Language Selection

English French German Italian Portuguese Spanish

OSS

OSS, Openwashing and FUD

Filed under
OSS

Open Data (OD) for Research of Shootings

Filed under
OSS

GitHub’s tool reduces open source software license violations

Filed under
OSS

GitHub has open-sourced its Licensed tool, a Ruby gem that caches and verifies the status of license dependencies in Git repos.

Licensed has helped GitHub engineers who use open source software find potential problems with license dependencies early in the development cycle. The tool reports any dependencies needing review.

Read more

LG/webOS Latest

Filed under
Linux
OSS

CAVO Promotes Open Source Voting in Documentary and Legislation

Filed under
OSS

"The Real Activist" slated for release this summer will include an interview with Brent Turner of OSI Affiliate Member CAVO, as well as coverage of the groups work to promote open source software within US elections' voting systems. The documentary highlights Turner's efforts and CAVO's mission to secure the United States election systems through GPL licensed open source software. Famed narrator Peter Coyote also stars in the film along with former CIA Director R. James Woolsey and many political notables.

Read more

Latest on webOS

Filed under
OS
Linux
OSS

OSS Leftovers

Filed under
OSS
  • Can we build a social network that serves users rather than advertisers?

    Today, open source software is far-reaching and has played a key role driving innovation in our digital economy. The world is undergoing radical change at a rapid pace. People in all parts of the world need a purpose-built, neutral, and transparent online platform to meet the challenges of our time.

    And open principles might just be the way to get us there. What would happen if we married digital innovation with social innovation using open-focused thinking?

  • Digital asset management for an open movie project

    A DAMS will typically provide something like a search interface combined with automatically collected metadata and user-assisted tagging. So, instead of having to remember where you put the file you need, you can find it by remembering things about it, such as when you created it, what part of the project it connects to, what's included in it, and so forth.

    A good DAMS for 3D assets generally will also support associations between assets, including dependencies. For example, a 3D model asset may incorporate linked 3D models, textures, or other components. A really good system can discover these automatically by examining the links inside the asset file.

  • LG Releases ‘Open Source Edition’ Of webOS Operating System
  • Private Internet Access VPN opens code-y kimono, starting with Chrome extension

    VPN tunneller Private Internet Access (PIA) has begun open sourcing its software.

    Over the next six months, the service promises that all its client-side software will make its way into the hands of the Free and Open Source Software (FOSS) community, starting with PIA's Chrome extension.

    The extension turns off mics, cameras, Adobe's delightful Flash plug-in, and prevents IP discovery. It also blocks ads and tracking.

    Christel Dahlskjaer, director of outreach at PIA, warned that "our code may not be perfect, and we hope that the wider FOSS community will get involved."

  • Open sourcing FOSSA’s build analysis in fossa-cli

    Today, FOSSA is open sourcing our dependency analysis infrastructure on GitHub. Now, everyone can participate and have access to the best tools to get dependency data out of any codebase, no matter how complex it is.

  • syslog-ng at SCALE 2018

    It is the fourth year that syslog-ng has participated at Southern California Linux Expo or, as better known to many, SCALE ‒ the largest Linux event in the USA. In many ways, it is similar to FOSDEM in Europe, however, SCALE also focuses on users and administrators, not just developers. It was a pretty busy four days for me.

  • Cisco's 'Hybrid Information-Centric Networking' gets a workout at Verizon
  • Verizon and Cisco ICN Trial Finds Names More Efficient Than Numbers
  • LLVM-MCA Will Analyze Your Machine Code, Help Analyze Potential Performance Issues

    One of the tools merged to LLVM SVN/Git earlier this month for the LLVM 7.0 cycle is LLVM-MCA. The LLVM-MCA tool is a machine code analyzer that estimates how the given machine code would perform on a specific CPU and attempt to report possible bottlenecks.

    The LLVM-MCA analysis tool uses information already used within LLVM about a given CPU family's scheduler model and other information to try to statically measure how the machine code would carry out on a particular CPU, even going as far as estimating the instructions per cycle and possible resource pressure.

