Language Selection

English French German Italian Portuguese Spanish

Sci/Tech

The Next Open Source Battle Is Being Waged In The 3D Printing Industry

Filed under
OSS
Sci/Tech

More than twenty years ago, Linux began wending its way out of the primordial soup that was the early Internet and ensconcing itself in servers and workstations around the world.

After its creation in 1991 it took another eight years or so to be widely recognized, but during that period, arguments arose as to what Linux really was. Could Red Hat, a company founded in 1993, sell services around it? Who made money when you sold a CD containing the latest version of Mandrake Linux? Who owned code written on top of Linux for specific purposes? To the open source community, the answers to all those questions was “No one. The community owned Linux.”

Read more

ROS - the open source Robotic Operating System

Filed under
OSS
Sci/Tech

Brian Gerkey wanted a common robotic control language. Taking inspiration from the LAMP (Linux Apache MySQL Python) open source tools in the 1990s Brian worked to develop ROS, the Robot Operating System. ROS is an open source kit of tools, libraries and programming conventions for programming robots.

Read more ►

3D Printing's Next Revolution: Linux

Filed under
Linux
Hardware
Sci/Tech

3D printers may be trendy, but they are hardly new. One of the earliest of all is the RepRap project, which began back in 2005. As its name implies - it's short for "replicating rapid" prototyper - RepRap is designed to be able to produce copies of itself, or at least most of its parts. Not only that, it is completely open source, both in terms of its hardware (which uses Arduino kit) and software.

Because of its open nature it has gone on to form the basis of many other 3D-printing systems, including those from MakerBot.

Read more ►

Linux Help for Neuroscientists

Filed under
Linux
Sci/Tech

In past articles, I have looked at distributions that were built with some scientific discipline in mind. In this article, I take a look at yet another one. In this case, I cover what is provided by NeuroDebian.

Read more ►

Linux Model Airplane Controller

Filed under
Linux
Sci/Tech

linuxfordevices.com: Open source hacker community Gizmo For You is developing a Linux-based controller and separate receiver device to remotely control a model airplane or other vehicle.

SETI silences alien-seeking telescope array

Filed under
Sci/Tech

cnet.com: It seems, though, that economics is putting a difficult hue on our quest. According to the San Jose Mercury News, the SETI (Search For Terrestrial Intelligence) Institute has announced that it is setting aside some of its telescopes, as it cannot afford to run them.

Five things that technology made worse

Filed under
Sci/Tech

dedoimedo.com: Not everything about advancement is inherently good. Let me tell you about five pieces of modern technology that actually made life worse.

11 Epic Technology Disasters

Filed under
Sci/Tech

informationweek.com: Separating machine failures and negligent maintenance from unforeseeable circumstances isn't easy and no doubt there are some accidents worthy of mention that we've missed. In any event, these are the eleven worst tech-related disasters where mechanical or engineering failure played a significant role.

Top 10 Things Science Fiction Promised Us

Filed under
Sci/Tech
  • Top 10 Things Science Fiction Promised Us That Didn’t Happen in 2010
  • Top 10 Things Science Fiction Promised Us That DID Happen in 2010

The 10 biggest tech scandals of the decade

Filed under
Reiser
Sci/Tech
Misc

techrepublic.com: Choosing the worst tech disgraces of the past 10 years isn’t easy, but CNET News recently took a crack at it. The incidents that made the cut involve sexual harassment, stripper-crazed CEOs, spies, congressional investigations, and even murder.

Syndicate content

More in Tux Machines

Development: JavaScript, PHP, and GCC

  • 10 JavaScript concepts every Node.js programmer must master
    With JavaScript and the V8 engine at the core, an event-driven architecture, and scalability out of the box, Node.js has quickly become the new de facto standard for creating web applications and SaaS products. Many frameworks like Express, Sails, and Socket.IO enable users to quickly bootstrap applications and focus only on the business logic.
  • PHP Tour - Nantes 2017
    As for every AFUP event, organization was perfect, and I was able to meet a lot of developers and PHP users.
  • More OpenACC 2.5 Code Lands In GCC
    More code for supporting the OpenACC 2.5 specification has been landing in mainline GCC.
  • D Language Front-End Proposed For GCC 8, 800k Lines of Code
    A set of 13 patches amounting to nearly 800k lines of new code were sent out Sunday morning for adding a D language front-end to the GNU Compiler Collection (GCC).

Security Leftovers

  • Researchers find Android design defects that allow attacks

    The researchers — Yanick Fratantonio of the University of California, and Chenxiong Qian, Simon Pak Ho Chung and Wenke Lee, all from the Georgia Institute of Technology — called it a Cloak and Dagger attack as it happened without the owner of the smartphone being aware that any attack had taken place.

    The attack does not exploit any vulnerability, but takes advantage of two permissions that are allowed for apps to use certain features on Android.

  • The internet of unreliable and broken things
    Fine, the current process is rocky. Some of that is that it’s not matured yet (Alexa, when did Vincent Price die? No, not “play vincent price die”, not “christ die”, not “do you speak some price dead”, you stupid pile of undocumented microchips!) Some of it is that basically every large company underestimates how much people’s accounts are set up incorrectly or incompletely; after all, employees have everything set up right, because they know what they’re doing, and so this never comes up in testing. Some of it is because I’m joining dots on three or four very different puzzles: I’m sure if I were to get a Google Home and use Google Mail to send my shopping list to Google Keep and then buy things from Google Shopping, or if I were to get some theoretical Home Siri device and play music from my Apple account and put things in my Apple iCloud account… then all this would be a lot more seamless. But you should beware people who proclaim that technology would be easy if all us heathens were just to renounce our diverse needs and join their true faith. Mastery goes to the designer who can cope with us real people, in all our glittering and varied patterns and colours and desires. Not just the ones who take the easy way out and block you if you haven’t already bought all the rest of your stuff from them too.
  • 9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
    Datasets from the recent Verizon 2017 Data Breach Investigations Report (DBIR) show that some security teams still may be operating under false assumptions regarding what it takes to keep their organizations secure. For starters, the same security standards don't apply across all vertical industries, says Suzanne Widup, a senior consultant for the Verizon RISK Team and co-author of the Verizon DBIR.
  • “Yahoobleed” flaw leaked private e-mail attachments and credentials
  • Web Developer Security Checklist
    If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security.
  • Obstacles to the Adoption of Secure Communication Tools

    [...] we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools

  • VMware Patches Multiple Security Issues in Workstation
    VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability. The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Linux Devices, Tizen, and Android

Peppermint 8 Linux OS Released, It's Based on Ubuntu 16.04.2 LTS with Linux 4.8

Mark Greaves of the Peppermint development team was proud to announce today the release and immediate availability of the Peppermint 8 GNU/Linux distribution. Based on the Ubuntu 16.04.2 LTS (Xenial Xerus) operating system and the HWE (hardware enablement) Linux 4.8 kernel and graphics stacks from Ubuntu 16.10 (Yakkety Yak), which includes the X.Org Server 1.19 and Mesa 17.0.2 packages, Peppermint 8 is here in its final, production-ready state to conquer your personal computers with a highly customized MATE desktop environment. Read more