Hi there! My name is Dustin Kirkland, a Linux user for nearly 20 years, and an open source developer for almost as long. I worked on Linux at IBM for most of a decade, on site at Red Hat for a bit, and now at Canonical for nearly another decade. I started at Canonical as an engineer on the Ubuntu Server team and eventually evolved into the product manager responsible for Ubuntu as a server and cloud platform. I’ve authored many open source utilities used by millions of Ubuntu users every day. Open source software is my passion, my heart, and my soul.
I was working in Cape Town, South Africa when I received a strange call from a friend and colleague at Microsoft in January of 2016. The call was decorated with subtlety as he danced around the technology underpinning what you and I today know as “Ubuntu on Windows,” but without any detail. There was plenty of confusion. Confusion around exactly what we were talking about. Confusion about how this could even work. Confusion about how I should feel about this.
So after the release of Linux Mint 18 sarah in the flavours of Cinnamon and MATE,now the team is focoused on working over other flavours too.As a result Xfce has been choosen to be the next flavour to be provided officially.
So,If you were waiting for Linux Mint 18 to be available in Xfce DE(Desktop Environment) then Linux Mint team has started to roll the beta release of Sarah in Xfce DE. Linux Mint team announced the release of Linux Mint 18 Xfce Beta with some already known issues and workarounds too.This xfce edition features Xfce 4.12, MDM 2.0 and it is coming with Linux Kernel 4.4.
While the release comes with the new X-Apps, the Mint-Y theme, new artwork, an Ubuntu 16.04 base, and version 4.4 of the Linux kernel, it still runs Xfce 4.12 and MDM 2.0, both of which were present in Mint 17.3. The reason Xfce and MDM are at the same versions is because they are the latest upstream versions. They'll likely be updated with new point releases in the Mint 18 cycle.
Cloudera, which provides a complete data management and analytics platform built on Apache Hadoop and related open source technologies, announced the beta release of Cloudera Navigator Optimizer--a tool for improved workload performance and efficiency--late last year. Essentially, the tool allowed users to modernize their analytic database or augment their data warehouse solution with Hadoop, serving up insights aimed at predictably offloading key workloads.
Now, Cloudera has announced the general availability of Cloudera Navigator Optimizer, alongside the production release of Cloudera Enterprise 5.8. Navigator Optimizer is now an entrenched part of Cloudera's platform.
Workload management is an issue for many Hadoop-focused organizations. Within any business, there can be countless workloads being run at any given time, across multiple systems, that change based on time of day and business need. Across many of these workloads, similar pain points have emerged, like breakdowns in ETL pipelines, long wait times for BI reports, increasing system pressure from ad hoc queries, and unnecessary query complexity. When adopting new systems based on Hadoop, it’s critical that customers understand their workloads, so they can address these inefficiencies and run the right workloads in the right systems for the best results.
What are the target markets for StorPool? "We target based on use-case", said StorPool CEO, Boyan Ivanov. "Companies that build public or private clouds [including] enterprises and SMEs, service providers along with IaaS/PaaS, managed service providers, telecoms and hosting companies."
The Software Freedom Conservancy has issued a blog post this week about community-oriented principles in GPL enforcement work and in particular pointing out a Linux developer who hasn't agreed to these terms and is allegedly focusing upon GPL enforcement for his own financial gain.
As part of the Conservancy's principles, "Community-oriented enforcement must never prioritize financial gain...Nevertheless, pursuing damages to the full extent allowed by copyright law is usually unnecessary, and can in some cases work against the purpose of copyleft."
Upgradable portable computers have been a bit of pipe dream for the last decade.
Verizon Enterprise Solutions today announced its first set of virtual network services, including the usual suspects of security, WAN optimization, software-defined WANs and virtualized customer premises gear. Working with mostly established vendors, Verizon is making its services available globally on an immediate basis, and focusing heavily on giving customers lots of options for how they transition to the virtualized world. (See Verizon Launches Virtual Network Services.)
The announcement comes four days after AT&T Inc. (NYSE: T) introduced its Network Functions on Demand offer, and differences between the two services are apparent and strategic, notes Nav Chander, research manager for telecom business services with IDC. (See AT&T Offers Network Functions On Demand... Sort Of.)
EnterprisersProject: Accountability, collaboration, and tenacity make up the cultural framework within IT at CVS Health. CIO Stephen Gold explains why.
Interoute was named a Certified Cloud and Service Provider by Red Hat for its networked cloud infrastructure platform, Interoute Virtual Data Centre (VDC).
Interoute, owner operator of a global cloud services platform and one of Europe's largest networks, has today announced that it has been named a Certified Cloud and Service Provider by Red Hat, the world’s leading provider of open source solutions, for its global networked cloud infrastructure platform, Interoute Virtual Data Centre (VDC).
Fedora APAC budget panning FAD 2016 was held on 9th-10th of July 2016 in Malaysia. I was there with Fedora ambassadors from other countries within APAC region.
I was trying to get into code search in Pagure, thing that I land up on got really interesting and amazing. If you want to have a code searching mechanism in your website you need to look into something called Indexing.
The way search happens in some E-commerce sites like Amazon or be it the search happening on Google, with Google its web scrapping and then indexing on the results. The point being the response time , while you are searching for something you get results in few microseconds.
A Virginia software developer announced today the release of what’s billed as the first open source information security analytics tool for managed security services providers (MSSP) and enterprise.
IKANOW says its new platform features multi-tenancy, enterprise scalability and is fully customizable.
Four out of five businesses lack the required infrastructure or security professionals with relevant skills to spot and defend against incoming cyberattacks.
According to a new report by US cybersecurity and privacy think tank Ponemon Institute on behalf of cybersecurity firm BrandProtect, 79 percent of cybersecurity professionals say that their organisations are struggling to monitor the internet for the external threats posed by hackers and cybercriminals.
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP, Go and Python, have now been fixed.
Some flaws take longer—a lot longer—than others to get fixed. The newly named HTTpoxy vulnerability was first discovered back in March 2001 and fixed in the open-source Perl programming language, but it has sat dormant in multiple other languages and applications until July 18.
The HTTPoxy flaw is a misconfiguration vulnerability in the HTTP_PROXY variable that is commonly used by Common Gateway Interface (CGI) environment scripts. The HTTPoxy flaw could potentially enable a remotely exploitable vulnerability on servers, enabling an attacker to run code or redirect traffic. The flaw at its core is a name space conflict between two different uses for a server variable known as HTTP Proxy.
Currently HackerOne has 550+ customers, has paid over $8.9 million in bounties, and fixed over 25,000 vulnerabilities, which makes for a safer Internet.
For the FOSSA pilot project to improve the security of open source software that my colleague Max and I proposed, the European Commission sought your input on which tools to audit.
The results are now in: The two overwhelming public favorites were KeePass (23%) and the Apache HTTP Server (19%). The EU has decided to follow these recommendations and audit both of these software projects for potential security issues.
The other week I published the “A Case Study in Attacking KeePass” post detailing a few notes on how to operationally “attack” KeePass installations. This generated an unexpected amount of responses, most good, but a few negative and dismissive. Some comments centered around the mentality of “if an attacker has code execution on your system you’re screwed already so who cares“. Our counterpoint to this is that protecting your computer from malicious compromise is a very different problem when it’s joined to a domain versus isolated for home use. As professional pentesters/red teamers we’re highly interested in post-exploitation techniques applicable to enterprise environments, which is why we started looking into ways to “attack” KeePass installations in the first place. Our targets are not isolated home users.
Former New York mayor Rudy Giuliani made a surprise appearance at the BlackBerry Security Summit, warning of the rapid growth of cybercrime and cyberterrorism.
Cybercrime and cyberterrorism are both growing at rates between 20% and 40%, said Giuliani, who made a brief return from the Republican National Convention in Cleveland to speak at BlackBerry's New York event.
"Think of it like cancer. We can't cure it... but if we catch it early we can put it into remission," he said. The quicker you can spot an attack, the less chance there is of loss.
A notorious hacker has claimed responsibility for hacking Turkey’s ruling party, the AKP, and stealing more than 300,000 internal emails and other files.
The hacker, who’s known as Phineas Fisher and has gained international attention for his previous attacks on the surveillance tech companies FinFisher and Hacking Team, took credit for breaching the servers of Turkey’s ruling party, the Justice and Development Party or AKP.
“I hacked AKP,” Phineas Fisher, who also goes by the nickname Hack Back, said in a message he spread through his Twitter account on Wednesday evening.
A Phoronix reader pointed out to us of a new Linux hypervisor released at the end of June by Assured Information Security Inc.
Linux has also been a profound influence on software engineering itself – not unlike the old IBM 360 itself – as it is a spectacular example of open source software development.
Alan Cox graduated with a BSc in Computer Science from Swansea University in 1991 and received an MBA from Swansea University in 2005. He has worked for the pioneering Linux service company Red Hat for 10 years and at Intel.
Presenting the award to Mr Cox was Professor John Tucker of Swansea University’s Computer Science Department. He said: “Alan Cox is a world class programmer, an articulate champion of open source software development, and one of the UK’s top software gurus.
For those wishing to access EXT-based file-systems from Windows, Paragon Software Group has announced a new version of their ExtFS software for Windows with better support for EXT4 file-systems.
This commercial read-write ExtFS file-system driver for Windows comes with better EXT4 support. The EXT4 support improvements include for handling over 2TB volumes, up to twice as fast as earlier versions of ExtFS, and support for nearly all of the EXT4 mount options / format specifications. The driver is also said to work better for volumes short on space.
FOSSforce: Our resident Linux newb goes on the prowl with one thought in mind: To find the best-of-breed FOSS music player for GNU/Linux.
Smartphones have changed the way the world gets online, by letting you put a tiny, touchscreen computer in your pocket or handbag. But sometimes it’s still nice to have a larger screen, a full-sized keyboard, and a mouse or touchpad.
The Superbook is a smartphone accessory that gives you all those things. It looks like a laptop, but all the processing power and software comes from your phone.
I recently wrote my first ex script, instead of using my trusty sed (needed to insert a large-ish block, thought the sed script looked clunky). I use vi enough to not be put off too much, but I wanted to see a collection of scripts, to get an idea of good style, and to make sure I wasn't missing a nuance of syntax (e.g. leading colon).
So, for future reference and to help others, is there a good collection of ex scripts I can review?
Edit: here's a sanitized example of what my final script looks like.#!/bin/ksh ex -s $myfile <<EOF :/^middle of file/i here are several lines of function declarations that need to be inserted in the middle. I didn't want to deal with the trailing backslash when using sed . :w EOF submitted by /u/pfp-disciple
Blender isn't just for on-screen 3D