Language Selection

English French German Italian Portuguese Spanish

Leftovers: OSS

Filed under
OSS
  • MAME is now free as well as free of charge

    MAME, the arcade emulator originally created by Nicola Salmora 19 years ago, is now comprised entirely of free and open-source software. It's taken a lot of wrangling, reports MAMEDev.org, due to the large number of contributors and interlinked components.

  • After 19 Years, MAME Goes Open Source

    The MAME Team has announced that after 19 years – MAME (Multiple Arcade Machine Emulator) has gone open source.

    The arcade emulator is now available under an OSI-compliant and FSF-approved license. This means the source code for the long-running emulator is readily available to fans – you’ll now be able to modify, utilize, and distribute it for a variety of purposes.

  • Machine Learning for Hackers with Debian and Ubuntu

    Data Science and Machine Learning are hot topics at the moment. Many people are considering how to extend their skills into these areas and many solutions have appeared, including full online degrees, free online courses combined with free software and for those who prefer hard copy, a staggering choice of books on the topic.

  • Machine Learning and Open Source: What You Need to Know Now

    The basic goal with most machine learning tools is to take a vast quantity of data and reduce it to manageable, actionable insights. Now, some of the biggest tech companies are putting the tools in place to let the community advance these efforts. Expect much more in this space as 2016 continues.

  • Serro unveils new open source SDN framework, AuSM

    Serro Solutions, a San Francisco-based technology services firm, has made its new SDN framework open source. Automated Service Manager, or AuSM, is aimed at connecting network tools via API. AuSM creates a single platform from which users can write unified business policies and implement them consistently across data center networks, WANs and storage systems.

  • The One thing you can do to Ensure Success in Open Source Deployments

    What is it about an Open source project that gets business excited? and more importantly, is - ROI- under the hype?

    The primary reason most enterprises focus on Open source solutions is the potential cost savings. This is followed closely by the abilityto fix or modify the technology to something specific for the business, without having to wait for enterprise software updates. Thereare more Open source middleware products, such as Infrastructure-as-a-Service (IaaS) offerings and application development frameworks, with the ability to change out an underlying, closed source vendor.

  • HFOSS: Quiz #1

    In the Humanitarian Free and Open Source Software Development (HFOSS) course at the Rochester Institute of Technology, quizzes are in the form of blog posts submitted during the class period. The room stays quiet, but it is an open IRC quiz, so many of the students collaborated with each other in #rit-foss on freenode for the quiz.

  • VoIP Supply Bolsters its PBX Appliances via Three Open-Source Models
  • NFV/SDN Reality Check: DDoS attack security for NFV- and SDN-powered networks – Episode 49
  • DDoS attack security for NFV- and SDN-powered networks
  • OPNFV Unveils Second Release of Open-Source NFV Platform

    "Brahmaputra" brings a range of new features that come from collaboration with other projects, including OpenDaylight and OpenStack.

    The industry consortium developing an open-source platform for network-functions virtualization is unveiling the second release of its software, which not only brings an array of new features and use cases but also is an indication of the growing maturity of the group.

  • Chrome 49 released to stable channel, smooth scrolling now enabled by default
  • Taint Tracking for Chromium

    For future work in the Web context, the approach presented here can be made compatible with server-side taint tracking to persist taint information beyond the lifetime of a Web page. A server-side Web application could transmit taint information for the strings it sends so that the client could mark those strings as tainted. Following that idea it should be possible to defeat other types of XSS. Other areas of work are the representation of information about the data flows in order to help developers to secure their applications. We already receive a report in the form of structured information about the blocked code generation. If that information was enriched and presented in an appealing way, application developers could use that to understand why their application is vulnerable and when it is secure. In a similar vein, witness inputs need to be generated for a malicious data flow in order to assert that code is vulnerable. If these witness inputs were generated live while browsing a Web site, a developer could more easily assess the severity and address the issues arising from DOM-based XSS.

  • ODPi: The Open Ecosystem of Big Data - Update and Next Steps
  • Heavy-Hitting Keynote Speakers Head for Upcoming Big Data Conferences

    With Big Data much in the news, some notable conferences are taking shape, and they include opportunities to hear from some of the most advanced users of tools such as Hadoop and Apache Spark. The Linux Foundation, has announced the keynote speakers and program for Apache: Big Data, taking place May 9-12, in Vancouver, British Columbia. Meanwhile, on 21 and 22 June at Hotel ICON in Hong Kong, Marketing magazine is hosting a two-day conference offering insights into Big Data and marketing practices.

  • The Linux Foundation Announces Keynote Speakers for Apache: Big Data
  • Perforce 'swarms' into Slack comms

    The new open source Slack integration plugin is available now for the latest version of Helix Swarm. Developers can contribute to its ongoing development, along with many other open source projects.

  • LinkedIn open sources WhereHows metadata management tool
  • LinkedIn Open Sources Data Discovery Portal WhereHows
  • LinkedIn Makes Its WhereHows Data Manager Open Source

    LinkedIn couldn't find a data set tracker to match all the data sets it was creating, so it invented one, WhereHows

  • Open Source on another level

    BrewDog, a UK brewery which soon celebrates its tenth anniversary, has decided to “open source” all of their 215 beer recipes. From their original and still extremely popular (and tasty) beer “PUNK IPA“, moving on to “Hops Kill Nazis“, “Doodlebug” and finally arriving at their latest “Jet Black Heart” which was first brewed last month (!)

