Language Selection

English French German Italian Portuguese Spanish

Openwashing and Microsoft Traps

Filed under
Microsoft
OSS
  • Facebook Open-Sources PySlowFast Codebase for Video Understanding

    PySlowFast will enable researchers to easily reproduce video classification and action detection algorithms, whether they are basic or cutting-edge. FAIR has also open-sourced a number of pretrained models to save researchers the trouble of repeatedly training sessions.

  • Deep Dive: How Open Source ID Solutions Can Accelerate Digital ID Implementation

    Digital identity solutions are becoming increasingly necessary as the world’s population grows. An estimated 1.1 billion people worldwide lack basic ID credentials, according to the World Bank, and that number rises even higher when it includes individuals with poor-quality IDs that cannot be easily verified. Those without access to verifiable credentials are often restricted from obtaining vital services like education and healthcare.

  • Clever LVL Panel Connection Method Wins Open Source Wood Challenge
  • A-COLD-WALL* Launches "Open-Source" Hardware Package

    The idea behind this release is similar to the concept of the exhibition, with open-source design a new focus for Samuel Ross and his label. A-COLD-WALL*’s statement continues, “Open-source as a philosophy brings forth conscious brand values that have the capacity to directly enhance interaction between individual and brand.”

    [...]

    The capsule features a range of buckles, branded badges, zip pullers, elastic drawcords and silicone cord stoppers, with silicone, nylon and metal used on different pieces. The full hardware package is available now from the A-COLD-WALL* web store, with prices ranging from £20 GBP ($26 USD) for some zip pullers to £30 GBP ($40 USD) for laser-engraved matt buckles.

  • Lyft Open Sources It's Cloud-Native Machine Learning Model 'Flyte'
  • Lyft open sources data orchestration platform Flyte

    Uber recently open-sourced its Manifold deep learning debugging tool and has a history of pushing its technology out into the public domain from platforms for training conversational AI and machine learning to autonomous vehicle visualization systems.

  • Meet Manifold: Uber's machine learning model debugging tool goes open source

    Manifold, Uber’s model-agnostic visual debugging tool for machine learning, is now open source and available as a demo version and a GitHub repository. Manifold is built with TensorFlow.js, React, and Redux and is part of the Michelangelo machine learning platform. The open source version includes a few new features that will make for an easier user experience.

  • What Can Happen When Your Company's Employees Embrace the Open Source Way?

    A recent Forbes article indicates that corporate engagement with open source communities has grown to become a strategic imperative over the past couple of decades. An increasing number of companies are paying their employees to contribute to such communities. This is one manifestation of a broader growing trend toward closer collaboration between companies and open source communities. Well-recognised companies such as Google, Uber, Facebook, and Twitter have open sourced their projects and encouraged their employees to contribute to open source communities. Among software developers who contribute to such communities, estimates suggest that up to 40% of them are paid by their company to do so. Some companies see this as an opportunity to enhance their employees’ skills while others aim to influence open source product development to support their own complementary products and services. Regardless of the motives, managers should consider the impact of such arrangements on the employees involved.

  • Tier IV and DeepMap Establish Technology Alliance

    Tier IV, a deep-tech startup based in Japan, is leading the development of the world's first open-source software for autonomous driving, known as Autoware.

    Autoware is an all-in-one self-driving car solution that integrates open source and BSD licenses. The solution supports tasks such as 3D localization and mapping, 3D road planning, subject and traffic signal detection, lane recognition, sensor calibration, and software simulation.

  • The Continuous Delivery Foundation advances CI/CD

    More organizations have matured from CI to CI/CD, but their paths differ as do their pipelines and results. Most enterprises are implementing a mix of open source, commercial and even home-grown tools, and they’re looking for answers.

    One place to look is the Continuous Delivery Foundation (CDF) which is home to many of the fastest-growing CI/CD open-source projects. The CDF fosters vendor-neutral collaboration among developers, end users and vendors to further best practices and industry specifications. DeployHub CEO and co-founder Tracy Ragan, who serves as the CDF general membership board representative, provides additional insight in this Q&A.

