Language Selection

English French German Italian Portuguese Spanish

News

Top events ahead in 2014 for abusive patent litigation

Filed under
News

In the most recent development, New York Attorney General Eric T. Schneiderman announced what he calls a "groundbreaking settlement" with a well known Patent Assertion Entity (PAE), a so-called "patent troll." This action in the Empire State follows on earlier state Attorney General (AG) investigations in Vermont, Minnesota, and Nebraska. It heralds what I anticipate to be deeper scrutiny by state AG’s of PAE use of 'deceptive and abusive tactics' against businesses and other entities in what the NY AG found in this case to be "an effort to strong-arm them into paying... for patent licenses of dubious value."

Read more

2014 in Tux Machines

Filed under
News

OUR FIRST couple of months at Tux Machines were pleasurable and we hope that readers found the links we've shared valuable. We even posted links while on vacation, i.e. away from home.

Migration of the site to Drupal 7 (and another server) has been planned for over a month now and it did not happen over Christmas because if things go wrong, not much help will be at hand. We have already tested a prototype of the site and it will need to be upgraded, integrated, etc. Whether we can retain the existing theme (compatibility changes between major releases of Drupal) remains to be seen, but the format of the site will definitely stay the same.

Happy new year to all our readers, whom we very much value. This site is a public service.

NSA reportedly intercepting laptops purchased online to install spy malware

Filed under
News

According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.

Read more

Syndicate content

More in Tux Machines

OpenSUSE 13.2 Beta

Migrating From Windows 7 To Ubuntu: The Ultimate Guide

Despite what all the Linux haters say, choosing Ubuntu is logical and migrating from Windows 7 to Ubuntu is a breeze. This article summarizes the process and provides solutions to some of the most common beginner hiccups. The Windows Vs Mac Vs Linux debate has been going on for years and doesn’t look to be settled anytime soon. If you are a Windows 7 user and still haven’t made the switch to Windows 8, you may want to consider migrating to Ubuntu 14.04, the latest Linux distro from Ubuntu. In addition to strong support from developers and a massive software repository, it’s free, faster and safer than Windows. Read more

7 killer open source monitoring tools

Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there are solutions that track the performance of those systems and devices, providing trending and analysis. Some tools will sound alarms and notifications when problems are detected, while others will even trigger actions to run when alarms sound. Here is a collection of open source solutions that aim to provide some or all of these capabilities. Read more

Reader Forum: Accelerating ‘IoT’ with an open-source, embedded platform for connected applications

Providing an end-to-end solution for building and deploying new connected applications extremely quickly, at scale, and at a fraction of the cost compared to conventional processes is key to streamlining M2M development. And, using an open-source, Linux-based platform, companies can run applications on any vendor’s hardware and use any cloud management platform. Read more