Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc
  • Wine Announcement

    The Wine development release 1.9.2 is now available.

  • Containers: 3 big myths

    You’ll see the likes of Mesosphere, or Docker Swarm, say, ‘we can deploy ten thousand containers in like thirty seconds’ – and similar claims. Well, that’s a really synthetic test: these kinds of numbers are 100% hype. In the real world such a capacity is pretty much useless. No one cares about deploying ten thousands little apps that do literally nothing, that just go ‘hello world.’

    The tricky bit with containers is actually linking them together. When you start with static hosts, or even VMs, they don’t change very often, so you don’t realise how much interconnection there is between your different applications. When you destroy and recreate your applications in their entirety via containers, you discover that you actually have to recreate all that plumbing on the fly and automate that and make it more agile. That can catch you by surprise if you don’t know about it ahead of time.

  • GNOME 3.19.4 Released For A Fresh Look At The Work For GNOME 3.20
  • SUSE Survey Finds There Just Aren't Enough OpenStack Skills to Go Around

    There is brand new evidence that a lack of workers with OpenStack skills may be holding the cloud platform back, especially at enterprises. SUSE LLC’s survey on OpenStack adoption trends reports that over eighty percent of enterprises are either planning to, or have already, implemented OpenStack as a cloud computing solution within their organizations. That means the need and desire is there. However, more than half of all organizations that have tried to deploy OpenStack say they’ve failed to do so due to a lack of skills.

    Here is more on the findings, and our latest review of quick ways to pick up OpenStack skills.

  • Red Hat, Inc. Price Target Update

    The mean short term price target for Red Hat, Inc. (NYSE:RHT) has been established at $89.12 per share. The higher price target estimate is at $97 and the lower price target estimate is expected at $75 according to 17 Analyst. The stock price is expected to vary based on the estimate which is suggested by the standard deviation value of $6.46

  • Are you a Fedora Women? Then Let us Know!

    It’s no secret that female presence has always been there, but most of the times we don’t know due a lack of info. Several years ago a Wiki page started where the idea was to have a list of those Women who can provide advice and help to those new young contributors starting on our community.

  • Mini PC invasion: These radically tiny computers fit in the palm of your hand

    Computers have been shrinking for years, and the revolution has only accelerated in recent times. As chipmakers focus on creating processors that sip power without sacrificing performance, thermal concerns have largely been alleviated in modern CPUs. Because of that, today’s pint-sized PCs offer enough performance to play HD video and satisfy Office jockeys, the opposite of the janky, compromised experience of yesteryear’s microcomputers.

  • Linux malware: Second screen-grabbing Trojan surfaces in space of a week

    Researchers have found Linux malware that appears to target a particular brand of Bitcoin ATM but works "just fine" on Ubuntu.

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud