The vendor is building systems with Accton that will run Cumulus' network OS as part of an industry push to disaggregate hardware and software.
Chris Mason has sent in his pull request of the Btrfs file-system changes for the Linux 3.20 (4.0?) kernel.
Btrfs in Linux 3.19 brought RAID 5 / 6 support improvements and for this next kernel release the RAID level 5 and 6 support is still baking. Chris shared that there's some RAID 5/6 clean-ups to fix some long-standing issues in the code and to improve the work on top of Linux 3.19.
While we are already a big supporter of open innovation and open source initiatives – including our membership in the Core Infrastructure Initiative – today The Linux Foundation introduced Bloomberg as their newest Gold member.
When some folks think about who is responsible for writing Linux, they probably have visions of basement dwelling outcasts from society toiling away on their computers day after day. But the truth is far from that stereotypical delusion. It turns out that most of the people writing Linux are a different breed altogether.
LINUX AFICIONADOS across the world have been flocking to San Rosa for the Linux Foundation Collaboration Summit, a shadowy, clandestine conference available to the open source elite.
In this post, we have introduced the FrameGraph and the node types that compose it. We then went on to discuss a few examples to illustrate the Framegraph building rules and how the Qt3D engine uses the Framegraph behind the scenes. By now you should have a pretty good overview of the FrameGraph and how it can be used (perhaps to add an early z-fill pass to a forward renderer). Also you should always keep in mind that the FrameGraph is a tool for you to use so that you are not tied down to the provided renderer and materials that Qt3D provides out of the box.
We’ve reported the other day that the GNOME development team is working hard these days on the forthcoming GNOME 3.16 desktop environment, due for release on March 25, 2015. This will be a major update to the controversial desktop, bringing a number of new features, updated components, as well a bugfixes. GNOME Photos will be part of GNOME 3.16 as the default application for viewing and organizing photos, with the ability to upload them to social networks.
LinHES R8.3 brings updates to the kernel, system libraries, nvidia drivers, the latest MythTV 0.27.4-fixes, and many other parts of LinHES. LinHES R8.3 now includes the option to install Plex Home Theater. Additionally XBMC has been updated to Kodi.
ClearOS Community 6.6.0 Final has arrived! Along with the usual round of bug fixes and enhancements, this release introduces WPAD, QoS, YouTube School ID support, an upgrade to the Intrusion Detection engine, and ISO-to-USB key support.
Red Hat announced this week that its ARM Partner Early Access Programme, launched six months ago with the aim of facilitating partner system designs based on the 64-bit capable ARMv8-A architecture, has completed a critical hardware enablement phase.
Proxmox Server Solutions GmbH proudly announced on February 19, 2015, the immediate availability of version 3.4 of its powerful, open-source, and reliable server virtualization management computer operating system, Proxmox Virtual Environment (VE). The release brings a number of new features and improvements, including NUMA support (non-uniform memory access), ZFS storage plug-in, hotplug support, as well as the latest and greatest ZFS file system.
Ubuntu developer Adam Conrad announced the release of Ubuntu 12.04.2 LTS. This new Ubuntu 12.04 LTS release includes an updated kernel and X stack for better supporting new hardware across all of Ubuntu's supported architectures. The Ubuntu 14.04.2 LTS release also contains various stable bug/security fixes relevant to the platform.
The Ubuntu team is pleased to announce the release of Ubuntu 14.04.2 LTS (Long-Term Support) for its Desktop, Server, Cloud, and Core products, as well as other flavours of Ubuntu with long-term support.
Are you doing multi-tasking on your Linux machine and suddenly there is a power cut? Is you Laptop battery low or have any problem with you PC's UPS? Then Hibernate is a good option for you! You can save all your work and resume where you left after switching on computer.
Ubuntu 15.04 (Vivid Vervet) is getting closer to the official release in April and the developers have announced that feature freeze is now in effect for this distro.
Canonical, through Adam Conrad, announced a few hours ago, February 20, the immediate availability of the Ubuntu 14.04.2 maintenance release for its current LTS (Long Term Support) operating system, the Trusty Tahr, which includes Xubuntu 14.04.2 LTS, Kubuntu 14.04.2 LTS, Ubuntu GNOME 14.04.2 LTS, Ubuntu Kylin 14.04.2 LTS, Edubuntu 14.04.2 LTS, Mythbuntu 14.04.2 LTS, Ubuntu Studio 14.04.2 LTS, and Lubuntu 14.04.2 LTS.
