Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 ... 7359 ) Next »
Automotive Grade Linux Moves to UCB 4.0, Launches Virtualization Workgroup
The Linux Foundation’s Automotive Grade Linux (AGL) project released Unified Code Base (UCB) 4.0 (“Daring Dab”) for Linux-based in-vehicle infotainment (IVI) systems, and added seven new members. The open source group also launched a new virtualization working group that will enable new UCB profiles for telematics, instrument clusters, and head-up-displays (HUDs). In other Linux automotive news, Ubuntu has been spotted in an Uber self-driving car trial (see below).
PiCluster brings better container management for Docker deployments
Linux Toys has announced PiCluster 2.0. The new version of the open source container management tool is written in Node.js and is designed to deliver an upgraded experience through cleaner CSS and JQuery dialogue windows.
Linux kernel hardners Grsecurity sue open source's Bruce Perens
In late June, noted open-source programmer Bruce Perens warned that using Grsecurity's Linux kernel security could invite legal trouble. "As a customer, it’s my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity," Perens wrote on his blog. The following month, Perens was invited to court. Grsecurity sued the open-source doyen, his web host, and as-yet-unidentified defendants who may helped him draft that post, for defamation and business interference.
Data Analytics with Elasticsearch and Scylla
The combination of a database and full-text search analytics becomes unavoidable these days. In this blog post, I will demonstrate a simple way to analyze data from a database with analytics software by using Scylla and Elasticsearch together to perform a simple data mining exercise that gathers data from Twitter.
How to manage multiple hybrid cloud vendors: 8 tips
Vendor management has long been an important – if a tad unglamorous – need in IT shops. That proves even more true in the hybrid cloud era. Hybrid cloud models, especially in concert with a multi-cloud strategy, entail working with multiple offerings and vendors.
Everything You Should Know About Using AppImage to Install Software in Linux
This tutorial shows you what is an AppImage and how to use AppImage to install applications in Linux. In addition to that, it also tells you a few things that you should keep in mind while using AppImage.
How to Write iptables Rules for IPv6
We US-ians have been sheltered from the exhaustion of IPv4 addresses, but they have run out. IPv6 networks are up and running, so we have no excuses for not being IPv6 literate. Today our scintillating topic is iptables rules for IPv6, because, I am sad to report, our faithful IPv4 iptables rules do not magically work on IPv6 packets, and we must write new rules.
What's New in RHEL 7.4
These days when a new version of an operating system is released, there's usually not a lot of gee-whiz new whistles and bells to make the front office folks salivate -- especially if it's a point release. But there are still plenty of new features to make DevOps folks happy -- nuts and bolts stuff that makes everybody's life easier.
Automotive Grade Linux releases UCB 4.0 and taps virtualization tech
The AGL project released UCB 4.0 with new SmartDeviceLink support, and Ubuntu was spotted in an Uber self-driving trial. The Linux Foundation’s Automotive Grade Linux (AGL) project released Unified Code Base (UCB) 4.0 (“Daring Dab”) for Linux-based in-vehicle infotainment (IVI) systems, and added seven new members. The open source group also launched a virtualization working […]
Sparking change with less pain: An open approach
Throughout the last decade, we've been undergoing rapid change in the way we deliver services, conduct our business, share our lives on social media, and use digital technology to engage with one another globally. Let's talk about a short list that is now our norm: digital media consumption, on-demand entertainment, self-driving cars, augmented reality, credit card chips, smart phones, smart wearables, and even drone delivery for your "I can't wait" items. We can even create organs on a 3D printer—total sci-fi stuff for anyone born before 1983.
read more
Ghost in the subshell
Using bash pipelines and subshells to improve the performance of bash scripts and increase your bash foo! Bash is a deceptively simply interpreter, seemingly easy to use but harder to master its subtleties. But this is what makes free software so much more fun and intellectually stimulating than stuff rushed out a corporate door with deadlines and minimal viable product mentality.
Cylon – Arch Linux Distribution Maintenance Program/Tool
Cylon is a menu driven small shall script which basically gives you an idea to manage/maintain the Arch Linux and it’s derivatives by offering fourteen categories with variety of applications.
Linux desktop market share hit an all time high in July, according to one measure
Here's a bit of positivity for you today! According to the statistics gathered by the netmarketshare website, in July the percentage of people using Linux on the desktop hit an all time high.
5 ways to use Raspberry Pi in the classroom
I recently finished reading Your Starter Guide to Maker Spaces by Nick Provenzano, a Raspberry Pi Certified Educator. In the book, Nick describes a Raspberry Pi competition at the school where he teaches. Each student received a Raspberry Pi kit and was told to identify a problem, come up with a solution using the Pi, and not spend more than $75 on their project. The students' solutions varied, but the common result was that the students taught themselves to code.
How to Create an Encrypted USB with VeraCrypt
VeraCrypt is a powerful cross-platform tool for encrypting files and drives. Learn how to use it to encrypt your portable USB drives.
AI quickly cooks malware that AV software can't spot
DEF CON Machine-learning tools can create custom malware that defeats antivirus software. In a keynote demonstration at the DEF CON hacking convention Hyrum Anderson, technical director of data science at security shop Endgame, showed off research that his company had done in adapting Elon Musk's OpenAI framework to the task of creating malware that security engines can't spot.
Opposing net neutrality threatens the viability of open source communities
The net neutrality discussion is, at its core, about free speech on the internet. Free speech online is a driving force for the online community; an average of 1.32 billion people each day share their voices on Facebook alone (as of June 2017). It's possible to be heard as well, with more than half of Americans using the internet as their primary source of information.
read more
Security This Week: The Very Best Hacks From Black Hat and Defcon
As they do every year, hackers descended on Las Vegas this week to show off the many ways they can decimate the internet's security systems. Here's a collection of some of our favorite talks from this week's Black Hat conference, including some we didn't get the chance to cover in depth.
12 signs you've been hacked -- and how to fight back
In today's threatscape, anti-malware software provides little peace of mind. In fact, anti-malware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
Bitnami Releases Cabin Mobile Kubernetes Dashboard as Open Source
Bitnami announced on August 1 that it is open sourcing the first mobile app for managing Kubernetes, with the public release of Cabin.
« Previous ( 1 ... 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 ... 7359 ) Next »