Showing headlines posted by bob
« Previous ( 1 ... 945 946 947 948 949 950 951 952 953 954 955 ... 1158 ) Next »Interview with winner of Red Hats Women in Open Source Academic Award, Kesha Shah
As many have said, for us to have the most diverse ideas we need to have the most diverse backgrounds. Red Hat reenforces that sentiment today with the announcement of their first winner of the Women in Open Source, Academic Award: Kesha Shah.
The 2015 open source summer reading list
Summer reading giveaway: Five readers will win a copy of one book from our summer reading list. Read the official rules, and enter our contest!
Interview with winner of the Red Hat Women in Open Source Community Award, Sarah Sharp
Last year Red Hat announced its first Women in Open Source Award, created to recognize the contributions that women are making in open source technologies and communities.
Attack of the Drones
With the price and size of computer hardware steadily decreasing, it's becoming more viable to use embedded Linux systems to control small robots and drones. There are plenty of projects for Raspberry Pi, but not everyone wants to build a drone from scratch. That's why enthusiasts will be pleased to hear about the new drones from Parrot.
Dime-sized IoT COM runs Linux or Android on i.MX6
Freescale’s dime sized “SCM-i.MX6D” module runs Linux or Android on an 800MHz i.MX6 Dual SoC, includes a PMIC and up to 2GB of RAM, and targets IoT apps.
Installing and Using the Scientific Software GNU Octave on Ubuntu 15.04
GNU Octave is a scientific application that uses a Matlab like interpreted high level language for numerical computations and simulations. It offers functions to solve linear and nonlinear problems, can plot the results as graphics and offers capabilitis for data manipulatio and visualisation.
Physics Analysis Workstation
CERN is the European Laboratory for Particle Physics. It has been in
the news quite a bit lately with the discovery of the Higgs Boson at
the Large Hadron Collider. Something that many people may not know is
that it also has a long tradition of developing software for
scientific use.
Inside the Open Container Project: How Docker plans to unite the container market
Linux Foundation-led effort promises a single spec for all
DockerCon 2015 For a while, it looked as though software containers were heading for the kind of standards squabble that has plagued the tech industry too often in its history.…
Rugged vehicle PC offers power protection, wireless options
Aaeon’s rugged, Linux-ready “Boxer” PC for vehicles offers a 4th Gen Core CPU, dual GbE and four 10/100 PoE LAN ports, mini-PCIe expansion, and a SIM slot. The Boxer-6301VS Embedded Box PC joins the aging, Atom D510 based AEV-6312 as Aaeon’s only other in-vehicle computer. There will soon be more, however, as Aaeon says it […]
Why are there still so many website vulnerabilities?
The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.
CII takes steps to make open-source software safer
The Linux Foundation's Core Infrastructure Initiative is taking on three new major open-source security projects and Linux security expert Emily Ratliff has been hired to oversee CII.
New Freescale i.MX7 SoCs take on low-power Linux IoT
Freescale unveiled two Linux-ready, 28nm i.MX7 SoCs with one or two Cortex-A7 cores, Cortex-M4 MCUs, and much lower power consumption than the i.MX6. The single-core, 800MHz i.MX7 Solo (i.MX7S) and dual-core, 1GHz i.MX7 Dual (i.MX7D) follow last month’s single-core i.MX6 UltraLite as the first i.MX system-on-chips to move to a Cortex-A7 architecture. The i.MX7 Series […]
How encryption keys could be stolen by your lunch
By studying the electronic signals, researchers have shown it is possible to deduce keystrokes, figure out what application a person is using or discover the secret encryption keys used to encrypt files or emails.
How to edit Movie Subtitles on the Linux Desktop
Here's is a quick guide on how to load and edit subtitles on GNOME Subtitles and Subtitle Editor. The movie that I will be using for this tutorial is a documentary called “The Pirate Bay Away From Keyboard” released in 2013 under a Creative Commons (CC) license.
“EPIC” fail—how OPM hackers tapped the mother lode of espionage data
Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management. But on Thursday, officials from OPM, the Department of Homeland Security, and the Department of the Interior revealed new information that indicates at least two separate systems were compromised by attackers within OPM's and Interior's networks.
The rise of creativity propels open data forward
The Greek mathematician and philosopher Plato, when asked of the Socratic dialogue The Republic, "Will we say of a painter, that he makes something?," answered "Certainly not, he merely imitates." Plato did not believe in art as a form of creativity. In fact, many great ancient cultures like Ancient Greece and Ancient India lacked the concept of creativity.
Art was seen as a form of discovery and not creation.It was a common belief that creativity happens to a selected few as a consequence of some form of divine intervention.
read more
How to build CubiKG, a DiY heart and activity tracking device
A few weeks ago, my doctor told me to keep an eye on my heart with the help of DiY toolkit BITalino, and I wrote about it in Why my doctor prescribed me open hardware. Although I could keep slapping a bunch of cables and a PCB on me every day (Figure 1), miniaturized physiological computing devices are pretty fun to build and play with—at least for me—so I decided to make myself something more practical.
read more
Can Wikipedia Survive?
One of the biggest threats it faces is the rise of smartphones as the dominant personal computing device. A recent Pew Research Center report found that 39 of the top 50 news sites received more traffic from mobile devices than from desktop and laptop computers, sales of which have declined for years.
Attack Gave Chinese Hackers Privileged Access to U.S. Systems
Undetected for nearly a year, the Chinese intruders executed a sophisticated attack that gave them “administrator privileges” into the computer networks at the Office of Personnel Management, mimicking the credentials of people who run the agency’s systems, two senior administration officials said. The hackers began siphoning out a rush of data after constructing what amounted to an electronic pipeline that led back to China...
OSVR supports Android, Linux gaming at E3, and more
Hello, open gaming fans! In this week's edition, we take a look at OSVR's support of Android, Linux games at E3, and more!
« Previous ( 1 ... 945 946 947 948 949 950 951 952 953 954 955 ... 1158 ) Next »