Unless the Defense Department and its military components levy increased importance on software development, they risk losing military technical superiority, according to a new report from the Center for a New American Security.
In the report, the Washington, D.C.-based bipartisan think tank argues the Pentagon, which for years has relied heavily on proprietary software systems, “must actively embrace open source software” and buck the status quo.
Currently, DOD uses open source software “infrequently and on an ad hoc basis,” unlike tech companies like Google, Amazon and Facebook that wouldn’t exist without open source software.
I couldn’t agree more with Bill Sourour’s article ‘Copy.Paste.Code?’ which says that copying and pasting code snippets from sources like Google and StackOverflow is fine as long as you understand how they work. However, the same logic can’t be applied to open source code.
When I started open source coding at the tender age of fourteen, I was none the wiser to the pitfalls of copy/pasting open source code. I took it for granted that if a particular snippet performed my desired function, I could just insert it into my code, revelling in the fact that I'd just gotten one step closer to getting my software up and running. Yet, since then, through much trial and error, I’ve learned a thing or two about how to use open source code effectively.
The appeals of Kickstarter campaigns are many. There are the rewards for backers, frequently taking the form of either deep discounts on the final product or unusual items that can’t be found anywhere else. Pledging to support any crowdfunding campaign is a gamble, but it’s an exciting gamble; just browsing Kickstarter is pretty exciting, in fact, especially in the technological categories. Inventive individuals and startups offer new twists on machines like 3D printers and CNC machines – often for much less cost than others on the market.
Much has changed in the telecommunications industry in the years since Standards Development Organization (SDOs) such as 3GPP, ITU and OMA were formed. In the early days of telecom and the Internet, as fundamental technology was being invented, it was imperative for the growth of the new markets that standards were established prior to large-scale deployment of technology and related services. The process for development of these standards followed a traditional "waterfall" approach, which helped to harmonize (sometimes competing) pre-standard technical solutions to market needs.
We usually don't see much of the scammy spam and malware. But that one time we went looking for them, we found a campaign where our OpenBSD greylisting setup was 100% effective in stopping the miscreants' messages.
During August 23rd to August 24th 2016, a spam campaign was executed with what appears to have been a ransomware payload. I had not noticed anything particularly unusual about the bsdly.net and friends setup that morning, but then Xavier Mertens' post at isc.sans.edu Voice Message Notifications Deliver Ransomware caught my attention in the tweetstream, and I decided to have a look.
The Federal Bureau of Investigation has found breaches in Illinois and Arizona's voter registration databases and is urging states to increase computer security ahead of the Nov. 8 presidential election, according to a U.S. official familiar with the probe.
The official, speaking on condition of anonymity, said on Monday that investigators were also seeking evidence of whether other states may have been targeted.
The FBI warning in an Aug. 18 flash alert from the agency's Cyber Division did not identify the intruders or the two states targeted.
Reuters obtained a copy of the document after Yahoo News first reported the story Monday.
We've written probably hundreds of stories on just what a dumb idea electronic voting systems are, highlighting how poorly implemented they are, and how easily hacked. And, yet, despite lots of security experts sounding the alarm over and over again, you still get election officials ridiculously declaring that their own systems are somehow hack proof.
And now, along comes the FBI to alert people that it's discovered at least two state election computer systems have been hacked already, and both by foreign entities.
Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it.
"It" is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.
When it comes to making the shift to network virtualization (NV) and software-defined networking (SDN), one of the approaches gaining momentum is using virtualization technology to build a secure demilitarized zone (DMZ) in the data center.
Historically, there have been two major drawbacks to deploying firewalls as a secure mechanism inside a data center. The first is the impact a physical hardware appliance has on application performance once another network hop gets introduced. The second is the complexity associated with managing the firewall rules.
NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.
Linux has a raft of open source games. The vast majority of these games are atheistically pleasing. Popular games often have full motion video, vector graphics, 3D graphics, realistic 3D rendering, animation, texturing, a physics engine, and much more. Computer graphics have been advancing at a staggering pace. At the current rate of progress, in the next 10 years it may not be possible to distinguish computer graphics from reality.
Early computer games did not have these graphic techniques. The earliest video games were text games or text-based games that used text characters rather than vector or bitmapped graphics.
Text-based games are often forgotten and neglected. However, there are many ASCII gems out there waiting to be explored which are immensely addictive and great fun to play. The developers' works featured in this article focus on content and fun gameplay.
When Red Hat CEO Jim Whitehurst spoke at LinuxCon last week, he hardly mentioned RHEL or the company's stack. Instead, he focused almost entirely on Linux in general and the open source development model in particular. This wasn't a surprise, as there probably isn't an organization on the planet with a deeper understanding of open source methodology and its potential. It's how it built free software into a $2 billion business.
Most people familiar with Red Hat know the company's broader vision for open source -- sometimes referred to as "the open source way" -- goes beyond software, so it also wasn't much of a surprise when Whitehurst's talk strayed from data centers and workstations and into areas not normally associated with IT at all.
Doors have opened on the Ubuntu 16.10 Wallpaper Contest.
Few desktop operating systems offer amateur and professional illustrators, photographers and graphic designers the chance to have their artwork seen by millions of people around the world.
