Language Selection

English French German Italian Portuguese Spanish

13 Best Free and Open Source Build Systems

Filed under
Software

Build automation is the process of automating the creation of a software build and the associated processes including: compiling computer source code into binary code, packaging binary code, and running automated tests.

This type of software takes as input the interdependencies of files (typically source code and output executables) and orchestrates building them, quickly.

In the beginning, Make was the only build automation tool available beyond home-grown solutions. Make has been around since 1976. Make remains widely used, especially in Unix and Unix-like operating systems. But there are lots of other high quality build systems

Here’s our recommendations captured in a legendary LinuxLinks chart.

Read more

More in Tux Machines

Android Leftovers

Redis vs. MongoDB: What you need to know

Databases are garnering a lot of popularity every day and are used by many organizations for a wide variety of use cases. Many organizations are employing innovative techniques to handle their data storage. These companies often shift between databases to optimize their storage and data mapping according to their business needs. Companies with growing data requirements utilize databases with dynamic functionalities. However, deciding which database is perfect for each of these companies can be very subjective. When it comes to database management, choosing between Redis and MongoDB can be relatively challenging. Read more

FSF expands process for associate members to nominate new members of the board

The board of the Free Software Foundation (FSF) announced today that associate members of the FSF will be able to nominate and evaluate candidates for the nonprofit's board of directors for the first time in the organization's 37-year history. FSF currently has just over 5,000 associate members. Under new procedures adopted by the FSF board on January 17 and summarized here, the organization will proactively engage associate members with a sufficient history of association with the FSF in the recruiting process by inviting them to suggest board nominees and then research collectively those nominees' suitability for a position on the board, including most importantly their record of commitment to free software ideals. The new community engagement process is a key result of a six-month consultant-led review designed to help make FSF governance and recruitment practices more transparent and participatory, while more systematically ensuring their commitment to the FSF's values and principles. Read more

Security Leftovers

  • White House Meeting Explores Ways to Secure Software Supply Chain

    The path forward will require collaboration from companies and organizations that consume and ship open source software, said Joe Brockmeier, Vice President Marketing & Publicity at Apache Software Foundation. “There's no single "silver bullet" to get there, and it will take all of our organizations working together to improve the open source supply chain.”

  • CISA Adds 13 Known Exploited Vulnerabilities to Catalog | CISA

    CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

  • CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

    In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats.

  • Linux Lock Screen Policy Enables Consistent Device Governance

    Every operating system should have security controls deployed, and Linux is no exception. Having a lock screen policy is even more of a consideration with a remote workforce where team members could be using a local coffee shop or other unsecured locations as an “office,” which increases the odds that bad actors could obtain physical access to devices. JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet, providing consistent governance and a scalable method for a secure OS configuration.

  • Oracle Releases January 2022 Critical Patch Update

    Oracle has released its Critical Patch Update for January 2022 to address 497 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.