Language Selection

English French German Italian Portuguese Spanish


New Development with Reiser

Filed under
Reiser Hans Reiser developed a file system a while back, for LInux computers (but in theory useful for other systems as well) which is probably the best file system out there. Hans Reiser has just recently been convicted of murdering his wife. I have two related proposals.

Hans Reiser Offers To Lead Cops to Nina's Body

Filed under
Reiser Hans Reiser, the Linux programmer facing a mandatory 25-to life term for killing his wife, might disclose the location of Nina Reiser's body in exchange for a reduced term, Alameda County District Attorney Thomas Orloff told Threat Level on Friday.

'48 Hours' to focus on Hans Reiser murder trial

Filed under
Reiser A national news show will air an hour program chronicling the murder case and trial of computer programmer Hans Reiser CBS's 48 Hours Mystery is set to air "Betrayal," Tuesday night at 9 p.m. on local channel CBS 5.

ReiserFS Without Hans Reiser, Continued

Filed under
Reiser In my post the other day about whether or not work in the ReiserFS file system would continue after Hans Reiser's murder conviction, I mentioned that this being an open source project, it wouldn't be hard for someone else to pick up where others leave off. And as it turns out, that's precisely what's happening: according to folks on the ReiserFS team, work on ReiserFS will continue.

Also: Threat Level Visits Inmate No. BFPS63 — aka Hans Reiser

Geek of the Month: Hans Reiser

Filed under
Reiser For this April’s “Geek of the Month”, we will give tribute to one of the most controversial free software developer in history. His name is Hans Reiser, and he made headlines just recently.

Reiser FS: The open source file system fallout

Filed under
Reiser Yesterday, the Open Source community took an emotional hit when veteran Linux programmer Hans Reiser was convicted of first degree murder in the suspicious disappearing of his wife, Nina. I would like to talk a little bit about how this verdict will impact the technology in play for file system dominance in our favorite Open Source operating system, Linux.

Also: Was Reiser really found Guilty of being a Hacker?

Reiser Guilty of First Degree Murder

Filed under
Reiser Hans Reiser was found guilty today of first-degree murder. Reiser appeared shocked as the verdict was read, he looked at the crowd and then mumbled to the bailiffs as he was led out of the courtroom.

Verdict in Hans Reiser murder case — and fate of Reiser4 — imminent

Filed under
Reiser As an Alameda County jury continues to deliberate the fate of Hans Reiser, the designer of the Reiser File System for Linux who is accused of murdering his wife in late 2006, a key developer on the Reiser4 project acknowledged he is uncertain about its future.

Reiser Jury Deliberating; Readers Predicting 'Not Guilty'

Filed under

blog.wired: Jurors weighing Linux programmer Hans Reiser's murder case were deliberating for the first full day here Wednesday. Panelists have just broken for lunch and are headed for a nearby Mexican restaurant.

Reiser's future now in hands of jury

Filed under
Reiser The fate of 44-year-old computer engineer Hans Reiser, who is accused of murdering his wife, now rests with the jury. The prosecution finished its rebuttal in the closing arguments to his trial Monday morning.

Syndicate content

More in Tux Machines

Red Hat and Fedora

Rackspace and FOSS Report

  • The Rackspace State of Open Source
    As the OpenStack Summit in Barcelona kicks off, Rackspace has released a report entitled ‘The State of Open Source’. With every conference seemingly extolling the virtues of open source software, this report is timely. It manages to differentiate between enterprise open source and the wider open source software market.
  • Why digital transformation needs open source
    As if there wasn't already ample reason for businesses to switch to open source, Forrester analysts Paul Miller and Lauren E Nelson released a report in April 2016, entitled Open Source Powers Enterprise Digital Transformation — CIOs Need To Embrace Open Source Software To Drive Change, which further drives the point.
  • Despite Security Fears, Open Source Is Fuelling Innovation and Cost Savings in UK Businesses
  • Security concerns fail to hold back UK open source success
    However, despite its increasingly common use, many (54%) still perceive external security threats to be a big barrier to adoption, that’s according to a report published by Rackspace. The State of Open Source study, which was conducted among IT decision makers in UK businesses with over 1,000 employees and revenues over £500m, and looks at the ways open source is being used, its benefits, but also what is holding back adoption and business concerns. According to the report open source has come of age with 85% using open source technology to migrate a closed source project to open source. Open source also isn’t just a tool for small businesses; the vast majority (90%) of large businesses are now deploying open source-based enterprise applications, with 25% being completely open source. The reason for the growing adoption is because of the money and time savings. Rackspace found that for each project that had been migrated to open source technology, six out of ten organisations saved on average £30,146 and reduced project lifecycle by six months. Greater innovation was reported by many (49%), and 46% were driven to open source because of the competitive opportunities. Additionally, just under half (45%) said that it enabled them to get products and services to market faster. John Engates, Chief Technology Officer at Rackspace, said: “While open source technologies have been around for many years, it is great to see that enterprise businesses are finally dipping their toes in and seeing the tangible benefits.

FOSS and Blockchain

Security Leftovers

  • The internet apocalypse map hides the major vulnerability that created it
    During Friday’s massive distributed denial of service (DDoS) attack on DNS service provider Dyn, one might be forgiven for mistaking the maps of network outages for images of some post-apocalyptic nuclear fallout. Screenshots from sites like showed menacingly red, fuzzy heat maps of, well, effectively just population centers of the United States experiencing serious difficulty accessing Twitter, Github, Etsy, or any of Dyn's other high-profile clients. Aside from offering little detail and making a DDoS literally into a glowing red menace, they also obscured the reality of just how centralized a lot of internet infrastructure really is. DNS is ground zero for the uneasy tension of the internet’s presumed decentralized resilience and the reality that as of now, translating IP addresses into domain names requires some kind of centralized, hierarchical platform, and that’s probably not going to radically change anytime soon. Other maps provided by various business to business network infrastructure companies weren’t much more helpful. These maps seem to exist mostly to signal that the companies in question have lots of cool data and that it can be made into a flashy map — which might impress potential customers, but that doesn’t offer a ton of insights for the layperson. For example, threat intelligence company Norse's map appears to be mostly a homage to the Matthew Broderick movie War Games: a constant barrage of DDoS attacks beaming like space invader rockets across a world map. Akamai has an impressive 3D visualization that renders traffic as points beaming into the atmosphere. And website monitoring service Pingdom offers a dot map at such a far-out zoom level that it's essentially useless for seeking out more meaningful patterns than "outages happen in population centers, also there are a lot of outages."
  • CoreOS Patched Against the "Dirty COW" Linux Kernel Vulnerability, Update Now
  • World’s first hack-proof router launched
    Turris Omnia router, tagged the world’s first hack-proof router, was launched yesterday at the CES Unveiled Show in Prague, Czech Republic. As an essential part of any home internet network, routers are rather poorly secured and protected against cyber attack. More often than not, the only security feature is the default password. With easily required internet knowledge and some skills, these routers can be hacked, providing unauthorized access to a complete internet network. From there on, anything is possible.