But then, Ubuntu isn’t your average operating system!
Axiomtek’s credit card-sized “CEM300” module runs Linux on Intel Braswell SoCs at 4-6W TDP and offers HD graphics, dual SATA III ports, and four PCIe lanes.
Like Axiomtek’s Atom E3800 “Bay Trail” based CEM846 computer-on-module, its new CEM300 supports Linux and Windows, and uses the 84 x 55mm COM Express Type 10 Mini form factor. The CEM300 advances to 14nm Intel Braswell SoCs, which offer much improved Intel HD Graphics Gen8, while reducing TDPs to a 4W to 6W range. Supported models include the quad-core 1.6GHz (2.4GHz burst) Pentium N3700, the quad-core Celeron N3160, and the dual-core Celeron N3060.
In a nutshell, this rather heated (and at times unnecessarily personal) debate has focused on when is the right time to defend the rights on the GPL. Bradley is of the view that these rights should be intrinsically defended as they are as important (if not more important) than the code. Linus is of the view that the practicalities of the software industry mean sending in the lawyers can potentially have an even more damaging effect as companies will tense up and choose to stay away.
Tetevi Placide Ekon is a graduate student studying civil engineering at the 2iE Institute for Water and Environmental Engineering in Burkina Faso. He was one of 14 aspiring IT professionals to receive a 2016 Linux Foundation Training (LiFT) scholarship, announced this month.
Since receiving his bachelor’s degree in water and environmental engineering and moving onto graduate school, he has nurtured a passion for computer science, and especially open source. Tetevi has completed free courses covering Linux, Apache big data systems and more, and he plans to use this scholarship to pursue more advanced training.
It's looking like the Raspberry Pi Zero might be playing fine out-of-the-box with the upcoming Linux 4.9 kernel cycle.
Eric Anholt posted his weekly VC4 driver status/changes. In there the Intel-turned-Broadcom developer commented, "Finally, I landed Stefan Wahren's Raspberry Pi Zero devicetree for upstream. If nothing goes wrong, the Zero should be supported in 4.9."
With working on some Broadwell-EP Linux comparison benchmarks this weekend, as part of that onslaught of benchmarks I decided to run the CPU-only Caffe build on a few different Intel CPUs. For fun, afterwards I checked to see how the performance compares to Caffe with CUDA+cuDNN on a few Maxwell/Pascal GPUs.
After already making a ton of improvements to the RadeonSI Gallium3D stack this month, Marek Olšák is looking to end the month on a high note with yet more fixes to the open-source AMD driver.
What's more fun than seeing on a Monday morning [PATCH 00/20] Plenty of RadeonSI fixes. The 20 patches take care of a variety of RadeonSI fixes. Marek commented, "This series contains mostly fixes, i.e. for DCC, cubemaps, tessellation, texture views, Gather4, viewport depth range, etc. There are also some new HUD queries."
The open-source HP Linux Imaging and Printing (HPLIP) project has been updated on August 29, 2016, to version 3.16.8, a maintenance update that adds support for new printers and GNU/Linux operating systems.
According to the release notes, HP Linux Imaging and Printing 3.16.8 adds support for new all-in-one HP printers, including HP OfficeJet Pro 6970, HP OfficeJet Pro 6960, HP OfficeJet 250 Mobile, HP DeskJet 3700, as well as HP DeskJet Ink Advantage 3700.
Also new in the HPLIP 3.16.8 update is support for the recently released Linux Mint 18 "Sarah" Cinnamon, MATE, Xfce, and the upcoming KDE editions, the Fedora 24 Linux operating system, as well as the Debian GNU/Linux 8.5 "Jessie" distribution. So if you're using any of these OSes, you can now update to the latest HPLIP release.
The popular, open-source, and cross-platform MPV video player software received a new update, version 0.20.0, which comes only two weeks after the previous 0.19.0 maintenance release.
MPV 0.20.0 is not a major update, and, according to the release notes, it only implements a couple of new options and commands, such as "--video-unscaled=downscale-big" for changing the aspect ratio.
Additionally, the MPlayer-based video playback application also gets the "--image-display-duration" option for controlling the duration of image display, and a new "dcomposition" flag for controlling DirectComposition.
The major FFmpeg 3.1 "Laplace" open-source and cross-platform multimedia framework has received recently its third maintenance update, version 3.1.3, which brings updated components.
FFmpeg 3.1 was announced two months ago, at the end of June, and it introduced a multitude of new features to make the popular multimedia backend even more reliable and handy to game and application developers. Dubbed Laplace, FFmpeg 3.1 is currently the most advanced FFmpeg release, cut from Git master on June 26, 2016.
Version 2.2 of the GNU Scientific Library (GSL) is now available. GSL provides a large collection of routines for numerical computing in C.
This release contains new linear algebra routines (Pivoted and Modified Cholesky, Complete Orthogonal Decomposition, matrix condition number estimation) as well as a completely rewritten nonlinear least squares module, including support for Levenberg-Marquardt, dogleg, double-dogleg, and Steihaug-Toint methods.
The full NEWS file entry is appended below.