Language Selection

English French German Italian Portuguese Spanish

Android Leftovers

More in Tux Machines

OSS: OSI, Cyphon and Swedish e-Krona

     
  • OSI’s Joshua Simmons on the State of Open Source

    OSI’s Joshua Simmons examines the current state of open source in this presentation from the recent State of the Source Summit. Paragraphs In his keynote presentation at the recent State of the Source Summit, Joshua Simmons, President at Open Source Initiative, provided a thoughtful look at the state of open source today, acknowledging strengths and shared history and examining challenges with an eye toward conscious, collaborative improvement. Open source has gone “from fringe to mainstream,” Simmons said, and the ecosystem has understandably undergone many changes. In this moment, he said, open source is being tested, with questions being raised about the sustainability of projects, the health and safety communities, fair treatment of maintainers, and open source’s overall ability to weather attempts at redefinition.  In the talk, Simmons explored various open source narratives, discussed OSI’s role, and described the organization’s 

  • Cyphon: An Open-source Incident Tracking Management System for the Enterprise

    Enterprise and often government are required to handle dozens of incident reporting sources at once, which is not resources or cost-effective at all. Some companies are still using emails, ticket systems, CRMs, or messaging systems for incident reports. To resolve this issue, they need a centralized incident tracking management system and here comes Cyphon. Cyphon is an open-source incident management and response platform. It helps the enterprise to track incident from different sources, prioritize them and automate the response system for them.  

  • Sweden considers open source software for its digital currency proof of concept

    The BIS working paper compares digital currency initiatives by the central banks of China, Sweden, and Canada. Describing the Swedish e-Krona project, “preference will be given to solutions built on open source code,” the paper says. BIS refers to a study by senior advisers working for the Riksbank, published in June.

    The bankers outline their ideas for the e-Krona, which is intended as a complement to cash. They bank prefers an 'open architecture' (see 2018 report on the Riksbank’s e-krona project) but the researchers in June seem to be still undecided on the choice between proprietary or open source technology, listing weaknesses for both. (In the case of proprietary software: IT vendor lock-in, and for open source: the risk of the community being abandoned or the build-up of dependence on open source consultants.)

Mozilla/Firefox/Tor Browser

  • New Release: Tor Browser 10.5a1

    Tor Browser 10.1a1 is now available from the Tor Browser Alpha download page and also from our distribution directory.

    Note: This is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.

  • Karl Dubost: Week notes - 2020 w39 - worklog - A new era

    So the Mozilla Webcompat team is entering a new era. Mike Taylor (by the time this will be published) was the manager of the webcompat team at Mozilla since August 2015. He decided to leave. Monday, September 21 was his last day. We had to file an issue about this. The new interim manager is… well… myself. So last week and this week will be a lot about: * have a better understanding of the tasks and meetings that Mike was attending. * trying to readjust schedules and understanding how to get a bit of sleep with a distributed organization which has most of its meeting toward friendly European and American time zones. Basically, all meetings are outside the reasonable working timeframe (8:00 to 17:00 Japan Time). * trying to figure out how to switch from peer to manager with the other persons in the webcompat team. I want to remove any sources of stress.

  • Mozilla Localization (L10N): L10n Report: September 2020 Edition

Programming Leftovers

  • Code your first algorithm in Scratch

    With more kids learning from home this year, it's important to engage them with unique learning opportunities. The classroom looks very different than it did before, and it's going to continue to evolve. So should the lessons we teach. In the first article in this series, I shared how my students taught me to code. Over the next few weeks, I will be exploring how educators and parents can harness the power of coding to teach kids a wide variety of skills. "But I don't know anything about coding!" you may be shouting at your computer. That's one of the beauties of open source code: everyone is a learner, and everyone is a teacher. Whether you're new to coding or you've been doing it all your life, part of the process is making mistakes. It's all about problem-solving and learning how to find information. The greatest tool an educator has in a coding classroom is the phrase, "I don't know; let's find out together!"

  • 5 questions to ask yourself when writing project documentation

    Before getting down to the actual writing part of documenting another one of your open source projects, and even before interviewing the experts, it's a good idea to answer some high-level questions about your new document. [...] Or, what company is behind the document? What brand identity does it want to convey to its audience? The answer to this question will significantly influence your writing style. The company may also have its own style guide or at least a formal mission statement, in which case, you should start there. If the company is just starting out, you may ask the questions above to the document's owner. As the writer, it's important to integrate the voice and persona you create for the company with your own worldview and beliefs. This will make your writing sound more natural and less like company jargon.