THE RASPBERRY PI 2 has shifted 500,000 units in just two weeks, as total sales of the pint-sized computer hit the five million mark.
Eben Upton, head of the UK computing success story that is the Raspberry Pi Foundation, has told The INQUIRER that the new Raspberry Pi 2 has sold around half a million units.
The figure means that, within just two week of launching, the new model is already accounting for one in 10 of the five million sales made so far.
Well, this is starting to look sort of like "Jamie's Mostly Raspberry Pi Stuff", but that's not intentional, there's just a lot of interesting things going on with the RPi at the moment, so that's where I seem to be spending a lot of my time right now.
The big news, of course, was the announcement and immediate availability of the Raspberry Pi 2 hardware two weeks ago. The new hardware needs updated software to really make the most of its capabilities, so there was also a new Raspbian and NOOBS release (1.3.12) made at the same time.
With that, we have a very VERY accurate estimate of two of the four regions in how I divided the world, China and Western Europe which accounted for 46% (either IDC's or my math) of the total planet's smartphone sales. With the US stats we have rather solid Kantar and ComScore numbers and obviously my regional analysis of the US market is totally consistent with those. That means by simple subtraction math, the 'Rest of the World' region analysis is also very close to the mark. So for those who want to see those again, from my blog a week ago:
Many businesses routinely employ "ethical" hackers as a means of testing whether their systems are secure, paying the tech-savvy to break into their computers in what is known as penetration testing, or pen testing.
HOUSTON — Graylog, Inc., the company behind the popular Graylog open source log analysis platform, today announced that it has released v1.0 of its Open Source Graylog product. This enterprise-grade platform enables organizations to store, search and analyze machine data collected from their IT infrastructures to quickly pinpoint and address the root cause of operational problems. Graylog is providing paid services/support to make it even easier for enterprises to deploy this affordable alternative to expensive log analysis tools such as Splunk.
It was a first for the Southern California Linux Expo — a midweek start on Thursday for SCALE 13x, and those of us on the SCALE Team did not know what to expect. The day was composed of a variety of sessions — an all-day Intro to Chef, Puppet Labs held its separate-registration Puppet Camp LA, openSUSE held its mini-summit, PostgreSQL held the first of its two-day PostgreSQL days, Fedora held its Fedora Activity Day, and an all-day Apache session.
The Linux Foundation Collaboration Summit 2015 took place Feb. 18-20 in Santa Rosa, Calif.
Well, to jump from your current CMS (or lack thereof) and make the transition to Drupal, you want to know much it costs and exacting what that migration entails. First, there are several factors that have to be taken into an account before any Drupal development company can give you a quote. But, while there isn’t an exact price range for migrating to Drupal, you can do some in-house work to keep your migration costs down and prepare your team for the migration, keeping headaches down too.
Imagine a world where scientists and inventors had no access to the accomplishments of the generations which came before us. The wheel would, quite literally, need to be reinvented by everyone who came along and wanted to move forward.
[....]
To learn more about open access, we're proud to present a new resource, which helps to answer many of the fundamental questions around open access and scholarly sharing.
Last year Facebook launched Hack, a new programming language derived from PHP and powered by their HHVM software. The Hack specification serves as official documentation for those wanting to come out with their own Hack implementation rather than relying upon HHVM. The Hack specification complements the existing Hack programming documentation.
A new version of the HTTP standard that promises to deliver Web pages to browsers faster has been formally approved, the Internet protocol's first revision in 16 years.
The political arm of the Internet Engineering Task Force (IETF), the Internet Society, has posted its approved slate of candidates for two board positions – and invited everyone else in the world to parachute into the process.
Could getting off Twitter be a religious experience?
The Obama administration on Wednesday accused the Israeli government of misleading the public over the Iran nuclear negotiations, using unusually blunt and terse language that once again highlighted the rift between the two sides.
In briefings with reporters, State Department spokeswoman Jen Psaki and White House spokesman Josh Earnest suggested Israeli officials were not being truthful about how the United States is handling the secretive talks.
Since spiriting NSA leaker Edward Snowden to safety in Russia two years ago, activist and WikiLeaks editor Sarah Harrison has lived quietly in Berlin. Sara Corbett meets the woman some regard as a political heroine—others as an accomplice to treason.
