scandals in recent years and the prevalence of online tracking, protecting your privacy online has never been more important. Virtually everything we do online is tracked these days, whether for profit or to obtain information to sell to third parties, which has led to the development of tools like the Tor Browser to help us navigate the Internet safely and strengthen our privacy online.
How I scan family photos on Linux
Linux isn't just something that runs on servers and powers the internet. It's a safe place for your data, your family history and memories, working or having fun, and real life.
Broadcom introduces world’s first Wi-Fi 7 chipset solutions
This week Broadcom announced their full end-to-end chipset solutions designed for Wi-Fi 7 applications that range from residential gateways, enterprise access points, client devices to Wi-Fi routers. Broadcom claims that these Wi-Fi 7 chips double the performance of Wi-Fi 6 and 6E solutions commercially available today.
Linux Foundation Events Code of Conduct Transparency Report – 2021 Event Summary
For many of us, it has been several years since we’ve been in conference settings, or around many people at all. As we close in on a broader return to in-person events next month, this is the perfect time to reiterate that our events are gatherings intended for professional networking and collaboration for the open source community, that exist to encourage the open exchange of ideas. Thus, they require an environment that recognizes the inherent worth of every person and group. All event participants, whether they are attending an in-person or a virtual event, are expected to behave in accordance with our Event Code of Conduct. In short: Be kind. Be professional. Treat everyone with respect.
ASRock new series of 4×4 BOX5000 mini-PCs now powered by AMD Zen 3 Ryzen 5000 processors
ASROCK Industrial has recently unveiled three 4X4 BOX-5000 mini PCs(4X4 BOX-5800U, 4X4 BOX-5600U, and 4X4 BOX-5400U) equipped with AMD Zen 3 Ryzen 5000 U-series processors. By using AMD’s Zen 3 architecture, ASRock plans to capture business and home applications such as Kiosks, digital signage and other remote access applications.
More Time on Innovating, Less Time on Compliance
I am old enough to remember when organizations developed software in-house – all of it. I also clearly remember my information systems college professor teaching it is almost always less expensive and better to use code/programs already written and adapting them for your use than to recreate the wheel from scratch.
The Linux Foundation Announces 1st Round of Keynotes Speakers for Open Source Summit North America 2022
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the first round of keynote speakers taking the stage at Open Source Summit North America, June 21-24, in Austin, TX and virtually.
A Rarity in Open Source
About 3 ½ years ago, Sanath Kumar Ramesh and his wife welcomed their son, Raghav, into the world. Like any new parents, he immediately became their everything. And, as new parents do, they threw him a 1st birthday bash where many of their friends and family were meeting Raghav for the first time.
Creator of SSLPing, a free service to check SSL certs, downs tools
A timely reminder is being issued to the effect that free web services are not the same as free software: the creator of the SSLPing service says he can't look after it anymore.
How to Install a CockroachDB Cluster on Debian 11
CockroachDB is an open-source distributed and scalable SQL database for cloud applications. CockroachDB provides next-level consistency, replicated SQL database, and a transactional data store. In this tutorial, we will show you how to install the CockroachDB cluster on Debian 11 server.
Try this open source alternative to Salesforce
CiviCRM is an open source constituent relationship management (CRM) system designed to help you manage information about your organization's contacts, members, donations, and events. It's built specifically for nonprofits, so you won't find yourself having to try to shoehorn your organizational workflow into a business-oriented model (as some find themselves doing when using similar CRMs).
ASRock Industrial release new range of industrial motherboards w/ 12th Gen Intel® Core Processors
The Taiwanese ASRock released a new line of industrial-grade motherboards equipped with Intel’s latest 12th Gen Core Processors (Alder-Lake-S) that feature 16-cores and 24 threads. ASRock expects their high-performance motherboards to be adopted in diverse applications i.e. smart cities, medical, Edge Artificial IoT, factory automation, kiosks, etc.
The path to an open world begins with inclusivity
For the past few weeks, collaborator Brook Manville and I have been offering our thoughts on (and analyses of) Johan Norberg's Open: The Story of Human Progress. My first article simply explained what the author means by the word "open." Thinking alongside Norberg now, I'd like to discuss future ways we might apply open organization principles to bring about prosperous societies globally. Norberg hints at such directions, but I believe further detail is required if we'll be able to set up action plans for the future.
6 reasons this nonprofit chose Backdrop for its open source CMS
Here are some of the deciding factors that the Stuart Center considered as they observed and begun to participate in the Backdrop project.
What do you do when all your source walks out the door?
WHO, ME? Who has got your back up? Forget comments in code, what do you do when all your source has been packed into the trunk of a family sedan? Welcome to Who, Me?
Automate checking for flaws in Python with Thoth
Project Thoth pulls together many open source tools to automate program builds with security checks as part of the resolution process.
Ksplice Known Exploit Detection for VM_IO Use After Free, BPF bounds checking, and more…
This post is part of a regular series on Oracle Ksplice’s Known Exploit Detection. For selected security vulnerabilities, not only will Ksplice fix the code error, Ksplice will also lay down tripwires to detect attempts to exploit those fixed vulnerabilities. Known Exploit Detection allows system administrators to report and alarm on future attempts to exploit that vulnerability even after the system has been patched.
How to use "podman save" to share container images
The `podman save` and `podman load` commands let you share images across multiple servers and systems when they aren’t available locally or remotely. Read More at Enable Sysadmin
The post How to use ‘podman save’ to share container images appeared first on Linux.com.
AI is better with open source
Open Source Software (OSS) is a proven model that delivers tangible benefits to businesses, including improved time-to-market, reduced costs, and increased flexibility. OSS is pervasive in the technology landscape and beyond it, with adoption across multiple industries. In a 2022 survey by Red Hat, 95 percent of IT leaders said they are using open source in their IT infrastructure, which will only increase.
« Previous ( 1 ... 127 128 129 130 131 132 133 134 135 136 137 ... 1236 ) Next »