  • Continuous Delivery Foundation looks to build in Microsoft, further projects

    The Continuous Delivery Foundation is looking to draw in more members and projects as it heads towards its first birthday, with Microsoft top of the organisation’s hit list.

    The CDF formed back in March 2019, aiming to evangelize CI/CD as methodologies, and define/document best practices in and out of the cloud. Founder members included CloudBees and Google – it is home to the original Jenkins project, and Jenkins X, the Kubernetes-focused CI/CD platform, as well as the Google spawned Tekton.

More in Tux Machines

How to create bootable Ubuntu 20.04 on windows 10

I think so; a few weeks back, I was doing something on my Ubuntu 20.04. Suddenly my friend knocks on my door, and he was curiously peeking on my laptop screen. I asked what happen, Benhur? Benhur replied, what are you doing on your laptop, It is totally different from my laptop screen, and It fascinated me. Will you tell me what it is? Read more

Audio/Video: LHS, Going Linux, and DistroTube

  • LHS Episode #388: The Weekender LXIV

    It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

  • Going Linux · Shownotes

    We are pleased to say we are in an excellent place with music streaming on Linux. For the most part all of the services we reviewed worked really well.

  • "Hey, DT. Why LibreOffice Instead Of OpenOffice?" Plus Other Questions.

Security Leftovers

  • Oh, the Irony! Chrome is Blocking Security Tool Nmap Downloads Considering it a Security Threat

    Nmap is a popular open-source tool created by Gordon Lyon used by security experts and network admins to analyze the network, find exploits, and keep it secure. However, it seems that for a day at least, Google Chrome blocked all Nmap downloads using its Safe Browsing service by labelling it as a threat. Even though this has been fixed quickly. For many visitors trying to download the tool, this must have been confusing. A software that’s more than a decade old is now suddenly considered as a threat?

  • Logging as a service isn't SIEM -- so what is it?

    Log management software is often confused or conflated with security information event management (SIEM) software. Both monitor and analyze system and application data, so vendors often blur the lines between the two categories, with many SIEM products including a log management module. Conversely, some log management vendors also have SIEM offerings that work with or supplement their logging products. The primary distinction between log management and SIEM is focus. SIEM tools prioritize data and metrics relevant to security, not the totality of an environment's system, user and application log output. Log management software and services provide a scalable, holistic platform to collect, manage, archive and analyze all of an IT environment's log output -- on premises and in the cloud.

  • Laptops given to British schools came preloaded with malware and talked to Russia when booted [iophk: Windows TCO]

    These devices have shipped over the past three to four weeks, though it is unclear how many of them are infected. One source at a school told The Register that the machines in question seemed to have been manufactured in late 2019 and appeared to have had their DfE-specified software installed last year.

  • Democrats seek answers on impact of Russian cyberattack on Justice Department, Courts [iophk: Windows TCO]

    The senators’ concerns come weeks after both the Justice Department and the U.S. Courts reported that they had been among the federal agencies compromised by the Russian attack on SolarWinds, which was uncovered in December but had been ongoing for more than a year.

    In a statement earlier this month, a DOJ spokesperson said around 3 percent of the agency’s employee email accounts had been “potentially accessed” as part of the breach, but that there was “no indication that any classified systems were accessed.” DOJ has more than 100,000 employees.

    The federal judiciary confirmed it was breached the same week as DOJ, noting in a statement that the AO’s Case Management/Electronic Files system had suffered an “apparent compromise,” with new procedures immediately put in place to file sensitive court documents.

  • Biden inherited one of the worst [cracks] in history. How will his administration respond?

    But that's the easy part. The SolarWinds [attack] — named for the Texas software company that Russia [cracked] in order to gain access to tens of thousands of its customers, many of them American businesses and federal agencies — ran undetected for at least nine months, siphoning off private information before it was discovered in December.

    At least five federal agencies have admitted they were affected. Several others have so far refused to comment. Few private companies have admitted to being victims, but experts say the working assumption is the number is in the hundreds.

    That's left cybersecurity experts with the labor-intensive task of combing through sensitive networks.

Android Leftovers