  • Raspberry Pi 3, Linux Mint security breach, Google data processing for the Zika virus, and more
  • This Open Source Script Lets You (and Police) Search Twitter For Guns

    It’s now possible to do both of these things, thanks to a free, open-source tool designed by security researcher Justin Seitz as a part of his larger open-source intelligence project.

  • Open Source Textbooks and Resources Are Poised to Transform K-12 Education

    The higher-education community was the first to grasp the potential of open source textbooks, which students can legally access online, download and self-print for free, or have printed on demand at low cost.

More in Tux Machines

9 Top Free and Open Source Elixir Web Frameworks

One of the types of software that’s important for a web developer is the web framework. A framework “is a code library that makes a developer’s life easier when building reliable, scalable, and maintainable web applications” by providing reusable code or extensions for common operations. By saving development time, developers can concentrate on application logic rather than mundane elements. A web framework offers the developer a choice about how to solve a specific problem. By using a framework, a developer lets the framework control portions of their application. While it’s perfectly possible to code a web application without using a framework, it’s more practical to use one. Read more

Games: Valve, Kingdoms and Castles, and a Lot More

today's howtos

  • How to Install and Configure HAProxy on Ubuntu 22.04

    In this post, we will demonstrate how to install HAProxy on Ubuntu 22.04 (Jammy Jellyfish) step by step. We will later configure it to act as a load balancer by distributing incoming requests between two web servers.

    HaProxy, short for High Availability Proxy, is a free and open-source HTTP load balancer and reverse-proxy solution that is widely used to provide high availability to web applications and guarantee maximum possible uptime.

  • How to use DNF Software Package Manager with Examples - TREND OCEANS

    The dandified yum (DNF) command is the next-generation version of the YUM package manager for Fedora, CentOS, AlmaLinux, and other RHEL-based distributions. This command was first implemented after the Fedora 22, CentOS 8, and RHEL 8 release. The launch was to remove the bottleneck involved in the YUM command.

  • How to Install FFmpeg on CentOS 9 Stream

    FFmpeg is the leading free, open-source multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter, and play nearly all multimedia files that have been created on any platform. FFmpeg compiles and runs on Linux, Mac OS X, Microsoft Windows, BSD systems, and Solaris. The following tutorial will teach you how to install FFmpeg on CentOS 9 Stream using the RPM Fusion free repository command line terminal.

  • How to Install ClamAV on Arch Linux

    ClamAV is an open-source and free antivirus toolkit that detects many types of malicious software, including viruses, trojans, malware, adware, rootkits, and other malicious threats. One of its primary uses of ClamAV is on mail servers as a server-side email virus scanner or file hosting servers to periodically scan to ensure files are clean, especially if the public can upload to the server. ClamAV supports multiple file formats (documents, executables, or archives), utilizes multi-thread scanner features, and receives updates for its signature database daily to sometimes numerous times per day for the latest protection. The following tutorial will teach you how to configure ClamAV on Arch Linux desktop or server and some basic scan commands using the command line terminal.

  • Linux su vs sudo: what's the difference? | Opensource.com

    Both the su and the sudo commands allow users to perform system administration tasks that are not permitted for non-privileged users—that is, everyone but the root user. Some people prefer the sudo command: For example, Seth Kenlon recently published "5 reasons to use sudo on Linux", in which he extols its many virtues. I, on the other hand, am partial to the su command and prefer it to sudo for most of the system administration work I do. In this article, I compare the two commands and explain why I prefer su over sudo but still use both.

today's howtos

  • A Detailed Guide on How to Work with Documents in Nextcloud

    Nextcloud is an open-source content collaboration platform that makes it possible to create secure file storage with sharing and synchronization features. It’s not too much to say that Nextcloud is an ideal solution for file management, as this platform allows you to share files and folders on your computer, and instantly synchronize them with your Nextcloud server.

  • How to Reset Forgotten Root Password in Fedora

    The only way any Linux user can boldly claim to have full control of their operating system environment is if they can be identified as root or Sudoer users.

  • How to Change the Default Interface in Linux?

    “Almost everything productive we can do in Linux requires us to have a network connection. Whether developing apps, installing software, scripting, sharing files, or even watching movies, we need a working network connection. Hence, “I require a network connection” is simply an understatement. The only way to enable network connection on a machine is through a network interface. A network interface is a device or a point of connection between a device and a private or public network. In most cases, a network interface is a physical card such as a wireless adapter, a network card, etc. However, this does not necessarily mean that a network interface should be a physical device. For example, a loopback adapter that is not physically visible is implemented by software and available on all devices.” This quick tutorial will show you how to set the default interface in Linux.

  • CoreOS in VirtualBox

    Three Fedora CoreOS (FCOS) update streams are available: stable, testing, and next. In general, you will want to use stable, but it is recommended to run some machines on testing and next and provide feedback. Each stream has a canonical URL representing its current state in JSON format, known as “stream metadata.” For example, the stream metadata URL for stable is: https://builds.coreos.fedoraproject.org/streams/stable.json For automating Fedora CoreOS installations, it is expected that you will interact with stream metadata. While Fedora CoreOS does automatic in-place updates, it is generally a good practice to start provisioning new machines from the latest images.