  • 33 Excellent Free Books to Learn all about R

    The R language is the de facto standard among statisticians for the development of statistical software, and is widely used for statistical software development and data analysis. R is a modern dialect of S, one of several statistical programming languages designed at Bell Laboratories. R is much more than a programming language. It’s an interactive suite of software facilities for data manipulation, calculation, and graphical display. R offers a wide variety of statistical (linear and nonlinear modelling, classical statistical tests, time-series analysis, classification, clustering, …) and graphical techniques, and is highly extensible. The ability to download and install R packages is a key factor which makes R an excellent language to learn. What else makes R awesome? Here’s a taster.

  • [Perl] while loops that have an index

    Perl got this syntax that allow to use a while loop without having to explicitly increment an index by doing an i++. It is made possible by the each function.

  • OO linked lists in Perl

    After many days, trying to implement linked lists by nested hash (link to Rosetta Code) (link to my code) or Struct::Dumb, I get how to write the (singly) linked list in object-oriented style by Perl. One with bless, another one with Moose. Keep the learning record here.

  • Find all the prime numbers less than 'n' in O(n) Time complexity

    Our task is to find all the prime numbers that are less than n in Linear Time. We use Sieve of Eratosthenes to find the prime numbers till n. But the time complexity is O(N log (log N)). Here our desired time complexity is O(N). Hence a modified version of the Sieve of Eratosthenes is to be used.

  • PyPy 7.3.2 triple release: python 2.7, 3.6, and 3.7

    The interpreters are based on much the same codebase, thus the multiple release. This is a micro release, all APIs are compatible with the 7.3.0 (Dec 2019) and 7.3.1 (April 2020) releases, but read on to find out what is new. Conda Forge now supports PyPy as a python interpreter. The support is quite complete for linux and macOS. This is the result of a lot of hard work and good will on the part of the Conda Forge team. A big shout out to them for taking this on. Development of PyPy has transitioning to https://foss.heptapod.net/pypy/pypy. This move was covered more extensively in this blog post. We have seen an increase in the number of drive-by contributors who are able to use gitlab + mercurial to create merge requests. The CFFI backend has been updated to version 1.14.2. We recommend using CFFI rather than c-extensions to interact with C, and using cppyy for performant wrapping of C++ code for Python.

Security Leftovers

  • Security updates for Friday

    Security updates have been issued by Debian (rails), openSUSE (chromium, jasper, ovmf, roundcubemail, samba, and singularity), Oracle (firefox), SUSE (bcm43xx-firmware, firefox, libqt5-qtbase, qemu, and tiff), and Ubuntu (aptdaemon, atftp, awl, packagekit, and spip).

  • Foreign Hackers Cripple Texas County’s Email System, Raising Election Security Concerns

    Last week, voters and election administrators who emailed Leanne Jackson, the clerk of rural Hamilton County in central Texas, received bureaucratic-looking replies. “Re: official precinct results,” one subject line read. The text supplied passwords for an attached file.

    But Jackson didn’t send the messages. Instead, they came from Sri Lankan and Congolese email addresses, and they cleverly hid malicious software inside a Microsoft Word attachment. By the time Jackson learned about the forgery, it was too late. Hackers continued to fire off look-alike replies. Jackson’s three-person office, already grappling with the coronavirus pandemic, ground to a near standstill.

  • Windows XP Source Code Reportedly Leaked, Posted to 4chan
  • Windows XP source code leaked online, on 4chan, out of all places
  • [Attacker] Accessed Network of U.S. Agency and Downloaded Data

    An unnamed U.S. federal agency was hit with a cyber-attack after a [attacker] used valid access credentials, authorities said on Thursday.

    While many details of the hack weren’t revealed, federal authorities did divulge that the [attacker] was able to browse directories, copy at least one file and exfiltrate data, according to the Cybersecurity & Infrastructure Security Agency, known as CISA.

    The [attacker] implanted malware that evaded the agency’s protection system and was able to gain access to the network by using valid access credentials for multiple users’ Microsoft 365 accounts and domain administrator accounts, according to authorities.