  • Taking Data Further with Standards

    Imagine reading a book, written by many different authors, each working apart from the others, without guidelines, and published without edits. That book is a difficult read — it's in 23 different languages, there's no consistency in character names, and the story gets lost. As a reader, you have an uphill battle to get the information to tell you one cohesive story. Data is a lot like that, and that's why data standards matter. By establishing common standards for the collection, storage, and control of data and information, data can go farther, be integrated with other data, and make "big data" research and development possible.

    For example, NOAA collects around 20 terabytes of data every day.Through the National Ocean Service, instruments are at work daily gathering physical data in the ocean, from current speed to the movement of schools of fish and much more. Hundreds of government agencies and programs generate this information to fulfill their missions and mandates, but without consistency from agency to agency, the benefits of that data are limited. In addition to federal agencies, there are hundreds more non-federal and academic researchers gathering data every day. Having open, available, comprehensive data standards that are widely implemented facilitates data sharing, and when data is shared, it maximizes the benefits of "big data"— integrated, multi-source data that yields a whole greater than its parts.

Openwashing: Attivio, Networking, and Black Duck

Filed under
OSS

Feed the dog and close the door with an open source home automation system

Filed under
OSS

As voice assistants, smart bulbs, and other devices increasingly become household staples, more people than ever are bringing smart technology into their homes. But the bewildering assortment of products on the market can present challenges: Remembering which app to use and trying to link things together with automation can get complicated quickly. In this article, I’ll show you a few ways I used an open source home automation platform, Home Assistant, to bring all my devices together.

Read more

How 11 open source projects got their names

Filed under
OSS

"So, two open source developers walk into a bar..." Arduino derives its name from one of co-founder Massimo Banzi's favorite bars in Ivrea, Italy, where the founders of this "hardware and software ecosystem" used to meet. The bar was named for Arduin of Ivrea, who was king of Italy a bit more than 1,000 years ago.

Read more

Syndicate content

More in Tux Machines

Cloud Foundry (LF) News

‘No Company Is So Important Its Existence Justifies Setting Up a Police State’

You’re talking about very — about specific manifestations, and in some cases in ways that presuppose a weak solution. What is data privacy? The term implies that if a company collects data about you, it should somehow protect that data. But I don’t think that’s the issue. I think the problem is that it collects data about you period. We shouldn’t let them do that. I won’t let them collect data about me. I refuse to use the ones that would know who I am. There are unfortunately some areas where I can’t avoid that. I can’t avoid even for a domestic flight giving the information of who I am. That’s wrong. You shouldn’t have to identify yourself if you’re not crossing a border and having your passport checked. With prescriptions, pharmacies sell the information about who gets what sort of prescription. There are companies that find this out about people. But they don’t get much of a chance to show me ads because I don’t use any sites in a way that lets them know who I am and show ads accordingly. So I think the problem is fundamental. Companies are collecting data about people. We shouldn’t let them do that. The data that is collected will be abused. That’s not an absolute certainty, but it’s a practical, extreme likelihood, which is enough to make collection a problem. A database about people can be misused in four ways. First, the organization that collects the data can misuse the data. Second, rogue employees can misuse the data. Third, unrelated parties can steal the data and misuse it. That happens frequently, too. And fourth, the state can collect the data and do really horrible things with it, like put people in prison camps. Which is what happened famously in World War II in the United States. And the data can also enable, as it did in World War II, Nazis to find Jews to kill. In China, for example, any data can be misused horribly. But in the U.S. also, you’re looking at a CIA torturer being nominated to head the CIA, and we can’t assume that she will be rejected. So when you put this together with the state spying that Snowden told us about, and with the Patriot Act that allows the FBI to take almost any database of personal data without even talking to a court. And what you see is, for companies to have data about you is dangerous. And I’m not interested in discussing the privacy policies that these companies have. First of all, privacy policies are written so that they appear to promise you some sort of respect for privacy, while in fact having such loopholes that the company can do anything at all. But second, the privacy policy of the company doesn’t do anything to stop the FBI from taking all that data every week. Anytime anybody starts collecting some data, if the FBI thinks it’s interesting, it will grab that data. And we also know that the FBI and other such agencies are inclined to label protesters as terrorists. So that way they can use laws that were ostensibly adopted to protect us from terrorists to threaten a much larger number of us than any terrorist could. Read more Also: Numerical Analysis Software Global Market Analysis & Forecast: Analytica, Matlab, GNU Octave, Plotly, FlexPro

Today in Techrights

Android Leftovers