Moscow’s Sheremetyevo Airport is, like so many international airports, a sprawling and bland place. It has six terminals, four Burger Kings, a sweep of shops selling duty-free caviar, and a rivering flow of anonymous travelers—all of them headed out or headed in or, in any event, never planning to stay long. But for nearly six weeks in the summer of 2013, the airport also housed two fugitives: Edward Snowden, the NSA contractor who had just off-loaded an explosive trove of top-secret U.S. government documents to journalists, and a 31-year-old British woman named Sarah Harrison, described as a legal researcher who worked for the online organization WikiLeaks.
Congress came tantalizingly close last year to passing a bill to strengthen the Freedom of Information Act, which allows journalists and the public to access federal government records. The legislation, which would have brought more transparency, was blocked in December when the House speaker, John Boehner, refused to hold a vote on the Senate bill with no explanation. Two months later, lawmakers have a second chance.
There aren't a lot of numbers in the Times piece, so it's useful to pause here and note that according to the IMF database, China's per capita GDP (measured in terms of purchasing power) grew by 8.6 percent last year, vs. 6.0 percent for India. So any stumbling, slowing or faltering seen in China's economy is based on forecasts of future growth–which are notoriously unreliable, though often given great credence in articles like these.
Krauze begins by claiming that the Venezuelan government, first under President Hugo Chávez and then his successor Nicolás Maduro, has taken control over the media. Chávez "accumulated control over the organs of government and over much of the information media: radio, television and the press," we are told, and then Maduro "took over the rest of Venezuelan television."
A simple factcheck shows this to be false. The majority of media outlets in Venezuela--including television--continue to be privately owned; further, the private TV audience dwarfs the number of viewers watching state TV.
Laurence Brass says he had been 'bursting to criticize the Israeli administration' for six years and took the board to task for preventing honorary officers from expressing personal opinions.
It looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time.
State and local law enforcement agencies that use StingRays must weigh their obligations under public records statutes against nondisclosure agreements with the FBI and the device’s manufacturer. While some police departments have ruled that they cannot share any documents whatsoever, a handful of key disclosures in recent weeks — including the cleanest version of the NDA released to date — together shed new light on the FBI’s involvement in cell-site simulator deployments nationwide.
We recently learned that PC manufacturer Lenovo is selling computers preinstalled with a dangerous piece of software, called Superfish, that uses a man-in-the-middle attack to break Windows' encrypted Web connections for the sake of advertising. (Here's a list of affected products.) Research from EFF's Decentralized SSL Observatory has seen many thousands of Superfish certificates that have all been signed with the same root certificate, showing that HTTPS security for at least Internet Explorer, Chrome, and Safari for Windows, on all of these Lenovo laptops, is now broken. Firefox users also have the problem, because Superfish also inserts its certificate into the Firefox root store.
Late last night, people started buzzing on Twitter about the fact that Lenovo, makers of the famous Thinkpad laptops, had been installing a really nasty form of adware on those machines called Superfish. Many news stories started popping up about this, again, focusing on the adware. But putting adware on a computer, while ethically questionable and a general pain in the ass, is not the real problem here. The problem is that the adware in question, Superfish, has an astoundingly stupid way of working that effectively allows for a very easy man in the middle attack on any computer with the software installed, making it a massive security hole that is insanely dangerous.
The information extracted by Graham can now be used to break the security on every compromised Lenovo computer. This leaves infected users essentially open to any eavesdropping if they are using the net on a public Wi-Fi account, and also enables future malware authors to convince Lenovo owners that their software is produced by a trusted vendor, such as Microsoft.
Over the weekend Russian IT security vendor Kaspersky Lab released a report about a new family of malware dubbed "The Equation Family". The software appears, from Kaspersky's description, to be some of the most advanced malware ever seen. It is composed of several different pieces of software, which Kaspersky Lab reports work together and have been infecting computer users around the world for over a decade. It appears that specific techniques and exploits developed by the Equation Group were later used by the authors of Stuxnet, Flame, and Regin. The report alleges that the malware has significant commonalities with other programs that have been attributed to Western intelligence agencies; Reuters subsequently released an article about the report in which an anonymous former NSA employee claims that the malware was directly developed by the NSA.
US and British intelligence agencies illegally hacked into a major manufacturer of Sim cards to steal codes and facilitate eavesdropping on mobiles, a US news website says.
A giant cellphone surveillance program is just one of the dark NSA secrets being dragged out into the light, thanks to a certain whistleblower and a Russian cybersecurity firm.
Digital security company Gemalto NV was hacked by American and British spies to steal encryption keys used to protect the privacy of cellphone communications, news website Intercept reported, citing documents provided by whistleblower Edward Snowden.
International row likely after revelations of breach that could have given NSA and GCHQ the power to monitor a large portion of world’s cellular communications
British and American spies stole the encryption keys from the largest SIM card manufacturer in the world, according to a government document handed to The Intercept by National Security Agency whistleblower Edward Snowden.
Superfish, a little-known “visual search” and ad tech provider from Palo Alto whose CEO was once part of the surveillance industrial complex, is about to learn what it feels like to face the unwavering wrath of the privacy and security industries. Lenovo will take much of the blame for potentially placing users at risk by contracting Superfish to effectively carry out man-in-the-middle attacks on users to intercept their traffic just to get the firm’s “visual” ads up during customers’ web searches.
One of the “biggest Snowden stories yet” has arrived today, according to journalist Glenn Greenwald.
Spies from the United States’ National Security Agency (NSA) and the United Kingdom's Government Communication Headquarters (GCHQ) “hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe.” The information was obtained from top-secret documents leaked by Edward Snowden.
Florida's legislators are pushing through bills mandating body camera use by the state's law enforcement officers. So far, so good, except for the fact that law enforcement officers aren't really looking for greater transparency or accountability, at least not according to Florida Police Benevolent Association chief Gary Bradford.
Mr. Risen, an investigative reporter for The Times, was writing in response to Mr. Holder’s statements in a National Press Club speech Tuesday defending the Obama administration’s record on press rights. Mr. Risen, who narrowly escaped jail time as he insisted on protecting a confidential source, begged to differ – in no uncertain terms.
Referring to the Obama administration as “the greatest enemy of press freedom in a generation,” Mr. Risen called the attorney general “the nation’s top censorship officer.”
Although the wording of the Risen tweets was outside the tacitly accepted norm for Times reporters on social media, The Times declined to criticize them and issued a statement in his support.
I followed up in a conversation with the standards editor, Philip Corbett, and some email correspondence with Mr. Risen.
Louisiana — a state whose motto is Union, Justice and Confidence — is known for many things. The Bayou State is the birthplace of jazz, Creole, and Cajun food, and New Orleans is the site of the country’s largest annual Mardi Gras Carnival. But as the Times-Picayune found in a major series years ago, Louisiana is also “the world’s prison capital,” with an incarceration rate that is “nearly five times Iran’s, 13 times China’s and 20 times Germany’s.”
Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter.
The second-to-last witness in the government’s case against Jeffrey Sterling, FBI Special Agent Ashley Hunt, introduced a number of things she had collected over the course of her 7.5 year investigation into James Risen’s chapter on Operation Merlin. That included a few things — most notably two lines from Risen’s credit card records from 2004 — that in no conceivable way incriminated Sterling.
A year ago, the Department of Justice threatened to put Fidel Salinas in prison for the rest of his life for hacking crimes. But before the federal government brought those charges against him, Salinas now says, it tried a different tactic: recruiting him.
THE HOUSE OF LORDS IS BACKING the idea of a free and gloriously open internet that is available to all, and is - rather less exciting sounding - reclassified as a utility.
The plans come on the heels of similar noises from the US where Title II reclassification is a hot and contentious topic.
Here we have the Lords releasing a report advocating that the government takes the internet and makes it a ;utility service' much like it is in Estonia where it is considered a human right, and much as people like Tim Berners-Lee would appreciate.
You might recall that top cable industry lobbyist Michael Powell, formerly head of the FCC, got much of the current Title II debate rolling back in 2002 when he reclassified cable broadband as an "information service." This effectively opened the door to a massive era of broadband deregulation Powell and friends at the time insisted would usher forth an immense new wave of broadband competition. If you've checked your broadband bill or oh, stepped outside lately, you may have noticed that this utopian broadband landscape never materialized.
The main obstacles to creating software that can run old programs, read old file formats, or preserve old webpages, are patents and copyright. Patents stop people creating emulators, because clean-room implementations that avoid legal problems are just too difficult and expensive to carry out for academic archives to contemplate. At least patents expire relatively quickly, freeing up obsolete technology for reimplementation. Copyright, by contrast, keeps getting extended around the world, which means that libraries would probably be unwilling to make backup copies of digital artefacts unless the law was quite clear that they could -- and in many countries, it isn't.